paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1503.04694 | 1 | 1503 | 2015-03-16T15:43:48 | Controlled Label Propagation: Preventing Over-Propagation through Gradual Expansion | [
"cs.SI"
] | Identifying communities has always been a fundamental task in analysis of complex networks. Many methods have been devised over the last decade for detection of communities. Amongst them, the label propagation algorithm brings great scalability together with high accuracy. However, it has one major flaw; when the community structure in the network is not clear enough, it will assign every node the same label, thus detecting the whole graph as one giant community. We have addressed this issue by setting a capacity for communities, starting from a small value and gradually increasing it over time. Preliminary results show that not only our extension improves the detection capability of classic label propagation algorithm when communities are not clearly detectable, but also improves the overall quality of the identified clusters in complex networks with a clear community structure. | cs.SI | cs | Controlled Label Propagation: Preventing
Over-Propagation through Gradual Expansion
Aria Rezaei
Saeed Mahlouji Far
Mahdieh Soleymani
Department of Computer Engineering
Department of Computer Engineering
Department of Computer Engineering
Sharif University of Technology
Email: [email protected]
Sharif University of Technology
Email: [email protected]
Sharif University of Technology
Email: [email protected]
5
1
0
2
r
a
M
6
1
]
I
S
.
s
c
[
1
v
4
9
6
4
0
.
3
0
5
1
:
v
i
X
r
a
Abstract-Identifying communities has always been a funda-
mental task in analysis of complex networks. Many methods have
been devised over the last decade for detection of communities.
Amongst them, the label propagation algorithm brings great
scalability together with high accuracy. However, it has one major
flaw; when the community structure in the network is not clear
enough, it will assign every node the same label, thus detecting
the whole graph as one giant community. We have addressed this
issue by setting a capacity for communities, starting from a small
value and gradually increasing it over time. Preliminary results
show that not only our extension improves the detection capability
of classic label propagation algorithm when communities are not
clearly detectable, but also improves the overall quality of the
identified clusters in complex networks with a clear community
structure.
I.
INTRODUCTION
Complex networks appear in a wide variety of domains. As
a result, studying the structure of such networks has attracted a
tremendous amount of attention throughout years. Real-world
networks are usually comprised of communities – informally
described as a group of nodes with a dense connection
between themselves and a loose connection to the rest of
the network. As the building blocks of complex networks,
communities reveals invaluable information about key features
of the network. Retrieving the community structure can help
us find the functional modules in biological networks, find
groups of cohesive data cubes in large-scale databases, find
groups of users in online social networks with similar attributes
and interests, thus enabling us to develop effective marketing
strategies in such networks, predict future interactions between
users or study the emergence and popularity of ideas in social
media[1][2][3]. For a great survey refer to [4].
There
is
of
no
single
definition
communities.
Radicchi et al. define communities in two senses[5]. Let
node v be in community C with degree dv, then the number
of links between v and other nodes within C will be din
v , and
the number of links between v and the rest of the network
will be dout
. A subgraph V of a graph G is a community in
a strong sense if:
v
∀v ∈ V : din
v > dout
v
(1)
Similarly a subgraph V of graph G is a community in a
weak sense if:
X
v∈V
v > X
din
v∈V
dout
v
(2)
There are various measures quantifying the quality of
clusters. One of the most popular measures is modularity[6].
Knowing that real-world networks possess strong community
structure compared to random networks, modularity measures
the difference between a given partitioning in a certain graph
and the same partitioning in a random graph with the same
distribution of degrees. Modularity in a partitioning with C
clusters can be written as below:
Q = X
ci∈C
h mi
M
− (
di
2M
)2i
(3)
Where mi is the number of edges inside partition ci, di is the
total degree of nodes inside ci, C is the set of all clusters and
M is the total number of edges.
The growing need for retrieving communities from com-
plex networks in addition to rapid growth of the size of data,
highlights the importance of scalable and accurate methods
to detect communities in such networks. With modularity
as objective function, graph partitioning can be seen as an
optimization problem. Many algorithms for community detec-
tion have been proposed over the last decade, setting modu-
larity optimization as their ultimate goal, which has proved
in practice to retrieve communities of great quality[7][8][9].
There are a class of algorithms exploiting the power of linear
algebra to detect communities using the eigenvectors of the
Laplacian matrix[10][11]. Another class of algorithms use the
fact that clusters have weak connection between themselves;
knowing this, this class of algorithms find minimal cuts and
divide the graph recursively, leading to a dendrogram of node-
cluster membership[12][13]. There are also novel approaches
that do not completely fit in the previous categories which
are built around statistical and mechanical phenomena in real
world[14][15][16].
All
these methods try to optimize a global objective
function or use the whole structure of a network to divide
it into clusters. There is a problem with this kind of approach,
especially encountered in social networks; individuals in such
networks does not
join communities to increase a global
quality function, they rather join them to improve their own
utility function, be it more enjoyment through joining a group
of people with similar interests in Facebook, or following
a politician in Twitter in order to stay in touch with the
latest news in politics[17]. Apart from that, it is proved that
algorithms based solely on modularity optimization fails to
detect communities with small size as the size of the network
increases, which is famously known as resolution limit of
modularity[18]. All this evidence lead us to choosing a node-
centred approach. As an example of node-centred approaches,
some algorithms employ a game-theoretic approach to find
communities. Let nodes be agents in a game with a personal
utility function. A strategy in this game which leads to a
nash or local equilibrium will yield a community structure
in the network[17]. Another approach with near linear time is
Label Propagation Algorithm(LPA)[19]. In this method, every
node is assigned a unique label in the initial condition of
the network. Afterwards, in each iteration, nodes are traversed
using a random order and every node acquires the label which
is most frequent among its neighbors. This method has one
serious problem though; in some networks, one of the labels
will over-propagate and sweep through other labels, leading to
detection of the whole network as one giant community, which
renders this method counterproductive in dense networks with
unclear community structure. This phenomenon is often called
flood-fills. The focus of this article is overcoming this flaw and
improving the accuracy of LPA when community structure is
hardly detectable.
The rest of the article is structured as follows. Section II
reviews potentials and flaws of LPA along with subsequent ex-
tensions to overcome its flaws. Section III presents the formal
definition of Controlled Label Propagation Algorithm using
gradual expansion of communities and discusses the rationale
behind choosing this approach. In Section IV we empirically
compare our method with LPA and two of its extensions along
with several state-of-the-art algorithms in real-world networks
in addition to standard network benchmarks. Lastly, section V
discusses further research related to our work in addition to a
conclusion.
II. BACKGROUND AND MOTIVATION
In this section we will discuss the considerable potentials in
LPA and why it is important to improve this method for further
uses. We will also cover some of the flaws of this algorithm
and previous efforts do deal with these flaws.
A. Where label propagation prevails?
it
One of the biggest advantages of LPA is its time-efficiency.
Raghavan et al. state that 95% of the nodes reach their final
state in 5 iterations[19]. Although the experiments by various
authors suggest that the number of iterations needed to reach
equilibrium state, I, grows very slowly with the size of the
network,
is not fully understood yet. Leung et al. have
created a class of networks on which I increase logarithmically
with the size of the network[20]. Although this class of
networks is highly unlikely to appear in natural graphs, it
shows that the efforts to find an upper-bound for I has gone
no further than log N in a network with size N . Since the time
complexity of LPA is O(M I) in a graph with M edges, in the
worst case, its time complexity will be O(M log N ) which is
still considerably fast compared to other methods.
Apart from its time-efficiency, LPA can be trivially ex-
tended to directed and weighted graphs with negative links.
It also does not need to know the number of communities a
priori, so in domains with zero knowledge about the network,
it can be quite useful.
Leung et al. believe that since every node only requires
information from its neighbors, LPA can be easily run in
a distributed environment in almost constant time[20]. This
is particularly important with the emergence of ubiquitous
computing and mobile social networks. All the computation
will be distributed into nodes and since every node has
very few neighbors compared to the size of the graph, the
community structure of large-scale networks can be revealed
in little time. The authors also suggest that since every node
updates its state from current formation of its neighbors, LPA
can be used to detect communities in a dynamic environments
when nodes and links might come and go[20]. Furthermore,
nowadays there is growing concern regarding the privacy of
information in social networks. Keep in mind that every node
only receives information from nodes he is already in contact
with. In addition, the topology of the whole graph is never
revealed to the nodes. As a result, LPA also guarantees an
acceptable level of privacy when run on social networks.
Moreover,
the approach adopted by LPA algorithm is
completely intuitive regarding real world communities. Con-
sider the following scenario; there are N people invited to a
ceremony. Assuming friendship to be a zero-one relationship,
in which zero means no friendship and one means friendship,
their friendship status forms an undirected and unweighted
graph. After the ceremony starts, people will
try to form
circles with their friends in order to be near them and enjoy
their companionship. If we rearrange the circles with the
communities retrieved from their friendship graph using LPA,
the new circles will remain the same throughout the ceremony,
since no one can join a better circle. In other words, there is
no one dissatisfied by her community and these communities
provide an equilibrium state in real life. Formally, we can
call a node v in community Ci dissatisfied if there exists
another community Cj such that d
v , where dC
v
is the number of links from v to nodes within C. As an
inherent characteristic of LPA, there are no dissatisfied nodes
in the retrieved communities. However, this does not hold for
many other algorithms. We have tested several algorithms,
namely multilevel modularity optimization of Blondel et al.[7],
greedy modularity optimization of Claust et al.[8] and random
walk community detection of Rosvall et al.[21], to find the
percentage of dissatisfied nodes in a network given a com-
munity structure by these algorithms [Results are omitted].
Although our experiments did not show a considerable portion
of nodes being dissatisfied (on average, less than 5% in five
collaboration networks retrieved from [22]), keep in mind that
this tiny portion of nodes can be considered as false positives
in domains where it is crucial that nodes belong to the optimal
community in their own perspective, like in social networks.
Cj
v > dCi
B. Where label propagation fails?
As we mentioned before, on certain graphs, LPA fails to de-
tect the community structure of the graph and reports the whole
graph as one community. This is apparently because the speed
of formation for different communities in the network varies
significantly. In other words, the core of stronger communities
are formed in the early stages, while weaker communities has
not yet reached consensus. Furthermore, when a community
has not reached its final state, it is comprised of several smaller
pieces with different labels, possessing a weak core which
is vulnerable to propagation of foreign labels. In a nutshell,
stronger communities, exploiting the lack of unity in weaker
communities, often sweep through the cores of small pieces
of weaker communities and attract all of their members. This
usually leads into one giant community and several smaller
ones. On rare cases, the situation is exacerbated when there is
one label strong enough to overwhelm all other labels, leaving
every node with the same label in the end.
Leung et al. have addressed this issue by employing a
technique called Hop Attenuation[20]. This technique is based
on the observation that the diameter of communities ought
to be tiny proportional to that of the whole graph. With
hop attenuation,
the labels lose their strength while they
propagate. Meaning that after traversing away from its center,
the label's strength is exhausted and will ultimately vanish.
This phenomenon can be formally described as below:
Sv(L) = max(Su(L) : u ∈ N (v)) − δ
(4)
Where Sv(L) is the strength of label L when propagated
by node v, N (v) is the neighborhood set of node v and δ is
a parameter used to decrease the strength of labels when they
traverse a single link. The authors realized that choosing a
constant δ irrespective of the network may lead to a substantial
decrease in the quality of communities. Knowing this, they
proposed some methods to adaptively change δ through either
using the current number of iterations or simply know it a
priori as a parameter given to the algorithm.
Leung et al. used another powerful heuristic to avoid im-
balanced propagation of the labels called Node Preference.
They realized that blindly valuing every neighbor of a node
the same might be an apparent reason for the over-propagation
phenomenon. Given that finding maximal label in LPA is
simply finding the label with maximum occurrence among
neighbors, Leung et al. changed the formulation to the fol-
lowing:
Li+1
v = arg max
Li X
u∈N (v)
Su(Li
u)
f (u)m
(5)
Where Li
v is the label assigned to node v in iteration i,
v) is the strength of v's label in iteration i, N (v) is the
Sv(Li
neighborhood set of v and f (v) is any comparable function on
nodes, such as betweenness centrality[23], degree centrality or
any other measure.
Subelj and Bajec have taken advantage of both node pref-
erence and hop attenuation and proposed two new strate-
gies called defensive preservation and offensive expansion of
communities[24]. In defensive preservation, the preference is
given to nodes in the core of communities. On the other hand,
in offensive expansion, the preference is given to nodes in the
border of communities. The core and the border are identified
using a simple random walk algorithm. They have devised
two algorithms, namely DDALPA and ODALPA, for defensive
and offensive strategies respectively. The authors show that
DDALPA results in high recall, whereas ODALPA gives high
precision. Furthermore, in an attempt to take advantage of
merits in both DDALPA and ODALPA, they have created a
method called BDPA which simply runs them one after another
to find communities of good quality in small-size networks.
Finally, exploiting the core-periphery structure of large-scale
networks[25], they developed a hierarchical algorithm, called
DPA, that has the efficiency of BDPA in addition to recursively
finding communities in the giant core of the graph. Going into
the details of these algorithms is out of the scope of this article,
it suffices to say that the results of both algorithms, especially
DPA, on large-scale graphs is comparable to state-of-the-art
algorithms in terms of modularity measure.
Barber and Clark took a different path. They realize
that over-propagation stems from the objective function of
LPA[26]. Let M be a matrix of N rows and C columns (C
is the number of communities), then Mij is one, if node i has
label j, or zero otherwise. Each row in this matrix is the mem-
bership vector of a node. When a node is updated, it adopts
the most frequent label among its neighbors, thus increasing
the sum of dot products between its own membership vector
and that of its neighbors. Formally, when we update node v,
we increase:
X
u∈N (v)
C
X
i=1
MviMui
Applying adjacency matrix, A, to (6) yields:
N
C
X
i=1
X
j=1
MvjMijAvi
(6)
(7)
Finally, since LPA does this for every node in an iteration,
the overall objective function, H, of LPA becomes:
H =
N
N
C
X
i=1
X
j=1
X
k=1
MikMjkAij
(8)
With a little thought, it will become clear that LPA is
simply increasing the number of edges connecting two nodes
within the same community. Thus, the algorithm reaches its
global maximum when every node is assigned the same label.
To avoid this undesirable result, Barber and Clark changed the
objective function of LPA to below:
H ′ = H − λG
(9)
Where H is the previously mentioned objective function
of LPA and G is a penalty function that diverts the algorithm
from its previous undesired global maximum with a coeffi-
cient λ. Barber and Clark have proposed several G functions,
two of them changes H into modularity of unipartite and
bipartite networks[26], thus enabling LPA to locally maximize
modularity. This is a very impressive approach since it keeps
the potential benefits of LPA (parallelism, privacy insurance,
etc.) while overcoming its flaws and retrieving communities of
excellent quality.
We now look at the flood-fill phenomenon from a dif-
ferent angle. LPA has two modes, asynchronous and syn-
chronous[19]. They both provide similar results, but the syn-
chrobous mode gives a better insight about the underlying
Blog-Catalog
GRQ
HepTh
HepPh
CondMat
Astro
0.014
0.012
0.010
0.008
0.006
0.004
0.002
A
0.000
100
101
102
103
104
105
Labels
Fig. 1: (Color online) We have calculated the attraction power
(A) of labels in the six networks, which is an estimation of
the number of nodes holding each label after the first iteration
of LPA. As the plot suggests, attraction power is much more
equally spread across nodes in the five co-authorship graphs
compared to the blog-catalog network. The results show that
it might be too late to prevent a label from flooding the
whole graph even after the first iteration. It also shows that
we can determine how likely LPA is to fail based solely on
the structure of the graph
reasons of flood-fills. At the first iteration of LPA, every node
is assigned a unique label, thus every label in the neighborhood
of a node v has the same frequency. As a result, the probability
of a node v choosing a label L in its neighborhood is 1
where
dv
dv is the degree of node v. We can easily compute the expected
number of nodes in a label after the first iteration as below:
E[N (Lu)] = X
v∈N (u)
1
dv
(10)
Where Lu is the label first assigned to node u. We call
the expected number of nodes choosing a label Lv after first
iteration attraction power of node v and denote it by A(v).
We have calculated A for each label after the first itera-
tion of LPA on five co-authorship networks[22], as examples
of sparse networks with clear community structure, and a
friendship network in blog-catalog[27] as an example of dense
social network which LPA fails to retrieve its community
structure. We have plotted the results, with nodes sorted
descending by A, in Fig.1. As the plot suggests, the decrease
in blog-catalog network is far more rapid compared to five co-
authorship networks. The distribution of A is important for two
reasons. First, it enables us to anticipate the failure of LPA in
networks before the algorithm starts. Second, Fig.1 shows that
imbalanced growth of communities starts from the very first
iteration, meaning that any strategy to control over-propagation
of labels based on the results of previous iterations may
fail. This highlights the importance of monitoring growth of
communities from the very first iteration. In the next section we
propose a simple yet effective way to prevent over-propagation
starting from the first iteration.
III. CONTROLLED LABEL PROPAGATION
Before we go on and talk about preventing over-
propagation, there is another problem with LPA that needs to
be deal with. In LPA, when there are other labels in the neigh-
borhood with the same frequency as a node's current label, the
existing label will not change. Meaning that if a bad decision
is made in the early stages, there is no come-back mechanism
to escape from it. In terms of objective function of LPA, there
is no mechanism to escape from an early local maximum and
we are satisfied with with the first local maximum we reach.
There has been a technique proposed by Barber and Clark that
randomly walks on the local maximum to escape from it[26].
This might be dangerous as it might randomly change the
label of several border nodes, which decreases the defensive
capabilities of a community and might lead to an avalanche
effect in which nodes' labels are changed one after another
because of the change in border nodes' labels, which leads
to a drastic change in the community structure after some
iterations. To prevent this, we have acquired a strategy inspired
by Simulated Annealing[28] in which nodes tend to change a
good label – a label with maximal frequency among the nodes'
neighbors – for another good label in the early stages. However
they lose this tendency over time, meaning that they will hold
their good label if there are no better labels in the final stages,
since we do not want established cores to disappear. This can
be done by a decreasing probability function p(t), starting from
1 and ending in 0. If p(t) holds, we randomly choose a label
among good labels; if not, we will hold the current label if
there are no better labels.
Now we can devise a method to prevent all nodes from
ending up with the same label. We previously mentioned that
the main reason behind flood-fills is the rapid formation of the
core of some communities and sluggish growth of others. So
the key to this problem is ensuring "fair" growth of communi-
ties in each iteration. To ensure that weaker communities have
a chance to grow, we put a capacity for all communities as a
function C(t) where t is the current iteration. When a label's
population reaches the capacity, it can no longer attract new
nodes. We define C is follows:
C(t) = (cid:16)h kt
T i + 1(cid:17) ×
N
k
(11)
Where k is the number of times we increase the capacity
of communities (the maximum number of nodes a label can
be assigned to), t is the current number of iteration, T is the
maximum number of iterations and N is the size of network.
th
It is clear that this function increases the capacity every T
k
iteration by N
k and ending in N . As a result,
in the final stages there are actually no constraint on the size
of communities. Furthermore, We call the iterations between
two increases in capacity a cycle, so k will be the number of
cycles.
k , starting from N
The rationale behind our strategy to stop popular labels
from attracting new nodes is in fact giving a chance to weaker
communities to form a core. In this way, a node v might choose
a popular label L when it is not full. During the rest of the
cycle, a number of nodes in v's neighborhood find L full and
join a sub-optimal label L′. With enough nodes joining L′, v
might change its mind and join L′ during the later iterations
TABLE I: Modularity scores for eleven data sets averaged on
50 to 2 realizations based on the size of networks. We have
also shown the variance of A as an indicator of unfairness of
attraction power in the networks.
Name
GRQ
HepTh
HepPh
CondMat
Astro
Enron
Brightkite
Gowalla
DBLP
Amazon
Youtube
N
5.24K
9.88K
12.01K
12.01K
18.77K
36.69K
58.23K
0.20M
0.32M
0.33M
1.13M
M
14.48K
25.97K
0.12M
0.12M
0.20M
0.18M
0.21M
0.95M
1.05M
0.93M
2.99M
var(A)
1.0
1.1
1.2
1.3
1.1
80.8
6.9
102.4
2.4
2.1
233.9
CLPA
0.797
0.671
0.497
0.633
0.450
0.473
0.623
0.618
0.697
0.786
0.682
LPA
0.735
0.627
0.488
0.578
0.323
0.338
0.557
0.503
0.622
0.709
0.555
of the current cycle and form the core of a new community
along with a number of its neighbors. The cores might not
be of good quality in the early cycles, but when we reach a
new cycle and increase C, those nodes who are not content
with their current label will join their desired label before it
gets full again. However, the core nodes of a community who
have acquired a label will keep their label and attract new
nodes. In this way we are helping weaker communities to form
their cores while still giving nodes complete freedom in the
final cycles to choose their desired label. We call our method
Controlled Label Propagation Algorithm (CLPA).
In the next section we show the result of our tests and prove
that our method is more effective than previously proposed ex-
tensions to prevent flood-fills. Furthermore, the overall quality
of clusters are also increased on the various datasets we tested
our method on.
IV. EXPERIMENTS
A. Sparse Networks
We have tested CPLA against LPA on a wide variety
of networks. Although increasing the quality of clusters was
not our primary intention, the results reveal that on certain
graphs, the modularity score of clusters yielded by CLPA is
on average much higher than LPA. The data sets used for this
part include five co-authorship networks[22], namely GRQ,
HepTh, HepPh, CondMat and Astro, retrieved from articles
on different topics in Physics (for more information about
these networks refer to [22]). There are two location-based
online social networks[22], namely Gowalla and Brightkite
and an e-mail client network named Enron[22]. There is also
a graph of a piece of Youtube's social network, along with
a Computer Science co-authorship network of DBLP and
product co-purchased network of Amazon[22]. We ran our
algorithm with three different ks, 50, 100 and 200, along with
LPA on all the networks for fifty to two times, depending on
size of the networks. Table.I contains the name of the network,
the number of nodes N , the number of edges M and the
modularity score Q achieved by two algorithms. We have used
the igraph python library to compute modularity for retrieved
communities[29].
Table.I reveals that letting weaker communities grow im-
proves the overall quality of detected communities. In section
II.B we conjectured that the failure of LPA stems from unfair
distribution of attraction power (A). In order to measure
unfairness of A, we have calculated the variance of this value
for all nodes in each of the networks and shown the results
in Table.I. Note that out of five networks which yielded the
highest percentage of increase in modularity, four are also in
the top five networks with highest variance in A. Also, the
five networks with the lowest increase in modularity are in
the bottom six networks in regard to their variance in A. The
only anomaly is Astro, which is the 9th network in respect to
var(A), but yields the second highest increase in modularity.
This shows that the failure of LPA is not solely related to
unfair wiring of the links in the networks. This calls for an in-
depth analysis to broaden our understanding of the underlying
reasons of LPA shortcoming in different networks.
B. Dense Networks
As an example of social networks with dense structure
in which LPA fails completely to retrieve any community
structure, we have found the Blog-Catalog social graph which
we formerly analyzed in section II. In this network, the average
and maximum degree (shown in Table.II) is significantly higher
than previous networks we tested in section IV.b. The node
with the maximum degree is connected to 38.7% of the nodes.
Furthermore, there are 62 nodes connected to more than 10%
of the network. The symptoms we mentioned are quite rare in
social network structures. However, this shows that there exists
instances of social networks, although rare, in which LPA fails
to retrieve any meaningful set of communities. This means that
we have legitimate concerns to stop this phenomenon.
The network comes with a set of ground-truth communities,
which enables us to measure the similarity between retrieved
communities with the true ones. One of the popular similarity
measures is Normalized Mutual Information (NMI). Due to
the overlapping nature of the ground-truth communities, we
have used the code provided by McDaid et al. to calculate
NMI between our communities and the true ones[30]. Note that
since ground-truth communities significantly overlap, the NMI
score will be very low in general for any graph partitioning
method, but it is still useful for the sake of comparison.
We have compared our algorithm's performance to the
state-of-the-art algorithms, such as the multi-level mod-
ularity optimization algorithm of Blondel et al.
(denoted
the greedy modularity optimization of
by Louvain[7]),
Clauset et al.
(denoted by CNM[8]) and the famous in-
fomap algorithm[21] proposed by Rosvall and Bergstrom. We
have also tested the data set with two of LPA's most
successful extensions, namely BPA and DPA, proposed by
Subelj and Bajec[24][31]. The results, shown in Table.II, show
that not only our algorithm prevents a flood-fill and captures a
community structure in this network, but also our communities
yield relatively good results compared to other methods, except
for CNM which is considerably slower than others. We believe
that the relatively good resemblance between our communities
and the true ones originates from the nature of LPA algorithm,
which is completely intuitive regarding how social networks
are formed in real world. Meaning that if one incorporates a
strategy to ensure the balanced growth of communities with
LPA's basic method of community detection, the results can
be of great quality.
TABLE II: We tested the Blog-Catalog network using the algorithms shown in the table. We have shown the average NMI over
ten realization. As the results reveal, LPA and both of its extensions, BPA and DPA, fail to capture any meaningful community
strucutre in this network. This highlights the importance of efficient ways to prevent the flood-fill phenomenon. Also worth
noticing is the failure of the Louvain algorithm to capture the essence of ground-truth communities, resulting in a zero NMI
over ten realization. Finally, note that CNM yields better results than ours with considerably higher execution time, around 50s
in a network of this size, which might cause troubles if one intends to use CNM on massive graphs.
N
M
¯d
10.3K
333.9K
64.7
dmax
3992
CLPA
0.0006
LPA
0.0
DPA
0.0
BPA
0.0
Infomap
0.0003
CNM
0.0009
Louvain
0.0
C. Networks with planted partitions
In order to realize what parameters are responsible for the
failure of LPA and get a better understanding of behavior
of different algorithms in networks with a vague community
structure, we have used Lancichinetti et al. benchmark[32]. To
challenge the detection power of these algorithms, we have set
the size of the network (N ) constant, then created networks of
different densities ( ¯d) and community structure clarity (mixing
parameter or µ). In order to study the effects of fairness of
degree distribution, we have also used networks with different
maximum degree (dmax). The results are depicted in Fig.2(a),
Fig.2(b) and Fig.2(c). As you can see, the algorithms based on
propagation of data, including LPA and all of its extensions
along with Infomap, follow a trend of giving high quality
results and then abruptly falling to zero. The exception is
the DPA algorithm for which the decrease in the quality of
clusters start sooner than others, but it keeps giving mediocre
clusterings before completely failing to identify any useful
structure out of the networks. The pattern of behavior is
different for two modularity optimization algorithms, namely
Louvain and CNM, as they tend to have a more smooth fall.
However, the smoothness is both good and bad. Good, because
in networks with a vague community structure, they continue
to yield communities with some degree of quality. It is also
bad, since the decrease in the quality of clusters, compared to
our algorithm, starts sooner. In a nutshell, even though CNM
and Louvain keep on yielding non-zero NMI on later stages
and hit the ground slower than us, but they give sub-optimal
solutions when our algorithm results in optimal communities.
All in all, our algorithm keeps giving near-perfect results, while
other results suffer from an amount of inaccuracy, rendering us
superior in graphs with unclear community structure. Keep in
mind that we are achieving better results in higher µ while
giving perfect results on lower ones. Meaning that we are
not sacrificing accuracy on the start of µ spectrum to attain
higher accuracy in the end. Furthermore, even though other
algorithms might experience sporadic decrease in NMI even
before µ = 0.5, our algorithm stays firmly on top of the chart
and yield near-perfect results in any case.
Looking at the landing points – the point in which NMI
reaches zero – of the algorithms can give us a great insight on
the impact of the density of the networks on detection power of
these algorithms. There is one group of algorithms, including
LPA, BPA, DPA and Infomap, that lose their detection power
as the density of the network increases. In other words, the
landing point of these algorithms move to the left as the
density grows. Interestingly, our algorithm along with Louvain
behave differently. Meaning that as the density increases, we
can detect communities in networks with a more ambiguous
structure. The effect of density growth on Louvain is quite
different as only its curvature decreases, meaning that not only
it starts to fall on later stages, but also its quality decreases
less in the early stages of its fall. The CNM algorithm behaves
regardless of the density of the network, as it seems to only
take into account the clarity of the community structure in all
three networks.
Now we take a look at each algorithm's performance in the
three networks individually and compare it to ours. BPA and
LPA generally follow the same path. They usually yield near-
perfect results in the beginning and are the first algorithms
to fall to zero. Both of these networks yields results with
worse quality compared to ours, in all three of the networks.
To be more specific, not only they reach zero sooner than
us, but also they yields equal or lower NMI compared to us
on networks that they show a reasonable performance. DPA's
behavior seems to be a little more complicated as it shows a
smooth fall in the first network ( ¯d = 20) and a sudden fall
in the last one ( ¯d = 40). The smooth fall of DPA enables it
to surpass our algorithm on very high µ after it goes below
our algorithm during µ = 0.55 − 0.75. This does not hold
for the other two networks, as DPA completely reaches zero
before we even start to fall. The case is quite clear for the
Infomap algorithm, as on all three networks, our algorithm
outperforms it both in point-to-point comparison and in landing
point. As we mentioned earlier, the Louvain plot has a smooth
fall. Due to this characteristic of Louvain, we start to surpass
it on early stages, as we yield near-perfect results and the
Louvain suffers an amount of decrease in the quality of its
retrieved communities. But Louvain catches us in the end
in all three of the networks. We will further talk about the
shortcoming of our algorithm on very high µs on all three
of the networks. However, you should keep in mind that even
though the Louvain keeps on giving a community strucutre, on
average, the resemblance between the retrieved communities
and the true ones, decrease very fast to around 0.2 in terms of
NMI. This means that, although Louvain does not completely
miss the essence of the community structure present in a
network, but it also does not detect a big portion of it. The
CNM algorithm behaves regardless of the density of networks
and achieves lower NMI compared to all others.
Finally, to find out the cause of our algorithm's failure in
very high µs, we calculated the number of dissatisfied (remem-
ber from section II.A where we discussed about dissatisfaction
of nodes in a given clustering) nodes on all three of the
networks for each µ. The results are shown in Fig.2(d). Since
there were not any dissatisfied node when µ was below 0.5, we
I
M
N
I
M
N
1
0.8
0.6
0.4
0.2
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
µ
CLPA
LPA
BPA
DPA
Infomap
CNM
Louvain
I
M
N
1
0.8
0.6
0.4
0.2
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
µ
CLPA
LPA
BPA
DPA
Infomap
CNM
Louvain
(a) a class of networks with ¯d = 20 and dmax = 100
(b) a class of networks with ¯d = 30 and dmax = 150
1
0.8
0.6
0.4
0.2
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
µ
CLPA
LPA
BPA
DPA
Infomap
CNM
louvian
s
e
d
o
n
d
e
fi
s
i
t
a
s
s
i
d
1000
800
600
400
200
0
0.5
0.6
0.8
0.9
0.7
µ
20-100
30-150
40-200
(c) a class of networks with ¯d = 40 and dmax = 200
(d) Dissatisfaction rate in the three networks in this figure.
Fig. 2: (Color online) We have tested several algorithms on Lancichinetti et al. benchmarks[32], using different ¯d and dmax. As
the figures suggest, our algorithm surpass others by a big margin as the density ( ¯d) increases. In addition, on the bottom-right
figure, we have shown that the number of dissatisfied nodes increases dramatically as µ grows, meaning that without significantly
changing the core of LPA, it is extremely difficult to detect communities in environments with very high µ.
did not plot the corresponding data. As you can see, when µ
reaches the end of its spectrum, the number of unhappy nodes
increases exponentially. As a result, the ground truth clustering
cannot be an equilibrium state for LPA or our algorithm. This
means that without altering the essence of LPA, it will be
extremely difficult to detect the planted partitions in networks
in the end of µ range. Besides, it is extremely rare to see a µ
this high in real-world networks any way.
V. FURTHER WORKS & CONCLUSION
We discussed how LPA has considerable potential to be
employed in massive social networks. To name a few, its
ability to be utilized in distributed environments, its intuitive
approach to community detection in addition to great time and
memory efficiency. We then outlined its major flaw, known as
the flood-fill phenomenon. We mentioned how previous works
have chosen two different paths to address this issue:
• Changing the objective function of LPA.
• Controlling the speed of growth for all communities.
We then proposed an algorithm, choosing the second option, to
control over-propagation of popular labels through choosing a
small capacity and gradually increasing it over time. We then
experimented our algorithm on several domains, namely sparse
real-life networks, a dense real-life network and standard
benchmarks with planted partitions. Our results showcased the
strength of our algorithm in networks with unclear community
structure, compared to existing robust algorithms. Since our
method tackles the problem of flood-fills in a new way (as far
as we know), it can be considered as a framework for others
to propose a more efficient enhancement over our method
to prevent flood-fills. Also, further research can be done in
the area of finding other ways to prevent flood-fills starting
from the very first iteration. Also an interesting area might be
analyzing the properties of real-world networks in which LPA
completely fails. Moreover, our method of preventing flood-fill
can be easily incorporated with the majority of LPA extensions,
such as BPA and DPA, since it does not change the essence
of LPA by any means.
ACKNOWLEDGMENT
The authors would like to thank Dr.Subelj for kindly
providing us with the codes of BPA and DPA algorithms.
REFERENCES
[1] V. Spirin and L. A. Mirny, "Protein complexes and
functional modules in molecular networks," Proceedings
of the National Academy of Sciences, vol. 100, no. 21,
pp. 12 123–12 128, 2003.
[2] M. J. Krawczyk, "Communities in social networks,"
in Biometrics and Kansei Engineering, 2009. ICBAKE
2009. International Conference on.
IEEE, 2009, pp.
111–116.
[3] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan,
"Group formation in large social networks: membership,
growth, and evolution," in Proceedings of the 12th ACM
SIGKDD international conference on Knowledge discov-
ery and data mining. ACM, 2006, pp. 44–54.
"SNAP Datasets:
collection,"
Stanford
dataset
http://snap.stanford.edu/data, Jun. 2014.
network
large
[23] L. C. Freeman, "A set of measures of centrality based on
betweenness," Sociometry, pp. 35–41, 1977.
[24] L. Subelj and M. Bajec, "Unfolding communities in large
complex networks: Combining defensive and offensive
label propagation for core extraction," Physical Review
E, vol. 83, no. 3, p. 036103, 2011.
[25] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Ma-
honey, "Community structure in large networks: Natural
cluster sizes and the absence of large well-defined clus-
ters," Internet Mathematics, vol. 6, no. 1, pp. 29–123,
2009.
[26] M. J. Barber and J. W. Clark, "Detecting network
communities by propagating labels under constraints,"
Physical Review E, vol. 80, no. 2, p. 026129, 2009.
[27] R. Zafarani and H. Liu, "Social computing data
[Online]. Available:
2009.
repository
http://socialcomputing.asu.edu
at ASU,"
[28] S. Kirkpatrick, M. Vecchi et al., "Optimization by sim-
mulated annealing," science, vol. 220, no. 4598, pp. 671–
680, 1983.
[29] G. Csardi and T. Nepusz, "The igraph software package
for
complex network research," InterJournal, vol.
Complex Systems, p. 1695, 2006. [Online]. Available:
http://igraph.org
[30] A. F. McDaid, D. Greene, and N. Hurley, "Normalized
mutual information to evaluate overlapping community
finding algorithms," Oct. 2011.
[Online]. Available:
http://arxiv.org/abs/1110.2515
[31] L. Subelj and M. Bajec, "Robust network community
detection using balanced propagation," The European
Physical Journal B-Condensed Matter and Complex Sys-
tems, vol. 81, no. 3, pp. 353–362, 2011.
[32] A. Lancichinetti, S. Fortunato, and F. Radicchi, "Bench-
mark graphs for testing community detection algorithms,"
Physical review E, vol. 78, no. 4, p. 046110, 2008.
[4] S. Fortunato, "Community detection in graphs," Physics
[22] J. Leskovec
and A. Krevl,
Reports, vol. 486, no. 3, pp. 75–174, 2010.
[5] F. Radicchi, C. Castellano, F. Cecconi, V. Loreto, and
D. Parisi, "Defining and identifying communities in net-
works," Proceedings of the National Academy of Sciences
of the United States of America, vol. 101, no. 9, pp. 2658–
2663, 2004.
[6] M. E. Newman, "Modularity and community structure
in networks," Proceedings of the National Academy of
Sciences, vol. 103, no. 23, pp. 8577–8582, 2006.
[7] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and
E. Lefebvre, "Fast unfolding of communities in large
networks," Journal of Statistical Mechanics: Theory and
Experiment, vol. 2008, no. 10, p. P10008, 2008.
[8] A. Clauset, M. E. Newman, and C. Moore, "Finding
community structure in very large networks," Physical
review E, vol. 70, no. 6, p. 066111, 2004.
[9] J. Duch and A. Arenas, "Community detection in com-
plex networks using extremal optimization," Physical
review E, vol. 72, no. 2, p. 027104, 2005.
connectivity
graphs,"
Czechoslovak Mathematical Journal, vol. 23, no. 2, pp.
298–305, 1973.
"Algebraic
Fiedler,
of
[10] M.
[11] A. Pothen, H. D. Simon, and K.-P. Liou, "Partitioning
sparse matrices with eigenvectors of graphs," SIAM Jour-
nal on Matrix Analysis and Applications, vol. 11, no. 3,
pp. 430–452, 1990.
[12] G. Karypis and V. Kumar, "A fast and high quality mul-
tilevel scheme for partitioning irregular graphs," SIAM
Journal on scientific Computing, vol. 20, no. 1, pp. 359–
392, 1998.
[13] K. Lang and S. Rao, "A flow-based method for im-
proving the expansion or conductance of graph cuts," in
Integer Programming and Combinatorial Optimization.
Springer, 2004, pp. 325–337.
[14] J. Reichardt and S. Bornholdt, "Statistical mechanics of
community detection," Physical Review E, vol. 74, no. 1,
p. 016110, 2006.
[15] B. J. Frey and D. Dueck, "Clustering by passing messages
between data points," science, vol. 315, no. 5814, pp.
972–976, 2007.
[16] J. Reichardt and S. Bornholdt, "Detecting fuzzy commu-
nity structures in complex networks with a potts model,"
Physical Review Letters, vol. 93, no. 21, p. 218701, 2004.
[17] W. Chen, Z. Liu, X. Sun, and Y. Wang, "A game-theoretic
framework to identify overlapping communities in so-
cial networks," Data Mining and Knowledge Discovery,
vol. 21, no. 2, pp. 224–240, 2010.
[18] S. Fortunato and M. Barth´elemy, "Resolution limit
in community detection," Proceedings of the National
Academy of Sciences, vol. 104, no. 1, pp. 36–41, 2007.
[19] U. N. Raghavan, R. Albert, and S. Kumara, "Near linear
time algorithm to detect community structures in large-
scale networks," Physical Review E, vol. 76, no. 3, p.
036106, 2007.
[20] I. X. Leung, P. Hui, P. Lio, and J. Crowcroft, "Towards
real-time community detection in large networks," Phys-
ical Review E, vol. 79, no. 6, p. 066107, 2009.
[21] M. Rosvall and C. T. Bergstrom, "Maps of random
walks on complex networks reveal community structure,"
Proceedings of the National Academy of Sciences, vol.
105, no. 4, pp. 1118–1123, 2008.
|
1712.08963 | 1 | 1712 | 2017-12-24T19:51:10 | Towards Profit Maximization for Online Social Network Providers | [
"cs.SI",
"cs.DS"
] | Online Social Networks (OSNs) attract billions of users to share information and communicate where viral marketing has emerged as a new way to promote the sales of products. An OSN provider is often hired by an advertiser to conduct viral marketing campaigns. The OSN provider generates revenue from the commission paid by the advertiser which is determined by the spread of its product information. Meanwhile, to propagate influence, the activities performed by users such as viewing video ads normally induce diffusion cost to the OSN provider. In this paper, we aim to find a seed set to optimize a new profit metric that combines the benefit of influence spread with the cost of influence propagation for the OSN provider. Under many diffusion models, our profit metric is the difference between two submodular functions which is challenging to optimize as it is neither submodular nor monotone. We design a general two-phase framework to select seeds for profit maximization and develop several bounds to measure the quality of the seed set constructed. Experimental results with real OSN datasets show that our approach can achieve high approximation guarantees and significantly outperform the baseline algorithms, including state-of-the-art influence maximization algorithms. | cs.SI | cs | Towards Profit Maximization for Online Social
Network Providers
Jing Tang
Xueyan Tang
School of Comp. Sci. & Eng.
Nanyang Technological University
Email: [email protected]
School of Comp. Sci. & Eng.
Nanyang Technological University
Email: [email protected]
Junsong Yuan
School of EEE
Nanyang Technological University
Email: [email protected]
7
1
0
2
c
e
D
4
2
]
I
S
.
s
c
[
1
v
3
6
9
8
0
.
2
1
7
1
:
v
i
X
r
a
Abstract-Online Social Networks (OSNs) attract billions of
users to share information and communicate where viral mar-
keting has emerged as a new way to promote the sales of products.
An OSN provider is often hired by an advertiser to conduct viral
marketing campaigns. The OSN provider generates revenue from
the commission paid by the advertiser which is determined by
the spread of its product information. Meanwhile, to propagate
influence, the activities performed by users such as viewing video
ads normally induce diffusion cost to the OSN provider. In
this paper, we aim to find a seed set to optimize a new profit
metric that combines the benefit of influence spread with the
cost of influence propagation for the OSN provider. Under many
diffusion models, our profit metric is the difference between two
submodular functions which is challenging to optimize as it is
neither submodular nor monotone. We design a general two-
phase framework to select seeds for profit maximization and
develop several bounds to measure the quality of the seed set
constructed. Experimental results with real OSN datasets show
that our approach can achieve high approximation guarantees
and significantly outperform the baseline algorithms, including
state-of-the-art influence maximization algorithms.
I. INTRODUCTION
Information can be disseminated widely and rapidly through
Online Social Networks (OSNs) (such as Facebook, Twitter,
Flickr, Google+, and LinkedIn) with "word-of-mouth" effects.
Viral marketing is a typical application that leverages OSNs as
the medium for information diffusion [9]. The market of OSN
advertisement is growing explosively. For example, Fortune
[25] reports that the online and digital advertisement spending
for the 2016 election of the United States will reach 1.2 billion
US dollars in which 49% is expected to go to social media.
Advertisers often delegate the operation of viral marketing
campaigns to OSN providers who have the complete infor-
mation of their social network structures [3]. Providing viral
marketing services is a potential and promising approach that
OSN providers can explore for monetization. When hiring an
OSN provider to conduct the viral marketing campaign, the
advertiser usually pays the OSN provider a commission for
each user that adopts its product or shares its ads. Thus, the
revenue of the OSN provider generated from the commission
is determined by the spread of the product
information.
Meanwhile, to propagate influence, the activities performed
by users such as viewing video ads normally induce diffusion
cost to the OSN provider. For example, for a cloud-based
OSN running viral video marketing [20], the OSN will be
charged by the cloud for each video click due to the data traffic
produced. Intuitively, the number of clicks for each video is
dependent on the number of connections among users that are
actually used during the viral marketing campaign. Therefore,
to maximize its profit, the OSN provider needs to account
for both the reward of influence spread and the expense of
influence propagation, both of which are dependent on the
seed users selected to initialize the viral marketing campaign.
In this paper, we study the problem of finding a seed set to
optimize such a new profit metric that combines the benefit of
influence spread with the cost of influence propagation.
Our profit metric is challenging to optimize as it is signifi-
cantly different from the influence metric that has been studied
widely [6], [7], [12], [14], [15], [17], [22], [23], [24], [27],
[28], [30], [32], [33], [34]. It is well known that the influence
spread generated by a seed set is submodular and monotone
under many diffusion models [1], [15], [26], which makes it
easy to design influence maximization algorithms with strong
approximation guarantees [21]. Some recent studies have ad-
dressed profit maximization from the advertiser's perspective
by putting together the benefit of influence spread and the cost
of seed selection [19], [29], [31], [35]. In these studies, the
cost of seed selection is modeled by the incentives (e.g., free
samples) provided to seed users. Since the seed selection cost
is given by the sum of the costs of individual seeds which
is modular, the resultant profit metric is still submodular. In
contrast, in our problem, both the revenue and cost of the OSN
provider are attached to the diffusion process. As a result,
our profit metric can be viewed as the difference between
two submodular functions, which is neither submodular nor
monotone and is thus much more difficult to deal with.
In this paper, we propose a general two-phase framework
to optimize profit for the OSN provider. Our framework is
comprised of a pruning phase that iteratively narrows down the
search space and a search phase that uses heuristics to select
seed nodes within the reduced search space. We theoretically
establish the advantages of our pruning technique in improving
the effectiveness and efficiency of any algorithm used in the
search phase. We further derive several bounds on the maxi-
mum achievable profit to evaluate the quality of the seed sets
obtained by any algorithm. We conduct extensive experiments
with several real OSN datasets. The results demonstrate the
effectiveness and efficiency of our framework.
The rest of this paper is organized as follows. Section II
reviews the related work. Section III defines the profit maxi-
mization problem for the OSN provider. Section IV elaborates
the design of our two-phase framework. Section V develops
the bounds for quality measurement. Section VI presents the
experimental evaluation. Finally, Section VII concludes the
paper.
II. RELATED WORK
Influence Maximization. Kempe et al. [15] formulated an
influence maximization problem for a given seed set size with
two basic diffusion models, namely the Independent Cascade
(IC) and Linear Threshold (LT) models. They showed that
the influence spreads under these models are submodular
and monotone. Thus, they proposed a simple hill-climbing
greedy algorithm to address the problem, which can provide a
(1−1/e)-approximation guarantee [21]. The follow-up studies
have mainly concentrated on improving the efficiency of the
algorithm implementation for large-scale OSNs [6], [7], [12],
[14], [17], [22], [23], [24], [27], [28], [30], [32], [33], [34].
Different from the above studies, we target at maximizing the
profit that accounts for both the benefit of influence spread
and the cost of influence propagation in viral marketing.
Profit Maximization. Maximizing the influence spread
alone has been shown to be ineffective for optimizing the
profit return of viral marketing [29], [31]. This is because
the number of seeds selected yields a tradeoff between the
expense and reward of viral marketing. To avoid pre-setting
the number of seeds to select, some recent work studied profit
maximization from the advertiser's perspective [19], [29],
[31], [35]. These studies considered the cost of seed selection
which is modular and implies that their profit metric is still
submodular. They investigated heuristics to select seeds under
the assumption that the social network structures are available
to the advertiser. In practice, only the OSN providers have
the complete information of their social graphs and they often
keep the formation secret for business and privacy reasons
[3], [16]. Therefore, the OSN providers are able to run viral
marketing campaigns more efficiently than the advertisers.
Different from the above work, we formulate a new profit
maximization problem from the OSN provider's perspective
that takes into account the cost of information diffusion over
the social network. As shall be shown later, our profit metric
is the difference between two submodular functions, which is
neither submodular nor monotone.
Submodular Optimization. Iyer and Bilmes [13] inves-
tigated optimizing the difference between two submodular
functions. They showed that this problem is multiplicatively
inapproximable unless P=NP and proposed several heuristic
methods to address the problem. The greedy algorithm [15],
[29] is another widely used heuristic for submodular optimiza-
tion. We apply these heuristic methods to the search phase of
our two-phase framework. More importantly, we develop an
iterative pruning technique to reduce the search space which
significantly improves these heuristics in terms of not only
effectiveness but also efficiency. In addition, we also derive
several upper bounds of the optimum to benchmark the output
of any algorithm.
III. PROBLEM FORMULATION
A. Preliminaries
Let G = (V, E) be a directed graph modeling an OSN,
where the nodes V represent users and the edges E represent
the connections among users (e.g., friendships on Facebook,
followships on Twitter). For each directed edge (cid:104)u, v(cid:105) ∈ E,
we refer to v as a neighbor of u, and refer to u as an inverse
neighbor of v.
There are many diffusion models for the processes by which
influence propagates in social networks. The diffusion model is
normally a random process that starts with a set of seed nodes
S. Initially, the seed nodes S are activated, while all the other
nodes are not activated. When a node u becomes activated,
it would attempt to further activate its neighbors which are
not yet activated. The diffusion process terminates when no
more node can be further activated. Let g ∼ G be a sample
outcome of influence propagation by the diffusion process and
let Vg(S) be the set of nodes activated by the seed set S in
the sample outcome g. The influence spread of the seed set S,
denoted by σ(S), is the expected number of nodes activated
over all possible sample outcomes of influence propagation,
i.e., σ(S) = E[Vg(S)].
B. The Profit Maximization Problem
As discussed, the influence spread is the benefit gained by
the OSN provider and the cost of influence propagation is the
price to pay for viral marketing. We assume that each node v
in the social network is associated with a benefit weight b(v),
which represents the benefit offered by activating v (e.g., the
commission received from the advertiser). The benefit β(S) of
influence spread generated by a seed set S is the total benefit
brought by all the nodes activated:
β(S) = E(cid:104) (cid:88)
v∈Vg(S)
b(v)
.
(1)
(cid:105)
(cid:105)
To model the cost of influence propagation, we consider the
diffusion process in the social network. Recall that when a
node is activated, it attempts to further activate its neighbors
through the connections to them in the social network. Without
loss of generality, we assume that each node v is associated
with a cost weight c(v), which represents the cost of infor-
mation diffusion incurred by v in attempting to activate its
neighbors when it becomes activated (e.g., pushing video ads).
The cost γ(S) of influence propagation introduced by a seed
set S is the total cost incurred by all the nodes activated:
γ(S) = E(cid:104) (cid:88)
v∈Vg(S)
c(v)
.
(2)
Then, we naturally define a profit metric from OSN provider's
perspective as the benefit of influence spread less the cost of
influence propagation, i.e., the profit φ(S) for running a viral
marketing campaign with a seed set S is given by
φ(S) = β(S) − γ(S),
(3)
Algorithm 1: IterativePrune
1 start with A0 ← ∅, B0 ← V and t = 0;
2 repeat
3
At+1 ← At ∪ {v : β(v Bt \ {v}) − γ(v At) > 0 and
v ∈ Bt \ At};
Bt+1 ← Bt \ {v : β(v At) − γ(v Bt \ {v}) < 0 and
v ∈ Bt \ At};
t ← t + 1;
5
6 until converged, i.e., At = At−1 and Bt = Bt−1;
7 return At and Bt as A∗ and B∗;
4
• Pruning phase (Algorithm 1): We develop an iterative
pruning technique to cut the search space.
• Search phase (Algorithms 2 and 3): We use some
heuristics to find the solution in the reduced search space.
A. Prune Search Space
To simplify the notations, we define the marginal gain of
adding a node v to a seed set S for metrics φ, β and γ as
φ(v S) = φ(S ∪ {v}) − φ(S),
β(v S) = β(S ∪ {v}) − β(S),
γ(v S) = γ(S ∪ {v}) − γ(S).
We start by proposing an iterative pruning approach that
can dramatically reduce the search space from the power set
of V to a smaller lattice for maximizing the profit function.
Algorithm 1 shows the pseudo code of the pruning algorithm.
Recall
that by the submodularity of the benefit and cost
metrics, their marginal gains for adding a new seed node
decrease with the base seed set. Thus, the largest possible
benefit (cost) gain is produced by adding a node into an empty
seed set, whereas the smallest possible benefit (cost) gain is
generated by adding the node into an almost universal set. Note
that the marginal profit gain is bounded below by the smallest
benefit gain less the largest cost gain. So, it is intuitive that if
the latter is positive, the node must be selected in an optimal
solution. Similarly, the marginal profit gain is bounded above
by the largest benefit gain less the smallest cost gain. If the
latter is negative, the node cannot be selected in an optimal
solution. Algorithm 1 extends this idea in an iterative manner
to reduce the search space. It is easy to verify that after each
iteration, the newly generated lattice is a sublattice of that
in the previous iteration, i.e., At ⊆ At+1 ⊆ Bt+1 ⊆ Bt.
Furthermore, it can be proved that any seed set outside the
resultant lattice [A∗, B∗] delimited by the node sets A∗ and
B∗ returned by Algorithm 1 can be transformed to a seed set
in [A∗, B∗] with higher profit. The formal proofs of all the
theoretical results in this paper are given in the appendix.
Theorem 1: For any node set S and t ≥ 0, let St = S ∩
Bt ∪ At, it holds that φ(St) ≤ φ(St+1), where the "=" holds
if and only if St = St+1.
the pruning technique can only
Theorem 1 shows that
increase the profit value of the seed set St = S ∩ Bt ∪ At at
every iteration. The following corollary shows how our search
space reduction improves the quality of any solution.
Fig. 1. An example showing the non-monotonicity and non-submodularity
of the profit function φ(·). Each node is associated with a benefit weight b
and a cost weight c.
Our goal is to find a seed set S to maximize the profit φ(S).
By defining w(v) = b(v) − c(v), we can rewrite the profit
metric in (3) as
φ(S) = E(cid:104) (cid:88)
v∈Vg(S)
(cid:0)b(v) − c(v)(cid:1)(cid:105) (cid:44) E(cid:104) (cid:88)
v∈Vg(S)
(cid:105)
w(v)
.
Here, w(v) represents the profit gain of activating a node v. If
the benefit offered by v outweighs its cost, w(v) is positive.
Otherwise, w(v) is negative. Therefore, we can normalize the
benefit and cost weights of each node v by setting ¯b(v) =
(cid:105)
max{0, w(v)} and ¯c(v) = max{0,−w(v)}. Then, the benefit
and cost metrics become
¯b(v)
¯β(S) = E(cid:104) (cid:88)
¯γ(S) = E(cid:104) (cid:88)
(cid:105)
and
¯c(v)
,
,
v∈Vg(S)
v∈Vg(S)
It has been proved that
respectively. We show later that this normalized form can make
the pruning phase of our proposed framework more effective.
the influence function σ(·) is
submodular under many commonly used diffusion models due
to Vg(S) ⊆ Vg(T ) for any S ⊆ T [15]. Similarly, it can
be shown that the benefit and cost metrics defined above are
both submodular under these diffusion models. That is, for
any two seed sets S and T where S ⊆ T and any node
v /∈ T , it holds that β(S ∪{v})− β(S) ≥ β(T ∪{v})− β(T )
and γ(S ∪ {v}) − γ(S) ≥ γ(T ∪ {v}) − γ(T ). Likewise, the
normalized ¯β(·) and ¯γ(·) are also submodular. Although both
the benefit and cost metrics are monotone and submodular, the
profit metric is neither monotone nor submodular (an example
is given in Fig. 1). Thus, the methods used for maximizing
monotone submodular functions would perform poorly for
our profit maximization problem as shall be shown in our
experiments. In the following, we develop heuristic algorithms
to address our profit maximization problem.
Example 1: Fig. 1 gives an example to illustrate that the
profit function φ(·) is neither monotone nor submodular. In
this example, once a node is activated, it will activate all of
its neighbors. It can be seen from the figure that φ(∅) = 0,
φ({v1}) = −1.5, φ({v3}) = −1 and, φ({v1, v3}) = 0.5.
Thus, φ(∅) > φ({v1}) and φ({v1}) < φ({v1, v3}), which
indicates that φ(·) is non-monotone. In addition, we can also
get that φ({v1}) − φ(∅) = −1.5 < φ({v1, v3}) − φ({v3}) =
1.5, which indicates that φ(·) is non-submodular.
IV. TWO-PHASE FRAMEWORK
We propose a general two-phase framework to select seed
nodes for optimizing the profit.
11v1 v2 b=1.5,c=1v3 v4 11b=2,c=1b=3,c=1b=2,c=5Vg(fg)=fg, Á (fg)=0Vg(fv1g)=fv1,v2,v4g, Á (fv1g)=-1.5Vg(fv3g)=fv3,v4g, Á (fv3g)=-1Vg(fv1,v3g)=fv1,v2,v3,v4g, Á (fv1,v3g)=0.53 (v2) = −0.1824 < 0, φ+
A2 = {v3} and B2 = {v1, v2, v3}. At iteration 3, φ−
3 (v1) =
−0.878 < 0, φ−
3 (v1) = 0.5904 > 0,
and φ+
3 (v2) = 1.286 > 0. Thus, both A3 and B3 remain the
same as in the previous iteration. As a result, A∗ = {v3} and
B∗ = {v1, v2, v3} are returned. For a seed set S = {v2, v4} /∈
[A∗, B∗], we have S1 = S ∩ B1 ∪ A1 = {v2, v3, v4} and
S2 = S3 = S ∩ B∗
∪ A∗ = {v2, v3}. Then, it can be obtained
that φ(S) = −2 < φ(S1) = 0 < φ(S2) = 1.68, which
demonstrates Theorem 1 and Corollary 1. Moreover, it is easy
to verify that the optimal seed set S∗ = {v2, v3} belongs to
[A∗, B∗], which confirms Corollary 2.
Finally, it can be shown that normalizing the benefit and
cost weights as described in Section III-B can only increase
the amount of the search space cut by our pruning technique.
Theorem 2: Let ¯A∗ and ¯B∗ be the node sets returned by
Algorithm 1 under the normalized form. Then, A∗
⊆
⊆ B∗.
¯B∗
We shall experimentally evaluate the additional reduction in
⊆ ¯A∗
the search space due to normalization in Section VI.
B. Heuristic Algorithms
We now present some heuristic methods to address the profit
maximization problem since there does not exist any polyno-
mial time algorithm with any polynomial time multiplicative
approximation guarantees unless P=NP [13].
Greedy Algorithm: We apply a simple hill-climbing idea
to optimize the profit function (3). Algorithm 2 describes the
pseudo code. In each iteration, the greedy heuristic adds a new
node u to S that has the largest marginal profit gain φ(u S)
until all the remaining nodes have negative marginal gains.
Algorithm 2: Greedy
1 initialize S ← A∗;
2 while True do
3
4
5
find u ← arg maxv∈B∗\S {φ(v S)};
if φ(u S) ≤ 0 then return S;
S ← S ∪ {u};
Modular-Modular Algorithm: Iyer and Bilmes [13] intro-
duced a modular-modular (ModMod) algorithm for optimizing
the difference between submodular functions. Since we just
need to search the lattice [A∗, B∗] after pruning, we adapt the
ModMod algorithm as shown in Algorithm 3. In line 4 of Al-
gorithm 3, hπ
X t(Y ; β) is a modular lower bound of β(Y ) that
X t(Y ; β) ≤ β(Y ) for any Y ⊆ V and
is tight at set X t, i.e., hπ
X t(X t; β) = β(X t), while mX t(X t; γ) is a modular upper
hπ
bound of γ(Y ) that is also tight at X t, i.e., mX t(Y ; γ) ≥ γ(Y )
the
for any Y ⊆ V and mX t(X t; γ) = γ(X t). Thus,
X t(Y ; β) − mX t(Y ; γ) is a lower bound of the
difference hπ
profit function φ(Y ). The algorithm maximizes the lower
bound in each iteration. Since the lower bound is tight at
Y = X t, it is guaranteed that φ(X t+1) ≥ hπ
X t(X t+1; β) −
X t(X t; β) − mX t(X t; γ) = φ(X t). This
mX t(X t+1; γ) ≥ hπ
indicates that Algorithm 3 always increases the profit value
at every iteration. Examples of the modular upper and lower
bounds will be given in Section V-A.
Fig. 2. An example of iterative pruning under the Independent Cascade
diffusion model. Each node is associated with a benefit weight b and a cost
weight c. Each edge has a propagation probability p.
∪ A∗).
Corollary 1: For any node set S, if S /∈ [A∗, B∗], then
φ(S) < φ(S ∩ B∗
By Corollary 1, the pruning approach can always improve
the quality of any seed set S outside [A∗, B∗] by transforming
it to the seed set S ∩ B∗
∪ A∗ in [A∗, B∗]. Thus, the lattice
[A∗, B∗] retains all the optimal seed sets. As a result, we can
reduce the search space from the lattice [∅, V ] to [A∗, B∗].
Our pruning approach can be used prior to any seed selection
algorithms to improve the solution quality.
Corollary 2: For any seed set S∗ producing the maximum
achievable profit, it holds that A∗
⊆ S∗
⊆ B∗.
Example 2: Fig. 2 gives an example to illustrate how the
pruning algorithm works as well as the above theorem and
corollaries. This example assumes the Independent Cascade
(IC) diffusion model. The IC model is a representative and
most widely-studied diffusion model for influence propagation
[6], [7], [14], [15], [17], [22], [23], [24], [27], [28], [30], [32],
[33], [34]. In the IC model, a propagation probability pu,v is
associated with each edge (cid:104)u, v(cid:105), representing the probability
for v to be activated by u through their connection. In the
diffusion process, when a node u first becomes activated, it
has a chance to activate its neighbors who are not yet activated.
Each such neighbor v would become activated with probability
pu,v. This process repeats until no more node can be activated.
For example, in Fig. 2, when {v1, v3} are selected as seeds, v2
would be activated with probability 0.3. Meanwhile, v4 would
be activated by v1 with probability 0.4, by v2 with probability
0.3×0.2 = 0.06, and by v3 with probability 0.3. Thus, overall,
v4 would be activated with probability 1 − (1 − 0.4) × (1 −
0.06) × (1 − 0.3) = 0.6052.
To conduct iterative pruning, A0 is initialized by ∅ and
B0 is initialized by {v1, v2, v3, v4} respectively. To simplify
the notations, let φ−
t (v) = β(v Bt \ {v}) − γ(v At)
(cid:0)1 × c(v1) + 0.3 ×
and φ+
t (v) = β(v At) − γ(v Bt \ {v}) describe the
c(v2) + (1− (1− 0.4)× (1− 0.3× 0.2))× c(v4)(cid:1) = 1.5− (1 +
calculations in Algorithm 1. At iteration 1, φ−
1 (v1) = β(v1
{v2, v3, v4}) − γ(v1 ∅) = 1 × b(v1) −
0.3 + 2.18) = 1.5 − 3.48 = −1.98 < 0. Similarly, φ−
1 (v2) =
−
1 (v3) = 0.5 > 0, φ−
−0.6 < 0, φ
1 (v4) = −4.328 < 0,
φ+
1 (v1) = 1.972 > 0, φ+
1 (v3) = 2.6 > 0,
and φ+
1 (v4) = 0.32 > 0. Thus, v3 is added to A1 so
that A1 = {v3} and B1 = {v1, v2, v3, v4}. At iteration 2,
φ−
2 (v1) = −1.326 < 0, φ−
2 (v4) =
−2.828 < 0, φ+
2 (v2) = 1.58 > 0, and
2 (v4) = −0.28 < 0. Thus, v4 is removed from B2 so that
φ+
2 (v2) = −0.3 < 0, φ−
2 (v1) = 1.7104 > 0, φ+
1 (v2) = 1.7 > 0, φ+
0.30.3v1 v2 b=1.5,c=1v3 v4 0.40.2b=2,c=1b=3,c=1b=2,c=5PruneInitialization: A0=fg, B0=fv1,v2,v3,v4gIteration 1: A1=fv3g, B1=fv1,v2,v3,v4gIteration 2: A2=fv3g, B2=fv1,v2,v3gIteration 3: A3=fv3g, B3=fv1,v2,v3gConverged, return A*=A3, B*=B3Algorithm 3: Modular-Modular (ModMod)
1 initialize X 0 ← A∗ and t ← 0;
2 repeat
3
choose the permutations of A∗, X t \ A∗, B∗ \ X t and
concatenate them as π;
Xt (Y ; β) − mXt (Y ; γ);
X t+1 ← arg maxA∗⊆Y ⊆B∗ hπ
4
t ← t + 1;
5
6 until converged, i.e., X t = X t−1;
7 return X t;
profit for the problem instance to characterize the gap between
the real profit value φ(So) and the maximum achievable profit.
Note that both φ(So) and µ are to be estimated by sampling.
Let φ(So) and µ be their estimated values. We further study
the sampling errors to bound the difference between φ(So)
and φ(So) and the difference between µ and µ. In this way,
we can obtain an approximation guarantee of So using the
estimated values φ(So) and µ.
A. Upper Bound of Maximum Achievable Profit
C. Discussions
Time Complexity: Evaluating the profit metric involves
estimating the influence spread given a seed set. Any existing
influence estimation methods, such as Monte-Carlo simulation
[15], [17], [24] and reverse influence sampling [2], [22], [23],
[32], [33], can be used. Suppose the time complexity for
computing the marginal profit gain of adding/removing a node
into/from a seed set is O(M ). For the iterative pruning process
(Algorithm 1), the size of the node set Bt\At to check reduces
by at least 1 in each iteration. Therefore, it takes at most
A∗ and B∗. After the reduction of the search space, there are
k1 = B∗
nodes to be further examined. For the Greedy
algorithm, it checks k1− i + 1 nodes in the ith iteration. Thus,
it takes at most O(k2
1M ) time, which means the total time
O(cid:0)(V + V − 1 + ··· + 1)M(cid:1) = O(V 2M ) time to find
complexity of the Greedy algorithm is O(cid:0)(V 2+k2
1)M(cid:1). Each
of the ModMod algorithm is O(cid:0)(V 2 + k1k2)M(cid:1).
iteration of the ModMod algorithm has a time complexity of
O(k1M ). Let k2 denote the total number of iterations used
for the ModMod algorithm. Then, the total time complexity
Diffusion Models: Our analysis and algorithms are general
frameworks that can be adapted to any diffusion models which
are submodular, such as the Independent Cascade and Linear
Threshold models, the triggering model [15], the continuous-
time models [5], [10], and the topic-aware models [1], [4].
\ A∗
V. PERFORMANCE ANALYSIS
The challenges to evaluate the quality of the seed set
constructed for the profit maximization problem are two-
fold. First, optimizing the difference between two submodular
functions is multiplicative inapproximability unless P=NP.
Thus, it is difficult to measure the gap between the seed set
obtained and an optimal seed set. Second, the random pro-
cesses of many diffusion models are analytically intractable.
For example, computing the exact influence spread under the
IC diffusion model is #P-hard [6]. Thus, the benefit brought
and the cost incurred by a seed set can only be estimated via
some sampling approaches [15], [2]. As a result, the sampling
error also affects the quality measurement of the seed set.
We propose techniques to analyze the aforementioned gap
and sampling error, which enable us to evaluate the approxi-
mation guarantee of the seed set obtained by any algorithm on
any given instance of the profit maximization problem. Specifi-
cally, let So be the seed set constructed for a problem instance.
We develop an upper bound µ on the maximum achievable
To derive our bounds on the maximum achievable profit, we
first introduce two modular bounds for submodular functions.
Modular Upper Bounds: For any submodular set function
f (·), we have the following two modular upper bounds m1
and m2
X that are tight at a given set X [13]:
X
m1
m2
X (Y ) (cid:44) f (X) −
X (Y ) (cid:44) f (X) −
f (v V \ {v}) +
f (v X \ {v}) +
(cid:88)
(cid:88)
v∈X\Y
v∈X\Y
(cid:88)
(cid:88)
v∈Y \X
v∈Y \X
f (v X), (4)
(5)
f (v ∅).
m4
m3
v∈X\Y
v∈X\Y
v∈Y \X
\ {v}) +
(cid:88)
(cid:88)
X (Y ) (cid:44) f (X) −
X (Y ) (cid:44) f (X) −
f (v B∗
f (v X \ {v}) +
In the previous section, we have reduced the search space so
that only the sets belonging to [A∗, B∗] need to be considered
⊆ X, Y ⊆ B∗,
for profit maximization. As a result, for any A∗
(cid:88)
the above two upper bounds can be improved to:
(cid:88)
f (v X), (6)
f (v A∗). (7)
X (Y ) remain
It is easy to show that the bounds m3
X (X) = f (X), and they are
tight at X, i.e., m3
tighter than m1
X (Y ) and m2
X (Y ) ≥
X (Y ) ≥ f (Y ) and m2
X (Y ) ≥ f (Y ) for any
m3
A∗
⊆ Y ⊆ B∗.
Modular Lower Bounds: For any submodular set function
f (·), a modular lower bound hX that is tight at a given set X
can be obtained as follows [11]. Let π be any permutation of
V that places all the nodes in X before the nodes in V \ X.
Let Sπ
i = {π(1), π(2),··· , π(i)} be a chain formed by the
permutation, where Sπ
X (Y ) at other sets, i.e., m1
X (Y ) ≥ m4
X (Y ) and m4
X (X) = m4
0 = ∅ and SπX = X. Define
v∈Y \X
i−1).
i ) − f (Sπ
hπ
X (π(i)) = f (Sπ
(8)
Then, hπ
X (v) is a lower bound of f (Y ),
v∈Y hπ
which is tight at X, i.e., hπ
X (Y ) ≤ f (Y ) for any Y ⊆ V
and hπ
X (X) = f (X). After the search space is reduced to
[A∗, B∗], we restrict π to any permutation of V in the order
of A∗, X \ A∗ and B∗
Upper Bounds on Maximum Achievable Profit: Based on
the above bounds, we can derive two series of upper bounds
on the maximum value of the profit function φ(·) as follows.
For any set X where A∗
µi(X) (cid:44) max
⊆ X ⊆ B∗, we define
\ X.
X (Y ; γ),
(9)
A∗⊆Y ⊆B∗mi
X (Y ; β) − hπ
X (Y ) = (cid:80)
where mi
on the benefit function β and hπ
X (Y ; β) (i = 3, 4) denotes the modular upper bound
X (Y ; γ) denotes the modular
lower bound on the cost function γ respectively. For briefness,
we shall use µ(X) to refer to either bound with i = 3 or 4 in
the rest of the paper.
Theorem 3: For any set X where A∗
⊆ X ⊆ B∗,
µ(X) ≥ max
S⊆V
φ(S).
(10)
X (Y ; β) and hπ
The upper bounds established above can be computed very
fast since mi
X (Y ; γ) are both modular functions
with respect to Y . It is much easier to find the maximum value
for a modular function than that for a submodular function. We
can obtain upper bounds by arbitrarily choosing the set X in
µ(X). Given a seed set solution So obtained by any algorithm,
we simply choose X = So. Then, the approximation guarantee
of So can be estimated by φ(So)/µ(So).
B. Sampling Error
Definition 1 (RR Set
To estimate φ(So) and µ(So), we make use of a state-of-
the-art technique called reverse influence sampling [2], [22].
for Weighted Graph): A random
reverse reachable (RR) set R for a weighted graph G is
generated by (1) first selecting a random node v ∈ V with a
probability distribution p(·) proportional to the node weights,
(2) then sampling a graph g randomly from G according to
the diffusion model, (3) finally taking the set of nodes in g
that can reach v as R.
b(v)/Υb, where Υb = b(V ) =(cid:80)
Taking our benefit metric as an example, the probability for
choosing a node v in a random RR set is given by p(v) =
v∈V b(v) is the total benefit
weight of all nodes. For a seed set S, the relation between its
benefit and a random RR set R is β(S) = Υb · Pr[S ∩ R (cid:54)=
∅], where Pr[S ∩ R (cid:54)= ∅] is the probability that R contains
at least one node in S [22]. Similarly, we can estimate the
diffusion cost γ(S) by choosing each node in a random RR
set with a probability proportional to the cost of the node, i.e.,
v∈V c(v) is the total
cost weight of all nodes. Therefore, we generate two groups
of RR sets to estimate the benefit and cost respectively for a
seed set.
p(v) = c(v)/Υc, where Υc = c(V ) =(cid:80)
Suppose that we generate a total of θβ random RR sets to
estimate the benefit brought by a seed set S. An RR set is
said to be covered by S if it contains at least one node in S.
Let Λβ(S) denote the number of RR sets covered by S among
the θβ random RR sets. Then, the benefit brought by S can
be estimated as Λβ(S)· Υb/θβ. To analyze the sampling error,
we make use of the Chernoff-Hoeffding Theorem [8].
Theorem [8]): Let
Z1, Z2, . . . , Zθ denote random variables that are independently
and identically distributed according to Z in the interval [0, 1]
with mean E[Z]. For any fixed θ > 0 and ε > 0,
(Chernoff-Hoeffding
Lemma
1
(cid:35)
(cid:18)
(cid:19)
(cid:34) θ(cid:88)
(cid:34) θ(cid:88)
i=1
i=1
Pr
Pr
Zi − θ · E[Z] ≥ ε
Zi − θ · E[Z] ≤ −ε
≤ exp
(cid:35)
−
(cid:18)
≤ exp
ε2
4(e − 2)θE[Z]
−
4(e − 2)θE[Z]
ε2
,
(cid:19)
.
Based on Lemma 1, we can establish the following relation
Theorem 4: For θβ random RR sets that are independent of
between Λβ(S) and the real benefit β(S).
(cid:34)
S and any δ ∈ (0, 1), we have
(cid:34)
(cid:19)2
Λβ(S) + 0.25a − 0.5√a
(cid:19)2
Λβ(S) + 0.25a + 0.5√a
(cid:18)(cid:113)
(cid:18)(cid:113)
β(S) ≥
Pr
Pr
β(S) ≤
(cid:35)
(cid:35)
Υb
θβ
Υb
θβ
·
·
≥ 1 −
≥ 1 −
δ
2
δ
2
,
,
where a = 4(e − 2) ln(2/δ).
According to Theorem 4, given Λβ(S), we can define a
lower bound and an upper bound of β(S) with a probability
at least 1 − δ/2 as
βl(S) (cid:44)(cid:16)(cid:112)Λβ(S) + 0.25a − 0.5√a
(cid:17)2
βu(S) (cid:44)(cid:16)(cid:112)Λβ(S) + 0.25a + 0.5√a
(cid:17)2
· Υb/θβ,
· Υb/θβ.
(11)
∨
The above analysis can also be applied to the estimation
of the cost. Let θγ denote the number of random RR sets
generated to estimate the cost incurred by a seed set S. Let
Λγ(S) denote the number of RR sets covered by S among
the θγ random RR sets. Then, the cost incurred by S can
be estimated as Λγ(S) · Υc/θγ. We can similarly define a
lower bound γl(S) and an upper bound γu(S) on the real
cost γ(S) with a probability at least 1 − δ/2. Then, given a
seed set solution So obtained by any algorithm, we can derive
a lower bound βl(So) − γu(So) on its real profit φ(So) such
∧
that Pr[φ(So) ≥ βl(So)− γu(So)] ≥ Pr(cid:2)(cid:0)β(So) ≥ βl(So)(cid:1)
(cid:0)γ(So) ≤ γu(So)(cid:1)(cid:3) = 1− Pr(cid:2)(cid:0)β(So) < βl(So)(cid:1)
(cid:0)γ(So) >
γu(So)(cid:1)(cid:3)
≥ 1 − (δ/2 + δ/2) > 1 − δ.
The difficulty in analyzing the sampling error for the upper
bound µ(So) of the maximum achievable profit lies in that we
can never find a specific seed set to achieve the upper bound.
From Theorem 4, we know that the profit of any seed set S is
bounded above by βu(S) − γl(S) with a high probability. By
definition, βu(S) − γl(S) is a function of Λβ(S) and Λγ(S).
Let φ(S) be the estimated profit of S on the RR sets generated,
which is defined by φ(S) = Λβ(S) · Υb/θβ − Λγ(S) · Υc/θγ.
Then, βu(S) − γl(S) can be represented as a function η of
Λβ(S) and φ(S), i.e., η(cid:0)Λβ(S), φ(S)(cid:1). We can prove that
η(cid:0)Λβ(S), φ(S)(cid:1) is increasing with both Λβ(S) and φ(S).
Naturally, Λβ(S) is bounded above by θβ. On the other
hand, thanks to the submodularity of the set coverage used to
estimate the benefit and cost metrics in the reverse influence
sampling approach, we can easily get the estimated upper
bound µ(So) on the maximum achievable profit from the RR
sets generated according to the analysis in Section V-A. As a
result, for any seed set S, the upper bound η(cid:0)Λβ(S), φ(S)(cid:1)
of its profit is bounded above by η(cid:0)θβ, µ(So)(cid:1). In this way,
we can obtain the sampling error for the upper bound µ(So).
(cid:20)
Theorem 5: For any δ ∈ (0, 1), we have
φ(S) ≤ µ(So) + ε(cid:0)µ(So)(cid:1)(cid:21)
Pr
max
S⊆V
≥ 1 − δ,
(12)
where ε(cid:0)µ(So)(cid:1) is the sampling error
that ε(cid:0)µ(So)(cid:1) = ργ
(cid:114)
(cid:16)(cid:0)ρβθβ − µ(So)(cid:1)/ργ + 0.25a
(cid:17)
(cid:112)a(θβ + 0.25a), and ρβ = Υb/θβ and
for µ(So) such
+
a
By Theorems 4 and 5, we have the approximation guarantee
0.5a(ρβ − ργ) + ρβ
ργ = Υc/θγ.
that
φ(So)
maxS⊆V φ(S) ≥
µ(So) + ε(cid:0)µ(So)(cid:1)
βl(So) − γu(So)
(13)
with a probability at least 1 − 2δ.
C. Reduce Sampling Error via Normalization
ples conducted by the weights (cid:80)
As discussed in Section III-B, we can normalize the benefit
and cost weights by ¯b(v) and ¯c(v) for every node v ∈ V .
the normalization can avoid unnecessary sam-
Intuitively,
v∈V min{b(v), c(v)} for
the estimations of both the benefit and cost. Therefore, the
normalization can reduce the sampling error by increasing the
number of useful samples.
Theorem 6: For any seed set S and a fixed number of
samples, let εφ be the sampling error limit that can provide a
probability guarantee of 1− δ, i.e., Pr[−εφ ≤ φ(S)− φ(S) ≤
εφ] ≥ 1 − δ, and let ¯εφ be the sampling error limit under the
normalized form. We have ¯εφ ≤ εφ.
Theorem 6 indicates that the normalization can improve the
solution quality which shall be demonstrated in the experi-
ments.
VI. EVALUATION
A. Experimental Setup
Datasets. We use several real social networks available
at [18] to evaluate our proposed techniques. Due to space
limitations, we report here the results for two representative
datasets, Google+ (108K nodes, 14M edges), and LiveJournal
(5M nodes, 69M edges).
Algorithms. Recall that the ModMod algorithm needs a
modular lower bound of the benefit function β(·) and a
modular upper bound of the cost function γ(·). In Section V-A,
we have presented one such lower bound and two such upper
bounds. We use ModMod-1 to refer to that using the upper
X (Y ) defined in Eq. (6) and use ModMod-2 to refer
bound m3
to that using the upper bound m4
X (Y ) defined in Eq. (7). We
compare our two-phase methods with the following baselines.
• Random: It randomly selects k nodes. We run the algo-
rithm 10 times and take their average as the expected
profit.
• HighDegree: It selects k nodes with the highest degrees.
• BenefitMax: It makes use of the reverse influence sam-
pling technique to find the top-k influential nodes for
influence/benefit maximization [2], [22], [23], [32], [33].
The above baselines are executed on the entire social networks
without applying any pruning technique. To explore different
V
2i for
seed numbers, in each baseline, we iterate through k =
i = 0, 1, . . . , 10 (where V is the network size) and choose
the k value producing the largest profit.
Parameter Settings. By default, we use the IC diffusion
model (as described in Example 2 of Section IV-A), a uniform
benefit distribution (where every node has a unit benefit to
model the commission paid by the advertiser for each user
activated), and a degree-proportional cost distribution (where
the cost of each node is set proportional to its out-degree to
emulate the diffusion cost for each activated user to push the
product advertisement to all of his neighbors). In the IC model,
we set the propagation probability pu,v of each edge (cid:104)u, v(cid:105)
to the reciprocal of v's in-degree (the number of v's inverse
neighbors) as widely adopted by other studies [6], [14], [22],
[23], [32], [33].
By default, we normalize the benefit and cost weights as
described in Section III-B. We use a scale factor r to control
the ratio between the total cost and total benefit of all nodes.
A higher r implies a higher cost of influence propagation
relative to the benefit of influence spread. The default value
of r is set to 1. We have tested a wide range of r values and
observed similar performance trends. In executing our two-
phase methods and the baseline BenefitMax algorithm, we
vary the number of RR sets generated to study the impact of
benefit and cost estimations. To evaluate the profits of the seed
sets returned by different algorithms, we generate a group of
validation RR sets to keep the estimation errors within 1% with
a high probability at least 1 − 10−6 according to Theorem 4.
B. Profits Produced by Different Algorithms
Fig. 3 shows the profits produced by different algorithms.
Comparing the seed selection algorithms, our heuristic algo-
rithms are more effective in optimizing the profit than the three
baseline algorithms (Random, HighDegree and BenefitMax)
on the datasets tested. This suggests that improving the influ-
ence spread or benefit alone is not effective for maximizing
the profit. Our three heuristic algorithms perform quite close
in terms of the profit produced. It can also be seen that with
increasing number of RR sets generated for profit estimation in
the seed selection process, the solution quality of our heuristics
is improved due to lower estimation errors.
C. Running Times of Different Algorithms
Fig. 4 shows the running times of different algorithms. The
algorithms are all implemented in C++ and the experiments are
carried out on a machine with an Intel Xeon E5-1650 3.2GHz
CPU and 16GB memory. The time spent for generating RR
sets is common to all our heuristics as well as BenefitMax. We
plot it as a separate curve and exclude it from the running times
of all the algorithms in Fig. 4. It can be seen that generating the
RR sets takes significant time. The Random and HighDegree
algorithms do not need benefit and cost estimations. Thus,
their running times are independent of the number of RR sets.
The other four methods have running times increasing almost
linearly with the number of RR sets (note that both axes are
in logscale). In most cases, our heuristic methods complete
execution within 100 seconds even for the LiveJournal dataset
with millions of nodes. This shows the efficiency of our two-
phase algorithms.
(a) Google+
(b) LiveJournal
(a) Google+
(b) LiveJournal
Fig. 3. Profits produced by different algorithms.
Fig. 4. Running times of different algorithms.
(a) Google+
(b) LiveJournal
(c) Google+
(d) LiveJournal
Fig. 5.
Impact of iterative pruning technique (algorithms with prefix "O-" do not use pruning technique).
TABLE I
A∗
SEARCH SPACE REDUCTION.
V
B∗
108K 80.6K 82.4K
5M 2.5M 3.3M
Dataset
Google+
LiveJournal
B∗ \ A∗ Reduction
98.3%
83.7%
1.8K
0.8M
APPROXIMATION GUARANTEE OF SEED SETS OBTAINED.
TABLE II
Dataset
Google+
LiveJournal
Greedy ModMod-1 ModMod-2
98.7%
72.9%
98.8%
75.8%
98.6%
74.3%
(a) With Normalization
Dataset
Google+
LiveJournal
A∗
V
B∗
108K 62.2K 97.1K
5M 1.3M 4.3M
B∗ \ A∗ Reduction
34.9K
67.6%
3.0M
38.3%
(b) Without Normalization
D. Iterative Pruning Technique
Table I shows the amount of search space reduction by the
iterative pruning technique proposed in Section IV-A. These
results are for the experiments with 210 × 10, 000 RR sets
generated. As can be seen, the pruning technique substantially
reduces the number of nodes that need to be considered for
seed selection. Specifically, the search space is reduced by
98.3% and 83.7% of the original network size for the Google+
and LiveJournal datasets respectively when the normalization
is applied. On the other hand, the reduction is much less
when the normalization is not applied (67.6% and 38.3%
for the Google+ and LiveJournal datasets respectively). This
observation confirms Theorem 2.
Fig. 5 shows the impact of the search space reduction on
the profit produced and the running time of our heuristics,
where O-X refers to heuristic X without the search space
reduction. As claimed in Corollary 1, the pruning technique
can help improve all the heuristic algorithms in terms of the
profit produced. This is confirmed by the experimental results.
For the LiveJournal dataset (Fig. 5(b)), the Greedy algorithm
even produces negative profit without pruning the search space
first, and the pruning technique can bring improvements up
to 24.1% and 14.3% for the ModMod-1 and ModMod-2
algorithms respectively. Furthermore, the pruning technique
can also help reduce the running time considerably. By pruning
the search space first, our heuristic algorithms can run up to 3
orders faster. These observations demonstrate the effectiveness
of our pruning technique.
E. Guarantee of Solution Quality
We evaluate the quality of the seed sets returned by different
algorithms using the techniques presented in Section V. In
our evaluation, we always choose the tighter bound between
µ3(X) and µ4(X) as defined in (9). We set δ = 10−6
so that the approximation guarantees obtained by (13) have
high confidence. Table II shows the approximation guarantees
derived for the seed sets constructed with 210 × 10, 000 RR
sets generated. As can be seen, the seed sets constructed by
our algorithms have approximation guarantees above 98% and
70% for the Google+ and LiveJournal datasets respectively.
This implies that (i) our proposed upper bounds on the
maximum achievable profit are quite tight, and (ii) the heuristic
algorithms perform rather close to the optimal.
F. Normalization
In Section VI-D, we have shown that the normalization
can increase the amount of search space reduction by the
pruning technique. Now, we further evaluate the impact of
normalization on the profit. Fig. 6 shows the profit produced by
RandomHighDegreeBenefitMaxGreedyModMod-1ModMod-2GenSample20212223242526272829210No.ofRRsetsamples(×10,000)-101234567Profit1e420212223242526272829210No.ofRRsetsamples(×10,000)-0.50.00.51.01.52.0Profit1e620212223242526272829210No.ofRRsetsamples(×10,000)10−310−210−1100101102Runningtime(seconds)20212223242526272829210No.ofRRsetsamples(×10,000)10−1100101102103104Runningtime(seconds)O-GreedyO-ModMod-1O-ModMod-2GreedyModMod-1ModMod-2GenSample20212223242526272829210No.ofRRsetsamples(×10,000)01234567Profit1e420212223242526272829210No.ofRRsetsamples(×10,000)-0.50.00.51.01.52.0Profit1e620212223242526272829210No.ofRRsetsamples(×10,000)10−310−210−1100101102Runningtime(seconds)20212223242526272829210No.ofRRsetsamples(×10,000)10−1100101102103104105Runningtime(seconds)[9] P. Domingos and M. Richardson, "Mining the network value of cus-
tomers," in Proc. ACM KDD, 2001, pp. 57–66.
[10] N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha, "Scalable influence
estimation in continuous-time diffusion networks," in Proc. NIPS, 2013,
pp. 3147–3155.
[11] S. Fujishige, Submodular Functions and Optimization. Elsevier Sci-
ence, 2005, vol. 58.
[12] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan, "A data-based approach
to social influence maximization," Proc. VLDB Endowment, vol. 5, no. 1,
pp. 73–84, 2011.
[13] R. Iyer and J. Bilmes, "Algorithms for approximate minimization of the
difference between submodular functions, with applications," in Proc.
UAI, 2012, pp. 407–417.
[14] K. Jung, W. Heo, and W. Chen, "IRIE: Scalable and robust influence
maximization in social networks," in Proc. IEEE ICDM, 2012, pp. 918–
923.
[15] D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the spread of
influence through a social network," in Proc. ACM KDD, 2003, pp.
137–146.
[16] A. Khan, B. Zehnder, and D. Kossmann, "Revenue maximization by
viral marketing: A social network host's perspective," in Proc. IEEE
ICDE, 2016.
[17] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and
N. Glance, "Cost-effective outbreak detection in networks," in Proc.
ACM KDD, 2007, pp. 420–429.
[18] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network
dataset collection," http://snap.stanford.edu/data, 2014.
[19] W. Lu and L. V. Lakshmanan, "Profit maximization over social net-
works," in Proc. IEEE ICDM, 2012, pp. 479–488.
[20] A. Meyer, "Viral video marketing: What's, why's & how's of going vi-
ral," http://www.marketergizmo.com/viral-video-marketing-cats-babies-
and-your-company/, 2015.
[21] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, "An analysis of ap-
proximations for maximizing submodular set functions-I," Mathematical
Programming, vol. 14, no. 1, pp. 265–294, 1978.
[22] H. T. Nguyen, T. N. Dinh, and M. T. Thai, "Cost-aware targeted viral
marketing in billion-scale networks," in Proc. IEEE INFOCOM, 2016.
[23] H. T. Nguyen, M. T. Thai, and T. N. Dinh, "Stop-and-stare: Optimal
sampling algorithms for viral marketing in billion-scale networks," in
Proc. ACM SIGMOD, 2016, pp. 695–710.
[24] N. Ohsaka, T. Akiba, Y. Yoshida, and K. Kawarabayashi, "Fast and
accurate influence maximization on large networks with pruned monte-
carlo simulations," in Proc. AAAI, 2014, pp. 138–144.
[25] J. J. Roberts, "Facebook and Google are big winners as political ad
money moves online," Fortune, 2016.
[26] M. G. Rodriguez, D. Balduzzi, and B. Scholkopf, "Uncovering the
temporal dynamics of diffusion networks," in Proc. ICML, 2011, pp.
561–568.
[27] G. Song, X. Zhou, Y. Wang, and K. Xie, "Influence maximization on
large-scale mobile social network: A divide-and-conquer method," IEEE
Trans. Parallel and Distributed Systems, vol. 26, no. 5, pp. 1379–1392,
2015.
[28] J. Tang, X. Tang, X. Xiao, and J. Yuan, "Online processing algorithms
for influence maximization," in Proc. ACM SIGMOD, 2018.
[29] J. Tang, X. Tang, and J. Yuan, "Profit maximization for viral marketing
in online social networks," in Proc. IEEE ICNP, 2016, pp. 1–10.
[30] J. Tang, X. Tang, and J. Yuan, "Influence maximization meets effi-
ciency and effectiveness: A hop-based approach," in Proc. IEEE/ACM
ASONAM, 2017, pp. 64–71.
[31] J. Tang, X. Tang, and J. Yuan, "Profit maximization for viral marketing
in online social networks: Algorithms and analysis," IEEE Transactions
on Knowledge and Data Engineering, 2018.
[32] Y. Tang, Y. Shi, and X. Xiao, "Influence maximization in near-linear
time: A martingale approach," in Proc. ACM SIGMOD, 2015, pp. 1539–
1554.
[33] Y. Tang, X. Xiao, and Y. Shi, "Influence maximization: Near-optimal
time complexity meets practical efficiency," in Proc. ACM SIGMOD,
2014, pp. 75–86.
[34] C. Zhou, P. Zhang, J. Guo, X. Zhu, and L. Guo, "UBLF: An upper
bound based approach to discover influential nodes in social networks,"
in Proc. IEEE ICDM, 2013, pp. 907–916.
[35] Y. Zhu, Z. Lu, Y. Bi, W. Wu, Y. Jiang, and D. Li, "Influence and profit:
Two sides of the coin," in Proc. IEEE ICDM, 2013, pp. 1301–1306.
(a) Google+
(b) LiveJournal
Fig. 6.
pruning technique and with postfix "-w/o" are without normalization).
Impact of normalization (algorithms with prefix "O-" do not use
the Greedy algorithm with and without the normalization. The
results for the ModMod algorithms are similar. As can be seen,
no matter whether the pruning technique is used, the Greedy
algorithm with normalization can always produce higher profit
than that without normalization. This confirms Theorem 6 that
the normalization can reduce the sampling error limit and thus,
it can further improve the solution quality.
VII. CONCLUSION
In this paper, we have studied a profit maximization problem
for OSN providers conducting viral marketing. The objective
is to select initial seed nodes to maximize the total profit
that accounts for both the benefit of influence spread and
the cost of influence propagation. We have proposed a two-
phase framework that first reduces the search space via an
iterative pruning technique and then finds the solution via some
heuristic algorithms. We have presented several bounds to
measure the quality of the solution obtained by any algorithm.
Experimental results with real OSN datasets demonstrate the
effectiveness and efficiency of our techniques, and show the
tightness of our derived upper bounds.
ACKNOWLEDGMENT
This research is supported by Singapore Ministry of Edu-
cation Academic Research Fund Tier 1 under Grant 2017-T1-
002-024 and Tier 2 under Grant MOE2015-T2-2-114.
REFERENCES
[1] N. Barbieri, F. Bonchi, and G. Manco, "Topic-aware social influence
propagation models," in Proc. IEEE ICDM, 2012, pp. 81–90.
[2] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier, "Maximizing social
influence in nearly optimal time," in Proc. SODA, 2014, pp. 946–957.
[3] P. Chalermsook, A. Das Sarma, A. Lall, and D. Nanongkai, "Social
network monetization via sponsored viral marketing," in Proc. ACM
SIGMETRICS, 2015, pp. 259–270.
[4] S. Chen, J. Fan, G. Li, J. Feng, K.-L. Tan, and J. Tang, "Online topic-
aware influence maximization," Proc. VLDB Endowment, vol. 8, no. 6,
pp. 666–677, 2015.
[5] W. Chen, W. Lu, and N. Zhang, "Time-critical influence maximization
in social networks with time-delayed diffusion process," in Proc. AAAI,
2012, pp. 592–598.
[6] W. Chen, C. Wang, and Y. Wang, "Scalable influence maximization for
prevalent viral marketing in large-scale social networks," in Proc. ACM
KDD, 2010, pp. 1029–1038.
[7] W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in
social networks," in Proc. ACM KDD, 2009, pp. 199–208.
[8] P. Dagum, R. Karp, M. Luby, and S. Ross, "An optimal algorithm for
monte carlo estimation," SIAM Journal on Computing, vol. 29, no. 5,
pp. 1484–1496, 2000.
O-Greedy-w/oO-GreedyGreedy-w/oGreedy20212223242526272829210No.ofRRsetsamples(×10,000)-10123456Profit1e420212223242526272829210No.ofRRsetsamples(×10,000)-0.50.00.51.01.52.0Profit1e6APPENDIX
Lemma 2: At ⊆ At+1 ⊆ Bt+1 ⊆ Bt for any t ≥ 0.
Proof of Lemma 2: By the definitions in lines 3 and 4
of Algorithm 1, At gradually expands over iterations and Bt
gradually shrinks, i.e., At ⊆ At+1 and Bt+1 ⊆ Bt. What is
left is to show that At is always a subset of Bt. We prove it
by induction. Obviously, A0 = ∅ ⊆ V = B0. Suppose that
At ⊆ Bt holds for some t ≥ 0. Then, we can easily get that
At ⊆ Bt+1 by the definition in line 4 of Algorithm 1 and that
At+1 ⊆ Bt by the definition in line 3 of Algorithm 1. On the
other hand, for any node v ∈ Bt \ At, it is obvious that At ⊆
Bt\{v}. Thus, for any node v ∈ At+1\At ⊆ Bt\At, we have
β(v At)− γ(v Bt\{v}) ≥ β(v Bt\{v})− γ(v At) > 0,
where the first inequality is due to the submodularity of β(·)
and γ(·) and the second inequality is by the definition of At+1
in line 3 of Algorithm 1. It indicates that v ∈ Bt+1 as well.
Therefore, At+1 \ At ⊆ Bt+1, which implies At+1 ⊆ Bt+1
since we already know that At ⊆ Bt+1. Thus, we can conclude
that At+1 ⊆ Bt+1.
Proof of Theorem 1: By the definition of St, we easily
have At ⊆ St ⊆ Bt. We already know that At ⊆ At+1 ⊆
Bt+1 ⊆ Bt by Lemma 2. Thus,
St+1 = S ∩ Bt+1 ∪ At+1
(cid:0)Bt \ (Bt \ Bt+1)(cid:1)
(cid:0)S ∩ (Bt \ Bt+1)(cid:1)
∪ At+1
∪ At+1
= S ∩
= S ∩ Bt \
= S ∩ Bt ∪ At+1 \
= S ∩ Bt ∪ At+1 \
= S ∩ Bt ∪ At ∪ (At+1 \ At) \
= St ∪ (At+1 \ At) \
(cid:0)S ∩ (Bt \ Bt+1) \ At+1
(cid:0)S ∩ (Bt \ Bt+1)(cid:1)
(cid:0)S ∩ (Bt \ Bt+1)(cid:1).
(cid:1)
(cid:0)S ∩ (Bt \ Bt+1)(cid:1)
(14)
By line 3 of Algorithm 1, for any node v ∈ At+1 \ At, it
holds that β(v Bt \ {v}) − γ(v At) > 0. Then, for any
St ⊆ T ⊆ St∪(At+1\At), since At ⊆ T and T ⊆ Bt\{v}, we
have φ(v T ) = β(v T )−γ(v T ) ≥ β(v Bt\{v})−γ(v
At) > 0 due to the submodularity. Let v1, v2, . . . , vk be the
set of nodes in At+1 \ At \ St. It follows that
φ(St) < φ(St ∪ {v1})
< φ(St ∪ {v1, v2})
< ···
< φ(St ∪ {v1, v2, . . . , vk})
= φ(cid:0)St ∪ (At+1 \ At \ St)(cid:1)
= φ(cid:0)St ∪ (At+1 \ At)(cid:1).
(cid:0)S∩(Bt\Bt+1)(cid:1)
Similarly, by line 4 of Algorithm 1, for any node v ∈ Bt \
Bt+1, it holds that β(v At)− γ(v Bt \{v}) < 0. Then, for
any St∪(At+1\At)\
⊆ T ⊆ St∪(At+1\At),
since At ⊆ T and T ⊆ Bt \ {v}, we have φ(v T ) = β(v
T ) − γ(v T ) ≤ β(v At) − γ(v Bt \ {v}) < 0 due to
the submodularity. Let u1, u2,··· , ul be the set of nodes in
S ∩ (Bt \ Bt+1). It follows that
φ(St ∪ (At+1 \ At))
< φ(St ∪ (At+1 \ At) \ {u1})
< φ(St ∪ (At+1 \ At) \ {u1, u2})
< ···
< φ(St ∪ (At+1 \ At) \ {u1, u2, . . . , ul})
= φ
(cid:0)S ∩ (Bt \ Bt+1)(cid:1)(cid:17)
St ∪ (At+1 \ At) \
(cid:16)
= φ(St+1),
where the last equality is due to (14). Therefore, φ(St) <
φ(St+1) if At+1 \ At \ St (cid:54)= ∅ or S ∩ (Bt \ Bt+1) (cid:54)= ∅. On the
other hand, if At+1 \ At \ St = S ∩ (Bt \ Bt+1) = ∅, based
on (14), we have St = St+1.
Proof of Corollary 1: According to Theorem 1, φ(S) =
φ(S0) ≤ φ(S1) ≤ ··· ≤ φ(S ∩ B∗
∪ A∗) since S = S ∩
B0 ∪ A0 = S0. On the other hand, if every "=" holds, we
have S = S0 = S1 = ··· = S ∩ B∗
∪ A∗, which implies
⊆ S ⊆ B∗. This is contradictory to S /∈ [A∗, B∗]. Thus,
A∗
it holds that φ(S) < φ(S ∩ B∗
∪ A∗).
Suppose S∗ /∈ [A∗, B∗]. By
∪ A∗). This
Corollary 1, we have φ(S∗) < φ(S∗
is contradictory to the fact that S∗ produces the maximum
⊆ B∗.
achievable profit. Thus, it holds that A∗
(cid:105)
Proof of Theorem 2: Let α(S) denote the overlapping
value between the benefit of influence spread and the cost of
influence propagation for a seed set S, which is defined as
α(S) = E(cid:104) (cid:88)
∩ B∗
⊆ S∗
Proof of Corollary 2:
.
min{b(v), c(v)}
v∈VX (S)
It is easy to verify that α(·) is also submodular and monotone.
By the definition of normalization in Section III-B, we have
β(S) = ¯β(S) + α(S) and γ(S) = ¯γ(S) + α(S). We prove that
At ⊆ ¯At ⊆ ¯Bt ⊆ Bt for any t ≥ 0 by induction. Obviously,
it holds that ∅ = A0 = ¯A0 ⊆ ¯B0 = B0 = V . Suppose that
At ⊆ ¯At ⊆ ¯Bt ⊆ Bt holds for some t ≥ 0.
Then, for any node v ∈ Bt \ ¯Bt, we have β(v Bt \{v})−
γ(v At) = ¯β(v Bt\{v})−¯γ(v At)+α(v Bt\{v})−α(v
At) ≤ ¯β(v Bt \ {v}) − ¯γ(v At) ≤ ¯β(v ¯Bt \ {v}) − ¯γ(v
¯At), where the inequalities are due to the submodularity of
α(·), ¯β(·) and ¯γ(·). By Lemma 2, ¯At−1 ⊆ ¯At ⊆ ¯Bt−1 =
¯Bt−1 \{v} ⊆ ¯Bt \{v}. It follows from the submodularity that
¯β(v ¯Bt \ {v}) − ¯γ(v ¯At) ≤ ¯β(v ¯At−1) − ¯γ(v ¯Bt−1 \
{v}) < 0, where the last inequality is due to v /∈ ¯Bt. This
implies that (At+1\At)∩(Bt\ ¯Bt) = ∅. Since At+1\At ⊆ Bt,
we have At+1 \ At ⊆ ¯Bt. Since At ⊆ ¯Bt, it follows that
At+1 ⊆ ¯Bt. Thus, for any node v ∈ At+1 \ ¯At ⊆ ¯Bt \ ¯At, we
have ¯β(v ¯Bt \ {v}) − ¯γ(v ¯At) ≥ ¯β(v Bt \ {v}) − ¯γ(v
At) = β(v Bt \ {v}) − γ(v At) − α(v Bt \ {v}) + α(v
At) ≥ β(v Bt \ {v}) − γ(v At) > 0, where the first two
inequalities are due to the submodularity and the last inequality
is due to v ∈ At+1. This implies that At+1\ ¯At ⊆ ¯At+1. Since
¯At ⊆ ¯At+1, it follows that At+1 ⊆ ¯At+1.
Similarly, for any node v ∈ ¯At \ At, we have β(v At) −
γ(v Bt \ {v}) = ¯β(v At) − ¯γ(v Bt \ {v}) + α(v
At) − α(v Bt \ {v}) ≥ ¯β(v At) − ¯γ(v Bt \ {v}) ≥ ¯β(v
¯At)− ¯γ(v ¯Bt \{v}) ≥ ¯β(v ¯Bt−1 \{v})− ¯γ(v ¯At−1) > 0,
where the first three inequalities are due to the submodularity
of α(·), ¯β(·) and ¯γ(·), and the last inequality is due to v ∈ ¯At.
This implies that ¯At \ At ⊆ Bt+1. Since At ⊆ At+1 ⊆ Bt+1,
it follows that ¯At ⊆ Bt+1. Thus, for any node v ∈ ¯Bt\Bt+1 ⊆
¯Bt\ ¯At, we have ¯β(v ¯At)−¯γ(v ¯Bt\{v}) ≤ ¯β(v At)−¯γ(v
Bt \ {v}) = β(v At) − γ(v Bt \ {v}) − α(v At) + α(v
Bt\{v}) ≤ β(v At)−γ(v Bt\{v}) < 0, where the first two
inequalities are due to the submodularity and the last inequality
is due to v /∈ Bt+1. This implies that ¯Bt+1 ∩ ( ¯Bt \ Bt+1) = ∅.
Since ¯Bt+1 ⊆ ¯Bt, it follows that ¯Bt+1 ⊆ Bt+1. By induction,
we have At ⊆ ¯At ⊆ ¯Bt ⊆ Bt for any t ≥ 0 (it also holds
after converged) and thus, A∗
Proof of Theorem 3: Let S∗ be an optimal seed set
producing the maximum achievable profit. We can directly
X (S∗; γ) ≥ β(S∗) −
obtain that µi(X) ≥ mi
γ(S∗) = φ(S∗), where the first inequality is by the definition
of µi(X) and the second inequality is due to the modular
upper and lower bounds.
X (S∗; β) − hπ∗
⊆ B∗.
⊆ ¯B∗
⊆ ¯A∗
Proof of Theorem 4: Let λβ(S) be the expected fraction
of samples covered by the seed set S. We have λβ(S) =
β(S)/B. To simplify the notation, we omit
the common
symbol S in what follows, e.g., β represents β(S) and Λβ
represents Λβ(S). Then, the inequalities to prove are equiva-
lent to
(cid:20)
(cid:20)
and
Pr
Pr
We prove the former first. In fact,
≤ δ/2,
≤ δ/2.
(cid:21)
(cid:21)
/θβ
/θβ
(cid:17)2
(cid:16)(cid:112)Λβ + 0.25a − 0.5√a
(cid:17)2
(cid:16)(cid:112)Λβ + 0.25a + 0.5√a
(cid:21)
(cid:17)2
(cid:16)(cid:112)Λβ + 0.25a − 0.5√a
(cid:104)(cid:112)λβθβ <(cid:112)Λβ + 0.25a − 0.5√a
(cid:105)
(cid:20)(cid:16)(cid:112)λβθβ + 0.5√a
(cid:17)2
(cid:105)
(cid:104)
Λβ − λβθβ >(cid:112)aλβθβ
(cid:18)
(cid:19)
/θβ
< Λβ + 0.25a
aλβθβ
(cid:21)
λβ <
λβ >
(cid:20)
= Pr
= Pr
= Pr
Pr
λβ <
−
≤ exp
= δ/2,
4(e − 2)λβθβ
where the inequality is due to Lemma 1.
The proof of the latter is analogous.
(cid:20)
Pr
λβ >
= Pr
= Pr
= Pr
≤ exp
= δ/2
/θβ
(cid:21)
(cid:17)2
(cid:16)(cid:112)Λβ + 0.25a + 0.5√a
(cid:104)(cid:112)λβθβ >(cid:112)Λβ + 0.25a + 0.5√a
(cid:105)
(cid:20)(cid:16)(cid:112)λβθβ − 0.5√a
(cid:17)2
(cid:104)
(cid:112)aλβθβ
(cid:18)
(cid:19)
> Λβ + 0.25a
(cid:105)
Λβ − λβθβ < −
−
4(e − 2)λβθβ
aλβθβ
(cid:21)
Hence, the theorem is proven.
Proof of Theorem 5:
Imagine that we evaluate S∗ with
(cid:17)
(cid:19)
(cid:16)
(cid:18) δ
the benefit and cost samples. By Theorem 4, we know that
≥ Pr(cid:2)(cid:0)β(S∗) ≤ βu(S∗)(cid:1)
Pr [φ(S∗) ≤ βu(S∗) − γl(S∗)]
∧
(cid:0)γ(S∗) ≥ γl(S∗)(cid:1)(cid:3)
2
+
δ
2
Pr [β(S∗) > βu(S∗)] + Pr [γ(S∗) < γl(S∗)]
≥ 1 −
≥ 1 −
(15)
= 1 − δ.
However, without knowing S∗, βu(S∗) and γl(S∗) cannot
be obtained. In what follows, we are going to bound βu(S∗)−
γl(S∗) by an upper bound on the function η(S) = βu(S) −
γl(S). To simplify the notations, and we omit the common
symbol S in what follows, e.g., η represents η(S). Then, the
estimated profit φ = ρβΛβ − ργΛγ. Consider η as a function
of φ and Λβ. We study the monotonicity of η with respect to
φ and Λβ. By the definition of η, we have
η(Λβ, φ) = ρβ
(cid:18)
Λβ +
a(Λβ + 0.25a) + 0.5a
(cid:19)
(cid:113)
(cid:18)
(cid:113)
(cid:113)
a(cid:0)(ρβΛβ − φ)/ργ + 0.25a(cid:1)
a(Λγ + 0.25a) + 0.5a
Λγ −
(cid:19)
− ργ
= φ + ργ
a(Λβ + 0.25a).
+ 0.5a(ρβ − ργ) + ρβ
(cid:113)
(cid:17)2
(cid:16)(cid:112)Λβ + 0.25a + 0.5√a
(cid:17)2
(cid:16)(cid:112)Λγ + 0.25a − 0.5√a
(cid:16)(cid:112)Λβ + 0.25a + 0.5√a
(cid:17)2
(cid:18)(cid:113)
− ργ
= ρβ
− ργ
(cid:19)2
(ρβΛβ − φ)/ργ + 0.25a − 0.5√a
,
which is increasing with Λβ under any given φ. Meanwhile,
we also have
η(Λβ, φ) = ρβ
which is increasing with φ under any given Λβ.
For an estimated upper bound µ(So) on the maximum
achievable profit, we have φ(S∗) ≤ µ(So). On the other hand,
it naturally holds that Λβ(S∗) ≤ θβ. Thus,
= η(cid:0)Λβ(S∗), φ(S∗)(cid:1)
βu(S∗) − γl(S∗)
≤ η(cid:0)θβ, µ(So)(cid:1)
(cid:114)
= µ(So) + ργ
a
(cid:17)
(cid:16)(cid:0)ρβθβ − µ(So)(cid:1)/ργ + 0.25a
(cid:113)
a(θβ + 0.25a).
+ 0.5a(ρβ − ργ) + ρβ
Hence, the theorem is proven.
Proof of Theorem 6: Consider the sampling error limit
ε under θ samples that can provide a probability guarantee of
1 − δ, i.e., Pr[−ε ≤ Λ − λθ ≤ ε] ≥ 1 − δ (where λ is the
expected value of the random variable and Λ is the sum of θ
samples). According to Lemma 1, ε is given by
ε =(cid:112)4(e − 2) ln(2/δ)λθ = √aλθ,
(16)
where a = 4(e − 2) ln(2/δ).
We denote εβ and εγ as the sampling error limits for the
benefit and cost metrics under θβ and θγ samples that can
satisfy Pr[−εβ ≤ β(S) − β(S) ≤ εβ] ≥ 1 − δ and Pr[−εγ ≤
γ(S) − γ(S) ≤ εγ] ≥ 1 − δ. Then, εφ = εβ + εγ gives a total
sampling error limit for the profit metric which guarantees
Pr[−εφ ≤ φ(S) − φ(S) ≤ εφ] ≥ 1 − 2δ. Likewise, let ¯εβ, ¯εγ
and ¯εφ denote the sampling error limits under the normalized
form.
¯b(v) and ¯Υc = ¯c(V ) = (cid:80)
Similar to the definitions of Υb and Υc, we define ¯Υb =
v∈V ¯c(v). Then,
¯Υb − ¯Υc = Υb − Υc. For a given seed set S, let ¯λβ(S)
and ¯λγ(S) denote the expected fractions of benefit and cost
¯b(V ) = (cid:80)
v∈V
samples covered by S under the normalized form. To simplify
the notation, we omit the common symbol S in what follows,
e.g., β represents β(S) and ¯λβ represents ¯λβ(S). Since
θβ · λβθβ, based on the definition of ε in (16), we have
β = Υb
(cid:112)aλβθβ
(cid:115)
θβ
εγ =
(cid:115)
=
aΥcγ
θγ
Υb
εβ =
Υb
θβ · ε =
Similarly, we have
(cid:115)
¯εβ =
¯β
,
a ¯Υb
θβ
(18)
Note that Υb ≥ ¯Υb, Υc ≥ ¯Υc, β ≥ ¯β and γ ≥ ¯γ. Together
with (17) and (18), we have εβ ≥ ¯εβ and εγ ≥ ¯εγ. Therefore,
εφ = εβ + εγ ≥ ¯εβ + ¯εγ = ¯εφ.
(cid:115)
θβ
(cid:115)
aΥ2
bλβ
θβ
=
aΥbβ
.
(17)
and
¯εγ =
a ¯Υc¯γ
θγ
.
|
1809.05901 | 1 | 1809 | 2018-09-16T15:49:14 | Trends in the Diffusion of Misinformation on Social Media | [
"cs.SI"
] | We measure trends in the diffusion of misinformation on Facebook and Twitter between January 2015 and July 2018. We focus on stories from 570 sites that have been identified as producers of false stories. Interactions with these sites on both Facebook and Twitter rose steadily through the end of 2016. Interactions then fell sharply on Facebook while they continued to rise on Twitter, with the ratio of Facebook engagements to Twitter shares falling by approximately 60 percent. We see no similar pattern for other news, business, or culture sites, where interactions have been relatively stable over time and have followed similar trends on the two platforms both before and after the election. | cs.SI | cs | Trends in the Diffusion of Misinformation
on Social Media
Hunt Allcott, New York University, Microsoft Research, and NBER*
Matthew Gentzkow, Stanford University and NBER
Chuan Yu, Stanford University
September 2018
Abstract
We measure trends in the diffusion of misinformation on Facebook and Twitter between Jan-
uary 2015 and July 2018. We focus on stories from 570 sites that have been identified as
producers of false stories.
Interactions with these sites on both Facebook and Twitter rose
steadily through the end of 2016. Interactions then fell sharply on Facebook while they con-
tinued to rise on Twitter, with the ratio of Facebook engagements to Twitter shares falling by
approximately 60 percent. We see no similar pattern for other news, business, or culture sites,
where interactions have been relatively stable over time and have followed similar trends on
the two platforms both before and after the election.
8
1
0
2
p
e
S
6
1
]
I
S
.
s
c
[
1
v
1
0
9
5
0
.
9
0
8
1
:
v
i
X
r
a
*E-mail: [email protected], [email protected], [email protected]. We thank the Stanford Institute
for Economic Policy Research (SIEPR), the Stanford Cyber Initiative, the Toulouse Network for Information Tech-
nology, the Knight Foundation, and the Alfred P. Sloan Foundation for generous financial support. We thank David
Lazer, Brendan Nyhan, David Rand, David Rothschild, Jesse Shapiro, and Nils Wernerfelt for helpful comments and
suggestions. We also thank our dedicated research assistants for their contributions to this project.
1
1 Introduction
Misinformation on social media has caused widespread alarm in recent years. A substantial number
of U.S. adults were exposed to false news stories prior to the 2016 election, and post-election
surveys suggest that many people who read such stories believed them to be true (Silverman and
Singer-Vine 2016; Allcott and Gentzkow 2017; Guess et al. 2018). Many argue that false news
stories played a major role in the 2016 election (for example, Olson 2016; Parkinson 2016; Read
2016; Gunther et al. 2018), and in the ongoing political divisions and crises that have followed it
(for example, Spohr 2017; Azzimonti and Fernandes 2018; Tharoor 2018). Numerous efforts have
been made to respond to the threat of false news stories, including educational and other initiatives
by civil society organizations, hearings and legal action by regulators, and a range of algorithmic,
design, and policy changes made by Facebook and other social media companies.
Evidence on whether these efforts have been effective -- or how the scale of the misinformation
problem is evolving more broadly -- remains limited. A recent study argues that false stories remain
a problem on Facebook even after changes to its news feed algorithm in early 2018 (Newswhip
2018). The study reports that the 26th and 38th most engaging stories on Facebook in the two
months after the changes were from fake news websites. Many articles that have been rated as
false by major fact-checking organizations have not been flagged in Facebook's system, and two
major fake news sites have seen little or no decline in Facebook engagements since early 2016
(Funke 2018). Facebook's now-discontinued strategy of flagging inaccurate stories as "Disputed"
can modestly lower the perceived accuracy of flagged headlines (Blair et al. 2017), though some
research suggests that the presence of warnings can cause untagged false stories to be seen as
more accurate (Pennycook and Rand 2017). Media commentators have argued that efforts to fight
misinformation through fact-checking are "not working" (Levin 2017) and that misinformation
overall is "becoming unstoppable" (Ghosh and Scott 2018).
In this paper, we present new evidence on the volume of misinformation circulated on social
media from January 2015 to July 2018. We assemble a list of 570 sites identified as sources of false
stories in a set of five previous studies and online lists. We refer to these collectively as fake news
sites. We measure the volume of Facebook engagements and Twitter shares for all stories on these
sites by month. As points of comparison, we also measure the same outcomes for stories on (i) a
set of major news sites; (ii) a set of small news sites not identified as producing misinformation;
and (iii) a set of sites covering business and culture topics.
The results show that interactions with the fake news sites in our database rose steadily on both
Facebook and Twitter from early 2015 to the months just after the 2016 election. Interactions then
declined by more than half on Facebook, while they continued to rise on Twitter. The ratio of
Facebook engagements to Twitter shares was roughly steady at around 40:1 from the beginning
of our period to late 2016, then fell to roughly 15:1 by the end of our sample period. In contrast,
2
interactions with major news sites, small news sites, and business and culture sites have all re-
mained relatively stable over time, and have followed similar trends on Facebook and Twitter both
before and after the 2016 election. While this evidence is far from definitive, we see it as consis-
tent with the view that the overall magnitude of the misinformation problem may have declined, at
least temporarily, and that efforts by Facebook following the 2016 election to limit the diffusion of
misinformation may have had a meaningful impact
The results also show that the absolute level of interaction with misinformation remains high,
and that Facebook continues to play a particularly important role in its diffusion. In the period
around the election, fake news sites received almost as many Facebook engagements as the 38
major news sites in our sample. Even after the sharp drop following the election, Facebook en-
gagements of fake news sites still average roughly 70 million per month.
Our evidence is subject to many important caveats and must be interpreted with caution. This is
particularly true for the raw trends in interactions. While we have attempted to make our database
of false stories as comprehensive as possible, it is likely far from complete, and many factors could
generate selection biases that vary over time. The raw decline in Facebook engagements may
partly reflect the under-sampling of sites that could have entered or gained popularity later in our
sample period, as well as efforts by producers of misinformation to evade detection on Facebook by
changing their domain names. It may also reflect changes over time in demand for highly partisan
political content that would have existed absent efforts to fight misinformation, and could reverse
in the future, for example in the run-up to future elections.
We see the comparison of Facebook engagements to Twitter shares as potentially more infor-
mative. If the design of these platforms and the behavior of their users were stable over time, we
might expect sample selection biases or demand changes to have similar proportional effects, and
thus leave the ratio of Facebook engagements to Twitter shares roughly unchanged. For example,
we might expect producers changing domain names to evade detection to produce similar declines
in our measured interactions on both platforms. The fact that Facebook engagements and Twit-
ter shares follow similar trends prior to late 2016 and for the non-fake-news sites in our data, but
diverge sharply for fake news sites following the election, suggests that some factor has slowed
the relative diffusion of misinformation on Facebook. The suite of policy and algorithmic changes
made by Facebook following the election seems like a plausible candidate.
However, even the relative comparison of the platforms is only suggestive. Both Facebook
and Twitter have made changes to their platforms, and so at best this measure captures the relative
effect of the former compared to the latter. Engagements on Facebook affect sharing on Twitter
and vice versa. The selection of stories into our database could for various reasons differentially
favor the kinds of stories likely to be shared on one platform or the other, and this selection could
vary over time. Demand changes need not have the same proportional effect on the two platforms.
Some of these factors would tend to attenuate changes in the Facebook-Twitter ratio, leading our
3
results to be conservative, but others could produce a spurious decrease over time.
In the appendix, we show that our qualitative results survive a set of robustness checks intended
to partially address potential sample selection biases. These checks include: (i) focusing on sites
identified as fake in multiple lists; (ii) excluding sites from each of our five lists in turn, (iii) looking
at sites that were active in different periods; (iv) excluding potential outliers and looking at sites of
different sizes; and (v) looking at sites with different likelihoods to publish misinformation.
2 Background
Both Facebook and Twitter have taken steps to reduce the circulation of misinformation on their
platforms. In the appendix, we list twelve such announcements by Facebook and five by Twitter
since the 2016 election. Broadly, the platforms have taken three types of actions to limit misinfor-
mation. First, they have limited its supply, by blocking ads from pages that repeatedly share false
stories and removing accounts that violate community standards. Second, they have introduced
features such as "disputed" flags or "related articles" that provide corrective information related
to a false story. Third, they have changed their algorithms to de-prioritize false stories in favor of
news from trustworthy publications and posts from friends and family.
Legislators are also taking action. For example, Connecticut, New Mexico, Rhode Island, and
Washington passed laws in 2017 encouraging media literacy and digital citizenship (Zubrzycki
2017). Executives from Facebook, Google, and Twitter have been asked to testify before various
congressional committees about their efforts to combat misinformation (Shaban et al. 2017; Pop-
ken 2018). Although there has been no major national legislation, this testimony may have raised
public awareness.
Finally, civil society organizations also play an important role. For example, the News Literacy
Project provides non-partisan educational materials to help teachers educate students to evaluate
the credibility of information; demand for its materials has grown substantially in the past few
years (Strauss 2018). In 2017, the newly established News Integrity Initiative (NII) made ten grants
totaling $1.8 million to help build trust between newsrooms and the public, make newsrooms more
diverse and inclusive, and make public conversations less polarized (Owen 2017).
3 Data
We compile a list of sites producing false news stories by combining five previous lists: (i) a re-
search project by Grinberg et al. (2018, 490 sites); (ii) PolitiFact's article titled "PolitiFact's guide
to fake news websites and what they peddle" (Gillin 2017, 325 sites); (iii) three articles by Buz-
zFeed on fake news (Silverman 2016; Silverman et al. 2017a; Silverman et al. 2017b; 223 sites);
(iv) a research project by Guess et al. (2018, 92 sites); and (v) FactCheck's article titled "Websites
4
that post fake and satirical stories" (Schaedel 2017, 61 sites). Politifact and FactCheck are indepen-
dent journalistic fact-checking websites, while BuzzFeed similarly applies journalistic standards to
evaluating whether articles are true or false. The two lists from research projects originally derive
from subsets of the other three, plus Snopes.com, another independent fact-checking site, and lists
assembled by blogger Brayton (2016) and media studies scholar Zimdars (2016). The union of
these five lists is our set of fake news sites.
PolitiFact and FactCheck work directly with Facebook to evaluate the veracity of stories flagged
by Facebook users as potentially false. Thus, these lists comprise fake news sites that Facebook
is likely to be aware are fake. As a result, our results may be weighted toward diffusion of mis-
information that Facebook is aware of, and may not fully capture trends in misinformation that
Facebook is not aware of. It is difficult to assess how large this latter group might be. Our list
almost certainly includes the most important providers of false stories, as Facebook users can flag
any and all questionable articles for review. On the other hand, the list might exclude a large tail
of small sites producing false stories.
Combining these five lists yields a total of 673 unique sites. We have data for 570 of them. We
report in the appendix the names and original lists of 50 largest sites in terms of total Facebook
engagements plus Twitter shares during the sample period. In our robustness checks, we consider
alternative rules for selecting the set of sites.
Our sets of comparison sites are defined based on category-level web traffic rankings from
Alexa.1 Alexa measures web traffic using its global traffic panel, a sample of millions of Internet
users who have installed browser extensions allowing their browsing data to be recorded, plus data
from websites that use Alexa to measure their traffic. It then ranks sites based on a combined mea-
sure of unique visitors and pageviews. We define major news sites to be the top 100 sites in Alexa's
News category. We define small news sites to be the sites ranked 401-500 in the News category.
We define business and culture sites to be the top 50 sites in each of the Arts, Business, Health,
Recreation, and Sports categories. For each of these groups, we omit from our sample government
websites, databases, sites that do not mainly produce news or similar content, international sites
whose audiences are primarily outside the U.S., and sites that are included in our list of fake news
sites. Our final sample includes 38 major news sites, 78 small news sites, and 54 business and
culture sites.
We gather monthly Facebook engagements and Twitter shares of all articles published on these
sites from January 2015 to July 2018 from BuzzSumo (www.buzzsumo.com). BuzzSumo is a
commercial content database that tracks the volume of user interactions with internet content on
Facebook, Twitter, and other social media platforms, using data available from the platforms' appli-
cation programming interfaces (APIs). We use BuzzSumo's data on total Facebook engagements
and total Twitter shares by originating website and month. Facebook engagements are defined
1©2018, Alexa Internet (www.alexa.com)
5
as the sum of shares, comments, and reactions such as "likes." We have data for 570 out of 673
fake news sites in our list and all sites in the comparison groups. We sum the monthly Facebook
engagements and Twitter shares of articles from all sites in each category and then average by
quarter.
4 Results
Figure 1 shows trends in the number of Facebook engagements and Twitter shares of stories from
each category of site. Interactions for major news sites, small news sites, and business and culture
sites have remained relatively stable during the past two years, and follow similar trends on Face-
book and Twitter. Both platforms show a modest upward trend for major news and small news
sites, and a modest downward trend for business and culture sites. In contrast, interactions with
fake news have changed more dramatically over time, and these changes are very different on the
two platforms. Fake news interactions increased steadily on both platforms from the beginning of
2015 up to the 2016 election. Following the election, however, Facebook engagements fell sharply
(declining by more than 50 percent), while shares on Twitter continued to increase.
Figure 2 shows our main result: trends in the ratio of Facebook engagements to Twitter shares.
The ratios have been relatively stable for major news, small news, and business and culture sites.
For fake news sites, however, the ratio has declined sharply, from around 45:1 during the election
to around 15:1 two years later.
While these results suggest that the circulation of fake news on Facebook has declined in both
absolute and relative terms, it is important to emphasize that the absolute quantity of fake news
interactions on both platforms remains large, and that Facebook in particular has played an outsized
role in its diffusion. Figure 1 shows that Facebook engagements fell from a peak of roughly 200
million per month at the end of 2016 to roughly 70 million per month at the end of our sample
period. As a point of comparison, the 38 major news sites in the top left panel -- including the New
York Times, Wall Street Journal, CNN, Fox News, etc. -- typically garner about 200-250 million
Facebook engagements per month. On Twitter, fake news shares have been in the 4-6 million per
month range since the end of 2016, compared to roughly 20 million per month for the major news
sites.
We report a number of robustness checks in the appendix designed to address concerns about
selection into our sample of sites. First, we restrict to sites that are identified as fake news sites by
at least two or three of our original five lists, which leaves 116 and 19 sites, respectively. Second,
given that people might disagree with any one particular study's list of fake news sites, we run
five additional analyses, each excluding fake news sites identified exclusively by one of our five
lists. Third, we focus on sites that started active operations after November 2016, sites that were
still in active operation as of July 2018, and sites that were in active operation from August 2015
6
to July 2018, which leaves 226, 215, and 82 sites respectively. (Active operation is defined to
be a global traffic rank reported by Alexa of at least one million.) Fourth, we exclude the five
largest sites in terms of total interactions to ensure the trend is not driven solely by outliers. We
also look at sites in the first decile and sites in the bottom nine deciles separately to see if the
trend holds for both large sites and small sites. Fifth, Grinberg et al. (2018) provide three lists of
sites classified by different likelihoods to publish misinformation. We look at each of these lists
separately. Our main qualitative conclusions remain consistent across these checks, though the
exact size and shape of the trends vary. Finally, we present an alternative comparison group: a
small set of politically focused sites such as Politico and The Hill. These sites do see a decline in
engagements on Facebook relative to Twitter, but it mainly occurred in late-2015.
7
Figure 1: Engagement on Facebook and Twitter
Panel A: Facebook Engagements
Major News Sites
2015
Number of sites: 38
2016
2017
2018
Business and Culture Sites
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
300
200
100
0
120
80
40
0
Small News Sites
6
4
2
0
2015
Number of sites: 78
2016
2017
2018
Fake News Sites
210
140
70
0
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
2015
Number of sites: 54
2016
2017
2018
2015
Number of sites: 570
2016
2017
2018
Panel B: Twitter Shares
Major News Sites
Small News Sites
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
.21
.14
.07
0
2015
Number of sites: 38
2016
2017
2018
2015
Number of sites: 78
2016
2017
2018
Business and Culture Sites
Fake News Sites
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
6
4
2
0
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
30
20
10
0
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
9
6
3
0
2015
Number of sites: 54
2016
2017
2018
2015
Number of sites: 570
2016
2017
2018
Notes: This figure shows monthly Facebook engagements and Twitter shares of all articles published on sites in
different categories averaged by quarter. Data comes from BuzzSumo. Major News Sites include 38 sites selected
from the top 100 sites in Alexa's News category. Small News Sites include 78 sites selected from the sites ranking
401-500 in the News category. Business and Culture Sites include 54 sites selected from the top 50 sites in each of
the Arts, Business, Health, Recreation, and Sports categories. Fake News Sites include 570 sites assembled from five
lists. The complete lists can be found in the appendix.
8
Figure 2: Relative Engagement on Facebook
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
15
10
5
0
18
12
6
0
Major News Sites
2015
Number of sites: 38
2016
2017
2018
Business and Culture Sites
2015
Number of sites: 54
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
36
24
12
0
45
30
15
0
Small News Sites
2015
Number of sites: 78
2016
2017
2018
Fake News Sites
2015
Number of sites: 570
2016
2017
2018
Notes: This figure shows the ratio of monthly Facebook engagements over Twitter shares of all articles published on
sites in different categories averaged by quarter. Data comes from BuzzSumo. Major News Sites include 38 sites
selected from the top 100 sites in Alexa's News category. Small News Sites include 78 sites selected from the sites
ranking 401-500 in the News category. Business and Culture Sites include 54 sites selected from the top 50 sites in
each of the Arts, Business, Health, Recreation, and Sports categories. Fake News Sites include 570 sites assembled
from five lists. The complete lists can be found in the appendix.
9
References
Allcott H, Gentzkow M (2017) Social media and fake news in the 2016 election. Journal of
Economic Perspectives 31(2): 211 -- 236.
Azzimonti M, Fernandes M (2018) Social media networks, fake news, and polarization. NBER
Working Paper No. 24462.
Blair S, et al. (2017) Real solutions for fake news? Measuring the effectiveness of general warnings
and fact-check tags in reducing belief in false stories on social media. Working Paper. Avail-
able at https://www.dartmouth.edu/∼nyhan/fake-news-solutions.pdf. Accessed September 6,
2018.
Brayton E (2016) Please stop sharing links to these sites. Patheos. Available at http://www.patheos.
com/blogs/dispatches/2016/09/18/please-stop-sharing-links-to-these-sites/. Accessed Septem-
ber 5, 2018.
Funke D (2018) Fact-checkers have debunked this fake news site 80 times. It's still publishing on
Facebook. Poynter.org. Available at https://www.poynter.org/news/fact-checkers-have-de-
bunked-fake-news-site-80-times-its-still-publishing-facebook. Accessed September 4, 2018.
Ghosh, D, Scott B (2018) Disinformation is becoming unstoppable. Time. Available at http://time.
com/5112847/facebook-fake-news-unstoppable/. Accessed September 2, 2018.
Gillin J (2017) Politifact's guide to fake news websites and what they peddle. PolitiFact. Available
at http://www.politifact.com/punditfact/article/2017/apr/20/politifacts-guide-fake-news-
websites-and-what-they/. Accessed September 3, 2018.
Grinberg N, Joseph K, Friedland L, Swire-Thompson B, Lazer D (2018) Fake news on Twitter
during the 2016 U.S. presidential election. Working Paper. Available from the authors.
Guess A, Nyhan B, Reifler J (2018) Selective exposure to misinformation: evidence from the con-
sumption of fake news during the 2016 US presidential campaign. Working Paper. European
Research Council. Available at https://www.dartmouth.edu/∼nyhan/fake-news-2016.pdf. Ac-
cessed September 3, 2018.
Gunther R, Beck PA, Nisbet EC (2018) Fake news may have contributed to Trump's 2016 victory.
Available at https://assets.documentcloud.org/documents/4429952/Fake-News-May-Have-
Contributed-to-Trump-s-2016.pdf. Accessed September 3, 2018.
Levin S (2017) Facebook promised to tackle fake news. But the evidence shows it's not working.
The Guardian. Available at https://www.theguardian.com/technology/2017/may/16/facebook
-fake-news-tools-not-working. Accessed September 3, 2018.
NewsWhip (2018) Navigating the Facebook algorithm change: 2018 report. Available at http://go.
newswhip.com/rs/647-QQK-704/images/FacebookAlgorithmMarch18.pdf. Accessed Septem-
ber 3, 2018.
10
Olson P (2016) How Facebook helped Donald Trump become president. Forbes. Available at
https://www.forbes.com/sites/parmyolson/2016/11/09/how-facebook-helped-donald-trump-
become-president/. Accessed September 3, 2018.
Owen LH (2017) The News Integrity Initiative gives $1.8 million to 10 projects focused on increas-
ing trust in news. NiemanLab. Available at http://www.niemanlab.org/2017/10/the-news-
integrity-initiative-gives-1-8-million-to-10-projects-focused-on-increasing-trust-in-news/. Ac-
cessed September 3, 2018.
Parkinson HJ (2016) Click and elect: how fake news helped Donald Trump win a real election.
The Guardian. Available at https://www.theguardian.com/commentisfree/2016/nov/14/fake-
news-donald-trump-election-alt-right-social-media-tech-companies. Accessed September 2,
2018.
Pennycook G, Rand DG (2017) The implied truth effect: attaching warnings to a subset of fake
news stories increases perceived accuracy of stories without warnings. Working Paper. Avail-
able at http://dx.doi.org/10.2139/ssrn.3035384. Accessed September 3, 2018.
Popken B (2018) Apologies and promises: Facebook and Twitter tell senators they will do more to
combat misinformation. NBC News. Available at https://www.nbcnews.com/tech/tech-news/
apologies-promises-facebook-twitter-tell-senators-they-will-do-more-n906731. Accessed
September 8, 2018.
Read M (2016) Donald Trump won because of Facebook. New York Magazine. Available at
http://nymag.com/selectall/2016/11/donald-trump-won-because-of-facebook.html. Accessed
September 3, 2018.
Schaedel S (2017) Websites that post fake and satirical stories. FactCheck. Available at https://www.
factcheck.org/2017/07/websites-post-fake-satirical-stories. Accessed September 3, 2018.
Shaban H, Timberg C, Dwoskin E (2017) Facebook, Google and Twitter testified on Capitol Hill.
Here's what they said. The Washington Post. Available at https://www.washingtonpost.com/
news/the-switch/wp/2017/10/31/facebook-google-and-twitter-are-set-to-testify-on-capitol-hill
-heres-what-to-expect. Accessed September 7, 2018
Silverman C (2016) Here are 50 of the biggest fake news hits on Facebook from 2016. BuzzFeed
News. Available at https://www.buzzfeednews.com/article/craigsilverman/top-fake-news-of-
2016. Accessed September 3, 2018.
Silverman C, Lytvynenko J, Pham S (2017a) These are 50 of the biggest fake news hits on Face-
book in 2017. BuzzFeed News. Available at https://www.buzzfeednews.com/article/craigsilver
man/these-are-50-of-the-biggest-fake-news-hits-on-facebook-in Accessed September 3, 2018.
Silverman C, Singer-Vine J (2016) Most Americans who see fake news believe it, new survey says.
BuzzFeed News. Available at https://www.buzzfeed.com/craigsilverman/fake-news-survey.
Accessed September 3, 2018.
11
Silverman C, Singer-Vine J, Vo LT (2017b) In spite of the crackdown, fake news publishers are still
earning money from major ad networks. BuzzFeed News. Available at https://www.buzzfeed
news.com/article/craigsilverman/fake-news-real-ads. Accessed September 3, 2018.
Spohr D (2017) Fake news and ideological polarization: filter bubbles and selective exposure on
social media. Business Information Review 34(3): 150 -- 160.
Strauss V (2018) The News Literacy Project takes on 'fake' news -- and business is better than
ever. The Washington Post. Available at https://www.washingtonpost.com/news/answer-
sheet/wp/2018/03/27/not-sure-whats-real-or-fake-anymore-the-news-literacy-project-teaches
-kids-how-to-tell-the-difference-and-its-growing-faster-than-ever/. Accessed September 3,
2018.
Tharoor I (2018) 'Fake news' and the Trumpian threat to democracy. The Washington Post. Avail-
able at https://www.washingtonpost.com/news/worldviews/wp/2018/02/07/fake-news-and-
the-trumpian-threat-to-democracy/. Accessed September 3, 2018.
Zimdars M (2016) False, misleading, clickbait-y, and satirical "news" sources. Available at http://
d279m997dpfwgl.cloudfront.net/wp/2016/11/Resource-False-Misleading-Clickbaity-and-
Satirical-%E2%80%9CNews%E2%80%9DSources-1.pdf. Accessed September 5, 2018.
Zubrzycki J (2017) More states take on media literacy in schools. Education Week. Available
at http://blogs.edweek.org/edweek/curriculum/2017/07/media literacy laws.html. Accessed
September 3, 2018.
12
Appendix
1 Actions Against Fake News
Appendix table 1 lists Facebook's actions to reduce the diffusion of fake news since the 2016 U.S.
election, while Appendix table 2 lists Twitter's actions. All announcements are taken from the
platforms' official websites.1
2 Data
We combine five lists of fake news sites created by fact-checking organizations or research studies
to form our sample of fake news sites. The union of these lists contains 673 unique sites. Among
them, 103 have no data available from BuzzSumo. Thus, our final list includes 570 unique sites.
Appendix table S3 presents the 50 largest sites in the list in terms of total Facebook engagements
plus Twitter shares from January 2015 to July 2018.
We also collect three other categories of sites: major news sites, small news sites, and business
and culture sites covering arts, business, health, recreation, and sports. Appendix table S4 presents
these lists.
3 Robustness Checks
As discussed in the manuscript, a key concern is that our list of fake news sites may suffer from
sample selection bias. To mitigate the concerns, we consider alternative sets of fake news sites as
robustness checks.
3.1 Lists of Fake News Sites
Our five different lists each have different inclusion criteria for defining a fake news site, and one
might disagree with a particular list's approach. We thus carry out two sets of robustness checks.
First, in Appendix figure 1, we focus on sites that are identified as fake news sites by at least two
or three lists instead of one, leaving 116 and 19 sites, respectively. Second, Appendix figure 2
replicates the results using sites assembled from any four out of the five original lists. By doing
this, we exclude sites that are only identified by one particular list. The downward trend in the ratio
of Facebook engagements to Twitter shares since the beginning of 2017 is invariant to including
only sites identified on multiple lists and to excluding any single list.
1Facebook: https://newsroom.fb.com/news/; Twitter: https://blog.twitter.com/official/en us.html.
1
3.2 Time Coverage
It is possible that the original lists of fake news sites primarily include sites that were popular on
Facebook before the 2016 election, and this sample selection combined with the rapid entry and
exit of small sites focused on fake stories could generate a spurious downward trend in both the
absolute number of Facebook engagements of fake news and the ratio of Facebook engagements
to Twitter shares. In Appendix figure 3, we look at sites that were active during different periods.
In Panel A, B, and C, respectively, we focus on sites that started active operation after November
2016, sites that were still in active operation as of the end of the sample in July 2018, and sites
that were in active operation from August 2015 to July 2018. (Active operation is defined to be
a global traffic rank reported by Alexa of at least one million.) The downward trend in the ratio
of Facebook engagements to Twitter shares since the beginning of 2017 remains consistent across
these samples.
3.3 Number of Interactions
Interactions on social media vary substantially across sites in our list. A natural concern might
be that the sums of Facebook engagements and Twitter shares could be driven by a small number
of outliers. In Appendix figure 4 Panel A, we exclude five largest sites in terms of total Facebook
engagements plus Twitter shares in our sample period. The trend survives the exclusion of potential
outliers. In Panel B and C, we divide all sites into deciles and look at sites in the first decile and
sites in the bottom nine deciles separately. The downward trend in the Facebook/Twitter ratio is
observed for both large and small sites.
3.4 Likelihood to Publish Misinformation
Grinberg et al. (2018) provide three lists of sites which they deem to have different likelihoods
to publish misinformation. "Black" domains are reported to publish entirely fabricated stories.
The black list is constructed from pre-existing lists of fake news constructed by academic work
and professional fact-checkers such as PolitiFact, FactCheck, and BuzzFeed. "Red" and "orange"
domains are identified by Snopes as sources of fake news or questionable claims and classified
by their levels of perceived likelihood to publish misinformation: stories from red domains have
an "extremely high" likelihood of containing misinformation, and stories from orange domains
a "high" likelihood.
In Appendix figure 5, we look at these lists separately. There are some
differences across these lists. The downward trend of Facebook engagements appears only for
black and red domains but not for orange domains. The time when the Facebook/Twitter ratio
started to fall is also different. For black domains, the ratio dropped sharply in mid-2016 and all
of 2017. For red and orange domains, however, the decline primarily occurred in 2016. These
2
patterns would be consistent with black and to a lesser extent red domains being the primary target
of the changes Facebook made to its platform following the election.
3.5 Sites Focusing on Political News
Fake news is often political in nature, and it is possible that the Twitter user base is more consis-
tently politically engaged than the (much larger) Facebook user base. If Facebook users' interest
in political stories is cyclical, rising with major presidential elections and falling after, this could
generate a drop in fake news diffusion on Facebook after the 2016 election that might not be mir-
rored on Twitter. Thus, the declining Facebook/Twitter ratio beginning in 2017 could be generated
by changes in demand for fake news, not changes in supply or efforts by Facebook.
If this explanation is true, one would also expect to see a decline in the diffusion of articles
from major political websites on Facebook, but not on Twitter. To test this, Appendix figure 6
presents Facebook engagements, Twitter shares, and their ratio for a list of ten (non-fake) political
sites of five types: (i) sites mostly focusing on political news (Politico and The Hill); (ii) major
parties and politicians (donaldjtrump.com, hillaryclinton.com, democrats.org, and gop.com); (iii)
think tanks (Brookings and AEI); (iv) CSPAN; and (v) a mainstream political blog (Real Clear
Politics). There is a decline in the Facebook/Twitter ratio for these sites, but it mainly occured in
late-2015, well before the election.
3
Appendix Table 1: Facebook's Actions to Fight Against Fake News
Actions
Announced four updates to address hoaxes and fake news: make reporting
easier for users; flag stories as "Disputed" with fact-checking organizations
and warn people before they share; incorporate signals of misleading
articles into rankings; and disrupt financial incentives for spammers.2
Described three areas where it is working to fight the spead of false news:
disrupt economic incentives; build new products to curb the spread of false
news; and help people make more informed decisions.3
Tested "Related Articles", an improved feature that presents users a cluster
of additional articles on the same topic when they come across popular
links, including potantial fake news articles, to provide people easier access
to additional information, including articles by third-party fact checkers.4
Announced it would address cloaking so people see more authentic posts.5
Date
Dec 15, 2016
Apr 6, 2017
Apr 25, 2017
Dec 20, 2017
Aug 8, 2017
Aug 28, 2017 Announced it would block ads from pages that repeatedly share false news.6
Annouced two changes to fight against false news: replace "Disputed" flags
with "Related Articles" to give people more context; and start an initiative
to better understand how people decide whether information is accurate.7
Prioritized posts from friends and family over public content.8
Prioritized news from publications rated as trustworthy by the community.9
Prioritized news relevant to people's local community.10
Described three parts of their strategies to stop misinformation: remove
accounts and content that violate community standards or ad policies;
reduce the distribution of false news and inauthentic content; and inform
people by giving them more context on the posts they see.11
Jan 11, 2018
Jan 19, 2018
Jan 29, 2018
May 23, 2018
June 14, 2018 Detailed how its fact-checking program works.12
June 21, 2018
Announced five updates to fight false news: expand fact-checking programs
to new countries; test fact-checking on photos and videos; use new
techniques in fact-checking including identifying duplicates and using
"Claim Review"; take action against repeat offenders; and improve
measurement and transparency by partnering with academics.13
2.Addressing Hoaxes and Fake News.
3.Working to Stop Misinformation and False News.
4.New Test With Related Articles.
5.Addressing Cloaking So People See More Authentic Posts.
6.Blocking Ads From Pages that Repeatedly Share False News.
7.Replacing Disputed Flags With Related Articles.
8.Bringing People Closer Together.
9.Helping Ensure News on Facebook Is From Trusted Sources.
10.More Local News on Facebook.
11.Hard Questions: What's Facebook's Strategy for Stopping False News?
12.Hard Questions: How Is Facebook's Fact-Checking Program Working?
13.Increasing Our Efforts to Fight False News.
4
Appendix Table 2: Twitter's Actions to Fight Against Fake News
Date
June 14, 2017
June 29, 2017
Sept 28, 2017
Actions
Described the phenomenon of fake news and bots and the approaches it
used, including surfacing the highest quality and most relevant content and
context first, expanding the team and resources, building new tools and
processes, and detecting spammy behaviors at source. 14
(Not officially announced) Tested a feature that would let users flag tweets
that contain misleading, false, or harmful information.15
Shared information on its knowledge about how malicious bots and
misinformation networks on Twitter may have been used in the 2016 U.S.
Presidential elections and its work to fight both malicious bots and
misinformation.16
Oct 24, 2017 Announced steps to dramatically increase the transparency for all ads.17
July 11, 2018 Announced it removed fake accounts.18
14.Our Approach to Bots & Misinformation.
15.Twitter is looking for ways to let users flag fake news, offensive content.
16.Update: Russian Interference in 2016 US Election, Bots, & Misinformation.
17.New Transparency For Ads on Twitter.
18.Confidence in follower counts.
5
Appendix Table 3: 50 Largest Fake News Sites
Site
indiatimes.com
dailywire.com
ijr.com
dailycaller.com
occupydemocrats.com
express.co.uk
redstatewatcher.com
thepoliticalinsider.com
thefederalistpapers.org
truthfeed.com
bipartisanreport.com
rightwingnews.com
qpolitical.com
madworldnews.com
yournewswire.com
uschronicle.com
louderwithcrowder.com
jewsnews.co.il
100percentfedup.com
angrypatriotmovement.com
anonhq.com
inquisitr.com
yesimright.com
worldtruth.tv
collective-evolution.com
ilovemyfreedom.org
tribunist.com
clashdaily.com
naturalnews.com
joeforamerica.com
conservativedailypost.com
Source
Created
Still
Last
G-B G-R G-O
PF
BF
GNR
FC
Post-Election
Active
Long
0
0
0
0
1
0
1
0
0
0
0
0
0
1
1
0
0
0
0
1
0
0
1
0
0
1
0
1
0
0
1
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
1
0
1
0
1
0
0
1
1
0
0
0
1
0
0
0
1
1
0
0
0
1
0
0
1
1
0
0
0
0
0
0
0
0
1
0
0
1
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1
0
1
0
0
1
0
0
1
1
0
0
1
0
0
0
0
0
1
0
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
0
0
0
1
1
0
0
1
0
1
0
0
0
1
0
0
0
1
0
0
1
6
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
1
1
1
1
0
1
1
1
1
1
1
1
1
1
0
1
1
1
1
1
1
1
1
1
0
0
1
0
1
0
1
1
0
0
1
0
1
1
0
1
1
1
0
1
1
0
1
1
0
0
1
1
1
0
Site
worldnewsdailyreport.com
trueactivist.com
americasfreedomfighters.com
conservative101.com
usanewsflash.com
babylonbee.com
firstpost.com
zerohedge.com
teaparty.org
palmerreport.com
judicialwatch.org
disclose.tv
conservativepost.com
thegatewaypundit.com
infowars.com
dailysnark.com
postcard.news
higherperspectives.com
tmn.today
Source
Created
Still
Last
G-B G-R G-O
PF
BF
GNR
FC
Post-Election
Active
Long
1
0
0
0
1
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
1
0
1
1
1
0
0
0
0
0
1
0
0
0
0
0
1
0
1
0
0
0
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
1
1
1
0
1
0
0
1
0
1
0
1
1
1
0
...
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
1
1
1
1
0
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
0
0
0
1
1
1
0
1
1
1
1
1
1
0
0
0
Total
382
61
47
325
223
92
61
308
287
82
Notes: This table lists 50 largest fake news sites in terms of total Facebook engagements plus Twitter shares from
January 2015 to June 2018. The complete list can be found here. Column 2-8 lists the fake news sites identified
by five sources described above, where a value of 1 indicates the site appears in the corresponding source and
0 not. G-B, G-R, and G-O represent the black domains, red domains, and orange domains in Grinberg et al.
(2018). PF represents PolitiFact. BF represents BuzzFeed. GNR represents Guess et al. (2018). FC represents
FactCheck. The last three columns list sites that started active operation after the election in November 2016,
sites that were in active operation in July 2018, and sites that were in active operation during the whole sample
period from August 2015 to July 2018. A site is defined as being in active operation if it is tracked by Alexa
with a global rank higher than one million in terms of total traffic.
7
Appendix Table 4: Lists of Sites in Each Category
Category
Site
cnn.com
nytimes.com
theguardian.com
washingtonpost.com
foxnews.com
huffingtonpost.com
usatoday.com
reuters.com
wsj.com
time.com
cnbc.com
nypost.com
usnews.com
cbsnews.com
chron.com
thehill.com
nbcnews.com
theatlantic.com
Major News Sites
latimes.com
abcnews.go.com
thedailybeast.com
sfgate.com
newsweek.com
chicagotribune.com
economist.com
theroot.com
voanews.com
nj.com
miamiherald.com
mercurynews.com
bostonglobe.com
seattletimes.com
oregonlive.com
washingtontimes.com
azcentral.com
ajc.com
philly.com
sacbee.com
aspentimes.com
bakersfield.com
bendbulletin.com
bnd.com
broadcastingcable.com
charlestoncitypaper.com
chicagomaroon.com
collegian.psu.edu
columbian.com
dailynebraskan.com
dailynexus.com
dailynorthwestern.com
dailypress.com
dailyprogress.com
dailytexanonline.com
dailytrojan.com
dcourier.com
delcotimes.com
durangoherald.com
fair.org
fredericksburg.com
globegazette.com
greenvilleonline.com
greenwichtime.com
havasunews.com
hcn.org
heraldnet.com
heraldsun.com
heraldtimesonline.com
ibj.com
independent.com
islandpacket.com
jou.ufl.edu
Small News Sites
journalism.org
journalismjobs.com
journaltimes.com
kitv.com
knoxnews.com
lacrossetribune.com
leadertelegram.com
macon.com
myrtlebeachonline.com
naplesnews.com
nashvillescene.com
news.cornell.edu
news.usc.edu
newseum.org
news-journalonline.com
news-leader.com
newstimes.com
nwfdailynews.com
pjstar.com
presstelegram.com
rapidcityjournal.com
readingeagle.com
redandblack.com
rgj.com
sacurrent.com
santacruzsentinel.com
santafenewmexican.com
8
Category
Site
Small News Sites
sgvtribune.com
signalscv.com
siouxcityjournal.com
standard.net
stanforddaily.com
steynonline.com
studlife.com
tallahassee.com
theday.com
theeagle.com
theledger.com
timesleader.com
ubm.com
vcstar.com
wacotrib.com
wcfcourier.com
wvgazettemail.com
yakimaherald.com
imdb.com
ign.com
rottentomatoes.com
Arts
ultimate-guitar.com
npr.org
vice.com
tmz.com
pitchfork.com
wired.com
forbes.com
shutterstock.com
businessinsider.com
Business
finance.yahoo.com
bloomberg.com
eventbrite.com
fortune.com
adweek.com
webmd.com
psychologytoday.com
who.int
Health
apa.org
bmj.com
mercola.com
menshealth.com
self.com
nejm.org
9gag.com
jalopnik.com
timeout.com
Recreation
lonelyplanet.com
caranddriver.com
hollywoodreporter.com
nationalgeographic.com
rd.com
topix.com
espn.com
cricbuzz.com
nba.com
espncricinfo.com
sports.yahoo.com
bleacherreport.com
nhl.com
cbssports.com
nfl.com
Sports
iplt20.com
skysports.com
deadspin.com
nbcsports.com
wwe.com
si.com
sbnation.com
formula1.com
rivals.com
foxsports.com
Notes: This table lists sites in the comparison groups. Major News Sites include 38 sites selected from the top
100 sites in Alexa's News category. Small News Sites include 78 sites selected from the sites ranking 401-500
in the News category. Business and Culture Sites include 54 sites selected from the top 50 sites in each of the
Arts, Business, Health, Recreation, and Sports categories. For each group, we omit from our sample government
websites, databases, sites that do not mainly produce news or similar content, international sites whose audiences
are primarily outside the U.S., and sites that are included in our list of fake news sites.
9
Appendix Figure 1: Robustness Checks of Fake News Sites - Multiple Lists
Panel A: Sites Identified by At Least Two Lists
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
45
30
15
1.8
1.2
.6
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
120
80
40
0
2015
2016
2017
2018
Number of sites: 116
Panel B: Sites Identified by At Least Three Lists
4.5
3
1.5
.12
.08
.04
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
0
2015
2016
Number of sites: 19
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
150
100
50
0
2015
2016
2017
2018
Notes: This figure plots robustness checks for the sample of fake news sites by looking at sites only identified by
multiple lists. Each panel plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engage-
ments over Twitter shares averaged by quarter. Panel A includes sites identified by at least two lists out of five. Panel
B includes sites identified by at least three lists. Grinberg et al.'s (2018) provide three types of domains. The black
domains derive from lists that we already use (with the exception of nine sites, as PolitiFact and FactCheck updated
their lists at some point). We avoid double-counting black domains when we count the number of lists that identify a
fake news site.
10
Appendix Figure 2: Robustness Checks of Fake News Sites - Excluding Lists
Panel A: Excluding Sites Only Identified by Grinberg et al. (2018)
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
150
100
50
3
2
1
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
60
40
20
0
2015
2016
2017
2018
Number of sites: 488
Panel B: Excluding Sites Only Ideitifed by PolitiFact
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
150
100
50
4.5
3
1.5
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
60
40
20
0
2015
2016
2017
2018
Number of sites: 380
Panel C: Excluding Sites Only Identified by BuzzFeed
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
210
140
70
6
4
2
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
45
30
15
0
2015
2016
2017
2018
Number of sites: 454
11
Appendix Figure 2: Robustness Checks of Fake News Sites - Excluding Lists (continued)
Panel D: Excluding Sites Only Ideitifed by Guess et al. (2018)
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
180
120
60
6
4
2
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
45
30
15
0
2015
2016
2017
2018
Number of sites: 522
Panel E: Excluding Sites Only Identified by FactCheck
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
210
140
70
6
4
2
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
45
30
15
0
2015
2016
2017
2018
Number of sites: 552
Notes: This figure plots robustness checks for the sample of fake news sites by excluding sites only identified by a
particular list. Each panel plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engage-
ments over Twitter shares averaged by quarter. Panel A excludes sites only identified by Grinberg er al. (2018). Panel
B excludes sites only identified by PolitiFact. Panel C excludes sites only identified by BuzzFeed. Panel D excludes
sites only identified by Guess et al. (2018). Panel E excludes sites only identified by FactCheck.
12
Appendix Figure 3: Robustness Checks of Fake News Sites - Time Coverage
Panel A: Sites that Started Active Operation after November 2016
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
30
20
10
.45
.3
.15
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
90
60
30
0
2015
2016
2017
2018
Number of sites: 226
Panel B: Sites that were in Active Operation in July 2018
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
180
120
60
6
4
2
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
45
30
15
0
2015
2016
2017
2018
Number of sites: 215
Panel C: Sites that were in Active Operation during August 2015 to July 2018
90
60
30
4.5
3
1.5
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
0
2015
2016
Number of sites: 82
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
36
24
12
0
2015
2016
2017
2018
Notes: This figure plots robustness checks for the sample of fake news sites by looking at sites active in different
period. Each panel plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engagements over
Twitter shares averaged by quarter. Panel A includes sites that started active operation after the election in November
2016. Panel B includes sites that were still in active operation in July 2018. Panel C includes sites that were in active
operation during August 2015 to July 2018. A site is defined as being in active operation if it is tracked by Alexa with
a global rank higher than one million in terms of total traffic.
13
Appendix Figure 4: Robustness Checks of Fake News Sites - Number of Interactions
Panel A: Excluding Top Five Fake News Sites
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
150
100
50
4.5
3
1.5
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
60
40
20
0
2015
2016
2017
2018
Number of sites: 565
Panel B: The First Decile of Fake News Sites
180
120
60
6
4
2
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
0
2015
2016
Number of sites: 57
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
45
30
15
0
2015
2016
2017
2018
Panel C: The Bottom Nine Deciles of Fake News Sites
36
24
12
.75
.5
.25
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
60
40
20
0
2015
2016
2017
2018
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
Number of sites: 513
Notes: This figure plots robustness checks for the sample of fake news sites by excluding the largest sites and looking
at sites of different sizes. Each panel plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook
engagements over Twitter shares averaged by quarter. Panel A excludes five largest sites in terms of total Facebook
engagements plus Twitter shares from January 2015 to July 2018. Panel B includes sites in the first decile. Panel C
includes sites in the bottom nine deciles, i.e., excludes sites in the first decile. The deciles are also defined in terms of
total Facebook engagements plus Twitter shares during the sample period.
14
Appendix Figure 5: Robustness Checks of Fake News Sites - Likelihood to Publish Misinformation
75
50
25
Panel A: Black Domains
.6
.4
.2
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
0
2015
2016
2017
2018
0
2015
2016
2017
2018
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
Number of sites: 337
Panel B: Red Domains
0
2015
2016
Number of sites: 59
2017
2018
0
2015
2016
2017
2018
Panel C: Orange Domains
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
180
120
60
0
2015
2016
2017
2018
60
40
20
0
2015
2016
2017
2018
45
30
15
0
2015
2016
2017
2018
45
30
15
1.8
1.2
.6
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
36
24
12
2.4
1.6
.8
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
0
2015
2016
Number of sites: 44
2017
2018
0
2015
2016
2017
2018
Notes: This figure plots robustness checks for three lists of fake news sites in Grinberg er al.
(2018) separately,
classified by their likelihoods to publish misinformation. Each panel plots monthly Facebook engagements, Twitter
shares, and the ratio of Facebook engagements over Twitter shares averaged by quarter. The black domains were
reported to have published entirely fabricated stories, taken from pre-existing lists of fake news constructed by the
fact-checking and journalistic outlets Politifact, FactCheck, and Buzzfeed, as well as domains used in other academic
work. The red and orange domains are identified by Snopes as sources of fake news or questionable claims and
classified by the authors by their levels of perceived likelihood to publish misinformation: stories from red domains
have an extremely high likelihood of containing misinformation, and stories from orange domains a high likelihood.
15
Appendix Figure 6: Robustness Checks of Sites Focusing on Political News
24
16
8
3.6
2.4
1.2
)
n
o
i
l
l
i
m
(
s
e
r
a
h
s
r
e
t
t
i
w
T
)
n
o
i
l
l
i
m
(
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
0
2015
2016
Number of sites: 10
2017
2018
0
2015
2016
2017
2018
s
e
r
a
h
s
r
e
t
t
i
w
T
/
s
t
n
e
m
e
g
a
g
n
e
k
o
o
b
e
c
a
F
15
10
5
0
2015
2016
2017
2018
Notes: This figure plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engage-
ments over Twitter shares averaged by quarter of sites mostly focusing on political news. The sites include
politico.com, thehill.com, brookings.edu, aei.org, c-span.org, realclearpolitics.com, donaldjtrump.com, hillaryclin-
ton.com, democrats.org, and gop.com.
16
|
1508.06738 | 1 | 1508 | 2015-08-27T07:39:32 | Characterization and Control of Diffusion Processes in Multi-Agent Networks | [
"cs.SI",
"eess.SY"
] | Diffusion processes are instrumental to describe the movement of a continuous quantity in a generic network of interacting agents. Here, we present a probabilistic framework for diffusion in networks and propose to classify agent interactions according to two protocols where the total network quantity is conserved or variable. For both protocols, our focus is on asymmetric interactions between agents involving directed graphs. Specifically, we define how the dynamics of conservative and non-conservative networks relate to the weighted in-degree Laplacian and the weighted out-degree Laplacian. Our framework allows the addition and subtraction of the considered quantity to and from a set of nodes. This enables the modeling of stubborn agents with time-invariant quantities, and the process of dynamic learning. We highlight several stability and convergence characteristics of our framework, and define the conditions under which asymptotic convergence is guaranteed when the network topology is variable. In addition, we indicate how our framework accommodates external network control and targeted network design. We show how network diffusion can be externally manipulated by applying time-varying input functions at individual nodes. Desirable network structures can also be constructed by adjusting the dominant diffusion modes. To this purpose, we propose a Markov decision process that learns these network adjustments through a reinforcement learning algorithm, suitable for large networks. The presented network control and design schemes enable flow modifications that allow the alteration of the dynamic and stationary behavior of the network in conservative and non-conservative networks. | cs.SI | cs | Characterization and Control of Diffusion Processes
in Multi-Agent Networks
Wai Hong Ronald Chan, Matthias Wildemeersch, Tony Q. S. Quek
5
1
0
2
g
u
A
7
2
]
I
S
.
s
c
[
1
v
8
3
7
6
0
.
8
0
5
1
:
v
i
X
r
a
Abstract -- Diffusion processes are instrumental to describe the
movement of a continuous quantity in a generic network of
interacting agents. Here, we present a probabilistic framework for
diffusion in networks and propose to classify agent interactions
according to two protocols where the total network quantity is
conserved or variable. For both protocols, our focus is on asym-
metric interactions between agents involving directed graphs.
Specifically, we define how the dynamics of conservative and non-
conservative networks relate to the weighted in-degree Laplacian
and the weighted out-degree Laplacian. Our framework allows
the addition and subtraction of the considered quantity to and
from a set of nodes. This enables the modeling of stubborn
agents with time-invariant quantities, and the process of dynamic
learning. We highlight several stability and convergence charac-
teristics of our framework, and define the conditions under which
asymptotic convergence is guaranteed when the network topology
is variable. In addition, we indicate how our framework accom-
modates external network control and targeted network design.
We show how network diffusion can be externally manipulated
by applying time-varying input functions at individual nodes.
Desirable network structures can also be constructed by adjusting
the dominant diffusion modes. To this purpose, we propose a
Markov decision process that learns these network adjustments
through a reinforcement learning algorithm, suitable for large
networks. The presented network control and design schemes
enable flow modifications that allow the alteration of the dynamic
and stationary behavior of the network in conservative and non-
conservative networks.
Keywords -- multi-agent networks, diffusion process, directed
graphs, graph Laplacian, network dynamics, network control,
network design
I.
INTRODUCTION
Large-scale network dynamics received ample research in-
terest over the last decade in the context of group coordina-
tion [1], distributed algorithms [2], [3], network control [4],
distributed optimization [5], consensus problems [6], [7], or
herding and flocking behavior [8]. Network dynamics involve
interactions between individual agents and relate to the diffu-
sion of a continuous quantity within a generic network [9] --
[15], including assets among financial institutions and opin-
ions within social networks. In this work, we establish a
probabilistic diffusion framework that describes in continuous
time the movement of such a continuous quantity or node
property within a multi-agent network. The main contributions
of our framework are (i) to classify linear update rules and
characterize the corresponding dynamical network behavior,
(ii) to include external inputs as control variables into the
Wai Hong Ronald Chan is with Stanford University, California, USA (email:
[email protected]).
Applied
Systems Analysis
[email protected]).
for
(email:
Matthias Wildemeersch
is with
the
International
Institute
(IIASA),
Laxenburg, Austria
Tony Q. S. Quek is with the Singapore University of Technology and Design
(SUTD), Singapore (email: [email protected]).
framework resulting in the study of the network stability and
convergence under different conditions, and (iii) to impose
flow modifications by means of network control and network
design.
This framework builds on consensus models involving
Markovian state transitions that have been formulated in dis-
crete time [1], [16] -- [20] and continuous time [21], as well as
multi-agent gossiping models describing interactions between
pairs of agents [15]. We generalize these models and introduce
a classification of linear inter-agent update rules depending on
whether the global quantity initially present in the network is
conserved or not. This enables our framework to account for a
wider range of network phenomena. For example, financial or
trade assets could be modeled using conservative flows, while
opinions follow non-conservative network dynamics. Going
beyond symmetric, unweighted graphs [22], we focus on
weighted graphs with asymmetric update rules and derive the
corresponding differential equation that describes the diffusion
of the considered quantity averaged over all sample paths. The
nature of the update rule affects the stability and convergence
of diffusion processes over networks [8]. We highlight the
differences in the transient and stationary characteristics of
conservative and non-conservative networks,
the effects of
network asymmetry, as well as the conditions for convergence
in networks with switching topologies.
Building on existing leader-follower models [23], [24], we
extend the homogeneous differential equation that describes
the diffusion process to its inhomogeneous form and use the
inhomogeneous term to model an exogenous quantity input.
By doing so, we can model the addition and subtraction of the
considered quantity to and from the multi-agent network. Our
framework unifies several types of systems involving external
influences, including external restrictions on the quantity val-
ues of selected agents, as well as externally imposed reference
values obtained from measurements or predefined system
targets. For instance, we demonstrate that diffusion processes
considered by other authors, such as the presence of stubborn
agents [15] or the process of dynamic learning [19], can be
expressed in terms of the inhomogeneous differential equation.
In addition, we demonstrate that under some constraints on
the input vector and the network topology, networks with
exogenous excitations can remain stable and converge to a
steady state.
Our framework enables network control through the in-
troduction of external excitations at individual nodes or the
adjustment of the network structure. By transforming the
basis of agents using standard results in state-space control
to isolate the time dynamics of the characteristic modes of the
system from one another [25], and implementing a suitable
controller for one of the modes, we can design time-varying
input functions for each of the individual agents. A suitable
choice of the controller will allow the network designer to
2
guide the system towards a desired objective in terms of
diffusion control. Different types of networks are associated
with different modal compositions and require different input
design considerations for the achievement of control. Besides
externally imposing control on a network, we also address
the modification of inter-agent interactions to impose network
control. By modifying the transition rate matrix that governs
the network dynamics, the eigenvalues of the characteristic
modes of the system are shifted, and the dynamics of the
system are modified. Furthermore, we present an adaptive
heuristic that models the modification of the network structure
as a Markov decision process (MDP). In this MDP, the state
space is defined as the set of individual agents, while the action
space is defined as perturbations to the transition rate matrix
governing the system evolution. Using an appropriate reward
function and a suitable time schedule for decision making,
the action space can be searched efficiently using a reinforce-
ment learning algorithm based on standard learning techniques
[26], and suboptimal control with quick convergence can be
achieved. By enabling each agent to be associated with a cost
or a reward, we allow the isolation and control of individual
nodes through this modification. In conclusion, the proposed
network control and network design processes form a toolbox
for the micromanagement of diffusion in networks.
The remainder of the paper is structured as follows. In Sec-
tion II, we introduce two essential classes of stochastic update
rules that are able to model diffusion in networks, and derive
the corresponding linear system of ordinary differential equa-
tions that describe the network dynamics for the corresponding
conservative and non-conservative networks. In Section III,
we further discuss the stability and convergence characteristics
of these differential equations. In Section IV, we extend the
homogeneous equations to their inhomogeneous forms, and
discuss their stability and convergence characteristics. In Sec-
tion V, we look at how external excitation can possibly achieve
control, and in Section VI, we discuss the impact and possible
implementations of network structure modification. In Sections
V and VI, we also provide case studies to illustrate how these
control processes can be implemented. In Section VII, we
conclude our work by looking at some future directions and
extensions.
II. SYSTEM MODEL AND STOCHASTIC UPDATE RULES
We consider a population V of interacting agents Vi, where
i ∈ I = {1, 2, . . . , n : n ∈ Z+}. These agents have the
capacity to generate, destroy, store, transmit and receive a
continuous quantity or node property Si(t) ∈ R that can
change with time t ≥ 0. We denote the vector of properties by
S(t) = {Si(t) : i ∈ I}. Given some set of initial conditions
Si(0) = Si,0 for some Si,0 ∈ R, as well as probabilistic
interactions between the agents, the system evolves over time
and the property Si(t) of each agent can be monitored over
time. The probabilistic interactions between the agents can be
described by a weighted digraph G = (V, (cid:126)E, w) where V is
the set of agents, (cid:126)E is the set of directed links between pairs of
agents in V, and w : (cid:126)E → R+ is a function that represents the
weights. The weighted adjacency matrix can be represented as
AG(i, j) =
w(i, j) if (i, j) ∈ (cid:126)E ,
otherwise .
0
(1)
(cid:26)
Furthermore, we define the weighted in-degree matrix D(in)
and the weighted out-degree matrix D(out)
as the diagonal
matrices with
G
G
(cid:88)
(cid:88)
i
and
D(in)
G (j, j) =
D(out)
G (i, i) =
AG(i, j) ,
AG(i, j) .
(2)
(3)
j
The exact meaning of the edge weight and the direction of
the links will be made explicit when we analyze the update
rules, referred to as protocols, in the following Section. Since
the interactions between agents can be asymmetric, we will
introduce two different Laplacians that refer to the in-degree
and the out-degree of each node. We define the weighted in-
degree Laplacian as
L(in)(G) = D(in)
G − AG .
(4)
Conversely, the weighted out-degree Laplacian is defined as
L(out)(G) = D(out)
G − AG .
(5)
Depending on the choice of the stochastic update rule used
in the probabilistic interactions between the agents, we will
characterize the flow dynamics of networks operating under
different protocols. Here, we describe two main classes of
linear update rules that result in linear, time-invariant differen-
tial equations in the node property and corresponding linear,
time-invariant matrix differential equations in the diffusion
probabilities.1 These update rules are distinguished by the
conservation or the non-conservation of the total property
initially present in the network. The networks applying the
conservative and non-conservative protocols will be referred
to as conservative and non-conservative networks respectively.
A. Conservative networks
We first consider a protocol where the total amount of
property in the network is conserved at every instant
in
time. Conservative updating is relevant for the description of
conservative flow dynamics in a network, including the flow
of material and physical assets. In this respect, conservative
networks are able to represent stylized instances of hydraulic,
financial, or trade networks.
In conservative networks, agents obey the conservative up-
date rule
Si(t + ∆t) = Si(t) + CijSj(t)
Sj(t + ∆t) = (1 − Cij)Sj(t) ,
(P1)
where i, j ∈ I, (i, j) ∈ (cid:126)E. The parameter Cij ∈ (0, 1] is a
measure of liability or responsibility of agent j towards agent
i, and ∆t is an infinitesimal time interval. For every edge
(i, j) ∈ (cid:126)E, there exists a clock that follows an independent
Poisson process with rate rij > 0. The protocol (P1) is
executed for nodes i and j when the independent Poisson clock
of (i, j) ticks. The following Lemma characterizes the property
dynamics of the instance-averaged value of S in conservative
networks.
1For non-linear update rules, we refer to [27].
CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS
3
Lemma 1. Let ¯S(t) denote the expected value of S averaged
over all sample paths. The dynamics of the expected property
for a network applying (P1) are defined by
¯S(t) = Q ¯S(t) ,
(A)
where Q = −L(in)(G), the weighing function is defined as
w(i, j) = Cijrij, and
(cid:26) Cijrij
−(cid:80)
i ∈ V is given by ri =(cid:80)
of the network is given by r =(cid:80)
Qij =
i(cid:54)=j Cijrij
Proof: We first note that the total update rate for an node
j rij, and that the total update rate
i ri. Assume that a global
network clock is ticking at rate r. Then, the probability that the
clock will activate edge (i, j) is given by rij/r, where in the
limit of large-scale networks r ≈ 1/∆t. Consequently, when
property updating follows (P1), the probabilistic update of the
property of the nodes corresponding to the edge (i, j) is given
by
if i (cid:54)= j ,
if i = j .
¯Si(t + ∆t) − ¯Si(t) =
(cid:88)
¯Sj(t + ∆t) − ¯Sj(t) = −(cid:88)
j(cid:54)=i
rij ∆t Cij ¯Sj(t)
rij ∆t Cij ¯Sj(t) ,
(6)
(7)
(8)
i(cid:54)=j
which can be succinctly written as
¯Si(t + ∆t)− ¯Si(t) =
(cid:88)
∆t(rijCij ¯Sj(t)− rjiCji ¯Si(t)) . (9)
Dividing by ∆t and taking the limit for ∆t → 0, we get a
system of differential equations
¯Si(t) =
rijCij ¯Sj(t) − rjiCji ¯Si(t) ,
j(cid:54)=i
(cid:88)
j(cid:54)=i
or written differently
¯S(t) = −L(in)(G) ¯S(t) ,
(10)
(11)
which concludes the proof.
We will refer to (A) as the governing equation.
Corollary 1. The matrix Q = −L(in)(G) of a conservative
network represents the transition rate matrix of a continuous-
time Markov chain (CTMC). The transition probabilities Pij(t)
of the CTMC are solutions of the following differential equa-
tion
P(t) = QP(t) ,P(t) = [Pij(t)] .
(12)
Proof: From (6), we notice that the
Qjj
Qij ∀ j ∈ I,
(13)
= −(cid:88)
.
i(cid:54)=j
such that the columns of Q sum to zero. It follows that Q
represents the transition rate matrix of a positive recurrent
CTMC. Accordingly, the spread of property from one agent
to another can be described by a CTMC whose state space is
equivalent to the agent set V and whose instantaneous state
is denoted by X(t). Given that the diffusion dynamics can be
described by a CTMC, we can write [28]
Pr[X(t + u) = i] =
Pij(u) Pr[X(t) = j] ,∀ u ∈ (0,∞)
(14)
(cid:88)
j
for some state i ∈ I, where
Pij(u) = Pr[X(t + u) = iX(t) = j]
(15)
describes the probability that an infinitesimal piece of property
is in state i (i.e. agent i) at time t + u, given that it was in
state j (i.e. agent j) at time t. From (14), it follows that the
transition probability matrix P = [Pij] satisfies
P(t + u) = P(t)P(u) ∀ t, u ∈ (0,∞) ,
(16)
which is known as the Chapman-Kolmogorov equation. As-
suming the limits limh→0 P(h) = P(0) and limh→0 P(h) =
P(0) exist, we can then adopt the relation P(0) = I where I is
the identity matrix, and thereafter the following deterministic
differential equation
P(t) = QP(t)
(17)
where Q = P(0) = [Qij].
We can interpret (12) as an equation describing the diffusion
of transition probabilities between the various agents over time.
Note that Lemma 1 can also be demonstrated via a proba-
bilistic interpretation of the CTMC. It can be shown that P(t)
is continuous in t, ∀t ≥ 0 [28]. For a conservative network,
P(t) always sum to
it follows from (13) that the columns of
zero. This shows that for each origin agent j, the sum over
all the agents i of the time-cumulative transition probabilities
Pij
is conserved at a value of 1 over time, as expected
from conventional laws of probability. We now consider the
expected value of Si averaged over all sample paths, which is
given by the column vector
¯S(t) = P(t) ¯S(0) .
(18)
This illustrates that the sum of ¯S over all agents remains a
conserved quantity when (P1) is applied. If the system starts
from a known, deterministic state, then the bar in ¯S(0) can be
omitted. Combining (12) and (18), we find again (A).
B. Non-conservative networks
We now consider a protocol where property diffuses be-
tween agents by means of a convex updating protocol. This
protocol
is of interest for opinion dynamics [3], [15], or
preference dynamics in cultural theory [29].
In non-conservative networks, agents obey the following
convex update rule [15]
Si(t + ∆t) = CijSj(t) + (1 − Cij)Si(t) ,
(P2)
whenever the Poisson clock ticks for a pair of agents i, j ∈ I,
(i, j) ∈ (cid:126)E. In other words, when the (i, j)-th Poisson clock
activates the link between agents i and j, agent i is triggered
to poll
the property value of agent j with a confidence
measure of Cij and update its own value accordingly. The
following Lemma characterizes the property dynamics in non-
conservative networks.
Lemma 2. The dynamics of
the expected property for a
network applying (P2) are defined by the governing equation
¯S(t) = Q ¯S(t) ,
where Q = −L(out)(G), w(i, j) = Cijrij, and
if i (cid:54)= j ,
if i = j .
(cid:26) Cijrij
−(cid:80)
Qij =
j(cid:54)=i Cijrij
(A)
(19)
4
Proof: When property updating follows (P2), the proba-
bilistic update of the property of node vi ∈ V is given by
¯Si(t + ∆t) − ¯Si(t) =
(rij∆t)Cij( ¯Sj(t) − ¯Si(t)) .
(20)
(cid:88)
j(cid:54)=i
Dividing by ∆t and taking the limit for ∆t → 0, we obtain
the instance-averaged linear differential equations represented
by (A) with Q = −L(out)(G).
(cid:0) ¯Sj(t) − ¯Si(t)(cid:1), with Ni the neighbor-
where ¯Si(t) =(cid:80)
Note that Lemma 2 extends the basic consensus algorithm
hood of i, to asymmetrically weighted updating. The relevance
of the asymmetry will be further discussed in Section III.
Corollary 2. The matrix Q = −L(out)(G) of a non-
conservative network represents the transition rate matrix of
a CTMC, and the transition probabilities of the CTMC are
solutions of the following differential equation
j∈Ni
(21)
Proof: The proof is similar to the proof of Corollary 1,
P(t) = QP(t) ,
and follows from the fact that
Qij ∀ i ∈ I ,
(22)
= −(cid:88)
.
j(cid:54)=i
Qii
meaning that the rows of Q all sum to zero. The CTMC
corresponding to Q represents a random walk on G.
In comparison with the transfer of an infinitesimal piece of
property in a conservative network, Pij in non-conservative
networks represents the probability that node i polls node j
to update its own value using the weight Cij. For networks
applying (P2), we note similarly that the rows of P(t) always
sum to zero, and consequently the rows of P(t) always sum
to one. This shows that every polling tag originating from an
agent i must either still be under the possession of agent i or
of some other agent j in the network.
Remark 1. Lemma 1 and Lemma 2 make the link between
the protocols (P1) and (P2) and the transition rate matrices
explicit. In the case of a symmetric Q matrix, the in-degree and
out-degree Laplacians are identical. Hence, the conservative
and non-conservative protocols are equivalent for symmetric
matrices. In the event of asymmetry, we observe from (4) and
(5) that the conservative Q and the transpose of the non-
conservative Q are identical if the two corresponding digraphs
have the same weights w but with all link directions reversed.
III. HOMOGENEOUS EQUATION: STABILITY AND
CONVERGENCE
In this Section, we analyze the steady-state characteristics
of the homogeneous equation (A) based on the eigendecom-
position of the rate transition matrix Q. The relevance of Q
can further be understood by considering that (12) and (21)
can be solved as P(t) = exp(Qt), indicating the role of
the topology, the inter-agent measures of confidence, and the
updating rates in the diffusion process. Due to the construction
of Q as a Laplacian matrix, Q always has the eigenvalue
qs = 0. Moreover, Q is a Metzler matrix, such that exp(Qt)
is nonnegative for t ≥ 0. If Q is diagonalizable, then we can
write
¯S(t) = exp(cid:0)AΛA−1t(cid:1)S(0)
= A diag (exp(qkt)) A−1S(0) ,
where A contains the unit right eigenvectors of Q as columns,
A−1 contains the corresponding left eigenvectors of Q as rows,
qk represents the eigenvalues of Q, and Λ = diag(qk). We can
further write
¯S(t) =
=
exp(qkt)vR,kvT
L∗,kS(0)
ck exp(qkt)vR,k ,
(24)
(cid:88)
(cid:88)
k
k
where vR,k and vL∗,k are the unit right and corresponding
left eigenvectors2 of Q in column form, and ck = vT
L∗,kS(0)
are scalars. We refer to the eigenvectors of Q as the system
modes. From (24), the eigenvalues and eigenvectors reflect the
characteristic growth and decay rates of the system, as well
as the dominant and weak nodes in the network. In particular,
the quantities of the network nodes are stable and converge to
a steady-state distribution in finite time iff the eigenvalues of
Q are nonpositive and include zero. Note also that the steady-
state behavior of the nodes is given by limt→∞ ¯S(t) = csvR,s,
where cs and vR,s are the scalar and the unit right eigenvector
corresponding to qs = 0. As per Gersgorin's circle theorem,
transition rate matrices Q constructed according to (P1) or
(P2) and associated with CTMCs satisfy these properties. In
the following subsections, we will illustrate the dynamics for
different strongly connected network classes by means of the
network presented in Fig. 1.
1
1
α
2
1
α
3
1
α
4
1
α
5
Fig. 1: Path graph P5 with symmetric links of unit weights used to illustrate
the transient and steady-state behaviors of the various update rules.
A. Conservative asymmetric networks
For conservative networks, we formulate the following
Lemma for the stationary behavior.
Lemma 3. The stationary value of a strongly connected
asymmetric network applying (P1) is given by the unit steady-
i Si,0/Ψ where
state right eigenvector vR,s scaled by cs =(cid:80)
Ψ is the sum of the entries of vR,s.
Proof: In networks that apply (P1), the column-sum of
Q = −L(in)(G) is zero, such that Q has a unit steady-state
left eigenvector vL,s with equal components. In an asymmetric
network, the stationary node values are in general imbalanced
due to the unequal components in the unit steady-state right
eigenvector vR,s. Considering (24), the proof is concluded.
In the case of asymmetric liabilities between nodes, the
stationary distribution will favor attractive nodes and shun
repulsive nodes, and uniform spreading of the property over
all the nodes does not occur in general. This is a consequence
of the conservation of total property after every update. We
illustrate this for the network in Fig. 1 with α = 0.2 in the
plot of ¯Si(t) in Fig. 2, where we observe that the steady-state
properties for each node are different. In the latter plot, we
generate ¯Si(t) by both empirically generating sample paths
based on the update rule (P1), and analytically determining
the expected property from (24).
(23)
2The left eigenvectors vL∗,k are only unit in the case where Q is symmetric.
CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS
5
Fig. 2: Comparison of instance-averaged node property obtained through
Monte Carlo simulations (dotted lines) and expected property obtained by
eigendecomposition of the matrix Q (solid lines) for the asymmetric network
in Fig. 1 with α = 0.2 under (P1). For the simulations, 5000 trials were
performed, and each timestep was discretized into 1000 sub-units. In both
cases, the initial conditions S(0) = [0 0 0 0 1] were adopted.
Fig. 3: Comparison of instance-averaged property obtained numerically (dotted
lines) and analytically (solid lines) for the asymmetric network in Fig.
1 with α = 0.2 under (P2). The simulation parameters are identical
to those in Fig. 2. In this case,
the unit steady-state left eigenvector is
[0.0016 0.0078 0.0392 0.1960 0.9798] and the unit steady-state right eigen-
vector is
[1 1 1 1 1], which gives us Ω = 1.2244 and the corresponding
consensus value cv = 0.8003.
1√
5
B. Non-conservative asymmetric networks
For networks that apply the convex update rule (P2), we
formulate the following Lemma for the stationary behavior.
Lemma 4. A strongly connected asymmetric network follow-
ing the convex update rule (P2) always achieves consensus.
n in the infinite time
The final consensus value cv = cs/
horizon is the weighted average of S(0), where the weights
are the corresponding entries of
the unit steady-state left
eigenvector vL,s, scaled by the factor 1/Ω, where Ω is the
sum of the entries in vL,s. In other words,
√
cv =
L,sS(0) .
vT
1
Ω
(25)
√
Proof: Since the row-sum of Q = −L(out)(G) is
zero, Q has a right unit eigenvector with equal components,
demonstrating that strongly connected networks with possibly
asymmetric updating always achieve agreement. In order to
determine the final consensus value, we need to determine
for each node the constant cs that corresponds to the initial
conditions enforced on the system. This involves finding the
row of A−1 corresponding with qs = 0. For an asymmetric
matrix, this corresponds to the unit steady-state left eigenvector
of Q scaled by the factor
n/Ω, since the dot product of this
vector and the unit steady-state right eigenvector must equal 1
based on the initial conditions P(0) = I = A−1A. The result
is then scaled by the magnitude of the entries of vR,s to obtain
cv.
We illustrate this for the network in Fig. 1 with α = 0.2
in the plot of ¯Si(t) in Fig. 3. In the latter plot, we generate
¯Si(t) by both empirically generating sample paths based on
the update rule (P2), and analytically determining the expected
property from (24). In this case, the final consensus value is
heavily weighted towards node 5, whose inward link weight
exceeds its outward link weight. This means that node 5 is
heavily polled by its neighbors, resulting in its higher weight
in the final consensus value. Such a trend is reminiscent of the
availability heuristic, or availability bias, where subjects that
are encountered or recalled more often are given more thought
and emphasis [30].
Fig. 4: Comparison of instance-averaged property obtained numerically (dotted
lines) and analytically (solid lines) corresponding to the symmetric network
in Fig. 1 with α = 1. The simulation parameters are identical to those in Fig.
2.
C. Symmetric networks
In a strongly connected symmetric network, the steady-state
right eigenvector has components of equal magnitude in all
dimensions regardless of the update rule. We can interpret
this as an equal sharing of resources in conservative networks
and consensus among all agents at a value corresponding to
the average of the initial conditions at all the nodes in non-
conservative networks [15], [17] -- [19]. We illustrate this for
the network in Fig. 1 with α = 1 in the plot of ¯Si(t) in Fig. 4.
In the latter plot, we generate ¯Si(t) by both empirically gen-
erating sample paths based on the update rules (P1) and (P2),
which are equivalent in this case, and analytically determining
the expected property from (24).
D. Switching topologies
There are many important scenarios where the network
topology can change over time. As an example, connections
in wireless sensor networks can be established and broken due
to mobility. In this Section, we study the steady-state behavior
of networks with switching topologies and provide a condition
that leads to convergence under dynamic topologies. Networks
with switching topologies converge if they exhibit the same
0246810121416182000.20.40.60.81TimeInstance−averaged property at each node Node 1Node 2Node 3Node 4Node 50246810121416182000.20.40.60.81TimeInstance−averaged property at each node Node 1Node 2Node 3Node 4Node 50246810121416182000.20.40.60.81TimeInstance−averaged property at each node Node 1Node 2Node 3Node 4Node 56
invariant stationary value as defined in Lemma 3 and Lemma 4,
which depend on vR,s and vL,s for (P1) and (P2) respectively.
We introduce now two classes of strongly connected, di-
rected graphs for which the weighted Laplacian shares the
left or the right eigenvector corresponding to qs = 0. For
conservative networks, we have
G(P1)
vs
= {G(V, (cid:126)E, w) : rank L(in)(G) = n − 1,
L(in)(G) × vR,s = (cid:126)0} .
For non-conservative networks, we define
G(P2)
vs
= {G(V, (cid:126)E, w) : rank L(out)(G) = n − 1,
vL,s × L(out)(G) = (cid:126)0} .
(26)
(27)
Correspondingly, we define the following sets of matrices with
equal steady-state eigenvectors as follows
M (P1)
vs
M (P2)
vs
= {Q : Q = −L(in)(G),Q × vR,s = (cid:126)0}
= {Q : Q = −L(out)(G), vL,s × Q = (cid:126)0} .
(28)
For these classes of networks, the system dynamics are de-
scribed by
¯S(t) = Qk ¯S(t) ,
(29)
vs when (P1) is applied, and Qk ∈ M (P2)
where Qk ∈ M (P1)
when (P2) is applied. The index k changes over time according
to k = f (t), f : R+ → IM , where IM is the index set of the
corresponding set of matrices.
Lemma 5. Consider a network with network dynamics as
described in (29). The networks that are strongly connected
and follow (P1) or (P2) are globally asymptotically convergent
if Qk belongs to M (P1)
, respectively.
or M (P2)
vs
vs
vs
vs
vs
or M (P2)
Proof: The proof follows from the fact that all networks
that belong to M (P1)
converge to the same invariant
quantity, as they share the same right and left eigenvector,
respectively. As all elements of M (P1)
are globally
vs
asymptotically stable, this concludes the proof.
We introduce now the distance vector δ = ¯S(t) − csvR,s.
As csvR,s is an equilibrium of the system, we can write the
distance dynamics as follows
and M (P2)
vs
δ(t) = Qkδ(t) .
(30)
vs or M (P2)
vs
We cannot make a general statement about the definiteness
of asymmetric matrices with non-positive eigenvalues. For the
matrices belonging to M (P1)
that are negative definite,
we can bound the convergence speed of the distance vector as
follows.
Corollary 3. Consider a strongly connected graph for which
the weighted in-degree or out-degree Laplacian is negative
definite. For these networks,
the distance vector globally
asymptotically converges to zero and the convergence speed
can be bounded as
(cid:107)δ(t)(cid:107)2 ≤ (cid:107)δ(0)(cid:107)2 exp(qmaxt)
(31)
where qmax = max q2(M (P1)
) for conservative networks and
vs
qmax = max q2(M (P2)
) for non-conservative networks. Here,
vs
q2 is the non-zero eigenvalue with the smallest absolute value
of the corresponding transition rate matrix.
Proof: The proof of this corollary builds on the Lyapunov
function V (δ) = 1/2δ(t)T δ(t). The first derivative can be
written as
V (δ(t)) = 1/2(cid:0)δ(t)TQT
k δ(t) + δ(t)TQkδ(t)(cid:1) ,
(32)
V (δ(t)) ≤ 0 due to the assumptions made. Using
such that
the Courant-Fischer theorem, and similar to [17], the proof is
concluded.
Remark 2. A relevant question is if it is possible to verify
if two matrices Q1 and Q2 belong to the same set M (x)
vs ,
x ∈ {P 1, P 2}. The common eigenvector problem can be
solved when the eigenvalue is not known [31], [32]. For the
special case where the common eigenvalue is equal to zero, two
matrices Q1 and Q2 have the same eigenvector corresponding
to qs = 0 if
null(Q1) = null(Q2) .
(33)
IV.
INHOMOGENEOUS EQUATIONS: STABILITY AND
CONVERGENCE
To model the exogenous addition and subtraction of property
to multi-agent networks, we extend the homogeneous equation
(A) to include an inhomogeneous term
¯S(t) = Q ¯S(t) + U(t) ,
(34)
where U is an arbitrary input vector. Since the inhomogeneous
equation (34) is linear in the exogenous input
the
exogenous input can either be constant over all sample paths or
averaged over all sample paths. Both interpretations will result
in identical instance-averaged inputs. For linear, time-invariant
systems, the system response can be derived in closed form.
Note that the solution to (A) with initial conditions of the
network state S(0) is given by ¯Sh(t) = exp(Qt)S(0). It can
be shown that the general solution to (34) is given by [25]
term,
(cid:90) t
¯S(t) = ¯Sh(t) +
exp(Q(t − τ ))U(τ )dτ.
(35)
0
This can be interpreted as the sum of the solution to (A) and
the convolution of the input U with the impulse response to
(34) for every node in the network.
We now discuss several important use cases for the input
vector U and show that many scenarios can be described
as in (34). In particular, we will demonstrate that networks
containing stubborn agents [15] and networks with dynamic
learning [19] can both be expressed in the form of the
inhomogeneous governing equation with constant and dynamic
U respectively. This motivates the study of stability and
convergence in the presence of exogenous inputs.
A. Non-conservative networks with static inputs
Adopting the definition in [15], as well as the consensus
update rule (P2), a stubborn agent does not adjust its own
value based on the values of neighboring nodes. This scenario
is of interest to model opinion dynamics where a set of agents
has constant opinion. In these networks, the out-degree of a
stubborn agent is zero and the corresponding row of Q is a
zero-row.3 For example, in the presence of two stubborn agents
3Conversely, if the in-degree of an agent equals zero, the node acts as a
sink, which can receive property from every neighbor but does not contribute
to his neighborhood. This case, where Q contains a zero column, does not
lead to a convenient reduction of the state space.
CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS
7
a1 = 2 and a2 = n, the governing equation can be written as
follows
...
¯Sn
¯S1
=
Q(cid:48)
=
0
···
Q1,1 Q1,2 ··· Q1,n
0
0
Q3,1 Q3,2 ··· Q3,n
...
...
...
...
···
0
0
¯S(cid:48)
0
which can be reformulated as
1,1 Q(cid:48)
...
...
Q(cid:48)
n−2,1 Q(cid:48)
n−2,2 ··· Q(cid:48)
··· Q(cid:48)
...
...
¯S(cid:48)
n−2
1,2
1
1,n−2
...
n−2,n−2
...
+
...
Bk,a1 Bk,a2
...
...
...
¯Sn
¯S1
,
¯S(cid:48)
...
(cid:20) ¯Sa1¯Sa2
¯S(cid:48)
(cid:21)
n−2
1
,
(36)
(37)
ii ≤(cid:80)
According to Gersgorin's circle theorem, all eigenvalues of
Q(cid:48) reside in the complex plane within the union of the disks
Di = {z ∈ C : z − Q(cid:48)
ij} , 1 ≤ i ≤ n(cid:48) with
ij for a strictly
j(cid:54)=i Q(cid:48)
n(cid:48) the dimension of Q(cid:48). As Q(cid:48)
diagonally dominant matrix, Q(cid:48) cannot have a zero eigenvalue
and is invertible.
ii >(cid:80)
j(cid:54)=i Q(cid:48)
From Lemma 6, we notice that for networks with stubborn
agents the eigenvalues will on average be more concentrated
around Q(cid:48)
ii, which can accelerate the network dynamics. For
the convergence of a BIBO-stable reduced system involving
Q(cid:48) with the conditions of Lemma 6 satisfied, we formulate
the following Lemma.
.
Lemma 7. Let Bu
= b. If each agent is connected to at
least one stubborn agent, then the network state converges to
¯S(cid:48)∗ = −Q(cid:48)−1b. We can then express the system dynamics as
a homogeneous equation in the deviation of the property of a
node from its steady state ¯S(cid:48)
∆ = ¯S(cid:48) − ¯S(cid:48)∗:
∆(t) .
¯S(cid:48)
∆(t) = Q(cid:48) ¯S(cid:48)
(41)
∆
∆ (cid:54)= (cid:126)0
∆ Q(cid:48) ¯S(cid:48)
V = ¯S(cid:48)T
∆ Q(cid:48)T ¯S(cid:48)
Proof: The proof of this Lemma follows from traditional
convergence results similar to those for the basic consensus
algorithm [15], [17] -- [19] since the inhomogeneous equation
in ¯S(cid:48) can be expressed as a homogeneous equation in ¯S(cid:48)
∆(t)
and the poles of Q(cid:48) lie in the open left-half complex plane.
Global asymptotic stability can be demonstrated for sym-
metric Q(cid:48) by using the standard Lyapunov function V =
¯S(cid:48)
¯S(cid:48)T
∆. In this case, we obtain
∆ + ¯S(cid:48)T
∆ < 0 ∀ ¯S(cid:48)
since Q(cid:48) and thus its transpose are negative definite. This
demonstrates that
the equilibrium point of the network is
globally asymptotically stable, and the location of the point
can be obtained by setting ¯S(cid:48)
The Lyapunov function above does not hold for nonsymmet-
ric Q(cid:48). However, because Q(cid:48) is strictly diagonally dominant,
the existence of a Lyapunov function for Q(cid:48) can be demon-
strated to prove the global asymptotic stability of ¯S(cid:48) [33]. One
such Lyapunov function is V = maxi ¯S(cid:48)
∆,i, which proves the
global asymptotic stability of ¯S(cid:48).
in the general case of conservative or non-
conservative updating without stubborn agents, Q is con-
structed such that it has a steady state eigenvalue qs = 0. As
a consequence, Q is not invertible. If Q (or Q(cid:48)) is singular,
then BIBO stability is no longer guaranteed, and the system
is instead only marginally stable.
Lemma 8. A non-trivially convergent network where qs = 0
exists, diverges in infinite time in the presence of a constant
input vector b.
Note that
∆ = (cid:126)0.
Proof: Consider the convolution integral in (35). Since
Q is not invertible, we perform the convolution integral by
expanding the matrix exponential in a power series and per-
forming an eigendecomposition of Q. Then, since the steady-
state eigenvector does not decay with time, the integral does
not converge in infinite time.
B. Non-conservative networks with dynamic inputs
(40)
In the case of dynamic learning, each node updates its own
value based on the value of its neighboring nodes, as well
where Bk,a1 and Bk,a2 are the a1-th and a2-th columns of Q
with the a1-th and a2-th entries omitted. The entries of these
columns depend both on the network structure and the update
profile, and we get
¯S(cid:48)(t) = Q(cid:48) ¯S(cid:48)(t) + Bu ,
(38)
where ¯S(cid:48) and Q(cid:48) represent the reduced state space and reduced
transition rate matrix, and u = [ ¯Sa1 ··· ¯San ]T contains the
static quantities of the stubborn agents. We notice from (38)
that the presence of the stubborn agents in the network leads to
a reduction of the state space and a formulation equivalent to
(34) with constant but possibly different inputs for different
stubborn nodes, and U = Bu. The reduced state space
excludes the stubborn agents and the reduced transition rate
matrix excludes the rows and columns corresponding to these
agents. Note that the inhomogeneous equation (34) with static
inputs corresponds to typical open-loop control systems.
Since the input vector U is constant,
is known that
bounded-input bounded-output (BIBO) stability of (38) is
guaranteed iff all eigenvalues of Q(cid:48) have negative real com-
ponents. In addition, since Q(cid:48) is constructed differently from
Q, the convergence of the homogeneous and inhomogeneous
systems is not identical. Define Ist = {i : ¯Si(t) is constant}
as the index set of stubborn agents. Then, we can write
Qij, and the row sum
of Q(cid:48) satisfies
Qii = −(cid:80)
j(cid:54)=i,j /∈Ist
j(cid:54)=i,j∈Ist
it
Q(cid:48)
ij ≤ 0 .
(39)
Qij −(cid:80)
(cid:88)
Q(cid:48)
ii +
j(cid:54)=i
As a consequence, Q(cid:48) does not have a zero eigenvalue in
general and is nonsingular in general. In the following Lemma,
we provide a condition that guarantees the non-singularity of
Q(cid:48).
Lemma 6. In a network with stubborn agents, the transition
rate matrix Q(cid:48) of the reduced state space is invertible if all
nodes are connected to at least one stubborn agent.
Proof: If each agent is connected to at least one stubborn
agent, Q(cid:48) is strictly diagonally dominant and we can write
(cid:88)
j(cid:54)=i
Q(cid:48)
ii +
Q(cid:48)
ij < 0 .
8
as the difference of its own value with a measurement of the
system state [19], which can be interpreted as a reference input
for the node. This scenario is of interest to model tracking
systems that are augmented with the information present in
the neighborhood. This can be represented by the following
update rule
(cid:88)
Si(t+∆t) = Si(t)+
Cij(Sj(t)−Si(t))+β(t)(Xi(t)−Si(t)) ,
(42)
where Xi(t) represents the measurement of node i at time t.
If the measurement of each node is made at a rate ρ, then the
corresponding governing equation is
j(cid:54)=i
¯S(t) = (Q − β(cid:48)I) ¯S(t) + β(cid:48)X(t) ,
(43)
where β(cid:48) = βρ, and where rij = ρ in the construction
of Qij. This is again reminiscent of (34) with time-varying
U = β(cid:48)X(t). The inhomogeneous governing equation with dy-
namic reference inputs corresponds directly to typical closed-
loop proportional control systems with reference input X and
proportional gain β(cid:48).
Analogous to the case of systems with stubborn agents
above is the BIBO stability criteria for the system with
dynamic learning and constant β(cid:48):
iff all eigenvalues of
QD = Q − β(cid:48)I have negative real components, then an input
β(cid:48)X(t) that is bounded for all time t > 0 will result in BIBO
stability. In addition, we formulate the following Lemmas for
the convergence of a BIBO stable dynamic learning system
with constant β(cid:48).
Lemma 9. If QD is invertible and limt→∞ X(t) = X∗
for some real-valued constant X∗,
then the network state
converges to ¯S∗ = −QD
−1β(cid:48)X∗.
Proof: The proof of this Lemma is analogous to the proof
of Lemma 7.
Remark 3. If Q corresponds to a CTMC and β(cid:48) > 0, then the
eigenvalues of QD are exactly β(cid:48) less than the eigenvalues of
Q, and the resultant system is guaranteed to be BIBO stable,
provided β(cid:48) takes the same value for all agents.
In the more general case where X(t) is not an independent
measurement, but a function of ¯S∆, we can formulate the
following Lemma.
Lemma 10. If ¯S∆ reaches equilibrium much faster than X,
X(t) ≈
then we can approximate
h(X, 0) for any arbitrary function h and regardless of whether
X eventually converges. The time evolutions of ¯S∆ and X
can then be approximated as independent even if they were
originally coupled.
X(t) = h(X, ¯S∆) as
Proof: This Lemma follows directly from the moving
equilibrium theorem.
C. Dynamic non-reference inputs
Consider the following variation of (43)
¯S(t) = Q ¯S(t) + U(t) ,
(44)
where U(t) is some arbitrary time-varying input vector and
Q can be used to described a CTMC. The inhomogeneous
governing equation with dynamic non-reference inputs cor-
responds to typical open-loop control systems. Since Q is
singular, the system is only marginally stable and not BIBO
stable. A marginally stable system is known to give a bounded
output if its input is an impulse of finite magnitude. By the
principle of superposition, a continuously finite input
that
eventually decays to zero will also give a bounded output.
D. Expanded state space
(cid:88)
j(cid:54)=i
Consider the following variation of (42)
Si(t+∆t) = Si(t)+
Cij(Sj(t)−Si(t))+β1(Xi(t)−Si(t))
+ β2( Xi(t) − Si(t)) + β3(Yi(t) − Ti(t)) ,
(45)
where Yi(t) = Xi(t) and Ti(t) = Si(t). This leads us to the
coupled equations
¯T (t) = ¯S(t) ,
2) ¯S(t) = (Q − β(cid:48)
1
(1 + β(cid:48)
I) ¯S(t) − β(cid:48)
¯T (t)
X(t) + β(cid:48)
3
+ β(cid:48)
1X(t) + β(cid:48)
2
3Y (t) ,
(46)
(47)
1
3
2
1
3Y (t) .
= (β(cid:48)
1 = β1ρ, β(cid:48)
2 = β2ρ and β(cid:48)
where β(cid:48)
3 = β3ρ. The inhomogeneous
governing equation with an expanded state space corresponds
to typical closed-loop proportional,
integral and derivative
(PID) control systems. Here, β1, β3 and β2 correspond to P,
I and D controls respectively. The expanded state space now
includes the components of both S and T , and we can write
this as a single relation
2)I ¯T (t) + (β(cid:48)
(1 + β(cid:48)
I − Q) ¯T (t) + β(cid:48)
= β(cid:48)
Y (t) + β(cid:48)
I ¯T (t)
Y (t) + β(cid:48)
2s2+β(cid:48)
3)(cid:2)(1 + β(cid:48)
(48)
Performing a Laplace transform and then rearranging, we
obtain
¯S
,
X
(49)
where the hat above a quantity denotes a Laplace-transformed
quantity. The stability of this system is determined by the
roots of the characteristic polynomial of the system, which
can be obtained from the determinant of the matrix QE =
I(cid:3). From standard state-space
(cid:2)(1 + β(cid:48)
I − Q)s + β(cid:48)
I − Q)s + β(cid:48)
2)Is2 + (β(cid:48)
I(cid:3)−1
1s+β(cid:48)
2)Is2 + (β(cid:48)
theory, if all the poles of the system, or the roots of the
characteristic polynomial of QE,
lie in the open left-half
complex plane, then the system is BIBO stable. If at least
one of the poles lies on the complex axis, then the system
is instead marginally stable. Depending on the values of β(cid:48)
1,
2 and β(cid:48)
β(cid:48)
3, the convergence of a BIBO stable system can be
derived. For example, if β(cid:48)
3 = 0, we recover the results
3 (cid:54)= 0, the final value
of Lemma 9; on the other hand, if β(cid:48)
theorem tells us that taking the limit s → 0 of s ¯S gives us the
steady state value ¯S∞ = X∞.
2 = β(cid:48)
1
3
1
3
V. CONTROL BY EXOGENOUS EXCITATION
Whereas we studied in Section IV the convergence and sta-
bility under exogenous inputs, we demonstrate in this section
how the rates of property diffusion can be controlled through
appropriate design of a generic time-varying input vector U(t).
CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS
9
A. Using inputs for targeted control
We first establish a methodology for decomposing the
existing system dynamics into a more convenient form for
targeted control of individual system modes. We summarize
this decomposition, as well as the subsequent reconstruction
for implementation in real networks, in Algorithm 1.
Algorithm 1 Implementing inputs for targeted control
1: Transform basis of nodes to quasi-node space using char-
acteristic eigenvectors as in (50)
2: Perform a Laplace transform of the system to move into
the frequency domain
3: if implementation of external controllers is feasible then
Implement controllers on one or more quasi-modes to
4:
achieve control objective
5: else
6:
domain
Design quasi-inputs by incorporating controller action
on one quasi-mode
7: end if
8: Perform an inverse Laplace transform back into the time
9: Transform quasi-nodes back to node space to obtain de-
sired node inputs or system dynamics
S(0)
¯S
+
U
−
¯S
1
s
−Q
Fig. 5: Block diagram for the inhomogeneous equation (34). The hat above a
quantity denotes a Laplace-transformed quantity.
Figure 5 demonstrates that (34) together with initial con-
ditions S(0) can be expressed as a block diagram with a
feedback loop. It is possible to separate the effects of the
initial conditions and the external input, which is illustrated
in Fig. 6 for clarity. In what follows, we study the effects of
modifying the lower branch in Fig. 6 related to the exogenous
input without influencing the upper branch. We consider here
S(0)
s(sI − Q)−1
U
(sI − Q)−1
¯S
+
+
Fig. 6: Simplified block diagram for (34).
the case where the system has exactly n distinct eigenvalues
and eigenvectors. We use the decomposition in (23) and rewrite
(34) as
A−1 ¯S = ΛA−1 ¯S + A−1U ,
(50)
which corresponds to performing a basis transformation by
taking linear combinations of the various nodes. Under this
transformation, we obtain quasi-modes with quasi-property si,
as well as corresponding quasi-inputs ui that are each acted
upon by a single eigenvalue qi of Q. The time evolution for
this transformed system is illustrated in Fig. 7.
si(0)
ui
s
s − qi
1
s − qi
¯si
+
+
Fig. 7: Simplified block diagram for the inhomogeneous transformed govern-
ing equation for a single quasi-mode with quasi-property ¯si = qi ¯si + ui.
The tilde above a quantity and its lower case denote a quantity in quasi-node
space.
After applying the basis transformation, we can tune the
quasi-modes individually to achieve the desired control objec-
tive using one of the two following approaches. We can either
design a controller acting on one or more of the quasi-modes
to steer the system response, or modify the quasi input such
that it incorporates the controller action. In the first approach,
we design a closed-loop feedback control block to adjust the
system response to different input signals. These include the
implementation of filters and lead-lag compensators to modify
the frequency and phase responses. Conversely, we can design
i = u(cid:48)(ui) for all quasi-modes i in order
the quasi-input u(cid:48)
to bring the quasi-outputs to their desired values. This open-
loop approach could be convenient in scenarios where perfect
measurements of the system state are difficult to make and the
effects of system noise are not significant. We illustrate this
with a simple example in Fig. 8. Suppose we wish to mimic
proportional or integral closed-loop control on the quasi-input
uy corresponding to quasi-mode y using a feedback block F
with transfer function K or K/s respectively, where K ∈ R.
We then subsume the control loop into a quasi-input using the
Laplace-transformed relation
u(cid:48)(ui) = ui
s − qy
(51)
s − qy + F
,
which makes the two block diagrams in Fig. 8 equivalent.
Note that the controller design here is only performed on a
single quasi-mode y. Yet, the quasi-inputs of all the other
quasi-modes must be transformed using (51), since all the
quasi-modes are subject to the same external input. The main
advantage of the proposed method lies in the possibility to
isolate parts of the system and separately adjust the response
times of the different modes without a physical controller.
uy
−
¯sy
1
s − qy
F
u(cid:48)(uy)
¯sy
1
s − qy
Fig. 8: Block diagrams for quasi-mode y for the original control loop (left) and
when the loop is subsumed into the Laplace-transformed quasi-input u(cid:48)(ui)
(right).
Remark 4. Note that it is possible to account for the case
where some of
the n eigenvalues are degenerate as long
as Q is diagonalizable. In the event that the algebraic and
geometric multiplicities of each of the degenerate eigenvalues
are identical, we can use the same transformation as above,
except that some of the quasi-modes corresponding to the
same eigenvalue, yet different eigenvectors, will have the same
transfer function 1/(s − qi). The situation becomes more
sensitive when Q is defective. In this case, we have to consider
10
the generalized eigenspace of the matrix instead. Using the
generalized eigenvector decomposition of Q, we obtain a
complete basis of n orthogonal generalized eigenvectors, and
Q can be diagonalized in the block Jordan form. Suppose
we have a Jordan block involving nodes z and z + 1. Then,
¯sz = qz ¯sz + ¯sz+1 + uz.
B. Case study for external control
0.5
1
4
1
1
0.5
0.5
1
1
2
3
0.5
Fig. 9: Asymmetric cycle graph C4,a.
(cid:113) 1
(cid:113) 1
To illustrate how external control on a single quasi-mode
can be implemented by quasi-input design, we consider a
simple case study of four nodes in an asymmetric cycle graph
configuration, as shown in Fig. 9. In this case, the eigenvalues
of the associated Q are {q1, q2, q3, q4} = {−3,−2,−1, 0}, and
there are no degeneracies.
tors are 1
Under
−(cid:113) 2
5
(cid:2) 1
the
corresponding unit
(P1),
2 [ −1 1 −1 1 ],
2 1(cid:3) respectively. Based on the unit steady-state
right
eigenvec-
2 [ 0 −1 0 1 ], and
2 [ −1 0 1 0 ],
1
2 1
5
1
2
(cid:3),
(cid:113) 2
(cid:113) 1
(cid:2) −1
eigenvector, we observe that the network on average tends
to accumulate property at nodes 2 and 4 while depleting the
property of the other nodes. This motivates us to consider
the control objective of maintaining property at nodes 1
and 3 during the transient period to reverse the steady-state
asymmetry.
2 −1
Under
(P2),
1
the corresponding unit
2 [ 1 0 −1 0 ],
right eigenvectors
2 [ 0 −1 0 1 ] and
are
2 [ 1 1 1 1 ] respectively. Based on the network structure, we
1
observe that
the network allocates higher weights to the
quantities at nodes 2 and 4, which affects the calculation of
the final consensus value. This motivates us to consider the
control objective of increasing the weight of nodes 1 and 3
during the transient period to increase their influence on the
system.
(cid:113) 1
For either update protocol, it is sensible to excite nodes 1
and 3 in order to achieve the control objective. Since each
quasi-mode is associated with a single pole, the net effect of
the quasi-mode plant resembles the integration of the input, so
we inject a unit impulse δ(t) into nodes 1 and 3 at t = 0, and
then apply control to displace the poles and achieve step-like
outputs. The injection is equivalent to a Laplace-transformed
(cid:113) 5
input U = [1 0 1 0]. By performing the aforementioned basis
transformation on U, we obtain the equivalent quasi-inputs
(cid:113) 5
3 , 0, 0,−2
18} for the conservative
{u1, u2, u3, u4} = {− 4
network and {u1, u2, u3, u4} = {−2
3} for the non-
18 , 0, 0, 2
conservative network. Note that quasi-modes 2 and 3 generate
zero quasi-inputs in both cases due to the asymmetrically
designed input [1 0 1 0]. Hence, from here on, we will only
consider the quasi-modes 1 and 4 with non-trivial quasi-inputs
for this particular case study. Figure 10 illustrates the block
diagrams for these two quasi-modes in the s-domain, along
with possible closed-loop control blocks H1 and H4.
u1
−
¯s1
1
s + 3
H1
u4
−
¯s4
1
s
H4
Fig. 10: Block diagrams for quasi-modes 1 (left) and 4 (right) of the system
illustrated in Fig. 9, with corresponding Laplace-transformed quasi-outputs ¯s1
and ¯s4. The controllers H1 and H4 represent a feedback control block.
(cid:113) 5
we obtain the following results:
1) No control: In the absence of controllers (H1 = H4 = 0),
Under (P1), we obtain the quasi-outputs ¯s1 = − 4
3 e−3t
and ¯s4 = −2
18. After transforming the quasi-outputs back
into node space, we obtain ¯S1 = ¯S3 = 1
3 (1 + 2e−3t)
for the instance-averaged properties of nodes 1 and 3, and
¯S2 = ¯S4 = 2
3 (1 − e−3t) for the instance-averaged properties
of nodes 2 and 4.
18 e−3t
3 (1 +
(cid:113) 5
3, which then correspond to ¯S1 = ¯S3 = 1
Under (P2), we obtain the quasi-outputs ¯s1 = −2
and ¯s4 = 2
2e−3t), and ¯S2 = ¯S4 = 1
3 (1 − e−3t).
In both cases, the settling time of the outputs to their steady-
state values is 1/3. We can adjust this settling time using
proportional control.
2) Proportional control: We perform proportional control
on quasi-mode 1 by replacing H1 with a fixed constant. We
illustrate the resultant outputs for some constants H1 in Figures
11a and 11b for the conservative and non-conservative cases.
By decreasing H1 towards −3, we can delay the onset of the
steady state, but we also increase the influence of the inputs
on the system by increasing the total system input.
3) Integral control: In standard control theory, proportional
control is associated with a steady-state error relative to the
input. This causes the outputs to be maintained at a non-zero
level long after the impulses have ended. Integral control elim-
inates this error and further forces the steady outputs to zero at
infinite time. We verify this possibly useful behavior in Figures
12a and 12b for the conservative and non-conservative cases
by performing integral control on quasi-mode 1. The transient
actions neither influence the total steady-state property in a
conservative system nor the steady-state consensus value in
a non-conservative system. However, the magnitude of the
integral gain can influence the speed of onset of the steady
state.
4) Conclusions on external control: We have demonstrated
that by varying the input functions appropriately, both the
transient and steady-state perturbations to the system can be
modified. By careful design cognizant of the characteristic
timescales of the system, the timescales of the perturbations
can be varied. In addition, the perturbations can be designed
with either permanent or temporary effects on the system
depending on the objectives of the network designer.
C. Network classification
Section V-B illustrated that both the external
input and
the structure of the quasi-modes in the system influence the
CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS
11
(a) Erdos-R´enyi (random graph)
(b) Albert-Barab´asi (scale-free)
(c) Watts-Strogatz (small-world)
Fig. 13: Histograms of Fiedler vector entries for a single instance of various random networks with 400 nodes using the CONTEST toolbox [34].
in Fig. 13 to illustrate their varying distributions. We observe
that the spread of the Fiedler vector entries increases with
the average network clustering coefficient. Since small-world
networks tend to have Fiedler vector entries with a larger
spread, inputs to small-world networks can affect different
nodes to different extents. The input design considerations for
small-world networks have to ensure that specific nodes are
targeted to achieve the desired control objective.
(a) Conservative protocol
(b) Non-conservative protocol
Fig. 11: Resultant outputs for different H1 for the two network update
protocols by mimicking proportional control on quasi-mode 1. The solid lines
indicate the time evolution of properties at nodes 1 and 3, while the dashed
lines indicate the time evolution of properties at nodes 2 and 4.
VI. CONTROL BY STRUCTURE MODIFICATION
Instead of controlling the network dynamics by means of
exogenous excitation, we present in this section two methods
to steer the dynamics by modifications in the network structure.
A. Network structure modification through design
Instead of controlling the system with an exogenous input
term, we can also modify the network structure directly to
achieve control. Modifying the network structure may be
preferable to introducing external excitations in systems where
it is more convenient to modify the interactions between agents
than to introduce or remove property from agents. Through this
modification, we can shift both the eigenvalues and the eigen-
vector components, thereby changing the system dynamics as
well as its steady-state distribution. In particular, modifying
the network links causes changes in both the transformation
basis between node space and quasi-node space, as well as the
characteristic timescales of each system mode.
By modifying the links more carefully, we can achieve
modification of the characteristic timescales without reshaping
the transformation basis. Recall that Q = AΛA−1 if it is
diagonalizable. Apart from decomposing Q into the matrices
A, Λ and A−1, we can also reconstruct Q by multiplying A,
Λ and A−1 together in the appropriate order. By holding A
constant and modifying the entries of Λ, we can achieve a
modification in Q without affecting the composition of the
system modes. The stability of the new eigenvalues of the
modified Q will determine if the modified Q continues to
represent a CTMC described by (A). In this respect, as long
as qs = 0 is preserved, the modification of Q will result in a
CTMC where the columns or rows sum to zero for conservative
and non-conservative networks, respectively.
Remark 5. We note that this approach of network structure
modification through design can be extended to more com-
plex systems. In particular, consider the distributed control
(a) Conservative protocol
(b) Non-conservative protocol
Fig. 12: Resultant outputs for different H1 for the two network update
protocols by mimicking integral control on quasi-mode 1. The solid lines
indicate the time evolution of properties at nodes 1 and 3, while the dashed
lines indicate the time evolution of properties at nodes 2 and 4.
resultant system outputs. The variance in the individual entries
of the eigenvectors corresponding to the activated quasi-modes
influence the effects of the external input on the individual
nodes. For example, an external input on a single node in a
network where the activated quasi-modes have low variances in
their eigenvector entries tends to influence all other connected
nodes to the same extent; conversely, the same input in a
network with quasi-modes with large variances may have
different effects on different nodes.
We provide a simple example here to illustrate this point.
It is generally accepted that the eigenvector associated with
the non-zero eigenvalue of the Laplacian with the smallest
absolute value, the Fiedler vector, provides a reasonable basis
for spectral graph partitioning [35]. We plot histograms of the
entries of the Fiedler vector for different classes of networks
−0.500.5050100150200250300350400Unit Fiedler vector entryCount−0.500.5050100150200250300350400Unit Fiedler vector entryCount−0.500.5050100150200250300350400Unit Fiedler vector entryCount00.511.522.5300.10.20.30.40.50.60.70.80.91TimeInstance−averaged property at each node H1=2H1=1H1=0H1=−100.511.522.5300.10.20.30.40.50.60.70.80.91TimeInstance−averaged property at each node H1=2H1=1H1=0H1=−10246810−0.200.20.40.60.81TimeInstance−averaged property at each node H1=1/sH1=5/s0246810−0.200.20.40.60.81TimeInstance−averaged property at each node H1=1/sH1=5/s12
2
1
1
4
1
1
1
1
1
3
1
1
5
2
0.9
0.9
4
0.9
0.9
1
0.9
0.9
3
0.9
0.9
5
0.025
2
4
0.025
0.025
0.025
0.025
3
5
0.025
Fig. 14: Star graph S5 with symmetric links of unit weights.
Fig. 15: The superposition of these two graphs yields the network structure
corresponding to the modified transition rate matrix given in (53).
system [36]
D
¯T = Q(β(cid:48)
(52)
for some arbitrary gains β(cid:48)
I. Here, modifications
to Q will also influence the dynamics of the system. However,
the key governing parameters are no longer the eigenvalues
qk of Q, but instead the roots of the characteristic polynomial
¯T + β(cid:48)
P and β(cid:48)
¯T + β(cid:48)
D, β(cid:48)
¯T ) ,
P
I
DQ) − s(β(cid:48)
PQ) − β(cid:48)
To illustrate how we can modify the eigenvalues of a
network to achieve a shift in the system response, we consider
a symmetric star network depicted in Fig. 14. The transition
rate matrix Q corresponding to this network is
of the matrix(cid:2)s2(I − β(cid:48)
Q =
IQ(cid:3).
.
−4 1
1
1 −1 0
1
1
1
1
0
0 −1 0
0
0
1
0
0
0 −1 0
0 −1
0
The eigenvalues of this matrix are 0 with multiplicity 1,
−5 with multiplicity 1 and −1 with multiplicity 3. The
corresponding eigenvectors are the steady-state eigenvector
describing equilibration between all the nodes ([ 1 1 1 1 1 ]),
an eigenvector describing diffusion between the peripheral
nodes and the central node ([ −4 1 1 1 1 ]), and eigenvectors
describing diffusion among the peripheral nodes ([ 0 1 1 1 −3 ],
[ 0 0.36 1 −1.36 0 ] and [ 0 −1.36 1 0.36 0 ]). Suppose we want to
slow down diffusion between the peripheral nodes and the
central node. We can do so by decreasing the effective update
rate of this mode, which causes the relative importance of
diffusion among the peripheral nodes to increase and results in
extra links facilitating this diffusion. For instance, by changing
the effective update rate of the peripheral-central mode from
5 to 4.5, we obtain the following transition rate matrix
.
(53)
Q =
−3.6
0.9
0.9 −0.975 0.025
0.9
0.9
0.9
0.9
0.9
0.025
0.025 −0.975 0.025
0.025
0.025
0.9
0.025
0.025
0.025 −0.975 0.025
0.025 −0.975
0.025
In the resultant architecture, the links between the central node
and the peripheral nodes have weights of 0.9 instead of 1, and
the links between the peripheral nodes have weights of 0.025
instead of 0. The corresponding network is a superposition of
the two graphs depicted in Fig. 15.
In sufficiently large systems,
B. Network structure modification through adaptive control
it can be computationally
intensive to perform the eigendecomposition of various Q
matrices in order to determine the network structure that gives
the most desirable system response. There are two possible
approaches to handle this issue. Firstly, one can choose from a
(cid:21)
(cid:20)(cid:90) ∞
set of matrices that deviate from the original Q by small per-
turbations δQ. The eigenvalue and eigenvector perturbations
can be derived as a function of δQ for sufficiently small δQ.
However, this limits us to small modifications in the network
structure that do not span the feasible action space.
It is possible to examine larger and/or more modifications
without going through the computational complexity by per-
forming adaptive control driven by reinforcement learning. In
this approach, we formulate the problem as an MDP. The state
space X of the MDP is equivalent to the node space of the
network, while the action space W of the MDP is equivalent
to the set of possible Q that the network can adopt. More
formally, X = V, while W = {Q1, . . . ,Qw∗} for w∗ different
actions. In essence, the MDP is a direct extension of the CTMC
upon which the governing equation of the network diffusion is
based.4 By selecting a reward function R(X, W ) that describes
the desirability of action W given that the system is in state
X, and by scheduling decisions to be made immediately after
a change in the state of the system5, the MDP is completely
defined. We can determine the conditions for optimality in the
MDP by searching the policy that yields the optimal expected
reward integrated over time
,
0
EX(0),W (0), sample paths
γtR(X(t), W (t))dt
(54)
where γ ∈ (0, 1) denotes a discount rate. By considering
(A) and (54) simultaneously, we obtain the Hamilton-Jacobi-
Bellman equation for the system. In optimal control theory,
this equation is solved to obtain the optimal policy for the
system. For large state and/or action spaces, this solution can
be difficult to obtain. For a more computationally manage-
able approach, we turn to reinforcement learning to deter-
mine a suboptimal solution with sufficiently fast convergence.
For each state-action pair (X, W ), we store a quality value
V Q(X, W ), and update V Q(X, W ) based on the Q-learning
method [26]
(cid:104)
k+1(X, W ) = (1 − µ)V Q
V Q
+ µ
k (X, W )
W (cid:48) R(Xnext, W (cid:48)) + γ max
max
W (cid:48) V Q
(cid:105)
k (Xnext, W (cid:48))
,
(55)
where k is the index indicating the k-th change of the system
state, µ ∈ (0, 1] is the learning rate of the algorithm, and Xnext
is the next state of the system. Whenever the system transitions
to a new state, a new action has to be selected. We set up the
system such that with probability , the system selects the
action with the highest quality given its current state, while
with probability 1 − , the system selects a random action.
4A MDP with a single action is equivalent to a CTMC.
5This means that the variation of the active action W (t) with time is a
piecewise constant function.
CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS
13
each last known Qg such that Qgv0 = 0 and(cid:80)
Qg. Using the reinforcement learning parameters µ = 0.2,
= 0.4 and γ = 0.995, we run each simulation for 5E6 time-
steps, following which we find the steady-state eigenvector
(normalized to sum to 1), or stationary distribution, v0 for
i v0(i) = 1. In
Fig. 16, we demonstrate using the time evolution of V Q(1, W )
for 5 different actions W that the learning curve has reached
convergence. In Fig. 17, we plot the last known stationary
distribution v0(i) over all the states i averaged over the 100
trials, and demonstrate that the MDP is, on average, able to
modify the stationary distribution of the system after sufficient
time has elapsed by careful design of the reward function.
In this case, we guided the system to favor nodes 12 and
14 by modifying the network structure, analogous to how we
modified the system steady state in Section V-B through the
injection of appropriate external inputs. This MDP methodol-
ogy can either be used online to allow the network to respond
to time-varying objectives, or offline to cycle through various
network possibilities with reduced computational complexity.
Fig. 16: Time evolution of quality V Q(1, W ) of node 1 for 5 different actions
W for a single trial.
VII. CONCLUSION
In this work, we proposed a probabilistic framework that
describes diffusion in multi-agent networks and allows for
a variety of inter-agent update rules. We focused on two
protocols where the total network quantity is conserved (con-
servative protocol) or variable (non-conservative protocol). By
including the possibility of asymmetric updates, non-unitary
links and switching topologies, we examined the stability and
convergence characteristics of generic networks, and described
their transient and steady-state dynamics in detail. In addition,
we modeled external influences on networks by considering an
inhomogeneous form of the governing equation. As such, the
framework has the potential to capture the presence of stubborn
agents and the process of dynamic learning. Furthermore, we
demonstrated the ability to achieve control of diffusion in these
networks using either external excitation or modification of the
network structure. For the former, we showed that the form of
the external excitation and the network structure are crucial to
the characteristics of the controlled output, and for the latter,
we identified an algorithm involving reinforcement learning
for an MDP to promote quick achievement of the control
objective. Through these techniques, we enable the possibility
of actuating individual nodes and steering the system steady
state towards some desired control objective, thereby allowing
for the micromanagement of diffusion in networks.
Our future work to extend the current toolbox will include
more direct applications to large random networks. In addition,
we intend to include time-inhomogeneous and stochastic gov-
erning equations, and to extend the framework to continuous
node spaces. Another important extension of this work is to
develop more insight
in the higher order moments of the
property.
REFERENCES
[1] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of
mobile autonomous agents using nearest neighbor rules," IEEE Trans.
Automat. Contr., vol. 48, no. 6, pp. 988 -- 1001, 2003.
[2] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip
algorithms," IEEE Trans. Inform. Theory, vol. 52, no. 6, pp. 2508 -- 2530,
2006.
Fig. 17: Stationary probability distribution of the simulated network averaged
over 100 trials. The nodes marked red are the two randomly selected nodes
(12 and 14) that were assigned a reward on every visit by each MDP.
This is known as the -greedy policy where is the exploitation
probability of the system. By selecting appropriate values of µ,
γ and , as well as an appropriate reward function R(X, W ),
we can design the learning process to achieve predefined
system objectives at a suitable convergence rate.
To illustrate the use of an MDP to select a desirable Q
in a large network, we set up a state space X containing 20
agents, and we set up the action space W by generating 400
Q matrices corresponding to 400 complete graphs whose links
each have weights sampled from a uniform distribution on
[0, 1], to simulate 400 different random network configurations.
These matrices obey the conservative relation (13), which
obeys the update rule (P1). In addition, we select 2 arbitrary
nodes (12 and 14) out of the 20 to serve as target nodes for our
system. We let the state transitions of the MDP be governed
by a grand system transition matrix Qg. Whenever a state
transition occurs, we assign a reward of 5 whenever the state
coincides with 1 of these 2 target nodes, and a reward of 0
otherwise, in order to encourage the system to visit these states
more often. The MDP then selects an action, following which
Qg is updated based on this selected action. For example, if
the updated state of the system is node 5 and action 20 is
selected, then the 5th column of Qg is replaced by the 5th
column of Q20 corresponding to the 20th action.
For this work, we ran 100 independent numerical simula-
tions describing the time evolution of 100 MDPs with the same
state and action spaces, but with different initial states and
012345x 106050100150200250TimeVQt(1,W) Action 1 Action 21 Action 41 Action 61 Action 81246810121416182000.010.020.030.040.050.060.070.080.090.1NodeAverage stationary probabilitycontrol in mobile networks," IEEE Trans. Automat. Contr., vol. 53,
no. 8, pp. 1972 -- 1975, 2008.
[25] M. Dahleh, M. A. Dahleh, and G. Verghese, "Lectures on dynamic
systems and control," 2004.
[26] A. G. Barto and R. S. Sutton, Reinforcement learning: An introduction.
MIT Press, 1998.
[27] R. Olfati-Saber and R. M. Murray, "Consensus protocols for networks
of dynamic agents," in Proc. Amer. Control Conf., Denver (CO), USA,
Jun. 2003, pp. 951 -- 956.
[28] P. Van Mieghem, Performance analysis of communications networks
and systems. Cambridge University Press, 2006.
[29] M. Thompson, R. Ellis, and A. Wildavsky, Cultural theory. Westview
Press, 1990.
[30] A. Tversky and D. Kahneman, "Availability: A heuristic for judging
frequency and probability," Cognitive psychology, vol. 5, no. 2, pp.
207 -- 232, 1973.
[31] D. Shemesh, "Common eigenvectors of two matrices," Linear algebra
and its applications, vol. 62, pp. 11 -- 18, 1984.
[32] A. George and K. D. Ikramov, "Common invariant subspaces of two
matrices," Linear Algebra and Its Applications, vol. 287, no. 1, pp.
171 -- 179, 1999.
J. C. Willems, "Lyapunov functions for diagonally dominant systems,"
Automatica, vol. 12, no. 5, pp. 519 -- 523, 1976.
[33]
[34] A. Taylor and D. J. Higham, "Contest: A controllable test matrix toolbox
for MATLAB," ACM Transactions on Mathematical Software (TOMS),
vol. 35, no. 4, p. 26, 2009.
[35] M. Fiedler, "Algebraic connectivity of graphs," Czechoslovak Mathe-
matical Journal, vol. 23, no. 2, pp. 298 -- 305, 1973.
[36] D. Burbano and M. di Bernardo, "Distributed PID control for con-
sensus of homogeneous and heterogeneous networks," arXiv preprint
arXiv:1409.2324, 2014.
14
[3] A. G. Dimakis, S. Kar, J. M. Moura, M. G. Rabbat, and A. Scaglione,
"Gossip algorithms for distributed signal processing," Proc. of the IEEE,
vol. 98, no. 11, pp. 1847 -- 1864, 2010.
[4] K. Kandhway and J. Kuri, "Campaigning in heterogeneous social
networks: Optimal control of SI information epidemics," IEEE/ACM
Trans. Netw., 2014, early access.
J. Chen and A. H. Sayed, "Distributed pareto optimization via diffusion
strategies," IEEE J. Sel. Topics Signal Process., vol. 7, no. 2, pp. 205 --
220, 2013.
[5]
[6] D. Acemoglu and A. Ozdaglar, "Opinion dynamics and learning in
social networks," Dynamic Games and Applications, vol. 1, no. 1, pp.
3 -- 49, 2011.
I. Matei, C. Somarakis, and J. S. Baras, "A randomized gossip consensus
algorithm on convex metric spaces," University of Maryland, Tech.
Rep., 2012.
[7]
[8] V. Blondel, J. M. Hendrickx, A. Olshevsky, and J. Tsitsiklis, "Conver-
gence in multiagent coordination, consensus, and flocking," in IEEE
Conference on Decision and Control, and the European Control Con-
ference, Seville, Spain, Dec. 2005, p. 2996.
[9] Q. Ren and H. Kobayashi, "Diffusion approximation modeling for
Markov modulated bursty traffic and its applications to bandwidth
allocation in ATM networks," IEEE J. Sel. Areas Commun., vol. 16,
no. 5, pp. 679 -- 691, 1998.
[10] C. Dargatz, "A diffusion approximation for an epidemic model," Sonder-
forschungsbereich 386 der Ludwig-Maximilians-Universitat Munchen,
Tech. Rep., 2007.
[11] -- -- , "Bayesian inference for diffusion processes with applications
in life sciences," Ph.D. dissertation, Ludwig-Maximilians-Universitat
Munchen, 2010.
[12] M. E. Yildiz, A. Scaglione, and A. Ozdaglar, "Asymmetric information
diffusion via gossiping on static and dynamic networks," in Proc. of the
IEEE Conference on Decision and Control, Atlanta, GA, USA, Dec.
2010, pp. 7467 -- 7472.
[13] G. Como, K. Savla, D. Acemoglu, M. A. Dahleh, and E. Frazzoli,
"Robust distributed routing in dynamical flow networks," in IEEE Conf.
on Decision and Control and European Control Conference (CDC-
ECC), Orlando, FL, USA, Dec. 2011, pp. 6290 -- 6295.
J. Kiessling and R. Tempone, "Diffusion approximation of L´evy
processes with a view towards finance," Monte Carlo Methods and
Applications, vol. 17, no. 1, pp. 11 -- 45, 2011.
[14]
[15] D. Acemoglu, G. Como, F. Fagnani, and A. Ozdaglar, "Opinion fluctua-
tions and disagreement in social networks," Mathematics of Operations
Research, vol. 38, no. 1, pp. 1 -- 27, 2013.
[16] D.-W. Tcha and S. R. Pliska, "Optimal control of single-server queuing
networks and multi-class M/G/1 queues with feedback," Operations
Research, vol. 25, no. 2, pp. 248 -- 258, 1977.
[17] R. Olfati-Saber and R. M. Murray, "Consensus problems in networks of
agents with switching topology and time-delays," IEEE Trans. Automat.
Contr., vol. 49, no. 9, pp. 1520 -- 1533, 2004.
[18] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and coop-
eration in networked multi-agent systems," Proc. of the IEEE, vol. 95,
no. 1, pp. 215 -- 233, 2007.
[19] D. Acemoglu, A. Nedic, and A. Ozdaglar, "Convergence of rule-of-
thumb learning rules in social networks," in IEEE Conference on
Decision and Control, Cancun, Mexico, Dec. 2008, pp. 1714 -- 1720.
[20] S. Banisch, R. Lima, and T. Ara´ujo, "Agent based models and opinion
dynamics as markov chains," Social Networks, vol. 34, no. 4, pp. 549 --
561, 2012.
[21] E. Yildiz, D. Acemoglu, A. E. Ozdaglar, A. Saberi, and A. Scaglione,
"Discrete opinion dynamics with stubborn agents," Social Science
Research Network, pp. 1 -- 39, 2011.
[22] A. Banerjee and J. Jost, "On the spectrum of the normalized graph
laplacian," Linear algebra and its applications, vol. 428, no. 11, pp.
3015 -- 3022, 2008.
[23] Y. Hong, J. Hu, and L. Gao, "Tracking control for multi-agent consensus
with an active leader and variable topology," Automatica, vol. 42, no. 7,
pp. 1177 -- 1182, 2006.
[24] M. Ji, G. Ferrari-Trecate, M. Egerstedt, and A. Buffa, "Containment
|
1707.03778 | 1 | 1707 | 2017-07-12T15:55:20 | Catching Zika Fever: Application of Crowdsourcing and Machine Learning for Tracking Health Misinformation on Twitter | [
"cs.SI",
"cs.CY"
] | In February 2016, World Health Organization declared the Zika outbreak a Public Health Emergency of International Concern. With developing evidence it can cause birth defects, and the Summer Olympics coming up in the worst affected country, Brazil, the virus caught fire on social media. In this work, use Zika as a case study in building a tool for tracking the misinformation around health concerns on Twitter. We collect more than 13 million tweets -- spanning the initial reports in February 2016 and the Summer Olympics -- regarding the Zika outbreak and track rumors outlined by the World Health Organization and Snopes fact checking website. The tool pipeline, which incorporates health professionals, crowdsourcing, and machine learning, allows us to capture health-related rumors around the world, as well as clarification campaigns by reputable health organizations. In the case of Zika, we discover an extremely bursty behavior of rumor-related topics, and show that, once the questionable topic is detected, it is possible to identify rumor-bearing tweets using automated techniques. Thus, we illustrate insights the proposed tools provide into potentially harmful information on social media, allowing public health researchers and practitioners to respond with a targeted and timely action. | cs.SI | cs | Catching Zika Fever: Application of Crowdsourcing
and Machine Learning for Tracking Health
Misinformation on Twitter
Amira Ghenai
University of Waterloo
Waterloo, Canada
Email: [email protected]
Yelena Mejova
Qatar Computing Research Institute
HBKU, Doha, Qatar
Email: [email protected]
7
1
0
2
l
u
J
2
1
]
I
S
.
s
c
[
1
v
8
7
7
3
0
.
7
0
7
1
:
v
i
X
r
a
Abstract-In February 2016, World Health Organization de-
clared the Zika outbreak a Public Health Emergency of Inter-
national Concern. With developing evidence it can cause birth
defects, and the Summer Olympics coming up in the worst
affected country, Brazil, the virus caught fire on social media.
In this work, use Zika as a case study in building a tool for
tracking the misinformation around health concerns on Twitter.
We collect more than 13 million tweets – spanning the initial
reports in February 2016 and the Summer Olympics – regarding
the Zika outbreak and track rumors outlined by the World
Health Organization and Snopes fact checking website. The tool
pipeline, which incorporates health professionals, crowdsourcing,
and machine learning, allows us to capture health-related rumors
around the world, as well as clarification campaigns by reputable
health organizations. In the case of Zika, we discover an
extremely bursty behavior of rumor-related topics, and show
that, once the questionable topic is detected, it is possible to
identify rumor-bearing tweets using automated techniques. Thus,
we illustrate insights the proposed tools provide into potentially
harmful
information on social media, allowing public health
researchers and practitioners to respond with a targeted and
timely action.
I. INTRODUCTION
The information overload poses serious challenges to public
health, especially with regards to infectious diseases. Similar
to people's increased mobility, the availability and ubiquity of
information facilitates the transmission of misinformation and
rumors that can hamper the efforts to tackle a major public
health crisis. With a continuous threat of digital "wildfires" of
misinformation [1], health rumors are a worldwide and serious
problem [2].
The complexity of dealing with communication during a
health crisis is growing, as social media is playing a more
prominent role. Social media, compared with traditional me-
dia, is harder to monitor, track and analyze. Public health
institutions such as the World Health Organization (WHO)
include social media as a crucial part in monitoring a health
crisis [3]. However, guidelines and tools on best approaches
to tackle this are not yet available.
This paper proposes a suite of tools for tracking health-
related misinformation, and describes a case study of tracking
a health crisis, as discussed on Twitter. We provide a method-
ology for uncovering the streams of tweets spreading rumors
about the 2016 Zika outbreak identified by the WHO. The
Zika virus has been known for decades; it was discovered in
Uganda in the 1940s and until recently it has been unnoticed.
Things changed dramatically in 2015 when this mosquito-
borne disease started to spread quickly across Brazil and then
most of the American continent, becoming a major global
health crisis. This crisis became more dramatic as the link
between the Zika infection and serious brain malformation
(i.e. microcephally) started to emerge. Furthermore, fears of
a global pandemic started to emerge, since Zika is spread by
a mosquito from the Aedes family, which is present in many
countries. Another source of concern were the Rio summer
Olympics Games, which brought international travelers to the
affected areas. As at the time there was no cure or vaccine
for the Zika viral infection, communication with the public
was one of the most important tools to control this outbreak.
These communication efforts – dealing with the detection
and prevention of Zika, and also the reduction of mosquito
breeding – have been challenged by the appearance of rumors
that, in the best of cases, were interfering with the public
health campaigns [4].
In particular, we track rumors outlined by the WHO (along
with Snopes.com1) in the stream of nearly 13 million tweets.
We employ both automated LDA-based topic discovery as
well as high-precision expert-led Information Retrieval ap-
proach to identifying the relevant tweets in this stream. Using
crowdsourcing, we distinguish between rumor and clarification
tweets, which we then use to build automatic classifiers. Here,
we present in-depth temporal analysis of the found rumors,
their origins, and interactions with informational sources.
As discussed in the coming section, this work contributes
to the literature a first application of the state-of-the-art social
media analytic tools to the problem of health rumor tracking.
II. RELATED WORK
This paper is the first of its kind to relate health informatics,
machine learning and social network analysis to detect health-
related rumors in a social media site. Below, we outline the
1http://www.snopes.com/
most relevant recent work related to the detection and tracking
of health-related attitudes, as well as misinformation in other
non-health related fields.
Health-related attitudes on social media. As social media
captures daily thoughts and actions of millions of users,
recent efforts have been made in extracting health-related
behaviors and attitudes from the textual content of these
websites. Recently, [5] build a classifier to detect the use of
marijuana on Twitter. Attitudes toward legal drugs, including
Xanax and Adderall, have also been studied by [6]. Further,
[7] use association mining to health communities to discover
adverse effects of drug interactions. Health-related attitudes
around food on Instagram have been mined by [8]. These
studies often combine the health expert knowledge with big
data analytics (including machine learning, in the case of
[5]), to provide insight into attitudes captured in social media
interactions. Similar tools can be applied to non health-related
rumor detection, as we discuss next.
Rumor detection and analysis. Separating newsworthy
stories from misinformation and rumors across microblogging
sites has been a popular research topic in recent years. Some
focus on identifying information credibility of news propa-
gated in social media [9], [10], [11], [12]. Others focus on
detecting misleading political memes, such as the "Truthy"
service presented by Ratkiewicz et al. [13], designed to detect
fake political grass-roots movements (dubbed as "astroturf").
Often, machine learning models based on features related to ei-
ther users or the content of propagated messages are employed.
For example, [12], [11] train a classifier to automatically detect
the rumors on Sina Weibo microblog site2. They use Sina
Weibo rumor-busting service3 as ground-truth data for the
classification. Further, Jing Ma et al. [14], use both Twitter
and Sina Weibo as a case study in order to detect rumors.
Using time series, they capture the temporal characteristics
of the rumor detection features. Authors use already labeled
datasets (Twitter [9], Weibo [12]) to train and evaluate the
approach. Unlike these studies, we consider a more natural
setting wherein no labeled data is available, and the documents
associated with the rumors must first be found. In this respect,
our approach is similar to Qazvinian et al. in [15] who use
content-based, network-based, and Twitter-specific features in
order to track urban legends. They build Bayes classifiers using
engineered features and then learn a linear function of these
classifiers for rumor retrieval and classification.
Health Related misinformation detection. WHO's white
paper on Risk communication in the context of Zika virus
urges to "build capacity to quickly transform new information
into usable, culturally-appropriate and easily understood risk
communication resources that can be disseminated on multiple
platforms", including social media [16]. However, little work
thus far concentrated on detecting and tracking health-related
rumors. Recently, Kostkova et al. [17] created the "VAC Medi+
board" online interactive visualization framework integrating
heterogeneous real-time data streams with Twitter data. They
track the spread of vaccine related information on Twitter
and the sources of information spread. A potential framework
to engaging expert knowledge in a real-time crisis, including
health-related, situation is described in Imran et al. [18], where
content is selected to be annotated via crowdsourcing into pre-
defined classes. These can then be used to train a classifier, and
update it as necessary with active learning data selection. Work
most relevant to the current study is by Dredze et al. [19],
who analyzed the characteristics of nonscientific claims about
vaccine misconceptions by the vaccine refusal community.
Specifically, the authors analyzed the two most prominent
misleading theories about Zika vaccination in Twitter using
"supervised machine learning technique" (although these were
not explained in the manuscript) and observed the effect
of vaccine-skeptic communities over other users' vaccination
opinion. While [19] look at two Zika vaccine related memes,
in this work we propose a more general methodological
pipeline to track health-related rumors. Taking Zika as a case
study, with the help of health professionals we expand the
list of rumors to six, and examine the behavior of rumor as
well as clarification efforts. Below we describe in detail our
contributions to the text classification task via novel health-
related features, and the application of crowdsourcing to fine-
grained document labeling.
III. DATA COLLECTION
The data was collected using the Artificial Intelligence
for Disaster Response (AIDR)4 platform, which taps into
Twitter Streaming Application Program Interface (API). The
keywords' list contained the following (searched as quoted
strings): zika, microcefalia, microcephaly, #zika, zika virus,
Aedes, zika fever, Spondweni virus, Aedes albopictus, macu-
lopapular rash. We aimed to cover both everyday wording as
well as medical jargon which may be associated with the topic.
Furthermore, "zika" word is used by all English, Portuguese,
and Spanish, which are the major languages of populations
affected. The resulting collection of 13,728,215 tweets spans
January 13 - August 22, 2016, and includes the peak of interest
in Zika (in early February) and the Olympic Games in Brazil
(August 5-21). Figure 1 shows the volume of the data by
language.
Since no language restriction was imposed during data
collection (besides some bias English keywords introduced),
we captured a plurality of languages, with three dominant
ones which represent more than half of the dataset – English,
Spanish and Portuguese (46%, 27% and 17% respectively).
The language was determined using the language tag in the
meta-data of the tweet provided by the Twitter API. Table I
summarizes the global statistics of these languages distribu-
tions. It illustrates the international nature of the Zika crisis,
with each language identifying a population and its diasporas
affected. In this work we focus on the English data, and discuss
the future work involving other languages below.
2http://weibo.com
3http://weibo.com/weibopiyas
4http://aidr.qcri.org/
ZIKA RUMOR DESCRIPTIONS AND EXAMPLE TWEETS. FIRST FOUR COME
FROM WHO AND LAST TWO FROM SNOPES.
TABLE II
Rumor Description
Example tweets
R1) Zika virus is linked
to genetically modified
mosquitoes
R2) Zika virus symptoms
are similar to seasonal flu
R3) Vaccines cause micro-
cephaly in babies
R4) Pyriproxyfen insecti-
cide causes microcephaly
R5) Americans are im-
mune to Zika virus
R6) Coffee as mosquito-
repellent to protect against
Zika
document
confirms
causes microcephaly..
BIOWEAPON! #Zika Virus Is Being
Spread by #GMO #Mosquitoes Funded
by Gates!
The affects of Zika are same symptoms
as the Common Cold. #StopSpreading-
GMOMosquitos
Government
tdap vaccine
https://t.co/4ZVLbaabbG
"Argentine and Brazilian doctors sus-
pect mosquito insecticide as cause of
microcephaly"
Yup and Americans R immune to Zika,
so why fund a response to it?
Bring on the Cuban coffee. Say Good-
bye to Zika mosquitoes. Dee Lundy-
Charles Fredric Sweeney Joshua Oates
Laure... http://fb.me/tArL595b
4 were unsuitable, as they were not topically cohesive. For
instance, one explained "Fish can help stop Zika", but did not
explicitly state what the rumor which this statement would de-
bunk would be. The process in understanding whether a topic
is a rumor involved writing out an unambiguous description
of the rumor, such that a tweet may be easily classified as
being one. If no such description could be written, the topic
was discarded. Additionally, we employed Snopes.com, which
is an online authority for detecting and verifying rumors in
social media, emails and other online networks [21], based
on expert sourcing. From its Zika-related articles, we selected
rumors which are not specific to the US. The final list of
rumors, shown in Table II, along with example tweets which
propagate it, includes a total of 6 Zika rumor stories (4 from
WHO and 2 from Snopes).
Note that the selection of these Zika rumor topics was
supervised by health experts (acknowledged below) in order
to insure the coverage of the most important and influential
topics related to the Zika outbreak.
V. RUMOR TRACKING
We first attempt to discover these rumors using an auto-
mated technique, as topic discovery has been used to identify
rumors [14], [12] in social media. We train a Latent Dirichlet
Allocation (LDA) [22] model on the english-language tweets,
which then produces n "topics", grouping words which appear
in similar contexts together in a topic. However, after a manual
examination of n (varying from 5 to 50) topics, we do not find
any topics pertaining to the above selected rumors. The vast
majority of topics were informational, following by spam and
jokes. Thus, we illustrate the necessity of incorporating expert
knowledge in order to achieve a high-precision view of the
data for our purpose.
Fig. 1. Zika-related Twitter data volume, separated by language.
DATA STATISTICS BY MAIN LANGUAGE GROUPS.
TABLE I
Total tweets
Language
6,267,173
English
3,689,292
Spanish
2,296,611
Portuguese
1,475,139
Other
Total
13,728,215
(cid:63) or 2,546,851 unique users
Users
1,318,293
727,105
623,968
593,221
3,262,587 (cid:63)
Tweets/user
4.75
5.07
3.68
2.49
4.21
To understand the geographic distribution of tweets, we
use several sources to geo-locate them. We begin with the
GPS attributes (latitude, longitude) of the tweet meta-data and
convert them to the corresponding country name using World
Borders API5. As 99% of tweets have missing GPS attributes,
we look at location names in the place attribute of the tweet
and convert them to exact country names. In case there is
no mentioned location, we assume that the tweet location is
where the user is located and get the corresponding location
from the user's profile. It is worth mentioning that users'
locations are messy, as they are written by the users. Thus, we
use Yahoo Placemaker API6 to map the users' place fields to
GPS locations. Finally, in case no user location is mentioned,
we get
location by looking into other already
identified location tweets tweeted by the same user (resorting
to this noisy approach only if all other geo-location attempts
fail). Implementing these steps, we achieve 68% coverage for
English data. The top locations in decreasing number of tweets
are the United States, United Kingdom, India, Canada, Nigeria,
and Brazil, indicating a highly international data.
the tweet
IV. RUMOR SELECTION
Our rumor selection process begins with a reliable list of
information from trusted sources. We chose the WHO website
as an authority for detecting and verifying rumors about Zika.
As Zika was spreading further in the world, WHO provided a
source listing major international rumors and misinformation
about the virus. At the time of writing, WHO website [20]
listed 8 statements debunking ongoing rumors. Out of these,
5http://thematicmapping.org/downloads/world borders.php
6http://www.programmableweb.com/api/yahoo-placemaker
2016−01−132016−01−202016−01−272016−02−032016−02−112016−02−182016−02−252016−03−032016−03−102016−03−172016−03−242016−03−312016−04−072016−04−142016−04−212016−04−282016−05−052016−05−122016−05−192016−05−262016−06−022016−06−092016−06−162016−06−232016−06−302016−07−072016−07−142016−07−212016−07−282016−08−042016−08−112016−08−180100000200000300000400000OtherSpanishPortugueseEnglishRUMOR QUERIES AND THE NUMBER OF TWEETS RETRIEVED.
TABLE III
No
R1
R2
R3
R4
R5
R6
Total
Regular Expression Query
genetically GMO
(symptom & (flu cold)) & (not(rash))
(tdap MMR Measles Mumps Rubella) &
vaccine & microcephaly) (vaccine &(cause
link relate) & microcephaly)
(montsanto pesticide pyriproxyfen insec-
ticide) & microcephaly
american & immune
((coffee java jive) & (repellent protect))
& (java & jive) & (coffee & mosquito))
-
# tweets
73,832
469
4,329
10,389
351
202
89,572
A. Query Construction
We consider the task of extracting tweets relevant to our
rumors as a standard Information Retrieval
task. We first
index the collected tweets using Indri7, and submit a set of
handcrafted interactively designed search queries (similarly to
[15]). Each query is a boolean string consisting of a list of
keywords that best describe the rumor. These keywords are
first identified, then connected using the AND, OR and NOT
operators. Each keyword is then replaced with a series of
possible synonyms and replacements, all connected via the
OR operator. For instance, consider the rumor saying that
"vaccines cause microcephaly" (R3). Transforming this story
to a query language would include several common ways of
referring to vaccines, as shown in Table III. The queries are
hand-crafted over at least 3 iterations of labeling the top 10
returned results.
Designing the queries to extract
the tweets was not a
trivial task. One of the challenges is that many medical term
synonyms needed to be added to the query to get the highest
coverage. We did not rely on automatic query expansion tech-
niques such as Pseudo-relevance feedback as these automatic
algorithms perform well in medical articles and not in informal
unstructured text such as Twitter messages [23]. Additionally,
we added words that distinguish general information tweets
from rumors. For example, in R2, to distinguish a rumor from
a general information, we need to add (NOT rash) to the
query because this is the symptom that differs between Zika
symptoms and the seasonal flu ones.
The final retrieval resulted in 89,572 tweets varying greatly
by rumor, with a maximum of 73,832 to 202 (Table III).
These tweets, however, still may contain false positives,
tweets that match the query but are not a rumor. For example,
the following tweets are all about vaccines and microcephaly
in babies (R3). The first tweet is stating that Zika vaccine
causes microcephaly (rumor), but the second tweet clarifies
that
there is no evidence suggesting Zika vaccine causes
microcephaly (clarification), and the third does not mention
anything specific about the relationship between Zika vaccine
and microcephaly (other).
CROWDFLOWER LABEL STATISTICS OF UNIQUE TWEETS IN EACH
CATEGORY (PROPAGATED LABELS TO DUPLICATES IN PARENTHESES).
TABLE IV
Labeled
1,000 (42,432)
302 (469)
796 (4,329)
1,000 (8,085)
131 (351)
114 (202)
Rumor
253 (11,773)
217 (348)
478 (2,853)
749 (5,586)
17 (22)
72 (129)
Clarification
50 (1,912)
71 (100)
88 (846)
221 (2,338)
99 (17)
5 (25)
Other
697 (28,747)
14 (21)
230 (630)
30 (161)
15 (312)
37 (48)
R1
R2
R3
R4
R5
R6
(rumor) Government document confirms tdap vaccine
causes microcephaly.. https://t.co/4ZVLbaabbG
(clarification) Anti-vaccination extremists falsely claim that
Tdap #vaccine causes microcephaly suspected to be caused
by.. https://t.co/yvfHlAFKhw
(other) No cure, no vaccine for a virus that scientists
believe to cause microcephaly! #microcephaly #ZikaVirus
https://t.co/EuG9b1AJVw
In the coming section, we explain the approach we take
in order to distinguish between the three different types of
information available in our data-set.
B. Crowdsourced Annotation
To annotate the tweets as to whether they are indeed ru-
mors, we employ the crowdsourcing platform "Crowdflower"8.
Previous studies have shown that using crowds (anonymous
workers) for health-related annotation is an effective way to
label large amounts of data without employing experts [24],
[25]. We begin by creating a task for each topic with clear
instructions on the labeling of the tweets as either supporting
the rumor (by outright statement or ambiguity), debunking the
rumor (by clarification), or doing neither. Also for each task
we create a set of no fewer than 20 "gold standard" tweets
(those with known classifications) in order to test the quality
of annotations throughout the jobs. If an annotator did not pass
the threshold of 70% accuracy, he/she would be banned from
the task and the annotations would be discarded. Each tweet
was labeled at least 3 times and a majority vote determined
its classification.
The tweets were first de-duplicated by stripping tweet-
specific elements such as RT (standing for "re-tweet"), special
characters, and mentions, such that only one copy of each
tweet was to be labeled. A maximum of 1,000 tweets were
annotated per rumor. For those which had more than 1,000
unique tweets (R1 and R4), we first selected 700 most re-
tweeted tweets, and sampled 300 from the rest. After the
labeling of these unique ones, the label was then propagated
to the duplicates within the set.
Table IV shows the distribution of classes for the six
rumors, with the number of tweets with propagated labels in
7http://www.lemurproject.org/indri.php
8http://www.crowdflower.com/
parentheses. Although the queries were hand-crafted to capture
rumors, only 51% of final tweets were rumors (an average
percentage across topics, such that no one topic dominates
the statistic), and 15% clarifications, attempting to debunk
these rumors. The annotator agreement (as measured in label
overlap) ranged between 76% (R2) and 93% (R5) with an
average of 87.7%, indicating the task differs in difficulty, but
is overall clear to the annotators.
C. Temporal Tracking
Next, we examine the "paths" these rumors have taken in the
story line of Zika in our dataset. Figure 2 illustrates the bursty
nature of these rumors. The plots also show Pearson product-
moment correlation r between the rumor and clarification
volumes. For R4,5,6, the volume of clarification corresponds
rather closely to that of the rumor with r of around 0.5.
However, R1,2,3 display a mismatch between clarification
attempts and the rumors. We define the "origin" tweets for
rumors or clarifications as the most prominent tweets at that
time for the corresponding class and we explain Figure 2 in
details as follows:
Fig. 2. Volume of the six rumors and their clarifications, along with the
Pearson product-moment correlation r between the rumor and clarification
volumes.
The case of mutant mosquitos: the case of R1 is inter-
esting, since it carries over a concern about the dangers of
genetically modified organisms (GMO) which has been popu-
lar for several years. For instance, the spike in July was due to
an article published on The Real Strategy website claiming a
link between "chemical exposure" and microcephaly9, which
gained thousands of retweets within days. However, without
any interference that we detected from authoritative sources,
the rumor quickly died out.
9For more on this rumor see http://www.huffingtonpost.com/entry/zika-
monsanto-pyriproxyfen-microcephaly us 56c2712de4b0b40245c79f7c
Have you got Zika? Flu and cold are very common
diseases, therefore confusion between flu or cold and Zika
might pose a serious problem for health authorities. This case
is addressed in R2. Often the tweets appear to be jokes of
users who feel flu-like symptoms such as:
RT @arzel: my friend had a small cold and I
caught him googling "zika virus symptoms"
Thus, although there are regular tweets on the true symptoms
of Zika, there is a large proportion among these tweets that
are jokes or lighthearted statements.
The killer vaccines: Similar to R1, R3's peak originated in
April with an article on another advocacy website www.march-
against-monsanto.com (which argues that Monsanto, an agri-
cultural biotechnology corporation, threatens the environment
and the farmers) titled "1991 Government Document Confirms
Tdap Vaccine Causes Microcephaly"10. The article was readily
believable to people who already view Monsanto negatively
and might be spread by pharmaceutical companies to create
an opportunity to sell new Zika virus vaccines as Dredze et al.
[19] suggested in his paper. The post happened after a major
WHO campaign in February and March saying "No evidence
that vaccines cause microcephaly"11. Interestingly, the April
spike receded just as quickly without any clarifications from
authoritative sources.
Pesticides, immunities and coffee grounds: Others, how-
ever, did have a strong interaction between the rumor and
a quick reaction with clarifications. For instance, the most
retweeted stories of R4 are those coming from mainstream
media including CNN and WHO stating there is "No link
between pesticide and microcephaly". At the top three of R5
are stories on the "crazy and dangerous story [that] Americans
are immune to Zika" and links to the debunking website
Snopes. Similarly to R2, in R6 is a case of hyperbole and
exaggeration of a story saying mosquito larvae do not thrive
in coffee-infused water, which was turned into sensationalist
tweets claiming "Could Coffee Be the Answer in the Fight
Against Zika Mosquitoes?", but which still
linked to the
original correct information.
Thus, we show the varied nature of the rumors in the
Zika stream. Those which were accompanied with mainstream
coverage quickly decreased (R4-6), but even those which
originated from the websites of various advocacy groups and
were not met with official response were also short-lived (R1,
R3). The longer-lived one is the one which concerned the daily
occurrences (having a flu R2 or, possibly, coffee R6) which
propagates in the Twitter lore.
D. Rumor Classification
Next, we turn to the supervised methods which have been
proposed in previous work on news in social media that seek to
establish the level of credibility of information automatically
by observing specific features extracted from the social media.
10http://www.march-against-monsanto.com/1991-government-document-
confirms-tdap-vaccine-causes-microcephaly/
11https://twitter.com/WHO/status/708317001366806528
r = 0.113 R1r = 0.212 R2r = −0.004 R3r = 0.468 R4r = 0.512 R52016−01−132016−01−202016−01−272016−02−032016−02−102016−02−172016−02−242016−03−022016−03−092016−03−162016−03−232016−03−302016−04−062016−04−132016−04−202016−04−272016−05−042016−05−112016−05−182016−05−252016−06−012016−06−082016−06−152016−06−222016−06−292016−07−062016−07−132016−07−202016−07−272016−08−032016−08−102016−08−17clarificationrumorr = 0.506 R6Scope
Twitter
Sentiment
Linguistic
Readability
Medical
AUTOMATICALLY EXTRACTED FEATURES OF TWEETS POTENTIALLY BELONGING TO A RUMOR.
TABLE V
Feature
Description
IS RETWEET
FOLLOWING
FOLLOWERS
STATUS COUNT
AGE
HAS MENTIONS
HAS HASH TAG
COUNT HASH TAG
DAY WEEKDAY
COUNT URLS
COUNT RT
COUNTRY
SENTIMENT SCORE
POSITIVE/NEGATIVE WORDS
EMOTICONS POS/NEG
QUESTION MARK
EXCLAMATION MARK
WORDS COUNT
COUNT SENTENCES
CHAR COUNT
UPPER COUNT
PERCENTAGE UPPER
PERCENTAGE UPPER/LOWER
MULTIPLE QUES/EXCL
COUNT NOUN
COUNT ADVERB
COUNT ADJECTIVE
COUNT VERB
COUNT PRONOUN
HAS PRONOUN 1
HAS PRONOUN 2
HAS PRONOUN 3
COMPLEX WORDS
READABILITY SCORES
COUNT NOT WORD2VEC
AVG SYLLABLES
MEDICAL LEXICON
WIKIPEDIA DOMAIN
ADVOCACY
NEWS
SOCIAL
INFORMATIVE
Is a retweet; contains RT
The number of people the user is following
The number of people following the user
The number of tweets at posting time
The time passed since the author registered his/her account, in days
Mentions a user, eg: @CNN
Contains hash tags
Count total number of hash tags
The day of the week in which the tweet was written
Count total number of URLs in text
Count total number of Retweets
The country the tweet was originated from
sentiment score value [26]
The number of positive/negative words in text
Count total number of positive and negative emoticons in text
Contains question mark '?'
Contains exclamation mark '!'
Count total number of words in text
Count number of sentences
Count total number of characters in text
Count total number of upper case letters
The percentage of upper case characters
The percentage of upper and lower case characters
Contains multiple questions or exclamation marks
Count total number of nouns in text
Count total number of adverbs in text
Count total number of adjectives in text
Count total number of verbs in text
Count total number of pronouns in text
Contains a personal pronoun in 1th person
Contains a personal pronoun in 2nd person
Contains a personal pronoun in 3rd person
Count total number of complex words in text
Flesch, Automated, Flesch Kincaid, Gunning, and SMOG [27]
Count total number of words not in "word2vec" Google News vocabulary
The Average number of syllables per word in text
Count number of words in the medical lexicon
Count number of URL domains mentioned in the wikipedia web pages
Count number of URLs belonging to advocacy domains
Count number of URLs belonging to news domains
Count number of URLs belonging to social media domains
Count number of URLs belonging to informative/trusted domains
For instance, Castillo et al. [9] and Qazvinian et al. [15]
suggested that the best features to assess the credibility of
news topics are those that look into the user, message and topic
features. Inspired by these works, we build a set of features
in order to assess their power in automatically distinguishing
rumors from non-rumors.
Gathering all the relevant tweets to the topics in Table 2,
results in a total of 56,985 tweets. Later, we filter tweets that
are exact duplicates (tweets sharing exact similar information
including text, urls, hashtags, and mentions) as the presence
of the duplicates might
influence the precision and recall
values, resulting in a total of 26,728 tweets with human-
assigned labels. We group the labels used in Table 2 such
that we consider a rumor as the tweet that has been labeled
by Crowdflower users as "rumor" (32% - 8,488 tweets) and
a non-rumor as the tweet that has either been labeled as
"clarification" or "other" (68% - 18,240 tweets). Note that
we cannot consider "clarification" class alone, as it is vastly
under-represented in our data (in part due to our focus on
retrieving rumors in the previous steps).
The feature set is listed in Table V and consists of 48
features grouped into five categories. The first three categories
(Twitter, sentiment and linguistic features) have been previ-
ously implemented in news credibility detection, whereas the
last two (readability and medical features) are new to this
work:
Twitter features As [9] use Twitter features to define credi-
bility in news topics, we build 18 similar features includ-
ing the number of retweets, number of users followers
and following, the presence of hashtags and mentions,
the user's number of tweets, etc.
Sentiment features We consider five measures of emotional
state in our dataset: count of positive/negative words,
count of positive/negative smileys and sentiment score
representing the strength of sentiment [26].
Linguistic features We also introduce measures to charac-
terize different linguistic styles in Twitter text [9]. We
compute 17 different linguistic styles e.g: count adjec-
tives, adverbs, pronouns, sentences, upper and lower case
characters.
Readability features Authors in [27] defined the readability
score as a measure of how easy it is to understand a piece
of text. We introduce a set of tweet text readability mea-
sures with the intuition that more readable information
are more credible. We implemented the predefined read-
ability scores by [27] (Flech, automated, Flesch kincaid,
Gunning, and SMOG scores) in addition to computing
the number of complex words and average number of
syllables per word. Moreover, we counted the number
of words not in word2vec news vocabulary which may
signal slang language [28].
in specialized corpus M as: mpw = countw/(cid:80)
corpus W as wpw = countw/(cid:80)
Medical/Domain features We define specialized features in
the medical domain by focusing on the medical lexicon of
tweets and the reliability of sources shared using URLs.
First, we build a medical lexicon12 which signals how
many medical terms are used in the tweet. Prior studies
[29] showed that Wikipedia is a reliable knowledge
base for medical data extraction tasks. Additionally, as a
source for lexical and contextual features, Wikipedia was
used in the past to improve medical text relation extrac-
tion [30]. Guided by prior work, we build a specialized
lexicon by crawling a total of 113 Wikipedia pages under
the category of "Infectious disease", resulting in 22,123
words representing corpus M. Then, we download the
same number (22,123) of the most frequent words on
all of Wikipedia, representing a general corpus W. These
can then be used to compute a probability of every word
w M,
as well as the probability of every word in general
w W. Next, for every
word in every corpus, we compute pw = mpw − wpw.
Intuitively, the differences in probabilities pw provide the
most descriptive words related to "infectious disease"
topic which are not as prevalent in the general Wikipedia.
Ranking the terms by pw, we only keep the top 13,300
meaningful words, as illustrated in Table VI (note the
topmost words are more specific, while those further
down the ranking are more general).
Additionally, Wikipedia references are considered trusted
citations as Wikipedia increasingly includes references
with high impact factor medical journals such as the New
England Journal of Medicine, The Lancet, the Journal of
the American Medical Association, and the British Med-
ical Journal among the 10 most frequently cited science
journals in Wikipedia in 2007 [31]. As Wikipedia pages
are usually among the top results of search engine queries
[32], [31], we expect people to use Wikipedia pages and
references as a major source of online health information.
From the same Wikipedia pages used to collect
the
medical lexicon, we collect a total of 2,979 referenced
SELECTED "INFECIOUS DISEASE" WIKIPEDIA MEDICAL LEXICON WORDS
TABLE VI
Rank
Word (w)
syphilis∗
4
bronchitis∗
81
tetanus ∗
236
diarrhea
13682
epidemiology
15284
treatment
33869
life
35074
∗ Among the chosen top 13,300 words with highest pw
• - : is when w is not in the W corpus
pw
0.01
0.002
0.001
-0.121
-0.138
-4.633
-34.608
mpw
0.01
0.002
0.001
0.006
0.009
0.019
0.003
•
wpw
-
-
-
0.128
0.147
4.652
34.61
URLs from 441 different domains13 including medical
literature databases and news agencies. As most Twitter
URLs are shortened, we expanded the URLs to detect the
original domain. Finally, we manually classify tweet URL
domains as advocacy group (advocating specific actions
or policies, or claiming to be the best in providing the
related information without official ties), social media
(YouTube, Facebook and social media helper websites
that forward and aggregate content), news (news sources
informational (reliable resources
CNN, Reuters, etc.),
providing medical information: medical companies, gov-
ernment sites, Snopes...) or non-informative (URLs hav-
ing no specific domain type). Doing this, we have a total
of four different domain type features where every feature
is a count of the number of URLs belonging to a domain
class in the tweet.
In order to pick the best features for the classification
task, we employ two different automatic feature selection
techniques. First, Information Gain (IG) which is a popular
filtering approach that aims at removing irrelevant features
after computing the gain value (amount of information a
feature brings to the training set) [33]. Second, we use Greedy
backward elimination technique (GBE) that starts with a model
having all features, and removes features one at a time until
reaching a certain performance threshold [33].
Table VII shows the top features each technique produced.
Here, we list the top ten features by information gain value
and GBE results selecting the best ten features. Based on
both techniques, the most significant features correspond to the
medical features (advocacy domains count, Wikipedia domains
count) followed by the syntax of the tweet text (question
marks, exclamation marks...) and the sentiment features (sen-
timent score, count positive/negative words) and some Twitter
features.
Note that advocacy feature domain type is the strongest
feature with high IG value (table VII). It is understandable
this feature would be useful, given that it requires expert
annotation. Further, we find that out of the URLs cited in
rumor tweets, 35.0% were from advocacy websites, 0.1% from
social media, 39.1% were news and 25.9% were informative
domains, compared to 3.1% from advocacy and 0.6% social
media, 32.3% news, and 64.0% informational in non-rumors,
12Available at http://bit.ly/2m56t0w
13Available at http://bit.ly/2m59wpm
THE FEATURES SELECTED USING INFORMATION GAIN AND GREEDY
CLASSIFICATION PERFORMANCE ON THE RUMOR VS. NON-RUMOR TASK,
BACKWARD ELIMINATION.
USING RANDOM TREE CLASSIFIER WITH GBE FEATURES.
TABLE VII
TABLE VIII
Feature
min, max
µ (σ)
IG(cid:63)
GBE•
Class
Precision
Recall
F-measure
188 (71)
0.177 (0.381)
394 (713)
61, 281
0, 1
1, 2457
-2.2, 1.6
(T) AGE
(T) HAS MENT
(T) COUNT RT
(S) SENTIMENT
(S) NEG COUNT
(L) HAS QUEST
(L) HAS EXCL
(L) VERB CNT
(L) ADVB CNT
(L) MULT. '?/!'
(M) ADVOCACY CNT
(M) WIKI CNT
(cid:63) Features are ranked desc according to information gain values.
•
-0.332 (0.71)
0.639 (0.871)
0.193 (0.395)
0.023 (0.161)
0.673 (0.716)
0.682(0.936)
0.014 (0.12)
0.045 (0.21)
0.253 (0.435)
0, 13
0, 1
0, 1
0, 38
0, 102
0, 1
0, 2
0, 1
9
10
6
8
-
4
5
-
3
2
1
7
: is in GBE best 10 feature subset, otherwise not.
rumor
non-rumor
weighted average
0.929
0.963
0.946
0.921
0.967
0.944
0.925
0.965
0.945
-
-
IX. Every row of the table shows which topic is excluded in
training the classifier, and then is used for testing. We find
the performance is not uniform, with topics 1 and 5 having
the worst precision, while topics 3 and 4 having recall under
0.500. Once again, this points to the importance of expert
labeled data that is topically matched to the one in question.
making the presence of advocacy groups and informational
sources the distinctive features, and,
the
news media. Wikipedia domains features is also among the
top selected features in both techniques and this features is
automatically computed and can be used more broadly.
interestingly, not
Finally, we train a supervised classifier to predict which
tweets contain rumor and which do not. We build a classifier
separately for the top 10 features of IG and GBE techniques.
We experiment with three different learning algorithms. First,
Naıve-Bayes algorithm [34], a probabilistic based on Bayes'
theorem with strong ("naıve") independence assumptions be-
tween the features. Second, Random Forest [35], which is a
collection of classifiers where every classifier votes for one
class and every instance is classified based on the majority
class. Third, Random Decision Tree [36], a classifier that
recursively builds a tree by splitting the training data based on
a criterion until all partitions have the same class label. We
find the best results using the Random Tree classifier using
the top 10 GBE features. For training/validation process, we
perform 10-fold cross validation, in which 10 experiments are
performed on a different tenth of the data held out for testing,
such that we take advantage of the whole dataset for both
training and testing. A summary of the best classifier (Random
Tree) with top 10 GBE features results are shown in Table
VIII. As it shows, the classifier achieves a precision of 0.946
with recall 0.944 which is significantly better than a random
predictor. The F-value (a harmonic mean of precision and
recall) is high, indicating a good balance between precision
and recall values. The final row presents the average values
from across both classes. Note that these results are overfitted,
given the limited amount of data available, feature selection
on the test set, and also that the method relies on manually
labeled tweets, with the addition that the dataset is already
topically specialized.
As we find having training data within the topic to be
extremely helpful in building accurate classifiers, we explore a
more challenging scenario wherein the classifier is trained on
5 topics and tested on the 6th. The results are shown in Table
CLASSIFICATION PERFORMANCE OF DETECTING RUMOR TWEETS IN
INDIVIDUAL TOPICS, USING RANDOM TREE CLASSIFIER WITH GBE
TABLE IX
FEATURES.
Topic
% Rumor
Precision
Recall
F-Measure
R1. Zika linked to GMO
R2. Flu symptoms similar to Zika
R3. Vaccines cause microcephaly
R4. Insecticide cause microcephaly
R5. Americans are immune to Zika
R6. Coffee as mosquito repellent
61%
31%
71%
32%
32%
31%
0.296
0.746
0.683
0.594
0.101
0.688
0.869
0.504
0.490
0.432
0.523
0.688
0.440
0.602
0.571
0.500
0.170
0.688
VI. DISCUSSION
Key Findings.
Communication on Twitter around a major public health
crisis is an essential component in the public health response.
In our search of rumors in the stream of Zika-related tweets,
we find automatic topic discovery tools such as LDA to be
too coarse-grained to tease out the rumors WHO and Snopes
have cited as most concerning. Thus, we incorporate the expert
knowledge to compose high-precision queries to retrieve the
relevant tweets. We also show that further steps are needed,
as after a closer examination we find only roughly half of the
captured tweets to be actual rumors. This insight shows the
perils of using keyword or hashtag-based topic definition, as is
done, for example by "Truthy" [13] where a topic is defined by
a single hashtag, or even in Castillo et al. [9] who use Twitter
Monitor algorithm to formulate keyword-based queries.
Further, within the small sample of topics we examined,
we discovered a variety in terms of longevity. Topics relating
to everyday activities, such as seasonal flu or coffee, can
be a subject
to hyperbole and humor which may propa-
gate the misinformation. However, rumors originated from
known advocacy websites such as http://www.march-against-
monsanto.com/ may display a spike which quickly dissipates
without correction. These websites adjust their stances to the
new trending topics like Zika while maintaining their core
message.
Interestingly, mainstream news websites were cited at
roughly the same rate in rumor tweets (39.1%) as in others
(32.3%),
including the clarifications. This emphasizes the
importance of authoritative sources outside mainstream news
media in setting the record straight. Further, Towers et al. [37]
find that mainstream news media may help spread fear and
misinformation, such as in the case of Ebola in 2014, "with
each Ebola-related news video inspiring tens of thousands
of Ebola-related tweets and Internet searches", effectively
spreading unsubstantiated panic in the United States.
Public Health Relevance.
Detecting health rumors in a timely fashion can help public
health officials tackle them before they spread. However, over-
reacting to a rumor might in fact increase its damage by
advertising the harmful misconceptions. In the case of the
Ebola outbreak, some of the rumors circulated on the Internet,
such as that drinking salty water was an effective protective
measure, led to several deaths [38], [39]. Rumors around a
vaccination trial for a new Ebola vaccine sparked fears for
a regular Measles vaccine, which was being used to tackle
a Measles outbreak at
the same time [40]. Public health
decisions in one country can spark rumors and mistrust in
another, such as when the HPV (Human Papilloma Virus)
vaccine campaign discontinuation in Japan sparked concerns
and rumors about
is
imperative that the impact of health-awareness campaigns is
monitored in real time, as well as internationally. The tools
described here can help public health practitioners in tackling
the large scale of social media streams.
its safety worldwide [41]. Thus,
it
Further,
the case of Zika is highly complex, as much
uncertainty surrounded important information. For instance,
the pathogenesis of microcephaly took months to be estab-
lished. Previous works have highlighted the difficulty of early
detection of rumors (i.e. [42]) in public health cases – to assess
the veracity of a rumor can take months of public health
investigations. However, due to the unprecedented scale of
the crisis, health authorities started to act before a clear link
between the Zika outbreak and microcephaly was established.
This was especially challenging, since it can happen that
apparent rumors are in fact truth. As an example, reports on
narcolepsy as a side effect of a flu vaccine in the Nordic
countries were first depicted as rumors, but later, few cases
were confirmed and that took years of research and still it is
contested [43]. Although correlation was found in epidemio-
logical data, some scholars argue that an increase in awareness
due the hype of the "vaccination crisis" might have caused the
increase in cases. Public health authorities are continuously
working in a complex crisis communication dilemma, since
they have to act on some level of uncertainty. In this study, we
chose the rumors which have been identified by authoritative
sources as certain. However, a different approach may be
called for the detection of possible health rumors, which is
an exciting future research direction.
In this context, we believe more work is needed in the
integration of rumor monitoring with public health officials,
and especially the work-flow of communication departments
of public health authorities. A pipeline such as AIDR (which
provided our collection) described by Imran et al. [18] wherein
volunteers provide labeled social media during a disaster to
train automated methods, may also be useful for ongoing
health emergencies.
Limitations.
One of the main challenges of this study is that we cannot
be sure about the representativeness of the social media users
compared with the general population. The demographics of
social media users tend to be young, and female [44], which
may be important, as some have called women "gatekeepers"
of their families health [45], [46]. In addition, we need to
consider that particular segments of the population are more
at-risk (e.g. pregnant women) and it may be difficult to identify
such users online (however, tracking this particular group of
users would enlighten the effect Zika has on child-baring
women). Further, the limited resources of this study were
applied to only a handful of rumors – those especially brought
up by WHO and Snopes – and a closer collaboration with
health communication experts may provide further insight into
the variety of misinformation both online and its interaction
with mainstream media. Finally, Zika affected many countries,
and our original dataset has covered several languages. The
peculiarities of rumors in each language (and by proxy, in
perhaps different cultures), could illuminate differences in the
perception of medical information on social media.
VII. CONCLUSION
This paper presents tool pipeline incorporating expert
knowledge, crowdsourcing, and machine learning for health-
related rumor discovery in a social media stream. Each step
of the analysis was rigorously tested by manual evaluation,
providing qualitative and quantitative insight into a process
needed to collect data relevant to the health communication
professionals.
In particular, our study shows that tracking health misinfor-
mation in social media is not trivial, and requires some expert
supervision. This can then augmented by "crowd" workers in
order to provide additional annotation of the captured rumor-
related tweets. We show the bursty and varied nature of the
Zika rumors, some provoked by known advocacy groups,
others propagated due to their affordance for humor or light
banter. We find traditional media sources not to be prominent
in clarifying rumors, but
instead show the importance of
authoritative informational sources. We hope this work will
encourage a collaboration between health professionals and
data researchers in order to quickly understand and mitigate
health misinformation on social media.
Continued work will address the multi-lingual nature of the
dataset, and expand the efforts to cross-language analysis of
rumors and their potential international spread. More studies
on health rumors may provide richer test beds for building
automatic classifiers not just for rumors, but for the detection
of informational campaigns. Finally, a user-friendly interface
similar to Kostkova et al. [17], which may involve expert input,
like AIDR [18], would smooth the interaction between data
scientists and health communication professionals.
ACKNOWLEDGMENT
We would like to thank Luis Fernandez-Luque, scientist,
Qatar Computing Research Institute, William Schulz, research
assistant, London School of Hygiene & Tropical Medicine,
Clarissa Simas, research assistant, London School of Hygiene
& Tropical Medicine and Per Egil Kummervold, Research
Scientist, Norut Northern Research Institute for the fruitful
discussions and health related expertise in the Zika rumor
selection process.
REFERENCES
Jirotka,
and M.
[1] H. Webb, P. Burnap, R. Procter, O. Rana, B. C. Stahl, M. Williams,
W. Housley, A. Edwards,
"Digital Wildfires:
Propagation, Verification, Regulation, and Responsible Innovation,"
ACM Transactions on Information Systems, vol. 34, no. 3, pp. 1–23,
2016. [Online]. Available: http://dl.acm.org/citation.cfm?id=2915200.
2893478{%}5Cnhttp://dl.acm.org/citation.cfm?doid=2915200.2893478
[2] L. Fernandez-Luque and T. Bau, "Health and social media: perfect storm
of information," Healthcare informatics research, vol. 21, no. 2, pp. 67–
73, 2015.
[3] World Health Organization, "Mixed uptake of social media among
public health specialists," Bull World Health Organ, vol. 89, pp. 784–
785, 2011. [Online]. Available: http://www.who.int/bulletin/volumes/89/
11/11-031111.pdf?ua=1
[4] WHO.
(2016) Risk communication in the context of zika virus.
http://www.who.int/risk-communication/zika-virus/risk-communication-
presentation.pdf?ua=1. Accessed: 2017-01-03.
[5] A. A. Ginart, S. Das, J. K. Harris, R. Wong, H. Yan, M. Krauss, and P. A.
Cavazos-Rehg, "Drugs or dancing? using real-time machine learning to
classify streamed dabbing homograph tweets," in Healthcare Informatics
(ICHI), 2016 IEEE International Conference on.
IEEE, 2016, pp. 10–
13.
[6] I. Seaman and C. Giraud-Carrier, "Prevalence and attitudes about illicit
and prescription drugs on twitter," in Healthcare Informatics (ICHI),
2016 IEEE International Conference on.
IEEE, 2016, pp. 14–17.
[7] H. Yang and C. C. Yang, "Harnessing social media for drug-drug
interactions detection," in Healthcare Informatics (ICHI), 2013 IEEE
International Conference on.
IEEE, 2013, pp. 22–29.
[8] Y. Mejova, H. Haddadi, A. Noulas, and I. Weber, "#foodporn: Obesity
patterns in culinary interactions," in DH'15: International Conference
on Digital Health 2015. ACM, 2015, pp. 51–58.
[9] C. Castillo, M. Mendoza, and B. Poblete, "Information credibility on
twitter," in Proceedings of the 20th international conference on World
wide web. ACM, 2011, pp. 675–684.
[10] J. Leskovec, L. Backstrom, and J. Kleinberg, "Meme-tracking and the
dynamics of the news cycle," in Proceedings of the 15th ACM SIGKDD
international conference on Knowledge discovery and data mining.
ACM, 2009, pp. 497–506.
[11] F. Yang, Y. Liu, X. Yu, and M. Yang, "Automatic detection of rumor on
sina weibo," in Proceedings of the ACM SIGKDD Workshop on Mining
Data Semantics. ACM, 2012, p. 13.
[12] K. Wu, S. Yang, and K. Q. Zhu, "False rumors detection on sina weibo
by propagation structures," in 2015 IEEE 31st International Conference
on Data Engineering.
IEEE, 2015, pp. 651–662.
[13] J. Ratkiewicz, M. Conover, M. Meiss, B. Gonc¸alves, S. Patil, A. Flam-
mini, and F. Menczer, "Truthy: mapping the spread of astroturf in
microblog streams," in Proceedings of the 20th international conference
companion on World wide web. ACM, 2011, pp. 249–252.
[14] J. Ma, W. Gao, Z. Wei, Y. Lu, and K.-F. Wong, "Detect rumors using
time series of social context information on microblogging websites,"
in Proceedings of
the 24th ACM International on Conference on
Information and Knowledge Management. ACM, 2015, pp. 1751–1754.
[15] V. Qazvinian, E. Rosengren, D. R. Radev, and Q. Mei, "Rumor has
it: Identifying misinformation in microblogs," in Proceedings of the
Conference on Empirical Methods in Natural Language Processing.
Association for Computational Linguistics, 2011, pp. 1589–1599.
[16] World Health Organization et al., "Risk communication in the context
of zika virus: interim guidance," pp. 3–4, March 2016.
[17] P. Kostkova, V. Mano, H. J. Larson, and W. S. Schulz, "Vac medi+ board:
Analysing vaccine rumours in news and social media," in Proceedings of
the 6th International Conference on Digital Health Conference. ACM,
2016, pp. 163–164.
[18] M. Imran, C. Castillo, J. Lucas, P. Meier, and S. Vieweg, "Aidr:
Artificial intelligence for disaster response," in Proceedings of the 23rd
International Conference on World Wide Web. ACM, 2014, pp. 159–
162.
[19] M. Dredze, D. A. Broniatowski, and K. M. Hilyard, "Zika vaccine
misconceptions: A social media analysis," Vaccine, vol. 34, pp. 3441–
3442, 2016.
[20] World Health Organization. (2016, September) Dispelling rumours
around zika and complications. http://www.who.int/emergencies/zika-
virus/articles/ rumours/en/. Accessed: 2016-07-20.
[21] A. Nourbakhsh, X. Liu, S. Shah, R. Fang, M. M. Ghassemi, and Q. Li,
"Newsworthy rumor events: A case study of twitter," in 2015 IEEE
International Conference on Data Mining Workshop (ICDMW).
IEEE,
2015, pp. 27–32.
[22] B. David, N. Andrew, and J. Michael, "Latent dirichlet allocation,"
Journal of machine Learning research, vol. 3, pp. 993–1022, Jan 2003.
[23] I. Ruthven and M. Lalmas, "A survey on the use of relevance feedback
for information access systems," The Knowledge Engineering Review,
vol. 18, no. 2, pp. 95–145, 2003.
[24] B. Yu, M. Willis, P. Sun, and J. Wang, "Crowdsourcing participatory
evaluation of medical pictograms using amazon mechanical turk," Jour-
nal of medical Internet research, vol. 15, no. 6, p. e108, 2013.
[25] H. Zhai, T. Lingren, L. Deleger, Q. Li, M. Kaiser, L. Stoutenborough,
and I. Solti, "Web 2.0-based crowdsourcing for high-quality gold stan-
dard development in clinical natural language processing," Journal of
medical Internet research, vol. 15, no. 4, p. e73, 2013.
[26] W. Lowe, K. Benoit, S. Mikhaylov, and M. Laver, "Scaling policy
preferences from coded political texts," Legislative studies quarterly,
vol. 36, no. 1, pp. 123–155, 2011.
[27] L. Feng, M. Jansche, M. Huenerfauth, and N. Elhadad, "A comparison
of features for automatic readability assessment," in Proceedings of the
23rd International Conference on Computational Linguistics: Posters.
Association for Computational Linguistics, 2010, pp. 276–284.
[28] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean,
"Distributed representations of words and phrases and their composi-
tionality," in Advances in neural information processing systems, 2013,
pp. 3111–3119.
[29] J. Friedlin and C. J. McDonald, "An evaluation of medical knowledge
contained in wikipedia and its use in the loinc database," Journal of the
American Medical Informatics Association, vol. 17, no. 3, pp. 283–287,
2010.
[30] B. Rink, S. Harabagiu, and K. Roberts, "Automatic extraction of
relations between medical concepts in clinical texts," Journal of the
American Medical Informatics Association, vol. 18, no. 5, pp. 594–600,
2011.
[31] J. M. Heilman, E. Kemmann, M. Bonert, A. Chatterjee, B. Ragar, G. M.
Beards, D. J. Iberri, M. Harvey, B. Thomas, W. Stomp et al., "Wikipedia:
a key tool for global public health promotion," Journal of medical
Internet research, vol. 13, no. 1, p. e14, 2011.
[32] M. R. Laurent and T. J. Vickers, "Seeking health information online:
does wikipedia matter?" Journal of the American Medical Informatics
Association, vol. 16, no. 4, pp. 471–479, 2009.
[33] M. Cord and P. Cunningham, Machine learning techniques for multime-
dia: case studies on organization and retrieval. Springer, 2008.
[34] H. Zhang and J. Su, "Naıve bayesian classifiers for ranking," in Machine
Learning: ECML 2004. Springer, 2004, pp. 501–512.
[35] T. K. Ho, "Random decision forests," in Document Analysis and
Recognition, 1995., Proceedings of the Third International Conference
on, vol. 1.
IEEE, 1995, pp. 278–282.
[36] W. Du and Z. Zhan, "Building decision tree classifier on private data," in
Proceedings of the IEEE international conference on Privacy, security
and data mining-Volume 14. Australian Computer Society, Inc., 2002,
pp. 1–8.
[37] S. Towers, S. Afzal, G. Bernal, N. Bliss, S. Brown, B. Espinoza,
J. Jackson, J. Judson-Garcia, M. Khan, M. Lin et al., "Mass media and
the contagion of fear: the case of ebola in america," PloS one, vol. 10,
no. 6, p. e0129179, 2015.
[38] S. O. Oyeyemi, E. Gabarron, and R. Wynn, "Ebola, Twitter,
and misinformation: a dangerous combination?" British Medical
Journal, vol. 349, no. October, p. g6178, 2014. [Online]. Available:
http://www.bmj.com/cgi/doi/10.1136/bmj.g6178
[39] F. Jin, W. Wang, L. Zhao, E. Dougherty, Y. Cao, C. T. Lu, and
N. Ramakrishnan, "Misinformation propagation in the age of Twitter,"
Computer, vol. 47, no. 12, pp. 90–94, 2014.
[40] The Vaccine Confidence Project,
"Sierra Leone: Ebola
campaigns
vaccination
hamper
http://www.vaccineconfidence.org/sierra-leone-ebola-fears-hamper-
vaccination-campaigns-against-polio-and-measles/, jun 2015, accessed:
2016-10-16.
against
Polio
fears
and Measles,"
[41] H. J. Larson, R. Wilson, S. Hanley, A. Parys, and P. Paterson, "Tracking
the global spread of vaccine sentiments: The global response to Japan's
suspension of its HPV vaccine recommendation," Human Vaccines and
Immunotherapeutics, vol. 10, no. 9, pp. 2543–2550, 2014.
[42] Z. Zhao, P. Resnick, and Q. Mei, "Enquiring minds: Early detection of
rumors in social media from enquiry posts," in Proceedings of the 24th
International Conference on World Wide Web, ser. WWW '15. New
York, NY, USA: ACM, 2015, pp. 1395–1405.
[43] M. C. Sturkenboom, "The narcolepsy-pandemic influenza story: Can the
truth ever be unraveled?" Vaccine, vol. 33, pp. B6–B13, 2015.
[44] M. Duggan and J. Brenner, The demographics of social media users,
Pew Research Center's Internet & American Life Project
2012.
Washington, DC, 2013, vol. 14.
[45] N. Calabretta, "Consumer-driven, patient-centered health care in the
age of electronic information," Bulletin. Medical Library Association,
vol. 90, no. 1, pp. 32–37, 2002.
[46] D. Warner and J. D. Procaccino, "Toward wellness: Women seeking
health information," Journal of the American Society for Information
Science and Technology, vol. 55, no. 8.
|
1906.06545 | 1 | 1906 | 2019-06-15T12:38:29 | Interactive health communication and the construction of the identity of the person with low vision in social media | [
"cs.SI",
"cs.CY",
"cs.HC"
] | With use and appropriation of digital environments by the Green Cane movement in Brazil, the informational character in health is a central discursive resource, and occurs imbued with (self) conceptions about the characteristic ways of thinking, feeling and acting of the person with low vision. This work aims at exploring the discourse of the person with low vision in the social media about their own social identity. Based on the Interactive Health Communication, videos on Youtube and Facebook and Instagram posts of the Virtual Group Stargardt, a virtual community made up of people with low vision and suffering from Stargardt's Disease, were investigated. From the selection of excerpts and their coding, 42 identity traits were identified and grouped into a synthetic model with 08 categories: (T1) we are low vision and we use the green cane; (T2) we have sensitivity to light and we wear sunglasses; (T3) we have difficulties in the day-to-day, but we use assistive strategies and technologies; (T4) we are a PcD (Person with Disability) and we have rights guaranteed by law; (T5) we seek to understand about our disease and we are the spokesperson of it; (T6) we have a visual impairment, but we are not just that; (T7) we live with conflicts and contradictions by the way we see things, and; (T8) we recognize as a community. Such traits are constructed interactively, through a construction based on moments of agreement, disagreement and good humor. The discourses are oriented in the consolidation of a proper identity, distinct from the person with blindness, but similar in the legal framework of the visually impaired person. | cs.SI | cs | Comunicación interactiva en salud y construcción de
identidad en redes sociales de personas con baja visión
Gustavo Caran1, Ronaldo Araujo2, Críspulo Travieso Rodríguez3
1 0000-0002-1199-5002 Instituto Brasileiro de Informação em C&T, Brasil. [email protected]
2 0000-0003-0778-9561 Universidade Federal de Alagoas, Brasil. [email protected]
3 0000-0002-0774-0728 Universidad de Salamanca, España. [email protected]
Resumen:
En el uso y apropiación del ámbito digital por parte del movimiento Bengala Verde en Brasil, el carácter
informativo en salud es un recurso discursivo fundamental, y se desarrolla infundido por (auto)concepciones
sobre los modos característicos de pensar, sentir y reaccionar de la persona con baja visión. El objetivo de este
estudio es explorar el discurso de estas personas respecto a su propia identidad social en medios y redes
sociales. Basado en la Comunicación Interactiva en Salud, se analizaron vídeos de YouTube y publicaciones
en Facebook e Instagram del Grupo Virtual Stargardt, una comunidad virtual compuesta por personas de baja
visión y que padecen la enfermedad de Stargardt. A partir de la selección de fragmentos de esos discursos y
de su codificación, se identificaron 42 rasgos identificadores, agrupados en un modelo sintético de 8 categorías:
(T1) tenemos baja visión y usamos un bastón verde; (T2) tenemos sensibilidad a la luz y usamos gafas de sol;
(T3) tenemos dificultades en el día a día, pero hacemos uso de estrategias y tecnologías asistenciales; (T4)
somos personas con discapacidad y la ley garantiza nuestros derechos; (T5) queremos saber sobre nuestra
enfermedad y somos portavoces de la misma; (T6) tenemos una discapacidad visual pero somos más que eso;
(T7) convivimos con ciertos problemas y contradicciones por la forma en que vemos las cosas, y; (T8) nos
reconocemos como comunidad. Estos rasgos se construyen de forma interactiva, por medio de una elaboración
pautada en momentos de acuerdo, discordancia y sentido del humor. Los discursos contribuyen a la
consolidación de una identidad propia, distinta a la de la persona invidente pero similar en cuanto al marco
legal de la persona con discapacidad visual.
Palabras clave: Persona com discapacidad; Baja visión; Identidad; Comunicación interactiva em salud; Redes
sociales.
Resumo
No uso e apropriação dos ambientes digitais pelo movimento Bengala Verde no Brasil, o caráter informativo
em saúde é um recurso discursivo central, e ocorre imbuído de (auto) concepções a respeito de modos
característicos de pensar, sentir e agir da pessoa com baixa visão. O objetivo deste trabalho foi explorar o
discurso da pessoa com baixa visão nas mídias sociais sobre sua própria identidade social. Apoiada na
Comunicação Interativa em Saúde, foram investigados vídeos do Youtube e postagens do Facebook e
Instagram do Grupo Virtual Stargardt, uma comunidade virtual composta por pessoas com baixa visão e
acometidas pela Doença de Stargardt. A partir da seleção de trechos e da sua codificação, foram identificados
42 traços identitários, agrupados em um modelo sintético com 08 categorias: (T1) somos baixa visão e o
usamos a bengala verde; (T2) temos sensibilidade à luz e usamos óculos de sol; (T3) temos dificuldades no
dia-a-dia, mas utilizamos estratégias e tecnologias assistivas; (T4) somos uma PcD e temos direitos garantidos
por lei; (T5) buscamos entender sobre nossa doença e somos o porta-voz dela; (T6) temos uma deficiência
visual, mas não somos apenas isso; (T7) convivemos com conflitos e contradições pela maneira como
enxergamos as coisas, e; (T8) nós reconhecemos como uma comunidade. Tais traços são construídos
interativamente, por meio de uma construção pautada em momentos de concordância, discordância e bom-
humor. Os discursos se orientam na consolidação de uma identidade própria, distinta da pessoa com cegueira,
mas semelhante no enquadramento legal da pessoa com deficiência visual.
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 1
Palavras-chave: Pessoa com Deficiência; Baixa Visão; Identidade; Comunicação Interativa em Saúde; Redes
Sociais na Internet.
Introducción
En los últimos 20 años Internet se ha convertido en un espacio de movilización social en diversos
ámbitos. Conceptos como colaboración, participación, compromiso o cooperación se han incorporado
a la web, modificando su configuración inicial, unidireccional, asíncrona y estática, hacia una
comunicación cada vez más multidireccional, síncrona y dinámica (Recuero, 2009). La red se ha
vuelto así un espacio de diálogo amplio y diverso, en el que las conversaciones se conforman y
distribuyen mediante múltiples herramientas, como son Facebook, Twitter, Instagram, YouTube etc.
(Recuero, 2012).
Por un lado, esta comunicación virtual es capaz de promover un entorno más democrático, en
que se comparten y debaten perspectivas ideológicas y sociales distintas. Los grupos sociales
minoritarios tienen ahora un espacio en el que pronunciarse, de defensa de su identidad y de sus
posiciones políticas e ideológicas. Y por otro lado, estos espacios virtuales no están libres de la
influencia del capital, de la globalización y de los vaivenes propios de una sociedad fluída, dinámica
y condicionada de forma constante por impulsos de tipo emocional (Bauman & Mauro, 2016). Al
estar supeditada a influencias masivas y de carácter heterogéneo, la web ha devenido en un espacio
determinado por los distintos movimientos sociales, que articulan todo un entramado de esperanzas
y sentimientos de indignación (Castells, 2017).
En este contexto, los grupos sociales minoritarios se movilizan para dejar su impronta en esa
comunicación en red. Como una forma de lucha y de poder para su inclusión social, dichos grupos
buscan un "lugar en la mesa de debate", manifestando no solo aquello que defienden en cuanto a
posición político-ideológica, sino también construyendo, defendiendo y dando a conocer su identidad
-- además de armarse de las prácticas informacionales que contribuyen a este proceso -.
Dentro de los estudios de mediación de la información en el ámbito de la salud, la Comunicación
Interactiva en Salud (CIS) se define a partir del uso que las personas hacen de los dispositivos
informáticos para buscar, obtener y compartir información sobre salud (Araújo, Silva & Mota, 2015).
Para Eng et al., (1999), se considera CIS cualquier interacción de un individuo -- consumidor,
paciente, cuidador o profesional -- mediante un dispositivo electrónico o tecnología de comunicación
para acceder o transmitir información sanitaria o para recibir orientación o ayuda en un asunto
relacionado con la salud. Las investigaciones previas sobre CIS se han ocupado más de la educación
y la promoción de hábitos saludables (Eng & Gustafson, 1999; Murray et al, 2005; Rada, 2005) y
solo algunas se han centrado en el análisis de la subjetividad y los rasgos identificadores de los sujetos
durante el proceso de mediación e intercambio de informaciones suministradas por los medios
digitales.
En cuanto a las intervenciones en redes sociales para promover la igualdad en salud, Welch et al.
(2016) defienden que los distintos medios sociales están determinados en base a que concentran
bloques de construcción funcional a partir del grado de interacción y comunicación entre los usuarios
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 2
y los autores; uno de esos bloques es precisamente el de la identidad, definida en los términos en que
los usuarios y los grupos se revelan y relacionan. Redundando en la idea planteada, ello cobra aún
mayor relevancia en determinados colectivos; en palabras de Vaca Vaca et al (2012), "esta relación
dialéctica entre interpretaciones y actos, entre individuos y contextos sociales, hace que el estudio de
las representaciones sociales sea de utilidad en la comprensión de problemáticas comunitarias, como
lo es la de la discapacidad, pues permite comprender cogniciones y sistemas explicativos que median
las interacciones en determinados grupos".
Entre los numerosos grupos sociales minoritarios con presencia en internet, este trabajo se centra
en las Personas con Discapacidad Visual (PDV), un grupo heterogéneo en cuanto a sus capacidades
visuales y a sus rasgos socio-identificadores. Igual que los demás subgrupos de Personas con
Discapacidad (PcD), las PDV buscan, también en la web, acceso a productos, servicios,
informaciones y derechos. Términos como accesibilidad, inclusión social y digital, integración social
y diseño universal representan ese esfuerzo promovido por las propias personas con discapacidad
visual, por la sociedad y por los organismos públicos en construir una relación bidireccional entre
este grupo social y la sociedad en que se inserta (García, 2102). Bidireccional en el sentido en que
permite el acceso y la inclusión, facilitando que el individuo asuma plenas capacidades a la hora de
interaccionar activa y pasivamente con la sociedad, logre una comprensión del mundo y de su
posición social y constituya su identidad por medio de elementos materiales y simbólicos.
Tanto dentro como fuera del ámbito de la Ciencia de la Información (CI), varios trabajos han
explorado el acceso y la accesibilidad en el contexto de las personas con discapacidad visual,
discutiendo los factores actitudinales, técnico/tecnológicos, políticos y socioculturales que marcan su
inclusión en el ámbito digital. Sin embargo, especialmente en CI, se ha abordado de forma escasa esa
expresión identitaria de las PDV en internet, a través de los contenidos multimedia compartidos por
ellas mismas en entornos en línea. ¿Cómo construye una persona con discapacidad visual su presencia
digital? ¿Qué discurso defiende? ¿Qué rasgos identificadors manifiesta? ¿Y ante qué otros aspectos
se posiciona de forma contraria? Estas preguntas motivaron que se llevara a cabo la siguiente
investigación, cuyo objetivo es analizar de manera cualitativa, exploratoria y descriptiva la presencia
digital y el discurso de las personas con discapacidad visual en la construcción de su identidad.
2 Metodología
Según las directrices de la Organización Mundial de la Salud (2003) los tipos de discapacidad
visual pueden clasificarse en dos grupos: ceguera; y baja visión o visión insuficiente. Una persona
invidente puede o no tener resto visual, pero en todo caso no lo usa de manera significativa para
localizar objetos u orientarse. Frente a ello, la persona con baja visión usa ese remanente visual que
posee en sus actividades cotidianas (Caran, 2013). Los parámetros clínicos de medición de la
capacidad visual se han materializado en la creación de una clasificación normativa. Sin embargo, la
experiencia de no ver, parcial o completamente, depende del contexto práctico, social y cultural.
Según establecía en 2015 el nuevo Estatuto da Pessoa com Deficiência: la discapacidad se expresa
en base a la desigualdad de oportunidades experimentadas (Dhanda, 200'8; Lago Júnior & Barbosa,
2016).
La distinción entre esos dos grupos se ha vuelto actualmente más evidente en Brasil, con la
aparición online de movimientos sociales como Bengala Verde1. Sustentados en el lema queremos
que você nos veja, el objetivo de este movimiento es difundir socialmente la identidad de la persona
1 http://www.bengalaverde.com.br/ (Bastón verde)
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 3
con baja visión, utilizando también el bastón para indicar que se es una PDV, pero diferenciándose
de la persona invidente por el color verde. Esta iniciativa se inspiró en el proyecto social del mismo
nombre, puesto en marcha en Argentina en 2012 por la profesora Perla Mayo. En Brasil, el
movimiento Bengala Verde emplea internet para promover espacios de interacción entre personas
con baja visión y para concienciar socialmente sobre su distinción con respecto a las personas que
padecen ceguera.
En el contexto descrito, este trabajo analiza la presencia digital y los discursos de las personas
con baja visión. Tras localizar los registros micro-documentales de los medios y redes sociales
(Jeanneret, 2015), se comenzó un tratamiento metodológico de exploración inspirado en la teoría
Actor-Red de Bruno Latour (2012). Las huellas digitales de los autores sobre los discursos de las
personas con baja visión fueron monitorizados, empezando por la página web del movimiento
Bengala Verde y ampliando la investigación a partir de la navegación por los hiperenlaces y
referencias publicados desde allí.
En este examen se ha contemplado la identificación de comunidades online relevantes
impulsadas por los propios usuarios (User-Driven Social Support) -- esto es, orientadas a personas
con baja visión y gestionadas por ellas mismas (Ahmed et al., 2017) -. Tras esa fase inicial, se
seleccionó el Grupo Virtual Stargardt (GVS)2, creado en 2012 por los afectados por la enfermedad
de Stargardt (ES), una patología que provoca la degeneración de los fotorreceptores de la zona central
de la retina (mácula) y que lleva a la condición de baja visión. El GVS tiene presencia en Facebook,
YouTube, Instagram y Whatsapp y se trata de una comunidad cuyo objetivo es compartir
informaciones y apoyo social a los pacientes de esta dolencia.
Aunque la enfermedad de Stargardt está catalogada como enfermedad rara, es una de las
patologías degenerativas de la retina más frecuentes en la población mundial, afectando a una de cada
10.000 personas. La perdida de capacidad visual (agudeza visual) se puede manifestar en la infancia
o ya en la edad adulta. La facultad de ver detalles en la visión central se va reduciendo gradualmente,
pero no suele derivar en ceguera. Por eso, la persona que padece esta enfermedad suele vivir como
una persona con visión normal, si bien esta va perdiendo agudeza, hasta el momento en que se
reconoce a sí misma y es legalmente reconocida como persona con baja visión (Retina Brasil, 2019).
De los canales del GVS se seleccionaron solo los de acceso público, concretamente su página en
Facebook, su perfil en Instagram y su canal en YouTube. Se consideraron productos de comunicación
interactiva en salud, y por tanto se analizaron como tales los contenidos de las entradas y comentarios.
Se recogieron todos los vídeos de YouTube y publicaciones de Instagram, con sus correspondientes
descripciones y reacciones. En el caso de Facebook, debido al gran volumen de publicaciones
existentes, se optó por recopilar las publicaciones de 2018 y sus comentarios. Se usó la aplicación
Netvizz3 para la recogida automática de los datos de Facebook, mientras que en el resto de medios se
procedió de manera manual. Este proceso se llevó a cabo el 5 de enero de 2019 y se recogió un total
de 42 vídeos de YouTube, 18 publicaciones de Instagram y 70 posts de Facebook. Para el tratamiento
de los datos se utilizó Excel 365 y el análisis de los mismos se realizó con el programa ATLAS.ti. La
figura 1 ilustra los pasos seguidos en la metodología de este trabajo.
Figura 1: Fases de la metodología empleada.
2 http://www.stargardt.com.br/
3 https://apps.facebook.com/107036545989762/?ref=br_rs
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 4
En los estudios sobre medios sociales, incluso en los orientados hacia el marketing digital, cada
vez es más habitual el estudio de reglas de conducta aplicadas al análisis del comportamiento de los
usuarios. Una de estas normas, esgrimidas por Scott (2013), destaca que, además del hecho de que
los actores en redes sociales estén dispuestos e interesados en la interacción con otros y en la
participación, las publicaciones dicen mucho sobre quienes las comparten. Dicho autor llega a afirmar
que "usted es lo que publica". En esa línea, para esta investigación se partió de la premisa de que los
contenidos de las publicaciones y de sus reacciones eran significativas sobre el grupo analizado, y los
rasgos identificadors percibidos en las publicaciones fueron agrupados y descritos en función de sus
características y similitudes.
Como se ha comentado, el análisis de los datos se realizó en ATLAS.ti, siguiendo las siguientes
etapas: 1) importación de los vídeos de YouTube (42 documentos) y de las publicaciones y
comentarios de Facebook (70 documentos) en formato .pdf; 2) importación de páginas web y vídeos
compartidos en publicaciones de Facebook (26 documentos); 3) detección y citación de fragmentos
de documentos que incluían percepciones o creencias sobre la persona con enfermedad de Stargardt,
en expresiones como "yo soy…", "nosotros somos…", "la persona con ES es…", etc.; 4) agrupación
y clasificación de la citaciones obtenidas en expresiones (códigos) que representaran los rasgos
identificadors presentes en los contenidos compartidos, y; 5) análisis de los códigos y citas, ajustados
y sistematizados según un modelo de síntesis.
3 Resultados y discusión
Los contenidos procedentes de vídeos de YouTube y las publicaciones de Facebook e Instagram
permitieron la identificación de 42 códigos, que fueron agrupados en 8 rasgos identificadores de la
persona afectada por la enfermedad de Stargardt. Estos rasgos están relacionados con la dimensión
de los sentidos en la mediación de información (Marteleto, 2010), y su objeto de representación en
construcción intersubjetiva es la persona con ES en su vida diaria respecto a su comunicación
interactiva en salud. Estos rasgos representan tanto aspectos subjetivos, referidos a sus modos de
pensar y sentir sobre sí mismo, como aspectos objetivos, sus formas de expresión y reacción en el
uso de objetos cotidianos.
A la hora de llevar a cabo el análisis, este trabajo concebía que la identidad de la persona con ES
no está separada del resto de su existencia. Lo que "ellos son" no esta separado del resto de "lo que
viven" o de "lo que hacen" o "lo que usan" en el día a día. Por tanto, los rasgos identificadores son
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 5
capas representativas híbridas sobre actores, acciones y artefactos de la vivencia de la persona con
esta enfermedad, sin separar los sujetos y los objetos de su contexto social (Latour, 2012).
En la figura 2 se muestran los rasgos identificadores, indicando los distintos aspectos
representados para cada uno de ellos. En concreto, dichos rasgos son los siguientes: (T1) tenemos
baja visión y usamos un bastón verde; (T2) tenemos sensibilidad a la luz y usamos gafas de sol; (T3)
tenemos dificultades en el día a día, pero hacemos uso de estrategias y tecnologías asistenciales; (T4)
somos personas con discapacidad y la ley garantiza nuestros derechos; (T5) queremos saber sobre
nuestra enfermedad y somos portavoces de la misma; (T6) tenemos una discapacidad visual pero
somos más que eso; (T7) convivimos con ciertos problemas y contradicciones por la forma en que
vemos las cosas, y; (T8) nos reconocemos como comunidad.
Figura 2: Rasgos identificadores de la persona con enfermedad de Stargardt
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 6
Los tres primeros rasgos asocian la identidad de la persona con ES a objetos que han sido
incorporados a su rutina: el bastón, las gafas de sol y las tecnologías de apoyo. Los rasgos T4 y T5
representan el aspecto social recogido en la legislación y el papel de portavoces en la construcción
social de la identidad de la persona con ES. Los rasgos T6 y T7 constituyen aspectos de la vida diaria
que los definen más allá de la enfermedad (como estilo de vida), pero vinculados a los problemas y
equívocos inherentes a la baja visión. Por último, el rasgo T8 se refiere a la relación entre las personas
con ES, mediante su vinculación comunitaria e institucional.
(T1) Tenemos baja visión y usamos un bastón verde
El discurso más recurrente en el GVS demuestra una vinculación de la persona con enfermedad
de Stargardt con la condición de discapacidad visual establecida por la Organización Mundial de la
Salud (OMS), usando expresiones como "soy de baja visión", "tengo baja visión" y "tengo visión por
debajo de lo normal". En una de las intervenciones se dice "[…] tengo enfermedad de Stargardt, así
que soy subnormal" (Vídeo de YouTube de 9 de julio de 2016), apropiándose de esa definición
normativa como aspecto inherente a esta enfermedad. En términos clínicos, no todas las personas con
ES se consideran de baja visión (OMS, 2013). Sin embargo, con la evolución natural del proceso
degenerativo de la visión (aún sin tratamiento para interrumpir o revertir este proceso), la persona
con ES tiende a perder agudeza visual, y a encasillarse como de baja visión en algún momento de su
vida.
Otro aspecto referido a la forma en que la persona con esta enfermedad se presenta a los demás
es informar de su agudeza visual. Así se comprobó en el discurso de cinco individuos, según el
siguiente fragmento: "me llamo Luciano Marques […], padezco la enfermedad de Stargardt […] y
mi grado de visión es 20/100" (Vídeo de YouTube de 21 de enero de 2017). Esa asimilación de los
patrones normativos de agudeza visual reconocidos por la OMS es una fracción cuyo numerador
representa la distancia en que esa persona es capaz de ver un determinado objeto, siendo el
denominador la distancia a la que lo ve una persona con visión normal. En otras palabras, tener una
agudeza de 20/100 significa que esa persona tendrá que estar cinco veces más cerca para que sea
capaz de ver el mismo objeto.
También estuvo presente en las declaraciones el incentivo del uso del bastón verde en la rutina
de la persona con ES, relacionando este objeto con su identidad como persona con baja visión. El
bastón blanco, como elemento simbólico reconocido socialmente como propio de las personas
invidentes, se redimensiona aquí por la persona con baja visión por el color verde. Ello implica el
mensaje de que "también somos personas con discapacidad, vemos con dificultad y tenemos
necesidades distintas a las de los invidentes". Además de ser un instrumento que proporciona
seguridad y mejor movilidad a estos individuos, se concibe como un objeto de señalización, para que
los demás sepan que se trata de una persona con baja visión, tal como se muestra en la siguiente
intervención:
[Marina:] Lo importante del bastón verde es […] que las demás personas
nos identifican. Porque puede que estés en un lugar en que vas a ver a
alguien, pero puede que no lo veas. Esa persona te va a identificar como
persona con discapacidad visual […] es importante, es importante porque te
va a esquivar, no se va a tropezar contigo, porque estás usando el bastón. O
si estás en algún lado y vas a pedir que alguien te ayude, en un banco o en
una estación. Con el bastón, te
identifican inmediatamente como
discapacitado y esa persona te va a prestar auxilio, te va a ayudar. Y así no
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 7
tienes que andar buscando a alguien que te eche una mano y pasar por más
aprietos. (Vídeo de YouTube de 16 de febrero de 2018)
Este aspecto identificado en el presente estudio coincide plenamente con una investigación de
enfoque cualitativo anterior, también centrada en personas con baja visión. En ella, los autores, Morel
y Villalobos (2011) mantienen que lejos de negar la discapacidad, se empeñan en mostrarla y
demostrarla, y recogen la afirmación de uno de los participantes que declara no temer "ponerse el
cartel y usar un bastón sin importar si es blanco o verde, lo que importa es que lo necesitamos y con
él nos sentimos seguros".
El lema "queremos que nos ayudéis" encarna la intención de persona con ES de que el color
verde del bastón sea capaz de distinguirla en la sociedad. Esto es, promueve una construcción social
de conocimiento y reconocimiento de sus características y necesidades propias. En los argumentos
de Sony, una persona con baja visión que lleva dos años usando el bastón verde, se ilustra la
importancia del color verde del bastón, al decir que "creo que […] desde el momento en que puedo
identificarme con lo que me pasa, me siento más cómodo. Y las personas que me miran necesitan
también saber lo que me pasa" (Post n.º 13 de Facebook).
(T2) tenemos sensibilidad a la luz y usamos gafas de sol
El uso de gafas de sol es también un elemento identificador de la persona con enfermedad de
Stargardt, y es, ante todo, una consecuencia fisiológica de la propia dolencia: la elevada sensibilidad
a la luz, denominada fotofobia. Según afirma Marina, "incluso en situaciones en que la claridad
aparentemente no molesta, para nosotros puede ser excesiva […]" (Vídeo de YouTube de 12 de
octubre de 2016), así que el uso de gafas oscuras no es solo una cuestión de cuidado de la salud de
los ojos, sino un elemento imprescindible para el bienestar diario -- incluso en entornos cerrados muy
iluminados -.
Al igual que el bastón, las gafas de sol con monturas grandes que cubren todo el campo visual
son elementos característicos de la persona con ES. Muchos poseen varias, con tipos de monturas y
lentes adaptadas a distintos ambientes. Las molestias propias de la luminosidad diurna hacen que las
noches sean el periodo más agradable y cómodo, según cuenta Luciano, un deportista habitual: "[…]
mi visión es de 20/100. No es mucha, pero me es bastante para andar por la noche sin ningún
problema". Y culmina afirmando que "[…] acabamos yendo en bici más por la noche. Me encanta
montar en bici por la noche, es cuando más disfruto" (Vídeo de YouTube de 21 de enero de 2017).
(T3) tenemos dificultades en el día a día, pero hacemos uso de estrategias y tecnologías de apoyo
Uno de los principales problemas manifestados por las personas con esta enfermedad tiene que
ver con la lectura, especialmente para aquellos que están en periodo de formación escolar o
académica. La lectura de libros, pizarras, etiquetas de productos e incluso documentos escritos a mano
se vuelven tareas difíciles a simple vista. Por ello, las lupas son una herramienta esencial para el día
a día, ya sean ópticas o electrónicas. Esta relación con las lupas es tan estrecha que Marina (Vídeo de
YouTube de 20 de agosto de 2016) afirma que son sus mejores amigas, que las usa a diario y que le
son tan indispensables como las gafas de sol.
Los ordenadores y smartphones también son elementos cotidianos de la persona con ES, para
cuyo uso han de emplear constantemente tecnologías de apoyo, como puedan ser las técnicas de
ampliación de pantalla, el aumento del contraste y los lectores (conversores de texto a voz). Este tipo
de aplicaciones se utilizan tanto al usar propiamente los ordenadores y teléfonos móviles, como al
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 8
tomarlos como tecnologías de apoyo para la visualización de imágenes pequeñas o textos cortos. Por
ejemplo, la cámara de un teléfono pude usarse para ampliar los textos impresos en un folleto o para
ampliar un menú en una pantalla de un dispositivo electrónico que no esté adaptado a una persona
con baja visión.
Aunque las diversas tecnologías de apoyo ya posibilitan ayudar en el día a día a estos individuos,
aún no permiten la realización de ciertas prácticas de forma autónoma. Una de esas lagunas que
todavía no se ha cubierto satisfactoriamente es la identificación de los rostros de personas -- cuestión
apuntada como fundamental por la persona con enfermedad de Stargardt -. Debido a la significativa
reducción de la capacidad de ver los detalles, la persona con ES no percibe los rasgos faciales de los
que le rodean. Esta característica innata de los seres humanos se considera primordial en el proceso
de socialización, por lo que la pérdida de esta capacidad puede traer consecuencias prácticas y
emocionales negativas en la relación interpersonal y en la autoestima. En palabras de Gabriela y
Milka:
[Gabriela:] Hoy día tenemos muchas aplicaciones que nos facilitan mucho
las cosas, pero una de las que sigue siendo difícil para nosotros que tenemos
una discapacidad visual es que no conseguimos disitiguir los rasgos faciales
de la gente. Esto termina produciendo sufrimiento, muchas dificultades.
(Vídeo de YouTube de 3 de marzo de 2016)
[Milka:] Ya no lograba reconocer a la gente, incluso aunque estuviesen
bastante cerca de mí -- a metro o metro y medio. Y esto fue mermando
mucho mi autoestima y mi productividad. Llegué a cuestionarme mi
capacidad para trabajar. (Vídeo de YouTube de 21 de junio de 2017)
(T4) somos personas con discapacidad y la ley garantiza nuestros derechos
Las personas con esta enfermedad consideran que tienen una discapacidad, y por tanto sufren de
forma colectiva las barreras a la accesibilidad y la desigualdad de oportunidades. Los acuerdos
internacionales y la leyes nacionales, creadas y potenciadas especialmente en los últimos treinta años,
atribuyen derechos especiales a las personas con discapacidad. Estas garantías legales cubren diversos
aspectos de la vida de estas personas, como acceso a la educación, reservas en el mercado de trabajo,
jubilaciones por invalidez, gratuidad y beneficios en el trasporte público, ventajas en la compra de
vehículos, atención preferente y descuentos en diversos eventos. Todos estos aspectos se abordan con
detalle en el GVS, lo que supone convertirse en un canal informativo y de incentivación al uso de
estas prerrogativas legales.
Al recopilar toda la legislación que rige estos derechos especiales, el GVS establece el alcance y
la definición legal de "qué es ser una persona con discapacidad y dónde nos encuadramos
legalmente", "cuáles son las leyes que tratan de reducir nuestra desigualdad de oporunidades" y "qué
derechos se aplican a nuestra discapacidad". Se conforma así una percepción de la persona con ES y
sus derechos desde el punto de vista legal, señalando su importancia en la vida diaria, para facilitar
su movilidad y desplazamientos, mantenerse económicamente o estudiar. Los carnets especiales para
el transporte público y las plazas de aparcamiento reservadas son documentos que los legitiman como
personas con algún tipo de discapacidad.
A pesar de que estas garantías legales persiguen la igualdad de oportunidades, la persona con
enfermedad de Stargardt se encuentra muy limitada en cuanto a la reserva de plazas de empleo
público. Según atestigua Milka (Vídeo de YouTube de 20 de mayo de 2017) la persona que padece
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 9
ES cuenta con total amparo legal para realizar los exámenes en condiciones especiales, pero siempre
que pueda asumir cargos que sean compatibles con su discapacidad. Así, aún concursando a plazas
por turno libre (no reservadas a personas con discapacidad), el candidato está circunscrito a aquellos
puestos cuyas funciones se le consideren factibles.
(T5) queremos saber sobre nuestra enfermedad y somos portavoces de la misma
Igual que otras minorías, la persona que padece esta enfermedad actúa como portavoz de sus
patrones de comportamiento, difundiendo información y defendiendo sus intereses (García, 2012).
Este papel queda claramente patente en las intervenciones del GVS, en las que el carácter informativo
sobre "cómo ve la persona con ES" (Vídeo de YouTube de 15 de noviembre de 2016), "qué es la
enfermedad de Stargardt y cómo se manifiesta" (Vídeo de YouTube de 1 de abril de 2016), entre
otros contenidos que explican a las personas que no tienen esta enfermedad qué significa padecerla.
En estos discursos, aparecen explicaciones de conceptos técnicos de oftalmología, demostrando en la
práctica una mayor familiaridad con la jerga médica.
A la vez que se subrayan las características biológicas y experimentales que contribuyen a la
definición de la persona con ES, sus contenidos cumplen una función de promoción de la salud de
los ojos y de divulgación científica, explicando aspectos fisiológicos de estos órganos y la importancia
de determinados cuidados, como tomar el sol con filtros de protección UV-A y UV-B y la atención
que ha de prestarse a ciertos síntomas, como el ardor o los ojos enrojecidos. El apoyo a la campaña
Abril Marrom es un ejemplo de ello, donde el cuidado de la salud ocular asume una función simbólica
vinculada a la deficiencia visual (Post n. º15 de Facebook). Otras fechas destacadas, como el Día
Internacional de las Personas con Discapacidad (3 de diciembre) o el Día Nacional de la Persona
Ciega (13 de diciembre) y el Día Mundial de la Retina (25 de septiembre) también se difunden desde
el GVS y son señaladas como especiales para la persona con ES, acercándolas conceptualmente a la
noción de persona con discapacidad y a persona invidente, así como las vincula con la retina como
parte de la estructura del ojo donde se manifiesta esta enfermedad.
La divulgación de información sobre nuevos tratamientos y sobre investigación científica
reciente se refleja en varias de las publicaciones, lo que deja entrever un sentimiento de esperanza y
expectativas positivas hacia la detención o reversión del proceso degenerativo que lleva a la pérdida
de la visión. Estas expresiones emotivas se hacen presentes, sobre todo, en los comentarios de
personas con ES y sus padres: "vamos a contrarreloj… lloré de la emoción… si funciona [en pruebas
en el extranjero], por qué no podemos???!!!" (Post n.º 45 de Facebook) y "estoy deseando que llegue
el día en que pueda decir que mi hijo está participando en un estudio de esos" (Post n.º 17 de
Facebook). También se difunden desde el GVS cursos sobre investigaciones y tratamientos nuevos,
demostrando de nuevo el interés y la esperanza hacia todo lo que rodea a este tema.
(T6) tenemos una discapacidad visual, pero somos más que eso
Para las personas afectadas por la ES, la discapacidad visual es solo uno más de los aspectos de
su vida, pero no lo que las define. Los discursos recogidos en GVS tratan la discapacidad, más que
como una condición o propiedad del paciente, como una característica que se manifiesta en la relación
de este con su contexto. Tomando la posición del Estatuto de Defesa dos Direitos da Pessoa com
Deficiência publicado en 2015, la discapacidad "no está en las personas sino en las barreras debidas
a las actitudes y al ambiente que impiden el ejercicio efectivo pleno de los derechos de todos, en
igualdad de condiciones y oportunidades" (Enlace del post n.º 32 de Facebook). Esta afirmación parte
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 10
de la premisa de que la igualdad de oportunidades constituye un derecho fundamental, para el que la
baja visión o la ceguera no deben suponer barreras.
En palabras de Sony, la persona con discapacidad vive hoy una situación más favorable para el
ejercicio pleno de su libertad. Según él, esto se debe a los avances en lo que respecta a las tecnologías
de apoyo, a la movilidad y a la propia actitud y percepción de la sociedad. Siguen existiendo diversas
barreras, pero "hoy las personas con discapacidad pueden hacer realidad sus sueños, viajan, planifican
su vida, gastan, compran. ¡Eso está muy bien!" (Vídeo del post n.º 13 de Facebook).
Se encontraron muchas declaraciones sobre cómo estas personas construyen su identidad a partir
de distintas actividades, lo que les hace superar la concepción simple de portadores de una
discapacidad visual. Ejemplos como el de Luciano con los deportes, Lúcia con el maquillaje, Marina
con el ballet o Milka con la masoterapia, demuestran que cada uno de ellos es capaz de desarrollar
habilidades, incluso con poca capacidad de visión. La masoterapia aparece como una práctica en la
que la persona con ES puede tener un enorme potencial, ya que se ejerce mediante sensibilidad táctil
en gran medida (Vídeo de YouTube de 28 de enero de 2017). Los deportes paraolímpicos se presentan
también en GVS como un campo de actuación de la persona con discapacidad, lo que se plasma en
declaraciones y entrevistas de nadadores, levantadores de peso, y judocas (Vídeos de los posts n.º 52
y 68 de Facebook).
(T7) convivimos con ciertos problemas y equívocos por la forma en que vemos las cosas
Vivir con baja visión es vivir de modo constante con equívocos y problemas. Al ver lo suficiente
como para caminar por la calle, pero no ser capaz de leer un texto impreso en un papel o reconocer
los rostros de la gente puede llevar a situaciones complicadas. Algunas de esas situaciones incómodas
se deben a la dificultad de los demás para entender que la persona con enfermedad de Stargardt a
veces necesita ayuda o condiciones especiales, a pesar de ser capaz de mantener una existencia
anónima como videntes de rango normal. Las declaraciones de Barbara hacen hincapié en esos
problemas por no tener un status socialmente reconocido y legitimado:
Tener baja visión es ser ciego en un mundo de videntes y vidente en un
mundo de ciegos. Es que te miren mal cuando estás usando el móvil y estás
sentado en un banco preferente. Es que no se acuerden de ti cuando se habla
de accesibilidad de persona con discapacidad visual. Es no recibir ayuda
porque ves. Es tener que usar el bastón para que todo el mundo lo sepa y,
aún así, que se te considere un impostor. Es que se olviden de ti los
compañeros y los profesores porque actúas como los demás. Pero tiene un
lado bueno: ves. (Vídeo "O que é baixa visão", indicado en el post n.º 49 de
Facebook)
Paulo también apunta este sentimiento de no pertenencia a ningún grupo cuando dice, en tono
indignado: "[…] sabe esa sensación de saber que alguien le está observando? […] la gente quiere
estar segura de si soy o no invidente". Preguntándose el porqué de que las personas asuman esa actitud
de desconfianza, el propio Paulo subraya para las situaciones en las que no ha sido ayudado ante un
imprevisto o accidente: [¿esa persona que está ahí de pie] qué está esperando? ¿a que yo tropiece y
caiga para demostrarle que es verdad que no veo bien? (Vídeo del post n.º 13 de Facebook). Otro de
los testimonios recogidos señala la incomodidad que produce la desconfianza de los demás, lo que
afecta a la autoestima y a la concepción de la valía personal. Según Milka, esa desconfianza hizo que
"en algunos momentos, llegué a dudar de si era realmente capaz de hacer determinadas cosas" (Vídeo
de YouTube del 21 de enero de 2017).
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 11
Incluso en la interacción con personas conocidas, que saben de la discapacidad visual del enfermo
de ES, también se dan las situaciones de incomprensión momentánea sobre la capacidad de ver bien.
La intención de la persona con ES de omitir su dificultad en la visión, expresada por Marina, Gabriela
y Luciano, demuestra lo cansado que puede llegar a ser estar siempre explicando qué cosas puede ver
y cuáles no. Por tanto, la alternativa es fingir que ve bien. "[Gabriela:] no conseguimos distinguir los
rasgos faciales. Pero …[Marina:] miramos […] y fingimos que vemos todo. [Gabriela:] […]
¡Hacemos eso, es verdad!" (Vídeo de YouTube del 2 de marzo de 2016). Lo mismo sucede cuando
alguien les enseña algo en un móvil o en un cartel, tal y como relata Luciano:
Otra cosa que solemos hacer es engañar a la gente […] Como nos miran y no ven nada
particular en nuestros ojos […] para ellos somos personas normales. Entonces, esa persona
llega toda contenta y nos dice "mira esto" y nos muestra una foto, nos manda leer un mensaje.
Ahí finges que lees, sueltas una carcajada y dices "¡madre mía1", haces el paripé, merecedor
de Oscar. Esa persona se va toda contenta, pero tú no viste nada, no entendió ni papa. (Vídeo
de YouTube del 9 de julio de 2017).
Estas situaciones complicadas y surrealistas, pasado algún tiempo, se incorporan a un conjunto
de historias graciosas vividas. Denominadas gafies o patetadas por Luciano, él mismo las presenta
como habituales para la persona con ES. En un vídeo dedicado a estas situaciones ridículas, hace un
recorrido por este tipo de vivencias, como son: confundir maniquíes en las puertas de las tiendas y
conversar con ellos o equivocarse de coche y entrar en el de un extraño creyendo que es su mujer
(Vídeo de YouTube del 9 de julio de 2016).
Este sentido del humor, que permite convertir una dificultad o una limitación en algo divertido,
no siempre está presente en los testimonios del grupo. Pese a ello, cuando una persona con esta
enfermedad se encuentra con otra que también lo padece, las bromas relacionadas con la baja visión
son habituales en sus conversaciones. Un ejemplo de ello es la presentación de sí mismo que hace
Roberto al inicio de un curso. En tono irónico, se aprovecha de las dificultades para verlo que tiene
el público y dice: "[…] mido 1,99m., peso 40 kilos, tengo el pelo rubio y largo hasta los hombros, y
creo que guapo, porque hasta este momento [ustedes] no han mirado a nadie más" (Vídeo de YouTube
de 27 de marzo de 2017).
(T8) nos reconocemos como comunidad
Las cuestiones genéticas (biológicas) que determinan la enfermedad de Stargardt, las
consecuencias que derivan a la baja visión (aspectos funcionales) y la similitud en cuanto a
experiencias (aspectos vivenciales) de los miembros del GVS crean una noción de familiaridad, de
cercanía y de comunidad. Según revelan los administradores del grupo y por algunos otros
participantes, ha terminado acuñándose la expresión "familia Stargardt" para calificar lo que se
establece entre sus pares. Ello denota el sentimiento de pertenencia a un grupo en el que la enfermedad
es el lazo biológico en el que se reconocen mutuamente. El GVS promueve diversos actos y eventos
de confraternización e intercambio de información, de manera que se facilite el contacto cara a cara
de sus miembros (Post n.º 18 de Facebook).
Según la actividad formativa propuesta por uno de los administradores del grupo, todo ello va
más allá de una trayectoria en que las personas con ES y sus familiares buscan informaciones sobre
esta patología e intercambian experiencias. Con la extensión de internet en Brasil, se han creado blogs
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 12
y comunidades virtuales desde el año 2000, destacando el grupo de discusión Stargardt de Yahoo,
que llegó a reunir a cerca de 200 participantes de todo el país (Vídeo de YouTube del 27 de marzo de
2017). Una vez que integran estas comunidades, aumentan las iniciativas de intereses comunes a sus
miembros, como la divulgación científica y el acceso a investigaciones y tratamientos, la difusión y
defensa de los derechos legales de las personas con discapacidad y la consolidación de canales de
comunicación entre pacientes y sus familiares.
El uso de hashtags como #JuntosSomosMaisFORTES y #deficientesVisuais en algunas de sus
publicaciones denota la intención del GVS de articularse como dinamizador social comprometido
con los intereses comunes de las personas con discapacidad visual. Del mismo modo, también se
involucra en los intereses compartidos por otras asociaciones y comunidades. Entre ellas se
mencionan: Retina Brasil y sus delegaciones regionales, y el Mobimento Brasileiro de Mulheres
Cegas e com Baixa Visão (MBMC). Entre las iniciativas sociales defendidas por el GVS cabe destacar
el apoyo al Proyecto de Ley de la Cámara n.º 56/2016, de Política Nacional sobre Enfermedades
Raras, que propone, entre otros aspectos, que se proporcione gratuitamente medicación a los enfermos
de este tipo de enfermedades (Post n.º 39 de Facebook).
4 Conclusiones
Las comunidades virtuales y los grupos en redes sociales son formas en que se plasman las nuevas
modalidades de comunicación interactiva en salud. El aumento del número de usuarios, el tiempo
conectado y la predisposición de los participantes por discutir sobre temas y asuntos de salud, hábitos
de riesgo, miedos e inexactitud de las informaciones hace que el acceso a la información aumente.
Además, "la solicitud de apoyo también hace que crezca la dimensión de las informaciones, lo que
también aumenta la audiencia potencial" (Silveira, Costa & Lima, 2012). Es precisamente en este
nuevo entorno en el que estas vías de comunicación pueden contribuir a aumentar el espectro de las
relaciones personales, siempre, eso sí, que los usuarios no las conciban solo como una herramienta
para perpetuar las relaciones sociales ya existentes sino también como una forma de establecer
conexiones nuevas. Yendo un paso más allá, como plantean Martiniello et al (2012), es fundamental
llamar la atención sobre la necesidad de estar presentes y visibles en las redes, puesto que mientras
mayor sea su protagonismo, y más consideración tengan como grupo, más se extenderán las
aplicaciones y características que las harán usables y adecuadas para determinados colectivos, como
son las personas con baja visión.
Cabe destacar, como uno de los hallazgos del estudio, que esta comunidad se muestra
transparente y proclive a difundir las características de su modo de vida en las redes de forma directa
y natural, algo que en cierto modo supone un cambio de percepción de estos instrumentos con
respecto a las conclusiones que se han puesto de manifiesto en estudios anteriores, en los que las
personas con problemas de visión se mostraban más reacias a hacer preguntas sobre estos temas, tanto
por la falta de respuesta como por la posibilidad de aparecer como personas dependientes frente al
resto de sus contactos (Brady et al, 2013). Frente a esa apreciación, y en la línea de lo planteado por
Wu y Adamic (2014) aplicado a personas con dificultades visuales, los resultados indican que las
personas con ES sí valoran estos medios y redes sociales como un cauce para hacerse oír, plantear
sus preocupaciones y obtener ayuda y atención, lo que termina derivando en mayor visibilidad. De
hecho, ese mismo estudio comprobaba que este tipo de contenidos recibían de media mayor tasa de
respuesta (comentarios y "me gusta" en Facebook) que los que no eran tan personales.
Los resultados obtenidos demuestran que la comunicación interactiva en salud, la relación entre
ejes conceptuales cognitivos, sociales y tecnológicos están presentes en la construcción identitaria de
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 13
esta comunidad (Caran & Biolchini, 2016). Padecer la enfermedad de Stargrardt va mucho más allá
de la cuestión patológica en sí misma, sino que tiene que ver con la vivencia de experiencias
complicadas parecidas en el día a día, con la indignación por la desigualdad de oportunidades, con
las esperanzas en nuevos tratamientos y en las tecnologías de apoyo. Estas realidades vividas se
comparten en el GVS y van construyendo el discurso intersubjetivo de "qué significa ser una persona
con ES" y de "qué no es una persona con ES". Esta construcción de la identidad toma forma a través
de un proceso de comunicación interactiva basada en la negociación de elementos simbólicos,
alternando los momentos de acuerdo, desacuerdo y consenso (Gajaria, Yeung, Goodale & Charach,
2011). En definitiva, y tal y como adelantaban Morel y Villalobos (2011), estas nuevas formas de
comunicación ayudan a generar un 'constructo social de la discapacidad' positivo y diferente, capaz
de valorar la diversidad y respetar al sujeto.
4 Referencias
Ahmed, S., Haines‐Saah, R. J., Afzal, A. R., Tam‐Tham, H., Al Mamun, M., Hemmelgarn, B.
R., & Turin, T. C. (2017). User‐driven conversations about dialysis through Facebook: A qualitative
thematic analysis. Nephrology, 22(4), 301-307.
Bauman, Z. & Mauro, E. (2016). Babel: entre a incerteza e a esperança. Rio de Janeiro: Zahar.
Brady, E. L., Zhong, Y., Morris, M. R., and Bigham, J. P. (2013). Investigating the
appropriateness of social network question asking as a resource for blind users. In: Proc CSCW'13,
1225 -- 1236.
Caran, G. (2013). Acessibildiade e suas fronteiras com a deficiência, usabiidade e
comportamento informacional. In VI Encontro Ibérico EDICIC. Porto: EDICIC.
Caran, G. & Biolchini, J. (2016). Eixos conceituais do acesso à informação pelo deficiente visual:
suportes cognitivo, social e tecnológico. Tendências da Pesquisa Brasileira em Ciência da
Informação, 9(2).
Castells, M. (2017). Redes de indignação e esperança: movimentos sociais na era da internet (2nd
ed.). Rio de Janeiro: Zahar.
Dhanda, A. (200'8). Construindo um novo léxico dos direitos humanos: Convenção sobre os
Direitos das Pessoas com Deficiências. Sur, Rev. int. direitos human.(Impr.), 5(8).
Lago Júnior, A., & Barbosa, A. S. (2016). Primeiras análises sobre o sistema de (in) capacidades,
interdição e curatela pós Estatuto da Pessoa com Deficiência e Código de Processo Civil de 2015.
Revista de Direito Civil Contemporâneo-RDCC (Journal of Contemporary Private Law), 8, 49-89.
Eng, T. & Gustafson, D. (1999). Wired for Health and Well-Being: the Emergence of Interactive
Health Communication. In: The Science Panel on Interactive Communication and Health.
Washington, abr.
Eng, T., Gustafson, D., Henderson, J., Jimison, H. & Patrick, K. (1999). Introduction to
evaluation of interactive health communication applications. Science panel on interactive
communication and health. American Journal of Preventative Medicine, 16(1):10 -- 5
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 14
Gajaria, A., Yeung, E., Goodale, T. & Charach, A. (2011). Beliefs about attention-
deficit/hyperactivity disorder and response to stereotypes: Youth postings in facebook groups. Journal
of Adolescent Health, 49(1), 15 -- 20.
Garcia, C. (2012). Sociologia da acessibilidade. Porto Alegre: IESDE Brasil.
Jeanneret, Y. (2015). Analisar as "redes sociais" como dispositivos infocomunicacionais: uma
problemática. In M. Tomaél & R. Marteleto (Eds.), Informação e Redes Sociais: interface de teorias,
métodos e objetos. (pp. 11 -- 31). Londrina: Eduel.
Latour, B. (2012). Reagregando o social: uma introdução à Teoria do Ator-Rede. Salvador:
Edufba.
Marteleto, R. (2010). Redes sociais, mediação e apropriação de informaçõoes: situando campos,
objetos e conceitos na pesquisa em ciência da informaçãao. Pesquisa Brasileira em Ciência Da
Informação, 3(1), 27 -- 46.
Martiniello, N., Budd, J., Nguyen, M.N., Tibbs, A., Asuncion, J., Barile, M., Amsel, R., Gaulin,
C., & Fichten, C.S. (2012). Accessibility of social media for students who are blind or have low
vision. Canadian Blind Monitor, 32, 28.
Morel, G.; Villalobos, L. (2011). Identidad y baja visión. Alteridad, Revista de Educación, 6(2)
2011: 109 -- 117. https://doi.org/10.17163/alt.v6n2.2011.02
Murray, E., Burns. J., See, T., Lai, R. & Nazareth, I. (2005) Interactive health communication
applications for people with chronic disease. Cochrane Database Syst Rev (4):CD004274
Organização Mundial da Saúde (2003). CIF: classificação internacional da funcionalidade,
incapacidade e saúde. São Paulo: EDUSP.
Rada R. (2005). A case study of a retracted systematic review on interactive health
communication applications: impact on media, scientists, and patients. Journal of medical Internet
research, 7(2), e18. doi:10.2196/jmir.7.2.e18
Recuero, R. (2009). Redes sociais na internet. Porto Alegre: Sulina.
Recuero, R. (2012). A conversação em rede: comunicação mediada pelo computador e redes
sociais na internet. Porto Alegre: Sulina.
Retina Brasil. (2019). Doenças degenerativas e principais sintomas. Recuperado 5 de abril de
2019, de Retina Brasil website: http://retinabrasil.org.br/site/doencas/doencas-degenerativas-e-
principais-sintomas/
Silveira, P. C. M., Costa, A. E. S., & Lima, C. C. (2012). Gagueira na web: qualidade da
informação. Rev. CEFAC. mai-jun; 14(3):430-437.
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 15
Scott, D. M. (2013). The new rules of marketing and PR: How to use social media, online video,
mobile applications, blogs, news releases, and viral marketing to reach buyers. Wiley and Sons,
Hoboken, NJ
Vaca Vaca, M., Rodríguez Cárdenas, D., Gutiérrez Cárdenas, P., & Ruiz, O. (2012).
Representaciones Sociales De La Inclusión Escolar De Estudiantes Con Limitación Visual: Creencias
y
doi:
10.30788/RevColReh.v11.n1.2012.51
Rehabilitación,
Prácticas.
56-67.
Revista
Colombiana
De
11(1),
Welch, V., Petkovic, J., Pardo Pardo, J., Rader, T., & Tugwell, P. (2016). Interactive social media
interventions to promote health equity: an overview of reviews. Health promotion and chronic
disease prevention in Canada: research, policy and practice, 36(4), 63-75.
Wu, S., Adamic, L. (2014). Visually impaired users on an online social network, Proceedings of
the SIGCHI Conference on Human Factors in Computing Systems, April 26-May 01, 2014, Toronto,
Ontario, Canada [doi>10.1145/2556288.2557415]
IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 16
|
1912.01122 | 1 | 1912 | 2019-12-02T23:15:02 | Discovering Opioid Use Patterns from Social Media for Relapse Prevention | [
"cs.SI",
"cs.HC",
"cs.LG"
] | The United States is currently experiencing an unprecedented opioid crisis, and opioid overdose has become a leading cause of injury and death. Effective opioid addiction recovery calls for not only medical treatments, but also behavioral interventions for impacted individuals. In this paper, we study communication and behavior patterns of patients with opioid use disorder (OUD) from social media, intending to demonstrate how existing information from common activities, such as online social networking, might lead to better prediction, evaluation, and ultimately prevention of relapses. Through a multi-disciplinary and advanced novel analytic perspective, we characterize opioid addiction behavior patterns by analyzing opioid groups from Reddit.com - including modeling online discussion topics, analyzing text co-occurrence and correlations, and identifying emotional states of people with OUD. These quantitative analyses are of practical importance and demonstrate innovative ways to use information from online social media, to create technology that can assist in relapse prevention. | cs.SI | cs | Discovering Opioid Use Patterns from Social
Media for Relapse Prevention
Zhou Yang, Spencer Bradshaw, Rattikorn Hewett, and Fang Jin
Abstract -- The United States is currently experiencing an unprecedented opioid crisis, and opioid overdose has become a leading
cause of injury and death. Effective opioid addiction recovery calls for not only medical treatments, but also behavioral interventions for
impacted individuals. In this paper, we study communication and behavior patterns of patients with opioid use disorder (OUD) from
social media, intending to demonstrate how existing information from common activities, such as online social networking, might lead
to better prediction, evaluation, and ultimately prevention of relapses. Through a multi-disciplinary and advanced novel analytic
perspective, we characterize opioid addiction behavior patterns by analyzing opioid groups from Reddit.com - including modeling
online discussion topics, analyzing text co-occurrence and correlations, and identifying emotional states of people with OUD. These
quantitative analyses are of practical importance and demonstrate innovative ways to use information from online social media, to
create technology that can assist in relapse prevention.
Index Terms -- Opioid Crisis, Opioid Use Disorder, Addiction Patterns, Relapse Emotion, Addiction on Social Media, Addiction
Treatment, Addiction Network
!
1 INTRODUCTION
Opioid overdoses are now causing more deaths than car
crashes, prompting the current U.S. President to declare the
opioid crisis a national public health emergency in October
2017. According to the latest statistics from the National
Institute on Drug Abuse (NIDA), more than 115 Americans
die daily after overdosing on opioids, and nearly 64,000
people died of drug overdoses in the US in 2016, the most
lethal year of the drug overdose epidemic [1]. Moreover,
millions of Americans have been impacted by opioid-related
problems. It is estimated that 2.1 million people suffer from
substance use disorders related to prescription opioid pain
relievers in the United States alone [?]. Additionally, the
opioid crisis has social impacts beyond an increased death
toll. Other consequences include a rise in the number of
infants born dependent on opioids as well as a spread of
infectious diseases such as HIV and hepatitis C [2]. The
status of the opioid crisis in the U.S. is shown in Figure 1 (a)
and Figure 1 (b) from different perspectives. As revealed in
a recent paper published in Science [3], the drug epidemic
currently sweeping across the U.S. has deteriorated into a
full-scale national pandemic, leading to national concern
because of its negative impacts on health, social security
and economics.
Current knowledge of the opioid crisis has been mostly
limited to scattered statistics that only reveal macro aspects
of the crisis, such as the nationwide/state-level overdose
death tolls and overdose death tolls regarding certain time
periods, races, and/or specific drugs. This has led to a rapid
• Zhou Yang, Rattikorn Hewett, and Fang Jin are with the Department of
Computer Science, Texas Tech University, Lubbock, Texas, USA. E-mail:
{zhou.yang, rattikorn.hewett, fang.jin}@ttu.edu
Spencer Bradshaw is with the Community, Family, and Addic-
tion Sciences, Texas Tech University, Lubbock, Texas, USA. Email:
[email protected]
•
increase in OUD treatment admissions, including a 53.5%
increase during 2013 - 2015, and with adult treatment for
heroin use more than doubling [5]. While treatment is im-
portant and leads to effective outcomes and greater health
for some, the relapse rate post-treatment for substance use
disorders is relatively high, ranging from 40 − 60% [6],
with potential relapse being difficult to predict. Therefore,
research that can enhance relapse prediction using data from
everyday, common situations is needed.
One such resource may include behavioral data available
from social media, a forum now used by 88% of persons in
the U.S. ages 18-29, 78% of those ages 30-49, 64% of those
ages 50-64, and 37% of those age 65 and older [7]. Despite
its popularity, detailed analysis of user-specific knowledge,
such as social media behavioral patterns that associate with
substance use and relapse, have not been studied. Therefore,
to facilitate a better understanding of the opioid epidemic
that may ultimately lead to better prediction of relapse and
ultimately responses and interventions that prevent relapse
and promote remission - individualized, user-specific anal-
ysis is urgently needed. This manuscript begins to tackle
this complex problem from a multi-disciplinary perspective,
and includes text analysis, topic modeling,and sentiment
analysis.
2 DATA ANALYSIS AND RESULTS
2.1 Opioid Communities on Social Media
With social media growing profoundly and widely inter-
twined with people's everyday lives, social media contains
more and more biomedical psychological information about
its users. As a result, social media represents an increasingly
important data source for discovering knowledge that can
have various applications. Reddit.com is an online com-
munity and social media platform, which allows Redditors
(registered users of Reddit.com) to form groups/subreddit
arXiv:1912.01122v1 [cs.SI] 2 Dec 2019
2
(a)
(b)
Fig. 1: (a).Drug overdose death toll by county in 2017 [4]; (b).Drug overdose death toll by drug type from 1996 to 2017
in the U.S.
to discuss specific topics. Groups such as "r/OpioidRecovery",
"r/Opiates" and "r/drugs" aim to provide people suffering
from OUD and seeking remission with psychological sup-
port. This function spurs people with OUD to turn to social
media for help, posting various problems and confusion. In
this way, social media has become a widely utilized form
of social support, which is an important recovery resource
that can buffer the negative effects of stress on the quality of
life of those with OUD [8]. Indeed, many people with OUD-
related problems that have managed to abstain from opioid
use are often willing to share their experience with others
online. For instance, a Redditor posted on Reddit that "I was
the same way, I only got clean cuz I didn't wanna go back
to jail tbh, and had to go cold turkey in rehab". This study
is based on data collected from subreddit groups such as
"r/opioid", "r/opioidrecovery", and "r/drugs" from Reddit.com
in 2018.
2.2 Dataset
The dataset used in this paper is collected from Reddit.com,
a social news aggregation, web content rating, and dis-
cussion website. We developed a web crawling tool using
PRAW (Python Reddit API Wrapper) to collect data. The
dataset for this paper is from three subreddits (Subreddits
are subsidiary threads or categories within the Reddit web-
site) on Reddit.com, including "r/opiates", "r/opiatesRecovery"
and "r/drugs". In a subreddit, there are a series of posts that
include a post topic and a collection of related comments.
The dataset consists of two parts. The first consists of 3,000
posts with the top (collected in April 2018) 1,000 posts from
each subreddit, since 1,000 is the maximum number that
is allowed by PRAW API. This first part includes posts
and interactions within posts. After collecting the subreddit
data, we extracted a list of Redditor IDs of participants. The
second part of the dataset consisted of personal data, which
was collected based on the previously mentioned Redditor
list that was extracted.
Data labeling then involved manually reading the
posts/comments and categorizing each Redditor into a cor-
responding group. With intent to implement binary classifi-
cation, each Redditor was marked with a label and different
labels were mutually exclusive. This classification ensured
that each participant was assigned to one and only one label.
More specifically, in the group classification process, we
labeled a Redditor ID by manually reading his/her post
history in the collected dataset. This labeling process was
done by several health science researchers, and labeling
agreement among the researchers was required to reduce
labeling errors that might otherwise have resulted from
different labeling metrics. For the OUD classifier, we fol-
lowed DSM-5 criteria [9], in which a Redditor is labeled
with OUD if at least two of the listed criteria were met
within the past 12 months. For instance, a Redditor was
labeled with OUD if he/she admitted that he/she often
takes in larger amounts of opioids and/or over a long pe-
riod of time than intended, and also mentioned a persistent
desire or unsuccessful efforts to cut down or control use,
or had strong cravings to use. If less than two symptoms
were detected, a Redditor was classified to a "Non-OUD"
group. Redditors who met at least two DSM-5 criteria but
showed no intentions of limiting or abstaining from use
were classified to an "OUD" group. For instance, an OUD
Redditor posted "Late Christmas Gift for myself 5x 40mg
Oxycodone (Toroxycon)". Redditors were classified into a
"positive recovering OUD" group if he/she was attempting
and/or struggling to seek treatments that reduced symp-
toms associated with previously met DSM-5 criteria in the
last 12 months. For instance, a positive recovering OUD
posted "what to say when returning to work from drug
treatment". If there was no evidence that a Redditor was
seeking treatment, this Redditor was classified to a "non-
positive recovering OUD" group. Similarly, Redditors were
classified to an "OUD relapse" group if they first classified
as in recovery but indicated that they had used opioids
again (no matter how many times) in the fifty days pre-
vious to the latest post/comment. For instance, a relapsed
Redditor posted "45 Days clean and now I'm drunk and
high". Otherwise, Redditors in recovery were assumed to
have stayed clean.
When classifying participants into the "positive recov-
ering OUD" and "non-positive recovering OUD" groups,
one interesting finding was that many participants with
OUD had varying degrees of willingness to stay clean,
which is consistent with the literature [10]. That is, "positive
recovering OUD" group members showed the intention of
reducing symptoms associated with DSM-5 criteria while
"non-positive recovering OUD" group members show less
intention of such symptom reduction.
In summary, we collected 1,000 Reddit posts respec-
tively from "r/opiates", "r/opiatesRecovery", and "r/drugs". By
utilizing Redditor IDs extracted from the 1,000 posts, we
also collected the latest 1,000 comments/posts Reddit API
restricts the number of posts that can be collected to 1,000
for each Redditor ID respectively, and obtained a personal
post dataset.
2.3 Redditor Classification
The Redditor classification is based on the text features. Give
a set of Redditors A = {a1, a2, a3, . . .}, and their corre-
sponding feature variable Fj =< X1, . . . , Xm >, which is
represented by these features extracted from text, and their
status label Yj ∈ [0, 1], the Redditor classification task is to
learn a function f : Fj → Yj, such that the task errors are
minimized. Formally, we have
3
testing. We show the performance of these two classifiers in
Table 1.
OUD Classif.
Recorvering Classif.
Acc.
LG.
0.82
KNN 0.70
SVM 0.92
Rec.
0.83
0.81
0.94
Prec.
0.82
0.76
0.93
F1
0.82
0.7858
0.93
Acc.
0.74
0.75
0.88
Rec.
0.78
0.8121
0.93
Prec.
0.73
0.73
0.84
F1
0.76
0.77
0.88
TABLE 1: Classification results for Logistic Regression,
KNN, and SVM.
The SVM classifier is implemented by using the "Lib-
shorttext" library. The dataset is processed by converting to
lower case, removing punctuation and stop words, tokeniz-
ing, stemming and lemmatizing. As shown in Table 1, SVM
classifier outperforms logistic regression and KNN in both
cases. Moreover, the accuracy of the first classifier was 0.917,
which was better than the accuracy of the second classifier.
Thus, there wouldn't be any performance bottleneck if the
output of the first classifier was fed into the second classifier.
We manually classified 3,157 people, with 64.9% of them
have OUD problems, and 35.1% are non-OUD. However,
only 10.4% of these people with OUDs had shown that they
have been positively seeking remission and/or recovery,
while the other 89.6% of those with OUD showed no signs of
seeking remission and/or recovery according to our dataset
records. Of the recovering Redditors with OUD, 89.3% will
relapse within fifty days.
arg min
Ψ
f (X1, . . . , Xm) − Yj2
(1)
m
X
j=1
where Xj and Yj are a feature variable and label variable
respectively, and Ψ is the model parameters learned from
training.
Two classifiers were designed and implemented to filter
out the research targets: an OUD classifier and a recovering
classifier. The first classifier differentiates between OUD
and non-OUD, while the second "within OUD" classifier
separates those who are in positive recovery and who hadn't
shown any evidence of being in a positive recovery process,
and they were denoted as "positive recovering OUD" and
"non-positive recovering OUD" group members, respec-
tively. For the OUD classifier, we employed a Support Vector
Machine (SVM) classifier that transformed posts/comments
into term vector features to determine whether participants
had an OUD problem. The dataset for this classifier included
1,000 Redditors (419 OUDs and 581 non-OUDs). In the
labeled dataset, 70% (namely, 70% of the samples) was used
as the training dataset, and the rest were used for testing.
Once the classifier had been trained, we applied it to the
unlabeled dataset. The data of the identified OUDs were
then fed into the next classifier to determine whether they
were a positive recovering OUD or a non-positive recov-
ering OUD. The second classifier was designed to identify
those with OUD who had shown positive attitudes/acts
toward seeking recovery. This took another four days to
label 1,000 people (with 375 positive recovering OUDs and
625 non-positive recovering OUDs). Among this labeled
data, 70% was used as the training dataset and the rest for
2.4 Topic Modeling
To discover the hidden semantic structures (i.e., "topics")
that occur in an extensive collection of posts collected from
Reddit.com, we first built a topic model to analyze those
posts. Given a document in the topic modeling, we would
expect particular words to appear in the document more
or less frequently. For instance, by specifying two topics,
we found the corresponding topics of "people take opioids
because of pain" and "people take dope and feels". Those
topics are indicated by words "people" and "pain", and
"people" and "dope", respectively, since they appear more
frequently in those posts than other words.
According to the Deveaud2014 [11], the best topic num-
ber is in the range of [4, 11], where model achieve the
extremum. Since posts typically concern numerous topics,
we specified the existence of multiple topics to further ex-
plore any additional potential topics that might emerge. As
shown in Figure 2, we present the results of an eight-topic
model. These topics are "hard day, don't do opiates", "don't
dope heroin", "people feel love to feel clean", "taking drugs
or opioids for days", "people feel, heroin", "people pain,
taking opiates or drugs", "for pain, don't do oxycodone",
and "post about heroin", respectively. In brief, the general
topics included 1). Attempts to dissuade people from taking
highly addictive opioids (e.g., heroin and oxycodone); 2).
Information on how to stay clean; 3). How people feel when
they stay clean for an extended period; and 4). Advice about
treatment and how to stay clean.
Even though topic modeling reveals the general topics
in certain social communities, individualized user-specific
information remains hidden. To expose more details about
4
Fig. 2: Topic modeling results. The topic numbers were set as eight, and top keywords as 8.
user-specific patterns for people with OUD that utilize social
media, we implemented text co-occurrence and correlation
analysis to further dig and discover behavior patterns on
social media.
2.5 Text Co-occurrence and Correlation
Figure 3 A. shows the word correlation with annotations.
The word correlation and bigram illustrate the social in-
teractions between different Redditors. We generated word
correlation graphs to obtain a full picture of their conver-
sations. A textual analysis was implemented to capture the
relationship between words, to examine words that tend to
follow each other immediately, or tend to co-occur within
the same posts. Sentences were tokenized into sequences of
words. By checking how often a word X was followed by
word Y , the relationships between words are measured by
the Phi efficient metric, and the Phi efficient is defined as
φ =
n11n00 − n10n01
√n1.n0.n.0n.1
,
(2)
where n11 represents the number of posts where both X
and Y appear, n00 is the number where neither appears,
and n10 is the cases where one appears without the other.
In this case, a pair of words with higher phi coefficiency
indicates that this word pair appears more frequently than
other word pairs do.
By gradually increasing the Phi coefficient, the words
that are most likely to appear with each other were detected,
as shown in Figure 3 (b), (c), and (d). After analyzing a
large number of posts from Reddit, the relationship was
visualized in Figure 3. By analyzing and annotating these
keywords, some frequent topics are summarized as follows:
• Talking about detoxification processes and assisting
medications such as 'naloxone' and 'bupe', in conjunc-
tion with 'doctor' and 'detox'. Participants of these
discussion topics are Redditors who are motivated and
willing to find recovery from their addiction and man-
age to stay clean. Also, some of these Redditors who
have been clean for a longer period participate in those
discussions and share their experiences about how to
stay clean.
• Describing pains and prescriptions from doctors, as
indicated by keywords such as 'pain', 'doctor', and
'painkiller'. These topics are consistent with the fact
that opioids are often originally used as a prescribed
painkiller. Some Redditors do have bodily and/or
chronic pain problems and concerns. Though opioids
are an effective painkiller and have curative effects,
after months or years of taking opioids, these Redditors
often develop an opioid dependency.
• Sharing of withdrawal symptoms, which symptoms
fall into two categories. One category involves men-
tal/psychological symptoms such as anxiety, insom-
nia, and social isolation. The other category involves
physical symptoms, including headaches and dizzi-
ness. Both categories of withdrawal symptoms are very
uncomfortable and may lead people with OUD to a
compulsive relapse if they do not have proper guidance
and support.
• Talking about what kind of opioids they take, how it
feels, and the dosage of drugs they take. These topics
are indicated by words such as "hight", "enjoy", "mg
(the dosage of opioids)", etc. For those topics, Redditors
always share their experiences about what kinds of
opioids they are taking, or they have been taking, or
they used to take. But they try to be cautious about
the dosage because of the risks of death caused by
overdose.
Also, since treatment is critical for people with OUD, fig-
uring out how those with OUD evaluate treatment-assisting
5
(a)
(b)
(c)
(d)
Fig. 3: (a): Word correlation with Phi coefficiency≥0.2. (b): Word bigrams with co-currence co-occurrence count ≥ 150.
(c): Word bigrams with co-occurrence count ≥ 200. (d): Word bigrams with co-occurrence count ≥ 250.
medications is very important. By specifying treatment-
assisting medications such as 'buprenorphine', 'methadone',
'naloxone', and 'suboxone', we detected and filtered out
words that were associated with those medicines in these
communities. In Figure 4 A, we visualize the word correla-
tion on posts that are about treatments. Figure 4 B shows
the top six words with the highest correlation coefficiency
for each medication. As shown in this figure, most of the
words related to these medications are neutral, represent-
ing neutral feedback from those with OUD. For instance,
Buprenorphine is associate with " people months clean ben-
zos love". Also, a lot of words about dosage are used such
as 'dose' and 'mgs'. Those words indicate that when they
use medications, they seem to be paying much attention
to dosage, perhaps because high dosages may have lethal
rather than curative effects.
2.6 Emotion of People with OUD
Relapses for persons with OUD are associated with younger
age, heavy use before treatment, a history of injecting, and
not following up with aftercare [12]. They are also frequently
associated with extreme emotions and other stressors [13].
Specifically, people seeking remission or rehabilitation can
experience extreme emotions that range from great highs
to great lows, and sometimes they feel like their emotions
are out of control. This is important as the well-accepted
Self-Medication Hypothesis [14] proposes that people often
use substances to self-medicate the negative and painful
emotions associated with trauma, stress, and/or comorbid
mental health disorders [15]. To explore emotions that are
associated with relapse, an emotion analysis was imple-
mented to show the observational results.
On Reddit.com, people with OUD are free to express
their joy and sadness, trust and disgust, and anticipation
and anger, etc. in their posts or comments. These sentiments,
along with their other online behaviors, could disclose infor-
mation about their remission/recovery status and thus serve
as relapse risk indicators and therefore also for the need for
intervention that might assist with relapse prevention [16].
We therefore sought to capture subtle emotional sentiments
from those with OUD and associate these sentiments with
OUD associated behaviors such as staying clean or relaps-
ing. By studying Redditor posts as well as their interactions
with other Redditors, it was hoped that identified emotions
can increase understanding of remission/recovery status.
Such understanding may ultimately lead to transforming
the sentiments and behavior patterns that emerge from
6
(a)
(b)
Fig. 4: A: Word correlation (in the same posts) with correlation coefficiency ≥ 0.17. B: Top ords that are used when
talking about opioid related medicines.
Redditor posts into possible indicators of relapse risk and
the need for some type of intervention to prevent relapse.
A word-emotion association lexicon [17] was utilized
to study the emotional content of each comment from a
Redditor. In the sentiment analysis, we focused on domi-
nant rather than submerged emotions. For instance, a post
may include a complex emotion that is a combination of
several emotions. In this case, a comment is labeled with
the emotion that has the highest score, which is defined in
equation 3, 4 and 5.
In particular, suppose Li
is the subset of a lexicon
which contains words in emotion i. The emotion count
emotion_count_i and normalized count n_emotion_count_i
for the emotion i are:
emotion_count_i =Xj
wordij
n_emotion_count_i =
emotion_count_i
max(emotion_counts)
Where:
wordj =(1 if wordj in Li
0 otherwise
(3)
(4)
(5)
Ten categories of emotion were identified as shown
in Figure 5: anger, anticipation, disgust, fear, joy, sadness,
surprise, trust, negative, positive. Also consistent with ad-
diction literature [18], we found that people with OUD can
be highly influenced by their emotions. Words that express
emotions or feelings, such as "feeling", "bad", and "high",
are repeatedly used. Among the 670 persons with OUD
who had relapsed, 72% showed the predominant emotions
that were 'negative' or that of 'joy'. This observation shows
relapse is highly related to more extreme emotions such as
'negative' and 'joy' based-emotions.
3 DISCUSSION
The opioid crisis is one of the leading threats to public health
in the U.S., and therefore treatment admissions are rising.
Despite positive benefits from treatment, many persons
seeking remission relapse, and such relapse is difficult to
predict. Nevertheless, a thorough understanding of social
media behavior patterns that associate with remission can
promote potential supportive and even potential relapse
prevention-based interventions. In this paper, we conducted
a series of experiments and observed significant Opioid ad-
diction patterns by analyzing posts and comments collected
from Reddit.com. These advanced analyses demonstrate 1)
how information from social media posts/discussions can
be used to more accurately predict potential relapse, 2) how
discussions might be discovered around various topics that
association with use, treatment, and remission, and 3) how
emotional/affective sentiments from these discussions may
be used to predict relapse risk.
First, only 10.4% of those identified with OUD ac-
tively seek remission/recovery, while the 89.6% show no
indication of seeking recovery. This demonstrates the im-
portant need that the majority of those with OUD to
progress through various motivational stages that may yield
a greater readiness for change. Additionally, the machine-
learning based classifiers used in this study showed high
accuracy and precision in predicting group classification
outcomes. Second, people with OUD who are seeking re-
mission/recovery more generally have positive judgments
regarding medications such as Buprenorphine, Methadone,
7
Fig. 5: Word cloud with ten different emotions. The drug names such as Heroin, OxyContin and Vicodin are not
the dominant words in the wordcloud, since people talk more about their feelings instead of the drug itself. Also,
stopwords are removed from the wordcloud.
Naloxone, and Suboxone; and they pay close attention to
dosage. Thus, this finding supports that medication assisted
treatment (MAT; use of medications such as Buprenorphine
and Methadone) may be helpful to those seeking recovery
from OUD. This is important as MAT is often a controversial
topic and widely underutilized resource in substance use
disorder treatment [19]. Third, 72% of those seeking recov-
ery from OUD - but appear to have relapsed - showed both
dominant 'negative' as well as 'joy' based emotions that as-
sociated with relapse. Therefore, we infer people with OUD
may experience a wide range of emotion and emotional
shifts, and that without support that aids emotional regu-
lation they have higher relapse risk. In sum, these multi-
disciplinary analyses conducted in this paper help disclose
several behavioral patterns and characteristic features of
persons with OUD, making it more possible to detect and
identify precursors of relapse, increasing assessment and
prediction of relapse risk. Ultimately, this may lead to the
development and implementation of personalized OUD-
based interventions that enhance relapse prevention and
OUD remission.
REFERENCES
[1] H. Hedegaard, "Drug overdose deaths in the united states, 1999
- 2016," https://www.cdc.gov/nchs/products/databriefs/db294.
htm, December-2017, online, accessed 25-March-2018.
[2] Z. Yang, L. Nguyen, and F. Jin, "Opioid relapse prediction with
gan," in 2019 IEEE/ACM International Conference on Advances in
Social Networks Analysis and Mining (ASONAM).
IEEE, 2019.
[3] H. Jalal, J. M. Buchanich, M. S. Roberts, L. C. Balmert, K. Zhang,
and D. S. Burke, "Changing dynamics of the drug overdose
epidemic in the united states from 1979 through 2016," Science,
vol. 361, no. 6408, p. eaau1184, 2018.
[4] NIDA, "Overdose death rates," https://www.drugabuse.gov/
related-topics/trends-statistics/overdose-death-rates, September-
2017, online, accessed 25-March-2018.
[5] A. Huhn, E. Strain, D. Tompkins, and K. Dunn, "A hidden aspect
of the u.s. opioid crisis: Rise in first-time treatment admissions
for older adults with opioid use disorder." Drug and Alcohol
Dependence, vol. 193, pp. 142 -- 147, 2018.
[6] A. T. McLellan, D. C. Lewis, C. P. Oâ A ´ZBrien, and H. D. Kleber,
"Drug dependence, a chronic medical illness: Implications for
treatment, insurance, and outcomes evaluation," JAMA, vol. 284,
pp. 1689 -- 1695, 2000.
[7] A. Smith and M. Anderson, "Social media use in 2018."
Internet and Technology, pp. 1 -- 17, 2018.
Pew Research Center:
[Online]. Available: https://www.pewinternet.org/2018/03/01/
social-media-use-in-2018/
[8] A. B. Laudet, K. Morgen, and W. L. White, "The role of social
supports, spirituality, religiousness, life meaning and affiliation
with 12-step fellowships in quality of life satisfaction among indi-
viduals in recovery from alcohol and drug problems," Alcoholism
Treatment Quarterly, vol. 24, pp. 33 -- 73, 2006.
[9] M. J. Tarrahi, A. Rahimi-Movaghar, H. Zeraati, S. A. Mote-
valian, M. Amin-Esmaeili, A. Hajebi, V. Sharifi, R. Radgoodarzi,
M. Hefazi, and A. Fotouhi, "Latent class analysis of dsm-5 criteria
for opioid use disorders: results from the iranian national survey
on mental health," European addiction research, vol. 21, no. 3, pp.
144 -- 152, 2015.
[10] S. B. Bradshaw, S. T. Shumway, K. S. Harris, and A. K. Baker, "Pre-
dictive factors of readiness for change during inpatient treatment,"
Alcoholism Treatment Quarterly, vol. 31, pp. 280 -- 302, 2013.
[11] R. Deveaud, E. SanJuan, and P. Bellot, "Accurate and effective la-
tent concept modeling for ad hoc information retrieval," Document
numérique, vol. 17, no. 1, pp. 61 -- 84, 2014.
[12] B. P. Smyth, J. Barry, E. Keenan, and K. Ducray, "Lapse and relapse
following inpatient treatment of opiate dependence." Irish medical
journal, 2010.
[13] J. Elster, Strong feelings: Emotion, addiction, and human behavior. mit
Press, 2009.
[14] E. J. Khantzian, "The self-medication hypothesis of addictive
disorders: focus on heroin and cocaine dependence," The American
Journal of Psychiatry, vol. 142, pp. 1259 -- 1264, 1985.
[15] C. D. Tronnier, "Harnessing attachment in addiction treatment:
regulation theory and the self-medication hypothesis," Journal of
Social Work Practice In The Addictions, vol. 15, pp. 233 -- 251, 2015.
[16] Z. Yang, V. J. Reddy, and a. J. F. Kesidi, Rashmi, "Addict free -
a smart and connected relapse intervention mobile app," in 16th
International Symposium on Spatial and Temporal Databases (SSTD).
Springer, 2019.
[17] S. M. Mohammad and P. D. Turney, "Crowdsourcing a word --
emotion association lexicon," Computational Intelligence, vol. 29,
no. 3, pp. 436 -- 465, 2013.
[18] D. Randles and J. L. Tracy, "Nonverbal displays of shame predict
relapse and declining health in recovering alcoholics," Clinical
Psychological Science, vol. 1, pp. 149 -- 155, 2013.
[19] H. Knudsen, A. Abraham, and P. Roman, "Adoption and im-
plementation of medications in addiction treatment programs."
Journal of Addiction Medicine, vol. 5, pp. 21 -- 27, 2011.
1
An opioid use disorder is defined as a problematic pattern of opioid use that leads to serious impairment or distress. Doctors use a specific
set of criteria to determine if a person has a substance use problem. To be diagnosed with an opioid use disorder, a person must have 2
or more of the following symptoms within a 12-month period of time.
Loss of Control
1
I did not mean to start using so much.
Substance taken in larger amounts or for a longer
time than intended
Persistent desire or unsuccessful effort to cut down
or control use of a substance
Great deal of time spent obtaining, using, or recov-
ering from substance use
Craving (a strong desire or urge) to use opioids
Continued opioid use that causes failures to fulfill
major obligations at work, school, or home
Continued opioid use despite causing recurrent so-
cial or personal problems
Important social, occupational, or recreational activ-
ities are reduced because of opioid use
I have tried to stop a few times before, but I start using this
drug again every time.
Everything I do revolves around using this drug. (In severe
cases, most/all of a person's daily activities may revolve
around substance use.)
I wanted to use so badly, I couldn't think of anything thing else.
I keep having trouble at work/have lost the trust of friends and
family because of using this drug.
I can not stop using, even though it's causing problems with
my friends/family/boss/landlord.
I have stopped seeing my friends and family, and have given
up my favorite hobby because of drugs.
Recurrent opioid use in dangerous situations
Continued opioid use despite related physical or
psychological problems
I keep doing things that I know are risky and dangerous to buy
or use this drug.
I know that using this drug causes me to feel badly/messes
with my mind, but I still use anyway.
Pharmacological Problems
10
Tolerance (the need to take higher doses of a drug
to feel the same effects, or a reduced effect from the
same amount)
Withdrawal (the experience of pain or other uncom-
fortable symptoms in the absence of a drug)
I have to take more and more of the drug to feel the same high.
When I stop using the drug for a while, I am in a lot of pain.
Summary: OUD: Nsymptoms ≥ 2, Non-OUD:Nsymptoms < 2
TABLE 1: Labeling criteria and text examples from DSM-5. A Redditor is labeled with OUD if at least two symptoms are
observed. It's used for labeling OUD and non-OUD, and positive recovering OUD and non-positive recovering OUD.
4
Social Problems
5
6
7
Risky Use
8
9
2
3
11
arXiv:1912.01122v1 [cs.SI] 2 Dec 2019
|
1805.04191 | 1 | 1805 | 2018-05-10T22:15:12 | Sentiment-driven Community Profiling and Detection on Social Media | [
"cs.SI"
] | Web 2.0 helps to expand the range and depth of conversation on many issues and facilitates the formation of online communities. Online communities draw various individuals together based on their common opinions on a core set of issues. Most existing community detection methods merely focus on discovering communities without providing any insight regarding the collective opinions of community members and the motives behind the formation of communities. Several efforts have been made to tackle this problem by presenting a set of keywords as a community profile. However, they neglect the positions of community members towards keywords, which play an important role for understanding communities in the highly polarized atmosphere of social media. To this end, we present a sentiment-driven community profiling and detection framework which aims to provide community profiles presenting positive and negative collective opinions of community members separately. With this regard, our framework initially extracts key expressions in users' messages as representative of issues and then identifies users' positive/negative attitudes towards these key expressions. Next, it uncovers a low-dimensional latent space in order to cluster users according to their opinions and social interactions (i.e., retweets). We demonstrate the effectiveness of our framework through quantitative and qualitative evaluations. | cs.SI | cs | Sentiment-driven Community Profiling and Detection
on Social Media
Amin Salehi, Mert Ozer, Hasan Davulcu
Computer Science and Engineering
Arizona State University, Tempe, AZ, USA
{asalehi1,mozer,hdavulcu}@asu.edu
8
1
0
2
y
a
M
0
1
]
I
S
.
s
c
[
1
v
1
9
1
4
0
.
5
0
8
1
:
v
i
X
r
a
ABSTRACT
Web 2.0 helps to expand the range and depth of conversation on
many issues and facilitates the formation of online communities.
Online communities draw various individuals together based on
their common opinions on a core set of issues. Most existing commu-
nity detection methods merely focus on discovering communities
without providing any insight regarding the collective opinions
of community members and the motives behind the formation of
communities. Several efforts have been made to tackle this problem
by presenting a set of keywords as a community profile. How-
ever, they neglect the positions of community members towards
keywords, which play an important role for understanding com-
munities in the highly polarized atmosphere of social media. To
this end, we present a sentiment-driven community profiling and
detection framework which aims to provide community profiles
presenting positive and negative collective opinions of commu-
nity members separately. With this regard, our framework initially
extracts key expressions in users' messages as representative of
issues and then identifies users' positive/negative attitudes towards
these key expressions. Next, it uncovers a low-dimensional latent
space in order to cluster users according to their opinions and social
interactions (i.e., retweets). We demonstrate the effectiveness of
our framework through quantitative and qualitative evaluations.
ACM Reference Format:
Amin Salehi, Mert Ozer, Hasan Davulcu. 2018. Sentiment-driven Community
Profiling and Detection on Social Media. In HT '18: 29th ACM Conference
on Hypertext and Social Media, July 9–12, 2018, Baltimore, MD, USA. ACM,
New York, NY, USA, 9 pages. https://doi.org/10.1145/3209542.3209565
1 INTRODUCTION
With the advent of social media platforms, individuals are able to
express their opinions on a variety of issues online. Like-minded
users forge online communities by interacting with each other and
expressing similar attitudes towards a set of issues. While many
methods [31] have been proposed to detect online communities,
most of them do not provide insights into the collective opinions of
community members. To shed light on such opinions, few efforts
have focused on profiling communities, but a large body of work
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
HT '18, July 9–12, 2018, Baltimore, MD, USA
© 2018 Association for Computing Machinery.
ACM ISBN 978-1-4503-5427-1/18/07...$15.00
https://doi.org/10.1145/3209542.3209565
has been devoted to user profiling [17, 19, 26]. Indeed, "the founders
of sociology claimed that the causes of social phenomena were to
be found by studying groups rather than individuals" [18].
Turner et al. [43] suggest that individuals come together and
form communities by developing shared social categorization of
themselves in contrast to others . Therefore, to profile a community,
we need to uncover the collective opinions of its members which
makes them distinguishable from the members of other commu-
nities. Tajfel [40] suggests focusing on unit-forming factors (e.g.,
similarities, shared threats, or common fate) which function as cog-
nitive criteria for segmentation of the social world into discrete
categories. Accordingly, the controversial issues on which users
have different opinions can be taken into account in order to dis-
cover the motives driving the segmentation of social media and the
formation of communities. As a result, the profile of a community
should present its important issues on which its members generally
have the same position. Such community profiles can be found use-
ful in a broad range of applications such as recommender systems
[38], community ranking [6, 16], online marketing [20], interest
shift tracking of communities [47], and community visualization [8].
For example, a group recommender system [3] can suggest more
relevant items to communities by knowing the collective opinions
of their members.
Many community detection methods [1, 5, 29, 30, 32, 33, 37, 46,
47] which are capable of community profiling have been proposed.
However, these methods usually present a set of frequent keywords
used by the members of a community as the community profile.
However, it is common in social media that the members of different
communities use the same keywords in their messages. Therefore,
keywords alone might not be enough to differentiate communities
in which their members have similar word usage. For instance, in
the course of the US presidential election of 2016, Republicans and
Democrats have used many common keywords such as Trump,
Clinton, and Obamacare but with different sentiments. To differ-
entiate and understand these two parties, not only keywords but
also the collective attitude of community members towards these
keywords should be taken into account.
In this paper, we tackle the aforementioned problem by propos-
ing a sentiment-driven community profiling and detection frame-
work which utilizes user-generated content and social interactions.
Our framework first captures key expressions in users' messages
as representative of issues by utilizing a POS-tagger and built-
in features of social media platforms (i.e. hashtags and user ac-
counts). Next, it identifies users' attitudes towards the extracted
key expressions. Finally, we employ a novel graph regularized
semi-nonnegative matrix factorization (GSNMF) technique to clus-
ter users according to both their opinions and social interactions.
HT '18, July 9–12, 2018, Baltimore, MD, USA
Amin Salehi, Mert Ozer, Hasan Davulcu
GSNMF uncovers not only communities but also their sentiment-
driven profiles. The main contributions of the paper are as follows:
• Providing sentiment-driven community profiles which sepa-
rately present the positive and negative collective attitudes
of the members of each community towards their important
key expressions;
• Achieving higher performance in detecting communities
compared to several existing state-of-the-art community
detection methods.
The rest of the paper is organized as follows. We review related
work in Section 2. In Section 3, we propose our sentiment-driven
community profiling and detection framework. To demonstrate the
efficacy of our framework, we conduct quantitative and qualitative
experiments by using real-world social media datasets in Section 4.
Section 5 concludes the paper and discusses future work.
2 RELATED WORK
Community detection methods can fall into three broad categories:
link-based, content-based and hybrid methods. Most of the existing
works belong to the first category and utilize only social interac-
tions [2, 7]. However, they neglect to utilize valuable user-generated
content in which users express their opinions. On the other hand,
content-based methods only utilize user-generated content [22].
Nevertheless, the content on social media is extremely noisy, result-
ing in the failure in detecting communities effectively. To alleviate
these challenges, hybrid community detection methods are pro-
posed. These methods are the most related work to our study since
they not only exploit both user-generated content and social interac-
tions but are also capable of profiling communities. These methods
roughly fall into two categories: probabilistic graphical models and
non-negative matrix factorization (NMF) based methods.
2.1 Probabilistic Graphical Models
Community User Topic (CUT) models [46] are one of the earliest
works for detecting communities using probabilistic graphical mod-
els. The first proposed model (CUT1) assumes that a community is
a distribution over users, while the second one (CUT2) considers
a community as a distribution over topics. To discover communi-
ties, CUT1 and CUT2 are biased towards social interactions and
user-generated content, respectively. Community Author Recipient
Topic (CART) [32] is an unbiased model which assumes the mem-
bers of a community discuss topics of mutual interests and interact
with one other based on these topics. CART considers users as both
authors and recipients of a message. However, in well-known social
networks such as Twitter and Facebook, the number of recipients
for a message can be very large. To make community detection scal-
able, Topic User Community Model (TUCM) [37], considering users
as authors not recipients, is proposed. Since CART and TUCM con-
sider users as authors, recipients, or both, they are limited to certain
types of social interactions (e.g., retweet and reply-to in Twitter).
The link-content model [29] solves this problem by ignoring the
assumption that messages can be related to each other using social
interactions. It is also capable of using different types of social in-
teractions (e.g., friendship in Facebook and followership in Twitter).
Furthermore, COCOMP [47] is proposed to model each commu-
nity as a mixture of topics about which a corresponding group of
Table 1: Notations used in the paper
Notation
U
C
S
n
m
k
X
U
V
W
∼
W
D
Explanation
The set of users
The set of communities
The set of key expressions
The number of users
The number of key expressions
The number of communities
User opinion matrix
Community membership matrix
Community profile matrix
Social Interaction matrix
Symmetrically normalized matrix W
Degree matrix of W
users communicate. [5] is another model which detects and profiles
communities in the domains having user-user, user-document, and
document-document links.
2.2 NMF-based Methods
In order to encode graphs as local geometric structures, many meth-
ods extending standard NMF are proposed. LLNMF [15] introduces
a regularizer, imposing the constraint that each data point should be
clustered based on the labels of the data points in its neighborhood.
GNMF [4] further incorporates a graph regularizer to encode the
manifold structure. Moreover, DNMF [39] is proposed based on the
the idea that not only the data, but also the features lie on a manifold.
The graph regularizers proposed by the above methods have been
utilized by several other works [30, 33] to detect communities on
social media. Moreover, another work [1] proposes a NMF-based ap-
proach utilizing a graph regularizer to exploit different social views
(i.e., different social interactions and user-generated content) as
well as prior knowledge in order to detect and profile communities.
3 THE PROPOSED FRAMEWORK
3.1 Problem Statement
We first begin with the introduction of the notations used in the
paper as summarized in Table 1. Let U = {u1, u2, ..., un} be the
set of n users, C = {c1, c2, ..., ck} indicate the set of k communi-
ties, and S = {s1, s2, ..., sk} denote the set of m key expressions.
X ∈ Rm×n indicates the matrix of users' attitudes towards key ex-
pressions, where Xli corresponds to the attitude of user ui towards
key expression sl . Furthermore, U ∈ Rn×k
indicates the community
membership matrix, in which Uik corresponds to the membership
strength of user Ui in community ck. V ∈ Rm×k further denotes
the community profile matrix, where Vlk corresponds to the con-
tribution strength of key expression sl in the profile of community
ck. Moreover, W ∈ Rn×n
indicates the social interaction matrix, in
which Wij represents the number of social interactions between
∼
user ui and user uj. We use
W to denote the symmetric normaliza-
∼
W = D−1/2WD−1/2, where D is the degree matrix
tion of W (i.e.,
of W).
By using the above notations, the problem of detecting and
profiling communities can be defined as: Given user opinion matrix
+
+
Sentiment-driven Community Profiling and Detection
on Social Media
X and social interaction matrix W , we aim to obtain community
membership matrix U and community profile matrix V.
3.2 Extracting Key Expressions as Issues
Social media presents an opportunity to utilize user-generated con-
tent in which individuals express their opinions on various issues.
The first step towards understanding users' opinions is the extrac-
tion of the issues they discuss. To this end, many efforts [28, 35, 45]
have been made to extract issues or related aspects. However, these
methods require enough training samples for a specific domain to
work accurately. Due to the lack of such a dataset for our required
experiments, we follow a simple approach to extract key expres-
sions. We utilize the built-in features common among well-known
social media platforms. In such social networks, hashtags and user
account mentions, which usually indicate issues, are perpended
by '#' and '@', respectively. However, the built-in features are not
enough to detect all issues. To tackle this problem, we employ
a part-of-speech (POS) tagger to extract proper nouns and noun
phrases (two or more nouns in a row) as representative of issues.
If some proper nouns are in a row, they are considered as a single
key expression. We utilize the POS tagger proposed in [13] proven
to perform well for the content on social media.
3.3 Capturing Users' Opinions
The position individuals take towards issues reflects their opinions1.
Many efforts [34, 41] have been made to detect users' sentiments
towards issues. However, these methods work effectively when
enough training samples for a specific domain are given. However,
there is no such a dataset for our required experiments so we apply
a simple approach although a sophisticated approach can improve
the result of our framework. First, a window with a certain size cen-
tered at each positive/negative sentiment word is created. Next, the
nearest key expression to the sentiment word is selected, and the
positivity/negativity of the sentiment word determines user's posi-
tive/negative attitude towards that key expression. For instance, in
the message "Conservatives seem angry every time economy adds
jobs", we assume the author has a negative sentiment towards key
expression "conservatives" because it is the closest key expression
to the negative sentiment word "angry" if we consider the window
size to be at least two. To generate matrix X, we need to apply the
above procedure for all messages. Therefore, for each message if
author ui takes a positive/negative attitude towards key expression
sl , we add the sentiment strength of the corresponding sentiment
word to Xli, respectively. We utilize SentiStrength [42] to discover
positive and negative words as well as their sentiment strength.
3.4 Exploiting Users' Opinions
After extracting users' attitudes towards key expressions, the next
major objective is sentiment-driven community profiling and de-
tection of like-minded users. To accomplish this, we exploit semi-
nonnegative matrix factorization [10] as follows:
X − VUT 2
F
min
U ,V
s.t. U ≥ 0.
1An opinion is defined as an attitude towards an issue [11].
HT '18, July 9–12, 2018, Baltimore, MD, USA
Since the non-negativity constraint in Eq. (1) only holds on ma-
trix U, matrix V can contain both positive and negative values. A
positive/negative value of Vlk denotes that the members of com-
munity ck have a collective positive/negative attitude towards key
expression sl . The larger the positive value of Vlk is, the more the
members of community ck have a collective positive attitude to-
wards key expression sl . The lower the negative value of Vlk is,
the more the members of community ck have a collective negative
attitude towards key expression sl . This property of matrix V also
results in the categorization of key expressions into positive and
negative categories according to the sign of the corresponding ele-
ments of key expressions in matrix V. Therefore, key expressions in
a community profile are divided into two positive and negative cat-
egories. Moreover, the key expressions in each category can also be
ranked by their values in matrix V in order to show how important
they are to the members of the corresponding community.
3.5 Exploiting Social Interactions
Social interactions (e.g., retweets in Twitter and friendship in Face-
book) are one of the most effective sources of information to detect
communities [31]. To utilize social interactions, NMF-based meth-
ods exploit graph regularizers. Gu et al. [14] suggest that graph
regularizers used in GNMF [4] and DNMF [39] suffer from the
trivial solution problem and the scale transfer problem. When the
graph regularizer parameter is too large, the trivial solution prob-
lem occurs and results in similarity among the elements of each row
of community membership matrix U. The scale transfer problem, in
which {V∗, U∗} stands as the optimal solution for Eq. (1), results in a
smaller objective value for the scaled transferred solution ( V∗
β , βU′)
, for any real scalar β > 1.
To avoid these problems, we propose using the following graph
regularizer,
∼
WU)
Tr(UT
max
U
s.t. U ≥ 0, UT U = I.
(2)
where I is the identity matrix with the proper size. Eq. (2) clusters
users into k communities, with the most interactions within each
community and the fewest interactions between communities. In
fact, Eq. (2) is equivalent to the nonnegative relaxed normalized cut
as put forth in [9].
3.6 The Proposed Framework GSNMF
In the previous sections, we introduced our solutions to exploit
and social interactions and users' attitudes toward key expressions.
Using these solutions, our proposed framework simultaneously
utilizes users' opinions and social interactions to uncover commu-
nities and their profiles. The proposed framework requires solving
the following optimization problem,
F = X − VUT 2
min
U ,V
s.t. U ≥ 0, UT U = I.
F − λTr(UT
∼
WU)
(3)
(1)
where λ is a non-negative regularization parameter controlling
the contribution of the graph regularizer in the final solution. Since
the optimization problem in Eq. (3) is not convex with respect to
variables U and V together, there is no guarantee to find the global
HT '18, July 9–12, 2018, Baltimore, MD, USA
Amin Salehi, Mert Ozer, Hasan Davulcu
Algorithm 1 The Proposed Algorithm for GSNMF
Table 2: The statistics of the datasets.
Input: user opinion matrix X and social interaction matrix W
output: community membership matrix U and community
profile matrix V
1: Initialize U and V randomly where U ≥ 0
2: while not convergent do
3:
4:
5: end while
Update U according to Eq. (4)
Update V according to Eq. (6)
optimal solution. As suggested by [21], we introduce an alternative
scheme to find a local optimal solution to the optimization problem.
The key idea is optimizing the objective function with respect to
one of the variables U or V, while fixing the other one. The algo-
rithm keeps updating the variables until convergence.
the following update rule,
U = U ⊙
Optimizing the objective function F with respect to U leads to
(cid:118)(cid:116)(XT V)+ + [U(VT V)−] + λ
(XT V)− + [U(VT V)+] + UΓ+
∼
WU + UΓ−
(4)
where ⊙ denotes the Hadamard product, and
∼
WU
Γ = UT XT V − VT V + λUT
(5)
We separate the negative and positive parts of a matrix A as
A− = (A − A)/2 and A+ = (A + A)/2, respectively. The details
regarding the computation of Eq (4) are given in Appendix A.
Moreover, optimizing the objective function F with respect to
V leads to the following updating rule,
V = XU(UT U)−1
(6)
The details are given in Appendix B.
The algorithm for GSNMF is shown in Algorithm 1. In line 1, it
randomly initializes U and V. From lines 2 to 5, it updates U and V
until convergence is achieved.
3.7 Algorithm Complexity
In Algorithm 1, the most costly operations are the matrix multipli-
cations in update rules Eq. (4) and Eq. (6). Therefore, we provide
the time complexity of these two updating rules as follows:
• The time complexity of Eq. (4) is O(nmk + mk2 + n2k + nk2).
• Since the inversion of small matrix UT U is trivial, the time
Accordingly, the time complexity of Algorithm 1 is O(ik(nm +
mk + n2 + nk)) where i is the number of iterations. Our framework
can be applied to large scale social network platforms by exploiting
the distributed approaches outlined in [12, 23, 25].
4 EXPERIMENTS
To evaluate the efficacy of our framework, we need to answer the
following two questions:
complexity of Eq. (6) is O(mnk + nk2).
(1) How effective is the proposed framework in detecting com-
munities compared to the the-state-of-the-art community
detection methods?
(2) How effective is our framework in profiling communities?
# of tweets
# of retweets
# of distinct words
# of distinct key expressions
# of users
# of baseline communities
US
113,818
18,891
5,773
165
404
2
UK
236,008
6,863
7,653
349
317
5
Canada
98,899
3,104
3,738
69
102
3
In the next sections, we first describe the datasets used in this
study. Next, the performance of GSNMF is compared with several
state-of-the-art community detection methods. Then, we qualita-
tively evaluate the community profiles uncovered by our frame-
work.
4.1 Data Description
We take politics as an example to evaluate our framework. In this
regard, we used Twitter search API to crawl politicians' tweets
from three different countries, namely United States, United King-
dom, and Canada. However, Twitter API imposes the limitation of
retrieving only the latest 3200 tweets for each user. To overcome
this limitation, we crawled politicians' user accounts several times
during the time each dataset covers. The datasets are described as
follows,
• US Dataset consists of the tweets posted by 404 politicians
from two major political parties (Republican party and Demo-
cratic party) in the United States from August 26 to Novem-
ber 29, 2016.
• UK Dataset consists of the tweets posted by 317 political
figures from five major political parties (Conservative Party,
Labour Party, Scottish National Party, Liberal Democratic
Party, and UK Independence Party) in the United Kingdom
from January 1 to September 30, 2015.
• Canada Dataset consists of the tweets posted by 102 politi-
cians from three major political parties (Liberal Party, Con-
servative Party, and New Democratic Party) from January 1
to November 18, 2016.
All users in the datasets have discussed at least 15 key expres-
sions. Moreover, the key expressions used by less than 15 users and
stop words are eliminated. As a window size, we experimentally
determine the threshold of 3 for the nearest keywords on both sides
of each sentiment word. Furthermore, the party to which a user
belong is labeled as ground truth. The statistics for the datasets are
shown in Table 2. The GSNMF code and users' Twitter accounts as
well as their ground truth labels used in this paper are available 2.
4.2 Community Detection Evaluation
4.2.1 Baselines. In order to demonstrate the effectiveness of our
framework, we compare GSNMF with the following state-of-the-art
community detection methods,
• GNMF [4] is a hybrid method utilizing both user-generated
and social interactions by incorporating a graph regularizer
into standard NMF.
2https://github.com/amin-salehi/GSNMF
Sentiment-driven Community Profiling and Detection
on Social Media
HT '18, July 9–12, 2018, Baltimore, MD, USA
using a greedy approach.
• Louvain [2] is a link-based method optimizing modularity
• Infomap [36] is a link-based method built upon information
theory to compress the description of random walks in order
to find community structure.
• DNMF [39] is a hybrid method utilizing both user-generated
content and social interactions by incorporating two regu-
larizers (i.e, a graph regularizer and a word similarity regu-
larizer) into standard NMF.
• Soft Clustering [44] is a link-based method that assigns
• CNM [7] is a link-based method based on modularity opti-
users to communities in a probabilistic way.
mization.
4.2.2 Evaluation Metrics. To evaluate the performance of the
methods, we utilize three metrics frequently used for community de-
tection evaluation; namely, Normalized Mutual Information (NMI),
Adjusted Rand Index (ARI), and purity.
4.2.3 Experimental Results. For this experiment, we use all three
datasets. We also utilize the party membership of each politician
as ground truth in our evaluation. For the methods providing soft
community membership, like our framework, we select the com-
munity with the highest membership value for each user as the
community to which she/he belongs. Regularization parameters
of NMF-based methods are set to be all powers of 10 from 0 to 9
to find the best configuration for each of these methods. We run
each method 10 times with its best configuration and then report
the best result. According to the results shown in Table 3, we can
make the following observations,
• Our proposed framework achieves the highest performance
in terms of NMI and ARI for all three datasets. In terms of
purity, it also achieves the best in the Canada and US datasets.
In the UK dataset, Louvain, Infomap, and CNM obtain higher
purity compared to our framework since they generate an
artificially large number of communities for sparse graphs
such as social media networks. For instance, Louvain detects
21 communities for UK dataset.
• Exploiting both user-generated content and social interac-
tions does not necessarily result in achieving better perfor-
mance compared to link-based methods. For example, the
Soft Clustering method achieves better results compared to
GNMF and DNMF in terms of all three used metrics. How-
ever, link-based methods do not uncover any community
profile.
• All NMF-based methods achieve their highest performance
with large values (i.e., from 106 to 109) for the graph regu-
larizer parameter.
4.3 Community Profiling Evaluation
In this section, we evaluate the effectiveness of our proposed frame-
work in profiling communities by using US and UK datasets. In this
regard, we first label each community detected by our framework
with the party to which the majority of community members be-
long. Next, we evaluate how effectively the profile of a community
represents its corresponding ground truth party. To this end, two
graduate students who have knowledge of US and UK politics are
Table 3: Comparison of community detection methods.
Canada
UK
ARI
0.4352
0.8874
0.8746
0.8291
0.8030
0.8450
0.9612
Purity
0.9937
0.9936
0.9905
0.9085
0.8896
0.9495
0.9811
NMI
0.8602
0.8971
0.9405
0.9597
0.9574
1.0000
1.0000
ARI
0.8430
0.9299
0.9643
0.9794
0.9716
1.0000
1.0000
Purity
0.9902
0.9804
0.9902
0.9902
0.9902
1.0000
1.0000
Method
Louvain
Infomap
CNM
GNMF
DNMF
Soft Clustering
GSNMF
NMI
0.5083
0.5026
0.5741
0.8564
0.8599
0.8934
0.9069
US
ARI
0.3889
0.3755
0.4664
0.9126
0.9222
0.9413
0.9510
Purity
0.9752
0.9752
0.9752
0.9777
0.9802
0.9851
0.9876
NMI
0.7077
0.8871
0.8830
0.8120
0.8308
0.8481
0.9298
assigned to label the results of community profiling methods. It
is asked that each key expression in a community profile to be
assigned to one of the following categories:
• Supported: A key expression is labeled as supported if the
majority of community members have a positive attitude
towards it or support it.
• Opposed: A key expression is labeled as opposed if the major-
ity of community members have a negative attitude towards
it or oppose it.
• Concerned: A key expression is labeled as concerned if the
• Unrelated: A key expression is labeled as unrelated if the
annotators cannot find a strong relevance between the com-
munity (party) and the key expression.
majority of community members are concerned about it.
In the tables representing community profiles, we color (and
mark) supported, opposed, and concerned key expressions with
green (+), red (−), and blue (±), respectively. We also leave unrelated
key expressions uncolored (and unmarked).
In the following experiments, we expect our proposed framework
to achieve three goals:
(1) Uncovering community profiles which represent the collec-
tive opinions of community members into two positive/negative
categories;
(2) Assigning supported key expressions and opposed/concerned
ones to positive/negative categories, respectively;
(3) Minimizing the number of unrelated key expressions in com-
munity profiles.
In Sections 4.3.1 and 4.3.2, we evaluate the results of GSNMF
according to the first and second goals by using US and UK datasets.
To evaluate the performance of the third goal, Section 4.3.3 com-
pares GSNMF with the baselines with regard to their effectiveness
in extracting relevant key expressions.
4.3.1 US Politics. The US dataset covers many events such as
occurrences of gun violence, police brutality (e.g., the shooting of
Terence Crutcher), the Flint water crisis, and the death of Fidel
Castro; but the major event is the US presidential election of 2016.
To give brief background knowledge, two major US parties during
the election are described as follows [24],
• Democratic Party: A liberal party focusing on social jus-
tice issues. In 2016, Hillary Clinton was nominated as the
presidential candidate of the party with Tim Kaine as her
vice president. Moreover, Barrack Obama, the incumbent
Democratic President, was a strong advocate for Hillary
Clinton.
• Republican Party: A conservative party, known as the
GOP, which had the majority of congressional seats in 2016
and embraces Judeo-Christian ethics. Moreover, Donald Trump
HT '18, July 9–12, 2018, Baltimore, MD, USA
Amin Salehi, Mert Ozer, Hasan Davulcu
Table 4: The profiles of two communities detected by our
framework in the US dataset.
Table 5: The profiles of two communities detected by GNMF
and DNMF in the US dataset.
Democrats
Positive
Negative
Zika
Trump
HillaryClinton
POTUS
America
@HouseGOP
Donald Trump
Gun Violence
±
+
−
+
−
+
−
+ #WomensEqualityDay
+ #NationalComingOutDay −
±
−
#GunViolence
± Climate Change
±
#Trabajadores
± TerenceCrutcher
−
− Violence Situations
−
±
−
Americans
#LaborDay
TimKaine
Hillary
American
Halloween
Veterans
Florida
#LGBTQ equality
#FundFlint
Donald
+
+
+
+
+
#Trans
Cubs
GOP
ISIS
+
+
+
Republicans
Positive
America
Negative
Obamacare
#BetterWay
+
+
Texas
Congress
Zika
Iran
Obama
Tax code
−
+
±
+ @SpeakerRyan
±
+
−
+ @Mike_Pence
−
+ @RepTomPrice
+ @realDonaldTrump −
± Breast Cancer
− President Obama
±
−
− State Sponsor
−
−
−
−
+
+
+ Constitution Day
+
+
ICYMI
Senator
#LaborDay
GITMO
Islamic
#VeteransDay
ISIS
Hillary
Thanksgiving
Fidel Castro
POTUS
USMC
God
Note: All colors, signs, and the name of parties in the table are ground truth.
was nominated as the party candidate for the presidency with
Mike Pence as his vice president.
During the campaign, Republicans-especially Donald Trump-
mainly criticized president Obama and his policies (e.g., Obamacare,
tax plans, and Iran deal) in order to discredit Hillary Clinton, whom
they claimed was going to continue the Obama legacy and uphold
the status quo [24]. On the other hand, Clinton's campaign brought
the issue of gun violence into the contest, and also focused on
human rights for groups such as women and LGBTQ [24].
Table 4 shows the profiles of two communities detected by our
framework in the US dataset as well as their corresponding ground
truth political parties and experts' labels. According to the pro-
vided background, the community on the left highly resembles the
Democratic Party since its members have generally expressed: (1)
positive attitudes towards Hillary Clinton, the U.S. president (i.e.,
POTUS), Tim Kaine, and human rights issues (e.g., #WomensEqual-
ityDay, #LGBTQ equality, and #NationalComingOutDay), and (2)
negative attitudes towards the Republican Party (e.g., @HouseGOP
and GOP), Donald Trump, and gun violence, police brutality (e.g.,
the shooting of Terence Crutcher). On the other hand, the commu-
nity on the right highly resembles the Republican Party since its
members have generally expressed: (1) positive attitudes towards
the Republican Party (e.g., @HouseGOP and @SpeakerRyan), Don-
ald Trump, Mike Pence, Congress, and religion (i.e., God), and (2)
negative attitudes towards President Obama and his policies (i.e.,
Obamacare, tax code, Iran, Guantanamo Bay detention camp (i.e.,
GITMO)) as well as Hillary Clinton.
Negative sentiment implies both opposition and concern. If nec-
essary, our framework can differentiate opposition from concern
by providing the sentiment words frequently expressed by the
members of a community towards each key expression. For exam-
ple, Democrats' negative sentiment towards Donald Trump mainly
comes from the sentiment words "unfit", "low", and "dangerous"
which suggest opposition. On the other hand, their negative senti-
ment towards #Trans (i.e., transgender people) mainly originates
from the sentiment words "discrimination" and "murder" which
indicate concern.
To demonstrate the advantage of our community profiling method,
we compare the profiles of typical community profiles usually pro-
vided by retrospective studies with those uncovered by our frame-
work. Table 5 shows the profiles of two communities detected by
GNMF and DNMF in the US dataset as well as their corresponding
a. GNMF
b. DNMF
Democrats
Trump
Hillary
Gov
HillaryClinton
Donald Trump
#DoYourJob
DebateNight
−
+
+
+
−
±
− @realDonaldTrump
−
±
±
Climate Change
@CoryBooker
ElectionDay
Russia
China
Debate
Hillary Clinton
+
−
+
Donald
Virginia
HRC
VPDebate
America
TimKaine
FLOTUS
#IamWithHer
+
+
+ #WomenEqualityDay
+
+
±
+
+ HouseDemocrats
−
Steve Bannon
−
+
Flint
POTUS
Bannon
USA
−
±
+
±
+
+
+
−
Republicans
Obamacare
#BetterWay
Congress
Zika
America
@HouseGOP
American
ICYMI
Obama
Florida
Americans
POTUS
Clinton
Iran
U.S.
+
−
+
± #HurricanMatthew
−
+ @realDonaldTrump
−
± Hurrican Matthew
−
±
+
+
+
±
FBI
Texas
Senate
Veterans
Matthew
#DoYourJob
Washington
+ @SpeakerRyan
±
+
#NeverForget
Ohio
GOP
WSJ
−
+
−
+
±
−
+
+
±
+
+
+
−
Democrats
Congress
Obamacare
Trump
#BetterWay
America
Zika
@HouseGOP
American
Gov
#DoYourJob
ICYMI
Americans
HillaryClinton
Hillary
− @realDonaldTrump
Clinton
Obama
U.S.
POTUS
Iran
+
+
+
+
+
−
+
+
± HurricanMatthew
−
±
Donald Trump
Washington
Senate
FBI
Veterans
Florida
Texas
GOP
Oct
Republicans
Congress
Obamacare
Trump
#BetterWay
America
Zika
@HouseGOP
American
Gov
#DoYourJob
ICYMI
Obama
U.S.
POTUS
Iran
HillaryClinton
Americans
Hillary
−
+
−
+ @realDonaldTrump
−
+
−
−
−
+
+
−
± HurricanMatthew
+
±
Veterans
Washington
Donald Trump
Senate
FBI
Clinton
Florida
Texas
GOP
Oct
+
−
+
±
+
±
+
+
−
+
+
ground truth political parties. As we observe, it is almost impossible
for a non-expert individual to recognize the party associated with
each profile since the position of the communities towards the key
expressions are not taken into account. For example, in profiles cor-
responding to the Democratic Party and the Republican Party, many
key expressions related to Trump, Clinton, and Obama exist, but
there is no information regarding collective attitude of community
members toward such key expressions. However, Table 4 shows
that our proposed method correctly divides opposed/concerned
key expressions and supported ones into the correct categories.
Therefore, our framework makes it easy not only to differentiate
and understand communities better but also to associate online
communities with their real-world counterparts (if exist).
4.3.2 UK Politics. The UK dataset covers many events such as
the rise of terrorism and terrorist attacks (e.g., CharlieHebdo and
Tunisia attack), and many natural disasters (e.g., Nepal earthquake
and Ebola) that happened in the first nine months of 2015. However,
the major event in this period of time is the UK general election.
Brief background knowledge about five major UK parties during
the general election are provided as follows [27],
• Conservative Party: This party is also known as Tory and
was led by David Cameron in 2015. David Cameron also
led the UK government before and after the election of 2015.
George Osborne, Nicky Morgan, and Jeremy Hunt were some
of his secretaries.
• Labour Party: Ed Miliband was the leader of the Labour
party for the election and selected Tom Watson as his deputy
chair and campaign coordinator. Jeremy Corbyn, Yvette Cooper,
Liz Kendall, and Andy Burnham were among the prominent
members of the party.
• Liberal Democrat Party: Nick Clegg led the Liberal Demo-
crat Party in 2015. Norman Lamb, John Leech, Nick Harvey,
Tim Farron, and Charles Kennedy were some of the party's
parliamentarians.
Sentiment-driven Community Profiling and Detection
on Social Media
HT '18, July 9–12, 2018, Baltimore, MD, USA
Table 6: The profiles of five communities detected by our framework in the UK dataset.
+
+
Conservative Party (Tory)
Positive
Conservatives
Cameron
GE2015
Negative
Labour
Miliband
Tunisia
Paris
FIFA
ISIL
−
+ @David_Cameron −
±
±
+ @George_Osborne
+ VoteConservative⋆ −
+ NickyMorgan01⋆ ±
− Charles Kennedy
−
Ed_Miliband
−
±
−
−
±
±
David Cameron
+
+ @Jeremy_Hunt
+
+ @Tracey_Crouch
+
LibDems
Calais
Nepal
London
Wales
SNP
Syria
Lab
Team2015⋆
Heathrow
England
Chris
Labour Party (Lab)
Negative
Tories
Tory
Positive
Labour
UKLabour
A&E
Britain
Cameron
Ed_Miliband
−
+
−
+
−
+ LabourDoorStep
+ @AndyBurnhamMP
− David Cameron
+
− Bedroom Tax
+
−
+ @GloriadePiero
BedroomTax
−
+ YvetteCooperMP
+ YvetteForLabour⋆ ±
−
−
±
+ @TristramHuntMP ±
±
+
SteveReedMP
@LeicesterLiz
LizforLeader⋆
France
Tunisia
Syria
Europe
VoteLabour⋆
Government
Tax Credits
GE2015
Govt
+
+
+
SNP
+
+
Cardiff
GE2015
Tories
Tory
Positive
LibDems
Liberal Democrat Party (Lib Dem)
Negative
Labour
Iraq
−
+ @Nick_Clegg ±
± Climate Change
+ NormanLamb −
−
+ @TimFarron −
−
± Mental Health ±
−
± CharlieHebdo
−
Nigel Farage
±
±
− Welfare Bill
UKLabour
Tuition Fees
HIV
SNP
PMQs
+ Nick Clegg
LibDem
Govt
Ebola
Paris
Lib Dems
NHS
John
Lib Dem
LBC
+
+
+
+
+
+
+
+
MPs
Scotland
Negative
Tory
Trident
Tories
Labour
Scottish National Party (SNP)
Positive
TheSNP
GE15
SNP
−
±
−
+ NicolaSturgeon −
+ #RefugeesWelcome
±
±
± CharlieHebdo⋆
Alan
±
Scottish
± Mediterranean
GE2015
±
Edinburgh
Maiden Speech ±
±
±
+ Nicola Sturgeon −
Med
French
Charles
Tunisia
Westminster
Iraq
Paris
NHS
Neil
Glasgow
Syria
+
+
+
UK Independence Party (UKIP)
+
+
−
Nigel Farage
Positive
UKIP
Negative
Calais
Labour
ISIS
Greece
BBC
Britain
BBCqt
GE2015
Cameron
Mark
Brexit
±
+ @Nigel_Farage' −
−
±
−
±
−
Government
−
− David Cameron
±
−
±
±
− JeremyCorbyn⋆ −
− Jeremy Corbyn ± Mediterranean
Telegraph
BBC5live
Queen
Andrew
George's
Libya
Miliband
Tunisia
Paris
SNP
Tories
+
+
+
Note: All colors, signs, and the name of parties in the table are ground truth.
• Scottish National Party: The SNP is a Scottish Nationalist
party led by Nicola Sturgeon in 2015. Alan Brown and Neil
Gray were some of the party's parliamentarians.
• UK Independence Party: UKIP was led by Nigel Farage in
2015. The party embodies opposition to both United King-
dom EU membership and immigration.
Table 6 shows the profiles of five communities detected by our
framework in the UK dataset as well as their corresponding ground
truth political parties. As shown in the table, all parties have a com-
mon key expression, the general election of 2015 (e.g, GE2015 and
GE15). We can also observe that the members of each party have
generally expressed: (1) positive attitudes towards their party and
also their prominent members and (2) negative attitudes towards
other parties and their prominent members due to election com-
petition [27]. Moreover, the government was a coalition between
the Conservative Party and the Liberal Democrat Party before
the election. This coalition explains why they expressed positive
sentiments towards the government related issues (i.e., Govt and
Cameron) [27]. According to the negative attitudes of almost all par-
ties, we can determine that the Conservative party and the Labour
party are the ones towards which other parties expressed most
negative sentiments. Furthermore, these two parties expressed a
high negative sentiment towards each other. The reason behind
this antagonism is that these parties are the two biggest parties
having the highest chance of winning an outright majority in the
election [27]. Moreover, UKIP's negative view on Calais, the city in
France where immigrants enter the UK, and Mediterranean (immi-
grants/immigration) reflects its anti-immigration stance. Moreover,
UKIP's positive sentiment on Brexit and its negative sentiment on
Greece indicates its anti-EU orientation.
Table 7 shows the profiles of five communities detected by GNMF
in the UK dataset as well as their corresponding ground truth po-
litical parties. Due to space limitation, we do not provide the com-
munity profiles detected by DNMF. As we observe from Table 7,
the same problem which exists in the profiles of communities de-
tected by GNMF and DNMF in the US dataset still exists here. In
other words, it is not clear which community represents which
party. For instance, the profiles which corresponds to the Con-
servative Party and the Labour Party shared many key expres-
sions such as Labour, Tories, David Cameron (@David_Cameron),
@Ed_Miliband, UKLabour, and VoteLabour, but there is no other
information to understand the positions of these two parties to-
wards these key expressions in order to differentiate them and also
Table 7: The profiles of five communities detected by using
GNMF in the UK dataset .
−
+
Conservatives
Miliband
Conservatives
−
+
−
+ @David_Cameron +
−
+
+ VoteConservetives −
GE2015
Labour
+
+
Govt
NHS
− @Nigel_Frange
LeaderDebates
+ @ZacGoldsmith + LabourDoorStep
− @Ed_Miliband
+
+
MPs
London
UKLabour
Labours
UKIP
Labour
Tories
NHS
Britain
Cameron
UKLabour
London
BBC
BBCqt
Europe
+
+
+
+
−
−
−
Lib dems
Libdems
GE2015
Labour
+
−
+ @LFeatherstone
−
@CLeslieMP
Bradford
+ @Nick_Clegg
±
Budget2015
London
+
−
Wales
NHS
Miliband
LeaderDebate
SNPs
SNP
Scotland
VoteSNP
GE15
@TheSNP
Labour
Westminster
Tory
GE2015
UKIPs
Labour
john
Libdems
− @JessPhillips
birmingham
−
−
−
−
−
−
− @TobyPerkinsMP
LabourEoin
Lib dems
Lib dem
Hansard
NHS
UKLabour
MPs
Jess
@SabelHardman
−
Labour party
− @SimonDanczuk
−
Libdem
GE2015
Youtube
Europe
miliband
Food Banks
+ @NicolaSturgeon
LeadersDebate
− LaboursDoorStep −
MPs
Trident
Scottish
London
UKLabour
PMQS
+
−
− @David_Cameron
Wales
+
+
+
−
Lib dem
croydon
Lib dems
TessaJowell
Wales
England
David Cameron
Tory
Corbyn
Calasis
+ @AndyBurnhamMP − @George_Osborne ±
+ @ED_Miliband
+
+ @George_Osborne −
−
+ @NickyMorgan01 +
+ @NorwichChloe ±
+ @RobertBuckland + @YvetteCooper
−
VoteLabour
+
±
− @CLeslieMP
− LabourLeadership +
+
−
+ YvetteCooperLabour
−
+ @EmmaReynoldMP
− David Cameron
± Mental Health
+ @SWilliamsMP
+ @NormanLamb
−
Conservatives
−
+
Tories
Minister
Guardian
Leeds
Greece
England
Jeremy Corbyn
Government
VoteLabour
Telegraph
Farage
+
+
−
+
State
Thurrock
−
Tories
Nick Clegg
Glasgow
Front Page
VoteLabour
+ @TimFarron
ScottishLabour
− VoteConservatives + Nicola Sturgeon
Cardiff
@GradySNP
−
−
−
− Housing Benefit
− @GiselaStuart
Labour MPs
+
+
−
−
− LabourLeadership −
−
− @AndyburnhamMP − @David_Cameron
Britain
Wales
Edinburgh
Google
Lab
+
Bristol
Croydon
Norwich
Chancellor
Note: All colors, signs, and the name of parties in the table are ground truth.
associate the community profiles to the parties. However, as Table 6
suggests, the community profiles detected by our framework shows
that the community associated to the Conservative Party have posi-
tive attitude towards David Cameron but negative attitude towards
Labour and Miliband. On the other hand, the community associ-
ated to the Labour Party have the positive attitude towards Labour,
UKLabour, and Miliband but negative attitude towards Tories and
David Cameron. Since this corresponds to our ground truth, we
can conclude that sentiment information can play an essential role
in providing better community profiles.
4.3.3 Quantitative results. In this section, we aim to compare
GSNMF with GNMF and DNMF in terms of their effectiveness in
extracting relevant key expressions for community profiles. Figure
1 shows the accuracy of all methods in US and UK datasets by
considering different number of top key expressions as community
profiles. As we observe, GSNMF outweighs GNMF and DNMF in all
experiments. For instance, by considering top 30 key expressions as
community profiles, 93% of key expressions extracted by GSNMF
in the US dataset are relevant compared to 82% in GNMF and 85%
in DNMF. Similarly, 83% of key expressions extracted by GSNMF in
the UK dataset are relevant compared to 65% in DNMF and 73% in
GNMF. The experiments also suggest that GSNMF achieves better
HT '18, July 9–12, 2018, Baltimore, MD, USA
Amin Salehi, Mert Ozer, Hasan Davulcu
The US dataset
The UK dataset
y
c
a
r
u
c
c
A
1
0.8
0.6
0.4
0.8
0.6
0.4
Top 6
Top 12
Top 18
Top 24
Top 30
DNMF
GNMF
GSNMF
Top 6
Top 12
Top 18
Top 24
Top 30
The number of top key expressions per community profile
Figure 1: The accuracy of community profiling methods in extracting relevant key expressions.
accuracy with lower number of top key expressions as community
profiles. This implies that the higher a key expression is ranked by
GSNMF, the more likely it is relevant. Following these observations,
sentiment-driven community profiling produces key expressions
which are more relevant than its sentiment insensitive counterparts.
5 CONCLUSION AND FUTURE WORK
In this paper, we presented a sentiment-driven community pro-
filing and detection framework. Our framework uncovers a low-
dimensional latent space in order to cluster users according to their
opinions and social interactions. It also provides community profiles
reflecting positive/negative collective opinions of their members.
Experimental results on real-world social media datasets demon-
strated: (1) our framework obtains significant performance in detect-
ing communities compared to several state-of-the-art community
detection methods, and (2) our framework presents a sentiment-
driven community profiling approach that provides better insights
into the collective opinions of community members by dividing
key expressions into positive and negative categories.
Our future work includes the following directions. First, the
current sentiment analysis is not capable of differentiating between
opposition and concern. There is a need to propose new methods to
differentiate between opposition and concern. Second, identifying
the dynamics of communities sheds light on their temporal behavior.
Therefore, we will focus our efforts on detecting and profiling the
dynamics of communities.
A APPENDIX
A.1 Computation of U
Optimizing the objective function F in Eq. (3) with respect to U is
equivalent to solving
FU = X − VUT 2
min
U
s.t. U ≥ 0, UT U = I.
F − λTr(UT
∼
WU)
(7)
Let Γ and Λ be the Lagrange multiplier for constraints UT U = I
and U ≥ 0 respectively, and the Lagrange function is defined as
follows:
min
U
LU = X − VUT 2
∼
WU)
− Tr(ΛUT ) + Tr(Γ(UT U − I))
F − λTr(UT
The derivative of LU with respect to U is
∼
WU − Λ + 2UΓ
= −2XT V + 2UVT V − 2λ
∂LU
∂U
By setting ∂LU
= 0, we get
∂U
Λ = −2XT V + 2UVT V − 2λ
∼
WU + 2UΓ
(10)
With the KKT complementary condition for the nonnegativity
of U, we have Λij Uij = 0. Therefore, we have
(−XT V + UVT V − λ
where Γ = UT XT V − VT V + λUT
∼
WU + UΓ)ij Uij = 0
∼
WU.
Matrices Γ, XT V, and VT V take mixed signs. Motivated by [10],
=
we separate positive and negative parts of any matrix A as A+
ij
(Aij + Aij)/2, A−
= (Aij − Aij)/2.
ij
Thus, we get
∼
WU + UΓ−)
+((XT V)− + [U(VT V)+] + UΓ+)]ij Uij = 0
+λ
(8)
(9)
(11)
(12)
(13)
(14)
which leads to the updating rule of U in Eq (4).
A.2 Computation of V
Optimizing the objective function F in Eq. (3) with respect to V is
equivalent to solving
min
V
FV = X − VUT 2
The derivative of FV with respect to V is
= −2XU + 2VUT U
F
∂FV
∂V
Setting ∂FV
∂V
= 0, we get the updating rule of V in Eq (6).
Sentiment-driven Community Profiling and Detection
on Social Media
HT '18, July 9–12, 2018, Baltimore, MD, USA
REFERENCES
[1] Mohammad Akbari and Tat-Seng Chua. 2017. Leveraging Behavioral Factoriza-
tion and Prior Knowledge for Community Discovery and Profiling. In Proceedings
of the Tenth ACM International Conference on Web Search and Data Mining. ACM,
71–79.
[2] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb-
vre. 2008. Fast unfolding of communities in large networks. Journal of statistical
mechanics: theory and experiment 2008, 10 (2008), P10008.
[3] Ludovico Boratto. 2016. Group Recommender Systems. In Proceedings of the 10th
ACM Conference on Recommender Systems. ACM, 427–428.
[4] Deng Cai, Xiaofei He, Jiawei Han, and Thomas S Huang. 2011. Graph regularized
nonnegative matrix factorization for data representation. IEEE Transactions on
Pattern Analysis and Machine Intelligence 33, 8 (2011), 1548–1560.
[5] Hongyun Cai, Vincent W Zheng, Fanwei Zhu, Kevin Chen-Chuan Chang, and Zi
Huang. 2017. From community detection to community profiling. Proceedings of
the VLDB Endowment 10, 7 (2017), 817–828.
[6] Wen-Yen Chen, Dong Zhang, and Edward Y Chang. 2008. Combinational collab-
orative filtering for personalized community recommendation. In Proceedings of
the 14th ACM SIGKDD international conference on Knowledge discovery and data
mining. ACM, 115–123.
[7] Aaron Clauset, Mark EJ Newman, and Cristopher Moore. 2004. Finding commu-
nity structure in very large networks. Physical review E 70, 6 (2004), 066111.
[8] Juan David Cruz, Cécile Bothorel, and François Poulet. 2013. Community detec-
tion and visualization in social networks: Integrating structural and semantic
information. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 1
(2013), 11.
[9] Chris HQ Ding, Xiaofeng He, and Horst D Simon. 2005. On the Equivalence of
Nonnegative Matrix Factorization and Spectral Clustering.. In SDM, Vol. 5. SIAM,
606–610.
[10] Chris HQ Ding, Tao Li, and Michael I Jordan. 2010. Convex and semi-nonnegative
matrix factorizations. IEEE transactions on pattern analysis and machine intelli-
gence 32, 1 (2010), 45–55.
[11] Martin Fishbein and Icek Ajzen. 1977. Belief, attitude, intention, and behavior:
An introduction to theory and research. (1977).
[12] Rainer Gemulla, Erik Nijkamp, Peter J Haas, and Yannis Sismanis. 2011. Large-
scale matrix factorization with distributed stochastic gradient descent. In Pro-
ceedings of the 17th ACM SIGKDD international conference on Knowledge discovery
and data mining. ACM, 69–77.
[13] Kevin Gimpel, Nathan Schneider, Brendan O'Connor, Dipanjan Das, Daniel
Mills, Jacob Eisenstein, Michael Heilman, Dani Yogatama, Jeffrey Flanigan, and
Noah A Smith. 2011. Part-of-speech tagging for twitter: Annotation, features,
and experiments. In Proceedings of the 49th Annual Meeting of the Association for
Computational Linguistics: Human Language Technologies: short papers-Volume 2.
Association for Computational Linguistics, 42–47.
[14] Quanquan Gu, Chris Ding, and Jiawei Han. 2011. On trivial solution and scale
transfer problems in graph regularized nmf. In IJCAI Proceedings-International
Joint Conference on Artificial Intelligence, Vol. 22. 1288.
[15] Quanquan Gu and Jie Zhou. 2009. Local learning regularized nonnegative matrix
factorization. In Proceedings of the 21st international jont conference on Artifical
intelligence. Morgan Kaufmann Publishers Inc., 1046–1051.
[16] Xiao Han, Leye Wang, Reza Farahbakhsh, Ángel Cuevas, Rubén Cuevas, Noel
Crespi, and Lina He. 2016. CSD: A multi-user similarity metric for community
recommendation in online social networks. Expert Systems with Applications 53
(2016), 14–26.
[17] Morgan Harvey, Fabio Crestani, and Mark J Carman. 2013. Building user profiles
from topic models for personalised search. In Proceedings of the 22nd ACM in-
ternational conference on Conference on information & knowledge management.
ACM, 2309–2314.
[18] Michael Hechter. 1988. Principles of group solidarity. Vol. 11. Univ of California
[19] Kazushi Ikeda, Gen Hattori, Chihiro Ono, Hideki Asoh, and Teruo Higashino.
2013. Twitter user profiling based on text and community mining for market
analysis. Knowledge-Based Systems 51 (2013), 35–47.
[20] Robert V Kozinets. 2002. The field behind the screen: Using netnography for
marketing research in online communities. Journal of marketing research 39, 1
(2002), 61–72.
[21] Daniel D Lee and H Sebastian Seung. 2001. Algorithms for non-negative matrix
factorization. In Advances in neural information processing systems. 556–562.
[22] Kyumin Lee, James Caverlee, Zhiyuan Cheng, and Daniel Z Sui. 2013. Cam-
paign extraction from social media. ACM Transactions on Intelligent Systems and
Technology (TIST) 5, 1 (2013), 9.
[23] Fanglin Li, Bin Wu, Liutong Xu, Chuan Shi, and Jing Shi. 2014. A fast distributed
stochastic gradient descent algorithm for matrix factorization. In Proceedings of
the 3rd International Conference on Big Data, Streams and Heterogeneous Source
Mining: Algorithms, Systems, Programming Models and Applications-Volume 36.
JMLR. org, 77–87.
Press.
[24] Darren Lilleker, Dan Jackson, Einar Thorsen, and Anastasia Veneti. 2016. US
Election Analysis 2016: Media, Voters and the Campaign. (2016).
[25] Chao Liu, Hung-chih Yang, Jinliang Fan, Li-Wei He, and Yi-Min Wang. 2010.
Distributed nonnegative matrix factorization for web-scale dyadic data analysis
on mapreduce. In Proceedings of the 19th international conference on World wide
web. ACM, 681–690.
[26] Alan Mislove, Bimal Viswanath, Krishna P Gummadi, and Peter Druschel. 2010.
You are who you know: inferring user profiles in online social networks. In
Proceedings of the third ACM international conference on Web search and data
mining. ACM, 251–260.
[27] Michael Moran. 2015. Politics and Governance in the UK. Palgrave Macmillan.
[28] Arjun Mukherjee and Bing Liu. 2012. Aspect extraction through semi-supervised
modeling. In Proceedings of the 50th Annual Meeting of the Association for Com-
putational Linguistics: Long Papers-Volume 1. Association for Computational
Linguistics, 339–348.
[29] Nagarajan Natarajan, Prithviraj Sen, and Vineet Chaoji. 2013. Community de-
tection in content-sharing social networks. In Proceedings of the 2013 IEEE/ACM
International Conference on Advances in Social Networks Analysis and Mining.
ACM, 82–89.
[30] Mert Ozer, Nyunsu Kim, and Hasan Davulcu. 2016. Community Detection in
Political Twitter Networks using Nonnegative Matrix Factorization Methods.
IEEE/ACM International Conference on Advances in Social Networks Analysis and
Mining (2016).
[31] Symeon Papadopoulos, Yiannis Kompatsiaris, Athena Vakali, and Ploutarchos
Spyridonos. 2012. Community detection in social media. Data Mining and
Knowledge Discovery 24, 3 (2012), 515–554.
[32] Nishith Pathak, Colin DeLong, Arindam Banerjee, and Kendrick Erickson. 2008.
Social topic models for community extraction. In Proceedings of the 2nd SNA-KDD
Workshop.
[33] Yulong Pei, Nilanjan Chakraborty, and Katia Sycara. 2015. Nonnegative matrix
tri-factorization with graph regularization for community detection in social net-
works. In Proceedings of the 24th International Conference on Artificial Intelligence.
AAAI Press, 2083–2089.
[34] Maria Pontiki, Dimitris Galanis, Haris Papageorgiou, Ion Androutsopoulos,
Suresh Manandhar, AL-Smadi Mohammad, Mahmoud Al-Ayyoub, Yanyan Zhao,
Bing Qin, Orphée De Clercq, et al. 2016. SemEval-2016 task 5: Aspect based
sentiment analysis. In Proceedings of the 10th international workshop on semantic
evaluation (SemEval-2016). 19–30.
[35] Guang Qiu, Bing Liu, Jiajun Bu, and Chun Chen. 2011. Opinion word expansion
and target extraction through double propagation. Computational linguistics 37,
1 (2011), 9–27.
[36] Martin Rosvall and Carl T Bergstrom. 2008. Maps of random walks on complex
networks reveal community structure. Proceedings of the National Academy of
Sciences 105, 4 (2008), 1118–1123.
[37] Mrinmaya Sachan, Danish Contractor, Tanveer A Faruquie, and L Venkata Sub-
ramaniam. 2012. Using content and interactions for discovering communities in
social networks. In Proceedings of the 21st international conference on World Wide
Web. ACM, 331–340.
[38] Shaghayegh Sahebi and William W Cohen. 2011. Community-based recommen-
dations: a solution to the cold start problem. In Workshop on recommender systems
and the social web, RSWEB.
[39] Fanhua Shang, LC Jiao, and Fei Wang. 2012. Graph dual regularization non-
negative matrix factorization for co-clustering. Pattern Recognition 45, 6 (2012),
2237–2250.
[40] Henri Tajfel. 2010. Social identity and intergroup relations. Cambridge University
[41] Duyu Tang, Bing Qin, and Ting Liu. 2016. Aspect level sentiment classification
with deep memory network. arXiv preprint arXiv:1605.08900 (2016).
[42] Mike Thelwall, Kevan Buckley, Georgios Paltoglou, Di Cai, and Arvid Kappas.
2010. Sentiment strength detection in short informal text. Journal of the American
Society for Information Science and Technology 61, 12 (2010), 2544–2558.
[43] John C Turner, Michael A Hogg, Penelope J Oakes, Stephen D Reicher, and
Margaret S Wetherell. 1987. Rediscovering the social group: A self-categorization
theory. Basil Blackwell.
[44] Kai Yu, Shipeng Yu, and Volker Tresp. 2005. Soft clustering on graphs. In Advances
in neural information processing systems. 1553–1560.
[45] Lei Zhang and Bing Liu. 2014. Aspect and entity extraction for opinion mining.
In Data mining and knowledge discovery for big data. Springer, 1–40.
[46] Ding Zhou, Eren Manavoglu, Jia Li, C Lee Giles, and Hongyuan Zha. 2006. Prob-
abilistic models for discovering e-communities. In Proceedings of the 15th inter-
national conference on World Wide Web. ACM, 173–182.
[47] Wenjun Zhou, Hongxia Jin, and Yan Liu. 2012. Community discovery and profiling
with social messages. In Proceedings of the 18th ACM SIGKDD international
conference on Knowledge discovery and data mining. ACM, 388–396.
Press.
|
1607.07243 | 1 | 1607 | 2016-07-25T12:38:22 | Self-presentation and emotional contagion on Facebook: new experimental measures of profiles' emotional coherence | [
"cs.SI",
"physics.soc-ph"
] | Social Networks allow users to self-present by sharing personal contents with others which may add comments. Recent studies highlighted how the emotions expressed in a post affect others' posts, eliciting a congruent emotion. So far, no studies have yet investigated the emotional coherence between wall posts and its comments. This research evaluated posts and comments mood of Facebook profiles, analyzing their linguistic features, and a measure to assess an excessive self-presentation was introduced. Two new experimental measures were built, describing the emotional loading (positive and negative) of posts and comments, and the mood correspondence between them was evaluated. The profiles "empathy", the mood coherence between post and comments, was used to investigate the relation between an excessive self-presentation and the emotional coherence of a profile. Participants publish a higher average number of posts with positive mood. To publish an emotional post corresponds to get more likes, comments and receive a coherent mood of comments, confirming the emotional contagion effect reported in literature. Finally, the more empathetic profiles are characterized by an excessive self-presentation, having more posts, and receiving more comments and likes. To publish emotional contents appears to be functional to receive more comments and likes, fulfilling needs of attention-seeking. | cs.SI | cs | Self-presentation and emotional contagion on Facebook: new experimental measures
of profiles' emotional coherence
Andrea Guazzini,1, ∗ Elisa Guidi,2, † Cristina Cecchini,2, ‡ Monica
Milani,2, § Daniele Vilone,3, 4, ¶ and Patrizia Meringolo1, ∗∗
1Department of Education and Psychology, and Center for the Study of Complex Dynamics (CSDC),
University of Florence, Via di San Salvi 12, 50135, Florence, Italy
2Department of Information Engineering, via S. Marta 3, I-50193, Florence (Italy)
3LABSS (Laboratory of Agent Based Social Simulation), Institute of Cognitive Science and Technology,
National Research Council (CNR), Via Palestro 32, 00185 Rome, Italy
4Grupo Interdisciplinar de Sistemas Complejos (GISC), Departamento de Matem´aticas,
Universidad Carlos III de Madrid, 28911 Legan´es (Spain)
6
1
0
2
l
u
J
5
2
]
I
S
.
s
c
[
1
v
3
4
2
7
0
.
7
0
6
1
:
v
i
X
r
a
ABSTRACT
Social Networks allow users to self-present by sharing personal contents with others which may add comments.
Recent studies highlighted how the emotions expressed in a post affect others' posts, eliciting a congruent emotion.
So far, no studies have yet investigated the emotional coherence between wall posts and its comments. This research
evaluated posts and comments mood of Facebook profiles, analyzing their linguistic features, and a measure to
assess an excessive self-presentation was introduced. Two new experimental measures were built, describing the
emotional loading (positive and negative) of posts and comments, and the mood correspondence between them was
evaluated. The profiles "empathy", the mood coherence between post and comments, was used to investigate the
relation between an excessive self-presentation and the emotional coherence of a profile. Participants publish a higher
average number of posts with positive mood. To publish an emotional post corresponds to get more likes, comments
and receive a coherent mood of comments, confirming the emotional contagion effect reported in literature. Finally,
the more empathetic profiles are characterized by an excessive self-presentation, having more posts, and receiving
more comments and likes. To publish emotional contents appears to be functional to receive more comments and
likes, fulfilling needs of attention-seeking.
I.
INTRODUCTION
The rise of World Wide Web offered new tools to spread news and information, managing any time. The direct
outcome was to increase interactions among different Internet users [1], preparing a suitable ground for the birth of
Social Networks (SNSs). SNSs are an interesting growing field [2, 3] for Psychology, Computer Science and Sociology,
because their popularity allows researchers to open up new opportunities for reliable affective assessment [4, 5]. At
present Facebook is one of most used SNSs [6], and in last decades it has developed an innovative way to create and
increase social relationships of people of all ages [7, 8]. Particularly, these technologies let users sharing personal
contents on their profile, allowing others to read and add comments [9]. This is basic for online self-presentation,
where users need to find effective strategies to fully express themselves with different audiences [10–12]. Facebook
users easily change their approach and communication with others [13], which may indicate they apply different
strategies depending on kind of audiences and type of published message (i.e., public wall posts, wall posts updates,
private messages). Choosing what to discover and which emotion may produce positive or negative reactions from
audience [7]. Some studies [14, 15] state users seek two main goals through self-presentation: impression construction,
to create a desired impression, and impression motivation, to manage others' opinion of the self. This is complicated
on SNSs, where audience is various and rather difficult to select [10]. Then, the best strategy appears to be to
show only acceptable information for all targets [16], while superficial messages appear not to be suitable in creating
positive impressions [7]. However, such information represents a self-disclosure of personal issues, such as attitudes,
personal hobbies, experiences and emotions. A recent research [7] investigated how the use of emotions, both positive
∗ [email protected]
† [email protected]
‡ [email protected]
§ [email protected]
¶ [email protected]
∗∗ [email protected]
2
and negative, affected the linguistic style for self-presentation on Facebook. Findings confirmed different adoptions of
language style depending on the audience, and highlighted a major use of positive emotions, as opposed to negative
emotions, in status updates. Therefore, emotions appear to be central not only in in-person interactions, but also in
online communication [17, 18], where they can be spread and reach other people, who may be affected in a sort of
"empathetic contagion" [19]. Indeed, one relevant question was whether this contagion would be effective in the cyber-
world. Research exploring online empathy has especially examined support communities or "thematic" forums (e.g.,
sports) [20, 21], or Instant Messaging [22], analyzing empathetic responses to the posts. In these studies, empathy was
defined as the capacity to both feel and understand others' feelings and thoughts [23], which allow to predict others'
intentions and experience the same emotion [24, 25]. Empathy is basic to build appropriate social relationships [26] and
is a predictor of pro-social behaviors [27, 28] and perspective taking abilities [29]. Studies on online empathy revealed
that online support in thematic communities consisted of providing practical information and fostering emotional
attachment [30]. Participating members build social relationships and are more likely to write empathetic messages
than new members [21]. Moreover, [22] found that an empathetic communication had a significant influence on
online interpersonal trust, where more empathetic people were more trusted by others. Moreover, a study enhancing
gender differences in virtual communities underlined how females published more empathetic messages than males [20].
Facial and body expressions can be helpful to empathy in understanding one's behavior [31], but online interactions
are missing the use of non-verbal communication, complicating the empathetic answers [32]. By contrast, the virtual
environments are feasible to precisely detect and record every gesture, voice feature, non verbal behavior, avoiding
difficult data mining/coding of empathy and emotional contagion in real settings. We recently tested such aspects,
confirming that the mood of a short message, such as those observed within online social networks, forums, and
web-based chats, can be detected and be informative about the dynamics of the system and the topological position
of the writer [33]. The concept of "virtual empathy (i.e., the existence of an empathy capacity for humans into virtual
environments) could state or predict a measurable effect of the mood polarization of a stimulus (e.g., messages, photos)
on the inner psychological state of the observer. As a consequence, some effects on the subsequent production of the
observer should be detectable, as well as a possible coupling between the behavior of the observer and the post maker.
Regarding this, some studies began to explore the computer-mediated communication [34] and the spread of emotions
[35, 36]. Results showed that inducing negative emotions elicited negative messages in participants, confirming that
the emotional contagion on virtual environments is not only detectable, but clearly evident even without face-to-face
interactions. Recently, emotional dissemination was analyzed on Facebook, examining posts and status updates.
Findings showed emotions expression conditioned others' emotional posts, eliciting a congruent emotional contagion:
that is, people having friends who published positive posts were more likely to publish positive messages as well.
Then, emotions transmission does not occur only after in-person interactions, but also through computer-mediated
communication [37, 38]. Despite such interesting findings, no studies have yet investigated emotional coherence
between wall posts and received comments. When a user publishes a status, are comments he receives emotionally
congruent with that status? The present research purposes to explore this aspect by means of the development of
two experimental metrics assessing the emotional loading and the emotional coherence.
II. EXCESSIVE SELF-PRESENTATION, NARCISSISTIC TRAIT AND EMOTIONAL MOOD OF
POSTS
Self presentation on SNSs has been largely explored in literature, and researchers also investigated the origins of
an excessive online self-presentation, wondering whether a frequent posting might be a signal of a narcissistic trait
[39–42]. Literature described narcisissm [43–45] as a personality trait and not a clinical disorder, and as the tendency
to an inflated and positive self-concept, with exhibitionism and attention-seeking behaviors. SNSs are suitable to
achieve narcissistic goals, and they may also incentive to self-promote and to engage superficial behaviors [46]. [47]
confirmed this, finding Facebook users to be more narcissistic than non-users. Other studies referred that narcissistic
and excessive self-presentation strategies on SNSs were related to publish more self-promotional information [48]
and to have more friends [39, 46], besides using more swear and anger words [40], sexual words [49] and singular
first-person pronouns [50].
It appears that narcissistic people engage in more self-promotional and self-disclosed
behaviors, as frequent status updates, to seek for others' attention [51]. A study investigated how personality traits
influenced self-presentation, self-disclosure and linguistic and emotional content of messages on Facebook [52]. Results
displayed narcissists disclose more personal information and self-present more than others, revealing a tendency to
an excessive self-presentation. Despite a frequent negative relation between narcissism and empathy on SNSs and the
widespread knowledge about SNSs promoting narcissism [46], another research revealed that participating to SNSs
has an association with empathy, too [53]. To investigate the presence of emotional loading in SNSs narcissistic
posts, and the association between online narcissism and empathy, is nowadays of particular interest because of the
recent findings about the negative correlation between empathetic behaviors and the narcissistic style [54]. Moreover,
more information about linguistic strategies in the narcissistic trait and in the excessive self-presentation could be
provided. Unfortunately, few studies analyzed these aspects. Given that some studies explored linguistic contents in
the narcissistic trait and excessive self-presentation on Facebook [49, 50], revealing a peculiar use of communication
strategies for attention-seeking goals [55], a second purpose of the present study was to analyze all posts of 50 Facebook
profiles in one year through the linguistic software LIWC [56], and to explore content emotional features of posts and
comments in excessive self-presentation profiles. Particularly, we meant to identify an "empathetic coherence or
incoherence" between posts and received comments in different profiles.
3
III. AIMS OF OUR STUDY
The main challenge of our study concerns about the dynamics (e.g., spreading and sensitiveness) of the emotional
coherence on Facebook among Italian adolescents. We focused on adolescents' sample because recent studies under-
lined how most of members of SNSs are young people [57]. The first property required to the measure is the ability
to detect the emotional content (i.e., sentiment) of a web-based post (e.g., message, photo, news, etc). Given the
literature about the "Sentiment Analysis [58–60], several tools and approaches can be adopted to fulfill this first
challenge. For this reason, our study analyzed 50 Facebook users' profiles, coding each published post or activity
during a year (table I). In our study we first define for all the Facebook profile an emotional loading for each post and
comment by means of the development of two operative metrics (i.e., negative and positive mood indicators). Once
the emotional loading of each post and comment was evaluated, the emotional coherence of each profile has been
defined as the normalized correspondence between each post mood, and its average comments moods, assessed by the
Pearson χ2 statistics. As a consequence, the empathy level of a profile is defined as the degree of agreement between
the moods of the posts, and the moods of the comments received by each post. Finally, the average emotional loading
and coherence of profiles have been related with the gender, with the variables describing the social network usage,
and with the self-presentation style of individuals.
IV. METHODS
A. Participants and procedure
Participants were 50 students (50% females) recruited from a Tuscan high school. They ranged in age from 15
to 19 (M=16.95, SD=1.08). All participants had a Facebook account and were involved as volunteers. The data
collection carried out during the ARCA project". The agreement of the high school to participate was obtained from
the principal. The professors of the classes involved, and a research assistant introduced the aims of the survey, and
the confidentiality issues to the students. Before the students' participation in the research, parental consent and
adolescent assent was obtained. To analyze one year of the Facebook usage on participants' profiles, a Facebook
account was created using the recruitment coordinator's contact information, with a research logo as the profile
picture. Before befriending a participant's profile, we sent a private message inviting him/her to participate in the
research. Participants were explicitly notified that the researchers would have access to their Facebook profiles for
one year and we communicated that the data would be stored anonymously. All the 50 students gave permission to
save their Facebook pages to be used in the present research.
B. Measures
a. Facebook Page Coding (observation grid) From each Facebook profile, some relevant information were ex-
tracted, both concerning the directly available data (i.e., friends, followed people, visited places, famous quotes, pages
with like), and some objective criteria calculated and coded by the year-long analysis of each profile (i.e. complete
activity, wall posts, profile picture edit, personal photos, photos, videos, likes, activities with likes, comments, posts
with comments, wall posts length, wall posts average length). We analyzed one year of participants' activity on
Facebook, considering a total of 32368 activities(28878 of which were wall posts), and 62083 comments.
b. Linguistic Analysis
In order to assess the posts emotional loading, we used the Linguistic Inquiry Word Count
program [56]. LIWC analyzes transcripts on a word-by-word basis and compares words with a dictionary related
to 70 linguistic, affective, cognitive and social processes. LIWCs psychometric properties and external validity have
been established in a large number of studies, and has been used to examine the relationship between language and
emotion, personality, and deception, among others [61]. In this study, all the sampled profiles have been considered
TABLE I: Facebook Profile Features. The descriptive statistics related to the sample's Facebook profiles features are
reported
4
Facebook Variable M SD Min Max
3085 1089 642
0
1
1
30
29
22
0
1
15
1
4970
46
644
333
4762
2609
2399
11
124
99
781
529
491
20
43
194
93
12
64
94
547
647
578
23
49
218
62
Friends
Followed people
Visited places
Famous quotes
Pages with likes
Complete activity
Wall posts
Profile picture edit
Personal photos
Photos
Videos
Likes
641
Activities with like
Wall post with comments 263
1242
Comments
Wall posts length
46814 42021 2010 193966
Wall posts average length
12646 13280 465 66815
2537
746
4494
81
30
31
183
81
206
908
562
520
179
926
29
21
121
as separated elements, and the LIWC analysis concerned the entire production (i.e., the posts) as a single narration
(table II).
TABLE II: In table are reported the LIWC categories discriminating effectively the posts/comments mood. In
particular the significant Fischer F, and the associated sum of squares are reported and connected with the specific
mood assessed by them. The signs between brackets after the mood polarization indicate the sign assumed by the
terms in the operative models.
Variable
Sum of Squares F(p. < 0.01) Condition
Negative emotions
Swear word
Positive feeling
Anger word
Positive Emotion
Sadness word
Numerals
Third-Person plural verb
Family
Question marks
4.009
5.356
2.002
6.000
2.839
4.562
0.939
3.441
5.631
3.374
21,063
12,418
12,309
11,355
10,169
9,834
8,376
6,214
5,937
5,587
Negative [+]
Negative [+]
Positive [+]
Negative [+]
Positive [+]
Negative [+]
Negative [-]
Negative [+]
Positive [+]
Positive [+]
c. Excessive Self-presentation Model Since excessive online self-presentation could be an indicator of narcissism
[41, 42], we used a previously developed model, labeled Excessive online self-presentation model, to directly assess
this tendency, through the linguistic analysis of public contents of personal pages. This measure was originated by an
observation grid coding the Facebook activities of our participants (e.g. wall posts, comments, photos, etc.), and the
analysis of the language style obtained through LIWC analysis of their Facebook published posts. For more details
please refer to [62]. Such a measure has been defined investigating the linguistic features of the individuals' Facebook
wall posts, merging recent studies validating online measurements of the narcissistic trait [39, 40, 46, 48–50], with
5
the theoretical models coming from classical literature. The final model presented in [62] is composed by the two
LIWC-based parameters (i.e. Word Count and Sexual ) provided by the linear regression analysis.
d. Creating metrics to measure emotional load and emotional coherence The assessment of Profiles Emotional
Coherence (i.e., Facebook Empathy Profile) includes a Sentiment Analysis of the wall posts and the comments
to identify their "mood".
In particular, the Facebook Empathy profile level is not the user's level, but it is the
commentators' average level, in other words the comments accord level with a particular wall post. It was possible
to define an Emotional Load of the wall post and its comments and, subsequently, a Profiles Emotional Coherence
defined as the degree of correspondence normalized between the wall posts mood and its comments. The Sentiment
Analysis was conducted starting from the LIWC software analysis. Based on the LIWC categories we defined two
metrics to estimate the emotional content of posts and comments: the Positive Mood Indicator and the Negative
Mood Indicator.
C. Data Analysis
e. Emotional coherence and loading indicators development Step 1: The wall posts that did not receive any
comments and those that were photos, videos, music, or famous quotes were excluded from the original sample
(14644). Four judges examined a random sample of 500 wall posts extracted from the new set of 14234. The judges
selected 144 wall posts, in order to achieve 48 wall posts defined by them as "Negative", 48 as "Positive" and 48 as
"Neutral", comparing their emotional content. These subgroups of wall posts were used as a criterion to develop the
model for the sentiment analysis. Step 2: It was carried out an analysis of variance (ANOVA) to identify which LIWC
variables showed a discerning capacity in identifying the condition of "Negative Mood Indicator", "Positive Mood
Indicator", or "Neutral Mood Indicator". We chose the LIWC categories that reported a significant F Fischer's score.
Moreover, to assess the main effects and to evaluate which condition the LIWC variable was able to discriminate, we
adopted the Scheff´e test (Scheff´e, 1999), and the most discriminating variables were organized and ordered by F-test
score (Table 1). A greater value of F-score corresponded to a greater ability to discriminate an emotional condition
with respect to the other two (e.g., positive mood against negative and neutral mood). Step 3: After identifying the
LIWC most discriminating categories, we have also calculated the Z-scores (i.e., associated to the F values) of such
categories for each condition "Negative Mood Indicator", "Positive Mood Indicator", or "Neutral Mood Indicator".
After sorting the Z scores (figure 1), the LIWC variables that reported higher average values on a specific mood and
lower values on the other two were selected as the "best" predictors. Step 4: Based on the LIWC Best predictors,
we have defined three metrics to estimate the emotional content of posts and comments (Negative Mood Indicator,
Positive Mood Indicator and Neutral Mood Indicator). After metrics verification, we decided to not consider the
posts with neutral mood, despite the clarity construct emerging from the LIWC semantic and syntactic categories
analysis. This decision was motivated by the huge variability exhibited by neutral mood wall posts (as opposed to
positive and negative mood wall posts), and thus to avoid the risk of excessive and impossible generalization of the
neutrality construct.
FIG. 1: The z-scores associated with the LIWC variables significantly related with the operative criteria, and
concerning the mood polarization are reported.
6
f.
Inferential analysis The statistical analysis comprised five different steps.
In the first one, the Student t
statistic has been used to compare the sub-samples of posts categorized as positive, with those with a negative
emotional loading. The differences between the two sub-samples have been investigated on the observable quantities
defined as order parameters of our study (i.e., gender, Facebook variables, Positive and Negative Mood Indicators of
comments). To balance the sub-samples, a bootstrap sampling has been adopted and a final sample of 3392 units
has been analyzed. The same strategy has been used to compare the posts with an emotional loading different from
0 (i.e., positive plus negative posts), and those with no emotional loading (i.e., neutral posts). In this case the two
sub-samples resulting from the bootstrap method were composed by approximately 6380 units. To estimate the
Facebook Empathy profile level, we used the Pearson chi square test, assessing the agreement degree between the
emotional loading of each post and its comments. To evaluate the relation between the empathy and the excessive
self-presentation, we simply computed the Pearson correlation between the scores reported to the Chi square test, and
all the observable quantities of interest. Finally, to compare the participants with an High empathy profile with those
with a Low empathy profile, the sample has been split in two, depending on the median reported to the Chi Square
test (M edian = 0.74). Subsequently, another independent sample Student t test has been calculated with respect to
all the independent variables.
V. RESULTS
A. Creation of two metrics to weight the emotional load of a message
The analysis of variance (ANOVA) on the 144 posts selected by judges (i.e., 48 negative, 48 positive and 48
neutral) was focused on identifying which LIWC variables showed a discerning capacity in the three conditions
and to calculate two metrics (Positive Mood Indicator and Negative Mood Indicator). A greater F Fischer's score
corresponds a greater capacity to discriminate one of the emotional conditions with respect to the other. Table 1
shows the LIWC categories that have obtained a significant F Fischer, sorted in descending order in respect to its
score. Some significant categories, such as body, and comma, were not able to discriminate the emotional content
of the posts (i.e., test Scheff´e not significant or negligible effect) and therefore they were not used to build the two
metrics.
Furthermore, we have calculated the Z-scores for the LIWC variables that were able to discriminate the post
emotional content, i.e. to produce two different scores for each post respectively indicating the positive and negative
"load" of the message. The resulting graph (figure 1) shows that there is a clear inverse correspondence between the
negative mood variables and those of positive mood. As shown in equation 1, regarding Positive Mood Indicator, the
LIWC best predictors were the variables Positive Feeling (PF), Positive Emotion (PE), Family (Fa), and Question
Marks (QM), while concerning Negative Mood Indicator (eq. 2) the LIWC best predictors were the categories Negative
Emotion (NE), Swear Word (SW), Anger Word (AW), Sadness Word (SaW), Numerals (Nu), and Third-Person Plural
Verb (TP).
P M N
i = N E + SW + AW + SaW − N u + T P
P M P
i = P F + P E + F a + QM
(1)
(2)
where, P M P and P M N respectively indicate the positive and negative mood score for the post i.
The several variables of the models were added or subtracted to the total scores if Z-score sign was positive or
negative (e.g., the LIWC variable "Negative Emotion" appeared as characterized by a Z-score of 1.63 for what concerns
the negative load, and a Z-score of −0.69 for the positive load; while on the other hand, the variable "Numerals"
obtains a negative load of −0.77, and a positive load of 0.23). Therefore, in the former case the Negative Emotion
variable has been adopted as a positive term to add for the Negative Mood Indicator (i.e., its presence increases the
probability to have a post with a negative mood), while the latter Numerals variable has been adopted as negative
term to subtract in the same model, because its presence decreases the probability to have a negative post.
The descriptive statistics related to the Facebook profiles' features are reported in table I. Regarding the 14234
posts, it has been calculated the descriptive statistics relating to the variables number of likes, number of comments
and scores of the negative and positive mood variables. Each post had a mean score of 18.15 (SD = 23.154) for
number of likes and 2.06 (SD = 4.078) for number of comments. The average score for the Negative Mood Indicator
was 4.915 (SD = 15.939) and for the Positive Mood Indicator was 5.776 (SD = 12.689). Concerning the comments,
it has been calculated the average score of the negative (M = .877, SD = 5.204) and positive mood indicators, too
(M = 3.046, SD = 12.62). The frequency distributions of the mood indicator variables do not appear normal (i.e.,
skewness was large). This is due to the abundance of posts and comments with a zero score. These posts (6380)
and comments (9940) have been removed from the analysis, since they are not emotionally determined. Thus, about
the 14234 posts, those deemed valid were 7854 (55.2%) of which 4462 identified as positive and 3392 negative, while
comments were deemed valid 4294 (30.2%), of which 3147 positive and 1147 negative.
7
B. Descriptive analysis
A preliminary analysis tested that no gender differences are detectable for what concerns all the order parameters
such as number of likes, number of comments, negative comments scores and positive comments scores. The summary
of the inferential analysis are reported in table III. First, it was carried out a balance through bootstrap method to
conduct a Student's t-test in which the sub-sample of positive posts has been compared to that of the negative posts
with respect to the variables mentioned before. Two groups were obtained characterized by a same high number
of units (3392). From the analysis carried out, there was a unique significant relationship between mood posts
and negative comments. The negative posts have a significantly higher probability of receiving a negative comment
(t = 3.523, p. < .01). Subsequently, another Student's t-test was performed to compare posts expressing emotional
content (negative or positive) and posts obtaining a zero score for the positive and negative mood variables, in other
words the 6380 posts that had previously been removed from the analysis. The sub-sample containing emotional
posts (6380) was obtained using the bootstrap method. The analysis showed that the emotional posts received
significantly more "Likes" (t = −6.667, p. < .01), more comments (t = −2.8, p. < .01), more negative comments
(t = −2.82, p. < .01), compared to neutral posts.
TABLE III: Differences between Negative VS Positive posts, and Neutral Vs Emotional posts, with respect to the
number of likes, number of comments, negative comment scores, positive comment scores.. The table reports the
significant Student t values describing the differences between groups. All the statistics reported in table are
significant at a level of p. < 0.01(∗∗).
Variable
t
Group
M SD
Number of likes
1.748
Number of Comments
-0.021
Negative comments scores -3.523**
Positive comments scores
-1.007
Negative Posts 21.30 23.02
Positive Posts 20.31 23.42
2.09 4.12
Negative Posts
Positive Posts
2.09 3.70
1.25 5.79
Negative Posts
0.79 5.10
Positive Posts
Negative Posts
3.05 10.39
3.78 15.79
Positive Posts
Number of likes
6.667**
Number of Comments
-2.800**
Negative comment scores
-2.820**
Positive comment scores
-1.716
Neutral Posts
Neutral Posts
15.37 23.00
Emotional Posts 17.95 20.39
1.93 4.16
Emotional Posts 2.13 3.96
0.76 4.96
Emotional Posts 1.03 5.51
2.87 12.52
Emotional Posts 3.27 13.63
Neutral Posts
Neutral Posts
8
C. Tendency to the emotional coherence between post and comments
After classifying all the wall posts and comments in relation to the mood, we calculated the Chi-square statistic,
both for the entire sample and for each subject separately, to assess the degree of consistency between the post mood
and its comments mood. We measured both a general level of empathy profiles, and a particular level of empathy for
each individual profile. The general Chi-square shows a significant relationship between post mood and comments
mood (Chi2 = 26.44, p. < .01). There is a tendency to mainly respond in a positive way to positive than negative
posts. Nevertheless, the two posts categories elicit the same absolute number of negative comments. Thus, positive
posts show lesser percentage of negative comments than negative posts because they are greater.
g. Classification of the subjects on the basis of the Emotional Coherence of their Facebook profile: empathic de-
tector We classified the individuals' profiles to discriminate those "more" empathetic, that is profiles for which the
relationship between comments and posts appeared to be stronger (i.e. Chi-square greater). Each profile was ana-
lyzed separately from the others and therefore it represented a sub-sample, and we considered all wall posts, and the
associated comments. We calculated 50 values for the Chi2 statistic. The participants' profiles were assessed through
the significant statistical of the parameter Chi2. It was possible to identify the most empathetic profiles (n = 8),
i.e. Facebook profiles for which a statistically significant relationship between post and comment mood was found
(Chi2 > or = 4). These participants were defined as subjects with highly empathetic profile. However, other profiles
can be characterized also in terms of "intensity of the degree of empathy profile", on the basis of their Chi2 absolute
value associated with.
D. Relation between Excessive Self-presentation and Empathy profile
To evaluate the relationship between the Excessive Self-presentation style and the Empathy profile, first of all, a
correlation analysis was carried out among the parameters used to estimate the empathy profile of each participant
(i.e. Chi2 value), with the Facebook variables, LIWC categories and Excessive Self-Presentation Model. The most
significant results are the following. Regarding the Facebook variables, the participants with more empathetic profiles
publish a greater number of famous quotes (r = .344, p. < .05), write longer average posts (r = .288, p. < .05)
and receive a greater number of comments (r = .307, p. < .05). About the LIWC categories, the participants with
more empathetic profiles use more words relate to the physical (r = .394, p. < .01), the body (r = .352, p. < .05),
the sensorial processes (r = .305, p. < .05), more words associated with the possibility (r = .309, p. < .05) and
more commas (r = .304, p. < .05). Finally, regarding the Excessive Self-presentation Model the participants with an
excessive self-presentation elicit a higher number of empathetic comments by their Facebook friends compare to the
other subjects (r = .273, p. < .05). Subsequently, a sample discretization was carried out based on the Empathetic
detector representing the degree of coherence on the emotional profile analyzed (i.e. Chi2 value associated with each
Facebook Profile). We defined two sub-groups respectively called "Little empathetic Profiles" and "High Empathetic
Profiles". The first group was composed by the Facebook Profiles that reported a lower Chi2 score than the median
of the entire sample (median = .74) while the second group was composed by Facebook profiles with higher scores.
In table 4, the significant statistical tests describing the differences between the little and high empathetic profiles
in relation to the followed variables are reported (e.g. Facebook variables, LIWC categories and the Excessive Self-
Presentation Model).
Student's t-test was conducted. About the Facebook variables, the participants with more empathetic profiles
publish longer posts, more comments, more posts with comments, more personal photos, more posts, more average long
posts, more complete activity, more activities with like, and more famous quotes. Concerning the LIWC categories,
the participants with more empathetic profiles use more singular second person verbs, more words, more words related
to physical, sensorial processes, possibility, sex, and money. These subjects utilize more present tense, singular first
person pronouns, commas, conditional sentences, and less words with more than six letters. About the Excessive
Self-presentation Model, the participants with more empathetic profiles report a higher score on our metric. (table
IV)
profile (t. = −3.324, p < .01).
Moreover, the gender shows a significant effect, with the females appear as characterized by a more empathetic
VI. DISCUSSION AND CONCLUSIONS
Confirming the literature [7, 18], our results show that participants publish a higher average number of posts with
positive emotional loading, compared to an average number of posts with negative emotional loading. Furthermore, it
is confirmed that to publish negative emotional posts increases the likelihood of receiving negative comments [35, 36].
TABLE IV: Differences between High and Low Empathetic Profiles. The table reports the significant Student t
values describing the differences between users with high or low empathetic Facebook profiles. All the statistics
reported in table are significant at a level of p. < 0.01 (**) or p. < 0.05 (*). The values regarding the LIWC
variables are frequently represented by percentages.
9
Variable
t
Group M SD
Wall post length
Comments
-3.187**
-3.094**
Wall posts with comments
-2.953**
Personal photos
Wall posts
-2.885**
-2.809**
Wall post average length
-2.618**
Complete activity
Activities with like
Famous quotes
-2.572*
-2.570*
-2.217*
Singular second person verb
-3.514**
Word Count
Physical
Sensorial processes
Possibility
Sexual
Present tense
-3.301**
-3.082**
-2.954**
-2.776**
-2.628*
-2.254*
Word with more than six letters
2.214*
Comma
-2.212*
Singular first person pronoun
-2.146*
Conditional
Money
-2.092*
-2.049*
Excessive Self-presentation Model -3.770**
Low 30109 29312
High 64910 46591
Low
882
518
High
1630 1109
Low
119
196
High
206
335
Low
33
33
High
66
47
Low
293
402
High
589
767
Low
24
71
High
92
32
Low
352
472
High
623
837
Low
348
468
High
827
613
Low
80
65
High
110
125
Low
0,63
1,42
High
2,02
0,57
Low 5138 5002
High 11297 7966
0,48
Low
High
0,35
0,38
Low
0,17
High
0,49
Low
High
0,46
0,15
Low
0,14
High
Low
1,59
High
0,90
Low 20,95 2,53
19,48 2,11
High
Low
3,29
1,50
1,54
4,20
High
0,64
1,88
Low
0,80
2,32
High
Low
0,58
0,28
0,23
0,74
High
0,06
0,09
Low
High
0,12
0,06
Low -0,39 0,61
0,89
High
1,22
1,59
1,12
1,37
1,54
1,91
0,29
0,40
7,98
8,81
0,42
10
The research also highlights that to publish a post with emotional charge, either positive or negative, corresponds to
get more likes, and comments, assuming a precise linguistic strategy for online self-presentation [7]. The general Chi-
Square analysis showed a significant relationship between posts and comments mood, in particular there was a greater
tendency to respond in a positive way, rather than negative, to positive posts and vice versa. The results appear to
confirm the possibility of an emotional coherence through an Internet-based communication, stressing how emotional
dissemination does not require face to face interaction, but can occur even during online interactions [37, 38]. To
compare the subjects with an High Empathetic profile with those with a Low empathetic profile, the sample has been
split in two sub-samples, depending on the median reported to the Chi square test (M edian = 0.74). Regarding the
gender effect, previous studies have shown that females post more empathetic comments than males [20]. Our study
partially confirms such results, showing that the females profiles appeared to be more empathetic (i.e., a stronger
emotional coherence between posts and comments mood) than those of males. In the second part of our work we
investigated the relations between the profile empathetic level, with the other factors of interest got into account in
the present study. We found that the more empathetic profiles have a higher activity, receiving a higher number of
likes for each activity. Such profiles are characterized by a greater number of wall posts, that tend to be longer and
to receive more comments. The profiles with a greater empathy shown a greater number of personal photos. The
linguistic and semantic analysis revealed how the more empathetic profiles use a higher number of singular first person
pronouns, verbs in the singular second person, a greater number of words, and particularly more words related to sex
and physical. Finally, the more empathetic profiles are characterized by a more excessive self-presentation style on
SNSs. Such results seem to confirm the literature regarding the relationship between narcissism and excessive self-
presentation on SNSs. Previous studies [46, 51] emphasized how the narcissistic trait is related to an intense activity
on Facebook, such as connecting to many friends and publishing more wall posts and photos. In addition, another
research adopting LIWC [50] found that narcissistic people published more self-promoting and sexy photos, and had
a more aggressive language when singular first person pronouns were less employed. Moreover, [49] pointed out that
narcissistic people used to talk more about sexual topics, while [39] underlined how narcissists may be characterized by
a high degree of personal information disclosure, status and personal photos updating. The main result of our study
indicates how the subjects with an excessive self-presentation style elicit a greater density of empathetic comments.
In general, the individuals reporting a greater score on the Excessive Self-presentation model are those who have
the more empathetic and coherent emotional profiles.
In this way, our study appears to confirm how to publish
emotional contents on own profile can increase the likelihood of receiving more comments and likes, fulfilling a goal of
attention-seeking, as narcissistic people have. Thus, to post on the profile positive and negative emotional contents
might be considered an effective way to satisfy the that need. The study has two limitations: first, the socio-
demographic features of participants who belong to the same municipality. To generalize and verify the two metric
models, an extension toward different countries is needed. Also, an explicit measure to assess narcissism is missing.
This is partially mitigated by using a real-world Facebook dataset and taking into account six validated narcissistic
models to build our Index. Noteworthy, three of such models applied LIWC to evaluate the trait. Moreover, [41]
underlined the appropriateness of non-self-report measures to explore online behaviors because the linguistic analysis
is objective and quantifiable behavioral data, and unlike surveys and questionnaires, it allows a free self-presentation
in the users own words. Moreover, a self-report scale sometimes may encounter several difficulties (i.e. people not
answering all questions, social desirability bias, etc.) [63]. Nevertheless, a confirmatory study is recommended to
verify the construct validity. Unfortunately, few studies investigated the empathetic coherence between posts and
received comments, which precludes to fully compare these results on literature. Further studies are suggested, to
increase knowledge on linguistic strategies of online self-presentation on SNSs. The main scientific contribution of our
work is the processing of new effective measures for the assessment of emotional loading on SNSs posts, using little
public information. Two ICT algorithms ("Positive Mood Indicator" and "Negative Mood Indicator") were applied to
evaluate such a dimension. The LIWC analysis of the posts appears to be particularly recommended and suitable to
increase the reliability of the measures, as [48] suggests. The model, appearing robust even for short messages, could
be used also for other SNSs, such as Twitter, Google+ both characterized by short messages, the typical style of the
new web based virtual environments. Moreover, our study analyzed all posts on 50 profiles for one year, improving
previous studies which attempted to merge posts contents and style [64].
ACKNOWLEDGMENTS
We thank the district of Prato for giving us the opportunity to collect data during the ARCA Project. We thank
the high school "Gramsci-Keynes in Prato for the support and availability for the data collection, as well as for the
promotion of the research activities partially object of the present study.
11
[1] A. Bohn, C. Buchta, K. Hornik, P. Mair, Making friends and communicating on facebook: Implications for the access to
social capital, Social Networks (37 ) (2014) 29–41.
[2] L. Goodings, A. Locke, S. D. Brown, Social networking technology: Place and identity in mediated communities, Journal
of community & applied social psychology 17 (6) (2007) 463–476.
[3] L. Whittaker, A. Gillespie, Social networking sites: Mediating the self and its communities, Journal of Community &
Applied Social Psychology 23 (6) (2013) 492–504.
[4] E. Kanjo, A. Chamberlain, Emotions in context: examining pervasive affective sensing systems, applications, and analyses,
Personal and Ubiquitous Computing 1–16.
[5] E. L. Van den Broek, Ubiquitous emotion-aware computing, Personal and Ubiquitous Computing 17 (1) (2013) 53–67.
[6] S. Day, Self-disclosure on facebook: How much do we really reveal?, Journal of Applied Computing and Information
Technology 17 (1).
[7] N. N. Bazarova, J. G. Taft, Y. H. Choi, D. Cosley, Managing impressions and relationships on facebook: Self-presentational
and relational concerns revealed through the analysis of language style, Journal of Language and Social Psychology (2012)
0261927X12456384.
[8] P. Niland, A. C. Lyons, I. Goodwin, F. Hutton, Friendship work on facebook: Young adults' understandings and practices
of friendship, Journal of Community & Applied Social Psychology 25 (2) (2015) 123–137.
[9] P. B. O'Sullivan, Masspersonal communication: Rethinking the mass interpersonal divide, in: annual meeting of the
International Communication Association, New York, May, 2005.
[10] N. C. Kramer, N. Haferkamp, Online self-presentation: Balancing privacy concerns and impression construction on social
networking sites, in: S. Trepte, L. Reinecke (Eds.), Privacy Online, Springer, 2011, pp. 127–141.
[11] C. Lampe, R. Wash, A. Velasquez, E. Ozkaya, Motivations to participate in online communities, in: Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems, ACM, 2010, pp. 1927–1936.
[12] Z. Papacharissi, A. Mendelson, Toward a new(er) sociability: Uses, gratifications and social capital on facebook, in:
Z. Papacharissi (Ed.), Media perspectives for the 21st century, Routledge, New York, 2011, pp. 211–231.
[13] K. Richardson, S. Hessey, Archiving the self? facebook as biography of social and relational memory, Journal of Information,
Communication and Ethics in Society 7 (1) (2009) 25–38.
[14] M. R. Leary, Self-presentation: Impression management and interpersonal behavior., Brown & Benchmark Publishers,
1995.
[15] M. R. Leary, R. M. Kowalski, Impression management: A literature review and two-component model., Psychological
bulletin 107 (1) (1990) 34.
[16] B. Hogan, The presentation of self in the age of social media: Distinguishing performances and exhibitions online, Bulletin
of Science, Technology & Society (2010) 0270467610385893.
[17] A. Garas, D. Garcia, M. Skowron, F. Schweitzer, Emotional persistence in online chatting communities, Scientific Reports
2.
[18] Y. Hu, J. Zhao, J. Wu, Emoticon-based ambivalent expression: A hidden indicator for unusual behaviors in weibo, arXiv
preprint arXiv:1505.01723.
[19] U. Dimberg, M. Thunberg, Empathy, emotional contagion, and rapid facial reactions to angry and happy facial expressions,
PsyCh Journal 1 (2) (2012) 118–127.
[20] J. Preece, K. Ghozati, Observations and explorations of empathy online, in: R. E. Rice, J. E. Katz (Eds.), The Internet
and Health Communication: Experience and Expectations, Sage Publications Inc., Thousand Oaks, 2001, pp. 237–260.
[21] U. Pfeil, P. Zaphiris, Patterns of empathy in online communication, in: Proceedings of the SIGCHI conference on Human
factors in computing systems, ACM, 2007, pp. 919–928.
[22] J. Feng, J. Lazar, J. Preece, Empathy and online interpersonal trust: A fragile relationship, Behaviour & Information
Technology 23 (2) (2004) 97–106.
[23] E. J. Lawrence, P. Shaw, D. Baker, S. Baron-Cohen, A. S. David, Measuring empathy: reliability and validity of the
empathy quotient, Psychological medicine 34 (05) (2004) 911–920.
[24] S. Baron-Cohen, S. Wheelwright, The empathy quotient: an investigation of adults with asperger syndrome or high
functioning autism, and normal sex differences, Journal of autism and developmental disorders 34 (2) (2004) 163–175.
[25] N. Eisenberg, B. C. Murphy, S. Shepard, The development of empathic accuracy, Empathic accuracy (1997) 73–116.
[26] J. Venkatanathan, E. Karapanos, V. Kostakos, J. Gon¸calves, A network science approach to modelling and predicting
empathy, in: Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference
on, IEEE, 2013, pp. 1395–1400.
[27] N. Eisenberg, Emotion, regulation, and moral development, Annual review of psychology 51 (1) (2000) 665–697.
[28] P. A. Miller, M. A. J. op de Haar, Emotional, cognitive, behavioral, and temperament characteristics of high-empathy
children, Motivation and Emotion 21 (1) (1997) 109–125.
[29] L. C. Findlay, A. Girardi, R. J. Coplan, Links between empathy, social behavior, and social understanding in early
childhood, Early Childhood Research Quarterly 21 (3) (2006) 347–359.
12
[30] K. B. Wright, The communication of social support within an on-line community for older adults: A qualitative analysis
of the seniornet community, Qualitative Research Reports in Communication 1 (2) (2000) 33–43.
[31] C. D. Batson, The altruism question: Toward a social-psychological answer, Psychology Press, 2014.
[32] M. J. Culnan, M. L. Markus, Information technologies., in: L. L. Putnam, K. H. Roberts, L. W. Porter (Eds.), Handbook
of organizational communication: An interdisciplinary perspective, Sage Publications, Inc, 1987, pp. 420–443.
[33] A. Cini, A. Guazzini, Human virtual communities: affinity and communication dynamics, Advanced in complex science
16 (7) (2013) 1350034–1–1350034–24.
[34] A. I. Alberici, P. Milesi, The influence of the internet on the psychosocial predictors of collective action, Journal of
Community & Applied Social Psychology 23 (5) (2013) 373–388.
[35] J. T. Hancock, K. Gee, K. Ciaccio, J. M. H. Lin, I'm sad you're sad: emotional contagion in cmc, in: Proceedings of the
2008 ACM conference on Computer supported cooperative work, ACM, 2008, pp. 295–298.
[36] J. Guillory, J. Spiegel, M. Drislane, B. Weiss, W. Donner, J. Hancock, Upset now?: emotion contagion in distributed
groups, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 2011, pp. 745–748.
[37] A. D. I. Kramer, The spread of emotion via facebook, in: Proceedings of the SIGCHI Conference on Human Factors in
Computing Systems, ACM, 2012, pp. 767–770.
[38] A. D. I. Kramer, J. E. Guillory, J. T. Hancock, Experimental evidence of massive-scale emotional contagion through social
networks, Proceedings of the National Academy of Sciences (2014) 201320040.
[39] S. M. Bergman, M. E. Fearrington, S. W. Davenport, J. Z. Bergman, Millennials, narcissism, and social networking: What
narcissists do on social networking sites and why, Personality and Individual Differences 50 (5) (2011) 706–711.
[40] C. J. Carpenter, Narcissism on facebook: Self-promotional and anti-social behavior, Personality and individual differences
52 (4) (2012) 482–486.
[41] F. grosse Deters, M. R. Mehl, M. Eid, Narcissistic power poster? on the relationship between narcissism and status updating
activity on facebook, Journal of Research in Personality 53 (2014) 165–174.
[42] L. D. Rosen, K. Whaling, S. Rab, L. M. Carrier, N. A. Cheever, Is facebook creating idisorders? the link between clinical
symptoms of psychiatric disorders and technology use, attitudes and anxiety, Computers in Human Behavior 29 (3) (2013)
1243–1254.
[43] W. K. Campbell, J. D. Foster, C. Sedikides, S. J. Spencer, The narcissistic self: Background, an extended agency model,
and ongoing controversies, The self (2007) 115–138.
[44] S. Mehdizadeh, Self-presentation 2.0: Narcissism and self-esteem on facebook, Cyberpsychology, Behavior, and Social
Networking 13 (4) (2010) 357–364.
[45] S. Vazire, L. P. Naumann, P. J. Rentfrow, S. D. Gosling, Portrait of a narcissist: Manifestations of narcissism in physical
appearance, Journal of Research in Personality 42 (6) (2008) 1439–1447.
[46] L. E. Buffardi, W. K. Campbell, Narcissism and social networking web sites, Personality and social psychology bulletin
34 (10) (2008) 1303–1314.
[47] T. Ryan, S. Xenos, Who uses facebook? an investigation into the relationship between the big five, shyness, narcissism,
loneliness, and facebook usage, Computers in Human Behavior 27 (5) (2011) 1658–1664.
[48] E. T. Panek, Y. Nardis, S. Konrath, Mirror or megaphone?: How relationships between narcissism and social networking
site use differ on facebook and twitter, Computers in Human Behavior 29 (5) (2013) 2004–2012.
[49] N. S. Holtzman, S. Vazire, M. R. Mehl, Sounds like a narcissist: Behavioral manifestations of narcissism in everyday life,
Journal of Research in Personality 44 (4) (2010) 478–484.
[50] N. C. DeWall, L. E. Buffardi, I. Bonser, W. Keith Campbell, Narcissism and implicit attention seeking: Evidence from
linguistic analyses of social networking and online presentation, Personality and Individual Differences 51 (1) (2011) 57–62.
[51] E. Y. L. Ong, R. P. Ang, J. C. M. Ho, J. C. Y. Lim, D. H. Goh, C. S. Lee, A. Y. K. Chua, Narcissism, extraversion and
adolescents self-presentation on facebook, Personality and Individual Differences 50 (2) (2011) 180–185.
[52] S. Winter, G. Neubaum, S. C. Eimler, V. Gordon, J. Theil, J. Herrmann, J. Meinert, N. C. Kramer, Another brick in
the facebook wall–how personality traits relate to the content of status updates, Computers in Human Behavior 34 (2014)
194–202.
[53] S. Gountas, J. Gountas, Exploring the association between social media, narcissism, empathy, the desire for fameand
well-being, in: Australian and New Zealand Marketing Academy (ANZMAC) Conference, 2011.
[54] S. H. Konrath, E. H. O'Brien, C. Hsing, Changes in dispositional empathy in american college students over time: A
meta-analysis, Personality and Social Psychology Review.
[55] D. M. Buss, L. M. Chiodo, Narcissistic acts in everyday life, Journal of personality 59 (2) (1991) 179–215.
[56] J. W. Pennebaker, C. K. Chung, M. Ireland, A. Gonzales, R. J. Booth, The development and psychometric properties of
liwc2007, Austin, TX, LIWC. Net.
[57] Z. Jord´an-Conde, B. Mennecke, A. Townsend, Late adolescent identity definition and intimate disclosure on facebook,
Computers in Human Behavior 33 (2014) 356–366.
[58] X. Hu, J. Tang, H. Gao, H. Liu, Unsupervised sentiment analysis with emotional signals, in: Proceedings of the 22nd
international conference on World Wide Web, International World Wide Web Conferences Steering Committee, 2013, pp.
607–618.
[59] X. Hu, L. Tang, J. Tang, H. Liu, Exploiting social relations for sentiment analysis in microblogging, in: Proceedings of the
sixth ACM international conference on Web search and data mining, ACM, 2013, pp. 537–546.
[60] C. Tan, L. Lee, J. Tang, L. Jiang, M. Zhou, P. Li, User-level sentiment analysis incorporating social networks, in: Pro-
ceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 2011, pp.
1397–1405.
[61] Y. R. Tausczik, J. W. Pennebaker, The psychological meaning of words: Liwc and computerized text analysis methods,
Journal of language and social psychology 29 (1) (2010) 24–54.
[62] A. Guazzini, C. Cecchini, E. Guidi, M. Milani, The narcissism map on facebook: one-year of analysis on posting online
(2016).
[63] H. A. Schwartz, J. C. Eichstaedt, M. L. Kern, L. Dziurzynski, S. M. Ramones, M. Agrawal, A. Shah, M. Kosinski,
D. Stillwell, M. E. Seligman, et al., Personality, gender, and age in the language of social media: The open-vocabulary
approach, PloS one 8 (9) (2013) e73791.
[64] C. T. Carr, D. B. Schrok, P. Dauterman, Speech acts within facebook status messages, Journal of Language and Social
Psychology (2012) 0261927X12438535.
13
|
1712.02926 | 1 | 1712 | 2017-12-08T03:15:58 | Online Red Packets: A Large-scale Empirical Study of Gift Giving on WeChat | [
"cs.SI",
"cs.CY",
"cs.HC",
"cs.MM",
"econ.EM"
] | Gift giving is a ubiquitous social phenomenon, and red packets have been used as monetary gifts in Asian countries for thousands of years. In recent years, online red packets have become widespread in China through the WeChat platform. Exploiting a unique dataset consisting of 61 million group red packets and seven million users, we conduct a large-scale, data-driven study to understand the spread of red packets and the effect of red packets on group activity. We find that the cash flows between provinces are largely consistent with provincial GDP rankings, e.g., red packets are sent from users in the south to those in the north. By distinguishing spontaneous from reciprocal red packets, we reveal the behavioral patterns in sending red packets: males, seniors, and people with more in-group friends are more inclined to spontaneously send red packets, while red packets from females, youths, and people with less in-group friends are more reciprocal. Furthermore, we use propensity score matching to study the external effects of red packets on group dynamics. We show that red packets increase group participation and strengthen in-group relationships, which partly explain the benefits and motivations for sending red packets. | cs.SI | cs |
Online Red Packets: A Large-scale Empirical Study of Gift
Giving on WeChat
Yuan Yuan∗, Tracy Xiao Liu†, Chenhao Tan‡, and Jie Tang§
December 11, 2017
Abstract
Gift giving is a ubiquitous social phenomenon, and red packets have been used as
monetary gifts in Asian countries for thousands of years. In recent years, online red
packets have become widespread in China through the WeChat platform. Exploiting
a unique dataset consisting of 61 million group red packets and seven million users,
we conduct a large-scale, data-driven study to understand the spread of red packets
and the effect of red packets on group activity. We find that the cash flows between
provinces are largely consistent with provincial GDP rankings, e.g., red packets are
sent from users in the south to those in the north. By distinguishing spontaneous
from reciprocal red packets, we reveal the behavioral patterns in sending red packets:
males, seniors, and people with more in-group friends are more inclined to sponta-
neously send red packets, while red packets from females, youths, and people with less
in-group friends are more reciprocal. Furthermore, we use propensity score match-
ing to study the external effects of red packets on group dynamics. We show that
red packets increase group participation and strengthen in-group relationships, which
partly explain the benefits and motivations for sending red packets.
1 Introduction
Online red packet (formerly called "Lucky Money" or "Red Envelopes") was first released
in 2014 as a new feature on WeChat, the largest social messaging platform in China. This
feature enables people to send red packets to individual friends individually or randomly
split a red packet among a limited number of people in a group on a first-come, first-serve
basis. WeChat red packets have become viral since 2015: there were over 100 million
participants during the 2016 Mid-autumn Festival alone, and the number of red packets
sent over WeChat on Lunar New Year's Eve 2017 was 14.2 billion. Now, to facilitate
paricipation by users overseas, it is possible for someone to send red packets by linking
her PayPal account to WeChat. 1
The red packet phenomenon is an instance of gift giving, which is a pervasive behavior
in human society that ranges from giving Christmas gifts to purchasing from a wedding
∗Institute for Data, Systems, and Society, Massachusetts Institute of Technology, Cambridge, MA,
†Department of Economics, School of Economics and Management, Tsinghua University, Beijing, China,
‡Department of Computer Science, University of Colorado, Boulder, CO, USA, 80309.
chen-
USA, 02139. [email protected].
100084. [email protected].
[email protected].
[email protected].
Economist
1The
§Department of Computer Science and Technology, Tsinghua University, Beijing, China, 100084.
ji-
(https://www.economist.com/news/business/21703428-chinas-wechat-shows-way-social-medias-future-
wechats-world).
offers
an
introduction
to
WeChat
and
red
packets
1
registry [10, 20, 28, 8, 1, 27, 5]. However, gift giving is governed almost entirely by unwrit-
ten rules. Such unwritten rules have attracted interest from a wide range of disciplines,
including anthropology, economics, sociology, psychology, and marketing [10, 20, 28, 8, 5].
Findings indicate that the motivations for gift giving include altruism [3, 23], reciprocity
[16, 17], and many other factors such as prestige [14], empathy [7], etc. For example,
the red packets between friends are mainly reciprocal and it is considered as "Renqing
(favor)" in Chinese culture [9]. By contrast, sending red packets among family members
is expected to enhance family bonds is usually considered non-reciprocal.
Our contribution to the literature is twofold. First, we study a new type of online
red packets, the "group red packet". In contrast with traditional red packets exchanged
among family members and friends, this feature allows individuals to send red packets to
a group of people by randomly splitting a red packet among a limited, user-determined
number of people on a first-come, first-served basis. Moreover, online platforms provide
a convenient and informal channel for gift giving, which may bring fundamental changes
to the age-old practice of gift giving. Second, most studies in the literature use small
samples, including studies of online gifts [30, 29]. To the best of our knowledge, this is the
first study to quantitatively analyze gift exchange using a dataset on millions of users. In
addition, considering a different setting than the fruitful existing empirical works focusing
on the West [3, 18, 22, 23, 13, 26, 21, 2, 15, 6, 16, 17, 32, 12, 25, 11], our study includes a
large sample of the population in contemporary China and sheds light on gift giving in a
representative Eastern country.
In this paper, we study this new type of gift giving behavior in three respects. First,
we provide an overview of the cash flow patterns among users with different demographic
and geographic backgrounds. If gift exchanges were completely reciprocal, the cash flows
among users from different groups would be approximately zero. However, our results
reveal intriguing patterns among different demographic and geographic groups. For ex-
ample, we find that users from southern provinces are inclined to export cash to their
northern counterparts.
Second, we study how demographic factors such as gender and age relate to sending
red packets. In particular, to distinguish the motivations for sending red packets (altruism
vs.
reciprocity), we define spontaneous and reciprocal red packets and identify their
corresponding distinctive patterns. We find that males, older people, southerners, and
people with more friends in the group tend to send more spontaneous red packets, e.g.,
they are more likely to be the first one to send a red packet in a group, while red packets
from females, younger people, northerners, and people with more friends in the group are
more reciprocal. These differences can be explained by many aspects of Chinese culture,
including "mianzi", i.e. the Chinese cultural value of interpersonal dignity or prestige.
Finally, we examine the casual effect of online red packets on group dynamics. Applying
propensity score matching to data on approximately seven million red packets, we conduct
a quasi-experiment to study the causal effects of the cash amount in red packets. We show
that increasing the amount of money in red packets can stimulate reciprocal red packets
and, consequently, increase the total amount of red packets sent by members of a group.
We also find that increasing the amount of money in red packets can provide the senders
with new friends. Based on these findings, we shed light on the benefits of online group
red packets for both senders and all group members and improve our understanding of the
motivation for sending red packets.
2
Figure 1: The net cash flows between provinces in Mainland China (a: upper left); the
cash flow for Heilongjiang Province (b: upper right); Guangdong Province (c: lower left);
and Beijing Municipality (d: lower right). Each curve represents a net cash flow from the
province at the origin of the line to the province at the arrow, and its darkness represents
the size of net cash flow.
2 Results
2.1 Macro Cash Flow Patterns
We measure the directions of cash flows between users with different demographics. In
particular, we are interested in examining whether, on net, the group red packets are sent
from those from more-developed provinces to those from less-developed provinces.
Figure 1 (a) presents the net cash flow in Mainland China.2 First, we observe more net
cash flow from the east coast to the west, or from the south to the north. This suggests
that the direction of the cash flow might be significantly affected by the GDP in a region.
Second, the magnitude of cash flow varies and the largest cash flow is from Guangdong to
Hunan. We conjecture that this is driven by the large number of migrants from Hunan to
Guangdong.
Furthermore, we are interested in understanding the relationship between the mag-
nitude of cash flows and the geographic distance between two regions. We selected (1)
Beijing, which is the capital of China and a municipality in the north with a large number
of migrants, (2) Heilongjiang, which is a province in the northeast that has been experienc-
ing significant economic difficulties and labor force outflows, and (3) Guangdong, which is
the province with the highest GDP, population, and number of migrants.
We find that the net cash flows from Heilongjiang to other provinces are almost always
negative and the figures from Guangdong to other regions are almost always positive.
Furthermore, the cash flows for both provinces are mainly with neighboring regions, and
geographic distance tends to have a negative impact on the level of cash flows. In contrast,
2For easy visualization, we filter pairs of provinces where the total cash flow is under 1,000 RMB in the
dataset.
3
we do not find a consistent direction of cash flows for Beijing. On the one hand, the average
standard of living in Beijing is higher than in most other provinces, leading to substantial
cash flows out of this region; on the other hand, there are millions of college students in
Beijing, and this may lead to large cash flows into the region. The cash flows between two
arbitrary provinces and the net amount of incoming cash for each province are presented
in SI.
To validate the aforementioned factors affecting the interprovincial cash flows, we
predict the net cash flow between two provinces by the differences in GDP and GDP per
capita (PPP) and the distance between their capitals. We find that a one-thousand-RMB
increase in the difference in PPP is associated with a 9.02 increase in the net cash flow
(p < 0.01), while a one-kilometer increase in distance is associated with a 0.57 decrease in
the net cash flow (p < 0.01), while the results for GDP are not significant. The difference
in PPP measures the difference in standards of living between provinces, and these results
indicate that it is more likely to see a net cash flow from a more-developed to a less-
developed province. We explain the effect of the distance by simple geographic proximity:
nearby provinces have more interactions and migration between them.
Additionally, we also examine the overall cash flows between people of different ages
and find that, generally, the net cash flow is from older to younger people. This is consistent
with social norms in China, i.e., older people give red packets to younger people, especially
to children and the unmarried. In terms of gender, we find that, in general, the direction
of the net cash flow is from males to females. Comparing four types of cash flow (male to
male, male to female, female to male, and female to female), we find that male to male
represents the largest proportion (36%). Details on cash flows among age and gender
groups are stated in SI.
2.2 Demographic Factors and Gift Giving
In addition to overall cash flows, we examine the motivation for sending red packets by
distinguishing two types of red packets and the effect of different factors on the likelihood
of sending red packets.
Reciprocity is considered an important motive for gift giving[17]. We distinguish a
particular type of red packets: reciprocal red packets. If a person receives a red packet
and then quickly sends a new red packet, we consider the new red packet to be reciprocal.
We also define spontaneous red packets, which are initiated without the sender having
recently received a red packet, and thus, these are unlikely to be triggered by reciprocity.
The formal definitions are as follows:
• Reciprocal red packets. We define a reciprocal red packet based on the following
three criteria. (1) The time interval between this red packet and the prior packet
is no more than 600 seconds; (2) before sending this red packet, the sender had
received a red packet in the previous 600 seconds; (3) the two consecutive packets
are not sent by the same person. In other words, if we observe someone receiving a
red packet from another group member in a short period and sending a red packet
to the same WeChat group, it is likely that she is motivated by reciprocity.
• Spontaneous red packets. If the time interval between a red packet and the prior
red packet is more than 24 hours, we consider it to be a spontaneous red packet.
It is very unlikely that users send such red packets to express reciprocity, and one
possible motivation for sending them is to promote group communication.
We define propensity to send given feature F (see Methods). Fig. 2 presents the average
propensity score for key features across all groups. We then define the relative propensity
to send each particular type of red packets given a feature F. Specifically, we subtract the
4
Figure 2: Propensity to send given (a) gender (b) age (c) degree (d) location. We define
three groups: high-d (people with in-group degree that is no less than the second tertile),
low-d (people with in-group degree that is no more than the first tertile) and mid-d (the
rest). Group-level SEs are shown as blacks ticks on the tops/bottoms of the bars.
Figure 3: Relative Propensity to send spontaneous/reciprocal red packets given (a) gender,
(b) age, (c) degree, and (d) location. We define three groups: high-d (people with in-group
degree that is no less than the second tertile), low-d (people with in-group degree that is
no more than the first tertile) and mid-d (the rest). Group-level SEs are shown as blacks
ticks on the tops/bottoms of the bars.
propensity to send any red packet from the propensity to send a spontaneous/reciprocal
red packet. The results are shown in Fig. 3. Details of definition of the variables can be
found in SI.
We have the following observations based on Figures 2 and 3. Please refer to SI for
the definition of related variables.
• Gender: In general, men are more likely to send red packets than women. More
importantly, this gender difference is stronger for spontaneous red packets. This
suggests that the motivation for sending red packets differs across genders, i.e.,
men are more likely to initiate sending behavior rather than reciprocate others' red
packets.
• Age: Users between 30 and 40 years of age are the most likely to send red packets,
especially spontaneous ones. Users less than 30 years of age are less likely to send
red packets, and their red packets are more likely to be reciprocal. Users over 40
years of age are less active due to their underrepresentation and overall inactivity
on WeChat.
• In-group degree: A group member of high degree (a proxy of in-group status) is
more likely to send a red packet. However, they are less likely to send reciprocal
red packets. One explanation is that she might be the creator of a group and
tend to initiate red packets more often than others. Also, high-status people may
be concerned more with their prestige and thus are more willing to spontaneously
reward other group members instead of following others.
5
malefemalen/a-0.06-0.04-0.020.00.020.040.06propensitytosendage1age2age3age4-0.04-0.020.00.020.04highmiddlelow-0.6-0.4-0.20.00.20.40.6northsouthother-0.04-0.020.00.020.04SponReci-0.06-0.04-0.020.00.020.040.06propensitytosend(allasbaseline)malefemalen/aSponReci-0.06-0.04-0.020.00.020.040.06age1age2age3age4SponReci-0.6-0.4-0.20.00.20.40.6highmiddlelowSponReci-0.04-0.020.00.020.04northsouthother• Location. Consistent to results in cash flow, southerners are more likely to send red
packets, and this holds for both two types of red packets.
We have similar analysis on receivers, which can be found in SI.
2.3 Effects of Red Packets on Social Groups
Although reciprocity is a widely accepted motivation for gift-giving, it cannot explain the
motivations for all red packets. For example, sending a spontaneous red packet is unlikely
to be driven by pure reciprocity. herefore, in this section, we attempt to measure the
causal effect of spontaneous red packets on the group, as well as the red packet's sender,
by applying propensity score matching to examine the possible benefit that red packets
bring to groups.
Since it is difficult to conduct counter-factual analysis such as "what if this red packet
had not been sent", we choose to match and compare the spontaneous red packets with
large amounts of money compared to those with small amounts of money. Doing so
allows us to determine whether a marginal increase in the money in a red packet can have
significant impacts on group activities. Therefore, our treatment dummy is coded as one
when the cash amount of a spontaneous red packet ≥ 100 RMB.3, zero otherwise. In total,
we have 54,150 red packets in the treatment group and 6,133,489 in the control group.
Table 1 reports the regression results. We also control for the number of splits allowed for
each red packet (RPnum), and group fixed effects, including at the individual and seasonal
levels.
We define a session as a sequence of red packets in a group where the interval between
two consecutive red packets is shorter than τ. τ = 30min, and we examine the effect of
spontaneous red packets on the session. The dependent variables are (1) the total amount
of money available to following users in this session (session money); (2) the number of
following users who send red packets in the session (number of following senders, or #FS);
(3) the number of following red packets in the session (#FRP); and (4) the number of
new in-group friends that the sender has within 1 day after a spontaneous red packet is
sent (#Senders' new friends).
Compared to prior studies that match on individual-level data [4], we further utilize
group features, e.g., the size of the group, and seasonality features, e.g., whether the red
packet is sent during the spring festival, to understand the causal effect of the amount of
cash in red packets. All 54,150 treatment observations are successfully matched. The stan-
dardized differences of all covariates are below 0.1, which indicates insignificant imbalance
between the treatment and control groups [24].
First, compared to small red packets, on average, large red packets have 0.295 more
group members following and generate 0.415 more following red packets (Columns 1 and
2). Additionally, red packets sent on special days, such as festivals and weekends, generate
more following users and following red packets. Interestingly, those sent by female users
and by people with lower in-group degree also have more following users and more following
red packets.
Second, we examine the impact on the following session money (Column 3). We find
that a large red packet, on average, increases 52.632 RMB in session money. This indicates
that a large cash amount may significantly benefit other group members. Therefore, they
might be more likely to reciprocate by sending red packets to the group.
Finally, we analyze the number of new friends that a group member garners by sending
a large amount of red packets. On average, a large amount of red packets attracts 0.009
new friends to the sender. This indicates that red packets can help senders to attract new
friends.
3We also used other thresholds, i.e., 50 and 150 RMB, and find consistent results.
6
Table 1: Determinants of Group Activities
#Follower
#FRP
Session Money #Sender's New Frds
Dependent variable:
treatment (large amount)
is festival
is weekday
RPnum
female
degree
group size
(1)
0.295∗∗∗
(0.010)
0.185∗∗∗
(0.025)
−0.094∗∗∗
(0.011)
0.006∗∗∗
(0.0004)
0.089∗∗∗
(0.013)
−0.145∗∗∗
(0.028)
0.0004∗∗∗
(0.0001)
(2.349)
Y
Y
Y
(2)
0.415∗∗∗
(0.024)
0.224∗∗∗
(0.057)
−0.078∗∗∗
(0.025)
0.006∗∗∗
(0.001)
0.119∗∗∗
(0.029)
−0.388∗∗∗
(0.065)
0.002∗∗∗
(0.0002)
(5.396)
Y
Y
Y
(3)
52.632∗∗∗
(1.490)
6.479∗
(3.625)
−4.862∗∗∗
(1.602)
0.218∗∗∗
(0.055)
9.683∗∗∗
(1.815)
−12.416∗∗∗
(4.111)
0.015
(0.012)
(340.545)
(4)
0.009∗∗∗
(0.003)
−0.006
(0.008)
−0.002
(0.003)
0.0003∗∗∗
(0.0001)
0.002
(0.004)
−0.039∗∗∗
(0.009)
0.001∗∗∗
(0.00002)
(0.716)
Y
Y
Y
108,300
0.051
group fixed effect
individual fixed effect
seasonal effect
Observations
R2
∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01
Group/individual/seasonal effects refer to all control variables not listed above.
108,300
0.019
108,300
0.036
Y
Y
Y
108,300
0.016
3 Discussion
In summary, we have presented the macro- and micro-level patterns in red packet sending
and discussed the motivations for and benefits of sending red packets.
Studying the interprovincial cash flows improves our understanding of human mobil-
ity. The patterns that we found are consistent with a gravity model: the interactions
between two areas, for example in the form of immigration and trade, are proportional to
the "masses" in these two areas (population, economic development) and inversely pro-
portional to the distance between them[19]; similarly, cash flows between provinces are
dependent on both living standards (PPP) and distance. We conjecture that the trends
could be driven by immigration: people move to nearby and more developed provinces
and maintain their social bonds with families and friends in their hometowns.
Our micro-level results add new dimensions to our understanding of gift giving. For
example, we find that men are generally more inclined to send red packets and that red
packets from women are more likely to be reciprocal than spontaneous. Most existing
studies on gender differences in gift exchange, especially in charitable giving, state that
women are more likely to donate to more charities [18, 3, 22]. However, in the context of
group red packets, men are more likely to send red packets. Rather than pure altruism,
we conjecture that income inequality and a desire for prestige account for this gender
difference. Although it has decreased, the gender income gap persists in China [33], which
limits the budget available to females to reward others. Another account is the desire for
prestige, or "mianzi" in Chinese culture. Findings indicate that men are more inclined to
seek status than women [31], and sending red packets, especially spontaneous red packets,
provides a way to demonstrate one's generosity and wealth.
The results of differences in reciprocal and spontaneous red packets and casual effects of
spontaneous red packets explain the motivations of sending red packets, and furthermore,
reasons why online red packets has spread rapidly in China. We find that the increased
rewards (amount of money) spontaneous red packets of increased rewards (amount of
money) to a group can significant stimulate other group members to send follow-up red
7
packets. Ultimately, spontaneous red packets generate rewards for group that exceed the
packets' initial values. The explanation for this increase is likely reciprocity, that is, others
have received money and feel obliged to send money in turn. Moreover, motivations of
the spontaneous senders who tend to be senior or people with high in-group degree can
be explained by the aforementioned benefits of sending red packets.
However, our work does suffer from limitations. First, despite the large sample size,
our dataset is unable to represent the entire population of China. Although 65% people
in China use WeChat, users who are active in red packets are biased toward young and
middle-aged people. Moreover, we filtered out inactive groups and suspiciously highly
active groups, which may also have influenced our results. Second, gender, age, location,
and status differences can be confounded by unobserved factors such as income. However,
because of privacy issues, we were unable to collect such information. Therefore, we are
not arguing for causal effects of, for example, gender or age. Third, although we explored
the motivations for sending red packets by examining the causal effects of spontaneous red
packets, we do not have a comprehensive understanding of the true motivations of such
sending behavior, although we propose that reciprocity and the beneficial effects on group
activities could be two main reasons.
There are many promising directions for future research. For example, if we were to
collect data from all message groups to which an individual belongs, we could explore her
strategies for allocating money across the groups. In addition, we could also study how
red packets are spread across all WeChat groups and which groups are responsible for the
rapid adoption of red packets.
4 Methods
4.1 Data Description
We first randomly sample one million WeChat groups in which at least one group red
packet was sent between October 1, 2015, and February 29, 2016. To avoid the problem
of data sparsity, we exclude groups with fewer than η red packets. We further exclude
extremely active groups with more than τ red packets as a group that have extremely large
amounts of money in the red packets, as these might be used for online gambling, and
incorporating these groups might significantly bias our results. Specifically, we empirically
set η = 3 × m and τ = 50 × m, where m is the group size. In total, this selection process
leaves us with 367,361 groups with 7,816,214 group members (7,380,110 unique users).
We combine three datasets for our statistical analyses, including (1) the characteristics
of 367,361 WeChat groups, e.g., the number of members, total number of red packets and
the total value of the red packets; (2) the characteristics of the 7,380,110 unique users in
these WeChat groups, e.g., demographic variables, the number of friends and the number
of WeChats that they join; and (3) propensities for red packets, such as the cash amount
and the number of recipients of a particular red packet. In total, 61,501,862 red packets
were sent in these WeChat groups, generating 218,301,860 recipients.
During this five-month period, the average number of red packets sent in a group is
172.88 and the average amount of money exchanged in a group is 995.78 RMB (approxi-
mately 146 USD). All details on the data and summary statistics of the variables can be
found in the Data section of the SI.
4.2 Propensity to Send
We define a group g ∈ G, where Rg represents number of red packets sent in group g.
Among all group members (potential senders), there are NF group members with the
feature in question and N ¯F without it. Among all red packets in that group, we can
8
compute the frequency of red packets sent by people with feature F, TF , and without
as the propensity to
feature F, T ¯F . Then, for each group, we compute
send given feature F in this group.
− NF
NF +N ¯F
TF
TF +T ¯F
4.3 Covariates in Matching
To eliminate the influence of other factors, we extract various features for matching. For
the group features (group-level fixed effect), we have the size of the group, density of the
group network at the time red packet is sent, gender ratio, age entropy, and province
entropy. For the sender features (individual-level fixed effect), we have the gender, age,
location of the city (latitude and longitude), the number of WeChat friends the individual
has (activity_1), the number of WeChat groups to which the individual belongs (activ-
ity_2), and the degree ratio (degree/(member count − 1)). For the seasonal features, we
have whether it is during a festival (such as the spring festival period, New Year's Day, and
Christmas), whether it is weekday, the period of a given day (we divide one day into six
equal periods, as an integer; empirically, a higher number indicates a higher probability
to send more and larger red packets), and the UNIX time stamp of the sent red packet
(how many seconds from January 1, 1970, sendtime). Additionally, we have the number
of parts into which the red packet was divided (RPnum). Imposing such controls can help
to exclude the trivial statements such as "during festivals, people are more likely to send
big red packets when people are also very active on WeChat to send red packets".
References
[1] George A Akerlof. Gift exchange and efficiency-wage theory: Four views. The Amer-
ican Economic Review, 74(2):79–83, 1984.
[2] Paul R Amato. Family processes in one-parent, stepparent, and intact families: The
child's point of view. Journal of Marriage and the Family, pages 327–337, 1987.
[3] James Andreoni, Eleanor Brown, and Isaac Rischall. Charitable giving by married
couples who decides and why does it matter? Journal of human Resources, 38(1):111–
133, 2003.
[4] Sinan Aral, Lev Muchnik, and Arun Sundararajan. Distinguishing influence-based
contagion from homophily-driven diffusion in dynamic networks. Proceedings of the
National Academy of Sciences, 106(51):21544–21549, 2009.
[5] Neeli Bendapudi, Surendra Singh, and Venkat Bendapudi. Enhancing helping be-
havior: An integrative framework for promotion planning. Journal of Marketing,
60:33–49, 1996.
[6] Joyce Berg, John Dickhaut, and Kevin McCabe. Trust, reciprocity, and social history.
Games and economic behavior, 10(1):122–142, 1995.
[7] Seymour M Berger. Conditioning through vicarious instigation. Psychological review,
69(5):450, 1962.
[8] Theodore Caplow. Rule enforcement without visible means: Christmas gift giving in
Middletown. American journal of sociology, pages 1306–1323, 1984.
[9] Allan KK Chan, Luther Denton, and Alex SL Tsang. The art of gift giving in china.
Business Horizons, 46(4):47–52, 2003.
[10] David Cheal. The gift economy, volume 4. Routledge, 2015.
9
[11] Armin Falk. Gift exchange in the field. Econometrica, 75(5):1501–1511, 2007.
[12] Uri Gneezy and John A List. Putting behavioral economics to work: Testing for gift
exchange in labor markets using field experiments. Econometrica, 74(5):1365–1384,
2006.
[13] Daniel F Hansler and DL Riggin. Geo-demographics: Targeting the market. Fund
Raising Management, 20(10):35–43, 1989.
[14] William T Harbaugh. What do donations buy?: A model of philanthropy based on
prestige and warm glow. Journal of Public Economics, 67(2):269–284, 1998.
[15] Andrew Jones and John Posnett. Charitable donations by uk households: evidence
from the family expenditure survey. Applied Economics, 23(2):343–351, 1991.
[16] Aafke Komter and Wilma Vollebergh. Gift giving and the emotional significance of
family and friends. Journal of Marriage and the Family, 59(3):747–757, 1997.
[17] Aafke Elisabeth Komter. Reciprocity as a principle of exclusion: Gift giving in the
netherlands. Sociology, 30(2):299–316, 1996.
[18] Rita Kottasz. Differences in the donor behavior characteristics of young affluent
males and females: Empirical evidence from britain. Voluntas: International Journal
of Voluntary and Nonprofit Organizations, 15(2):181–203, 2004.
[19] Joshua J Lewer and Hendrik Van den Berg. A gravity model of immigration. Eco-
nomics letters, 99(1):164–167, 2008.
[20] Marcel Mauss and Wilfred Douglas Halls. The gift: The form and reason for exchange
in archaic societies. WW Norton & Company, 2000.
[21] P Mears. Understanding strong donors. Fund raising management, 23(2):45–6, 1992.
[22] Debra J Mesch, Melissa S Brown, Zachary I Moore, and Amir Daniel Hayat. Gender
International Journal of Nonprofit and Voluntary
differences in charitable giving.
Sector Marketing, 16(4):342–355, 2011.
[23] Elizabeth Midlarsky and Mary E Hannah. The generous elderly: naturalistic studies
of donations across the life span. Psychology and aging, 4(3):346, 1989.
[24] Sharon-Lise T Normand, Mary Beth Landrum, Edward Guadagnoli, John Z Aya-
nian, Thomas J Ryan, Paul D Cleary, and Barbara J McNeil. Validating recom-
mendations for coronary angiography following acute myocardial infarction in the
elderly: a matched analysis using propensity scores. Journal of clinical epidemiology,
54(4):387–398, 2001.
[25] Gabriele Plickert, Rochelle R Cote, and Barry Wellman. It's not who you know, it's
how you know them: Who exchanges what with whom? Social networks, 29(3):405–
429, 2007.
[26] Alan Radley and Marie Kennedy. Charitable giving by individuals: A study of atti-
tudes and practice. Human relations, 48(6):685–709, 1995.
[27] Barry Schwartz. The social psychology of the gift. American Journal of Sociology,
73(1):1–11, 1967.
[28] John F Sherry. Gift giving in anthropological perspective. Journal of consumer
research, 10(2):157–168, 1983.
10
[29] Emmi Suhonen, Airi Lampinen, Coye Cheshire, and Judd Antin. Everyday favors: a
case study of a local online gift exchange system. In Proceedings of the 16th ACM
international conference on Supporting group work, pages 11–20. ACM, 2010.
[30] Alex S Taylor and Richard Harper. Age-old practices in the'new world': a study
In Proceedings of the SIGCHI
of gift-giving between teenage mobile phone users.
conference on Human factors in computing systems, pages 439–446. ACM, 2002.
[31] Christopher Von Rueden, Michael Gurven, and Hillard Kaplan. Why do men seek
status? fitness payoffs to dominance and prestige. Proceedings of the Royal Society
of London B: Biological Sciences, page rspb20102145, 2010.
[32] Hui Wang and Sherman D Hanna. Does risk tolerance decrease with age? Financial
Counseling and Planning, 8(2):27–32, 1997.
[33] Lin Xiu and Morley Gunderson. Gender earnings differences in china: base pay,
performance pay, and total pay. Contemporary economic policy, 31(1):235–254, 2013.
11
(a)
(b)
(c)
(d)
Figure 4: An example of sending and receiving group a red packet. Four steps are listed.
The first two are seen by the sender, and the following two are seen by group members
who successfully receive the red packets.
Appendices
A Background
Comparable to the popularity of non-cash gift-giving in Western culture, Asians have a
long history of giving cash to one another to express their gratitude and deepen their
relationship. Moreover, they typically place the cash inside a packet, the color of which
differs across cultures. For example, the packets are red in China and Singapore and white
in Japan.4
These red packets are among the most important components of festivals, for example,
the Chinese lunar new year and important events such as wedding and birthdays. They are
the most frequently used tool for gift exchange between friends and an effective mechanism
to maintain the close relationships with family members.5
Because of its lack of geographic constraints, WeChat significantly speeds the flow of
red packets among individuals. Moreover, the popularity of WeChat groups results in an
extremely interesting change - the cash flow is extended from one-to-one exchange to
a one-to-many case, which is called the "Group Red Packet". Specifically, a group user
can send a red packet to a WeChat group. She can either choose an identical amount
or a random amount for each group member. For identical packets, she needs to specify
each packet's monetary value, while for random red packets, she needs to specify the total
amount. Additionally, she needs to specify the number of recipients ("quantity"), which
can be fewer than the number of group members. Therefore, the lottery nature of random
red packets and the possibility of not receiving a packet generate the entertainment aspect
of red packets, which has made them quite popular on WeChat.
Figure 4 presents an example of group red packets with a random amount. As shown
in panel (a), a group member clicks the "red packet" button on the left corner of the
screen. Then, a window in panel (b) pops out. Conditional on the user's choice of random
amount, she determines the quantity of red packets and the total amount. She can also
leave a message that will be shown at the top of the red packets, e.g., "Happy Lunar New
4We use the term "red packet" if doing so generates no ambiguity.
5They have also been criticized for being instruments of bribery and corruption. This is beyond the
scope of this work and will be discussed elsewhere.
12
Year!". Finally, she clicks "prepare lucky money", and the red packet is sent to the group.
Thereafter, everyone in this group will be notified of this red packet (panel c) and can
choose to click the "open" button to determine the (random) amount they will receive.
Finally, all group members can determine the amount that all other members received.
The person who receives the highest amount will be tagged with a star icon with the
legend "Luckiest Draw". 6
B Data Description
There are 7,380,110 unique users in our 367,361 groups, and a user may belong to multiple
groups. We retrieve each user's demographic information, e.g., gender, age, location, the
number of friends, and the number of groups that she joins. Since these information is
updated every month, we use the information retrieved in February 2016 for analyses.
Moreover, we identify the friendship between users in the dataset.
In total, there are
292,565,291 friend links in our dataset and we also accessed the date for two users become
WeChat friends.
For each group gi, we retrieve group member gij's frequency of sending (receiving) red
packets, the cash amount of each red packet, the number of messages that she posts in
group i, and the time stamp that she joined group i. Table 2 reports summary statistics
for groups.
As the individual level, the relevant variables are as follows. Table 3 reports summary
statistics for individual users.
• Gender:Users report their gender. In total, 3,893,537 users are male, 3,438,393 are
female, and the remainder have no data.
• Region and Location. Since most WeChat users live in Mainland China, we
focus on 31 provinces (or municipalities/autonomous regions) in Mainland China,
excluding Hong Kong, Macau and Taiwan. We classify the cities where a user re-
sides in into seven categories7. (1) North contains Beijing, Tianjin, Hebei, Shanxi,
and Inner Mongolia; (2) Northeast contains Liaoning, Jilin, and Heilongjiang; (3)
East contains Shanghai, Jiangsu, Zhejiang, Anhui, Fujian, Jiangxi, and Shandong;
(4) Center contains Henan, Hubei, and Hunan; (5) Southwest contains Chongqing,
Sichuan, Guizhou, Yunnan, and Tibet; (6) Northwest contains Shaanxi, Gansu,
Qinghai, Ningxia, and Xinjiang; and (7) South contains Guangdong, Guangxi, and
Hainan. Although it is imprecise, we further cluster the North, Northwest and
Northeast regions as "North" and the rest as "South".
• Age. WeChat reports that they collect and infer users' age with over 70% accuracy.
We classify people into six age groups: [10, 20), [20, 30), [30, 40), [40, 50) and [50, 60),
and [60, 70), which we name age1, age2, age3, age4, age5, age6, respectively. As
shown in Table 3, the sizes of the age groups are unbalanced.
• Degree Ratio. Group members in a WeChat group (Gi) can be either friends or
strangers on WeChat. Therefore, a WeChat group is an undirected network, where
each user j is a node and an edge represents a "friend" relationship between two
group members. The degree of a group member j in group i, dij, is the number
of friends that she has in this group, and we define her degree ratio in a group rij
#group member−1. rij ∈ [0, 1]. The higher rij is, the more closely a user j is
as
attached to group i.
dij
6See https://goo.gl/eUjNTy for a detailed description.
7We refer to Wikipedia: https://en.wikipedia.org/wiki/List_of_regions_of_the_People%27s_
Republic_of_China
13
Table 2: Statistics of Red Packet Groups.
Mean Min
13.58
3
0
0.55
0.09
995.78
9
172.88
96.82
0.03
3
12.98
0
0.53
0.75
0.0
0.0
0.40
25%
5
0.31
148.31
46
15.76
5.24
0.4
0.29
0.0
50%
10
0.5
441.81
101
40.13
9.31
0.52
0.83
0.04
492,969.24
16,795
18,600
Max
500
1
50
1.0
1.94
1.97
75%
17
0.775
1065.11
184
101.94
17.33
0.67
1.07
0.83
It
Statistics
#member
Densitya
Total RP money
Total RP count
RP Money per capita
RP Count per capita
Female ratio
Age group entropyb
Location region entropy
a Density measures
# pairs of friends
b Entropy is calculated as P
(#member)(#meber-1)/2
age/province group.
the connectivity within a group.
is defined as
i −pi log2(pi), where pi is the proportion of each
In total, 61,501,862 red packets were sent in all groups in our dataset, and red packets
were received 218,301,860 times. The average number of red packets sent in each group
is 172.88, and the average amount of money is 995.78 RMB (146 USD). Table 4 reports
further statistics about the red packets.
C Cash Flows Between Demographic groups
Figure 5(a) depicts the cash flows between gender pairs, i.e., MM (male to male), MF
(male to female), FM (female to male) and FF (female to female). The direction of the
arrow represents the direction of a cash flow, and the thickness refers to the percentage
of each pair in the total cash flow between two arbitrary individuals. Specifically, 36.1%
of total cash flows is within men, followed by MF (24.8%), FF(19.5%) and FM (19.3%).
In total, the high percentage of within-gender cash flows might be driven by homophily-
people tend to make friends who are similar to them, as demonstrated by Figure 7. The
percentage of cash flows is determined by who is more likely to send a red packet, who
is more likely to participate in receiving a red packet, and the gender composition of a
group. If we want to construct a model of the gender composition of a cash flow, e.g., how
likely a red packet between a male and female is, we need to consider these three factors.
Figure 5(b) illustrates the net cash flows between different age groups. Since the
age distribution on WeChat is extremely unbalanced, e.g., users in [20, 30) represent
approximately 50% of users, we utilize balance ratio to measure the cash flows among age
groups. The balance ratio is defined as equation 1, ranging from −1 to 1, and a positive
balance ratio from province (gender / age) A to B implies that users from A are more
likely to send red packets to those from B. We utilize the ratio to measure the significance
of the cash flows among different demographic groups.
Balance Ratio(A → B) =
2 × Cash(A → B)
Cash(A → B) + Cash(B → A) − 1
(1)
For example, the balance ratio from group 4, aged [40, 50), to group 1, [10, 20), is 0.41,
indicating that the balance ratio from group 1 to group 4 is -0.41. The balance ratio from
group 4 to other groups is always positive, while the balance ratio from group 1 to other
groups is always negative (the arrow in Figure 5 ends at group 1). This is consistent with
social norms in China, whereby older people give red packets to younger people, especially
14
Table 3: Statistics of WeChat Users
Demographic features Count
Gender
Male
Female
Unreported
Location
North
Northeast
Northwest
East
Center
Southwest
South
Other/Unreported
Age
[10, 20)
[20, 30)
[30, 40)
[40, 50)
[50, 60)
[60, 70)
Other/Unreported
795,113
465,941
433,681
1,462,468
937,148
593,279
894,397
1,798,083
3,893,537
3,438,293
48,280
747,226
3,886,688
1,963,130
488,033
63,410
4,067
227,556
Proportion
52.76%
46.59%
0.65%
10.77%
6.31%
5.88%
19.82%
12.70%
8.04%
12.12%
24.36%
10.12%
52.66%
26.60%
6.61%
0.86%
0.06%
3.08%
to children and the unmarried (citation). The only exception is the net cash flow from
group 4 to group 5, which might be driven by the fact that those aged 40 to 50 are the
breadwinners in a family and have to give red packets to both older and younger people.
The detailed net cash flows among location groups are shown in Figure 6. We conclude
that southern and southwestern provinces, along with Beijing and Tianjin, send more
money to other provinces than they receive, while the rest are net "gainers" from red
packets. The reason that Xinjiang, Qinghai and Gansu have high absolute values of the
balance ratio is partly due to the low number of red packets in the sample for most western
provinces.
For the regression analysis, we define the dependent variable as the net cash flow in
the dataset between a pair of provinces (A and B), i.e., Cash(A → B) − Cash(B → A).
To remove redundant observations, we require that A has a nonnegative net cash flow
to B. We use the difference in GDP (GDP(A) − GDP(B)) and GDP per capita (PPP,
PPP(A) − PPP(B)) and the distance between the provincial capitals. Table 5 presents
the regression results. We find that GDP is not a significant predictor, while PPP and
distance are positively and negatively related to the net cash flow, respectively.
D Receiving patterns
Users are free to choose whether to receive red packets in WeChat groups. In some cases,
users may race to collect red packets to secure one of a limited number of packets. In this
subsection, we focus on the association between the propensity to receive a gift and other
variables, including demographic variables (gender, age and location), network structural
variables (degree and the number of friends) and their interaction with group variables
and sender variables.
15
(a)
(b)
Figure 5: Cash flows across gender (a) and age (b) groups. The thickness of a line
represents the weight of the cash flow. In (a), the curves indicate that the cash flow is
from the group at the origin of an arrow to the group at the arrowhead. The percentages
on the curves indicate the proportion of that cash flow in the total cash flow (we filter out
cases in which people receive red packets from themselves). In (b), the number represents
an age group. * represents the age group [*0, *9]. The numbers on the edges represent
the net cash flow between two age groups, normalized by the maximal value, that is, from
40 to 10.
Figure 6: Subfigure(a) presents the heatmap of balance ratio between provinces. Red
indicates a balance ratio greater than 0, blue represents one less than 0, and gray represents
a ratio of 0. Subfigure(b) presents the balance ratio between a given province and all other
provinces. Red indicates a positive and blue indicates a negative ratio. The darkness of
red and blue represents the absolute value of the balance ratio.
16
AnhuiBeijingChongqingFujianGansuGuangdongGuangxiGuizhouHainanHebeiHeilongjiangHenanHubeiHunanInnerMongoliaJiangsuJiangxiJilinLiaoningNingxiaQinghaiShaanxiShandongShanghaiShanxiSichuanTianjinTibetXinjiangYunnanZhejiangsenderZhejiangYunnanXinjiangTibetTianjinSichuanShanxiShanghaiShandongShaanxiQinghaiNingxiaLiaoningJilinJiangxiJiangsuInnerMongoliaHunanHubeiHenanHeilongjiangHebeiHainanGuizhouGuangxiGuangdongGansuFujianChongqingBeijingAnhuireceiver−0.6−0.30.00.30.6Table 4: Statistics of Red Packets
Statistics
Red packet money
Red packet parts
Intervala
Finished timeb
Mean
5.55
5.06
25,458.09
27.92
Min 25% 50% 75%
0.01
5
5
1
511
0
1
11
1
3
34
6
2
5
89
8
Max
10000
100
12,475,671
86,400
a The time between the current and preceding red packet. Unit is sec-
onds. We do not consider the first red packets in the groups that we
can observe in the dataset.
b The interval between the time when the red packet is sent and the
time when the previous packet was received. Red packets that were
not received by anyone are not taken into account.
Table 5: Regression Results for Interprovincial Cash Flows
Dependent variable: Net Cash Flow
(1)
0.045
(0.031)
1073.916∗∗∗
(80.712)
465
0.004
0.002
(2)
−0.007
(0.034)
9.995∗∗∗
(2.713)
1020.960∗∗∗
(80.926)
465
0.033
0.029
(3)
−0.584∗∗∗
(0.108)
1887.943∗∗∗
(167.357)
465
0.059
0.057
(4)
0.010
(0.033)
9.020∗∗∗
(2.642)
−0.574∗∗∗
(0.107)
1810.117∗∗∗
(166.762)
465
0.090
0.084
∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01
GDP
PPP
Distance
Constant
Observations
R2
Adjusted R2
Note:
In particular, we study the effects of individual variables on the propensity to receive a
red packet, conditional on the characteristics of the senders. Similar to the propensity to
send, we define the propensity to receive of a characteristic (or demographic group). We
first define the revealed propensity to receive a red packet as the difference between the
proportion of this demographic group among receivers of red packets and the proportion
of this demographic group in the group chat. We take the average of the propensity of
red packets for each group chat and, furthermore, take the average of each group.
If
the aggregated propensity is 0, then we believe this demographic group has the same
propensity to receive as the average WeChat user. A positive sign indicates that this
demographic group is more likely to receive red packets. Note that although WeChat
allows the red packet senders to receive packets from themselves, we do not regard them
as receivers or candidate receivers.
We define the propensity to receive of characteristic F given condition C and present
the propensity conditional on different senders. In Figure 7, we depict the propensity to
receive of a given characteristic such as gender, age, degree (number of friends), location
and whether the sender and receiver are friends.
• Gender. Females have an approximately +0.020 propensity to receive a red packet,
17
(a)
(e)
(d)
(b)
(c)
Figure 7: Propensity to receive a red packet for given demographic characteristics, rep-
resented by the bars. Group-level SEs are shown as blacks ticks on the tops/bottoms of
the bars. (a) is gender, (b) age, (c), degree (d), location (e), and strong tie (whether the
sender and receiver are friends). We also present the conditions given the sender.
while males are less likely to receive red packets. Interestingly, when we consider
the genders of red packet senders, we find both genders have a higher propensity to
receive a red packet from a person of the opposite gender. Specifically, the propensity
of females to receive a red packet from a male is approximately +0.047, which is
higher than the propensity of males to receive from a female (approximately +0.01).
• Age. Because we have limited samples of people over age 50, we only consider four
groups: age1, age2, age3, age4, representing age groups [10, 20), [20, 30), [30, 40),
and [40, 50), respectively. On average, the propensity to receive red packets declines
with the age when the latter is over 20, indicating that older people tend to be less
likely to receive a red packet than a younger person is. On average, the propensity
to receive red packets declines with the age when the latter is over 20, indicating
that older people tend to be less likely to receive a red packet than a younger person
is.
• Location. As shown in Fig. 7(d), despite the statistical significance, the difference
in the propensity to receive across locations is smaller than that for other variables.
• In-group degree. In-group degree is the number of friends that a user has in a group.
It measures in-group social status. We define three groups: high-d (people with
in-group degree that is no less than the second tercile), low-d (people with in-group
degree that is no more than the first tercile) and mid-d (the rest). We find that a
high-degree group member has an approximately +0.1 propensity to receive a red
packet, regardless of the degree group to which the sender belongs. The propensity
decreases as the degree decreases. This is probably because people with high degrees
are more avid users of WeChat and are willing to spend more time to wait to receive
red packets.
• Strong ties. Finally, we study whether strong ties differ from weak ties, that is, if
18
allsendersmalesendersfemalesenders-0.06-0.04-0.020.00.020.040.06propensitytoreceivemalereceiversfemalereceiversreceivedbyfriendsreceivedbystrangers-0.1-0.075-0.05-0.0250.00.0250.050.0750.1propensitytosendallsendersnorthsenderssouthsenders-0.01-0.0075-0.005-0.00250.00.00250.0050.00750.01propensitytoreceivenorthreceiverssouthreceiversallsendersage1sendersage2sendersage3sendersage4senders-0.04-0.020.00.020.04propensitytoreceivereceivedbyage1receivedbyage2receivedbyage3receivedbyage4allsendershigh-dsendersmid-dsenderslow-dsenders-0.15-0.1-0.050.00.050.10.150.20.25propensitytoreceivereceivedbyhigh-dreceivedbymid-dreceivedbylow-done is more likely to receive red packets from friends than from non-friends in a given
group. As shown in Figure 7(e), when people are friends, they have an approximately
+0.08 propensity to receive red packets.
E PSM details
Table 6 reports the complete regression results. All covariates are also used as control
variables. We report the most significant and interesting controls in the main article.
Table 6: Complete Regression Results
#Follower
#FRP
Session Money
#Sender's New Friends
Dependent variable:
(3)
52.632∗∗∗
(1.490)
6.479∗
(3.625)
−4.862∗∗∗
(1.602)
1.191∗∗∗
(0.118)
0.00000∗∗∗
(0.00000)
0.218∗∗∗
(0.055)
0.303∗∗∗
(0.105)
−0.189
(0.118)
0.604∗∗∗
(0.101)
9.683∗∗∗
(1.815)
−12.416∗∗∗
(4.111)
0.056∗∗∗
(0.008)
−0.003
(0.002)
−25.545∗∗∗
(3.699)
6.618∗∗∗
(1.493)
3.377∗∗∗
(1.163)
14.506∗∗∗
(4.307)
0.015
(0.012)
−3, 267.126∗∗∗
(340.545)
108,300
0.016
0.016
(4)
0.009∗∗∗
(0.003)
−0.006
(0.008)
−0.002
(0.003)
0.0001
(0.0002)
−0.000
(0.000)
0.0003∗∗∗
(0.0001)
−0.00002
(0.0002)
0.0004
(0.0002)
−0.001∗∗∗
(0.0002)
0.002
(0.004)
−0.039∗∗∗
(0.009)
0.00002
(0.00002)
−0.00000
(0.00000)
0.001
(0.008)
0.001
(0.003)
0.007∗∗∗
(0.002)
−0.013
(0.009)
0.001∗∗∗
(0.00002)
0.870
(0.716)
108,300
0.051
0.051
∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01
treatment
is festival
is weekday
hour
sendtime
RPnum
latitude
longitude
age
female
degree
activity_1
activity_2
female ratio
age entropy
province entropy
density
member count
Constant
Observations
R2
Adjusted R2
Note:
(1)
0.295∗∗∗
(0.010)
0.185∗∗∗
(0.025)
−0.094∗∗∗
(0.011)
0.021∗∗∗
(0.001)
0.00000∗∗∗
(0.000)
0.006∗∗∗
(0.0004)
0.002∗∗
(0.001)
−0.001∗
(0.001)
0.007∗∗∗
(0.001)
0.089∗∗∗
(0.013)
−0.145∗∗∗
(0.028)
0.0002∗∗∗
(0.0001)
−0.00003∗∗
(0.00001)
−0.130∗∗∗
(0.026)
0.099∗∗∗
(0.010)
0.020∗∗
(0.008)
−0.267∗∗∗
(0.030)
0.0004∗∗∗
(0.0001)
−51.669∗∗∗
(2.349)
108,300
0.036
0.036
(2)
0.415∗∗∗
(0.024)
0.224∗∗∗
(0.057)
−0.078∗∗∗
(0.025)
0.038∗∗∗
(0.002)
0.00000∗∗∗
(0.000)
0.006∗∗∗
(0.001)
0.001
(0.002)
−0.0002
(0.002)
0.008∗∗∗
(0.002)
0.119∗∗∗
(0.029)
−0.388∗∗∗
(0.065)
0.0004∗∗∗
(0.0001)
−0.0001∗∗∗
(0.00003)
−0.218∗∗∗
(0.059)
0.178∗∗∗
(0.024)
0.038∗∗
(0.018)
−0.301∗∗∗
(0.068)
0.002∗∗∗
(0.0002)
−88.131∗∗∗
(5.396)
108,300
0.019
0.019
19
|
1807.00382 | 1 | 1807 | 2018-07-01T19:49:04 | Survey of Graph Analysis Applications | [
"cs.SI",
"physics.soc-ph"
] | Recently, many systems for graph analysis have been developed to address the growing needs of both industry and academia to study complex graphs. Insight into the practical uses of graph analysis will allow future developments of such systems to optimize for real-world usage, instead of targeting single use cases or hypothetical workloads. This insight may be derived from surveys on the applications of graph analysis. However, existing surveys are limited in the variety of application domains, datasets, and/or graph analysis techniques they study. In this work we present and apply a systematic method for identifying practical use cases of graph analysis. We identify commonly used graph features and analysis methods and use our findings to construct a taxonomy of graph analysis applications. We conclude that practical use cases of graph analysis cover a diverse set of graph features and analysis methods. Furthermore, most applications combine multiple features and methods. Our findings motivate further development of graph analysis systems to support a broader set of applications and to facilitate the combination of multiple analysis methods in an (interactive) workflow. | cs.SI | cs |
Survey of Graph Analysis Applications
Tim Hegeman
Alexandru Iosup
Delft University of Technology
Vrije Universiteit Amsterdam
[email protected]
[email protected]
July 3, 2018
Abstract
Recently, many systems for graph analysis have
been developed to address the growing needs of
both industry and academia to study complex
graphs.
Insight into the practical uses of graph
analysis will allow future developments of such sys-
tems to optimize for real-world usage, instead of
targeting single use cases or hypothetical work-
loads. This insight may be derived from surveys
on the applications of graph analysis. However,
existing surveys are limited in the variety of ap-
plication domains, datasets, and/or graph analysis
techniques they study. In this work we present and
apply a systematic method for identifying practical
use cases of graph analysis. We identify commonly
used graph features and analysis methods and use
our findings to construct a taxonomy of graph anal-
ysis applications. We conclude that practical use
cases of graph analysis cover a diverse set of graph
features and analysis methods. Furthermore, most
applications combine multiple features and meth-
ods. Our findings motivate further development
of graph analysis systems to support a broader set
of applications and to facilitate the combination of
multiple analysis methods in an (interactive) work-
flow.
1
Introduction
Graph analysis is used across many application do-
mains to interpret complex webs of relationships
and connections formed by people, roads, finan-
cial transactions, etc. Understanding the practi-
cal uses of graph analysis is key to tuning existing
graph analysis systems and guiding the develop-
ment of new systems. However, this understand-
ing requires knowledge of applications from many
domains, including the datasets and graph analy-
sis methods they use. Existing surveys focus on
studying in-depth the datasets and analysis meth-
ods used in a single domain [1,12,27,63,69], identi-
fying applications of specific (classes of) graph al-
gorithms [17, 20, 25], or exploring a variety of ap-
plication domains [10, 18]. In contrast, we identify
applications across a large number of application
domains and characterize the datasets and graph
analysis methods used in practice.
To facilitate the growing need for analyzing
graphs, many graph analysis systems have been de-
veloped1. Most systems target generic applications
of graph analysis, e.g., by providing a generic pro-
gramming model like Pregel [52], without explicitly
considering the characteristics of real-world appli-
cations. However, the performance of graph anal-
ysis applications depends a combination of three
characteristics [29, 38], known as the PAD-triangle:
the platform, the algorithm, and the dataset. Thus,
when developing and tuning graph analysis plat-
forms, knowledge of the algorithms and datasets
used in practice is essential to achieving good per-
formance across many applications.
To address the gaps in knowledge left by previous
work, we pose our main research question: What
are the characteristics of the datasets and analy-
sis methods used in practical applications of graph
analysis? We further define two sub-questions:
How to identify practical applications of graph anal-
ysis? and How to characterize graph datasets and
graph analysis methods?
In this work we make
three contributions to answer these questions:
1. We present a systematic method for identifying
practical use cases of graph analysis (Section 2)
and apply this method to find a set of graph
analysis application (Section 3).
2. We identify commonly used graph features
(Section 4) and classes of graph analysis meth-
ods (Section 5). Based on these common ele-
ments, we present a taxonomy of graph analy-
sis applications (Section 6).
3. We propose directions for future research in the
development of graph analysis systems (Sec-
tion 7).
1Doekemeijer et al. [21] identified over 80 parallel graph
processing frameworks between 2004 and 2014.
1
2 Method for Finding, Select-
ing, and Characterizing Rel-
evant Material
Applications of graph analysis can be found across
many application domains and use a wide range
of datasets and algorithms. In this section we de-
fine a method for finding and selecting literature
on graph analysis applications and for characteriz-
ing their datasets and methods.
2.1 Selection of a Comprehensive
Method
Three common methods used to conduct litera-
ture surveys are: unguided traversal of the mate-
rial, snowballing [83, 86], and the Systematic Liter-
ature Review method proposed by Kitchenham et
al. [44] Unguided traversal of the material is the
simple process of reading as much as possible of
the topic starting from a seed set of articles (e.g.,
provided by the supervisor) and continuing with
as many articles as the reader can find using the
typical repositories and search tools for scientific
literature. For example, the reader could pursue
every relevant link in each article read, or check all
articles in the best conferences and journals in the
past decade. The unguided element of the method
comes from the lack of definition of stop and search
criteria. The decision of which articles to select
for review from the set of found articles is left en-
tirely to reader and is not guided by a set of selec-
tion criteria. The snowballing method uses similar
mechanisms, but imposes guidance elements such
as criteria for finding and selecting material.
The Systematic Literature Review method of
Kitchenham et al.
is a comprehensive method for
conducting literature reviews. As summarized in
Table 1, the methods consists of three major stages:
planning, conducting, and reporting. Each of these
stages is comprised of a set of steps whose appli-
cation depends on the application domain and the
specific goals of the survey. The stage of conduct-
ing the review in the SLR method includes at least
three important elements: identifying the reposito-
ries and search engines that can deliver relevant ma-
terial, defining a set of specific keywords (queries)
used as automated selection criteria for relevant
material, and defining a procedure for manually se-
lecting truly relevant material from the set obtained
through automated search.
We compare qualitatively these three methods,
considering two criteria: the scale of the resulting
dataset, and selection bias. The unguided traversal
method can yield any amount of material, but it has
an implicit selection bias towards material already
known to the reader by relying on the reader to
select directions for searching material. The snow-
balling method results in a large body of relevant
material with a minor selection bias caused by the
choice of a seed set of relevant material. The SLR
method yields a limited set of relevant material and
avoids a selection bias through a systematic search.
To make a selection, we first specify the desired
outcomes for the two criteria. We prefer a limited
number of articles because we would like to do an
in-depth manual inspection of each, and we envi-
sion a large number of application domains (many
of which we do not know) which requires a lack
of selection bias. Therefor, we select the System-
atic Literature Review method of Kitchenham et
al. which best meets our criteria. In the remainder
of this work, we follow the steps of the method as
listed in Table 1 where applicable. Notably absent
in our approach is the "study quality assessment"
step. The quality of the work presented in sur-
veyed material is largely irrelevant to our analysis;
we consider only the datasets and graph analysis
methods used and do not investigate how well these
methods perform with respect to other approaches
in a given domain.
2.2 Identification and Selection of
Literature
To identify relevant literature we considered typ-
ical search engines for scientific literature, as rec-
ommended by the SLR method. Due to the wide
range of application domains that potentially use
graph analysis, we excluded any search engine ded-
icated to specific fields. We selected Google Scholar
for its extensive corpus and open access. We used
eight queries to search for relevant material as listed
in Table 2. For each query we retrieved the first 100
search results for further inspection. We conducted
our search during January 2018.
Our search queries were formulated to match a
wide range of possible applications, but they also
match a large volume of irrelevant material. We
used manual selection to extract all relevant lit-
erature from the body of search results. We se-
lected all articles that explicitly describe the use
of one or more algorithms or methods for graph
analysis as a primary contribution to address their
research question(s). We specifically exclude sec-
ondary studies, books, and theses because they typ-
ically present multiple applications and inclusion of
these applications may have led to overrepresenta-
tion of the corresponding application domain. We
also exclude articles presenting a system or algo-
rithm for graph analysis unless they target a spe-
2
Table 1: Overview of steps that comprise the Systematic Literature Review method by Kitchenham et
al. [44] The steps we apply in this work are indicated by a checkmark () and we list the section(s)
implementing the step (if applicable).
Planning the review
Identification of the need for a review (S. 1)
Commissioning a review
Specifying the research question(s)
Developing a review protocol
Evaluating the review protocol
(S. 1)
(S. 2.1)
Conducting the review
Identification of research
Selection of primary studies
Study quality assessment
(S. 2.2)
(S. 2.2)
Reporting the review
Data extraction and monitoring
Data synthesis
Formatting the main report
Evaluating the report
Specifying dissemination mechanisms
(S. 2.3, 3, 6)
(S. 4-6)
Table 2: Search queries used to identify relevant literature. (cid:63)Three articles were retrieved via two search
queries.
ID Query
# Selected # Analyzed
Q1
Q2
Q3
Q4
Q5
Q6
Q7
Q8
graph analysis
graph analytics
graph mining
graph processing
network analysis
network analytics
network mining
network processing
Total:
39
4
19
3
15
6
12
1
96(cid:63)
34
3
14
2
7
2
1
0
60(cid:63)
cific application (domain).
The results of the identification and selection pro-
cess are summarized in Table 2. From 800 search
results we selected 96 relevant articles (12%). We
further reduced this set to 60 articles for in-depth
analysis through manual selection while preserving
the diversity of application domains among selected
articles.
2.3 Analysis of Selected Material
To analyze the selected material we used a three-
step process. The primary purpose of this process is
characterizing the datasets and methods for graph
analysis used in practice. First, we scanned each
selected article to summarize the application it de-
scribes (presented in Section 3). We also identified
any notable features of the dataset and the primary
method of graph analysis used by each application.
Second, we derived a list of common (classes of)
graph features (Section 4) and graph analysis meth-
ods (Section 5) from the initial analysis performed
in the first step. Third, we extracted from each se-
lected article the graph features and graph analysis
methods they use. The resulting data was used to
construct a taxonomy as presented in Section 6.
We manually classified the graph features present
in each application. Due to a combination of fre-
quently used terms (e.g., many articles refer to both
"directed" and "undirected" graphs) and features
not explicitly identified by the authors (e.g., vertex
and edge properties, heterogeneity), keyword-based
3
search as primary classification method was not
feasible. Where plausible we used keyword-based
search to validate the results of the manual inspec-
tion process (used keywords are listed in Section 4
where applicable).
To classify the graph analysis methods used by
each application, we used search queries for most
classes of methods (listed in Section 2 where appli-
cable), followed by manual inspection of the context
of each search result to rule out false positives. We
supplemented these results with the list of primary
methods extracted during the initial scan of each
article, especially for (classes of) methods with-
out well-defined terminology (e.g., no suitable key-
words for the "graph mutation" class were found
due to the ubiquity of candidates such as "reduc-
tion", "merge", "mutate"). Some atypical meth-
ods for graph analysis may have been missed in
our classification process if such a method was not
identified as the primary method of analysis of an
article.
2.4 Threats to Validity
Although we selected our method to identify rele-
vant graph analysis applications from a broad range
of domains, the specifics of our search strategy in-
troduces three potential biases. First, we restrict
our search to scientific literature, so we do not iden-
tify any commercial applications if their methods
have not been published. Second, we restrict our
search to English literature, which may exclude ap-
plications that are not well-known in the English-
speaking scientific community. Third, some of our
search queries show a strong correspondence with
specific types or analysis, e.g., "mining" returns
many application of pattern matching or subgraph
isomorphism, whereas "network analysis" often oc-
curs in the phrase "social network analysis", refer-
ring to a common set of graph analysis methods.
3 Applications
In this section we present the graph analysis ap-
plications we have selected and characterized using
the method presented in Section 2. Applications
are grouped by application domain.
3.1 Biology
Biological networks are used to study the interac-
tions of numerous biological entities, including pro-
teins, genes, and organisms. We present in turn the
biological applications we characterized.
Protein-protein interaction networks: Li et
al. [50] propose an algorithm to identify protein
complexes in protein-protein interaction networks.
Their Local Clique Merging Algorithm (LCMA) it-
eratively identifies local cliques and merges them if
they overlap significantly (i.e., are similar).
Gene regulatory networks: Pinna et al. [65]
address the problem of deriving a gene regulatory
network from observed gene expression levels. The
authors construct a network of genes and inferred
edges with weights signifying an initial estimate of
the probability of an edge's existence. Edges with a
probability below some threshold are removed from
the network. Using strongly connected compo-
nents, the authors identify unessential edges (feed-
forward edges) to derive a final regulatory network.
[45]
present an algorithm for identifying common pat-
terns in graph-based representations of metabolic
pathways. Their graphs contain one vertex for ev-
ery unique enzyme in a pathway and edges for in-
teraction between those enzymes. By mining the
metabolic pathway graphs of multiple organisms for
frequent subgraphs, the authors are able to identify
sub-pathways common to many organisms.
Metabolic networks: Koyturk et al.
Tissue modeling: Bilgin et al. [7,8] classify tis-
sue samples by segmenting tissue images to iden-
tify cells, linking those cells in cell graphs, comput-
ing various graph theoretical measures for each cell
graph, and applying machine learning techniques.
They apply variations of this method to detect can-
cer in breast tissue [8] and bone tissue [7].
Microbial communities: Barber´an et al. [3]
study the co-occurrence of microbes. Their network
consists of vertices corresponding to microbes and
edges corresponding to statistically significant cor-
relation in occurrence across soil samples. Based on
several network measures, e.g., average path length,
and a comparison of the network's structure to a
random graph, the authors find a distinct separa-
tion between two types of microbes: generalists and
specialists.
Protein assembly: A typical approach to iden-
tifying proteins involves collecting information on
the peptide fragments (i.e., parts of a protein) in a
sample and assembling these fragments to find pro-
teins that could have been present in the sample.
Zhang et al. [91] solve the assembly problem using
a bipartite graph: observed peptides and poten-
tial proteins are mapped to vertices and an edge is
added between a peptide and all proteins it is part
of. To find likely candidates for proteins present in
the sample, the authors reduce the resulting graph
by merging vertices with identical connections, ex-
tract all connected components, and use a greedy
set cover algorithm to find a set of proteins that
4
cover all observed peptides.
3.3 Security
Other: Royer et al.
[71] propose the Power
Graph Analysis method for compressing biological
networks. They identify three basic motifs found
in many networks:
stars, cliques, and bicliques.
By iteratively identifying motifs and replacing sub-
graphs with power nodes, the authors achieve com-
pression rates of up to 85% without losing informa-
tion for a variety of biological networks.
3.2 Neuroscience
The human brain consists of an estimated 100 bil-
lion neurons and 1 quadrillion synapses. Although
these neurons and synapses naturally comprise a
brain network, this network is difficult to collect
and analyze due to the small scale of the neu-
rons and the large scale of the resulting network.
Instead, brain networks used for practical neuro-
science applications consist of brain regions and
their communication paths.
Brain networks collected using fMRI are typi-
cally undirected and weighted, with each weight
representing the level of communication between
two brain regions. These weighted graphs are typ-
ically converted to unweighted graphs by dropping
all edges with a weight below some threshold. The
resulting graph can be analyzed for typical small-
world properties: high average clustering coefficient
and relatively low characteristic path length [82].
Medical conditions that have been studied using
this technique include Alzheimer's disease [74, 77],
brain tumors [4], and traumatic brain injury [13].
Weighted networks can also be studied directly, as
done by Stam et al. [76] for Alzheimer's disease pa-
tients. The authors further study two damage mod-
els, Random Failure and Targeted Attack, through
simulation and find that the Targeted Attack model
best approximates the deterioration in brain con-
nectivity observed in AD patients.
A directed brain network can be obtained from
EEG recordings of electrical activity in the cerebral
cortex. This type of network has also been shown
to have typical small-world properties [90]: high
average clustering coefficient and low average path
length. Various studies have shown deviations in
connectivity when affected by certain medical con-
ditions. For example, patients with epilepsy have
more regular (i.e., not centralized) activity between
brain regions during a seizure [85]. Spinal cord in-
jured patients show larger levels of internal organi-
zation and fault tolerance, possibly as compensa-
tion triggered by the injury [24].
Graph analysis powers a variety of security appli-
cations, most notably to identify vulnerabilities or
anomalies in computer networks.
Network vulnerability analysis: Phillips et
al. [64] present a system for analyzing vulnerabil-
ities in computer networks using attack graphs.
They generate attack graphs from attack templates,
i.e., specifications of the pre- and post-conditions of
an attack. These templates are combined in a graph
in which each node represents a combination of ma-
chines, users, and/or permissions that the attacker
has obtained and each edge represents an action
that may be performed by the attacker to compro-
mise a new machine, obtain more permissions, etc.
A cost or probability of success may be associated
with each edge to study the most likely paths of
intrusion. The authors further describe a variety of
techniques to improve security using their system,
including selecting from a set of possible security
measures the most cost effective, or determining a
minimal set of monitors to place such that each at-
tack may be detected by multiple monitors.
Noel et al. [61] define a suite of metrics to quan-
tify the vulnerability of a network based on its at-
tack graph, including three metrics based on graph
theoretical properties. First, they identify weakly
connected components. The presence of separate
components in the attack graph is indicative of a
lack of vulnerabilities between multiple sets of ma-
chines in the network. Second, they identify cycles.
Infecting any machine in a cycle gives indirect ac-
cess to all other machines in the cycle, which repre-
sents a larger surface area for attacks. Third, they
compute the diameter. A large diameter implies a
large number of actions that an attacker needs to
take to compromise the entire network.
Malware detection: Kwon et al.
[46] ana-
lyze download graphs to identify droppers, malicious
programs that download other programs (i.e., mal-
ware, or other droppers) to a host machine. The
download graph consists of programs as vertices,
and download relationships as edges. The authors
extract subgraphs, called influence graphs, rooted
in a single program vertex and containing all other
programs that have been directly or transitively
downloaded by the root program. The authors use
a variety of metrics to summarize each influencer
graph and use machine learning techniques to clas-
sify the root of each influence graph as a legitimate
program or a dropper.
Polonium [15] detects malware by analyzing a
large, bipartite graph of machines and files found on
those machines. Polonium uses a belief propagation
algorithm to estimate the probability of a file being
5
malicious. This algorithm is seeded with external
data on machine reputation and known malicious
files.
Botnet detection: Millions of computers
worldwide have been infected by malicious soft-
ware and are now part of networks of infected hosts
called botnets. Many such botnets rely on peer-to-
peer (P2P) communication to spread commands to
members of the network. Nagaraja et al. [56] pro-
pose a method for identifying a P2P botnet in a
communication graph, i.e., a graph in which every
host is a vertex and two vertices are connected by
an undirected edge if the corresponding hosts have
communicated during some period of time. First,
the authors use random walks on the communi-
cation graph to distinguish fast-mixing hosts (i.e.,
likely members of a P2P network) from slow-mixing
hosts. Next, the vertices are clustered into sub-
graphs using k-means, and the nodes are clustered
using an extension of SybilInfer [CITE], an algo-
rithm based on random walks to extract a strongly
connected group of nodes from a graph.
Anomaly detection: Jiang et al. [41] analyze
DNS traffic to identify anomalies. They model DNS
failures as a bipartite graph mapping hosts that
have issued at least one failed DNS request to do-
main names they have queried. Using a matrix
factorization algorithm (tNMF), the authors de-
compose the DNS failure graph into communities
of hosts and domains. They analyze each commu-
nity and identify typical structures: stars and bi-
meshes. Further, they track the evolution of com-
munities over time.
Video surveillance: Calderara et al. [14] use
spectral graph theory to analyze trajectories of peo-
ple observed by video surveillance. The physical
space observed in the video is quantized and the
observed trajectories are translated to sequences of
quantized locations. A graph is constructed with
nodes representing a transition from one location to
another and weighted edges representing the possi-
bility of moving from one location to another loca-
tion via precisely one intermediate location (shared
by the source and target node). Spectral graph the-
ory is used to filter out noisy trajectories from the
graph and to determine if a new trajectory is either
consistent with earlier observation or anomalous.
3.4 Software Engineering
Graphs occur naturally in various aspects of soft-
ware development, e.g., call graphs, control flow
graphs, dependency graphs. We describe several
applications of graph analysis in software develop-
ment and related activities.
Identifying and locating software bugs:
Cheng et al. [16] localize bugs by mining software
behavior graphs. Execution traces of a program
are captured as method-level or block-level behav-
ior graphs in which each vertex presents a method
or basic block, respectively. Edges in software be-
havior graphs can capture a variety of control flow
relationships, e.g., one method calling another. The
authors capture behavior graphs from multiple exe-
cutions of the same program and label which behav-
ior graphs correspond to faulty executions. Next,
they mine the most discriminative subgraph(s) to
localize the difference(s) in execution between cor-
rect and faulty behavior.
Maxwell et al. [53] identify memory leaks in heap
dumps by mining recurring patterns of object ref-
erences. Their heap graph representation contains
a vertex for every object in the heap dump and an
edge for every reference. The authors first reduce
the graph by extracting the dominator tree and us-
ing graph grammar reduction to compress typical
(recursive) patterns. Next, they mine frequent sub-
graphs to identify potential memory leaks.
Eichinger et al. [23] locate software bugs in call
graphs using graph mining. Their approach first re-
duces call graphs by identifying sequences of identi-
cal calls and merging the corresponding subgraphs.
Edge weights are introduced to capture the frequen-
cies of calls. Next, the authors use weighted fre-
quent subgraph mining to identify differences be-
tween successful and unsuccessful executions, thus
revealing potential locations of bugs.
Defect prediction: Zimmermann et al. [92] use
network measures on software dependency graphs
to identify critical binaries and predict defects.
They find significant correlation between several
network measures (e.g., eigenvector and degree cen-
trality) and the number of defects in a binary. They
find that network measures are able to predict 60%
of defects, compared to 30% for traditional software
complexity measures.
Diagnosing distributed systems: G2 [30] is
a graph processing system for analyzing large soft-
ware execution graphs, i.e., graphs describing sys-
tem events and their relationships. G2 can be pro-
grammed to perform custom queries on an execu-
tion graph. Underlying these queries are two key
operations: slicing (i.e., extracting all events that
are causally related to a queried event) and hier-
archical aggregation (i.e., merging a set of related
events into a single event).
Software plagiarism detection: GPLAG [51]
detects software plagiarism by representing pro-
grams as program dependence graphs. Statements
in the program are encoded as vertices, and control
flow and data dependencies are encoded as directed
edges. Type information is encoded as vertex and
6
edge properties. Commonalities between two pro-
gram are detected using subgraph isomorphism.
Developer collaboration: Surian et al. [78]
analyze the SourceForge collaboration network to
discover how well connected developers are, what
topological structures characterize developer com-
munities, etc. The authors first identify connected
components and mark each as either a small or a
large community. Second, they mine common pat-
terns among the small communities. Third, they
compute the frequency of each pattern in both the
small and large communities.
3.5 Logistics & Planning
Navigation systems are a stereotypical example of
real-world graph analysis applications. More gen-
erally,
logistics and planning problems are often
solved using graphs.
Road networks: Urban street networks can be
naturally modeled as a graph; intersections can be
mapped to vertices and the roads connecting in-
tersections can be mapped to edges. This is typi-
cally referred to as the primal graph representation.
For some applications an alternative representation
may be preferred. The dual graph representation
maps roads to vertices and intersections to edges.
Porta et al. describe various methods for analyz-
ing both the primal [67] and dual [66] urban street
graphs.
TrajGraph [35] uses graph-based visual analytics
to study traffic in urban street networks, in par-
ticular using taxi route data. It uses partitioning
techniques to reduce the size of the graph for vi-
sualization purposes. Further, TrajGraph provides
automated analysis of traffic to identify hubs at dif-
ferent points in time. Finally, it allows users to
highlight arbitrary areas (i.e., subgraphs) to ana-
lyze local traffic.
General planning problems: GraphPlan [9]
represents a planning problem as a Planning Graph,
a leveled DAG in which nodes represent propo-
sitions (states?), edges represent action, and lev-
els represent timesteps in the produced plan. The
graph is dynamically constructed and pruned one
level at a time. A custom heuristic-based traversal
algorithm is used to find valid plans.
Hong et al. [34] propose a goal graph-based ap-
proach to goal recognition, loosely based on Graph-
Plan. They use an iterative two-stage algorithm to
repeatedly extend the goal graph based on observed
actions, followed by the identification of plans and
goals that are consistent with the new graph.
Helmert [32] proposes a greedy algorithm based
on a causal graph for planning problems. The
causal graph encodes state variables as vertices
and possible causal relationships as directed edges
(i.e., an edge from vertex A to vertex B indicates
that the value of state variable B may depend on
the value of state variable A). Further, every state
variable has an associated domain transition graph
with a vertex for every possible value of the vari-
able and a directed edge for every transition, an-
notated with the preconditions for the transition.
A plan is found using a heuristic-based traversal of
the causal graph. The heuristic includes repeated
shortest path searches on domain transition graphs.
Network routing: Daly et al. [19] apply social
network analysis to routing in mobile ad hoc net-
works (MANETs). Routing in MANETs is chal-
lenging because the network graph is rarely con-
nected. Efficiently delivering messages requires
identifying devices that are likely to connect to
many other devices, thus quickly spreading the
message through the network. By using network
analysis techniques, the authors identify devices
in the network with high betweenness (i.e., short
routes to many other devices) as key candidates for
spreading messages.
3.6 Social Sciences
Communication between people has long been stud-
ied to understand how groups of people interact.
One-on-one communication methods, including (e-
)mail, phone calls, and text messaging, can be mod-
eled as a social interaction network in which each
vertex represent a person and edges represent that
two people have communicated. Similarly, social
media platforms like Facebook and Twitter natu-
rally comprise a social interaction network, often
with additional information on types of interactions
(friendships, follower-relationships, likes, etc.).
Schwartz et al. [75] analyze a directed interaction
graph derived from mail traffic to discover shared
interests. They apply typical SNA techniques, in-
cluding extracting the largest weakly connected
component, computing the diameter, average path
length, etc. Further, they cluster the graph using
Aggregate Specialization Graph Isolation and Spe-
cialization Subgraph Derivation to identify commu-
nities with shared interests.
Recently, many studies have analyzed the Twit-
ter graph to identify important users (influencers),
authoritative users, etc. For example, TURank [87]
ranks Twitter users based on authority scores.
These scores are computed using a variation of
PageRank, called ObjectRank, on the user-tweet
graph consisting of users, tweets, follow relation-
ships, post relationships, and retweet relationships.
Khrabov et al. [43] identify influential Twitter users
using a combination of PageRank and a custom
7
ranking based on a user's number of mentions. By
using dynamic metrics, they identify key users by
periods of consecutive, accelerated growth in in-
fluence. Yang et al. [88] analyze retweets using
a variation of the HITS algorithm to identify in-
teresting posts, i.e., posts that may be of interest
to a wider audience than the direct neighborhood
of the user who posted it. They first identify au-
thoritative users in the user-retweeted-user graph,
and next identify interesting tweets based on the
authority of their creator and retweets. They con-
clude that, by considering both users and retweets,
their method performs better than consider only
retweets.
3.7 Psychology
Mota et al. [55] analyze speech graphs derived from
dream reports produced by schizophrenic, bipolar,
and control subjects. A speech graph consists of
a node for every unique word in a body of text
and a directed edge for every consecutive pair of
words. By comparing 14 attributes (e.g., largest
connected component, repeated and parallel edges,
cycles, clustering coefficient) of each speech graph,
the authors achieve high accuracy in classifying the
group of a subject based on their dream report.
Verbal fluency tests are used to assess a person's
ability to produce a sequence of words satisfying
some task. For example, in a category fluency test,
the subject is asked to list as many words fitting
the given category as they can in a limited time.
By converting this sequence of words to a speech
graph, the subject speech patterns can be analyzed.
Lerner et al. [49] study the results of category flu-
ency tests taken by adults with mild cognitive im-
pairment (MCI), with Alzheimer's disease (AD), or
neither. They merged the speech graphs of all sub-
jects in the same subject group. Analysis of the
three resulting graphs, one for each subject group,
reveals that they have typical small-world proper-
ties, but that those properties are less prevalent for
the MCI and AD groups. This is consistent with
earlier research. Bertola et al. [5] perform a simi-
lar study, but analyze each subject's speech graph
individually. Using an extensive set of graph mea-
sures, they can accurately classify a subject to be
in one of the three subject groups.
3.8 Science
By virtue of the incremental nature of scien-
tific progress, publications naturally form networks
through the citations that connect them. Such ci-
tation networks have been studied for many sci-
entific communities. Jacovi et al. [39] apply so-
cial network analytics techniques to study the ci-
tation graph of the CSCW conferences and related
work. They identify communities and track their
evolution over time. Further, they identify chasm-
papers; papers that were influential outside the
CSCW conferences, but overlooked in the CSCW
community. Gondal [28] analyzes a citation net-
work for an emergent research field.
In addition
to small-world properties, the author considers the
presence of various patterns, including stars, papers
sharing a large number of cited authors, and pa-
pers citing primarily authors from a single country.
Tsatsaronis et al. [80] apply Power Graph Analy-
sis, a method originally developed to analyze and
visualize biological networks, to study the DBLP
citation network and its evolution.
3.9 Chemistry
Molecules can be represented by graphs with atoms
as vertices and the bonds connecting atoms as
edges. Large databases of such molecular graphs
and the properties of the associated molecules have
been compiled and are used in, e.g., pharmaceu-
tical research to identify (fragments of) molecules
with desirable properties for a new drug. Nijssen
et al. [60] propose a method based on frequent sub-
graph mining to extract common molecule frag-
ments from a set of molecules. This method may
be used to identify molecule fragments that charac-
terize a set of input molecules sharing a desirable
property. Wegner er al. [84] propose a method for
classifying molecules by mining their corresponding
molecular graphs for maximum common substruc-
tures.
3.10 Finance
Iori et al. [37] study overnight inter-bank traffic of
Italian banks between 1999 and 2002. They define
a temporal graph in which each vertex corresponds
to a bank and each edge indicates that at least one
transfer occurred between two banks during the
selected time period. Each edge is further anno-
tated with the number and total volume of trans-
fers. After analyzing various network measures, the
authors conclude that while some microstructure
characteristics were found (e.g., degree correlates
strongly with the size of the bank), the network is
somewhat random, which is indicative of an effi-
cient system. Wang et al. [81] use a different ap-
proach to study financial data as time series. They
apply visibility graph analysis to study four time se-
ries related to China's quarterly economic growth
between 1992 and 2010. They identify small-world
properties in all corresponding graphs.
8
3.11 Linguistics
Jiang et al. [40] propose a graph-based approach
to document classification. Each document is rep-
resented by a graph containing a variety of vertex
types (e.g., word, part of speech) and edge types
(e.g., part of speech to a word, word order). The
authors use frequent subgraph mining on document
sets to group documents that share similar, un-
common phrasing. Biemann [6] proposes Chinese
Whispers, a graph clustering algorithm designed to
address various natural language processing prob-
lems. Example applications studied with Chinese
Whispers include language separation (i.e., detect-
ing languages in word co-occurrence graphs) and
word class acquisition (i.e., clustering a word co-
occurrence graph to detect classes of words).
3.12 Other
We identified several other applications of graph
analysis that do not fit any of the previously dis-
cussed application domains.
Cardiographs: Jiang et al. [42] study the im-
pact of meditation on heartbeat dynamics using
visibility graph analysis. They monitor the heart
rate of volunteers before and during mediation.
The authors find that meditation causes significant
changes in heartbeat rhythms.
Geometric constraint problem: Geometric
constraint problems describe sets of geometric en-
tities (e.g., points, lines) and constraints between
pairs of entities (e.g., distance, angle) with the pur-
pose of assigning to each object a position, orienta-
tion, etc. such that all constraints are met. Lee et
al. [48] propose an approach based on graph reduc-
tion. Their algorithm initially constructs a graph
containing each geometric entity as a vertex and
each constraint as an edge. Next,
it iteratively
identifies clusters based on degrees of freedom anal-
ysis (typically small cycles) and collapses them to
a single pseudo-geometric entity until the graph is
reduced to a single vertex.
Knowledge-based systems: Rodriguez [70]
analyzes the relationships between datasets main-
tained by the Linked Data community. They create
a graph in which every vertex represents a dataset
and every directed edge indicates a reference from
one dataset to another. They identify strongly
connected communities that correspond well with
known domains (e.g., biology, computer science).
Recommendation systems: Mirza et al. [54]
propose a method for evaluating recommendation
systems by interpreting their outcomes as a pair
of graphs: a social graph comprised of all users
and a bidirectional edge for every pair of similar
users, and a recommender graph which extends the
social graph with all recommended artifacts. By
analyzing the connected components in the recom-
mender graph and comparing average path lengths
from users to artifacts between the recommender
graph and a random graph, the authors evaluate
the effectiveness of a recommendation algorithm.
Seismology: The visibility graph analysis
method has been applied to seismology data to
varying success. For example, analyzing earth-
quakes in Italy between 2005-2010 reveals a long-
range correlation in their magnitudes [79]. How-
ever,
time-clustering was not detected by the
method.
Video analysis: Yeung et al. [89] use a Scene
Transition Graph to represent shots (as vertices)
and the transitions between them (as directed
edges). The authors identify strongly connected
components as scenes in the analyzed video.
Web usage mining: Website operators track
the browsing patterns of visitors to study how vis-
itors interact with the website, and consequently
to identify changes that can be made to the web-
site to improve the browsing experience. Heydari
et al. [33] propose a graph-based approach to web
usage mining. They capture each visitor's traversal
through a website as a graph by representing web
pages as vertices and links followed from one page
to another as edges. Vertices are weighted by the
time a user spent on the corresponding page. The
authors mine a set of browsing graphs to identify
common browsing habits.
4 Graph Features
A graph is a structure consisting of a set of vertices
and a set of vertex pairs (edges). Graphs are typ-
ically used to represent a collection of entities and
their pairwise relationships. Many applications ex-
tend this model to encode additional information:
the strength of a relationship, specific properties
of an entity, differentiation of relationships types,
etc. In this section we identify several commonly
used graph features among the surveyed applica-
tions presented in Section 3. We present typical
use cases for each feature.
4.1 Edge Orientation
indi-
Edges in a graph may be either directed,
cating a one-way relationship between two ver-
tices, or undirected,
indicating a two-way rela-
tionship. The types of relationships used by the
surveyed applications are diverse and we did not
identify a clear classification of use cases of ei-
9
ther directed or undirected edges. However, we
highlight several recurring relationship types and
other observations. First, directed edges are fre-
quently used in applications that analyze sequen-
tial or causally-connected processes, such as trac-
ing movement through time [14], analyzing software
call graphs [23], finding valid plans in a planning
graph [9], or capturing a person's speech to under-
stand psychological disorders [5]. Directed edges
are also prevalent in sociology graphs to represent
social interactions that are typically initiated by
one party. For some types of graphs we found both
directed and undirected variations, e.g., some meth-
ods for measuring brain activity do not capture the
direction of communication, but other methods do.
4.2 Weighted Graphs
Keywords used to validate manual
weight, length, distance, strength.
inspection:
A typical extension of the graph model is the ad-
dition of weights to edges (and, less commonly, to
vertices). That is, the definition of a graph is ex-
tended with a function that maps every edge (or
vertex) to a single, typically real-valued, weight.
Although weights may be used to model any prop-
erty, we highlight two typical use cases of edge
weights.
First, edge weights are commonly used to rep-
resent the strength of a relationship. For exam-
ple, the edges in a brain network model com-
munication paths between two regions. Their
edge weights model the amount of activity, e.g.,
in [4,13,24,74,76,77,85]. Similarly, edges can model
the frequency of a relationship's occurrence, e.g.,
the number of calls made to a function [23], the
number of co-authored papers [80], or the number
of bank transfers [37].
Second, edge weights may be used to represent
the length or distance of a connection. The stereo-
typical example for this use of edge weights is road
networks.
In such a network, edges often repre-
sent roads and their weights represent the length
of roads (or the expected time taken to travel from
the start to the end of the road). This application
has been described in [67] and many introductory
text books on graph theory.
Only the first use case of edge weights as a mea-
sure of relationship strength was prevalent among
the application presented in Section 3. However,
shortest path queries, an important class of graph
analysis methods described in Section 5.2, operate
on either unweighted graphs or on weighted graphs
representing distances. To accommodate shortest
path queries on graphs with edge strengths, two ap-
proaches are commonly used. First, the weighted
graph may be converted to an unweighted graph
by removing all edges with a strength below some
threshold and removing the weights of all remaining
edges. This approach is frequently used for brain
networks [4, 13, 24, 74, 77, 85]. Second, the edge
strengths may be converted to lengths by defin-
ing the length of an edge to be the inverse of its
strength. Thus, strong edges are short and a path
along several strong relationships may be shorter
than a direct path via one weak relationship. This
approach has been applied to citation networks [58],
brain networks [72], etc.
4.3 Heterogeneous Graphs
By definition, graphs consist of one set of vertices
and one set of edges. In some graphs, all vertices
and edges are homogeneous. That is, they repre-
sent instances of one type of entity or relationship,
respectively. However, some applications include
multiple types of entities and relationship which are
combined in a single heterogeneous graph. These
types may be encoded in the graph representation
as vertex and edge labels2. To avoid confusion with
other uses of graph labels, we use the terms ver-
tex/entity type and edge/relationship type to distin-
guish types of entities and relationships modeled by
a heterogeneous graph.
Heterogeneity can have significant impact on the
structure of a graph. For example, some types of
relationships may only occur between two partic-
ular types of entities, some types of entities may
not be able to have direct relationships with other
types, and some types of relationships may be more
numerous than others. Each of these examples in-
troduces a bias in the number and location of rela-
tionships in a graph that can not be explained by
topological measures such as degree distribution.
Examples of heterogeneity in vertex types include
user and tweet vertices in a Twitter graph [87],
hosts and domain names in a DNS network [41], and
proteins and peptides in proteomics [91]. Examples
of heterogeneity in edge types include dependencies
between program statement in a call graph [51],
causal relationships in diagnosing distributed sys-
tems [30], and relationships between words in text
classification [40].
2In graph theory, labeling most commonly refers to as-
signing a unique label (or identifier) to every vertex/edge,
typically integers from the range [1, #vertices] or [1, #edges].
More generally, a vertex or edge labeling function assigns a
label to every vertex or edge, respectively, without restric-
tion.
10
4.4 Property Graphs
Weighted and heterogeneous graphs both extend
graphs with a function mapping vertices and/or
edges to a single weight or type. Property graphs
generalize this approach to an arbitrary number of
functions mapping to arbitrary values. Each func-
tion represents a property of the modeled entity or
relationship. For example, in a social network one
function maps each user vertex to its name and
another function maps each friendship edge to the
date the friendship was formed.
In our characterization, we use a more restricted
definition of property graphs; an application is
characterized as using property graphs if and only
if the analysis of the graph uses the values of these
properties. Although the entities and relationships
of almost all applications have properties, these
properties are not typically used in the analysis of
the corresponding graph. For example, a social net-
work application may identify communities by con-
sidering only the edges present in the graph and
not considering the name, date of birth, or other
personal information of each user. This application
can use any graph analysis system without support
for property graphs. Thus, we do not consider such
an application to have a property graph.
Examples of property graphs include chemical
structure graphs annotated with atom and bond
characteristics [60, 84], and an attack graph anno-
tated with pre- and post-conditions for modeling
attack vectors in a compute network [64].
4.5 Temporal Graphs
Keywords used to validate manual inspection: tem-
poral, timestamp, evolution.
In many real-world applications, graphs evolve
over time as the entities and relationships captured
in these graphs change. Most surveyed applica-
tions do not address this evolution in their analysis;
the graphs analyzed by these applications represent
snapshots of the real-world networks they model.
In contrast, some applications use the temporal na-
ture of their graphs explicitly, e.g., to study the evo-
lution of the network. Graphs that include tempo-
ral data (e.g., the time at which a relationship was
established) are known as temporal graphs3.
We identify three use cases for temporal graphs.
First, they are used to study the evolution of re-
lationships in networks. For example, a citation
3In our taxonomy we classify an application as using tem-
poral graphs if and only if the application explicitly uses
timestamped data for analysis. That is, even if a graph con-
sists of timestamped data or data collected over a period of
time, it is not classified as a temporal graph if the temporal
data is not explicitly analyzed.
graph annotated with the publication date of each
paper can reveal how scientific communities inter-
act and co-evolve [39].
Second, some temporal
graphs have static structures but dynamic weights
or other properties, e.g., traffic data per hour in
a road network [35], or brain activity levels cap-
tured periodically [85]. Third, temporal graphs
may be used to study sequences of events connected
by causality relationships, e.g., communication via
messages in a distributed systems [30].
5 Methods for Graph Analysis
Many applications that operate on graphs use
graph analysis techniques to extract information
from a graph that is not evident from individual en-
tities or relationships. For example, the degree of a
single vertex in a social network graph may inform
us how many friends the corresponding user has,
but by analyzing all relationships in the graph, we
can determine whether the user is popular, how im-
portant they are for cohesion in the network, what
communities they are part of, etc. In this section
we characterize the methods for graph analysis used
by the applications presented in Section 3.
5.1 Neighborhood Statistics
Keywords used to identify uses: clustering coeffi-
cient, degree distribution, degree assortativity, local
efficiency, local subgraph.
Many graph-based applications use metrics to
quantify a graph's structural properties. We refer
to a common class of such metrics as neighborhood
statistics. These statistics are computed for each
vertex in a graph and depend only on the immedi-
ate neighborhood of a vertex4.
Two common neighborhood statistics are the de-
gree distribution and local clustering coefficient
of graph. The degree distribution of a graph is
used across many application domains (e.g., biol-
ogy [24], finance [81]) to support the hypothesis
that a graph's structure is different from a random
graph5. Similarly, the local clustering coefficient is
4The neighborhood of a vertex includes the vertex itself,
all vertices with an edge to or from the target vertex, and all
edges that connect two vertices included in the neighborhood
5Studies across many domains have found that their
graphs are power-law graphs, i.e., that the degree distri-
bution of the graph follows a power-law distribution. This
matches the observations of Barab´asi and Albert [2] who pre-
dicted the presence of power-law distribution across many
large complex networks. However, the "power-law hypoth-
esis" has frequently been argued against, including in a re-
cent study by Broido and Clauset [11] which found strong
evidence of power-law properties in only 4% of graphs they
analyzed.
11
commonly used to characterize a graph as "small-
world" [82], i.e., a graph consisting of clusters of
highly connected vertices and few interconnections
between clusters.
Less commonly used statistics include local ef-
ficiency [47] as a measure of efficient communica-
tion among a vertex's neighbors (e.g., in brain net-
works [13,24], road networks [66]) and degree assor-
tativity [59] as a measure of how likely high-degree
vertices are to be connected (e.g., in [37,66,70,81]).
The performance of neighborhood analysis is of-
ten sensitive to the structure of the input graph.
Graph analysis systems can benefit from exploiting
data locality if a vertex's neighborhood is small.
However, the presence of several highly connected
vertices (e.g., as found in power-law graphs) can
lead to a significant imbalance in computation re-
quired per vertex.
5.2 Paths and Traversals
Keywords used to identify uses: path length, short-
est path, breadth-first, depth-first, traversal, global
efficiency, random walk.
Many applications of graph analysis are not re-
stricted to the neighborhood of vertices, but instead
involve the analysis of paths between vertices. Of
particular interest are shortest path queries, i.e.,
identify a path of minimal total length between
given two vertices (or minimal number of edges in
unweighted graphs). Although these queries can
be answered individually using Dijkstra's algorithm
(or breadth-first search on unweighted graphs),
many applications require computing the shortest
path between multiple or all vertex pairs (e.g., us-
ing the Floyd-Warshall algorithm).
We identify three primary uses of shortest path
algorithms.
First, shortest paths can be used
directly, e.g., to find an attack path with the
highest probability of success in a network attack
graph [64]. Second, the average path length can
be used to identify "small-world" properties [82]
in a graph. Global efficiency [47], the inverse
of the average path length, is used to determine
the efficiency of communication between brain re-
gions [24], to identify potential software defects [92],
etc. Third, the maximum shortest path length
(diameter) and related metrics (e.g., eccentricity)
are used across many domains to study worst-case
paths.
We further identify two applications of path-
based graph analysis. First, the enumeration of
near-shortest paths (i.e., listing all paths between
two vertices that are no longer than ρ times the
shortest path for a given parameter ρ) is used to
identify a broad set of security vulnerabilities in
a network [64]. Second, the computation of num-
ber of shortest paths between two vertices (i.e., the
path multiplicity of a vertex pair) is computed as
a measure of flexibility in communication between
brain regions [90].
Closely related to path queries are graph traver-
sals, i.e., traversing through a graph from a source
vertex via its outgoing edges. Typical examples of
traversals include breadth-first search and depth-
first search, which are both commonly used as
building blocks in more complex methods of anal-
ysis.
In the applications presented in Section 3
we further identified the use of random walks
to identify sub-networks of bots in a larger net-
work [56], and domain-specific traversals used for
planning [9, 32, 34] and debugging distributed sys-
tems [30].
5.3 Connectivity
Keywords used to identify uses: connected compo-
nents.
Instead of identifying how vertices in a graph
are connected (i.e., discovering paths), some graph
problems are concerned with determining if ver-
tices are connected. The typical application of an-
alyzing the connectivity of a graph is identifying its
connected components. That is, dividing a graph
into components such that two vertices belong to
the same component if and only if a path exists be-
tween them. For directed graphs we distinguish two
types of connected components: weak and strong.
In a weakly connected component, any pair of ver-
tices is connected by an undirected path (i.e., a
path that treats every directed edge as though it
is undirected). In a strongly connected component,
directed paths exist from each vertex to every other
vertex in the component. We identify several use
cases of identifying connected components in the
reviewed articles.
First, some applications decompose their graph
into connected components to analyze components
individually.
For example, the largest compo-
nent(s) in a communication network [75] or DNS
failure graph [41] contain the vast majority of in-
teresting vertices. By extracting only those com-
ponents, any further analysis is not biased by a
large number of isolated vertices. For other applica-
tions all components are of interest, e.g., a match-
ing problem in a bipartite protein-peptide graph
can be split into one smaller sub-problem per con-
nected component [91].
Second, the number of components or size of
the largest component can be used as metrics to
classify graphs. For example, the fraction of ver-
tices that belong to the largest connected compo-
12
nent is a highly discriminative feature in classifying
breast [8] or bone [7] tissue samples for cancer di-
agnosis, or in classifying speech graphs [5, 55].
Third, a graph's components can be interpreted
as communities or otherwise related entities. For
example, strongly connected components in a scene
transition graph correspond to story units [89]
and components in a network attack graph corre-
spond to sets of servers with vulnerable intercon-
nections [61]. Other methods for detecting commu-
nities in a graph are presented in Section 5.4.
5.4 Centrality and Ranking
Keywords used to identify uses: centrality, PageR-
ank, ranking, HITS.
In most real-world networks, not all entities are
of equal importance to the network. Key to numer-
ous applications is identifying the most important
entities in a network. This is typically achieved by
assigning to each entity a score to signify its impor-
tance and deriving a ranking from these scores.
Most commonly-used measures of importance are
based on vertex- or edge-centrality. The centrality
of a vertex or edge is a measure of how important it
is to the structure of a network. Three commonly
used categories of centrality are betweenness cen-
trality, closeness centrality, and degree centrality,
as first popularized by Freeman [26] in the context
of social networks6. More recently, PageRank cen-
trality [62] has seen adoption across application do-
mains after first being used to identify important
websites in the Google search engine.
Other measures for ranking used by reviewed ap-
plications include:
information centrality in soft-
ware dependency graphs [92], straightness central-
ity in road networks [67], ObjectRank as adap-
tation of PageRank to a heterogeneous Twitter
graph [87], and Hyperlink-Induced Topic Search
(HITS) to identify hubs and authorities (e.g., on
Twitter [88]).
5.5 Clustering
Keywords used to identify uses: cluster(ing), com-
munity/communities.
Clustering is the act of identifying clusters (or
groups) of entities in a graph. Clustering tech-
niques are often used to extract groups of related
entities from a graph based on the relationships
6Although Freeman's centrality measures were defined in
earlier work by different authors, Freeman is often credited
for providing an intuitive conceptual interpretation of cen-
trality in the context of social networks and for identify-
ing three types of centrality that cover important structural
characteristics of social networks.
they have formed. Because the definition of "re-
lated entities" is application-specific, there exist
many specialized algorithms for clustering. Among
the surveyed applications, we identify two main ap-
proaches. First, some applications decompose a
graph into well-defined groups, e.g., connected com-
ponents [78, 89, 91] or cliques [50, 71, 80]. We refer
to this approach as rule-based clustering.
Second, applications can use community detec-
tion algorithms. Although there are many conflict-
ing definitions of communities, a community is typ-
ically characterized by a large number of internal
relationships and a small number of relationships
with entities outside the community. Applications
of community detection include grouping related
papers in a citation network [39], identifying city
regions [35], and finding people with shared inter-
ests [75]. We refer to this approach as community-
based clustering.
5.6 Subgraph Isomorphism and Pat-
terns
Keywords used to identify uses: subgraph, isomor-
phism, motif, pattern matching, cycle, clique, star,
mesh.
The subgraph isomorphism problem is the task
of identifying a subgraph of the input graph that
is isomorphic to a second graph (the pattern).
The outcome of the subgraph isomorphism prob-
lem may be used directly by applications, e.g.,
to lookup chemical compounds by structure in
a database [60, 84], or to determine the similar-
ity of two program dependence graphs for plagia-
rism detection [51]. Subgraph isomorphism is also
used as a component for solving other problems.
For example, frequent subgraph mining uses sub-
graph isomorphism to identify subgraphs that oc-
cur frequently in a set of graphs. This technique
can be used to discover common web browsing
patterns [33], localize software bugs [23], classify
text [40], etc. More recently, discriminative sub-
graph mining algorithms have been developed to
identify discriminative subgraphs, That is, given
a set of labeled input graphs, these algorithms
identify subgraphs that typically occur in graphs
with one label, but not in graphs with another la-
bel. An exemplary use case for discriminative sub-
graph mining is locating bugs through program flow
graphs, each labeled as either "triggered bug" or
"did not trigger bug" [16].
Related to subgraph isomorphism is the problem
of identifying subgraphs that match a more loosely
defined pattern, e.g., a clique or a star. Unlike the
patterns used as input to subgraph isomorphism,
stars and cliques describe a general structure of ver-
13
tices and edges, but no fixed size7. We refer to this
set of problems as pattern detection. Example ap-
plications include identifying protein complexes as
clique patterns [50] and identifying malicious hosts
or domain names as star patterns in a DNS failure
graph [41].
5.7 Graph Mutation
Many applications add properties to an input graph
as part of their graph analysis method, e.g., by
adding a distance attributed to every vertex in a
shortest path computation, or a component iden-
tifier as output of a connected components algo-
rithm.
In contrast, the structure of the graph is
often static: vertices and edges are neither added
nor removed. We identify several use cases for mu-
tating a graph's structure as part of the analysis of
a graph. We distinguish between graph construc-
tion, i.e., extending the input graph or constructing
a new graph algorithmically, and graph reduction,
i.e., removing or merging vertices or edges from the
input graph. In our taxonomy, we do not consider
extracting a subgraph from the input graph to be
graph mutation.
Graph construction is used to dynamically gen-
erate parts of a planning graph that are relevant
to the analysis, especially when the full planning
graph contains many irrelevant vertices and may
not fit in memory [9, 34]. Graph reduction is often
used to merge groups of related vertices into one
vertex per group, thereby creating a new, smaller
graph that hides relationships within groups and
exposes relationships between groups. This ap-
proach is used to group protein complexes in pro-
tein interaction networks [71], communities of au-
thors in citation graphs [80], city regions in a road
network [35], etc. Other use cases include simulat-
ing brain damage models by deleting edges from a
brain network [76] and replacing frequently occur-
ring patterns in a graph with a single copy and an
associated count to shrink the graph [53].
5.8 Other
We identify three applications whose primary
method of graph analysis does not match any of the
aforementioned classes of methods. First, Calder-
ara et al. [14] use spectral graph theory to charac-
terize a graph constructed from paths formed by
7It is possible to identify these specific patterns by creat-
ing stars or cliques of al possible sizes (up to the size of the
graph) and using these as concrete patterns for a subgraph
isomorphism algorithm. However, this process is inefficient
and may not be feasible for more complex patterns. Inciden-
tally, this approach proves the NP-completeness of subgraph
isomorphism by reduction from the clique problem.
moving people and to identify anomalous paths.
Second, Polonium [15] uses an algorithm based on
belief propagation to identify files that are likely to
be malicious. Third, Zhang et al. [91] use a greedy
set cover algorithm to identify a feasible set of pro-
teins to explain the observed set of protein frag-
ments.
6 Taxonomy
As described in Section 2.3, we classified for every
selected application the graph features and analy-
sis methods they use. The results of this process
are presented as a taxonomy in Table 3. The table
depicts for each class of graph features (see Sec-
tion 4) and analysis methods (see Section 5, except
"other" methods) whether it is used by a given ap-
plication, and, where applicable, which variants of
a feature or method are used. The variants are
listed in the caption of Table 3 and described in
more detail in their respective subsections in Sec-
tions 4 and 5. Table 4 summarizes the frequency of
occurrence for each class and each variant of graph
features and analysis methods.
Overall, we find significant diversity in the graphs
and analysis methods used by the surveyed appli-
cations. As depicted in Table 4, all classes of graph
features are present in at least 9 applications (15%),
whereas all classes of analysis methods are present
in at least 13 applications (∼22%). Variations of
each class tend to differ significantly in the num-
ber of occurrences, e.g., of applications using paths
and traversals, all-pair shortest path algorithms are
used by 19 applications, whereas only 1 application
uses single-source shortest paths.
As shown in Table 3, there is not only signifi-
cant diversity in the graph features and analysis
methods used, but also in the combinations of fea-
tures and methods. Some combinations occur with
high frequency, e.g., local clustering coefficient and
all-pair shortest paths are combined in many ap-
plications to identify "small-world" properties in a
graph. Many other combinations are infrequent,
but there is no clear segregation between classes of
features or methods. This suggest that support for
all features and methods should be supported in a
single graph analysis platform.
We observe that diversity was not found across
all application domains. In particular, we find sig-
nificant overlap in the approaches used within the
neuroscience, psychology, and chemistry domains,
although the number of surveyed articles in each
domain is too small to make sound claims about
the representativeness of our results for individual
domains.
14
Table 3: Taxonomy of surveyed articles. A dot indicates that a graph feature or analysis method was
not identified in an article. Legend by column: Weighted: vertex (V), edge (E), edge weights removed
after filtering low weight edges from input ((cid:63)). Heterogeneous: vertex (V), edge (E). Properties:
vertex (V), edge (E). Neighborhood Statistics: clustering coefficient (C), degree distribution (D),
other ((cid:63)). Paths & Traversals: shortest path (S), average path length (A), maximum path length
(M), traversal (T), other ((cid:63)). Connectivity: weakly connected components (W), strongly connected
components (S). Centrality & Ranking: betweenness centrality (B), closeness centrality (C), degree
centrality (D), PageRank (P), other ((cid:63)). Clustering: rule-based (R), community-based (C). Subgraph
Isomorphism & Mining: pattern detection (P), subgraph isomorphism (S), frequent subgraph mining
(F), discriminative subgraph mining (D). Graph Mutation: construction (C), reduction (R).
Graph Features
Graph Analysis Methods
s
e
g
d
E
d
e
t
c
e
r
i
d
e
t
h
g
i
e
[3]
[7]
[8]
[45]
[50]
[65]
[71]
[91]
[4]
[13]
[24]
[74]
[76]
[77]
[85]
[90]
W
Ref. D
·
·
·
·
·
·
·
·
·
E
·
·
·
·
·
(cid:63)
·
E
(cid:63)
·
(cid:63)
·
E
·
(cid:63)
(cid:63)
·
E
·
·
·
·
·
·
·
·
E
·
E
·
·
·
·
·
·
[16]
[23]
[30]
[51]
[53]
[78]
[92]
[14]
[15]
[41]
[46]
[56]
[61]
[64]
Domain
Biology
Neuroscience
Security
Software
Engineering
A
l
a
r
o
p
m
e
T
s
e
i
t
r
e
p
o
r
P
s
l
a
s
r
e
v
a
r
T
&
s
h
t
a
P
d
o
o
h
r
o
b
h
g
i
e
N
s
c
i
t
s
i
t
a
t
S
y
t
i
v
i
t
c
e
n
n
o
C
g
n
i
k
n
a
R
&
y
t
i
l
a
r
t
n
e
C
s
u
o
e
n
e
g
o
r
e
t
e
H
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
V
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
V
V
·
·
·
·
·
·
·
·
E
·
·
E VE
·
E
·
·
·
·
·
·
·
·
C
·
CD AM W
·
CD AM W
·
·
·
·
·
·
·
·
·
·
S
T
·
·
·
W
·
·
·
W
·
·
C
A
·
·
C(cid:63)
A
·
·
CD(cid:63)
A
·
·
A
·
·
A
·
·
A
·
·
·
·
·
A(cid:63)
·
·
·
·
·
·
·
·
W
·
VE CD(cid:63) M
·
·
T
·
M WS
·
S(cid:63)
VE
·
·
·
T
·
T
·
·
·
·
·
W
·
W BCD(cid:63)
C
C
CD
·
CD
·
·
·
·
·
·
·
·
·
·
·
D
C(cid:63)
·
·
C
·
·
·
·
·
·
B
·
·
·
·
B
·
·
·
·
·
·
·
·
·
·
·
·
·
·
V
V
·
VE
·
·
m
s
i
h
p
r
o
m
o
s
I
h
p
a
r
g
b
u
S
s
n
r
e
t
t
a
P
&
·
·
·
F
P
·
P
·
·
·
·
·
·
·
·
·
·
·
P
·
·
·
·
D
F
·
S
F
SF
P
n
o
i
t
a
t
u
M
h
p
a
r
G
·
·
·
·
R
R
R
R
·
·
·
·
R
·
·
·
·
·
·
·
·
·
·
·
·
R
·
R
·
·
g
n
i
r
e
t
s
u
C
l
·
·
·
·
R
·
R
R
·
·
·
·
·
·
·
C
·
·
C
·
C
·
·
·
·
·
·
·
R
·
15
Table 3: Continued.
Graph Features
Graph Analysis Methods
s
e
g
d
E
d
e
t
c
e
r
i
Domain Ref. D
d
e
t
h
g
i
e
s
u
o
e
n
e
g
o
r
e
t
e
H
Logistics &
Planning
Sociology
Psychology
Science
Chemistry
Finance
Linguistics
Other
[9]
[19]
[32]
[34]
[35]
[66]
[67]
[43]
[75]
[87]
[88]
[5]
[49]
[55]
[28]
[39]
[80]
[60]
[84]
[37]
[81]
[6]
[40]
[33]
[42]
[48]
[54]
[70]
[79]
[89]
·
·
·
W
·
·
·
·
V
·
E
·
·
E
·
·
·
·
·
·
E
·
·
E
·
E
V
·
·
V
·
·
·
·
·
VE
V
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
VE VE
·
·
·
·
V
V
·
·
·
·
V
·
·
·
·
·
·
l
a
r
o
p
m
e
T
s
l
a
s
r
e
v
a
r
T
&
s
h
t
a
P
y
t
i
v
i
t
c
e
n
n
o
C
s
c
i
t
s
i
t
a
t
S
d
o
o
h
r
o
b
h
g
i
e
N
·
·
·
·
·
CD(cid:63)
·
·
·
·
·
C(cid:63)
C
C(cid:63)
·
·
T
·
·
·
·
·
T
·
·
T
·
·
·
·
A
·
·
·
·
·
·
AM W
·
·
·
·
·
·
·
S
A
·
·
AM
·
A WS
·
·
A
·
·
·
·
·
·
·
·
·
·
·
CD(cid:63) M
·
·
A
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
A W
·
AM WS
·
·
·
·
·
S
CD(cid:63)
·
·
·
D
·
·
D(cid:63)
D
·
D
·
·
·
·
s
e
i
t
r
e
p
o
r
P
·
·
·
·
·
·
·
·
·
·
·
·
·
·
V
·
·
VE
VE
·
·
·
·
·
·
·
·
·
·
·
g
n
i
k
n
a
R
&
y
t
i
l
a
r
t
n
e
C
·
B
·
·
BP
·
BCD(cid:63)
P(cid:63)
·
P(cid:63)
(cid:63)
·
·
·
·
B
·
·
·
·
D
·
·
·
·
·
·
P
·
·
g
n
i
r
e
t
s
u
C
l
·
·
·
·
C
·
·
·
·
·
·
·
·
·
·
C
R
·
·
·
C
C
·
·
·
·
·
C
·
R
m
s
i
h
p
r
o
m
o
s
I
h
p
a
r
g
b
u
S
s
n
r
e
t
t
a
P
&
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
P
S
S
·
·
·
F
F
·
S
·
·
·
·
n
o
i
t
a
t
u
M
h
p
a
r
G
C
·
·
C
R
·
·
·
·
·
·
·
·
·
R
·
R
·
·
·
·
·
·
·
·
R
·
·
·
·
Finally, we note that two entries in the taxon-
omy have no associated analysis methods: applica-
tions [14] and [15] in the security domain. As de-
scribed in Section 5.8, these applications use graph
analysis methods that do not fit any of the identi-
fied classes and are not used by any other applica-
tion.
7 Future Research Directions
Using the analysis of our taxonomy as presented
in Section 6, we present several directions for fu-
ture research in the development and tuning of
graph analysis systems with a focus on functional-
ity and performance. First, the significant diversity
16
Table 4: Summary of the number of applications that use a given graph feature or analysis method,
derived from the taxonomy presented in Table 3.
Total # Applications # Applications Per Option
Graph Features
Directed Edges
Weighted
Heterogeneous
Properties
Temporal
Graph Analysis Methods
Neighborhood Statistics
Paths & Traversals
Connectivity
Centrality & Ranking
Clustering
Subgraph Isomorphism & Patterns
Graph Mutation
31
19
13
9
9
23
30
15
13
14
16
13
: 31
V: 3, E: 12, (cid:63): 5
V: 10, E: 5
V: 9, E: 6
: 9
C: 18, D: 14, (cid:63):10
S: 1, A: 19, M:8, T: 7, (cid:63): 2
W: 12, S: 6
B: 7, C: 3, D: 3, P: 4, (cid:63): 5
R: 6, C: 8
P: 5, S: 5, F: 6, D: 1
R: 11, C: 2
in graph features, analysis methods, and their com-
binations used in real-world applications suggests a
need for graph analysis platforms with support for
many classes of graphs and analysis methods. Re-
cent developments of graph analysis platforms have
focused on either graph databases (e.g., Neo4j [57])
or (parallel) graph processing platforms (Doekemei-
jer et al. [21] surveyed many). Graph databases
have extensive support for mutable, heterogeneous
property graphs, for path queries, and for pattern
matching. In contrast, graph processing platforms
typically focus on static graphs and large-scale ana-
lytics using methods such as centrality and cluster-
ing. We do observe a trend towards bridging this
gap, e.g., with Neo4j announcing support for graph
algorithms in their database [36].
Second, many applications use more than one
method of analysis on the same graph, so there is
a need for platforms that allow either interactive
analysis or workflows of algorithms for batch pro-
cessing. Typical graph databases already offer this
functionality by providing a service that can be in-
teractively queried, but graph processing platforms
typically require loading a copy of the graph from
disk for each job (i.e., a single algorithm). Future
research on graph processing platforms may study
the reuse of a graph stored in memory to speed up
sequences of jobs, or even multiple algorithms exe-
cuting in parallel on the same graph. This research,
as well as the development of new benchmarks to
assess support for graph analysis workflows, may
require additional insight in how practitioners use
graph analysis platforms (e.g., do they define in ad-
vance a set of algorithms to run, or is the selection
of analysis methods guided by results of the previ-
ous method?)
Third, we observe that many graphs analyzed
in practice share a common set of high-level fea-
tures, as evident from our taxonomy, but that
the structural properties of graphs vary widely
and are known to impact significantly the perfor-
mance of graph analysis [38]. Although some struc-
tural characteristics are well-defined, e.g., bipar-
tite graphs, there is not comprehensive set of met-
rics that captures all structural properties relevant
to graph analysis performance. Ongoing work on
this topic includes the development of synthetic
dataset generators that aim to replicate various
structural properties of real-world datasets, e.g.,
DataSynth [68] and Darwini [22].
Finally, we find that many surveyed applica-
tions operate on small graphs, i.e., under a mil-
lion vertices and edges8. Most of the larger graphs,
i.e., hundreds of millions of edges and more, were
found in domains studying digital networks,
in-
cluding social media networks, software engineer-
ing networks, and computer security networks. The
largest graph we identified is used to identify mal-
ware and consists of nearly 1 billion vertices and
37 billion edges [15]. These findings contradict a
recent user study by Sahu et al. [73] which found
that large-scale graphs are more frequent and can
be found across many domains. Possible explana-
8Some surveyed articles do not explicitly state the size of
their graph, or they present a general solution without a con-
crete input graph. We have not quantified the precise scales
of each application's graph, but draw conclusions based on
estimations.
17
tions for this contradiction include the more recent
data used by the user study9, a potential bias in [73]
due to surveying users of specific software products
(of which many explicitly target large-scale graph
analysis), and a disparity between graphs used in
academia versus industry.
8 Reproducibility
To facilitate the validation and reproduction of
our results, we provide the data collected and pro-
duced while performing this survey as open-access
data [31]. We provide a complete list of search re-
sults obtained via Google Scholar, a shortlist of
relevant identified results (see Section 2.2), and
the resulting analysis and characterization (see Sec-
tions 2.3, 6).
9 Conclusion
The development and tuning of graph analysis plat-
forms benefits greatly from knowledge of their prac-
tical applications. However, such knowledge re-
quires a broad view of graph analysis use cases
across many domains and an in-depth view of the
datasets and algorithms they use. Earlier work fo-
cuses on few applications, provides a high-level view
of many applications, or studies in depth a small set
of algorithms.
In this work we made a threefold contribution to-
wards gaining insight in the practical use of graph
analysis: (i) we defined and applied a systematic
method for identifying and selecting relevant lit-
erature on graph analysis applications across many
domains, (ii) we presented a taxonomy of the graph
features and graph analysis methods used in prac-
tice, and (iii) we proposed several directions for fu-
ture research in developing and tuning graph anal-
ysis platforms.
Our primary observation is the large diversity in
the domains to which the identified applications be-
long and in the classes of graph features and anal-
ysis methods they use. From 5 classes of graph
features and 7 classes of analysis methods, each
was encountered in at least 15% of surveyed ap-
plications. We further observe that most applica-
tions use multiple analysis methods and that many
9The development of large-scale graph processing plat-
forms did not gain significant traction until the publication
of Pregel in 2010 [21], so we believe it is feasible that adop-
tion of large-scale graph analysis techniques has increased
between the publication of our surveyed articles (many of
which appeared before 2010) and the 2017 study by Sahu et
al.
classes of analysis are combined in practice. In con-
trast, some domains show significant homogeneity,
especially neuroscience, a domain that focuses on
the analysis of brain networks and has seemingly
developed a common set of techniques for analyz-
ing such networks.
We conclude that future research in the develop-
ment and tuning of graph analysis platforms should
focus on integrating support for a wide range of
graph features and analysis methods, in contrast
to the dichotomy of graph databases and parallel
graph processing frameworks that currently exists.
Additionally, the combination of multiple analysis
methods, interactively or as a workflow, should be
further investigated and supported in future sys-
tems. Finally, to understand the differences in
graphs across domains and their impact on perfor-
mance, additional research is needed to character-
ize the structural characteristics of graphs beyond
simple structures such as bipartite graphs.
References
[1] T. Aittokallio and B. Schwikowski. Graph-
based methods for analysing networks in cell
biology. Briefings in bioinformatics, 7(3):243–
255, 2006.
[2] A.-L. Barab´asi and R. Albert. Emergence
science,
of scaling in random networks.
286(5439):509–512, 1999.
[3] A. Barber´an, S. T. Bates, E. O. Casamayor,
and N. Fierer. Using network analysis to ex-
plore co-occurrence patterns in soil microbial
communities. The ISME journal, 6(2):343,
2012.
[4] F. Bartolomei, I. Bosma, M. Klein, J. C.
Baayen, J. C. Reijneveld, T. J. Postma, J. J.
Heimans, B. W. van Dijk, J. C. de Munck,
A. de Jongh, K. S. Cover, and C. J. Stam.
Disturbed functional connectivity in brain tu-
mour patients: Evaluation by graph analysis
of synchronization matrices. Clinical Neuro-
physiology, 117(9):2039 – 2049, 2006.
[5] L. Bertola, N. B. Mota, M. Copelli, T. Rivero,
B. S. Diniz, M. A. Romano-Silva, S. Ribeiro,
and L. F. Malloy-Diniz. Graph analysis of
verbal fluency test discriminate between pa-
tients with alzheimer's disease, mild cognitive
impairment and normal elderly controls. Fron-
tiers in aging neuroscience, 6:185, 2014.
[6] C. Biemann. Chinese whispers: an efficient
graph clustering algorithm and its applica-
tion to natural language processing problems.
18
In Proceedings of the first workshop on graph
based methods for natural language processing,
pages 73–80. Association for Computational
Linguistics, 2006.
[7] C. C. Bilgin, P. Bullough, G. E. Plopper, and
B. Yener. Ecm-aware cell-graph mining for
bone tissue modeling and classification. Data
mining and knowledge discovery, 20(3):416–
438, 2010.
[8] C. C. Bilgin, C. Demir, C. Nagi, and B. Yener.
Cell-graph mining for breast tissue modeling
and classification. In Engineering in Medicine
and Biology Society, 2007. EMBS 2007. 29th
Annual International Conference of the IEEE,
pages 5311–5314. IEEE, 2007.
[9] A. Blum and M. L. Furst. Fast planning
through planning graph analysis. Artif. Intell.,
90(1-2):281–300, 1997.
[10] S. Boccaletti, V. Latora, Y. Moreno,
M. Chavez, and D.-U. Hwang.
Complex
networks: Structure and dynamics. Physics
reports, 424(4-5):175–308, 2006.
[11] A. D. Broido and A. Clauset. Scale-free net-
works are rare. CoRR, abs/1801.03400, 2018.
[12] E. Bullmore and O. Sporns. Complex brain
networks: graph theoretical analysis of struc-
tural and functional systems. Nature Reviews
Neuroscience, 10(3):186, 2009.
[13] K. Caeyenberghs, A. Leemans, M. H. Heit-
ger, I. Leunissen, T. Dhollander, S. Sunaert,
P. Dupont, and S. P. Swinnen. Graph analysis
of functional brain networks for cognitive con-
trol of action in traumatic brain injury. Brain,
135(4):1293–1307, 2012.
[14] S. Calderara, U. Heinemann, A. Prati, R. Cuc-
chiara, and N. Tishby. Detecting anomalies in
people's trajectories using spectral graph anal-
ysis. Computer Vision and Image Understand-
ing, 115(8):1099–1111, 2011.
[15] D. H. . Chau, C. Nachenberg, J. Wilhelm,
A. Wright, and C. Faloutsos. Polonium: Tera-
scale graph mining and inference for malware
detection. In Proceedings of the 2011 SIAM In-
ternational Conference on Data Mining, pages
131–142. SIAM, 2011.
[16] H. Cheng, D. Lo, Y. Zhou, X. Wang, and
X. Yan. Identifying bug signatures using dis-
criminative graph mining.
In Proceedings of
the Eighteenth International Symposium on
Software Testing and Analysis, ISSTA 2009,
Chicago, IL, USA, July 19-23, 2009, pages
141–152, 2009.
[17] D. Conte, P. Foggia, C. Sansone,
and
M. Vento. Thirty years of graph matching in
pattern recognition. International journal of
pattern recognition and artificial intelligence,
18(03):265–298, 2004.
[18] L. d. F. Costa, O. N. Oliveira Jr, G. Travieso,
F. A. Rodrigues, P. R. Villas Boas, L. An-
tiqueira, M. P. Viana, and L. E. Correa Rocha.
Analyzing and modeling real-world phenom-
ena with complex networks: a survey of appli-
cations. Advances in Physics, 60(3):329–412,
2011.
[19] E. M. Daly and M. Haahr. Social network anal-
ysis for routing in disconnected delay-tolerant
manets. In Proceedings of the 8th ACM Intera-
tional Symposium on Mobile Ad Hoc Network-
ing and Computing, MobiHoc 2007, Montreal,
Quebec, Canada, September 9-14, 2007, pages
32–40, 2007.
[20] M. Demange, T. Ekim, B. Ries, and C. Tanas-
escu. On some applications of the selective
graph coloring problem. European Journal of
Operational Research, 240(2):307–314, 2015.
[21] N. Doekemeijer and A. L. Varbanescu. A sur-
vey of parallel graph processing frameworks.
Delft University of Technology, page 21, 2014.
[22] S. Edunov, D. Logothetis, C. Wang, A. Ching,
and M. Kabiljo. Darwini: Generating realis-
tic large-scale social graphs. arXiv preprint
arXiv:1610.00664, 2016.
[23] F. Eichinger, K. Bohm, and M. Huber. Min-
ing edge-weighted call graphs to localise soft-
ware bugs. In Machine Learning and Knowl-
edge Discovery in Databases, European Con-
ference, ECML/PKDD 2008, Antwerp, Bel-
gium, September 15-19, 2008, Proceedings,
Part I, pages 333–348, 2008.
[24] F. D. V. Fallani, L. Astolfi, F. Cincotti,
D. Mattia, M. G. Marciani, S. Salinari,
J. Kurths, S. Gao, A. Cichocki, A. Colosimo,
et al. Cortical functional connectivity net-
works in normal and spinal cord injured pa-
tients: evaluation by graph analysis. Human
brain mapping, 28(12):1334–1346, 2007.
[25] S. Fortunato. Community detection in graphs.
Physics reports, 486(3-5):75–174, 2010.
19
[26] L. C. Freeman. Centrality in social net-
Social net-
works conceptual clarification.
works, 1(3):215–239, 1978.
[27] R. Garc´ıa-Domenech,
J. V.
de Juli´an-Ortiz, and L. Pogliani. Some new
trends in chemical graph theory. Chemical Re-
views, 108(3):1127–1169, 2008.
J. G´alvez,
[28] N. Gondal. The local and global structure of
knowledge production in an emergent research
field: An exponential random graph analysis.
Social Networks, 33(1):20–30, 2011.
[29] Y. Guo, M. Biczak, A. L. Varbanescu, A. Io-
sup, C. Martella, and T. L. Willke. How well
do graph-processing platforms perform?
an
empirical performance evaluation and analysis.
In Parallel and Distributed Processing Sym-
posium, 2014 IEEE 28th International, pages
395–404. IEEE, 2014.
[30] Z. Guo, D. Zhou, H. Lin, M. Yang, F. Long,
C. Deng, C. Liu, and L. Zhou. G2: A graph
processing system for diagnosing distributed
systems. In 2011 USENIX Annual Technical
Conference, Portland, OR, USA, June 15-17,
2011, 2011.
[31] T. Hegeman and A. Iosup. Dataset for sur-
vey on applications of graph analysis. https:
//doi.org/10.5281/zenodo.1298640, June
2018.
[32] M. Helmert.
A planning heuristic based
on causal graph analysis.
In Proceedings of
the Fourteenth International Conference on
Automated Planning and Scheduling (ICAPS
2004), June 3-7 2004, Whistler, British
Columbia, Canada, pages 161–170, 2004.
[33] M. Heydari, R. A. Helal, and K. I. Ghauth. A
graph-based web usage mining method consid-
ering client side data. In Electrical Engineer-
ing and Informatics, 2009. ICEEI'09. Inter-
national Conference on, volume 1, pages 147–
153. IEEE, 2009.
[34] J. Hong. Goal recognition through goal graph
analysis. J. Artif. Intell. Res., 15:1–30, 2001.
[35] X. Huang, Y. Zhao, C. Ma, J. Yang, X. Ye, and
C. Zhang. Trajgraph: A graph-based visual
analytics approach to studying urban network
centralities using taxi trajectory data. IEEE
Trans. Vis. Comput. Graph., 22(1):160–169,
2016.
Hunger.
Proudly
Efficient Graph Algorithms
[36] M.
ing:
Neo4j.
efficient-graph-algorithms-neo4j/,
August 3, 2017. Accessed: 2018-04-05.
Releas-
in
https://neo4j.com/blog/
[37] G. Iori, G. De Masi, O. V. Precup, G. Gabbi,
and G. Caldarelli. A network analysis of the
italian overnight money market. Journal of
Economic Dynamics and Control, 32(1):259–
278, 2008.
[38] A. Iosup, T. Hegeman, W. L. Ngai, S. Heldens,
A. Prat-P´erez, T. Manhardto, H. Chafio,
M. Capota, N. Sundaram, M. Anderson, et al.
Ldbc graphalytics: A benchmark for large-
scale graph analysis on parallel and distributed
platforms. Proceedings of the VLDB Endow-
ment, 9(13):1317–1328, 2016.
[39] M. Jacovi, V. Soroka, G. Gilboa-Freedman,
S. Ur, E. Shahar, and N. Marmasse. The
chasms of CSCW: a citation graph analysis
of the CSCW conference.
In Proceedings of
the 2006 ACM Conference on Computer Sup-
ported Cooperative Work, CSCW 2006, Banff,
Alberta, Canada, November 4-8, 2006, pages
289–298, 2006.
[40] C. Jiang, F. Coenen, R. Sanderson, and
M. Zito.
Text classification using graph
mining-based feature extraction.
In Re-
search and Development in Intelligent Systems
XXVI, Incorporating Applications and Inno-
vations in Intelligent Systems XVII, Peter-
house College, Cambridge, UK, 15-17 Decem-
ber 2009, pages 21–34, 2009.
[41] N. Jiang, J. Cao, Y. Jin, E. L. Li, and
Identifying suspicious activities
Z. Zhang.
through DNS failure graph analysis. In Pro-
ceedings of the 18th annual IEEE International
Conference on Network Protocols, ICNP 2010,
Kyoto, Japan, 5-8 October, 2010, pages 144–
153, 2010.
[42] S. Jiang, C. Bian, X. Ning, and Q. D. Ma. Vis-
ibility graph analysis on heartbeat dynamics of
meditation training. Applied Physics Letters,
102(25):253702, 2013.
[43] A. Khrabrov and G. Cybenko. Discovering in-
fluence in communication networks using dy-
namic graph analysis.
In Proceedings of the
2010 IEEE Second International Conference
on Social Computing, SocialCom / IEEE In-
ternational Conference on Privacy, Security,
Risk and Trust, PASSAT 2010, Minneapolis,
20
Minnesota, USA, August 20-22, 2010, pages
288–294, 2010.
[44] B. Kitchenham and S. Charters. Guidelines
for performing systematic literature reviews in
software engineering. Technical report, Keele
University and Durham University Joint Re-
port, 2007.
[45] M. Koyuturk, A. Grama, and W. Szpankowski.
An efficient algorithm for detecting frequent
subgraphs in biological networks. Bioinformat-
ics, 20(suppl 1):i200–i207, 2004.
[46] B. J. Kwon, J. Mondal, J. Jang, L. Bilge, and
T. Dumitras. The dropper effect: Insights into
malware distribution with downloader graph
analytics.
In Proceedings of the 22nd ACM
SIGSAC Conference on Computer and Com-
munications Security, Denver, CO, USA, Oc-
tober 12-6, 2015, pages 1118–1129, 2015.
[47] V. Latora and M. Marchiori. Efficient behav-
ior of small-world networks. Physical review
letters, 87(19):198701, 2001.
[48] K.-Y. Lee, O.-H. Kwon, J.-Y. Lee, and T.-
W. Kim. A hybrid approach to geometric
constraint solving with graph analysis and re-
duction. Advances in Engineering Software,
34(2):103 – 113, 2003.
[49] A. J. Lerner, P. K. Ogrocki, and P. J. Thomas.
Network graph analysis of category fluency
testing. Cognitive and Behavioral Neurology,
22(1):45–52, 2009.
[50] X.-L. Li, C.-S. Foo, S.-H. Tan, and S.-K.
Ng. Interaction graph mining for protein com-
plexes using local clique merging. Genome In-
formatics, 16(2):260–269, 2005.
[51] C. Liu, C. Chen, J. Han, and P. S. Yu.
GPLAG: detection of software plagiarism by
program dependence graph analysis. In Pro-
ceedings of the Twelfth ACM SIGKDD Inter-
national Conference on Knowledge Discovery
and Data Mining, Philadelphia, PA, USA, Au-
gust 20-23, 2006, pages 872–881, 2006.
[52] G. Malewicz, M. H. Austern, A. J. Bik, J. C.
Dehnert, I. Horn, N. Leiser, and G. Cza-
jkowski. Pregel: a system for large-scale graph
processing.
In Proceedings of the 2010 ACM
SIGMOD International Conference on Man-
agement of data, pages 135–146. ACM, 2010.
In Proceedings of
mining on heap dumps.
the 16th ACM SIGKDD International Confer-
ence on Knowledge Discovery and Data Min-
ing, Washington, DC, USA, July 25-28, 2010,
pages 115–124, 2010.
[54] B. J. Mirza, B. J. Keller, and N. Ramakrish-
nan. Studying recommendation algorithms by
graph analysis. J. Intell. Inf. Syst., 20(2):131–
160, 2003.
[55] N. B. Mota, R. Furtado, P. P. Maia,
M. Copelli, and S. Ribeiro. Graph analysis of
dream reports is especially informative about
psychosis. Scientific reports, 4:3691, 2014.
[56] S. Nagaraja, P. Mittal, C. Hong, M. Cae-
sar, and N. Borisov. Botgrep: Finding P2P
bots with structured graph analysis. In 19th
USENIX Security Symposium, Washington,
DC, USA, August 11-13, 2010, Proceedings,
pages 95–110, 2010.
[57] Neo4j,
Inc.
The Neo4j Graph Platform.
https://neo4j.com/. Accessed: 2018-04-05.
[58] M. E. Newman.
Scientific collaboration
ii. shortest paths, weighted net-
Physical review E,
networks.
works, and centrality.
64(1):016132, 2001.
[59] M. E. Newman. Assortative mixing in net-
works. Physical review letters, 89(20):208701,
2002.
[60] S. Nijssen and J. N. Kok. Frequent graph min-
ing and its application to molecular databases.
In Systems, Man and Cybernetics, 2004 IEEE
International Conference on, volume 5, pages
4571–4577. IEEE, 2004.
[61] S. Noel and S. Jajodia. Metrics suite for
network attack graph analytics.
In Cyber
and Information Security Research Confer-
ence, CISR '14, Oak Ridge, TN, USA, April
8-10, 2014, pages 5–8, 2014.
[62] L. Page, S. Brin, R. Motwani, and T. Wino-
grad. The pagerank citation ranking: Bringing
order to the web. Technical report, Stanford
InfoLab, 1999.
[63] B. Peng, L. Zhang, and D. Zhang. A survey of
graph theoretical approaches to image segmen-
tation. Pattern Recognition, 46(3):1020–1038,
2013.
[53] E. K. Maxwell, G. Back, and N. Ramakrish-
nan. Diagnosing memory leaks using graph
[64] C. A. Phillips and L. P. Swiler. A graph-based
system for network-vulnerability analysis. In
21
Proceedings of the 1998 Workshop on New Se-
curity Paradigms, Charlottsville, VA, USA,
September 22-25, 1998, pages 71–79, 1998.
[65] A. Pinna, N. Soranzo, and A. de la Fuente.
From knockouts to networks: Establishing di-
rect cause-effect relationships through graph
analysis. PLOS ONE, 5(10):1–8, 10 2010.
[66] S. Porta, P. Crucitti, and V. Latora. The
network analysis of urban streets: a dual ap-
proach. Physica A: Statistical Mechanics and
its Applications, 369(2):853–866, 2006.
[67] S. Porta, P. Crucitti, and V. Latora. The net-
work analysis of urban streets: a primal ap-
proach. Environment and Planning B: plan-
ning and design, 33(5):705–725, 2006.
[68] A. Prat-P´erez, J. Guisado-G´amez, X. F. Salas,
P. Koupy, S. Depner, and D. B. Bartolini. To-
wards a property graph generator for bench-
marking. In Proceedings of the Fifth Interna-
tional Workshop on Graph Data-management
Experiences & Systems, page 6. ACM, 2017.
[69] T. Reps. Program analysis via graph reacha-
bility1. Information and software technology,
40(11-12):701–726, 1998.
[70] M. A. Rodriguez. A graph analysis of the
linked data cloud. CoRR, abs/0903.0194, 2009.
[71] L. Royer, M. Reimann, B. Andreopoulos, and
M. Schroeder. Unraveling protein networks
with power graph analysis. PLOS Computa-
tional Biology, 4(7):1–17, 07 2008.
[72] M. Rubinov and O. Sporns. Complex network
measures of brain connectivity: uses and in-
terpretations. Neuroimage, 52(3):1059–1069,
2010.
[73] S. Sahu, A. Mhedhbi, S. Salihoglu, J. Lin, and
M. T. Ozsu. The ubiquity of large graphs
and surprising challenges of graph processing.
Proceedings of the VLDB Endowment, 11(4),
2017.
[74] E. J. Sanz-Arigita, M. M. Schoonheim, J. S.
Damoiseaux, S. A. R. B. Rombouts, E. Maris,
F. Barkhof, P. Scheltens, and C. J. Stam. Loss
of small-world networks in alzheimer's disease:
Graph analysis of fmri resting-state functional
connectivity. PLOS ONE, 5(11):1–14, 11 2010.
[76] C. Stam, W. De Haan, A. Daffertshofer,
B. Jones, I. Manshanden, A.-M. van Cap-
pellen van Walsum, T. Montez, J. Verbunt,
J. De Munck, B. Van Dijk, et al. Graph the-
oretical analysis of magnetoencephalographic
functional connectivity in alzheimer's disease.
Brain, 132(1):213–224, 2008.
[77] K. Supekar, V. Menon, D. Rubin, M. Musen,
and M. D. Greicius.
Network analysis
of intrinsic functional brain connectivity in
alzheimer's disease. PLoS computational bi-
ology, 4(6):e1000100, 2008.
[78] D. Surian, D. Lo, and E. Lim. Mining collab-
oration patterns from a large developer net-
work.
In 17th Working Conference on Re-
verse Engineering, WCRE 2010, 13-16 Octo-
ber 2010, Beverly, MA, USA, pages 269–273,
2010.
[79] L. Telesca and M. Lovallo. Analysis of seis-
mic sequences by using the method of vis-
ibility graph.
EPL (Europhysics Letters),
97(5):50002, 2012.
[80] G. Tsatsaronis,
I. Varlamis,
S. Torge,
M. Reimann, K. Nørvag, M. Schroeder, and
M. Zschunke. How to become a group leader?
or modeling author types based on graph min-
ing. In Research and Advanced Technology for
Digital Libraries - International Conference
on Theory and Practice of Digital Libraries,
TPDL 2011, Berlin, Germany, September 26-
28, 2011. Proceedings, pages 15–26, 2011.
[81] N. Wang, D. Li, and Q. Wang. Visibility graph
analysis on quarterly macroeconomic series of
china based on complex network theory. Phys-
ica A: Statistical Mechanics and its Applica-
tions, 391(24):6543–6555, 2012.
[82] D. J. Watts and S. H. Strogatz. Collec-
tive dynamics of small-worldnetworks. nature,
393(6684):440, 1998.
[83] J. Webster and R. T. Watson. Analyzing the
past to prepare for the future: Writing a liter-
ature review. MIS Quarterly, 26(2), 2002.
[84] J. K. Wegner, H. Frohlich, H. M. Mielenz, and
A. Zell. Data and graph mining in chemical
space for adme and activity data sets. Molec-
ular Informatics, 25(3):205–220, 2006.
[75] M. F. Schwartz and D. C. M. Wood. Dis-
covering shared interests using graph analysis.
Commun. ACM, 36(8):78–89, 1993.
[85] C. Wilke, G. Worrell, and B. He. Graph analy-
sis of epileptogenic networks in human partial
epilepsy. Epilepsia, 52(1):84–93, 2011.
22
[86] C. Wohlin. Guidelines for snowballing in
systematic literature studies and a replica-
tion in software engineering.
In 18th Inter-
national Conference on Evaluation and As-
sessment in Software Engineering, EASE '14,
London, England, United Kingdom, May 13-
14, 2014, pages 38:1–38:10, 2014.
[87] Y. Yamaguchi, T. Takahashi, T. Amagasa, and
H. Kitagawa. Turank: Twitter user rank-
ing based on user-tweet graph analysis.
In
Web Information Systems Engineering - WISE
2010 - 11th International Conference, Hong
Kong, China, December 12-14, 2010. Proceed-
ings, pages 240–253, 2010.
[88] M. Yang, J. Lee, S. Lee, and H. Rim. Finding
interesting posts in twitter based on retweet
graph analysis.
In The 35th International
ACM SIGIR conference on research and de-
velopment in Information Retrieval, SIGIR
'12, Portland, OR, USA, August 12-16, 2012,
pages 1073–1074, 2012.
[89] M. M. Yeung, B. Yeo, and B. Liu. Segmen-
tation of video by clustering and graph analy-
sis. Computer Vision and Image Understand-
ing, 71(1):94–109, 1998.
[90] G. Zamora-L´opez, C. Zhou, and J. Kurths.
Graph analysis of cortical networks reveals
complex anatomical communication substrate.
Chaos: An Interdisciplinary Journal of Non-
linear Science, 19(1):015117, 2009.
[91] B. Zhang, M. C. Chambers, and D. L. Tabb.
Proteomic parsimony through bipartite graph
analysis improves accuracy and transparency.
Journal of proteome research, 6(9):3549–3557,
2007.
[92] T. Zimmermann and N. Nagappan. Predicting
defects using network analysis on dependency
graphs.
In 30th International Conference on
Software Engineering (ICSE 2008), Leipzig,
Germany, May 10-18, 2008, pages 531–540,
2008.
23
|
1902.09364 | 1 | 1902 | 2019-02-25T15:28:43 | Transforming Collaboration Data into Network Layers for Enhanced Analytics | [
"cs.SI",
"physics.soc-ph"
] | We consider the problem of automatically generating networks from data of collaborating researchers. The objective is to apply network analysis on the resulting network layers to reveal supplemental patterns and insights of the research collaborations. In this paper, we describe our data-to-networks method, which automatically generates a set of logical network layers from the relational input data using a linkage threshold. We, then, use a series of network metrics to analyze the impact of the linkage threshold on the individual network layers. Moreover, results from the network analysis also provide beneficial information to improve the network visualization. We demonstrate the feasibility and impact of our approach using real-world collaboration data. We discuss how the produced network layers can reveal insights and patterns to direct the data analytics more intelligently. | cs.SI | cs | Transforming Collaboration Data into Network
Layers for Enhanced Analytics
Saharnaz E. Dilmaghani1, Apivadee Piyatumrong2, Pascal Bouvry1, Matthias R. Brust1
1Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg
2National Electronics and Computer Technology Center (NECTEC), Thailand
[email protected], [email protected], [email protected], [email protected]
9
1
0
2
b
e
F
5
2
]
I
S
.
s
c
[
1
v
4
6
3
9
0
.
2
0
9
1
:
v
i
X
r
a
Abstract -- We consider the problem of automatically gener-
ating networks from data of collaborating researchers. The
objective is to apply network analysis on the resulting network
layers to reveal supplemental patterns and insights of the re-
search collaborations. In this paper, we describe our data-to-
networks method, which automatically generates a set of logical
network layers from the relational input data using a linkage
threshold. We, then, use a series of network metrics to analyze
the impact of the linkage threshold on the individual network
layers. Moreover, results from the network analysis also provide
beneficial information to improve the network visualization. We
demonstrate the feasibility and impact of our approach using
real-world collaboration data. We discuss how the produced
network layers can reveal insights and patterns to direct the
data analytics more intelligently.
I. INTRODUCTION
Network structures have drawn significant attention in big
data due to the possibility to apply network theory and analysis
to obtain extra insights from the data. Networks are ubiquitous
[27] in research areas from biology and neuroscience (e.g.,
brain networks [6]) to modeling and analyzing galaxy dis-
tributions [17], and quantifying reputation in art [15]. These
examples are use cases where network layers play an important
role to represent and analyze the data.
Networks offer several advantages. They provide adaptabil-
ity for dynamic structures benefiting from local principles on
nodes [9]. Additionally, network analysis discloses valuable
information for data visualization by defining an appropri-
ate link definition. Networks often provide computationally
efficient algorithms with lower complexity in comparison to
a tabular structure [13]. Furthermore, data transformed into
network structures can help providing evidence for missing
information [30], [21] as well as predicting forthcoming events
[26]. Besides,
there are numerous algorithms that can be
applied on networks such as Louvain's algorithm which is
a community detection algorithm [7] and Page Rank, that
identifies the most influential object within a network.
With these advantages of networks, we are confronted with
the challenge on how to transform relational data into appro-
priate networks, which exhibit advantages for data analytics as
well as data visualization. The challenge is twofold: It is not
only on how to represent the elements of a network, but also
the specific construction principles, since, for each dataset,
there are numerous ways be transformed into a network rep-
resentation [10]. Each network reveals a particular perspective
on the dataset. In this study, we investigate different linkage
thresholds for the transformation of a collaboration dataset into
networks.
In this paper, we propose a method that transforms collab-
oration data to network layers. Our approach favors scientific
projects as nodes with links generated by using a specific
linkage threshold. We apply our method on real-world data that
describes collaboration of a renowned research institute. Our
study uses different metrics to determine the influence of the
network structure on the network properties. Additionally, we
obtain results that provide information on better visualizing the
produced networks and a possible interface to include privacy
mechanisms into data analytics [28]. The remainder of this
paper is structured as follows. Section II investigates related
work. We describe our method to complement data with
network layers in Section III. The experiment setup designed
to analyze the proposed algorithm is represented in Section IV.
Section V discusses the outcome and the opportunities for
future work. Finally, Section VI concludes the paper.
II. RELATED WORK
The challenge of converting data to networks is a well-
known issue when it comes to geographical data [14], [16].
Graph studies on spatial data reveal valuable information
on route networks, complex urban systems [22] and the
relationship between different urban areas [31]. Nevertheless,
the raw dataset on geographical information is not enough by
its own to conduct proper graph studies. Karduni et al. [18]
focuses on this challenge and has introduced an approach for
geographical systems by defining a protocol describing the
network properties to convert the spatial polyline data into a
network.
In general, some of the studies have stressed the inference
of links from relational data to design a network out of the
relational data. Casiraghi et al. [11] developed a generalized
hypergeometric ensembles approach to address the problem
of inferring connections within relational data. The study
represents a perspective of link prediction while applying
predictive analysis. From a similar point of view, Xiang et
al. [29] established a link-based latent variable model to infer
the friendship relations within a social interaction. In addition,
in another study [25] the international relations from a dataset
consists of the news from different countries are extracted by
a tensor factorization technique. Moreover, Akbas et al. [1]
proposed a social network generation by proposing a model
based on various interactions (e.g., phone calls) considering
smartphone data. Given a weight to each type of interaction,
the authors define a link value as the combination of various
interaction types. Akbas et al. followed up their study on
network generation from interaction patterns by studies on how
to infer social networks of animal groups [2], [3], [4]. Initiating
from these studies,
in particular from [1], we followed a
similar approach in order to define the linkage threshold to
generate the network layers [5], [12].
Considering the collaboration data, Newman [19] has es-
tablished networks considering authors and their collaboration
on scientific papers. The scientific collaboration networks
have been also studied in a particular network structure,
hypergraphs, by Ouvrard et. al. [20]. The authors emphasized
on enhancing the visualization of these networks considering
network properties.
III. PROPOSED METHODOLOGY: DATA-TO-NETWORK
LAYERS
We establish a method with the purpose to convert the
relational data of research collaborations into network layers
by describing a set of nodes and a linkage threshold to define
the connections between nodes. Considering the thresholds we
then generate different network layers and investigate each
network with the network measurements. Using outcomes of
the last phase we then visualize the networks for a better
understanding of the relationship in our data.
For this study, we have access to a real-world dataset of
collaborative projects within National Electronics and Com-
puter Technology Center (NECTEC). The dataset consists
of various projects that have been completed with certain
members of the institute. Investigating on the relationships and
extracting the collaboration patterns are the outcomes that the
networks will provide in order to improve performance of the
research projects by using the possible resources inside the
organization. We, therefore, retrieved different features from
the dataset to feed our method and generate the network layers.
In this study, our focus is particularly on the projects of the
institute. Thus, we consider the elements of the network such
that the projects are nodes of the network and the common
members between the projects are represented as the links
of the network. Each project is identified with an id, and a
team of m members who contributed to the project, whereas
the project members can participate in different projects at the
same time. Contribution percentage is a feature extracted from
the dataset that quantifies the contribution of a member within
a project.
k, ci
We calculate the linkage threshold by looking at certain
features from the dataset: (1) the project members, and (2) the
contribution percentage of each project member in a project.
Let mi
k be the k-th member of project i and the contribu-
tion percentage of the member in the project, respectively. Let
2, . . .) of project i ∈ ID.
mi = (mi
Next, we define P as the combination of features chosen to
i(mi, ci).
explain the explain linkage threshold, i.e., P = (cid:83)
2, . . .) and ci = (ci
1, mi
1, ci
Then, the common members between two projects (e.g., i, j)
is denoted as Mij = {(i, j) ∈ ID mi ∩ mj}. Finally, con-
sidering the aforementioned parameters, the linkage threshold
is defined as
(cid:88)
(cid:91)
Tij =
1
nij
T =
k + cj
ci
k
∀k∈Mij
2
(Tij),
i,j∈ID
,
(1)
where Tij is the linkage threshold within the projects (i, j),
nij is the number of common members calculated in Mij, and
T is the linkage threshold for the whole dataset. Exploiting
the linkage threshold, we propose Algorithm 1 to construct
network layers with different linkage thresholds.
Algorithm 1 Data-to-Network Layers
Input: D, a dataset of research collaboration.
Output: G, a vector of generated network layers.
1: procedure TRANSFORM-TO-NETWORK(D)
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
nodesList ← ID
P ← extract features from D
trange ← generate a space vector from (min(T ), max(T ))
for each threshold in trange do
f ← Aggregate(P[nodes])
if f ≥ threshold then
N etwork G ← GenN et(nodesList, edgesList)
Insert G to G
for each pair of nodes in nodesList do
edgesList ← pair of nodes
return G
a) Description of the algorithm:: Assume D is the rela-
tional dataset of collaborations. We need to define the nodes
and the links extracting particular features from D to generate
the network layers. To define the list of nodes nodesList,
we extract the id of the entities which in this study we used
the identities of research projects (see line 2 in Algorithm
1). In order to describe the links, we first need to define a
linkage threshold t considering the list of features P. The
linkage threshold of linear space vector consists of n points
of threshold within the range of minimum and maximum
values of P (see line 3− 4 in Algorithm 1). Additionally, each
network from G is measured by the set of network metrics.
We use the before mentioned collaboration data as input
for the presented Algorithm 1. Then, we measure the network
metrics and utilize them for a better visualization of data. The
resulting generated network layers are visualized in Fig. 1.
In this specific example, we consider 6 thresholds for defining
the edges starting from 0 (the minimum collaboration observed
in the dataset) to 100 by using the connected components to
enhance the visualization of data.
b) Complexity analysis: The complexity of Algorithm 1
depends on the two main parts of the algorithm: (1) Comparing
each pair of nodes to find those that serve the determined
condition for threshold is the most expensive one with the
Fig. 1: Visualization of the generated networks. In each network, the size of the nodes represents the degree of a node and the color illustrates
the components. Such that blue shows components with the highest number of nodes, whereas gray represents the smallest components of
a network. Moreover, green and red describe components which have a number of nodes within the range of previous cases.
complexity of O(n2). (2) The complexity of the network
generation is linear such that for n nodes and m edges the
complexity is O(n + m).
IV. EXPERIMENT SETUP
A. Dataset
We benefit from a particular collaboration data derived from
the National Electronics and Computer Technology Center
(NECTEC) that presents different projects and collaborations
in the area of R&D. The dataset is stored in a relational
database consisting of research projects conducted between
July 2013 and July 2018. Each project may consist of different
deliverables: intellectual property (IP), papers, or prototypes
as well as may comprise different members from different
teams of the same institute. The dataset is the knowledge
management about the project where the key information is to
know (1) the type of the project, (2) project contributors and
contributions.
The dataset of combined team tables have almost 8k records
which is the information of more than 2.3k projects. Among
them 630 are related to IP, 1717 to papers, and 539 to
prototypes. Overall, the institute has more than 1000 members
who are contributing on different projects with certain features
(e.g., contribution percentage) which have been defined within
the organization to evaluate the contributions. One of the main
features we have used is the contribution percentage. The total
percentage assigned to each project is 100% that is divided
between the project members according to their contribution
on the project. Furthermore, IC-score is another feature that
is developed by the institute and it illustrates the value of
each project (e.g., prototype) based on its status (e.g., lab,
industrial). To obtain the IC-score for each member, the total
IC-score value of each project is divided by the contribution
percentage of each member. The details regarding the values
of both features (contribution percentage and IC-score) have
been further discussed further in Section V.
B. Network Metrics
A network (or graph) G = (V, E) consists of a set of
vertices V which are connected by the edges from set E.
There exists different parameters (e.g., centrality measures)
to analyze and study the networks. We choose centrality
measures to analyze the generated network layers, which help
to find the most important vertices within a network. Besides
the centrality measures, we also consider other metrics such
as network density and connected components to analyze the
properties of the network. The following is a brief description
of each metric.
a) Closeness Centrality: defines the closeness of a node
to other nodes by measuring the average shortest path from
that node to the all other vertices within the network. Hence,
the more central a node is, the closer it is to all other nodes
[23] calculated as CC(v) = (cid:80)
distance between vertices v and u.
1
d(v,u) , where d(v, u) is the
y
σst
b) Betweenness Centrality: indicates the number of times
a node acts as a bridge along the shortest path between two
other nodes. For a given node the number of shortest paths that
passes through the node implies the betweenness centrality of
the node. Nodes with high betweenness may have significant
influence in a network due to their control over the flow
of information passing between others through them. In a
network G = (V, E) betweenness centrality for node v is
where σst total number of
shortest paths from node s to node t and σst(v) is the number
of those paths that pass through v.
[8]: CB(v) = (cid:80)
s(cid:54)=v(cid:54)=t∈V
σst(v)
c) Degree Centrality:
identifies the number of direct
links which are connected to a vertex within the network.
The importance of the nodes with higher degree is due to
the immediate risk of these node while some information
is flowing through the network. The degree of a node v is
represented as, CD(v) = deg(v).
d) Clustering Coefficient: presents the likelihood of
nodes in a network that tend to cluster together. The value of
clustering coefficient lies between 0 and 1. When a network
is clique which means that every two distinct vertices are
adjacent, the value is 1, however, in a star network in which
a node's neighbours are not connected to each other at all,
clustering coefficient is 0. For an unweighted network, the
clustering of a node v is the fraction of possible triangles
deg(v)(deg(v)−1) where
through that node that exist, CC(v) =
T (v) is the number of triangles through node v and deg(v) is
the degree of v [24].
2T (v)
2m
e) Network Density:
is the ratio of potential links to
existing links in a network. The range of this metric varies
form 0 for a network with no links (sparse network) and 1
for networks with all possible links (dense network). nd =
n(n−1) , where n is the number of nodes and m is the number
of edges in network G.
f) Connected Components: are sub-networks in which
there are at least two vertices connected to each other through a
path. In other words, two vertices are in the same sub-network
if there is a path between them in the network. We use ncomp
as a notation to address the connected components in this the
paper.
It is to be observed that the chosen metrics are (1) local
when they are only considering a node itself and the informa-
tion of its neighbour to calculate, centrality measures are of
this category, or (2) global when they calculate a parameter
considering the whole knowledge of network properties, nodes
and edges, such as network density. Exploiting these metrics
on networks generated from collaborative data, the purpose is
to analyze the networks from different perspectives. Centrality
measures are indicators to define the important node within a
network. For instance, closeness centrality defines whether a
project has a higher value for the institute such as delivering
different outcomes (IP, papers, and prototypes). Moreover,
there might be an argument regarding the topic of the project
such that it is covering fundamental topics which other projects
need to collaborate with. Degree centrality, represents the
members' collaboration of a project with other projects. On
the other hand, metrics like network density and connected
components illustrates the general overview of a network.
Network density represents how much a network is away from
being a fully collaborative network in which all projects are
connected together.
V. RESULTS OF THE NETWORK ANALYSIS
A. Data Analysis
We perform a preliminary analysis on the data set in order to
conduct on the linkage threshed. We exploit histograms to plot
the frequency of the score and contribution percentage. Fig.
2 presents the histograms of IC-score and contribution per-
centage for each member in the collaboration data regarding
all projects. The histograms represent the number of members
with a certain value of IC-score (or contribution percentage) in
the dataset. Moreover, mean, standard deviation, and variance
are calculated for IC-score which are 3.16, 4.24, and 1.79,
respectively. For contribution percentage, the mean, standard
deviation and variance are obtained as 23.30, 22.80 and 5.20,
respectively. IC-score concentrates on lower values better than
contribution percentage, nevertheless, contribution percentage
represent the dataset better as the coverage range is broader.
Thus, we construct the linkage threshold defined in Equation
(III) considering the contribution percentage.
B. Network Analysis
We applied the proposed Algorithm 1 on our collaboration
dataset. As a result, we obtained a vector of network layers,
each represents a certain linkage threshold. For each network
we calculated the set of network metrics which has been
introduced in Section IV.
We chose 6 linkage thresholds which are 0, 20, 40, 60, 80,
and 100. For instance, with the linkage threshold equal to 20
two projects in the network are connected if the average con-
tribution percentage of the common members between those
projects is equal or greater than 20%. Thus, those two projects
are neighbours in the network. While increasing the threshold,
the number of nodes that could not satisfy the condition
increases dramatically. Thus, the number of isolated nodes
increases which impact the outcomes of network metrics. In
order to analyze the network regardless of the influence of
these nodes, the network metrics are applied after removing the
isolated nodes. We measured Betweeness Centrality CB(v),
Degree Centrality CD(v), Closeness Centrality CC(v), Clus-
tering Coefficient CC(v), Network Density nd, and Connected
Components ncomp for each network. Additionally, for the
local metrics, we calculated the average of nodes for the whole
network.
We first applied our algorithm considering only IP projects
data, and then on the combination of all projects (i.e., IP,
paper, and prototype). Fig. 3 describes the metrics on networks
that are constructed particularly on IP dataset and Fig. 4
provides the results for a similar setup while considering the
combination of all projects.
Fig. 2: Histograms of IC-score and contribution percentage in the collaboration dataset.
Fig. 3: The effect of the set of network metrics, CC (v), CB(v), CD(v), CC(v), nd, ncomp, on the generated network layers from IP projects.
The result in each plot represents the average for all the nodes within a network layer. Thus, the x-axis illustrates the linkage threshold
in which the corresponding network has been created and the metric is measured.
According to Fig. 3 starting from 0 as the linkage threshold
increases the values of betweenness, degree and closeness
centrality, clustering coefficient, network density decrease
whereas the number of connected components increases until
the linkage threshold is 60. However, the pattern of the results
for all metrics have dramatically changed within the range of
40 to 60. Besides the outcomes from Fig. 3, that represents
the result only for the IP projects, Fig. 4 provides the results
of applying network metrics including all types of projects
(IP, papers, and prototype). The results of both figures (Fig.
3 and 4) are representing the similar patterns. In other words,
the topology of networks are not any different from one
project type to another. Furthermore, although the linkage
threshold equal to 0 provides detailed information of projects,
the linkage threshold equal
to 100 represents a particular
perspective of the dataset which describes the main leaders
contribution in different projects.
C. Optimization and Future Work
Our methodology to construct network layers from collabo-
ration data reveals several optimization criteria. Optimizing the
0204060801000.0000.0010.0020.0030.0040.005BetweennessCentrality0204060801000.020.040.060.080.100.12DegreeCentrality0204060801000.020.040.060.080.100.12ClosenessCentrality020406080100LinkageThreshold0.500.550.600.650.700.750.80ClusteringCoeficeint020406080100LinkageThreshold0.020.030.040.050.06NetworkDenisty020406080100LinkageThreshold15202530354045ConnectedComponentsFig. 4: The effect of the set of network metrics on the generated network layers from IP, paper, and prototype projects.
number of network layers while still containing the maximum
on distinct information for enhanced analytics is a challenging
task. Moreover, the linkage threshold we have defined in this
paper can be generalized to a utility function to be performed
on any given collaboration dataset. In addition, deciding on
an optimal linkage threshold based on predefined criteria and
conditions could further improve the performance, but also
widen the applicability, of our algorithm. Additionally, we
will consider different network representations for the same
data in future work. We also plan on using more real-world
collaboration data from distinct sources to further generalize
our approach.
VI. CONCLUSION
The approach outlined in this paper
infers possible
researchers within projects of
collaboration networks of
an organization. Our method uses a linkage threshold
to automatically generate these network layers from the
relational
input data. We conducted a network analysis
on the produced networks using metrics such as clustering
coefficient, closeness and betweenness centrality, and illustrate
their impact on the different network layers. We, then, utilize
the results of the metrics as an important input to visualize
the generated graph in each configuration. We conclude that
the linkage threshold has a crucial impact on the network
properties and must be chosen with caution. Additionally, the
influence of the linkage threshold on the results of the metrics
indicates that the network representation can be optimized.
Acknowledgement. This work is partially funded by
the joint
Trust for Smart-ICT.
research programme UL/SnT-ILNAS on Digital
REFERENCES
[1] M. Akbas, M. Brust, and D. Turgut. Social network generation and role
determination based on smartphone data. In IEEE International Con-
ference on Computer Communications (INFOCOM) Student Workshop,
2012.
[2] M. I. Akbas, M. R. Brust, C. H. C. Ribeiro, and D. Turgut. Deployment
and mobility for animal social life monitoring based on preferential
attachment. In IEEE Conference on Local Computer Networks, pages
484 -- 491, Oct 2011.
[3] M. I. Akbas, M. R. Brust, C. H. C. Ribeiro, and D. Turgut. fapebook -
animal social life monitoring with wireless sensor and actor networks.
In IEEE Global Telecommunications Conference - GLOBECOM, pages
1 -- 5, Dec 2011.
[4] M. I. Akbas, M. R. Brust, D. Turgut, and C. H. Ribeiro. A preferential
attachment model for primate social networks. Computer Networks,
76:207 -- 226, 2015.
[5] A. Andronache, M. R. Brust, and S. Rothkugel. Hycast-podcast
discovery in mobile networks. In Proceedings of the 3rd ACM workshop
on Wireless multimedia networking and performance modeling, pages
27 -- 34. ACM, 2007.
[6] D. S. Bassett, P. Zurn, and J. I. Gold. On the nature and use of models
in network neuroscience. Nature Reviews Neuroscience, page 1, 2018.
[7] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast
Journal of statistical
unfolding of communities in large networks.
mechanics: theory and experiment, 2008(10):P10008, 2008.
[8] U. Brandes. A faster algorithm for betweenness centrality. Journal of
mathematical sociology, 25(2):163 -- 177, 2001.
[9] M. R. Brust, H. Frey, and S. Rothkugel. Adaptive multi-hop clustering
in mobile networks. In Int. Conf. on mobile technology, applications,
and systems, pages 132 -- 138. ACM, 2007.
[10] C. T. Butts. Revisiting the foundations of network analysis. science,
325(5939):414 -- 416, 2009.
[11] G. Casiraghi, V. Nanumyan, I. Scholtes, and F. Schweitzer. From
relational data to graphs: Inferring significant links using generalized
In International Conference on Social
hypergeometric ensembles.
Informatics, pages 111 -- 120. Springer, 2017.
0204060801000.000000.000250.000500.000750.001000.001250.001500.001750.00200BetweennessCentrality0204060801000.0050.0100.0150.0200.0250.0300.035DegreeCentrality0204060801000.020.040.060.080.100.12ClosenessCentrality020406080100LinkageThreshold0.550.600.650.700.750.800.85ClusteringCoeficeint020406080100LinkageThreshold0.0050.0100.0150.0200.0250.0300.0350.040NetworkDenisty020406080100LinkageThreshold405060708090100ConnectedComponents[12] J. Chen, M. R. Brust, A. R. Kiremire, and V. V. Phoha. Modeling
privacy settings of an online social network from a game-theoretical
In 9th IEEE International Conference on Collaborative
perspective.
Computing: Networking, Applications and Worksharing, pages 213 -- 220.
IEEE, 2013.
[13] J. G. Davis, J. K. Panford, and J. B. Hayfron-Acquah. Big and connected
data analysis with graph and relational databases using collaborative
filtering technique. Int. Journal of Computer Science and Information
Security (IJCSIS), 15(12), 2017.
[14] S. Derrible and C. Kennedy. Applications of graph theory and network
science to transit network design. Transport reviews, 31(4):495 -- 519,
2011.
[15] S. P. Fraiberger, R. Sinatra, M. Resch, C. Riedl, and A.-L. Barabási.
Quantifying reputation and success in art. Science, 2018.
[16] M. T. Gastner and M. E. Newman. The spatial structure of networks.
The European Physical Journal B, 49(2):247 -- 252, 2006.
[17] S. Hong, B. C. Coutinho, A. Dey, A.-L. Barabási, M. Vogelsberger,
L. Hernquist, and K. Gebhardt. Discriminating topology in galaxy
distributions using network analysis. Monthly Notices of the Royal
Astronomical Society, 459(3):2690 -- 2700, 2016.
[18] A. Karduni, A. Kermanshah, and S. Derrible. A protocol to convert
spatial polyline data to network formats and applications to world urban
road networks. Scientific data, 3:160046, 2016.
[19] M. E. Newman. Scientific collaboration networks. i. network construc-
tion and fundamental results. Physical review E, 64(1):016131, 2001.
[20] X. Ouvrard, J.-M. L. Goff, and S. Marchand-Maillet. Networks of
collaborations: Hypergraph modeling and visualisation. arXiv preprint
arXiv:1707.00115, 2017.
[21] L. Pan, T. Zhou, L. Lü, and C.-K. Hu. Predicting missing links and
identifying spurious links via likelihood analysis. Scientific reports,
6:22955, 2016.
[22] F. Peiravian, A. Kermanshah, and S. Derrible. Spatial data analysis of
complex urban systems. In IEEE Int. Conf. on Big Data, pages 54 -- 59.
IEEE, 2014.
[23] G. Sabidussi. The centrality index of a graph. Psychometrika, 31(4):581 --
603, 1966.
[24] J. Saramäki, M. Kivelä, J.-P. Onnela, K. Kaski, and J. Kertesz. Gen-
eralizations of the clustering coefficient to weighted complex networks.
Physical Review E, 75(2):027105, 2007.
[25] A. Schein, J. Paisley, D. M. Blei, and H. Wallach. Bayesian poisson
tensor factorization for inferring multilateral relations from sparse dyadic
In ACM Int. Conf. on Knowledge Discovery and Data
event counts.
Mining, 2015.
[26] Z. Sha, Y. Huang, J. S. Fu, M. Wang, Y. Fu, N. Contractor, and
W. Chen. A network-based approach to modeling and predicting product
coconsideration relations. Complexity, 2018, 2018.
[27] S. Shirinivas, S. Vetrivel, and N. Elango. Applications of graph theory
in computer science an overview. International Journal of Engineering
Science and Technology, 2(9):4610 -- 4621, 2010.
[28] F.-J. Wu, M. R. Brust, Y.-A. Chen, and T. Luo. The privacy exposure
In 2016 IEEE Global
problem in mobile location-based services.
Communications Conference (GLOBECOM), pages 1 -- 7. IEEE, 2016.
[29] R. Xiang, J. Neville, and M. Rogati. Modeling relationship strength
In Proceedings of the 19th international
in online social networks.
conference on World wide web, pages 981 -- 990. ACM, 2010.
[30] J. Yang and X.-D. Zhang. Predicting missing links in complex networks
based on common neighbors and distance. Scientific reports, 6:38208,
2016.
[31] C. Zhong, S. M. Arisona, X. Huang, M. Batty, and G. Schmitt. Detecting
the dynamics of urban structure through spatial network analysis. Int.
Journal of Geographical Information Science, 28(11):2178 -- 2199, 2014.
|
1706.02186 | 2 | 1706 | 2017-06-17T15:29:17 | Hierarchical Change Point Detection on Dynamic Networks | [
"cs.SI",
"physics.soc-ph"
] | This paper studies change point detection on networks with community structures. It proposes a framework that can detect both local and global changes in networks efficiently. Importantly, it can clearly distinguish the two types of changes. The framework design is generic and as such several state-of-the-art change point detection algorithms can fit in this design. Experiments on both synthetic and real-world networks show that this framework can accurately detect changes while achieving up to 800X speedup. | cs.SI | cs | Hierarchical Change Point Detection on Dynamic Networks
Yu Wang∗ Aniket Chakrabarti∗ David Sivako(cid:29)#
∗ Department of Computer Science and Engineering,
The Ohio State University, Columbus, Ohio, USA
[email protected],[email protected]
Srinivasan Parthasarathy∗
# Department of Statistics
7
1
0
2
n
u
J
7
1
]
I
S
.
s
c
[
2
v
6
8
1
2
0
.
6
0
7
1
:
v
i
X
r
a
ABSTRACT
This paper studies change point detection on networks with com-
munity structures. It proposes a framework that can detect both
local and global changes in networks e(cid:28)ciently. Importantly, it
can clearly distinguish the two types of changes. The framework
design is generic and as such several state-of-the-art change point
detection algorithms can (cid:27)t in this design. Experiments on both
synthetic and real-world networks show that this framework can
accurately detect changes while achieving up to 800X speedup.
CCS CONCEPTS
• Information systems → Data mining; Social networks; •
Computing methodologies → Modeling methodologies;
KEYWORDS
Anomaly Detection, Dynamic Social Networks, Community Detec-
tion
1 INTRODUCTION
Anomaly detection on networks is a problem arising in various
areas: from intrusion detection [10] to fraud detection [6], from
email network [17] to fMRI image [13]. One problem of particular
interest is change point detection on dynamic social networks [1,
19]. Social networks are known to have the hierarchical structure,
where the most well-known one is the community structure [9, 20].
Similar nodes are densely connected and form a community, while
dissimilar nodes reside in di(cid:29)erent communities and are less likely
to be connected. The interactions (or edges) among nodes can be
classi(cid:27)ed as inter-community interactions and intra-community
interactions. The intra-community interactions are more likely
to be present (in unweighted networks) or have more weight (in
weighted networks) than the inter-community interactions.
Most state-of-the-art change point detection approaches [6, 10,
13, 14, 22] do not consider the hierarchical structure in a network,
but treat the network structure as (cid:30)at. Hence they can hardly dis-
tinguish changes in those two kinds of interactions (intra and inter).
If there is an event associated with a particular community, the
change happens within that community only, and may not a(cid:29)ect
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for pro(cid:27)t or commercial advantage and that copies bear this notice and the full citation
on the (cid:27)rst page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior speci(cid:27)c permission
and/or a fee. Request permissions from [email protected].
WebSci'17, June 25-28, 2017, Troy, NY, USA.
© 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM.
978-1-4503-4896-6/17/06...$15.00
DOI: http://dx.doi.org/10.1145/3091478.3091493
the global network too much due to its locality and small scale. (Toy
example in Figure 1)
Figure 1: Toy example to distinguish global change and local
change on a two-community graph. The edges removal within c1
has only local impact, and hence is a local change; the edge removal
across c1 and c2 has global impact (to disconnect the graph), and
hence is a global change.
For example, consider the email network of a very big computer
science department. If a speci(cid:27)c lab is approaching a paper sub-
mission deadline, the frequency of email exchange within this lab
might outburst. Since the whole department is very big and the
daily email throughput of the whole department is high, it is un-
likely to detect the change associated with that lab at the global
level using the aforementioned algorithms.
On the other hand, if a single community is signi(cid:27)cantly larger
than the others, a signi(cid:27)cant change in that community will domi-
nate over the other smaller communities. Therefore, regardless of
whether there is any change to the rest of the network, the afore-
mentioned algorithms will classify this as a change point. That is,
the above algorithms do not answer where the change comes from,
neither can they answer if the change comes from within a huge
community or from the inter-community interaction.
Continuing with the previous email network example, if a lab
consists of half the people in the department (either a big group or
a small department), then the outburst of emails within this lab is
highly likely to be detected as a global event. Meanwhile, if several
groups are jointly working on a funding proposal, it will lead to
the email burst between communities, and can also be detected as
a global event. The above algorithms can not distinguish between
these two global events. Here we see that the existing algorithms
either miss minor and local changes, or fail to distinguish between
strong local changes and global changes. A recent work ([15]) can
answer which pairs of nodes result in change, but it fails to account
for the community structure.
Intuitively, the intra-community interaction captures local in-
formation while the inter-community interaction captures global
information. Hence, we expect to see the former one evolves di(cid:29)er-
ently from the global evolution pattern while the latter one should
be similar to the global evolution pattern [2].
In this paper, we show that the network evolution pattern can be
decomposed into inter-community evolution and intra-community
evolution. We show that running change point detection algorithms
at the global level could miss changes associated with a community,
and that change can be detected when we run the algorithms within
that community. We also show that the inter-community interaction
can be approximated by a hyper-network in which each hyper-node
is a contracted community [3]. And this contraction also gives us
computational bene(cid:27)ts.
This paper is organized as follow: we (cid:27)rst review the related
work, then describe the proposed framework. After that, we intro-
duce the experiments and provide the analysis. Finally, we conclude
the paper and discuss future works.
2 RELATED WORK
There are two recent surveys [1, 19] on change point detection. Most
state-of-the-art works [13, 22] do not consider the hierarchical struc-
ture in a network; Other works [4, 16, 17] mention the hierarchy in
their papers, and they all make speci(cid:27)c assumption about the under-
lying generative model: Moreno's work [16] assumes a network is
generated from a mixed Kronecker product graph model (mKPGM),
which is generated recursively from a seed matrix. The block of
the matrix at each level resembles the community. Peel's work [17]
assumes a network is generated from a generalized hierarchical ran-
dom graph model (GHRG), which organizes the network as a tree
of which the leaves are nodes in the network and the internal nodes
are communities. Bridges's work [4] assumes a network is gener-
ated from the generalized block two-level Erdős-Rényi (GBTER)
model, which posits the inter-community and intra-community
edges are formed in di(cid:29)erent ways. Although they mention the
hierarchical structure, they fail to distinguish between the change
associated to a community and the change associated to the whole
network. We design a framework that provides a systematic way
to detect and distinguish between local and global changes. Our
framework is generic and supports several state-of-the-art change
point detection algorithms. Another drawback of these network
hypothesis test based approaches is their low e(cid:28)ciency due to boot-
strapping: Peel's work does not scale very well in our experiments,
and its e(cid:28)ciency is improved up to 60 times when superimposed
by our framework.
Community detection [9] is also a time-consuming task. The Lou-
vain method [3] alternatively contracts and detects communities
on the networks, and has been one of the most e(cid:28)cient community
detection algorithm for several years. Its e(cid:28)ciency comes from the
network size reduction via contracting. We use the same idea for
e(cid:28)cient change point detection.
Another recent work ([15]) considers attributing the global change
score to node pairs. It de(cid:27)nes change scores at edge level, (cid:30)ags out
the top ranked edges and their neighbors as changed regions. That
work does not consider the community structure, and its focus is
on visualization. Our work distinguishes between inter-community
interaction and intra-community interaction, and shows the former
one can approximate the global evolution. Moreover, our framework
reduces the running time of the state-of-the-art algorithms [13, 17,
22].
3 METHODOLOGY
We follow the Type 4, "Event and Change Detection", in [19], which
is to (cid:27)nd snapshots from a network snapshot sequence that are
"signi(cid:27)cantly" di(cid:29)erent from their predecessors. Like [22], we also
assume each snapshot is generated from a generative model. Snap-
shots from the same generative model resemble each other, although
they are not identical due to randomness. The change of the gen-
erative model leads to "signi(cid:27)cant change" of the snapshots. This
assumption can be illustrated as a Markov network (Figure 2).
Latent
L1
Observed
G1
L2
G2
...
...
L3
G3
Lt
Gt
Figure 2: Representation of the underlying generative process. Lt s
are latent generative models, and Gt s are observed snapshots. Gt is
assumed to be a sample (generated) from Lt . "Signi(cid:27)cant" change
points are {t Lt (cid:44) Lt−1}. Note that graph snapshots and latent
models can represent both local structure as well as global structure.
Our work di(cid:29)ers from [22] in that we study networks with the
community structure, where each snapshot observation consists
of multiple components, corresponding to communities and their
interactions. In Figure 2, the generative models are latent and we
can only observe the generated snapshots. Existing approaches
have two directions: to estimate the generative model from mul-
tiple snapshots and then compare the estimated model [4, 17, 22];
or to compute the di(cid:29)erence of the snapshots directly [13]. Our
framework supports both types of approaches. In both cases, the
problem and the solution can be generalized as [19]: given a net-
work snapshot sequence {Gt } and a dissimilarity function (outlier
score) f : {Gt } × {Gt } → R, a change is de(cid:27)ned as a time point t,
such that f (Gt , Gt−1)>th0, where th0 is some pre-speci(cid:27)ed thresh-
old. Change point detection is to (cid:27)nd all time stamps ts at which
changes occur. All the aforementioned works run on the original
network, and hence detect changes at the global level.
We de(cid:27)ne intra-community change and inter-community change
in a similar fashion: let Cit be the community i at time t, the intra-
community change point is de(cid:27)ned as a time point t such that
fl(Cit , Ci,t−1) > th1. By contracting the community Cit in the
network Gt into a hyper node ni, one gets a contracted network
. The inter-community change point is de(cid:27)ned as a time point
Gc
t
t such that fc(Gc
t−1) > th2. Our goal is to (cid:27)nd both the intra-
community change (local change) as well as the inter-community
change (global change).
Problem De(cid:27)nition Given a network sequence {Gt }T
t =1, its com-
munity assignment {thi}k
i =1, and dissimilarity functions fl(·, ·), fc(·, ·),
(cid:27)nd all the time points t ∈ {2, · · · ,T} such that either 1) fl(Cit , Ci,t−1) >
th1, or 2) fc(Gc
t−1)>th2 for some pre-speci(cid:27)ed threshold th1, th2.
t , Gc
t , Gc
3.1 Framework Description
We propose the following framework (Algorithm 1) which reveals
both the local change as well as the global change. In Line 1, we
(cid:27)rst partition communities on the (cid:27)rst snapshot. We assume the
community assignment does not change over time. If there really
is a severe change in community assignment, the event will be
detected as a global change. Between global changes, the commu-
nity assignment will remain constant. Hence one can apply the
local change detection part of the framework to the subsequences
in which community assignment remains similar. One may argue
that it is more robust to partition communities on the aggregated
network from the (cid:27)rst couple of snapshots. Our reasoning is that if
no global change happens during the (cid:27)rst couple of snapshots, the
community assignment/structure should remain the same; other-
wise we (cid:30)ag out that snapshot as abnormal (to be investigated), and
redo the community partition on the new snapshot. The for-loop
from Line 2 to Line 12 scans over all the snapshots. The original
snapshot is contracted in Line 3 into a weighted (hyper-)network
in which each hyper-node corresponds to a community in the orig-
inal snapshot (Figure 3). If the original network is unweighted, the
weight of the hyper-edge is the number of actual inter-community
edges divided by the number of all possible inter-community edges.
Otherwise the weight of the hyper-edge is the summation of the
inter-community edge weights divided by the sizes of the two com-
munities. The contraction operation is widely used in hierarchical
community partition algorithms [9, 12]. The for-loop from Line 4 to
Line 8 iterates over all the communities. The provided change point
detection algorithm runs on the community level, and returns the
dissimilarity score between two consecutive (sub-)networks. The
branch in Line 9 detects the global change by running the detection
algorithm on the contracted (hyper-) network.
Algorithm 1 Hierarchical Change Point Detection Framework
Input: network sequence {Gt }t1 , any change point detection algorithm
change points
Output: global
change points chan❕eSet,
1: {ci }k1 = partition(G1); {community partition}
2: for t = 2 to T do
3:
IsChanged(·,·)
chan❕eSeti in community i
local
t =contract({ci }k1 );
Gc
{Below: local change detection}
for i = 1 to k do
if IsChanged(cit , ci,t−1) then
chan❕eSeti = chan❕eSeti ∪ {t };
end if
end for
{Below: global change detection}
if IsChanged(Gc
t−1) then
t , Gc
chan❕eSet = chan❕eSet ∪ {t };
4:
5:
6:
7:
8:
9:
10:
11:
end if
12: end for
Community partitioning gives us e(cid:28)cacy while network con-
traction gives us e(cid:28)ciency: each community is a (cid:27)ne-grained sub-
network, and running detection algorithm on each community can
avoid (cid:30)uctuation and noises from neighboring communities, and
hence the detected change points are solely associated with this
Figure 3: Toy example to illustrate contraction on the previ-
ous two-community graph. Communities c1, c2 are contracted into
hyper-node c1, c2 respectively. Global change in the original net-
work (graph disconnection) is captured by the change in the con-
tracted network.
particular community; contraction signi(cid:27)cantly reduces network
size, and in turn, reduces the running time of the algorithms whose
complexity is proportional to the network size. On the other hand,
network size reduction also implies information loss, and therefore
the quality of change points detected on the contracted network
is inferior to that on the original network. Fortunately, our exper-
iments show that the ranking of outlier scores on the contracted
network is similar to that on the original network, which implies
that the inter-community evolution can indeed capture global evo-
lution pattern.
3.2 Algorithms
We superimpose the framework on three state-of-the-art algo-
rithms [13, 17, 22],
3.2.1 DeltaCon. DeltaCon [13] computes the outlier score from
the snapshots directly. It extracts a feature vector from each snap-
shot using personalized PageRank, and computes the rooted Eu-
clidean distance of two consecutive feature vectors.
3.2.2 LetoChange. LetoChange [17] assumes the network is
generated from GHRG model in which the network has a tree-like
structure: leaves correspond to nodes while internal tree nodes
correspond to communities. The network sequence is partitioned
into equal sized sliding windows, and the model parameters are
estimated within a window. The outlier is (cid:30)agged out if the model
parameters estimated change greater than a threshold. It bootstraps
networks from the generative model to calculate a proper threshold.
To sample multiple networks from a generative model is time-
consuming. We bootstrap outlier scores for threshold determination,
which gains much computational bene(cid:27)t (detailed at the end of this
section).
3.2.3 EdgeMonitoring. EdgeMonitoring [22] follows LetoCh-
ange's fashion: (cid:27)rst estimate the model parameters from a win-
dow (several snapshots), then detect change points based on model
parameters comparison. EdgeMonitoring estimates the edge prob-
ability directly from each window (for the unweighted network)
and calculates the Kullback-Leibler divergence of the sequences of
two consecutive windows. We modify it to account for weighted
networks: we normalize the weights at each snapshot, and average
over snapshots within a window. This averaged weight is used as
the probability estimate in the above KL divergence calculation.
Algorithm 2 Hierarchical Change Point Detection Framework
with Threshold Determination
Input: network sequence {Gt }t1 , any change point detection algorithm
change points
change points chan❕eSet,
Output: global
1: {ci }k1 = partition(G1); {community partition}
2: for t = 2 to T do
3:
IsChanged(·,·)
chan❕eSeti in community i
local
t =contract({ci }k1 );
Gc
{Below: local change detection}
for i = 1 to k do
Outlier Scor ei,t = IsChanged(cit , ci,t−1)
4:
5:
6:
end for
{Below: global change detection}
Outlier Scor et = IsChanged(Gc
t−1)
t , Gc
7:
8: end for
9: for i = 1 to k do
T hr esholdi = Bootstrap(Outlier Scor ei).percentile(0.95)
10:
chan❕eSeti = {t Outlier Scor ei,t > T hr esholdi }
11:
12: end for
13: T hr eshold = Bootstrap(Outlier Scor e).percentile(0.95)
14: chan❕eSet = {t Outlier Scor et > T hr eshold }
Although DeltaCon and LetoChange have their own threshold
determination strategies, the former one's normality assumption
does not hold while the latter one's network bootstrap is too time-
consuming. We use an e(cid:28)cient, permutation test based strategy. All
the three algorithms use the same way to determine outlier scores:
(cid:27)rst, run the algorithm on the whole snapshot sequence and obtain
an outlier score sequence; then, use bootstrap to compute the 0.95
con(cid:27)dence level of the outlier scores. The rationale of this threshold
determination is essentially the same as that of the permutation
test [18]. The modi(cid:27)ed framework is displayed in Algorithm 2, in
which the IsChanged(,) function again returns the dissimilar score.
4 EXPERIMENTS AND EVALUATION
4.1 Data
We apply the framework to two synthetic networks and one real
world network. For the synthetic networks, we test our framework
on the Stochastic Block Model (SBM [11]) and the Block Two-Level
Erdős-Rényi (BTER [21]) model. SBM assumes edge probability a
function of the community membership of the two incident nodes;
BTER model assumes the intra-community edges are sampled from
Erdős-Rényi model [7], while the inter-community edges are sam-
pled from Chung-Lu model [5]. For both experiments, we do not
change community membership (as discussed in Section 3.1), and
inject either global or local changes at di(cid:29)erent time stamps (Ta-
ble 1).
The SBM experiment has 1k nodes and 8 communities ranging
from size 50 to size 300. The edge probability is determined by a
Table 1: Changes Injected to the Synthetic Networks
Event
Order
1
Time
Stamp
16
2
3
4
31
51
76
SBM (1k nodes, 8 commu-
nities)
connection rate in the
largest community c0
reduced by 1/3 (Local
Change)
con-
inter-community
among
nection rates
c0, c1, c5, c6 reduced by
1/3 (Global)
connection rates in two
smallest
communities
c6, c7 doubled (Local)
SBM matrix regenerated
(Global)
BTER (100 nodes, 5 com-
munities)
connection rate in the
largest community c0
reduced by 1/3 (Local
Change)
Chung-Lu sequence in c0
change (Global)
connection rates in two
smallest
communities
c3, c4 doubled (Local)
Chung-Lu sequence of
all the nodes regenerated
(Global)
symmetric stochastic block matrix whose entries are sampled from
Uniform(0, 1) with the restriction that main diagonal entries greater
than o(cid:29)-diagonal entries. The BTER experiment has 100 nodes and
5 communities whose sizes are sampled from power a law distribu-
tion [24], and range from 15 to 25. ER probability is sampled from
a beta distribution [4], while CL sequence is sampled from another
power law distribution [8]. Each snapshot is a weighted network
where the edge weight is a sample from a binomial distribution and
normalized to the range [0,1]. Since LetoChange does not support
weighted network, we unweight each network by retaining the
edges with probability equal to the edge weight.
For the real world network, we use the international trade net-
work1 from the year 2001 to the year 2014. We select 90 coun-
tries/economies and represent them as nodes. The network is di-
rected and weighted, where the direction speci(cid:27)es import/export
and the weight is the trade volume. The network is near a clique
since almost every two countries have bilateral trade between them.
There are six ground truth communities in the network, cor-
responding to free trade zone and/or geopolitics alike nations:
Asia-Paci(cid:27)c Economic Cooperation (APEC), black sea economic
cooperation (BSEC), (cid:27)fteen developed western European countries
(EU15), Latin American Integration Association (LAIA) and South-
ern African Development Community (SADC), Organization of
Islamic Cooperation (OIC). The Louvain [3] community partition
algorithm is also applied to this network and returns consistent
partitions.
4.2 Experiments and Results
4.2.1
Synthetic Network. We apply our framework with the
three aforementioned detection algorithms on the synthetic net-
works. The generation process is described in the previous subsec-
tion. We present both quality and time e(cid:28)ciency of our framework.
We report time e(cid:28)ciency in Table 2, and use both qualitative and
quantitative methods to validate the quality.
Figure 4 shows the change points detected on the SBM net-
work. Figure 4a is the result on the global (original) network, and
Figure 4b is the result on the contracted network; the curves are
1www.worldbank.org
DCG is calculated on the contracted network, while IDCG (refer-
ence) is calculated on the original network. The outlier scores from
two networks are sorted in descending order respectively. ri is the
number of matches between the target ranking and the reference
ranking within (cid:27)rst i scores, and T is the number of snapshots. The
NDCG scores for EdgeMonitoring and DeltaCon are 0.832, 0.666
respectively, indicating reasonably good approximation.
Figure 5: Change point detection on SBM in the largest community
(300 nodes). All three algorithms are able to detect the local event
1(cid:13) at T=16.
Figure 5 shows the change points detected on the largest com-
munity. All three algorithms detect the local change ( 1 in Table 1)
that edge probability reduces at time stamp 16 in C0. It's interesting
to note that EdgeMonitoring detects the local change 1 on the
original network (Figure 4a). This is because the change occurs
in the largest community (consisting of 30% of all the nodes), and
the node pairs in that community are more likely to be tracked.
If we only run the algorithm on the original network, we would
not be able to tell if the change corresponds to a global event or a
local event. DeltaCon is more conservative in terms of (cid:30)agging out
change points: it not only misses the local event 1 in Figure 4a,
but also misses the global event 2 . Yet it is still able to detect the
local change in Figure 5. Similarly, running algorithms within com-
munity c6, c7 reveals local event 3 . This result is not included for
brevity.
Figure 6 shows the change points detected on the BTER network.
We see that all three algorithms capture the global events 2 , 4 on
the original network.EdgeMonitoring and LetoChange in addition
capture the local event 3 , which corresponds to edge probability
increase in the two smallest communities (Table 1). Although both
1 and 3 are local events, the largest community consists of 23% of
all the nodes while the two smallest communities together consist of
35% of all the nodes. Intuitively, the latter should have more impact
on the global network than the former. And from the algorithmic
perspective, the node pairs of the latter have higher chance to be
tracked than the former. Figure 6b shows that after contraction,
all three algorithms only capture the global events. Running the
algorithms within each community detects the local change and
we do not include the result for brevity. The NDCG scores for
EdgeMonitoring, DeltaCon and LetoChange are 0.832, 0.666 and
0.832 respectively. The snapshots before and after the global event
4 are visualized in Figures 7 and 8. We can see from Figure 7 that
the inter-community interaction between the red community and
the others is enhanced after the event, which is also revealed in the
contracted network in Figure 8.
(a) SBM Global (1k nodes, re-scalded and shifted for visualization). Local
change 3(cid:13) in the two smallest communities are insigni(cid:27)cant at global level,
and hence is ignored by both algorithms.
(b) SBM Contract (8 hyper-nodes). EdgeMonitoring (black, top) detects two
global events 2(cid:13) and 4(cid:13), while DeltaCon (green, middle) and LetoChange (red,
bottom) detect only one.
Figure 4: Change point detection on SBM at global level.
outlier scores for various change point detection algorithms and
the horizontal bars are corresponding thresholds. LetoChange can
not (cid:27)nish within 48 hours (Table 2) on the original network, and
hence is not displayed in Figure 4a. We can see that EdgeMoni-
toring correctly captures two global changes and a local change
in the largest community of the original network (Figure 4a). Af-
ter contraction (Figure 4b), EdgeMonitoring only captures the two
global changes. This is what we can expect since inter-community
interaction re(cid:30)ects the global pattern, and contraction only pre-
serves this global pattern. Although DeltaCon does not capture
both the global changes, the quality of DeltaCon on the contracted
network is the same as on the original network while achieving
830 times e(cid:28)ciency improvement! Note that the quality of change
point detection on the original network is totally determined by the
detection algorithm itself. Applying our framework (i.e. to contract
the network) does not deteriorate the quality. A similar observation
holds for LetoChange.
We note that it is the outlier score ranking (say, top αs% as
in [22]), rather than the absolute values, that matters in change
point determination. Hence we use the Normalized Discounted
Cumulative Gain (NDCG [23]) scores to evaluate how good the con-
tracted one approximates the original one. NDCG score quanti(cid:27)es
the di(cid:29)erence between two rankings, and perfect match results in
NDCG = 1.0.
DCGT =
2ri − 1
log2(i + 1) ,
IDCGT =
2i − 1
log2(i + 1)
NDCGT =
DCGT
IDCGT
,
T
i =1
where
T
i =1
Table 2: Time E(cid:28)ciency Comparison on Di(cid:29)erent Networks
EdgeMonitoring1
Comm.
Avg
3.7s
1.7s
0.5s
Contr.
(Speedup)
1.5s (60X)
1.5s (2X)
0.4s (50X)
DeltaCon
Contr.
(Speedup)
0.6s (830X)
0.1s (50X)
1.3s (30X)
Comm.
Avg
24s
1.0s
1.2s
LetoChange
Contr.
(Speedup)
2h (>60X)
2h (25X)
5m (30X)
Comm.
Avg
N/A4
13h
9m
Total
N/A
67h
60m
Data
Orig.
Total2
Orig.
Total
Orig.
85s
2.5s
22s
31s
10s
3.4s
SBM
BTER
Trade
1 EdgeMonitoring and DeltaCon are implemented in MATLAB and run on a commercial desktop, while LetoChange is implemented in Python and
runs on a cluster with 28 cores. Each running time averaged over 5 runs.
2 Total time = community time × number of communities.
3 The program runs for 120 hours, but still has no sign of (cid:27)nish, so we kill it.
4 LetoChange takes 110 hours to obtain the result in Figure 5.
500s
5s
42s
192s
5.1s
8.5s
DNF3
51h
150m
(a) BTER Global (100 nodes, re-scaled and shifted for visualization). Local
change 1(cid:13) is ignored by all three algorithms, while 3(cid:13) is captured by Edge-
Monitoring (barely) and LetoChange.
(a) BTER network at T=75, before the global event 4(cid:13)
(b) BTER Contract (5 hyper-nodes). EdgeMonitoring (black, top) and
LetoChange (red, bottom) detect two global events, while DeltaCon (green,
middle) detects only one global event 4(cid:13).
Figure 6: Change point detection on BTER at global level.
The two synthetic experiments above show that superimposing
our framework on top of the aforementioned change point detection
algorithms can indeed distinguish global and local change, and
hence gives us (cid:27)ner granularity knowledge of the evolution of a
dynamic network.
4.2.2 Real World Network. Figure 9 shows the result of change
point detection on the original network and the contracted net-
work using the international trade network. It can be seen that the
majority algorithms on both the networks reveal the year 2009 as
the most signi(cid:27)cant outlier. The year 2009 is a year immediately
after the global (cid:27)nancial crisis, and the term "The Great Recession"
(b) BTER network at T=76, after the global event 4(cid:13)
Figure 7: Visualization of BTER network before and after the
global event 4(cid:13). Edge width and transparency re(cid:30)ect interac-
tion strength, and color represents community membership. Inter-
community interaction is enhanced after the global event 4(cid:13), and
the red community in particular has stronger interaction with all
other communities after 4(cid:13).
is applied to the global recession which started in that year.2 It is
pretty clear that the global trade volume drops signi(cid:27)cantly during
that year. The NDCG scores for EdgeMonitoring, LetoChange and
2http://www.cbpp.org/research/economy/chart-book-the-legacy-of-the-great-
recession
(a) Contracted BTER network at
T=75, before the global event 4(cid:13)
(b) Contracted BTER network at
T=76, after the global event 4(cid:13)
Figure 8: Visualization of contracted BTER network before and af-
ter the global event 4(cid:13). The observation that the red community
has stronger interaction with others in Figure 7 is nicely captured
by the contracted network.
DeltaCon are 0.960, 0.654 and 0.909 respectively, which suggests
great approximation for EdgeMonitoring and LetoChange, and
good approximation for DeltaCon. The speedup of the framework
is reported in Table 2.
(a) Original Network, both EdgeMonitoring (black star, top) and LetoChange
(red diamond, bottom) detect the year 2009 as a change point, at which the
international trade volume drops signi(cid:27)cantly (background bar); DeltaCon
detects the year 2012 as abnormal. (re-scaled and shifted for visualization,
explainable outliers are blue-boxed)
Figure 10 compares global change point detection and local
change point detection. Figure 10a is the result of running the
detection algorithms on the original network. Figure 10b is the
result of running the detection on the APEC community (Asia-
Paci(cid:27)c region). We see that the two (sub-)networks have similar
outliers: the 2009 recession is detected on both the networks. This
is not surprising since this APEC community contributes 44% of
the world trade,3 which can also be observed from the similarity
of the two background trade volume bar charts. Here we see the
impact of a "big", in terms of edge weight, community to the global
network. Two detection algorithms also (cid:30)ag out the year 2010 as a
local change point, which could be explained by the GDP growth
rebound of the major economies in this region.4 Figure 11 visualizes
the APEC trade network. We can see that the bilateral trade volume
drops signi(cid:27)cantly post crisis, and several economics (cid:30)ip from trade
surplus to trade de(cid:27)cit within the region. Comparing Figure 11c and
Figure 11b, we see trade volume jumps among several economics,
which is a sign of recovery.
Figure 10c shows the result of local change point detection on
the Middle East-North Africa community. Its evolution pattern
(the trade volume bar chart, as well as the outlier score ranking
distribution) is clearly di(cid:29)erent from that of the global network.
This can also be expected given its relatively small scale economy
size and relatively homogeneous economic structures. The year
2005 is (cid:30)agged as an outlier by EdgeMonitoring, which coincides
with Iraq's purple revolution. 5 The year 2012 is (cid:30)agged as an outlier
by both EdgeMonitoring and DeltaCon, which coincides with ISIS's
rise in Syria.6 LetoChange (cid:30)ags the years 2013 and 2014 as outliers,
we conjecture that might be due to the escalation of the situation
with increasing international involvement.
Both change points and outlier ranking distribution re(cid:30)ect net-
work evolution pattern. From Figure 10 we see that while the evo-
lution pattern of a major community might approximate that of the
global network, the evolution patterns of other communities di(cid:29)er
from that of the global network. We will miss the change points or
events associated with a particular community if we only run the
detection algorithm on the global network.
5 CONCLUSION
In this paper, we study hierarchical change point detection on
dynamic social networks. We distinguish the intra-community evo-
lution and the inter-community evolution. Our framework detects
global change points on the inter-community network, and local
change points on the intra-community networks. This framework
is compatible with several state-of-the-art change point detection
algorithms. Extensive empirical evaluation on several networks
(both synthetic and real world) show this framework has not only
quality advantages but also signi(cid:27)cant computational bene(cid:27)ts.
(b) Contracted Network, all three algorithms detect the year 2009 as a change
point.
Figure 9: Global change point detected on the international trade
network, using both the original network and the contracted net-
work. The Great Recession (global event) in the year 2009 is (cid:30)agged
as abnormal on both the networks. The NDCG scores of the three
algorithms on the two networks are 0.960, 0.654, 0.909 respectively,
indicating good approximation of the contracted network.
3https://ustr.gov/trade-agreements/other-initiatives/asia-paci(cid:27)c-economic-
cooperation-apec/us-apec-trade-facts
4http://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG
5https://en.wikipedia.org/wiki/Colour_revolution
6https://en.wikipedia.org/wiki/Islamic_State_of_Iraq_and_the_Levant
(a) Global network.
(a) APEC trade network in 2008.
(b) APEC sub-network. Both the years 2009 and 2010 are (cid:30)agged out as out-
liers. We did not (cid:27)nd a good explanation for LetoChange's outlier at 2006.
NDCG scores to the global network are 0.913, 0.827, 0.975 respectively.
(b) APEC trade network in 2009. International trade volume drops signi(cid:27)-
cantly (fewer heavy edges), and several economics (cid:30)ip between surplus and
de(cid:27)cit (within the region).
(c) OIC sub-network. The evolution pattern is signi(cid:27)cantly di(cid:29)erent from
that of the global network in Figure 10a. NDCG scores to the global network
are 0.826, 0.714, 0.906 respectively.
Figure 10: Comparison of global vs local. APEC community's evo-
lution resembles that of the global network in both trade volume
and outlier ranking due to its major role (heaviest edges) in the
global network. OIC community evolves di(cid:29)erently from the global
network, and changes associated to OIC community is missing in
the global network.
ACKNOWLEDGMENTS
The authors would like to thank Leto Peel for providing his code
base, and Wenlei Bao and and Congrong Guan for helping col-
lect the international trade data. The authors would also like to
thank the anonymous referees for their valuable comments. This
work is supported in part by NSF grant DMS-1418265, IIS-1550302
(c) APEC trade network in 2010. More and heavier edges emerge, sign of re-
covery.
Figure 11: Visualization of APEC trade network (weighted, undi-
rected). Node size is proportional to the economic size, and red
nodes have trade de(cid:27)cit while grey nodes have trade surplus.
Edge width and transparency re(cid:30)ect bilateral trade volume (ex-
port+import).
and IIS-1629548. Any opinions, (cid:27)ndings, and conclusions or rec-
ommendations expressed in this material are those of the authors
and do not necessarily re(cid:30)ect the views of the National Science
Foundation.
REFERENCES
[1] Leman Akoglu, Hanghang Tong, and Danai Koutra. 2014. Graph-based Anomaly
Detection and Description: A Survey. Data Mining and Knowledge Discovery
(DAMI) 28, 4 (2014).
[2] Sitaram Asur, Srinivasan Parthasarathy, and Duygu Ucar. 2009. An event-based
framework for characterizing the evolutionary behavior of interaction graphs.
ACM Transactions on Knowledge Discovery from Data (TKDD) 3, 4 (2009), 16.
[3] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb-
vre. 2008. Fast unfolding of communities in large networks. Journal of statistical
mechanics: theory and experiment 2008, 10 (2008), P10008.
[4] Robert A Bridges, John P Collins, Erik M Ferragut, Jason A Laska, and Blair D
Sullivan. 2015. Multi-Level Anomaly Detection on Time-Varying Graph Data. In
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social
Networks Analysis and Mining 2015. ACM, 579–583.
[5] Fan Chung and Linyuan Lu. 2002. The average distances in random graphs with
given expected degrees. Proceedings of the National Academy of Sciences 99, 25
(2002), 15879–15882.
[6] William Eberle and Lawrence Holder. 2016. Identifying Anomalies in Graph
Streams Using Change Detection. (2016).
[7] Paul Erdős and A Rényi. 1960. On the evolution of random graphs. Publ. Math.
Inst. Hungar. Acad. Sci 5 (1960), 17–61.
[8] Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. 1999. On power-law
relationships of the internet topology. In ACM SIGCOMM computer communica-
tion review, Vol. 29. ACM, 251–262.
[9] Santo Fortunato. 2010. Community detection in graphs. Physics reports 486, 3
(2010), 75–174.
[10] Christopher R Harshaw, Robert A Bridges, Michael D Iannacone, Joel W Reed,
and John R Goodall. 2016. GraphPrints: Towards a Graph Analytic Method
for Network Anomaly Detection. In Proceedings of the 11th Annual Cyber and
Information Security Research Conference. ACM, 15.
[11] Brian Karrer and Mark EJ Newman. 2011. Stochastic blockmodels and community
structure in networks. Physical Review E 83, 1 (2011), 016107.
[12] George Karypis and Vipin Kumar. 1998. Multilevelk-way partitioning scheme
for irregular graphs. Journal of Parallel and Distributed computing 48, 1 (1998),
96–129.
[13] Danai Koutra, Neil Shah, Joshua T Vogelstein, Brian Gallagher, and Christos
Faloutsos. 2016. Deltacon: Principled Massive-Graph Similarity Function with
Attribution. ACM Transactions on Knowledge Discovery from Data (TKDD) 10, 3
(2016), 28.
[14] Timothy La Fond, Jennifer Neville, and Brian Gallagher. 2014. Anomaly Detection
in Networks with Changing Trends. (2014).
[15] Timothy La Fond, Jennifer Neville, and Brian Gallagher. 2016. Generating Local
Explanations of Network Anomalies via Score Decomposition. (2016).
[16] Sebastian Moreno and Jennifer Neville. 2013. Network hypothesis testing using
mixed Kronecker product graph models. In Data Mining (ICDM), 2013 IEEE 13th
International Conference on. IEEE, 1163–1168.
[17] Leto Peel and Aaron Clauset. 2014. Detecting change points in the large-scale
structure of evolving networks. arXiv preprint arXiv:1403.0989 (2014).
[18] Edwin JG Pitman. 1937. Signi(cid:27)cance tests which may be applied to samples from
any populations. Supplement to the Journal of the Royal Statistical Society 4, 1
(1937), 119–130.
[19] Stephen Ranshous, Shitian Shen, Danai Koutra, Steve Harenberg, Christos Falout-
sos, and Nagiza F Samatova. 2015. Anomaly detection in dynamic networks:
a survey. Wiley Interdisciplinary Reviews: Computational Statistics 7, 3 (2015),
223–247.
[20] Yiye Ruan, David Fuhry, Jiongqian Liang, Yu Wang, and Srinivasan Parthasarathy.
2015. Community Discovery: Simple and Scalable Approaches. In User Commu-
nity Discovery. Springer, 23–54.
[21] C Seshadhri, Tamara G Kolda, and Ali Pinar. 2012. Community structure and
scale-free collections of Erdős-Rényi graphs. Physical Review E 85, 5 (2012),
056109.
[22] Yu Wang, Aniket Chakrabarti, David Sivako(cid:29), and Srinivasan Parthasarathy.
2017. Fast Change Point Detection on Dynamic Social Networks. International
Joint Conference on Arti(cid:27)cial Intelligence (IJCAI) (2017).
[23] Yining Wang, Liwei Wang, Yuanzhi Li, Di He, Wei Chen, and Tie-Yan Liu. 2013.
A theoretical analysis of NDCG ranking measures. In Proceedings of the 26th
Annual Conference on Learning Theory (COLT 2013).
Jaewon Yang and Jure Leskovec. 2012. Community-a(cid:28)liation graph model for
overlapping network community detection. In Data Mining (ICDM), 2012 IEEE
12th International Conference on. IEEE, 1170–1175.
[24]
|
1510.03814 | 2 | 1510 | 2015-10-17T07:50:21 | In-Network Neighborhood-Based Node Similarity Measure: A Unified Parametric Model | [
"cs.SI"
] | In many applications, we need to measure similarity between nodes in a large network based on features of their neighborhoods. Although in-network node similarity based on proximity has been well investigated, surprisingly, measuring in-network node similarity based on neighborhoods remains a largely untouched problem in literature. One grand challenge is that in different applications we may need different measurements that manifest different meanings of similarity. In this paper, we investigate the problem in a principled and systematic manner. We develop a unified parametric model and a series of four instance measures. Those instance similarity measures not only address a spectrum of various meanings of similarity, but also present a series of tradeoffs between computational cost and strictness of matching between neighborhoods of nodes being compared. By extensive experiments and case studies, we demonstrate the effectiveness of the proposed model and its instances. | cs.SI | cs | In-Network Neighborhood-Based Node Similarity Measure:
A Unified Parametric Model
Yu Yang
School of Computing Science
Simon Fraser University
Burnaby, BC, Canada
[email protected]
Jian Pei
School of Computing Science
Simon Fraser University
Burnaby, BC, Canada
[email protected]
5
1
0
2
t
c
O
7
1
]
I
S
.
s
c
[
2
v
4
1
8
3
0
.
0
1
5
1
:
v
i
X
r
a
ABSTRACT
In many applications, we need to measure similarity between nodes
in a large network based on features of their neighborhoods. Al-
though in-network node similarity based on proximity has been
well investigated, surprisingly, measuring in-network node similar-
ity based on neighborhoods remains a largely untouched problem
in literature. One grand challenge is that in different applications
we may need different measurements that manifest different mean-
ings of similarity. In this paper, we investigate the problem in a
principled and systematic manner. We develop a unified paramet-
ric model and a series of four instance measures. Those instance
similarity measures not only address a spectrum of various mean-
ings of similarity, but also present a series of tradeoffs between
computational cost and strictness of matching between neighbor-
hoods of nodes being compared. By a set of extensive experiments
and case studies, we demonstrate the effectiveness of the proposed
model and its instances.
1.
INTRODUCTION
How can we measure the similarity between two nodes in a large
network? The de facto established methods are based on the prox-
imity between the two nodes in the network (e.g., shortest distance),
or the relative proximity between the two nodes and the other an-
chor nodes (e.g., SimRank [11] and its variations). However, in
many applications, such as those where the access to the network
is restricted, the proximity or relative proximity methods cannot be
used. Moreover, in different applications we may need different
measures, since the meaning of similarity may vary dramatically.
EXAMPLE 1
(MOTIVATION EXAMPLES). In Twitter, how
can we measure the similarity between two users u and v? In
general, we cannot access the whole Twitter network, and thus we
cannot compute the shortest distance between u and v or the Sim-
Rank [11]. Instead, we can run neighborhood queries on selected
users as nodes in the network. Consequently, we can obtain the
neighborhoods of u and v, which contain the information about the
neighbor users (those who follow or being followed by u and v,
respectively) and the tweets sent by those neighbor users, and, if
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00.
necessary, the information about the neighbors' neighbors. Can we
measure the similarity between u and v based on the neighborhood
information? This is a fundamental challenge in analyzing many
social networks where the network access is constrained.
Even if assuming the access to a whole network, in many ap-
plications, similarity may still involve neighborhood information.
Consider a social network where nodes are users with their occu-
pations as labels, and edges represent friendship relations, we are
interested in finding users whose friends have similar distribution in
occupation. Network proximity between two users does not help in
measuring their similarity in this context. Instead, we have to mea-
sure the similarity based on the neighborhoods of the two nodes
being compared.
As another example, in the Yelp network, to compare a leader
of a community in Australia and a leader of another community in
Vancouver in terms of the structures of the communities they are
leading, the proximity between the two leaders or the proximity
between the members in the two communities do not help, either.
Instead, we have to compare the communities, which are neigh-
borhoods of the two leaders in the social network, and use effective
features, such as the distribution of different types of users and user
connection patterns, to design a meaningful similarity measure.
In the above examples and many similar scenarios, proximity
measures (e.g., shortest distance) or relative proximity measures
(e.g., SimRank or its variations) cannot be applied due to the access
restrictions or cannot capture the application meaning of similarity,
and thus cannot be used.
Several recent studies [9, 5] assume a node-feature matrix and
measure similarity between nodes accordingly. However, as il-
lustrated before, different applications may use different node fea-
tures. A general framework and a spectrum of similarity measures
meeting needs in different applications are still missing.
In this paper, orthogonal to the classical proximity-based and rel-
ative proximity-based similarity measures, we tackle the problem
of in-network neighborhood-based node similarity measures. To
the best of our knowledge, this problem remains largely untouched.
We make several technical contributions. First, we propose
the notion of neighborhood-based node similarity measure. This
is orthogonal to the well established proximity-based and rela-
tive proximity-based node similarity measures. We give a gen-
eral parametric model, which captures the critical components in
neighborhood-based node similarity measurement. Different fea-
tures about neighborhoods can be plugged into our model to pro-
duce different instances for various needs in applications.
Second, we examine a series of features popularly used in prac-
tice, ranging from maximal common neighborhoods to neighbor-
hood patterns, random walks, and k-hops neighbors. Correspond-
ingly, we derive four instances of the neighborhood-based similar-
ity measures. We explore some desirable and interesting proper-
ties of those measures. We show that except for maximal common
neighborhoods based similarity, they can be transformed to metrics.
Moreover, they can all be transformed to normalized similarities.
They all can identify automorphic equivalent nodes.
Third, for the four similarity measures obtained, we analyze the
tradeoffs between computational cost and topological matching.
The analysis provides a useful guideline for similarity measure se-
lection in practice.
Last, we conduct extensive experiments to verify the effective-
ness of the proposed similarity measures.
The rest of the paper is organized as follows. Section 2 reviews
the related work. Section 3 discusses the preliminaries. Section 4
presents out unified parametric model. Section 5 derives four in-
stance similarity measures. Section 6 discusses their properties and
relations. Section 7 reports an extensive experimental study. Sec-
tion 8 concludes the paper.
2. RELATED WORK
In-network similarity, which measures similarity between two
nodes in a graph, is not a new problem at all, and enjoys many
applications. The dominant methods are based on either proximity
of the two nodes in question (e.g., shortest distance) or the relative
proximities between the two nodes and the other anchor nodes.
Node proximity is widely adopted as similarity measures in
many data mining and machine learning tasks. Koutra et al. [16]
proposed a unified framework of Guilt-by-Association. A wide
range of popular proximity measures,
such as Personalized
PageRank [12], Random Walk with Restart [26] and General-
ized Belief Propagation [27], are special cases or can be approxi-
mated by Guilt-by-Association. The basic assumption behind those
proximity-based measures is that nodes in a network influence each
other through edges and paths. Thus, nodes within the same com-
munity are often more similar than those from different communi-
ties. Apparently, proximity-based measures cannot be used to solve
the problems demonstrated in Example 1.
A major group of in-network similarity measures are based on
how the nodes in question are connected with the other nodes. Sim-
Rank [11] is one of the most popularly used in-network similarity
measures. It is based on the principle that two nodes are similar if
they are linked to similar nodes. Specifically, to compute the sim-
ilarity between nodes u and v, SimRank aggregates paths between
other nodes w and u and between w and v, respectively. SimRank
has an undesirable property: if the lengths of paths between u and
v are all odd, then SimRank(u, v) = 0, that is, u and v cannot be
perfectly similar to each other. To fix this issue, some variations of
SimRank were proposed [13, 28]. Those variations are still based
on aggregation of paths between nodes. PathSim [24], a recently
proposed similarity measure, employed a similar idea of counting
paths following predefined patterns between nodes to derive sim-
ilarity.
In SimRank and its variations, as well as PathSim, two
nodes may not be similar even if their neighborhoods are isomor-
phic. Those methods cannot be used to measure the similarity in
the applications in Example 1.
Recently, Henderson et al. [9] proposed RolX, which applied
Non-Negative Matrix Factorization to softly cluster nodes in a net-
work. It assumes a node-feature matrix, which is obtained by re-
cursive feature extraction [10]. RolX factorizes the node-feature
matrix into a node-role matrix and a role-feature matrix. Then, the
node-role matrix can be exploited to compute similarities between
nodes. Gilpin et al. [5] introduced supervision to RolX. Since these
methods assume a node-feature matrix, they are not specific for in-
network neighborhood-based similarity measurement.
In a broader scope, the social science community studied the role
of node problem [18]. The approaches are mainly based on finding
an equivalence relations on nodes so that the nodes can be grouped
into equivalent classes. Sparrow [23] and Borgatti and Everett [1]
proposed algorithms for finding structural equivalence and regu-
lar equivalence classes in which automorphic equivalent nodes are
assigned to the same class. However, an equivalence relation on
nodes cannot provide node-pair similarities. Thus, those methods
cannot be applied in many data mining and machine learning tasks.
Another line of research related to our study is graph similarity
measures. Comparing graphs directly is computationally costly.
A major idea of comparing graphs is to convert graphs to feature
vectors. For example, Fei and Huan [3] used frequent subgraphs as
features of graphs. The most widely studied graph similar measures
are graph kernels [4, 14, 21, 22], which project graphs into a feature
space of finite or infinite dimensionality, and use the inner product
of the feature vectors of the two graphs as the similarity score. The
features in graph kernels are often substructures of graphs, e.g.,
walks, subtrees or graphlets. In Section 4.1, we will illustrate why
such graph similarity measures cannot be used directly to solve the
in-network node similarity problem.
3. NOTATIONS AND PRELIMINARIES
In this paper, we focus on labeled graphs, and use the terms
"graph" and "network", and "node" and "vertex" interchangeably.
DEFINITION 1
(LABELED GRAPH). A labeled graph (graph
for short) is a tuple G = hV, E, L,S i, where V is a set of nodes,
E ⊆ V ×V is a set of edges, S
is a
function mapping a node u ∈ V to a label l ∈ S
. We often write the
set of vertices and the set of edges of a graph G as V (G) and E(G),
respectively.
is a set of labels, and L : V → S
The above definition assumes labels on nodes only. Our meth-
ods, however, can be easily extended to graphs with labels on both
nodes and edges, or on edges only.
DEFINITION 2
(NEIGHBORHOOD). In a labeled graph G =
hV, E, L,S i, for a node u ∈ V , the r-neighborhood of u (r ≥ 1)
is a labeled graph NHr(u)=hVu, Eu, LVu,S i, where Vu = {v v ∈
V, dist(u, v) ≤ r}, dist(u, v) is the shortest distance from u to v, Eu =
{(v1, v2) (v1, v2) ∈ E, v1, v2 ∈ Vu ∪{u}}, and LVu : Vu → S
is the
function L with restriction on Vu. We call u the center node of
NHr(u). For the sake of brevity, we sometimes omit r and simply
write NH(u) when r does not play a role in the discussion.
Some neighborhoods may share some common subgraphs. To
capture common subgraphs shared by neighborhoods of multiple
nodes, we define neighborhood patterns.
DEFINITION 3
(NEIGHBORHOOD PATTERN). A
neigh-
borhood pattern is a tuple G = hH, ci, where H is a labeled
connected graph, and c ∈ V (H) is called the center node of G . To
keep our presentation concise, we denote by V (G ) = V (H) and
E(G ) = E(H).
Trivially, a neighborhood hNH(u), ui itself is a neighborhood
pattern. For any subgraph H of NH(u) that contains u, that is,
u ∈ V (H), hH, ui is a neighborhood pattern that captures part of
the neighborhood of u. Please note that Han et al. [7, 8] defined a
similar concept, pivoted graph.
The matching between a neighborhood pattern and a neighbor-
hood is intuitively defined using subgraph isomorphism.
Figure 1: Neighborhood subgraph isomorphism.
DEFINITION 4
(NEIGHBORHOOD PATTERN MATCHING).
A neighborhood pattern G = hH, ci is neighborhood subgraph
isomorphic (NS-isomorphic for
to a neighborhood
NH(u)=hVu, Eu, LVu,S i,
there exists an injective mapping
function f : V (H) → Vu, such that (1) f (c) = u; (2) ∀v ∈ V (H),
L(v) = L( f (v)); and (3) ∀(v1, v2) ∈ E(H), ( f (v1), f (v2)) ∈ Eu.
short)
if
EXAMPLE 2
(NS-ISOMORPHISM). Figure 1 shows a graph
and a neighborhood pattern. The 2-neighborhoods of nodes u1 and
u9 are highlighted. The neighborhood pattern is NS-isomorphic
to the 2-neighborhoods of u1 and u9 under the following injec-
tive mapping functions, respectively,
f1(v2) = u3,
f1(v3) = u5, f1(v4) = u6 and f2(v1) = u9, f2(v2) = u8, f2(v3) = u7,
f2(v4) = u10.
f1(v1) = u1,
We define the equivalence of two neighborhood patterns, which
is needed when we try to define a set on neighborhood patterns.
DEFINITION 5
(NEIGHBORHOOD PATTERN EQUIVALENCE).
Two neighborhood patterns G1 = hH1, c1i and G2 = hH2, c2i
are said to be equivalent
there exists
such
a bijective mapping function
that
(2) ∀v ∈ V (H1), L(v) = L( f (v));
and (3) ∀v1, v2 ∈ V (H1), (v1, v2) ∈ E(H1)
if and only if
( f (v1), f (v2)) ∈ E(H2).
: V (H1) → V (H2),
to each other
f (c1) = c2;
(1)
if
f
Automorphic equivalent nodes are often considered as "identi-
cal" in many applications [1, 18, 13].
DEFINITION 6
(AUTOMORPHIC EQUIVALENCE). Given
labeled graph G = hV, E, L,S i, ∀u, v ∈ V , u and v are automorphic
equivalent if there exists a bijective mapping function f : V → V ,
such that (1) f (u) = vV f (v) = u; (2) ∀v ∈ V , L(v) = L( f (v)); and
(3) ∀v1, v2 ∈ V, (v1, v2) ∈ E if and only if ( f (v1), f (v2)) ∈ E.
a
In addition to neighborhood patterns, another important feature
in graphs is walks.
DEFINITION 7
(LABELED WALK). Given a labeled graph
G = hV, E, L,S i, a walk W is a sequence of nodes (u1, u2, . . . , um),
in which ∀i = 1,2, . . . , m− 1, (ui, ui+1) ∈ E. A labeled walk LW is
a sequence of labels (l1, l2, . . . , lm), in which ∀i = 1,2, . . . , m, li ∈
The length of LW is LW = m − 1. For a given walk
.
W = (u1, u2, . . . , um), the corresponding labeled walk is L(W ) =
(L(u1), L(u2), . . . , L(um)), and W is called an instance of L(W ).
We also need the concept of product graph, which is widely used
in graph kernels.
DEFINITION 8
graphs G1 and G2,
(PRODUCT GRAPH). Given
labeled
the product graph G1 × G2 is a labeled
two
Figure 2: An Example
graph such that (1) V (G1 × G2) = {hu′, v′i u′ ∈ V (G1), v′ ∈
V (G2), L(u′) = L(v′)};
(2) E(G1 × G2) = {(hu1, v1i,hu2, v2i)
hu1, v1i,hu2, v2i ∈ V (G1 × G2), (u1, u2) ∈ E(G1), (v1, v2) ∈
E(G2)}; and (3) ∀hu′, v′i ∈ V (G1 × G2), L(hu′, v′i) = L(u′) =
L(v′).
Please note that a walk may use one node more than once. An
important property of product graph is that every walk (that is, a
path) in product graph G1 × G2 corresponds to two walks with the
same label sequence in G1 and G2, respectively, and vice versa.
Last, we define k-hops neighbor set as follows.
DEFINITION 9
(k-HOPS NEIGHBORS). For a node u in a la-
beled graph G, the set of k-hops neighbors of u is a multi-set of
nodes {v : wv wv is the number of walks from u to v of length k}.
4. A UNIFIED PARAMETRIC MODEL
In this section, we first examine why the existing graph compar-
ison methods cannot be used directly to solve the problem. Then,
we introduce our unified parametric model.
4.1 Neighborhood Comparison versus Gen-
eral Graph Comparison
Conceptually, in-network neighborhood-based node similarity
measurement is intuitive -- we just need to compare the neigh-
borhoods of two nodes, each neighborhood being a labeled graph.
However, one critical point is that center nodes play special roles
in neighborhoods and their comparison. When we compare two
neighborhoods as labeled graphs and try to "match" them, the two
center nodes have to correspond to each other.
Similar to the general problem of graph comparison, in many ap-
plication scenarios, comparing two neighborhoods directly by iso-
morphism testing is not desirable. A large network is almost for
sure to contain noise and randomness. The noise edges and ver-
tices severely affect the reliability of measuring similarity by graph
matching. Instead, as a general principle, to measure similarity in a
meaningful way, we have to extract structural features from neigh-
borhoods that reflect structural properties of the target nodes. Then,
a neighborhood is transformed into a feature vector, and similarity
between the induced features can be measured to capture the simi-
larity between the target nodes.
One may wonder whether neighborhood comparison can be
tackled using the existing graph comparison methods, such as
graph kernels. Unfortunately, general graph comparison methods
ignore correspondences between nodes, and thus cannot be used
directly in neighborhood comparison.
EXAMPLE 3
(NEIGHBORHOOD COMPARISON). Consider
the graph in Figure 2, where a and b are nodes labels. For each
S
node, the 2-neighborhood is the whole graph. Therefore, graph
kernels give the identical similarity score on every pair of nodes.
However, it is easy to see that u1 is uniquely different from the
other nodes in the graph. Moreover, since u1 has a label different
from all the others, one may even argue that the similarity between
u1 and any other nodes in the graph is very low. Clearly, this
intuition cannot be captured by applying a graph comparison
method directly on the neighborhoods.
Although neighborhood comparison is very different from gen-
eral graph comparison, many well established ideas in general
graph comparison are very useful in neighborhood comparison. In
the rest of the paper, we will use structural features involving center
nodes to assess in-network node similarity. We will show that the
desirable structural features can be obtained by putting more con-
straints on features extracted for general graph comparison. We
will answer some interesting questions related to general graph
comparison, such as whether we can have kernels on nodes within
a network analogous to kernels on graph and how those constraints
affect the computational cost of similarity computation.
4.2 A Unified Parametric Framework
How can we measure the similarity between two target nodes
based on their neighborhoods? We assume that similarity is based
on the structural features of the target nodes, that is, the topological
structures of the neighborhoods and how labels are distributed in
the neighborhoods.
There are many possible structural features that can be used in
in-network node similarity measures. Importantly, different appli-
cations may use different structural features and assemble features
in different ways. Instead of proposing many yet another similar-
ity measures, we are interested in a fundamental scientific prob-
lem: is there a general framework about the mechanism measuring
neighborhood-based similarity? The general framework should be
parametric -- specific features and specific methods of feature as-
sembling are configurable parameters. Moreover, the framework
should generalize a series of meaningful similarity measures.
In general, we make the following basic assumptions about mea-
suring in-network neighborhood-based node similarity.
ASSUMPTION 1
(FEATURES). In-network
neighborhood-
based node similarity can be measured by aggregation over a set
of features.
RATIONALE. We assume that there exists a set of features F such
that the overall similarity between two nodes is an aggregation of
the similarity scores between the two nodes over individual fea-
overall distance is an aggregation of the distances in all individual
tures G ∈ F . This is analogous to Minkowski distance where the
dimensions (i.e.,(cid:0)(cid:229) dimension d(distance on d)p(cid:1)1/p). This is a nat-
ural and popularly used way to measure similarity and distance in
a multidimensional space in a divide and conquer manner.
is a scoring function returning the similarity score between
• F is a set of features used in the similarity measure;
• s
u and v in the evidence of elements s and t on feature G ∈ F ,
where variables s and t are elements, that is, either nodes or
edges, in NH(u) and NH(v), respectively;
• X
• F
is an aggregate function defining how the scores with re-
is another aggregate function specifying how the features
spect to various element pairs are summarized, and
are assembled in measuring the overall similarity.
In Equation 1, we aggregate the similarity scores over all fea-
tures G ∈ F to derive the overall similarity between two nodes u
and v. To derive the similarity score on each feature G
, we consider
every pair of elements in the neighborhoods of u and v, where the
elements used are either nodes or edges, and may vary from one
measure to another. For elements s from NH(u) and t from NH(v),
we calculate a similarity score s (u, v, s,t,G ) that is the similarity
between u and v reflected by s and t on feature G
. The similarity
score between u and v on feature G
is an aggregation of the similar-
ity scores over all pairs (s,t). In the next section, we will present
four instances of the model, which will illustrate the possible im-
plementations and flexibility of the model clearly.
5. FOUR INSTANCE SIMILARITY MEA-
SURES
In this section, we present four instances of the general model
(Definition 10) as interesting and practically useful similarity mea-
sures. Unlike [10, 9, 5], where features are basically statistics of
nodes' neighbourhoods, we focus on graph substructure features
like subgraphs and walks. The reason we choose this kind of fea-
tures is that they have better interpretability. By checking features
of u and v, we know how many common substructures, such as
subgraphs, subtrees, and walks, are shared by their neighborhoods.
This information provides an intuitive explanation why u and v are
similar. While for statistical features in [10, 9, 5], it is not easy to
find what they really capture in the physical world.
5.1 Similarity by Maximum Common Neigh-
borhood Pattern (MCNP)
A simple idea to evaluate the similarity between two nodes is
to measure the size of the largest common subgraph shared by the
neighborhoods of the two nodes.
DEFINITION 11
(MCNP SIMILARITY). Given a network G,
for nodes u, v ∈ V (G), a neighborhood pattern G = hH, ci is a max-
imal common neighborhood pattern (MCNP for short) of u and v
if G is NS-isomorphic to both NH(u) and NH(v), and E(G ) is
maximized.
The MCNP similarity between u and v is
Based on the above assumption, we propose the following gen-
eral parametric model.
SimMCNP(u, v) = E(G ),
where G is a MCNP of u and v.
DEFINITION 10
(A GENERAL SIMILARITY MODEL). Given
a graph G and two nodes u, v ∈ V (G), the similarity between u and
v is measured by
s (u, v, s,t,G )(cid:17) (1)
s is an element of NH(u)
t is an element of NH(v)
Sim(u, v) = F
G ∈F(cid:16)
where four parameters are used
MCNP similarity is meaningful in many applications. For exam-
ple, in a friendship network G, the similarity between two nodes u
and v can be measured by the size of a maximal common subgraph
shared by the neighborhoods of u and v, which has the largest num-
ber of friendship links.
EXAMPLE 4
(MCNP SIMILARITY). In Figure 1, it happens
that the neighborhood pattern is a MCNP of u1 and u9. The MCNP
similarity between u1 and u9 is 4.
X
THEOREM 1. Given a graph G, for two nodes u, v ∈ V (G),
where f −1
u
and f −1
v
are pseudo-inverses of fu and fv, respectively.
∧ H is connected}
MCNP similarity is an instance of the general similarity model
in Definition 10. Specifically, given a graph G and a node u, let
SNP(u) = {G = hH, ci G is NS-isomorphic to NH(u)
(2)
be the set of neighborhood patterns that are NS-isomorphic to the
neighborhood of u. For two nodes u, v ∈ V (G), a neighborhood pat-
tern G = hH, ci ∈ SNP(u)∩ SNP(v) if there exist G1 = hH1, c1i ∈
SNP(u) and G2 = hH2, c2i ∈ SNP(v) such that H and H1 are iso-
morphic and c and c1 correspond to each other in the isomorphism
bijective mapping, H and H2 are isomorphic and c and c2 corre-
spond to each other in the isomorphism bijective mapping. Appar-
ently, we have the following.
DEFINITION 12
(PSEUDO-INVERSE). Let
f : A → B be an
injective function. A function f −1 : B → (AS{nil}) is a pseudo-
inverse of f , if for each b ∈ B,
f −1(b) =(nil ∀x ∈ A, f (x) 6= b
a ∈ AV f (a) = b
a
SimMCNP(u, v) = maxG =hH,ci∈SNP(u)∩SNP(v)
w.r.t. injective mapping
functions fu:V (H)→V(NH(u))
and fv:V (H)→V(NH(v))
(x,y)∈E(NH(u))
(x′,y′)∈E(NH(v))
(x) = f −1
v
u
(y) = f −1
f −1
v
(cid:16)(cid:229)
I(cid:0) f −1
v
(x′) 6= nil∧
(y′) 6= nil(cid:1)(cid:17),
where I(P) is an indicator function, which takes 1 if P is true and
0 otherwise, and f −1
are pseudo-inverses of fu and fv,
u
respectively.
and f −1
v
In Theorem 1,
fu(c) = u and fv(c) = v because G is NS-
isomorphic to both NH(u) and NH(v). This condition actually is
the key property that general graph comparison methods do not
guarantee. It ensures that when we assess the similarity between
NH(u) and NH(v), u and v always correspond to each other.
5.2 Similarity by Neighborhood Patterns
In some application scenarios [7], one may want to use patterns
as features, and measure the similarity of two nodes by compar-
ing the common features occurring in their neighborhoods. This is
analogous to, for example, using frequent subgraphs as features in
graph comparison [3].
DEFINITION 13
(NP SIMILARITY). Given a network G and
a set of a neighborhood patterns S, for nodes u, v ∈ V (G), the
neighborhood pattern similarity (NP similarity for short) between
u and v is
SimNP(u, v) =
where SNP() is defined in Equation 2.
G ∈(cid:0)S∩SNP(u)∩SNP(v)(cid:1)
E(G )
NP similarity enables users with the full flexibility to specify
neighborhood patterns as features. There are many ways to select S.
For example, we may use neighborhood patterns that are frequent
in neighborhoods of all nodes in the whole graph [7]. We may set S
as a set of predefined subgraphs, such as Meta-Path [24]. It is also
feasible to use graphlets [21] to form S.
The NP similarity is an inner product of two feature vectors, that
is, SimNP(u, v) = vecNP(u)T vecNP(v), where the j-th element of
the feature vector of node u is
vecNP(u) j =(pE(G j) G j is NS-isomorphic to NH(u)
otherwise
0
and G j is the j-th neighborhood pattern in S.
It is easy to show that SimNP is an instance of the general simi-
larity model in Definition 10.
THEOREM 2. Given a graph G and a set of neighborhood pat-
terns S, for two nodes u, v ∈ V (G),
SimMCNP(u, v) = (cid:229) G =hH,ci∈SNP(u)∩SNP(v)∩S
w.r.t. injective mapping
functions fu:V (H)→V(NH(u))
and fv:V (H)→V(NH(v))
(cid:16)(cid:229)
I(cid:0) f −1
f −1
v
(x,y)∈E(NH(u))
(x′,y′)∈E(NH(v))
u (x) = f −1
v
(y) = f −1
v
(x′) 6= nil∧
(y′) 6= nil(cid:1)(cid:17)
Similar to SimMCNP, when using SimNP to compute the sim-
ilarity of NH(u) and NH(v), u and v always correspond to each
other.
5.3 Similarity by Labeled Walks
Walks are popularly used as structural features in network anal-
ysis. Can we measure the similarity between two nodes based on
the walks in their neighborhoods?
DEFINITION 14
(LW FEATURE VECTOR). Given a graph
is
G = hV, E, L,S i and a parameter r, the labeled walk feature set
S = {LW = (l1, l2, . . . , lm) 1 ≤ LW ≤ r,∀i = 1,2, . . . , m, li ∈ S }.
The labeled walk feature vector (LW feature vector for short) of
node u ∈ V is a S-dimensional vector vecLW (u), in which
vecLW (u) j =ql
LWj∗{W = (u1, u2, . . . , um) u1 = u, L(W ) = LWj}
LWj ∈ S, and l 1,l 2, . . . ,l r are parameters such that ∀i = 1,2, . . . , r,
l i ≥ 0 and (cid:229)
A user can use parameters l i's to control how walks of different
lengths contribute to the similarity. In many applications, shorter
walks are regarded contributing more to the final similarity score
than longer ones [4].
l i = 1.
r
i=1
Apparently, the set of all possible labeled walks of length up to
r is finite provided that the set of labels is finite. Using LW feature
vectors, we define labeled walk similarity.
DEFINITION 15
(LW SIMILARITY). Given a graph G =
hV, E, L,S i, for nodes u, v ∈ V (G), the labeled walk similarity (LW
similarity for short) between u and v is
SimLW (u, v) = vecLW (u)T vecLW (v) = (cid:229)
vecLW (u) j ∗ vecLW (v) j.
LWj∈S
We can show that SimLW is also an instance of our general sim-
ilarity model in Definition 10.
(cid:229)
THEOREM 3. Denote by AG×G the adjacency matrix of the
product graph G× G.
SimLW (u, v) =
r(cid:229)
i=1
u′∈V (NH(u))
v′∈V (NH(v))
l iAi
G×G(hu, vi,hu′, v′i)
PROOF. Denote by Wu→ a walk starting at node u, and by Wu→v
a walk from u to v.
SimLW (u,v)
= (cid:229)
vecLW (u) j ∗ vecLW (v) j
vecLW (u) j ∗ vecLW (v) j
T
u
vecKN(u) = (pl 1n1
T ), where
vector
u
∀i = 1,2, . . . , r, ni
u)l is the sum
of multiplicities of nodes with label l in u's i-hops neighbor set,
and l 1,l 2, . . . ,l r are parameters such that ∀i = 1,2, . . . , r, l i ≥ 0
and (cid:229)
, . . . ,√l rnr
-dimensional vector that (ni
,pl 2n2
u is a S
l i = 1.
T
u
r
i=1
The multiplicity of a node v in u's k-hops neighbor set is the
number of walks from u to v of length k, according to Definition 9.
Thus, we obtain
nk
u =
nk−1
v
v∈Neighbor(u)
Therefore, u's k-hops neighbor features can also be explained as
recursive features [10] that are recursively built by aggregations of
u's neighbors' information.
Based on the k-hops neighbor feature vectors, we can define the
k-hops neighbor similarity.
DEFINITION 17
(KN SIMILARITY). Given a graph G =
hV, E, L,S i, for nodes u, v ∈ V (G), the k-hops neighbor similarity
(KN similarity for short) between u and v is
SimKN(u, v) = vecKN(u)T vecKN(v)
The roles of parameters l i's are the same as in SimLW . In a way
similar to the proof of Theorem 3, we can also show that SimKN is
an instance of our general similarity model in Definition 10.
THEOREM 4. Denote by AG the adjacency matrix of G.
SimKN(u, v) =
r
i=1
u′∈V (NH(u))
v′∈V (NH(v))
l iAi
G(u, u′)Ai
G(v, v′)∗ I(L(u) = L(v)∧ L(u′) = L(v′))
LWj∈S
r(cid:229)
=
=
i=1
r(cid:229)
i=1
j:LWj=i
j:LWj=i
i=1
j:LWj=i
r(cid:229)
=
=
=
=
=
r(cid:229)
i=1
r(cid:229)
i=1
r(cid:229)
i=1
r(cid:229)
i=1
u′∈V (NH(u))
v′∈V (NH(v))
u′∈V (NH(u))
v′∈V (NH(v))
u′∈V (NH(u))
v′∈V (NH(v))
u′∈V (NH(u))
v′∈V (NH(v))
l i{Wu→ L(Wu→) = LWj}∗{Wv→ L(Wv→) = LWj}
l i (cid:229)
u′∈V (NH(u))
v′∈V (NH(v))
l i
{Wu→u′ L(Wu→u′ ) = LWj}∗{Wv→v′ L(Wv→v′ ) = LWj}
j:LWj=i{Wu→u′ L(Wu→u′ ) = LWj}∗{Wv→v′ L(Wv→v′ ) = LWj}
l i
j:LWj=i{Whu,vi→hu′,v′i L(Whu,vi→hu′,v′i) = LWj}
l i{Whu,vi→hu′,v′i Whu,vi→hu′,v′i = i}
l iAi
G×G(hu,vi,hu′,v′i)
Here {Wu→u′ L(W ) = LWj} ∗ {Wv→v′ L(W ) = LWj} =
{Whu,vi→hu′,v′i L(W ) = LWj} is due to the property of product
graph.
G×G(hu, vi,hu′, v′i).
As shown in Theorem 3, the features are labeled walks of length
i, the elements for similarity computing are nodes in neighbor-
hoods, and the scoring function is l iAi
SimLW is related to walk based graph kernels: the features used
are labeled walks. However, in SimLW , we have more constraints
on instances of labeled walks (i.e., walks) used. First, all walks
selected in a neighborhood for computing similarity must have the
center node as the start point. This constraint not only ensures that
all features are related to the center nodes, but also guarantees that
the center nodes always play the same role in features. Second, we
only use walks of limited lengths. This constraint ensures that all
walks used for computing similarity are within the neighborhoods
of the center nodes.
5.4 Similarity by k-hops Neighbors
label walks may be huge, in O(S
SimLW uses labeled walks as features. The number of possible
is the set of labels.
To reduce the number of features, we can relax the labeled walk
features by only considering the endpoints of walks.
r), where S
DEFINITION 16
(k-HOPS NEIGHBOR FEATURE VECTOR).
Given a graph G = hV, E, L,S i and a parameter r, the k-hops
neighbor feature vector of node u is an rS
-dimensional
Similar to SimLW , our constraints on features make sure that the
center nodes are always matched to each other when computing
similarity.
6. RELATIONS AMONG THE FOUR SIMI-
LARITIES
In this section we discuss important properties of the four simi-
larities proposed in Section 5, as well as the relations among them.
6.1 Normalization
In many applications, such as K-means clustering, where a met-
ric is needed, it is highly desirable that a similarity measure can be
normalized to a distance metric. Except for SimMCNP, the simi-
larities proposed can be normalized to metrics.
THEOREM 5
(METRIC). Let
SimLW (·,·) or SimKN(·,·). Define
Sim(·,·)
be
SimNP(·,·),
Dist(u, v) =pSim(u, u)− 2Sim(u, v) + Sim(v, v)
Dist(·,·) is a metric.
(3)
PROOF. According to the definitions, SimNP(·,·), SimLW (·,·)
and SimKN(·,·) are all inner products in their corresponding feature
spaces.
Immediately, we can plug each of those inner products
into Equation 3 to obtain an Euclidean distance between nodes [2],
which is a metric.
(cid:229)
(cid:229)
(cid:229)
(cid:229)
(cid:229)
(cid:229)
(cid:229)
(cid:229)
(cid:229)
(cid:229)
(cid:229)
(cid:229)
(cid:229)
Moreover, in many applications, it is desirable to have a similar-
ity that can recognize automorphic equivalence [1, 18, 13]. How-
ever, some well-known similarity measures, such as SimRank [11],
do not have this properly. Nicely, all the four measures proposed
here can be easily normalized to have the property.
THEOREM 6
SimMCNP(·,·), SimNP(·,·), SimLW (·,·) or SimKN(·,·). Define
(NORMALIZED SIMILARITY). Let Sim(·,·) be
NSim(u, v) =
Sim(u, v)
Sim(u, u) + Sim(v, v)− Sim(u, v)
(4)
Then, 0 ≤ NSim(u, v) ≤ 1 and if u and v are automorphic equiva-
lent, NSim(u, v) = 1.
PROOF. Obviously, ∀u, v ∈ V , Sim(u, u) ≥ Sim(u, v) ≥ 0. Thus,
Sim(u, u) + Sim(v, v)− Sim(u, v) ≥ Sim(u, u) ≥ Sim(u, v). Then, we
have, ∀u, v ∈ V , 0 ≤ NSim(u, v) ≤ 1.
If u and v are automorphic equivalent, Sim(u, u) = Sim(u, v) =
Sim(v, v) because NH(u) and NH(v) must be isomorphic. Thus,
NSim(u, v) =
Sim(u,u)
Sim(u,u)+Sim(u,u)−Sim(u,u) = 1.
We can further obtain a generalized Jaccard similarity mea-
sure [6] by plugging SimNP(·,·) into Equation 4.
(GENERALIZED JACCARD SIMILARITY).
THEOREM 7
NSim(·,·) =
Jaccard similarity measure.
SimNP(·,·)
SimNP(·,·)+SimNP(·,·)−SimNP(·,·)
is a generalized
[6]
Jaccard
similarity
generalized
PROOF. The
form J(x, y) =
i min (xi,yi)
i max (xi,yi) , where
has
the
x = (x1, x2, ..., xn)
and y = (y1, y2, ..., yn) are two vectors and xi, yi ≥ 0 are
For each node u ∈ V , we create a vec-
real numbers.
tor x(u) with the same dimensionality as vecNP(u) and set
x(u)i = vecNP(u)2
i . Then, for two nodes u and v, straightforwardly,
min (x(u)i, x(v)i) = vecNP(u)ivecNP(v)i and max (x(u)i, x(v)i) =
vecNP(u)2
Therefore,
J(x(u), x(v)) =
i − vecNP(u)ivecNP(v)i.
SimNP(u,u)+SimNP(v,v)−SimNP(u,v) = NSim(u, v).
i + vecNP(v)2
SimNP(u,v)
6.2 Relations between SimLW and SimKN
Both SimLW and SimKN use walks as the structural features.
The difference is that SimKN only considers the end points while
SimLW considers the whole labeled walks. SimKN considers a sub-
set of information that is considered by SimLW . Intuitively, if two
nodes are similar in SimLW , they must be also similar in SimKN,
but not the other way. We establish this relationship formally.
THEOREM 8
(SimLw AND SimKN). Under the same param-
eters r and l i's, SimLW (u, v) ≤ SimKN(u, v).
PROOF. We only need to prove Ai
Ai
G(u, u′)Ai
arise.
G×G(hu, vi,hu′, v′i) ≤
G(v, v′)∗I{L(u) = L(v)V L(u′) = L(v′)}. Two cases may
Case 1: L(u) = L(v) and L(u′) = L(v′). According to the prop-
erty of product graphs, Ai
G×G(hu, vi,hu′, v′i) is the number of walk
pairs (W1,W2) in G such that W1 is from u to u′ and has length
i, W2 is from v to v′ and has length i, and the label sequences
of the two walks are the same. Clearly, Ai
G×G(hu, vi,hu′, v′i) ≤
G(u, u′)Ai
Ai
G(u, u′) is the total number of
walks of length i from u to u′.
Case 2:
G×G(hu, vi,hu′, v′i) = 0. Moreover, because both Ai
Ai
and
Ai
G(u, u′)Ai
In this case,
G(u, u′)
Ai
G×G(hu, vi,hu′, v′i) ≤
non-negative,
G(v, v′) holds immediately.
L(u) 6= L(v) or L(u′) 6= L(v′).
G(v, v′) holds because Ai
Ai
G(v, v′)
are
6.3 Computational Cost
We first show that both SimMCNP and SimNP intractable. Then,
we discuss the computation cost of SimLW and SimKN using pre-
processing, and thus show that SimLW and SimKN are tractable.
Last, we discuss the tradeoff among the four similarity measures
about features used and computational cost.
6.3.1 Intractability of SimMCNP and SimNP
THEOREM 9
(SimMCNP). Given a labeled graph G, nodes
u, v ∈ V (G), r ≥ 1, and l > 0, the decision problem on whether
SimMCNP(u, v) ≥ l is NP-hard.
PROOF. We prove by a reduction from the NP-hard clique prob-
lem, which is to decide if a given clique G2 is subgraph isomorphic
to a given graph G1.
Suppose we have an oracle that, given a labeled graph G =
hV, E, L,S i, two nodes u ∈ V and v ∈ V , and l > 0, when the con-
stant r ≥ 1, can return if SimMCNP(u, v) ≥ l in polynomial time
with respect to the size of G.
For any instance (G1 = hV1, E1i, G2 = hV2, E2i) of the clique
problem, where G2 is a clique graph having V2 nodes, first we
assign one same label to all nodes. Then, we create a new labeled
graph G = G1SG2. Note that the nodes in V2 are automorphic
equivalent. Thus, for any two nodes u1 ∈ V2 and u2 ∈ V2, and an
arbitrary other node v, SimMCNP(u1, v) = SimMCNP(u2, v). So
we pick an arbitrary node u ∈ V2. Then, for each node v ∈ V1, we
call the oracle to see if SimMCNP(u, v) ≥ E2. Clearly G2 is sub-
graph isomorphic to G1 if and only if there exists at least one node
v ∈ V1 such that SimMCNP(u, v) ≥ E2. So we can call the oracle
at most V1 times to decide if G1 has a clique with size V2. Each
calling of the oracle takes polynomial time with respect to the size
of G, which means in total we can use polynomial time to decide
the clique probelm. This means deciding if SimMCNP(u, v) ≥ l is
NP-hard.
THEOREM 10
(SimNP). Given a graph G, a neighborhood
pattern set S, nodes u, v ∈ V (G), r ≥ 1, and l > 0, the decision
problem on whether SimNP(u, v) ≥ l is NP-hard.
PROOF. The proof is similar to the proof of Theorem 9. For an
instance (G1 = hV1, E1i, G2 = hV2, E2i) of the clique problem, we
just create an instance of computing SimNP by setting the neigh-
borhood pattern set S = {G2}.
6.3.2 Preprocessing for SimLW and SimKN
Both SimLW and SimKN are inner products of feature vectors.
Therefore, to speed up the computation of those similarities, we
can materialize feature vectors for all nodes offline. Please note
that r, the radius of neighborhood, is a predefined parameter. Due to
the well recognized small world phenomenon [15], the parameter r
should be set to a small number like 2. Otherwise, a neighborhood
can easily involve a large portion of the whole graph. Normally
≪ V. Let us investigate the cost of processing for SimLW and
SimKN.
S
Preprocessing for SimLW.
We do not need to explicitly build the adjacent matrix of G× G
G×G (1 ≤ i ≤ r), which takes O(V6) time. We
and compute Ai
can first index all possible labeled walks considered, and search the
neighborhood of each node to count the frequencies of the labeled
walks. A straightforward implementation is to conduct a breadth-
first search on the neighborhood of each node to enumerate all la-
beled walks.
(cid:229)
(cid:229)
The number of walks of length i, starting from a center node
u and ending at a node v ∈ Vu, is no more than Vui−1. The
cost of computing the labeled walk feature vector vecLW (u) is
O((cid:229)
r−1
i=1 Vui−1Eu) = O(Vur−2Eu). Therefore, the total cost of
computing all labeled walk feature vectors is O((cid:229) u∈V Vur−2Eu),
which is definitely bounded by O(Vr−1E).
Preprocessing for SimKN.
To analyze the time complexity of materializing k-hops neigh-
bor features, we follow the recursive computation of vecKN(u) in-
troduced in section 5.4. Clearly, computing all n1
u's takes O(E)
time. Computing all ni
E)
time. In total the overall time complexity of preprocessing is only
O(rS
for i ≥ 1 takes O(S
v∈N(u) ni−1
E) time.
u = (cid:229)
v
Please note that the above methods using preprocessing are just
to show the tractability of SimLW and SimKN. Efficient and scal-
able algorithms computing the similarity measures are beyond the
capacity of this paper, and are reserved as future work.
6.3.3 Tradeoffs
SimMCNP is a very strict similarity measure -- two nodes are
similar if and only if their neighborhoods share a large common
subgraph. SimNP poses a weaker requirement. Two nodes are sim-
ilar if some selected patterns appear in the neighborhoods of the
nodes. The neighborhoods of the nodes may have very different
topological structures and do not have to share a large common
subgraph. SimLW is even weaker since it only considers labeled
walks. Two neighborhoods with very different topological struc-
tures may still share many common labeled walks. As indicated by
Theorem 8, SimKN is even weaker than SimLW . Roughly speak-
ing, the strictness of requiring topological matching between neigb-
horhoods in the similarity measures decreases from SimMCNP to
SimNP, to SimLW and to SimKN.
At the same time, computing SimMCNP and SimNP are much
harder than computing SimLW and SimKN. Moreover, SimLW is
more costly than SimKN. Therefore, the four similarity measures
present meaningful tradeoffs between strictness of matching and
computational cost.
7. EMPIRICAL RESULTS
In this section, we report a series of empirical studies on the
four similarities proposed using both synthetic data and real data.
First, we use a synthetic data set to illustrate some interesting pairs
of nodes whose neighborhoods are similar in one way or another.
Second, we employ three data analytic tasks, namely similar au-
thors search, anomaly nodes ranking, and nodes clustering, to il-
lustrate the effectness of our proposed similarity measures in real
applications.
We find that, even the four similarities are all based on struc-
tural features from neighborhoods, the semantics of similarity cap-
tured by them have some important differences. Therefore, for each
similarity, there are some applications suitable. By exploring the
experimental results and the semantics captured by each proposed
similarity in the tasks, our empirical studies provide a useful guide-
line on selecting the appropriate similarity measures according to
application needs.
7.1 Experimental Settings
Due to the well recognized small world phenomenon [15], the
parameter r should be set to a small number. In our experiments,
we set r = 2.
Figure 3: The neighborhoods of nodes u36 and u56.
Because of the high computational cost in SimMCNP, we only
use it in the experiments reported in Section 7.2, where the graph
size is the smallest. For SimNP, the set S consists of neighbor-
hood patterns G such that (1) G is connected; (2) G has at most
n edges; and (3) G is NS-isomorphic to the neighborhoods of at
least t nodes in G. The values of t and n depend on the scale of G,
which will be specified when specific experiments are discussed.
We implemented an algorithm similar to the one in [7] to find all
neighborhood patterns in S from G.
For SimLW and SimKN, we set parameters l i's so that shorter la-
beled walks and k-hops neighbors of smaller value of k have heavier
a
Z , where 0 < a < 1 is a con-
weights. Sepecifically, we set l i =
stant and the normalized term Z = (cid:229)
i. In our experiments, we
always set a = 0.5.
r
i=1
a
i
In our experiments, we normalized all similarities proposed be-
cause similarities after normalization have many desirable prop-
erties like automorphism recognition. Specificaly, we normalized
SimMCNP and SimNP to NSimMCNP and NSimNP using Equa-
tion 4 so that their ranges are in [0,1], because SimMCNP cannot
be transformed to a distance metric, and the number of features
in SimNP are normally very large so that the generalized Jaccard
similarity is more suitable than a distance metric. Moreover, we
normalized SimLW and SimKN to metrics DSimLW and DSimKN
using Equation 3.
7.2 Case Studies Using Synthetic Data
We generated a synthetic graph with 64 nodes {u0, u1, . . . , u63}
and 115 edges using the Kronecker graph model [17]. In this syn-
thetic graph, there are 4 labels and each label is applied on 16
nodes.
For each node u in the synthetic graph, we searched the top-5
nodes that are most similar to u. For SimNP, we set t = 3 and
n = 5.
It is not surprising that similarities based on different structural
features lead to different search results. To observe the differences
among similarity measures, we report some cases of similar node
pairs returned by different similarities. We show neighborhoods of
similar node pairs in Figures 3-5, all center nodes are marked in
shadow. In those figures, we use letters a, b, c and d to represent
labels.
Figure 3 shows the neighborhood of node u36. All similarities
identify that node u56 is the most similar one to u36, whose neigh-
borhood is also shown in the figure. Comparing these two neigh-
borhoods, they share a big neighborhood pattern of 7 edges, high-
lighted by the dashed polygons in the figure. Moreover, the distri-
butions of the labels over the neighborhoods are also similar. Please
note that the similarity between u36 and u56 cannot be found using
the similarity measures based on proximity or relative proximity.
Figure 4 shows another interesting example. SimMCNP, SimLW
and SimKN all indicate that u3 is the most similar node to u39. At
Figure 4: The neighborhoods of u39, u3 and u63
7.3 Similar Authors Search
We conducted similar authors search in the DBLP data set re-
leased by Sun et al. [25] using the similarities we proposed. This
DBLP data set contains 28,702 authors, 28,569 papers and 20 con-
ferences from the areas of databases, data mining, machine learn-
ing and information retrieval. There are only two types of edges
in this network, edges between authors and their papers, and edges
between papers and conferences where papers were published. We
treat this network as a labeled graph with 22 labels, which are "au-
thor", "paper", and the identities of the 20 conferences. Note that
each conference only corresponds to one node, because we do not
distinguish the conference held in different years.
This DBLP data set contains data up to 2009, which means all
papers in the data set were published before 2009. We chose 3
young researchers who graduated around the year of 2009 as query
authors. They are Hong Cheng, Spiros Papadimitriou, and Jure
Leskovec. The reason we do not chose well established researchers
like Christos Faloutsos, Jiawei Han and Jennifer Widom is that they
are very famous and many methods have been proposed to find
authors similar to them.
We used our proposed similarities to find the top-5 similar au-
thors to the 3 young researchers. We do not report the results of
SimMCNP, since it cannot handle large neighborhoods in a reason-
able amount of time. For SimNP, we set t = 100 and n = 5. Table 1
shows the results. Due to the structure of this DBLP data set and
r = 2, labeled walks features and k-hops neighbors features happen
to be identical. Consequently, the results of SimLW and SimKN are
identical. We report them in the columns of SimLW /KN.
From Table 1 we find that the results of SimNP and those of
SimLW /KN are quite different. They capture similarity in differ-
ent senses. This observation echoes the motivation of this paper --
similarity has different meanings for different people in different
scenarios.
SimNP identifies some authors who graduated from the same
group or very similar groups as the query author. For instances,
Hong Cheng and Xifeng Yan were both from Professor Jiawei
Han's group, Jure Leskovec and Deepayan Chakrabarti were both
Professor Christos Faloutsos's students. Athough Spiros Papadim-
itriou and Xifeng Yan were not from the same group, the two
groups (Christos Faloutsos's group and Jiawei Han's group) they
did their Ph.D. studies in are similar in terms of publication venues
and collaborators. The neighborhood patterns in this DBLP data
set reflect some patterns of an author's publication style, such as
publishing with a certain number of co-authors in a certain confer-
ence and co-authoring a certain number of papers with a specific
researcher. For young researchers, especially when they were still
Ph.D. students, such publication patterns were often deeply influ-
Figure 5: Neighborhoods of u0, u28 and u48.
the same time, SimNP picks u63 as the most similar node to u39.
Figure 4 shows the neighborhoods of those nodes. Both u39 and
u63 are hubs in their neighborhoods, but u3 is not a hub. SimNP
can identify similarity between hub nodes because it uses neighbor-
hood patterns frequent in the graph. Hub nodes likely share many
patterns in their neighborhoods. SimLW and SimKN do not use any
features that distinguish hub nodes from other nodes, and thus are
not sensitive to similarity between hub nodes. SimMCNP considers
the largest common neighborhood pattern. It happens that u39 and
u3 share a large common neighborhood pattern of 10 edges in their
neighborhood. That also affect the feature vectors using labeled
walks and k-hops nodes in SimLW and SimKN.
The last example illustrates the difference between SimLW and
SimKN. Figure 5 shows the neighborhoods of nodes u0, u28 and
u48. According to SimLW , the most similar node to u0 is u48. Ac-
cording to SimKN, the one most similar to u0 is u28. From SimLW 's
perspective, u0 and u28 are not similar at all because there are no
common labeled walks starting from u0 and u28. For SimKN, al-
though the 1-hop neighbors of u0 and u28 are totally different, the
2-hops neighbors of them are similar in labels. Thus SimKN indi-
cates that u0 and u28 are similar.
The above examples show the common properties and differ-
ences of our proposed similarities. The results indicate that those
similarities are reasonable to some extent from their own perspec-
tives, and capture different types of similarity. An application has
to pick the measure fitting the meaning of similarity in the applica-
tion the best.
Rank
SimNP
Hong Cheng
Xifeng Yan
Jimeng Sun
Jiong Yang
SimLW/KN
Gao Cong
Alexey Pryakhin
Jörg Sander
1
2
3
4
5
Table 1: The top-5 similar authors.
Spiros Papadimitriou
SimNP
SimLW/KN
SimNP
Jure Leskovec
Xifeng Yan
Jimeng Sun
Jaideep Srivastava
George Kollios
Michail Vlachos
Gautam Das
Jiong Yang
Deepayan Chakrabarti
Gang Wu
Ji-Rong Wen
Sugato Basu
SimLW/KN
Glenn Fung
Inderjit S. Dhillon
Matthias Schubert
Dong Xin
Spiros Papadimitriou
Boualem Benatallah
Hong Cheng
David W. Cheung
Prasan Roy
David W. Cheung
Jignesh M. Patel
Arindam Banerjee
Roberto J. Bayardo Jr.
Table 2: Probability adjacency matrix of G1.
Professor(0) Graduate(1) Researcher(2) Engineer(3)
Professor(0)
Graduate(1)
Researcher(2)
Engineer(4)
0.9
0.25
0.15
0.1
0.25
0.9
0.15
0.15
0.15
0.15
0.9
0.2
0.1
0.15
0.2
0.9
enced by their advisors. Thus, from the publication pattern per-
spective, the most similar authors are likely those graduated from
the same group or very similar groups.
SimLW /KN captures another interesting meaning of similar-
ity. These measures return authors who share similar publication
venues with the query authors. Due to the structure of this DBLP
network data set, the labeled walks of length 1 do not have much
impact on the similarity score -- there is only one type of labeled
walk of length 1, "author-paper". Labeled walks from authors to
conferences are the features playing the major role in SimLW /KN.
7.4 Anomaly Nodes Ranking
We generated a labeled graph using the Kronecker graph
model [17]. Then, we added some abnormal nodes to it. Our task
is to check whether those proposed similarity measures can help to
find those abnormal nodes. Specifically, the initiator graph G1 has 4
nodes with labels "Professor", "Graduate", "Researcher" and "En-
gineer", respectively. The probability adjacency matrix (P1)4×4 is
shown in Table 2.
Here "Professor(0)" denotes that the 0-th node in G1 is with la-
bel Professor. Using this probability adjacency matrix, we applied
the Kronecker graph generator [17] to generate the probability ad-
jacency matrix P of KG4, which is a 256× 256 matrix, because in
KG4 there are 44 = 256 nodes. The entry in P follows
P(u, v) = P 4
i=1P1(⌊
u
4i−1 ⌋(mod 4),⌊
v
4i−1 ⌋(mod 4))
(5)
The label of node u is L(u) = L(u(mod4)), where L(0)=Professor,
L(1)=Graduate, L(2)=Researcher and L(3)=Engineer as in the pro-
totype graph G1. KG4 was generated according to P. We preserved
every potential edge (u, v) with probability P(u, v) independently.
From Equation 5, one can see that a node is more likely linked to
nodes that have the same label. We add some abnormal nodes that
violate this tendency. We randomly picked 4 nodes in KG4, one for
each label, and switch their labels. Specifically, for a node picked
randomly, if its label is "Professor", we changed it to "Engineer";
if its label is "Graduate", we changed it to "Researcher"; if its label
is "Researcher", we changed it to "Professor"; and if its label is
"Engineer", we changed it to "Graduate". From the probability
adjacency matrix of G1 in Tabel 2 and Equation 5, we can see that
after switching labels, those picked nodes may look "weird" based
on their connections in the network. Thus, we call these 4 nodes
planted anomaly nodes.
We designed a very simple algorithm which ranks nodes accord-
ing to how abnormal they look like. Specifically, we first parti-
tioned nodes into 4 groups according to their labels. Note that for
each group we have 64 nodes. Then, for each node u, we computed
the top-5 nodes that are most similar to u from the group u belongs
to. We calculated the sum of similarity scores between u and its
top-5 similar nodes, and used this total to measure how "normal"
u is. We call this total the normality index of u. For SimLW and
SimKN, since we used the distance metrics DSimLW and DSimKN,
the normality index of u is the negated sum of the distances between
u and u's top-5 closest nodes. Last, for each group, we sorted all
nodes in the group in the normality index ascending order. Those
top-ranked nodes in every group are regarded as most abnormal.
Clearly, the higher those 4 planted anomaly nodes are ranked, the
better our methods are.
We randomly generated 5 data sets, denoted by KG4(1)-KG4(5),
and we used SimNP, SimLW and SimKN to rank nodes. For
SimNP, we set t = 3 and n = 5.
Table 3 reports the results of anomaly nodes ranking, where col-
umn "Label" lists the labels of the planted anomaly nodes after
label switching, column "Original Label" lists the original labels
of the planted anomaly nodes. For each planted anomaly node,
we report two ranks, the rank without switching the label and the
one with switching the label. It is expected that by switching the
label, the change of the rank is significant. The columns SimNP,
SimLW and SimKN list the ranks of the planted anomaly nodes with
switching the labels, while the columns "SimNP (Orignial Group)",
"SimLW (Orignial Group)", and "SimKN (Orignial Group)" list the
ranks of the planted anomaly nodes dwithout switching the labels.
The row "Average Rank Promotion" provides the average number
of positions elevated for a planted anomaly node by switching the
label. Please node that some planted nodes are ranked high and
some are ranked low even without switching the labels. Therefore,
we believe that our results are representative.
From Table 3, we observe that SimLW ranks the planted anomaly
nodes high (in top-10) most of the cases (19 of the 20 cases in 5
trials). To this extent, SimLW is capable of catching the planted
anomaly nodes, and likely is capable of catching this type of
anomaly nodes in general. SimNP does not rank those planted
anomaly nodes high. At the same time, as expected, all the three
proposed similarity measures promote the anomaly ranks of the
planted anomaly nodes substantially, as indicated by the row "Av-
erage rank promotion".
Although the neighborhood patterns of nodes in the randomly
generated graphs are unknown, according to Equation 5 and P1 (Ta-
ble 2), the model generating the graphs encourages nodes to link to
nodes with the same labels. The neighbors of nodes in the graphs
KG4(1)
KG4(2)
KG4(3)
KG4(4)
KG4(5)
ID
146
43
165
156
38
55
213
136
66
167
153
164
134
39
197
244
158
183
189
16
Label
Professor
Graduate
Researcher
Engineer
Professor
Graduate
Researcher
Engineer
Professor
Graduate
Researcher
Engineer
Professor
Graduate
Researcher
Engineer
Professor
Graduate
Researcher
Engineer
Researcher
Engineer
Graduate
Professor
Researcher
Engineer
Graduate
Professor
Researcher
Engineer
Graduate
Professor
Researcher
Engineer
Graduate
Professor
Researcher
Engineer
Graduate
Professor
# High Rank Cases (in Top-10)
# Low Rank Cases (not in Top-20)
Average Rank Promotion
Original Label
SimNP
SimNP (Original Group)
SimLW
SimLW (Original Group)
SimKN
SimKN (Original Group)
Table 3: Anomaly nodes ranking results.
10
6
11
12
4
24
30
10
3
14
25
7
6
20
6
5
30
23
34
1
10
6
45
28
57
56
45
27
37
35
2
52
55
54
24
22
16
38
29
53
53
2
2
17
2
6
1
2
1
5
8
4
9
8
8
7
14
1
3
5
6
1
8
3
19
0
21
19
1
23
29
4
30
15
16
24
27
28
19
5
31
25
14
1
26
27
4
11
6
6
1
2
2
3
11
6
11
8
8
6
13
1
4
5
11
2
9
1
16
0
22.45
14.15
11.15
22
12
1
23
17
6
15
20
20
14
31
29
23
3
24
19
12
2
24
22
4
8
tend to have some underlying patterns. In SimLW , the labeled walks
of length 1 as features capture neighbors, and so do 1-hop neigh-
bors in SimKN. Therefore, these two methods are capable in this
anomaly nodes ranking task.
7.5 Nodes Clustering
The last experiment conducted is nodes clustering in social net-
works. We adopted the netscience co-author network [19] as our
data set, which contains 1589 authors and 2743 edges. One may
note that this network is unlabeled, but unlabeled graphs can be
seen as labeled graphs with only one type of label on all nodes. We
can still run our proposed methods on the netscience co-author net-
work. Since all nodes are with the same label, labeled walks and
k-hops neighbors degenerate into counting k-hops degree of nodes.
Thus, in this experiment, we only use neighborhood patterns as fea-
tures for clustering nodes.
We computed the normalized similarity (Theorem 7) between
every pair of nodes in the network using SimNP. To decide the fea-
ture set S of neighborhood patterns, we set t = 10 and n = 5. Then,
we built a node-node similarity matrix and ran a simple spectral
clustering algorithm [20] by setting the number of clusters to 5.
Figure 6 shows the result on the largest connected component of
the netscience co-author network, which has 379 nodes. We use
different colors to indicate nodes in different clusters.
Using SimNP, we partitioned nodes into groups according to
their structural roles in the network. Most of the nodes in the dark-
blue cluster are hub-like nodes, most of the nodes belonging to the
yellow cluster are isolated nodes (outliers), most of the nodes in
the green cluster are less isolated nodes, and most of the nodes in
the light-blue cluster are main-stream nodes. Only one node is as-
signed to the red cluster, which is a hub-like node. The results here
are similar to the results in [9]. Please note that, unlike the tradi-
tional hub/outlier detection algorithms on graphs, our method did
not use the whole topological information of the graph, but only
used similarity between pairs of nodes. Unlike [9], we did not con-
duct feature selection/engineering or model selection. We just ap-
plied a simple spectral clustering algorithm on the node-node sim-
ilarity matrix. This set of experimental results demonstrate that the
node similarity based on neighborhood patterns is promising for
distinguishing nodes with different structural roles.
Figure 6: Nodes clustering result on the largest connected com-
ponent of the NetScience co-author network.
8. CONCLUSIONS
In this paper, we systematically investigated the problem of mea-
suring in-network node similarity based on neighborhoods. Neigh-
borhood based node similarities can capture various meanings of
similarity that are different from most of the existing proximity or
relative proximity based similarities, such as SimRank and Guilt-
by-Association. We proposed a unified parametric model for neigh-
borhood based similarity, which is flexible for plugging in differ-
ent features and assembling functions to obtain similarities with
different meanings. At the same time, the model remains simple.
Four different similarities based on different features were devel-
oped and proved to be instances of our unified parametric model.
We explored desirable properties of our proposed similarities, such
as how to transform them into distance metrics and normalization.
We also discussed the computational costs of different similarities
and analyzed interesting tradeoffs between topological matching
and computational efficiency. Last, extensive empirical studies on
both synthetic data and real-world data were conducted, and the
results demonstrated the effectiveness of our proposed similarities.
This paper is the beginning of an exciting journey on developing
in-network similarity measures and applications. There are a series
interesting and important problems for future work. For example,
it is interesting to explore efficient and scalable algorithms to com-
pute and approximate the similarity measures over large graphs.
Moreover, it is useful to further refine the spectrum of similar-
ity measures representing more tradeoffs between computational
cost and strictness of neighborhood matching and addressing mean-
ingful application needs. Systematic applications of the proposed
model and similarity measures in social network mining applica-
tions will also be exciting.
9. REFERENCES
[1] S. P. Borgatti and M. G. Everett. Two algorithms for
computing regular equivalence. Social Networks,
15(4):361 -- 376, 1993.
[2] M. M. Deza and E. Deza. Encyclopedia of distances.
Springer, 2009.
[3] H. Fei and J. Huan. Structure feature selection for graph
classification. In Proceedings of the 17th ACM conference on
Information and knowledge management, pages 991 -- 1000.
ACM, 2008.
[4] T. Gärtner, P. Flach, and S. Wrobel. On graph kernels:
Hardness results and efficient alternatives. In Learning
Theory and Kernel Machines, pages 129 -- 143. Springer,
2003.
[5] S. Gilpin, T. Eliassi-Rad, and I. Davidson. Guided learning
for role discovery (glrd): framework, algorithms, and
applications. In Proceedings of the 19th ACM SIGKDD
international conference on Knowledge discovery and data
mining, pages 113 -- 121. ACM, 2013.
[6] R. A. M. Gregson. Psychometrics of similarity. Academic
Press, New York, NY, USA, 1975.
[7] J. Han and J.-R. Wen. Mining frequent neighborhood
patterns in a large labeled graph. In Proceedings of the 22nd
ACM international conference on Conference on information
& knowledge management, pages 259 -- 268. ACM, 2013.
[8] J. Han, J.-R. Wen, and J. Pei. Within-network classification
using radius-constrained neighborhood patterns. In
Proceedings of the 23nd ACM international conference on
Conference on information & knowledge management.
ACM, 2014.
[9] K. Henderson, B. Gallagher, T. Eliassi-Rad, H. Tong,
S. Basu, L. Akoglu, D. Koutra, C. Faloutsos, and L. Li. Rolx:
structural role extraction & mining in large graphs. In
Proceedings of the 18th ACM SIGKDD international
conference on Knowledge discovery and data mining, pages
1231 -- 1239. ACM, 2012.
[10] K. Henderson, B. Gallagher, L. Li, L. Akoglu, T. Eliassi-Rad,
H. Tong, and C. Faloutsos. It's who you know: graph mining
using recursive structural features. In Proceedings of the 17th
ACM SIGKDD international conference on Knowledge
discovery and data mining, pages 663 -- 671. ACM, 2011.
[11] G. Jeh and J. Widom. Simrank: a measure of
structural-context similarity. In Proceedings of the eighth
ACM SIGKDD international conference on Knowledge
discovery and data mining, pages 538 -- 543. ACM, 2002.
[12] G. Jeh and J. Widom. Scaling personalized web search. In
Proceedings of the 12th international conference on World
Wide Web, pages 271 -- 279. ACM, 2003.
[13] R. Jin, V. E. Lee, and H. Hong. Axiomatic ranking of
network role similarity. In Proceedings of the 17th ACM
SIGKDD international conference on Knowledge discovery
and data mining, pages 922 -- 930. ACM, 2011.
[14] H. Kashima, K. Tsuda, and A. Inokuchi. Marginalized
kernels between labeled graphs. In ICML, volume 3, pages
321 -- 328, 2003.
[15] J. Kleinberg. The small-world phenomenon: An algorithmic
perspective. In Proceedings of the thirty-second annual ACM
symposium on Theory of computing, pages 163 -- 170. ACM,
2000.
[16] D. Koutra, T.-Y. Ke, U. Kang, D. H. P. Chau, H.-K. K. Pao,
and C. Faloutsos. Unifying guilt-by-association approaches:
Theorems and fast algorithms. In Machine Learning and
Knowledge Discovery in Databases, pages 245 -- 260.
Springer, 2011.
[17] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and
Z. Ghahramani. Kronecker graphs: An approach to modeling
networks. The Journal of Machine Learning Research,
11:985 -- 1042, 2010.
[18] F. Lorrain and H. C. White. Structural equivalence of
individuals in social networks. The Journal of mathematical
sociology, 1(1):49 -- 80, 1971.
[19] M. E. Newman. Finding community structure in networks
using the eigenvectors of matrices. Physical review E,
74(3):036104, 2006.
[20] A. Y. Ng, M. I. Jordan, Y. Weiss, et al. On spectral
clustering: Analysis and an algorithm. Advances in neural
information processing systems, 2:849 -- 856, 2002.
[21] N. Shervashidze, T. Petri, K. Mehlhorn, K. M. Borgwardt,
and S. Vishwanathan. Efficient graphlet kernels for large
graph comparison. In International Conference on Artificial
Intelligence and Statistics, pages 488 -- 495, 2009.
[22] N. Shervashidze, P. Schweitzer, E. J. Van Leeuwen,
K. Mehlhorn, and K. M. Borgwardt. Weisfeiler-lehman
graph kernels. The Journal of Machine Learning Research,
12:2539 -- 2561, 2011.
[23] M. K. Sparrow. A linear algorithm for computing
automorphic equivalence classes: the numerical signatures
approach. Social Networks, 15(2):151 -- 170, 1993.
[24] Y. Sun, J. Han, X. Yan, P. S. Yu, and T. Wu. Pathsim: Meta
path-based top-k similarity search in heterogeneous
information networks. VLDB, 2011.
[25] Y. Sun, Y. Yu, and J. Han. Ranking-based clustering of
heterogeneous information networks with star network
schema. In Proceedings of the 15th ACM SIGKDD
international conference on Knowledge discovery and data
mining, pages 797 -- 806. ACM, 2009.
[26] H. Tong, C. Faloutsos, and J.-Y. Pan. Fast random walk with
restart and its applications. In Proceedings of the 6th
International Conference on Data Mining, pages 613 -- 622.
IEEE, 2006.
[27] J. S. Yedidia, W. T. Freeman, and Y. Weiss. Constructing
free-energy approximations and generalized belief
propagation algorithms. Information Theory, IEEE
Transactions on, 51(7):2282 -- 2312, 2005.
[28] W. Yu, X. Lin, W. Zhang, L. Chang, and J. Pei. More is
simpler: Effectively and efficiently assessing node-pair
similarities based on hyperlinks. Proceedings of the VLDB
Endowment, 7(1), 2013.
|
1608.03371 | 2 | 1608 | 2017-05-06T16:58:22 | Learning Sentimental Influences from Users' Behaviors | [
"cs.SI"
] | Modeling interpersonal influence on different sentimental polarities is a fundamental problem in opinion formation and viral marketing. There has not been seen an effective solution for learning sentimental influences from users' behaviors yet. Previous related works on information propagation directly define interpersonal influence between each pair of users as a parameter, which is independent from each others, even if the influences come from or affect the same user. And influences are learned from user's propagation behaviors, namely temporal cascades, while sentiments are not associated with them. Thus we propose to model the interpersonal influence by latent influence and susceptibility matrices defined on individual users and sentiment polarities. Such low-dimensional and distributed representations naturally make the interpersonal influences related to the same user coupled with each other, and in turn, reduce the model complexity. Sentiments act on different rows of parameter matrices, depicting their effects in modeling cascades. With the iterative optimization algorithm of projected stochastic gradient descent over shuffled mini-batches and Adadelta update rule, negative cases are repeatedly sampled with the distribution of infection frequencies users, for reducing computation cost and optimization imbalance. Experiments are conducted on Microblog dataset. The results show that our model achieves better performance than the state-of-the-art and pair-wise models. Besides, analyzing the distribution of learned users' sentimental influences and susceptibilities results some interesting discoveries. | cs.SI | cs | Learning Sentimental Influences from Users' Behaviors
Shenghua Liu,1 Houdong Zheng,2 Huawei Shen,1 Xiangwen Liao,2 Xueqi Cheng1
1CAS Key Laboratory of Network Data Science & Technology
Institute of Computing Technology, Chinese Academy of Sciences
2Mathematics and Computer Science School, Fuzhou University
[email protected], [email protected], [email protected], [email protected]
7
1
0
2
y
a
M
6
]
I
S
.
s
c
[
2
v
1
7
3
3
0
.
8
0
6
1
:
v
i
X
r
a
ABSTRACT
Modeling interpersonal influence on different sentimental po-
larities is a fundamental problem in opinion formation and
viral marketing. There has not been seen an effective solu-
tion for learning sentimental influences from users' behav-
iors yet. Previous related works on information propagation
directly define interpersonal influence between each pair of
users as a parameter, which is independent from each oth-
ers, even if the influences come from or affect the same user.
And influences are learned from user's propagation behav-
iors, namely temporal cascades, while sentiments are not
associated with them. Thus we propose to model the inter-
personal influence by latent influence and susceptibility ma-
trices defined on individual users and sentiment polarities.
Such low-dimensional and distributed representations natu-
rally make the interpersonal influences related to the same
user coupled with each other, and in turn, reduce the model
complexity. Sentiments act on different rows of parameter
matrices, depicting their effects in modeling cascades. With
the iterative optimization algorithm of projected stochastic
gradient descent over shuffled mini-batches and Adadelta
update rule, negative cases are repeatedly sampled with the
distribution of infection frequencies users, for reducing com-
putation cost and optimization imbalance. Experiments are
conducted on Microblog dataset. The results show that our
model achieves better performance than the state-of-the-art
and pair-wise models. Besides, analyzing the distribution
of learned users' sentimental influences and susceptibilities
results some interesting discoveries.
Keywords
opinion propagation; influence; susceptibility; cascade
1.
INTRODUCTION
Collective opinions concisely form by a repeated process
that a user who sees and agrees with a sentimental content,
forwards, shares, or "Likes" to feed her virtual community,
resulting in a temporal cascade of users' behaviors. As such,
users who have taken actions become infective to others in
their communities, encouraging their communities to a cer-
tain extend to take the same action by interpersonal influ-
ences. Each pair of users has a specific influence, especially
when there exits some kind of social relation [19, 2]. There-
fore, both opinion formation [39, 5] and viral marketing [31,
27] see the importance of learning sentimental influences be-
tween users, with which one can better model the dynamics
of cascades [19], and maximize influence [24, 14, 6].
Figure 1: Motivations underlying our model. Exam-
ple of cascades to illustrate the overfitting problem
suffered by pair-wise models.
Among the existing works, it seldom sees an effective one
for estimating sentimental influence between pairs of users as
far as we are concerned. Most of studies focus on the pro-
cess how users repeatedly update their opinions, the con-
sensus they can reach [10, 34, 5], and opinion influence
maximization [14], assuming that the interpersonal influ-
ences as edge weights are given or equally assigned.
In
the related domain of information propagation, influences
learning has been studied, without consideration of different
propagation behaviors on sentiments, although some stud-
ies modeled them on the distribution of content topics [29,
11]. Moreover, Goyal et. al [19] "learned" interpersonal in-
fluences by counting the successful propagation pairs. And
with Bernoulli or Jaccard Index model, they estimated the
influences as propagation probabilities. However, there usu-
ally record the times of users getting infected, while such
successful propagation pairs that user v infects user u are
rarely observed, or hardly traced. It limits the application
of such a method. And NetInf [19] used an exponential or
power-law form of incubation time between a pair of infected
users to estimate the interpersonal influence, with empiri-
cally assigned parameters. Afterward, more novel models
were proposed to learn interpersonal influence by maximiz-
ing the likelihood of observed cascades, which were proved
to be more effective [33, 15, 18]. However, they used a free
scalar parameter directly defined on a pair of users to repre-
sent the interpersonal influence. On one hand, the param-
eters are independent, even if the influences are acted by
or apply to the same user. On the other, such a pair-wise
parameter cannot be trained if there are no observations of
propagations between the user pair, e.g. users c and d do
not appear in the same cascade, infected in Cascade1 and
Cascade2 respectively, as Figure 1 shows. In that case, even
though c and d have a relationship, and c, e and d form a
social triangle, a zero or some empirically small constant is
assigned, implying that it is never or seldom to successfully
propagate between them in the future. In another way, Aral
and Walker [2] proposed to model the interpersonal influence
by engineered features and corresponding linear coefficients
learned for individual users other than user pairs directly.
But users' properties may not be available or easy to ex-
tract in other applications.
To fill the blank of previous works, we thus propose to
learn distributed representations of users' influences and sus-
ceptibilities on sentiments. With such representations, we
model the interpersonal influences and their decaying with
the elapsed time in the hazard function of survival model,
and maximize the likelihood of the observed the behaviors
of users taking or not taking the actions in sentimental cas-
cades. Hence, the interpersonal influences, between two
pairs of users, and with the same acting or applied user,
can be coupled due to the corresponding representation of
the same user. For example, the interpersonal influence of
users c to d, couples with that of users c to e by the cor-
responding representation defined on user c as in Figure 1.
Besides, it requires much fewer parameters, i.e., O(n) for n
users, instead of O(n2) parameters for user pairs, beneficial
to reducing the model complexity, and in turn combating
the overfitting problem of assigning an empirical propaga-
tion probability. Moreover, the number of infected users in
a cascade is usually much less than that of uninfected ones
as negative cases. Considering all the negative users pre-
vents the model from being applied to a real large dataset
and balancing the optimization. Thus a negative sampling
is employed to consider the expectation of negative cases
instead, emphasizing the frequently infected users in other
cascades. Finally a mini-batch Stochastic Gradient Decent
(SGD) algorithm with Projected Gradient (PG) is designed
to learn the model, and Adadelta is used to adjust the learn-
ing rate adaptively. In such a scheme, negative sampling is
repeated in each iteration with a small number of samples
each time, to approximate the expectation.
A set of cascades with different sentiments are collected
from Microblog, covering a group of users who interact at
a frequent level. Comparing with the state-of-the-art mod-
els, including above Bernoulli and Jaccard Index estimation
methods, and pair-wise models, our model achieves better
performances on the tasks of predicting cascade dynamics,
"who will be retweeted", and cascade size with users' repre-
sentations. Besides, it can be seen that learning influences
separately on different sentimental polarities, mostly bene-
fits the performances on both tasks, even if more parameters
are brought in. As last, users' representations on different
sentiments are analyzed as well. And we find that users may
have different influences on different sentiments, and are sus-
ceptible to different polarities. The "original influentials" are
creative to post original attractive messages, while the "sec-
ondary influentials" gain their influence credits by hunting
and advertising for interesting messages that already exists
in the system.
The rest of the paper is organized as follows. Section 2
studies the existing and related works, and the motivation
and our model are described in section 3, which the param-
eter learning algorithm is given. At last, experiments and
result analysis are reported in section 4, and section 5 con-
cludes the whole work.
2. RELATED WORK
Sentiment propagation and opinion formation have at-
tracted many research works. [40, 25] experimentally showed
that users' sentiments were influenced by that of others sur-
rounding them on LiveJournal dataset and Facebook dataset
separately. [4] used Granger causality analysis to show that
sentiment change of audiences were related to the landscape
of popular users in Twitter. As for modeling opinion dy-
namics, successful models were proposed, including Sznajd
model [35], Deffuant model [9], and Hegselmann and Krause
model [21], which produced agreeing results. Moreover, [32]
extended Sznajd model to complex networks. Deffuant et
al. [9] modeled the process of opinion dynamics that ran-
domly select two users, and change their opinions to reduce
the difference.
[22] modeled to change users' opinions ac-
cording to the arithmetic average of that of their neighbors,
and Fortunato et al. [13] extended the model with multi-
dimensional opinion vector, instead of a scalar opinion value.
Besides, Suchecki et al. [34] studied Voter model in scale-free
network, small-world network, and random network. A re-
cent work [5] by Bindel et al. discovered that traditional
models including DeGroot model [10] finally converged to a
state of consensus under a set of general conditions, while it
is rare in real opinion dynamics. Hence it proposed to model
with users' intrinsic beliefs in a game theory, which coun-
terbalanced the opinions at Nash equilibrium. In addition,
Gionis et al. [14] studied the overall positive opinion maxi-
mization problem, adopting the game model [5] of opinion
dynamics. [1] modeled that a user's opinion was generated
from her latent opinion distribution, based on self-excited
Hawkes process influenced by her neighbors.
The body of above works is mostly on opinion dynam-
ics and maximization, assuming the sentimental influences
between connected users were equal. It does not confirm to
our observations in real life, in which a minority of influential
users infect an exceptional number of their peers [23], and
there are a mass of easily influenced users [39]. Thus, as a
fundamental problem, sentimental influences were ever esti-
mated by counting under Bernoulli assumption, or a thresh-
old rule [39]. As far as we know, an effective method of learn-
ing sentimental influences from users' behaviors remains un-
explored.
Nevertheless, there were quite a few successful works on
estimating interpersonal influences in the related domain of
information propagation. Some of them made efforts to ex-
tract features that are related to propagation probability
and learned from the observed information cascades. Crane
et al. [8] measured the response function of information prop-
agation dynamics in social systems with endogenous and
exogenous factors. Artzi et al. [3] predicted whether a user
would respond to or retweet a message, i.e. get influenced, by
classifying with demographic and content features. In a way
other than feature extractions, Tang et al.
[36] proposed
topic factor graph (TFG) to model the generative process
of the topic-level social influence on large networks, by find-
ing a topic distribution for each user. And [29] proposed a
probabilistic factor graph to model the direct and indirect
influences between adjacent and non-adjacent users of het-
erogeneous network. Saito et al. [33] learned the propagation
probability between neighbors of a directed network under
independent cascade model, using the orders of users getting
influenced as training data. And Goyal et. al [19] proposed
to estimate the interpersonal influences in a counting man-
ner, with assumptions of Bernoulli model and Jaccard Index
separately. They estimated the influences as propagation
probabilities. NetInf [16] adopted both exponential and a
power-law incubation time models with fixed parameters as
pair-wise probability to infer the underlying network. Be-
sides, there are also a series of works learning a propagation
probability between any pair of users with survival model
and its variants to infer underlying networks with the trans-
mission rates. NetRate [15] used survival theory to model
transmission rate between every pair of users, which was
viewed as an edge weight for the pair. And [17] then mod-
eled the hazard rate in survival model with additive and
multiplicative risks separately to improve the performance
of cascade size prediction. Afterward, InfoPath [18] was pro-
posed to learn time-varying transmission rates for user pairs
as the edge weights of the hidden dynamic network. Taken
together, these methods work in a pair-wise manner, i.e.,
they learned the propagation probability between pairs of
users, fundamentally different from the proposed method in
this paper which focuses on inferring user-specific influence
and susceptibility from historical cascades. The features in
influence and susceptibility representations were analyzed by
[2], showing that propagation probability were determined
by the two feature vectors, and learned the correlations be-
tween users' attributes to identify influential or susceptible
users. [38] then proposed a sequence model to learn a user's
latent representation of influence and susceptibility, based
on the orders of users' getting infected.
In this work, we
propose to learn the distributed representations of a user on
sentiments, and continuous time model is employed to con-
sider the infected times of users and the effect of the elapsed
time on interpersonal influences, rather than their orders
only.
3. LEARNING SENTIMENTAL INFLUENCE
A cascade is the snapshot of a propagation process, record-
ing the times that users take actions on the same target, such
as a piece of information, or product. Users taking actions
become infected, and may influence others since such actions
are publicly visible or pushed to the related users on pur-
pose, by the online service. Thus we define a cascade C for
actions on a target as a temporal sequence
C = {(v1, t1), (v2, t2), · · · , (vN , tN )t1 ≤ t2 ≤ · · · ≤ tN },
where vi is the user who take the action at time ti, and
N is the total number of infected users, i.e. cascade size.
Since social networks are not always available or existing
in many applications, such as blogs, Yelp, Youtube, and
online shopping, to make our model generally applicable,
network structures are ignored. That is to say, the influence
between any pair of users is modeled, and a very small value
of influences can capture the underlying disconnections of
the user network, and vice versa. Moreover, in the following
we can see that our model can honor social network as well in
the objective. In addition, a special time tE > tN is defined
as the biggest time window which we observe cascade C in,
namely the time when we take the snapshot for cascade C.
3.1 Motivations
a), (b, t2
b ) (e, t2
f ) (d, t2
a), (c, t1
c), (e, t1
e), (f, t2
e), (f, t1
Interpersonal influences are quite different especially when
existing some social relationships. Most existing works in-
tuitively model the interpersonal influences in a pair-wise
manner with n2 independent variables to learn, assuming
that interpersonal influence between different pairs of users
are independent from each other, even if the influences are
related to a common user. Such an overfitting problem be-
comes severe, when there is not observed any propagation
between a pair of connected users. Taking Figure 1 as an
example, two cascades {(a, t1
f )} and
{(a, t2
d)} are observed. It is not
seen that user c is infected before user d did, even though
there is a social link from user c to user d. In such a case,
most existing models took the propagation probability or
transmission rate between them as zero, or some empiri-
cally small value [20], implying that it would never or sel-
dom see successful propagation between the two users in the
future. Nevertheless, with the witness of propagation from
users c to e in one cascade, and from users e to d in another,
user c probably influences user d like the triangle pattern in
friendship relations. Thus, with the distributed representa-
tions of influence and susceptibility defined for every user,
interpersonal influences can be correlated by the shared rep-
resentations of the same user. As shown in the example of
Figure 1, the influences between user pairs (c, d) and (c, e)
are coupled with a shared representation of user c's influ-
ence. And the interpersonal influence from user c to d can
be intuitively estimated by the learned representations of c's
influence and d's susceptibility, other than a small empirical
constant or zero.
At last, not all the users take actions in a cascade, so let
the total number of users be M , and there are always a large
number of users immune to a contagion, i.e., M − N ≫
N , who are treated as negative cases and informative to
reflect the interpersonal influences from the infected users
to them. Without network constants, considering all the
uninfected users takes much more computational costs, even
unable to tackle. Moreover, the severe imbalanced positive
(infected) cases and negative (uninfected) cases make the
negative likelihood dominate the optimization of the whole
objective, losing focus on positive cases as the following.
N c
M c−N c
maxXc
ln L =Xc
X ln Lc
pos+Xc
neg(dominate)
X ln Lc
where superscript c is used to show that the values are re-
lated to cascade C. It is seen that the right term in summa-
tion easily dominates the objective, since M is relatively very
large. So we use sampled users as negative cases. Neverthe-
less, the infected frequency of a user indicates how easily
she could get infected again. Thus observing a frequently
infected user immune to a contagion, provides more infor-
mation in the likelihood. And sampling negative cases from
the distribution of users' infected frequencies is then a better
choice for learning influences.
3.2 Survival Analysis Model
We begin to briefly introduce the preliminary knowledge
on Survival Analysis Model [26, 17]. We consider the hap-
pening time T of a user taking the action as a continuous
random variable, defined over [0, ∞). Let f (t) and F (t) de-
note the probability density function (p.d.f) and the cumula-
tive density function (c.d.f.) separately. And the probability
P r(T ≤ t) = F (t). So, the probability of a user not taking
the action until time t is defined by the survivor function
S(t) = P r(T ≥ t) = 1 − F (t) =Z ∞
t
f (x)dx.
A hazard function h(t) is defined as the instantaneously in-
fecting rate in time interval [t, t + ε), where ε is an infinites-
imal elapsed time, given a user survives until time t.
h(t) = lim
ε→0
P r(t ≤ T < t + εT ≥ t)
ε
=
f (t)
S(t)
.
Noticing that f (t) = −S′(t) and S(0) = 1 , the survivor
function can be expressed as
ln S(x) = −Z t
0
h(x)dx.
3.3 Modeling sentimental cascades
With the analysis above, we model the interpersonal influ-
ence by two non-negative K × D matrices Ii and Si defined
on each user vi, where K is the number of sentiment classes,
and D is the dimension of users' representations on each
sentiment class. For a message with sentimental opinion, we
define a one-hot vector o with K dimensions, representing
its exclusive sentiment class. Thus, for a cascade with senti-
ment o, the transmission rate function φ(·) from users vj to
vi, is defined as equation (1), which indicates the likelihood
of successful propagation between them. Although the orig-
inal concept of transmission rate is not necessarily between
0 and 1, we scale it for regularization.
φ(Ij, Si, o) = 1 − exp{−oT Ij ST
i o}
(1)
where matrices Ij and Si are parameters to separately cap-
ture the influence of user vj and the susceptibility of user
vi. Let Hji denote the set of parameters {Ij , Si, o} for sim-
plification. With transmission rate φ(Hji), we can define
the hazard function from users vj to vi in Survival Analysis
Model, at time t as follows.
h(ttj ; φ(Hji)) = φ(Ij , Si, o)
1
t − tj + 1
,
(2)
where t − tj + 1 depicts the hazard function monotonously
decaying with the time elapsed from tj, and adding 1 avoids
unbounded hazard rate due to a zero or infinitesimal value
of t − tj . Noticing that equation (2) holds only when t ≥
tj , we define hazard rate h(ttj; φ(Hji)) = 0, when t < tj ,
namely, user vj has not been infected at time t. Moreover,
we can consider social network by defining hazard function
h(ttj ; φ(Hji)) = 0 as well, if user vi and user vj are not
connected.
And then the survivor function S(ttj; φ(Hji)) of user vi
surviving later than time t and under the influence of user
vj , satisfies
Figure 2: A concise representation of dependencies
of users' behaviors in the model. Solid nodes are
infected users, and hollow nodes are the immune
ones (negative) to the contagion. Model parameters
are omitted for simplicity.
Finally, the probability density function of user vi happen-
ing (getting infected) at time t, given user vj happening
(infected) at time tj is calculated as follows.
f (ttj ; φ(Hji)) = h(ttj; φ(Hji))S(ttj; φ(Hji)).
With the assumption that a user is only infected by one
of the previously infected ones [17], the likelihood of user
vi, i > 1, being infected at time ti in a cascade is
f (tit; φ(H)) = Xj:tj <ti
= Xj:tj <ti
f (titj ; φ(Hji)) Yk6=j,tk<ti
h(titj; φ(Hji) · Yk:tk<ti
S(titk; φ(Hki))
S(titk; φ(Hki)).(4)
So the joint likelihood of observing the whole cascade, given
the user v1 firstly taking the action at time t1 is
f (t \ t1t1; φ(H)) = Yi>1 Xj:tj <ti
Yk:tk<ti
h(titj ; φ(Hji)) ·
S(titk; φ(Hki)).
Considering the negative cases that users are not infected at
the end, the probability of user vl surviving later than time
tE is
S(tEt; φ(H)) = Yi:ti≤tN
S(tEti; φ(Hil)).
And the log-likelihood of a cascade is as follows, considering
negative cases.
ln L(I, S; o) = Xi>1
ln
Xj:tj <ti
Xi>1 Xk:tk<ti
X Evl∼P (u)" N
Xj=1
L
φ(Ij, Si, o)
1
ti − tj + 1
−
φ(Ik, Si, o) · ln(ti − tk + 1) −
φ(Ij, Sl, o) · ln(tE − tj + 1)#
ln S(ttj ; φ(Hji)) = −Z t
0
h(xtj; φ(Hji))dx
= φ(Ij , Si, o) · ln(t − tj + 1)
(3)
There are a large number of negative users comparing to
the number of infected ones in a cascade. Maximizing the
likelihood of all the negative cases limits the scalability of
our model, and the imbalance between positive and nega-
tive cases may mislead the optimization direction. Thus we
sample L users as negative cases according to the distribu-
tion P (u) ∝ R3/4
[30], where Ru is the frequency of user
u infected in cascades. It is worth noticing that sampling
negative cases are repeated in every optimization iteration
to honor the expectation. To give a direct understanding of
the likelihood, the dependencies are concisely represented in
Figure 2.
u
Finally, the optimization problem of learning users' senti-
mental influences and susceptibilities
ln Lc(I, S; oc)
min
I,S
s.t.
−XC
Iki ≥ 0, Ski ≥ 0, ∀k, i.
(5a)
(5b)
where superscript c is used to indicate that the value or
function are related to cascade C.
3.4 Optimization
Optimization algorithm is the key to learn the distributed
representations of users' influences. First of all, the gradients
of transmission rate function (1) on Iv and Su are K × D
matrices.
∂φ(Iv, Su, o)
∂Iv
∂φ(Iv, Su, o)
∂Su
= (1 − φ(Iv, Su, o))ooT Su
= (1 − φ(Iv, Su, o))ooT Iv
where only the k-th row in both matrices can have non-
zero gradients, when a cascade belongs to the k-th sentiment
class, i.e, ok = 1. Furthermore, if user v get infected in a
cascade, t1 ≤ tv ≤ tN , the gradients of the log-likelihood on
matrix Iv may have non-zero gradients. And the gradients
of the log-likelihood on matrix Sv may be non-zeros, if user v
is infected and t1 < tv ≤ tN , or she is a negative user. Oth-
erwise, the gradients are always zeros. As the negative cases
for a cascade is repeatedly sampled in every iteration, we
define [Vc
s]τ as the set of negative users at the τ -th iteration
of algorithm for cascade C.
[Vc
s]τ = {vl ∼ P (u)}L,
where L is the set size.
Therefore, the gradients of the objective function (5a) on
matrices Iv and Sv are as follows.
1(tc
v ≤ tc
N )
∂Lc(I, S; oc)
1(tc
1 < tc
v ≤ tc
N )
∂Iv
∂Lc(I, S; oc)
∂Sv
1(v ∈ [Vc
s]τ ) ·
+Xc
gIv = −Xc
gSv = −Xc
Xj=1
N c
(1 − φ(Ij, Sv, oc)) · ln(tc
E − tc
j + 1)ococT Ij
where 1(·) is an indicator function, outputting 1 if the ar-
gument is true, and 0 otherwise. gIv and gSv are K × D
matrices, containing partial derivations of objective function
(5a) on each elements of matrices Iv and Sv separately.
The framework of Stochastic Gradient Decent (SGD) over
shuffled mini-batches is employed for efficient optimization.
The mini-batch size is set 12 cascades. In order to solve the
non-negative constraints on parameters, Projected Gradient
(PG) [28] is used to adjust the gradients. Let the parameter
+
updates be ∆Iv and ∆Sv for each user v. And matrices
I, S ∈ RK×DM
are the concat of Iv and Sv for all users v.
M is the user count as defined previously. Thus the updates
will be reduced by a rate 0 < β < 1, namely, β∆Iv and
β∆Sv, if the following condition does not hold.
O([E]τ +1) − O([E]τ ) ≤ σ · T r(∇O([E]τ )T ([E]τ +1 − [E]τ ))
(6)
where [·]τ means the parameter in the τ -th iteration. With
E = {I, S} ∈ RK×2DM , O(E) is the simplified representa-
tion of objective function (5a). T r(·) is the trace of a matrix,
and σ is a constant between 0 and 1.
Moreover, since deciding learning rate is not trivial, so we
choose Adadelta [41] to adaptively tune the learning rate.
Let ρ be decay rate and ǫ be a small constant. The accumu-
late gradients are
E[g2
E[g2
Iv ]τ = ρE[g2
Sv ]τ = ρE[g2
2]τ = ρE[∆Iv
2]τ = ρE[∆Sv
Iv ]τ −1 + (1 − ρ)[g2
Sv ]τ −1 + (1 − ρ)[g2
Iv ]τ
Sv ]τ
2]τ −1 + (1 − ρ)[∆Iv
2]τ −1 + (1 − ρ)[∆Sv
2]τ
2]τ
E[∆Iv
E[∆Sv
And with the definition of function RM S[x]τ =pE[x2]τ + ǫ,
the update values are calculated as
[∆Iv]τ = −
RM S[∆Iv]τ −1
RM S[gIv ]τ
[gIv ]τ
[∆Sv]τ = −
RM S[∆Sv]τ −1
RM S[gSv ]τ
[gSv ]τ
Let the project function ψ(x) be defined as projecting x
into non-negative space, namely, ψ(x) = 0 if x < 0; other-
wise ψ(x) = x. Therefore, the algorithm of learning users'
sentimental influences is listed in Algorithm 1.
Algorithm 1 Algorithm of learning users' sentimental in-
fluences.
Given 0 < ρ, β < 1, constants σ and ǫ;
initialized parameters Iv and Sv for each user v;
Cascade set C.
Iteration index τ := 0;
E[g2
Sv ]0, E[∆Iv
repeat
Iv ]0, E[g2
2]0, E[∆Sv
2]0 = 0;
Randomly shuffle C;
Split C into groups by mini-batch size;
for each group do
Compute gradients [gIv ]τ , [gSv ]τ ;
Accumulate gradients and updates:
2]τ , E[∆Sv
Sv ]τ , E[∆Iv
Parameter update values:
Iv ]τ , E[g2
E[g2
2]τ ;
[∆Iv]τ , [∆Sv]τ
Update [Iv]τ +1 = ψ([Iv]τ + [∆Iv]τ );
Update [Sv]τ +1 = ψ([Sv]τ + [∆Sv]τ );
while not Condition (6) do
decreasing update values:
[∆Iv]τ = β[∆Iv]τ , [∆Sv]τ = β[∆Sv]τ
Update [Iv]τ +1 = ψ([Iv]τ + [∆Iv]τ );
Update [Sv]τ +1 = ψ([Sv]τ + [∆Sv]τ );
end while
τ := τ + 1
end for
until parameters converged, or maximum epoch.
4. EVALUATIONS
Microblog data is used to evaluate our model. To make
the application more general, we assume that the retweeting
relations and following relations are not available in the eval-
uations, only keeping the temporal sequence of users taking
actions, i.e., retweet, and their infected times as the dataset.
We then demonstrate the performance of our model at the
well-known tasks, by comparing to the state-of-the-art mod-
els, and the learned sentimental influences are analyzed as
well.
4.1 Data Description
Figure 3: The distribution of emoticon frequency.
Several strategies are taken to collect Microblog data from
Sina Weibo 1. We initially collected about 315.6 million
records including posting, retweeting, and mentioning mes-
sages between Nov 1st, 2013 to Feb 28, 2014 from the time-
line of 312,000 users sampled from Sina Weibo database.
Since emoticons in cascade messages are usually used as
the sentiment indicator, we filtered the messages with fre-
quently used emoticons and active users, and crawled the full
records of retweeting cascades of those remaining messages.
Emoticons are split into positive sentiment set and nega-
tive sentiment set according to a dictionary of emoticons.
And sentiments of messages are intuitively assigned accord-
ing to emoticons in our experimental settings. Otherwise,
one can use any reliable sentiment classifier, such as Opin-
ionFinder [7] to decide the sentiments. Meanwhile, retweet-
ing relations are also extracted from the auto-generated con-
tents, which help to preprocess data, and are used for ground
truth in later evaluations. And we define the activeness Av
of a user v as the summation of the frequency of user v
getting infected (retweeting others), A·v, and that of user
v influencing others (being retweeted), Av·, in current cas-
cades.
Av = A·v + Av·.
Afterward, in a way of "onion peeling", we repeated to delete
for each cascade, the records of the users with activeness less
than 5, and so did those of the users retweeting them. In
each iteration, the cascades of sizes less than 8 are deleted as
well, since very short cascades are considered as accidents.
Table 1: Data Statistics
(a)
Time span
10/31/13
-3/3/14
Total Total
users
cascade size Positive Negative
Sentiment
6219
44021
325
412
(b)
User activeness
median mode
5
4
Cascade size
median mode
37
10
With such a heuristic way, we finally get a set of cascades
over a virtual community of active users from Oct 31, 2013
to Mar 3, 2014. As listed in Table 1(a), there are 6,219
users, and 44,021 cascade records totally. The number of
cascade messages with positive emoticons is 325, and the
1Sina Weibo (http://www.weibo.com) is the biggest site for
Microblog service in China.
number of those with negative ones is 412, keeping a bal-
anced observations for learning sentimental influences. And
Figure 3 illustrates the distributions of top frequently used
emoticons in the messages of cascades, indicating their pos-
itive sentiments or negative sentiments. Furthermore, the
median and mode values of the distribution of users' active-
ness are 5 and 4 separately as in Table 1(b), indicating that
users' behaviors are not rarely observed in our dataset to
guarantee a successful learning. And it also gives the me-
dian and mode of the distribution of cascade sizes as well,
showing the sufficiency of involved users in a cascade. The
cascades in the dataset are evenly split into 10 groups, and
10-fold cross testing are used for evaluations, alternatively
with 9 of 10 groups as training, and the remaining one as
testing.
4.2 Evaluation Models
In the experiments, we choose the following models for
comparison.
- CT Bernoulli and CT Jaccard models [19]: They
are continuous time models that the propagation prob-
ability Pab from user a (infected) to b decays with the
elapsed time. For a fair comparison, we use the same
decaying function, i.e., Pab = P 0
ab/(tb − ta + 1), and
the same assumption that a user is only infected by
one of the infective users. CT Bernoulli model as-
sumes that an initial propagation probability P 0
fol-
·
lows Bernoulli distribution, i.e. the fraction of num-
ber of successful propagation over the total number
of trials, from one user to another. And CT Jaccard
model defines an initial propagation probability P 0
in
·
a form of Jaccard Index, which is the number of suc-
cessful propagation divided by the total number of cas-
cades with at least one infected between a pair of users.
Since there only observes a temporal sequence of users
getting infected in training dataset, we assume that
successful propagation takes place from every earlier
infected users to the current one.
- NetRate[15]: It directly define a scalar parameter as
interpersonal influence between a pair of users, and
learned them with Survival model. Since Jaccard In-
dex was reported as a better estimator of propaga-
tion probability [19], we use Jaccard Index to initialize
the transmission rates at the beginning of the learning
stage, to get a better fine tune.
- CT LIS: We ignore the differences of latent influence
and susceptibility on sentiments of cascade messages,
and define two D-dimensional vectors, Iv and Sv, for
transmission rate function φ(·) instead. Such parame-
ters were ever defined by [38], which used a static way
to model the orders of users' behaviors. So we use
"CT LIS" to indicate our upgrade version for continu-
ous time model.
- Sent LIS: It is our model that learns sentimental in-
fluences considering all the negative cases. And we use
"Sent LIS (neg sample)" to indicate ours with negative
sampling.
4.3 Tasks and evaluation metrics
The following tasks are used to evaluate the effectiveness
of our learned sentimental influences and the improvements
comparing to the other models. And the metrics for each
task are introduced as well.
PCD: predicting cascade dynamics. The happening
times and infected users of cascade dynamics are both pre-
dictable by our model. However, in order to make the task
simple and easy to evaluate, we design the task that aims at
predicting whether a user v will be infected at a given time
t, knowing the previous truth, i.e. the users who have been
infected, and their happening times before time t. Thus on
one hand, the task can be treated as a set of binary classifica-
tion problems, and we evaluate the results, with the infected
users as the positive cases, and finally uninfected users until
time tE as the negative ones. As for the positive cases, the
likelihood of an infected user v at given time tv, is given by
f (tvt; φ(H·v)). The likelihood of a negative user vl, if she
had been infected right after the positive ones, i.e., at time
tN + ǫ, would be calculated as f (tN + ǫt; φ(H·l)), where ǫ
is a very small constant. Thus with the likelihood values
for all the users, true positive (TP) rate and false positive
(FP) rate can be calculated given any threshold. And then
AUC (the area of under the ROC curve) can be evaluated
as [12], where ROC is drawn with TP rate and FP rate as
the coordinates.
On the other hand, given time t, and the observation of
cascades before that time, we can calculate the infected like-
lihood for candidates v, by f (tt; φ(H·v)). Thus with ranking
the candidates with their likelihood values, the top ones are
the most probably infected, and a well-performed model can
give a high rank to those users happened at the moment. In
such a way, Mean Reciprocal Rank (MRR) [37] for rankings
at all times of users getting infected in cascades is calculated
as the metric.
WBR: who will be retweeted. Microblog users get in-
fected and take actions to retweet the message from one of
their followees who posts or retweets it previously. Thus the
task predicting "who will be retweeted" is a way to exam-
ine interpersonal influence under quantitative understand-
ing. In the scene of multi-exposures, high interpersonal in-
fluence will have high probability to be forwarded. As such,
given (vi, ti), namely, user vi happened at time ti, the infec-
tive user that vi retweets is
arg max
j:tj <ti
f (titj ; φ(Hji))
We therefore deal with the prediction task as a ranking prob-
lem of interpersonal influence. The user with higher rank is
more probable to be retweeted. We evaluate the predic-
tion performance by metrics of average Accuracy (Acc) of
top-one prediction and MRR. The ground truth of retweets
can be extracted from the content of Microblog messages.
Larger values of Acc and MRR indicate better predictions.
CSP: Cascade size prediction. Cascade size predic-
tion, as a key part of influence maximization and viral mar-
keting, is one of the most important applications based on
modeling cascade dynamics.
In our settings of CSP task,
we choose the first P users and acting times of each cas-
cade as the initialization, and predict the cascade size at
time tN , tN > tP , where tP is the actinig time of the P -th
user vP . The simulatioin method is used to predict the cas-
cade size by dynaimics models. The prediction time span
tN − tP is evenly splited and marked by time scales. Thus
starting after time tP , an infected user u tries to influence
an uninfected user v at each time scale τi > tP , with the
probability
P r(T ≤ τitu; φ(Hu,v)) = R τi
f (ttu; φ(Hu,v))dt
τi−1
S(τi−1tu; φ(Hu,v))
.
And if user v is infected at time sacle τi with such a sam-
pling, she will be added as infected users at the following
time scales. The simulatioins are repeated, and the average
cascade size is reported as the prediction. Thus the pred-
ction can be evaluated by mean absolute percentage error
(MAPE), where a smaller value indicates a better predic-
tion.
4.4 Evaluation results.
As the description of dataset, we split the whole datasets
into 10 groups for cross testing. Thus each experiments are
repeated 10 times, and the average metrics and the Standard
Deviation (SD) are reported. And the dimension of users'
representations on a sentimental polarity is D = 8 in the
following evaluations for computational efficiency.
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0
0
0.2
CT Bernoulli
CT Jaccard
NetRate
LIS
Sent LIS
Sent LIS(neg sample)
0.4
0.6
False positive rate
0.8
1
Figure 4: The ROC curves of evaluation models on
PCD task.
PCD: Figure 4 illustrates the ROC curves of the evalu-
ation models for one of the 10-fold cross tests. It visually
shows that our models "CT LIS", "Sent LIS" and "Sent LIS
(neg sample)" can achieve better performance in the formu-
lation of binary classification. And NetRate with Jaccard
Index as parameter initialization improves the performance
of "CT Jaccard" model. As for the over all evaluations for 10-
fold cross tests, Table 2 lists the average results and SDs of
Table 2: Average MRRs and AUCs of PCD task for 10-fold cross testing.
Average
SD
Average
SD
MRR
AUC
CT Bernoulli CT Jaccard NetRate (Jaccard) CT LIS
0.0062
±0.0029
0.8732
± 0.0658
0.0071
± 0.0038
0.8718
± 0.0730
0.0064
±0.0036
0.8621
± 0.0802
0.0196
± 0.0039 ± 0.0033 ± 0.0044
0.8793
± 0.0207 ± 0.0152 ± 0.0156
0.8983
0.8992
Sent LIS
0.0216
Sent LIS (neg sample)
0.0265
Table 3: Average accuracies and MRRs of WBR task for 10-fold cross testing.
Average
SD
Average
SD
Acc
MRR
CT Bernoulli CT Jaccard NetRate (Jaccard) CT LIS
0.1221
0.4123
± 0.0874 ± 0.1255 ± 0.1392
± 0.0365
0.4696
0.2592
± 0.0703
± 0.0876 ± 0.1269 ± 0.1348
0.3000
± 0.0964
0.4349
± 0.1275
0.3005
± 0.0961
0.4354
± 0.1273
Sent LIS
0.3840
0.4920
0.4822
Sent LIS (neg sample)
0.3980
all the models, with the best and the second best MRRs and
AUCs in bold text. It is seen that our model achieves 0.0216
and 0.0265 in the metric of MRR, overwhelming other mod-
els with significance test, p-value < 0.01. And our negative
sampling model get the best, thanks to its effort in balanc-
ing positive and negative cases. By examining the results
generated from "CT Bernoulli" and "CT Jaccard", it shows
a consistent result that Jaccard Index can beat the Bernoulli
model in the estimation of propagation probability, as [19]
reported. In the measurement of binary classification, "Sent
LIS" and "Sent LIS (neg sample)" both outperforms the oth-
ers in AUC, which are 0.8992 and 0.8983 separately, with
the former achieving a slightly better result. Besides, the
machine learning model NetRate can further tune the Jac-
card Index to achieves better MRR and AUC values. Most
important of all, in both ranking and classification formu-
lations of predicting cascade dynamics, it is worth noticing
that pair-wise models, namely, "CT Bernoulli", "CT Jac-
card" and NetRate limits their performance, comparing to
the proposed models that learning distributed representa-
tions of users, showing our advantages in the remission of
overfitting and model complexity reduction.
WBR: With the extraction of retweeting relations from
retweet content, the evaluation results of WBR task are re-
ported in Table 3, based on the ground truth. The top-
one accuracies (Acc) and MRRs of all cascades are averaged
for the 10-fold cross tests as well, and the significance is
tested. The bold numbers are the best and second best
performances. Again we can see that with distributed rep-
resentations of users, "CT LIS", "Sent LIS", and "Sent LIS
(neg sample)" outperforms the pair-wise models that suf-
fer from the overfitting problems on unobserved propaga-
tion pairs. Compared with NetRate, the three LIS models
improves 37.2%, 27.8% and 32.4% separately on accuracies
of predicting "who will be retweeted", while increasing the
MRRs by 7.9%, 10.7% and 13.0% separately. Besides, with
the comparison among pair-wise models, "CT Jaccard" still
takes her advantages to "CT Bernoulli" in both metrics, and
"NetRate (Jaccard)" is the best of the three, thanks to the
machine learning with Survival model. At last, with neg-
ative sampling, "Sent LIS (neg sample)" can on one hand
balance the positive cases and negative cases, and on the
other consider the information of negative cases in an ex-
pectation, resulting a better choice of decent gradient. And
in turn, it achieves a better performances in both accuracies
and MRRs than "Sent LIS", which testifies the advantages
of our model.
CSP: In the experiments, we choose first P = 10 infected
users as the initialization for prediction, and the times of
simulatioins for each cascade is 100 for efficiency. Thus the
averaged cascade sizes are reported with 10-cross testing for
all methods in Table 4. It is seen that "CT LIS", "Sent LIS"
without and with negative sampling outperform other pair-
wise models, achieving 0.6259, 0.6259 and 0.6362 separately
in MAPE. Moreover, compared to the best-performed pair-
wise model, we reduce MAPE by more than 10.46%, which
shows the advantage of our learned representations of users'
influences in cascade size prediction.
Nevertheless, to show the differences of transmission rates
learned by our model "Sent LIS (neg sample)" and pair-wise
model NetRate, we separately calculate the transmission
rates of ours on positive sentiment and negative sentiment,
by latent sentimental influence and susceptibility matrices of
equation (1). For each pair of users, there is a point with our
transmission rate as X-coordinates, and that of NetRate as
Y-coordinates. And we count the number of points falling
in each lattice cell, as illustrated in Figure 5 (a) and (b),
which cells are colored from cold color to warm color based
on the point counts. Thus it is seen that a very warm and
long line lying on the X-axis from 0.1 to 0.4 for both figures
of positive sentiment and negative sentiment. It tells that a
lot of overfitting transmission rates by NetRate assigning a
zero or small constant, can be estimated by the distributed
representations of users, which varies between different user
pairs. Besides, the higher transmission rates from NetRate
can also have a discriminative distribution in the transmis-
sion rates of ours, as those horizontally aligned warm cells
shows. And the same solution can also be concluded from
Figure 5 (c) and (d). All above gives an evidence that our
learned sentimental influences have more abilities to discrim-
inate in the influential and the susceptible, resulting good
performances in the above evaluation tasks.
4.5 Analysis of users' sentimental influences
and susceptibilities
Besides the comparisons of evaluation models, we inves-
tigate our learned distributed representations of users on
sentiments, matrices Iv and Sv for each user v. For each
row in matrices Iv and Sv, it is the representation of user
v's influence and susceptibility on the corresponding senti-
ment, denoted as "Positive I", "Negative I", "Positive S", and
e
t
a
R
t
e
N
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
0.85 x10^7
0.68
0.51
0.34
0.17
0
0.5
e
t
a
R
e
N
t
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
0.85 x10^7
0.68
0.51
0.34
0.17
0
0.5
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
d
r
a
c
c
a
J
0.1
0.4
Ours(negative sentiment)
0.2
0.3
0.1
0.2
0.4
Ours(positive sentiment)
0.3
0.1
0.4
Ours(positive sentiment)
0.2
0.3
0.85 x10^7
0.68
0.51
0.34
0.17
0
0.5
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
d
r
a
c
c
a
J
0.85 10^7
0.68
0.51
0.34
0.17
0
0.5
0.1
0.4
0.2
0.3
Ours(negative sentiment)
(a) Our transmission rates on
positive sentiment v.s. that of
NetRate
(b) Our transmission rates on
negative sentiment v.s. that of
NetRate
(c) Our transmission rates on
positive sentiment v.s. that of
Jaccard
(d) Our transmission rates on
negative sentiment v.s. that of
Jaccard
Figure 5: Analysis of transmission rates.
Table 4: Average MAPE of CSP task for 10-fold cross testing.
MAPE
Average
SD
CT Bernoulli CT Jaccard NetRate (Jaccard) CT LIS
0.6259
0.7199
± 0.0270
± 0.0883 ± 0.1458 ± 0.0.2252
Sent LIS
0.6259
0.7105
± 0.0333
0.7109
± 0.0350
Sent LIS (neg sample)
0.6362
"Negative S". And we use L1-norm of those row vectors to
measure the degrees of influence and susceptibility on senti-
ments. Once more, we construct points of users with those
L1-norm values as coordinates, and count the number of
points falling into a predefined lattice cell. Thus the con-
tour maps are draw accordingly in Figure 6. Figure 6 (a)
and (b) are the contour maps of users' influences v.s. sus-
ceptibilities on positive sentiment and negative sentiment
respectively. There are two peaks in both contour maps. It
is interesting to see the peaks nearby "Positive I" and "Neg-
ative I" axises, which show that amount of influential users
who are not susceptible to others as [2] claimed. We name
them as original influentials in both positive sentiment and
negative sentiment. On the other side, there are another
part of influential users in the other two peaks located at
the upper right of the contour maps, who are susceptible
and active to retweet others' messages, named secondary
influentials in both sentiments. In another word, the sec-
ondary influentials may take a lot of efforts on retweeting
attractive messages to gain their reputations and influences.
And the original influentials focus on composing attractive
and initial messages for the system. Thus the original influ-
entials are the primitive power of the system to bring new
resources, and the secondary influentials are good advertis-
ers to let people get information.
Finally, we show a main peak in the contour maps of Fig-
ure 6 (c) and (d) in a 2-dimensional view, which give a
distribution of users' influences on positive sentiment and
negative sentiment in (c), and that of users' susceptibili-
ties on both sentiments in (d). From Figure 6 (c), it is seen
that users could have higher influences on positive sentiment,
while lower ones on negative sentiment, and vice versa, al-
though a certain amount of them have almost the same high
influences on both sentiments. Figure 6 (d) gives the sim-
ilar solution on susceptibilities, which some users are more
sensitive to positive sentiments, and others are sensitive to
negative ones. And it seems that more users have the same
high susceptibilities on both sentiments than whom have the
same high influences in the dataset.
We propose a model to learn the distributed representa-
tions of users' influences on sentiments from their history
behaviors. By explicitly characterizing the sentimental in-
fluence and susceptibility of each user with two matrices
respectively, the model reduces the complexity of pair-wise
models, and in turn remits the overfitting problem. We also
design an effective algorithm to train the model based on
maximizing logarithmic likelihood of information cascades.
Adadelta method is used to estimate an efficient learning
rate adaptively, and PG method guarantees the constants of
non-negative parameters. Our model does not require the
knowledge of social network structure, hence having wide
applicability to the scenarios with or without explicit social
networks. Explicit social network can be added as indica-
tors in the likelihood of a user getting infected by the con-
nected and infective ones. We evaluated the effectiveness of
our model on Microblogging dataset from Sina Weibo, the
largest social media in China. Experimental results demon-
strate that our model consistently outperforms existing pair-
wise methods at predicting cascade dynamics, "who will be
retweeted", and cascade size prediction. Moreover, with the
analysis of users' sentimental influences and susceptibilities,
we find that there are two peaks in the contour maps, indi-
cating original influentials and secondary influentials. The
former only create initial and high-quality messages to in-
fluence others, while the latter attract others' attentions by
retweeting interesting messages. Besides, users may have
different reactions on messages with different sentiments. In
the future, we would like to apply the distributed represen-
tations of users to more imaginative applications.
6. ACKNOWLEDGMENTS
This work was funded by National Grand Fundamental
Research 973 Program of China (No. 2013CB329602, No.
2013CB329606), and the National Natural Science Founda-
tion of China with Nos 61572467, 61232010. The authors
thank the Crowd-sourcing platform (http://www.cnpameng.com/)
providing initial Sina Weibo data.
5. CONCLUSIONS
7. REFERENCES
(a) Positive influence v.s. positive
susceptibility
(b) Negative influence v.s. negative
susceptibility
)
m
r
o
n
−
1
L
(
I
e
v
i
t
a
g
e
N
2
1.9
1.8
1.7
1.6
1.5
1.4
1.3
1.2
1.2
1.4
Positive I(L1−norm)
1.6
1.8
50
40
30
20
10
0
2
2
1.9
1.8
1.7
1.6
1.5
1.4
1.3
)
m
r
o
n
−
1
L
(
S
e
v
i
t
a
g
e
N
1.2
1.2
40
32
24
16
8
0
1.8
1.4
Positive S(L1−norm)
1.6
2
(c) Positive influence v.s. nega-
tive influence
(d) Positive susceptibilities v.s.
negative susceptibility
Figure 6: Analysis of L1-norm of latent sentimental influences and susceptibilities.
[1] Learning opinion dynamics in social networks. arXiv
preprint arXiv:1506.05474, 2015.
[2] S. Aral and D. Walker. Identifying influential and
susceptible members of social networks. Science,
337(6092):337 -- 341, 2012.
[3] Y. Artzi, P. Pantel, and M. Gamon. Predicting
responses to microblog posts. In Proceedings of the
2012 Conference of the North American Chapter of
the Association for Computational Linguistics, pages
602 -- 606, 2012.
[4] Y. Bae and H. Lee. Sentiment analysis of twitter
audiences: Measuring the positive or negative
influence of popular twitterers. Journal of the
American Society for Information Science and
Technology, 63(12):2521 -- 2535, 2012.
[5] D. Bindel, J. Kleinberg, and S. Oren. How bad is
forming your own opinion? Games and Economic
Behavior, 92:248 -- 265, 2015.
[6] S. Cheng, H. Shen, J. Huang, G. Zhang, and
X. Cheng. Staticgreedy: Solving the
scalability-accuracy dilemma in influence
maximization. In Proceedings of the 22nd ACM
International Conference on Conference on
Information & Knowledge Management, pages
509 -- 518, 2013.
[7] Y. Choi, C. Cardie, E. Riloff, and S. Patwardhan.
Identifying sources of opinions with conditional
random fields and extraction patterns. In Proceedings
of the conference on Human Language Technology and
Empirical Methods in Natural Language Processing,
pages 355 -- 362, 2005.
[8] R. Crane and D. Sornette. Robust dynamic classes
revealed by measuring the response function of a
social system. Proceedings of the National Academy of
Sciences, 105(41):15649 -- 15653, 2008.
[9] G. Deffuant, D. Neau, F. Amblard, and G. Weisbuch.
Mixing beliefs among interacting agents. Advances in
Complex Systems, 3(01n04):87 -- 98, 2000.
[10] M. H. DeGroot. Reaching a consensus. Journal of the
American Statistical Association, 69(345):118 -- 121,
1974.
[11] N. Du, L. Song, H. Woo, and H. Zha. Uncover
Topic-Sensitive Information Diffusion Networks. In
Proceedings of the Sixteenth International Conference
on Artificial Intelligence and Statistics, pages 229 -- 237,
2013.
[12] T. Fawcett. An introduction to roc analysis. Pattern
Recognition Letters, 27:861 -- 874, 2006.
[13] S. Fortunato, V. Latora, A. Pluchino, and
A. Rapisarda. Vector opinion dynamics in a bounded
confidence consensus model. International Journal of
Modern Physics C, 16(10):1535 -- 1551, 2005.
[14] A. Gionis, E. Terzi, and P. Tsaparas. Opinion
maximization in social networks. In SDM, pages
387 -- 395. SIAM, 2013.
[15] M. Gomez-Rodriguez, D. Balduzzi, and B. Scholkopf.
Uncovering the Temporal Dynamics of Diffusion
Networks. In Proceedings of the 28th International
Conference on Machine Learning, pages 561 -- 568,
2011.
[16] M. Gomez-Rodriguez, J. Leskovec, and A. Krause.
Inferring networks of diffusion and influence. In
Proceedings of the 16th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining,
pages 1019 -- 1028, 2010.
[17] M. Gomez-Rodriguez, J. Leskovec, and B. Scholkopf.
[30] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and
Modeling information propagation with survival
theory. In Proceedings of the 30th International
Conference on Machine Learning, pages 666 -- 674,
2013.
J. Dean. Distributed representations of words and
phrases and their compositionality. In Advances in
neural information processing systems, pages
3111 -- 3119, 2013.
[18] M. Gomez-Rodriguez, J. Leskovec, and B. Scholkopf.
[31] M. Richardson and P. Domingos. Mining
Structure and dynamics of information pathways in
online media. In Proceedings of the 6th ACM
International Conference on Web Search and Data
Mining, pages 23 -- 32, 2013.
knowledge-sharing sites for viral marketing. In
Proceedings of the 8th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining,
pages 61 -- 70, 2002.
[19] A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning
[32] F. A. Rodrigues and L. DA F. COSTA. Surviving
influence probabilities in social networks. In
Proceedings of the 3rd ACM International Conference
on Web Search and Data Mining, pages 241 -- 250, 2010.
[20] A. Goyal, F. Bonchi, and L. V. Lakshmanan. A
data-based approach to social influence maximization.
Proceedings of the VLDB Endowment, 5(1):73 -- 84,
2011.
[21] R. Hegselmann, U. Krause, et al. Opinion dynamics
and bounded confidence models, analysis, and
simulation. Journal of Artificial Societies and Social
Simulation, 5(3), 2002.
[22] M. R. Hestenes. Multiplier and gradient methods.
Journal of optimization theory and applications,
4(5):303 -- 320, 1969.
[23] E. Katz and P. F. Lazarsfeld. Personal Influence, The
part played by people in the flow of mass
communications. Transaction Publishers, 1955.
[24] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximizing
the spread of influence through a social network. In
Proceedings of the 9th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining,
pages 137 -- 146, 2003.
[25] A. D. Kramer, J. E. Guillory, and J. T. Hancock.
Experimental evidence of massive-scale emotional
contagion through social networks. Proceedings of the
National Academy of Sciences, 111(24):8788 -- 8790,
2014.
[26] J. F. Lawless. Statistical Models and Methods for
Lifetime Data, volume 362. 2011.
[27] J. Leskovec, L. A. Adamic, and B. A. Huberman. The
dynamics of viral marketing. ACM Transactions on
the Web, 1(1), May 2007.
[28] C. J. Lin. Projected gradient methods for nonnegative
matrix factorization. Neural Computation,
19(10):2756 -- 2779, 2007.
[29] L. Liu, J. Tang, J. Han, M. Jiang, and S. Yang.
Mining Topic-level Influence in Heterogeneous
Networks. October, pages 199 -- 208, 2010.
opinions in sznajd models on complex networks.
International Journal of Modern Physics C,
16(11):1785 -- 1792, 2005.
[33] K. Saito, R. Nakano, and M. Kimura. Prediction of
information diffusion probabilities for independent
cascade model. In Knowledge-Based Intelligent
Information and Engineering Systems, pages 67 -- 75,
2008.
[34] K. Suchecki, V. M. Egu´ıluz, and M. San Miguel. Voter
model dynamics in complex networks: Role of
dimensionality, disorder, and degree distribution.
Physical Review E, 72(3):036132, 2005.
[35] K. Sznajd-Weron and J. Sznajd. Opinion evolution in
closed community. International Journal of Modern
Physics C, 11(06):1157 -- 1165, 2000.
[36] J. Tang, J. Sun, C. Wang, and Z. Yang. Social
influence analysis in large-scale networks. In
Proceedings of the 15th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining,
pages 807 -- 816, 2009.
[37] E. M. Voorhees. The TREC8 Question Answering
Track Report. In Text REtrieval Conference, 1999.
[38] Y. Wang, H. Shen, S. Liu, and X. Cheng. Learning
user-specific latent influence and susceptibility from
information cascades. In Twenty-Ninth AAAI
Conference on Artificial Intelligence, 2015.
[39] D. J. Watts and P. S. Dodds. Influentials, networks,
and public opinion formation. Journal of consumer
research, 34(4):441 -- 458, 2007.
[40] R. Zafarani, W. D. Cole, and H. Liu. Sentiment
propagation in social networks: a case study in
livejournal. In Advances in Social Computing, pages
413 -- 420. Springer, 2010.
[41] M. D. Zeiler. Adadelta: an adaptive learning rate
method. arXiv preprint arXiv:1212.5701, 2012.
|
1906.04580 | 1 | 1906 | 2019-06-09T07:08:20 | Fine-grained Event Categorization with Heterogeneous Graph Convolutional Networks | [
"cs.SI",
"cs.CL",
"stat.ML"
] | Events are happening in real-world and real-time, which can be planned and organized occasions involving multiple people and objects. Social media platforms publish a lot of text messages containing public events with comprehensive topics. However, mining social events is challenging due to the heterogeneous event elements in texts and explicit and implicit social network structures. In this paper, we design an event meta-schema to characterize the semantic relatedness of social events and build an event-based heterogeneous information network (HIN) integrating information from external knowledge base, and propose a novel Pair-wise Popularity Graph Convolutional Network (PP-GCN) based fine-grained social event categorization model. We propose a Knowledgeable meta-paths Instances based social Event Similarity (KIES) between events and build a weighted adjacent matrix as input to the PP-GCN model. Comprehensive experiments on real data collections are conducted to compare various social event detection and clustering tasks. Experimental results demonstrate that our proposed framework outperforms other alternative social event categorization techniques. | cs.SI | cs |
Fine-grained Event Categorization with Heterogeneous Graph Convolutional
Networks
Hao Peng1,2, Jianxin Li1,2, Qiran Gong1,2, Yangqiu Song3, Yuanxing Ning1,2,
Kunfeng Lai4 and Philip S. Yu5,6
1 Beijing Advanced Innovation Center for Big Data and Brain Computing, Beihang University
2 State Key Laboratory of Software Development Environment, Beihang University
3 Department of Computer Science and Engineering, Hong Kong University of Science and Technology
4 Platform and Content Group, Tencent
5 Institute for Data Science, Tsinghua University
6 Department of Computer Science, University of Illinois at Chicago
{penghao, lijx, ningyx}@act.buaa.edu.cn, allen [email protected], [email protected],
[email protected], [email protected]
Abstract
Events are happening in real-world and real-time,
which can be planned and organized occasions in-
volving multiple people and objects. Social me-
dia platforms publish a lot of text messages con-
taining public events with comprehensive topics.
However, mining social events is challenging due
to the heterogeneous event elements in texts and
explicit and implicit social network structures. In
this paper, we design an event meta-schema to char-
acterize the semantic relatedness of social events
and build an event-based heterogeneous informa-
tion network (HIN) integrating information from
external knowledge base, and propose a novel
Pairwise Popularity Graph Convolutional Network
(PP-GCN) based fine-grained social event cate-
gorization model. We propose a Knowledgeable
meta-paths Instances based social Event Similar-
ity (KIES) between events and build a weighted
adjacent matrix as input to the PP-GCN model.
Comprehensive experiments on real data collec-
tions are conducted to compare various social event
detection and clustering tasks. Experimental results
demonstrate that our proposed framework outper-
forms other alternative social event categorization
techniques.
1 Introduction
Events are happening in real-world and real-time, which can
be planned and organized occasions involving multiple peo-
ple and objects, such as a social gathering, celebrity ac-
tivities or a sports competition in some specific location at
a particular time. Nowadays, social media platforms have
become major sources for publicizing events. Events an-
nounced on social media usually attract comments and re-
posts with opinions and emotions, and such content can re-
flect public opinion about many social, political, economic
issues, etc. Mining of social media posts, such as fine-grained
social event categorization, will benefit a lot of real applica-
tions, such as information organization, predictive analysis,
disaster risk analysis, and others [Atefeh and Khreich, 2015;
Aggarwal and Subbian, 2012; Allan, 2012]. In general, fine-
grained social event categorization focus on event detection
and event clustering.
The tasks of fine-grained social event categorization are
more challenging than traditional text mining or social net-
work mining, since social event is a combination of social
network and the information flows (in terms of short mes-
sages) over it. On the one hand, modeling social events is
very complicated and ambiguous. Social events are described
in short texts and usually contain different types of entities,
such as person, location, organization, number, time, etc [Al-
lan, 2012; Ji and Grishman, 2008; Yu et al., 2017]. More-
over, events are commented or retweeted by social network
users. Thus, modeling social event needs to consider het-
erogeneous elements as well as explicit and implicit social
network structures within social posts. On the other hand,
models of fine-grained event categorization often have bot-
tlenecks in which the number of the categories is large and
the number of samples per class is small. Thus, fine-grained
event categorization needs to address the accuracy of the de-
veloped algorithms. Currently, fine-grained text classification
is more difficult and lacks related research work than the fine-
grained object recognition in other fields such as computer
vision [Zhang et al., 2014].
A handful of studies [Ritter et al., 2012; Chandola et
al., 2009; Becker and Gravano, 2011; Shao et al., 2017]
have investigated leveraging homogeneous graphs or man-
ually defined frames for social event modeling and extract-
ing. The first line of thought is to treat social event as ho-
mogeneous words/elements co-occurrence graph [Chandola
et al., 2009; Aggarwal and Subbian, 2012; Angel et al., 2012;
Liu et al., 2019]. Typically, they construct a homogeneous
words/elements co-occurrence graph, and then consider dif-
ferent scales of abnormally connected subgraph structures
(under different names such as k-clique, motifs or graphlets)
as the social events. Despite the compelling results achieved
by these studies, their categorization accuracies remain un-
satisfactory for building reliable and open domain event de-
tection and clustering systems in practice. The second line of
thought is to use manually defined frames-based event def-
initions applying the well-defined techniques for extracting
social event frames from news [Kim et al., 2009; Ji and Gr-
ishman, 2008]. The frame-based event extraction can extract
entities and their relationships, but uses only a limited num-
ber of event types, such as earthquake disaster, stock market,
venues, politics, etc. Moreover, it uses complicated machine
learning models, usually a pipeline of them, to incorporate
different levels of annotation and features.
Compared to traditional methods, the proposed models
have several advantages: (1) By modeling social events based
Social media events can be regarded as a co-occurrence
of event elements including themes, dates, locations, peo-
ple, organizations, keywords and social behavior participants.
The simplest way to monitor social media events is to repre-
sent events as bags-of-words, but it will be more semanti-
cally meaningful if we can annotate words and multi-word-
expressions as entities with types. For example, in the tweet
"China Seismological Network: The earthquake struck at
21:19:46 China Standard Time on 8 August 2017 in Zhangzha
Town in Jiuzhaigou County with magnitude 7.0", there are
multiple event elements: Time: 21:19:46; Date: August 8,
2017; Timezone: China Standard Time; Town: Zhangzha;
County: Jiuzhaigou; Nation: China; Magnitude: 7.0;
Poster: China Seismological Network. Obviously, the above
event's elements are of different types. Moreover, in addition
to intuitive co-occurrence relationship, after extracting enti-
ties, we can make use of external knowledge base [Auer et al.,
2007; Xu et al., 2017] to complement more relationships be-
tween entities, such as "located-in" relationships with other
locations, "attribute-of" relationships with magnitude and
earthquake, etc. Thus, a message mentioning an event can be
related to its keywords, entities (and their relations), topics,
etc. Furthermore, the social network users posting messages
are also connected with different relationships, such as fol-
lowing/followed and retweeting. Thus we can model social
media events as HIN [Shi et al., 2017].
In this paper, we first present event instance (shown in short
text message) as hyper-edge in an HIN, where all the key-
words, entities, topics and social users can be connected by
this hyper-edge, and define an event meta-schema to charac-
terize the semantic relatedness of social event instances and
build event-based HIN. In order to enrich the HIN, we extract
some information as a complement of the relationships based
on the external knowledge base and algorithms. Based on the
event HIN, we define a weighted Knowledgeable meta-paths
Instances based Event Similarity measure, namely KIES,
from semantically meaningful meta-paths. In order to accu-
rately measure the weights between meta-paths and perform
fine-grained event detection, we then design a novel Pairwise
Popularity Graph Convolutional Network model, namely PP-
GCN, to learn the representation of each event instance. Fi-
nally, under the HINs-based event modeling, we present a
KIES-measure based fine-grained event clustering.
on a HIN, the proposed framework can integrate event el-
ements, such as keywords, topic, entities, social users and
their relations, in a semantically meaningful way, and can
also calculate the similarity between any two event instances.
(2) By modeling pairwise popularity graph convolutional net-
work, the model achieves state-of-the-art results and avoids
overfitting in fine-grained event detection tasks. (3) The pro-
posed KIES with learned weights between meta-paths by the
PP-GCN can boost the performance of fine-grained social
events clustering compared to existing state-of-the-art base-
lines methods. The code of this work is publicly available at
https://github.com/RingBDStack/PPGCN.
2 Heterogeneous Event Modeling
In this section, we define the problem of modeling social
events in heterogeneous information network (HIN) and in-
troduce several related concepts and necessary notations.
2.1 Event Modeling in HIN
The definition and characterization of "social event" have
received substantial attention across academic fields, from
language [Miller, 1998] to cognitive psychology [Zacks and
Tversky, 2001]. A social event generally refers to influen-
tial facts that appear on social networks and occur in the
real world, including creators (posters), named entities such
as participants, organizations, festival, specific times, places,
currency, address, etc., and other elements such as keywords
and topics. We name the above elements as event-oriented
elements. However, extracting the event-oriented elements
from the original social text message with NLP tools1,2 is still
a prior processing work. Even within most of the events, there
are some relationships between event-oriented elements, such
as relationships between entities, relationships between key-
words, relationships between topics, explicit and implicit re-
lationships between social users, and so on. We name the
above relationships as event-elements relationships.
We use the manually organized synonyms3 to add syn-
onym relationship among keywords in the event-based HIN.
For hierarchical topic structures and the affiliation relation-
ship between keywords and topics in the event-based HIN,
we employ the hierarchical latent Dirichlet allocation tech-
nologies [Griffiths et al., 2004; Blei et al., 2010] based on
the existing toolbox4 (with about 30 most probable words for
each topic). In order to build the relationship between enti-
ties in the event-based HIN, we consider both accuracy and
efficiency, and tackle the problem by following three-steps.
First, we retrieve the same entity candidate from knowledge
base, such as the Chinses CN-DBpedia [Xu et al., 2017]. Sec-
ond, we use word embeddings [Mikolov et al., 2013] based
Word Mover's Distance technology [Kusner et al., 2015] to
measure the similarity between context of entity in the social
text and description of entity in the candidate, and choose the
entity from the candidate with highest similarity. Third, we
1https://github.com/stanfordnlp/CoreNLP
2https://github.com/NLPIR-team/NLPIR
3https://github.com/huyingxi/Synonyms
4https://github.com/joewandy/hlda
(a) Example of two event instances connected by different types of
nodes and edges
(b) Meta-schema of event-based HIN
Figure 1: Illustration of events as a HIN, where event instances are represented as hyper-edges.
query the relationship between aligned entities in the knowl-
edge base as the final relationship of entities in event-elements
relationships. In order to establish the relationship between
entities and keywords in the event-based HIN, we extract the
keywords in the relevant description of each entity in the
knowledge base and use this affiliation as the relationship be-
tween the entity and the keywords. For the relationship be-
tween social users, we consider users with a large number of
friends, and store the relationship between users in advance.
After extracting the above event-oriented elements and
event-elements relationships from event instances, we build
an event-based HIN, as shown in Figure 1(a). The social
event can be regarded as a co-occurrence of event-oriented el-
ements, and the event-elements relationships are conducive to
explaining the relationship between various elements. Thus,
an event instance can be treated as a subgraph of the whole
HIN. One particular advantage of the HIN is that meta-paths
defined over types (e.g., a typical meta-path "event-entity-
event" represents the event similarity based on overlapped
entities between two event instances) can reflect semantically
meaningful information about similarities, and thus can natu-
rally provide explainable results for event modeling.
2.2 Preliminaries
from previous
We
works [Sun and Han, 2013; Shi et al., 2017], and give
some event-HIN examples.
Definition 2.1 A heterogeneous information network (HIN)
is a graph G = (V, E) with an entity type mapping φ : V →
A and a relation type mapping ψ : E → R, where V denotes
the entity set, E denotes the link set, R denotes the relation
type set and A denotes the entity type set. The number of
entity types A > 1 or the number of relation types R > 1.
For example, Figure 1(a) shows an example of two event in-
stances connected with different types of entities, keywords,
topics, social users and relationships. After giving a complex
HIN for event modeling, it is necessary to provide its meta
level (i.e., schema-level) description for better understanding.
Definition 2.2 Given an HIN G = (V, E) with the entity
mapping φ : V → A and the relation type mapping ψ :
some basic definitions
introduce
E → R, the meta-schema (or network schema) for network
G, denoted as TG = (A, R), is a graph with nodes as entity
types from A and edges as relation types from R.
For example, Figure 1(b) shows an example of the HIN meta-
schema characterizing events on social messages. Another
important concept is the meta-path which systematically de-
fines relationships between entities at the schema level.
Definition 2.3 A meta-path P is a path defined on the graph
R2−→
of network schema TG = (A, R) of the form AI
A3 ··· AL
RL−→ AL+1 which defines a composite relation R =
R1·R2·····RL between objects A1, A2, A3 ··· AL+1, where ·
denotes relation composition operator, and L+1 is the length
of P .
For simplicity, we use object types connected by → to denote
the meta-path when there are no multiple relations between a
pair of types: P = (A1 − A2 − ··· − AL+1). We say that
a meta-path instance p = (v1 − v2 − ··· − vL+1) between
v1 and vL+1 in network G follows the meta-path P , if ∀l,
φ(vl) = Al and each edge el =< vl, vl+1 > belongs to each
relation type Rl ∈ P . We call these paths as path instances
of P , denoted as p ∈ P . R−1
represents the reverse order of
relation Rl. We will introduce more semantically meaningful
meta-paths that describe event relations in next section.
R1−→ A2
l
3 The Proposed Model
In this section, we introduce definitions about knowledge-
able meta-paths instances based event similarity measure, and
present the technical details about Pairwise Popularity GCN.
3.1 Event Similarity Measure
Before definite the social event similarity, we first present the
definition of CouP as following,
Definition 3.1 CouP: Given a meta-path P = (A1 −
A2 ··· AL+1), CouP is a function of the count of meta-path
instances such that CouPP (vi, vj) = MP (vi, vj) where
MP = WA1A2 · WA2A3 ··· WALAL+1 and WAkAk+1 is the
adjacency matrix between types Ak and Ak+1 in the meta-
path P .
Event Instance 1Event Instance 2HypernymSynonymEntitiesSub-topicFriendsWordsTopicsUsersEntitiesWordsUsersEventTopicsFor example, for event instance similarity based on event-
oriented elements and event-element relationships, the com-
posite relation of two event instances containing the same
event element and co-occurrence relationship can be de-
scribed as "event Instance - Element - event Instance
(IEI)" for simplicity.
This meta-path simply gives us
EI, which is the dot product be-
MIEI = WIEW T
tween event instances, where WEI is the event Instance-
Element co-occurrence matrix. The similarity based on
this meta-path instances is accurate because different ele-
ments and lengths are considered. The more meta-paths
enumerated by the meta-schema,
the higher accuracy of
the similarity metric is. We can give more event re-
lated meta-paths over different lengths, e.g., P1: Event-
(posted by)-Social user-(post)-Event, P2: Event-(having)-
Washington DC-(capital of)-United States-(contained by)-
Event, P3: Event-(belong to)-Politician-(relevant)-president-
(member of)-Ruling Party-(contained by)-Event, etc. P1
means two event instances are similar if they are posted by
the same social user. P2 means two event instances are simi-
lar if they mention Washington DC and the United States, re-
spectively, where Washington DC is the capital of the United
States. P3 means two event instances are similar if they can
be associated by a chain of three event elements with mean-
ingful relationships. Note that the meta-path does not need to
satisfy symmetry. Here, we enumerate 22 symmetric meta-
paths in the meta-schema of event-based HIN.
However, if the counts are not normalized for different
meta-paths, it is difficult to compare over different meta-path-
based similarities. Then, similar to the HIN-based document
similarity [Wang et al., 2018], we also define our knowl-
edgeable meta-paths instances based social event similarity
measure, namely KIES. Intuitively, if two event instances
are more strongly connected by the important (i.e., highly
weighted) meta-paths, they tend to be more similar.
Definition 3.2 KIES: a knowledgeable meta-paths
in-
stances based social event similarity. Given a collection of
meaningful meta-paths, denoted as P = {Pm}M(cid:48)
m=1, the KIES
between two event instances ei and ej is defined as:
2 × CouPPm (ei, ej)
M(cid:48)(cid:88)
KIES(ei, ej) =
ωm
,
m=1
CouPPm (ei, ei) + CouPPm (ej, ej)
(1)
where CouPPm(ei, ej) is a count of meta-path Pm between
event instances ei and ej, CouPPm(ei, ei) is that between
event instances ei and ei, and CouPPm (ej, ej) is that be-
tween event instances ej and ej. We use a parameter vec-
tor (cid:126)ω = [ω1, ω2, . . . , ωM(cid:48)] to denote the meta-path weights,
where ωm is the weight of meta-path Pm. KIES(ei, ej) is
defined in two parts: (1) the semantic overlap in the numera-
tor, which is defined by the number of meta-paths between
event instances ei and ej; and (2) the semantic broadness
in the denominator, which is defined by the number of to-
tal meta-paths between themselves. Therefore, we can give a
KIES distance with weights for any two event instances.
3.2 Pairwise Popularity GCN Model
Next, we show how to implement fine-grained event detection
on social message texts through the pairwise popularity GCN
Figure 2: An overview of the proposed Pairwise Popularity Graph
Convolutional Network (PP-GCN).
H (l+1) = σ((cid:101)D− 1
2 (cid:101)A(cid:101)D− 1
model (PP-GCN), and learn the weights (cid:126)ω for meta-paths, to
overcome the problems of a large number of categories and a
small number of samples per class.
After computing the distance of any two event instances
by the KIES, we can construct a N × N weighed adja-
cent matrix A for manually annotated social event instances,
where N is the number of event instances and Aij = Aji =
KIES(ei, ej). Then, we train the Doc2vec [Le and Mikolov,
2014] representation as generalized event instance feature.
So, we can construct a N × d feature matrix X, where d
is the dimension of event instance feature. Obviously, so far,
we can use the popular GCN [Kipf and Welling, 2017] archi-
tecture to learn discriminating event representation based on
the interactions among event instances and generalized event
instance features in node classification task. The input to
the GCN model includes the A and X matrices. Here, one
class represents one social event class. In order to construct
preliminary GCN model, we utilize the popular multi-layer
GCN with the following layer-wise propagation rule [Kipf
and Welling, 2017]:
(2)
where (cid:101)A = A + IN , (cid:101)D is diagonal matrix such that (cid:101)Dii =
(cid:80)
j (cid:101)Aij are the adjacency matrix, IN is the identity matrix,
2 H (l)W (l)),
W is the parameter matrix, and l is the number of layers.
Let Z be an output N × F feature matrix, where F is the
dimension of output representation per event instance. The
input layer to the GCN is H (0) = X, X ∈ RN×d, which
contains original event instance feature, H (l) = Z, and Z
is graph-level output. And σ denotes an activation function
such as Sigmoid or ReLU.
However, the real-world social events naturally have two
problems of sparsity: the small number of event instances for
each classification and a large number of categories. So, we
sample event instances pair and judge whether the pair be-
longs to one event to train a pairwise GCN model. As shown
in Figure 2, we present the proposed PP-GCN model. Before
explaining the PP-GCN model, we show how to implement a
pairwise sampling to generate training samples. We assume
that if a pair of event instances ei and ej belongs to the same
event classification, we name the pair ei and ej as a positive-
pair sample. If a pair of event instances ei and ej belongs to
two different events classification, we name the pair ei and ej
as a negative-pair sample. As shown in Figure 2, if the pair is
Doc2vecfeature matrixWeightedadjacent matrixAXGCNNNNd·10…10f(x)+VeiVejVeiVejBatchPairwise Sampling00a positive-pair sample, we represent its by two red lines; if the
pair is negative-pair sample, we use both gray line and blue
line to represent it. After explaining the training samples,
we first randomly select R (i.e., 1000) event instances as a
preliminary set, then randomly select two event instances for
each event instance in the set to form one positive-pair sample
and one negative-pair sample, and finally we can construct a
2R event instance pairs set from training samples. Here, both
the positive-pair and negative-pair samples are equal to R.
Second, we randomly sample the B (i.e., 64) samples from
the 2R (i.e., 2000) event instance pairs set to form a batch to
forward propagation of our proposed model. Third, the sec-
ond step is cycled E (i.e., 32) times to form an epoch. For
next epoch, we loop through the above three steps.
1
However, the above pairwise sampling based GCN model
can not guarantee that the model avoids over-fitting during
training. Suppose that any event classification has an aver-
age of r event instances, the probability that any event in-
stance selected into a positive-pair sample is 1
r , and the prob-
ability of being selected into a negative-pair sample is about
N−r in general. Obviously, the
N−r . We note that 1
negative-pair samples have more diversity than the positive-
[Papadopoulos et al., 2012] has observed the
pair samples.
phenomenon that the connected probability of a sample de-
termines the popularity of it. Inspired by these observations,
we assume that in feature representation learning, the mod-
ulus of the learned feature vector is larger if the popularity
is greater. So, the two modulus of learned event instances
feature vectors of positive-pair will be closer.
r (cid:29) 1
For discriminate feature learning of our GCN model, we
utilize the popularity of the output event instance feature vec-
tor in Z to distinguish different classes. As shown in the
Figure 2, for any two learned event instance vectors Vei and
Vej that satisfy Vei ≥ Vej, we employ a ratio of modu-
Vei
Vej as the input of a nonlinear mapping function
lus x =
f (x) = −log(x − 1 + c), where the coefficient c is 0.01 to
avoid no upper bound output. We assume that the ratio of
modulus of positive-pair will belong to [1, 2). So, the non-
linear mapping function f (x) can map the above ratio x from
[1, 2) to (0, 2], and [2, +∞) to (-∞, 0). Next, we add a Sig-
moid function to map the output of the nonlinear mapping
layer to 0 or 1 by a threshold 0.5. As shown in the Figure 2,
one positive-pair or negative-pair input sample can only be
paired with an output of 0 or 1. For one batch (64 pairs) sam-
ples, our model can generate one batch size (1 × 64) of one-
zero output vector. So, we can use a cross entropy function
as our model's loss function, and employ the popular stochas-
tic gradient descent (SGD) method to iterate all parameters.
The learned weights (cid:126)ω will be used to measure similarity for
any two social event instances. To verify the avoidance of
over-fitting ability of our model, we can perform over 7000
epochs, and observe that the evaluation criteria of the model
changes over time in Section 4.
For the testing of any event instance t from the test set
of the original N samples, we first assume that there are a
total of C event classes in the original N event instances.
Secondly, we calculate the ratio of the modulus of the rep-
resentation vectors for t and the remaining N − 1 samples,
respectively. Then, for each event class, we can get a prob-
ability that event instance t most likely belongs to it. If all
of the ratios of modulus are 0, the sample itself is a sepa-
rate event class. Finally, we select the event class with the
highest probability as the test output for the event instance t.
Note the fact that the event category of the test set may not
be included in the event category of the training set. After
the previous analysis, we can calculate a similarity for any
two event instances under the event-HIN and the weights (cid:126)ω.
Since our meta-paths have better interpretability, we also can
implement a semi-supervised and fine-grained event cluster-
ing based on the learned weights of meta-paths and distance-
based clustering models.
4 Experiments
In this section, we evaluate the proposed PP-GCN model
and similarity measure KIES using real surveillance data col-
lected in two enterprise systems.
Datasets
Tencent
Weibo
Train
17,438
6,000
Validation
5,813
2,000
Test
5,812
2,000
Class
9,941
5,470
Table 1: Description of evaluation datasets.
4.1 Datasets and Settings
We select two independent social media platforms, news APP
from Tencent (a popular APP for young people) and Sina
Weibo (a hybrid of Twitter and Facebook, the Twitter of
China and Chinese Social Media), to collect datasets. Each
event instance is a non-repeating social message text. One
event is a set of event instances that contain semantically
identical information revolving around a real world incident.
An event always has a specific time of occurrence. It may
involve a group of social users, organizations, participating
persons, one or several locations, other types of entities, key-
words, topics, etc. In our work, social events cover a wide
variety of types, including a large number of events that oc-
cur in the real world and spread on social networks, such as
earthquakes, national policies, economic crises, and so on.
Each event class refers to a unique event. For example, social
media's tweet about Tiger Woods winning the 2019 Masters
of Golf is an influential event in the real world and unlike
Patrick Reid's 2018 Masters of Golf. These are two different
events that happen in the real world and belong to different
event categories. The event labels for the Weibo and Ten-
cent datasets are labeled by the outsourcing companies. Both
entities and keywords have been manually extracted for the
Tencent dataset. Note that the anonymized social users and
their friend relationships involved in these two datasets are
granted by the two companies for scientific research purposes
only. For both of the two datasets, we use 60% of samples as
training set, 20% of samples as development set and the re-
maining 20% of as test set. The statistics of the two datasets
is shown in Table 1. We can see that the total number of class
is large and the number of samples in per class is small.
We conduct the experiments on event detection and event
clustering on these two datasets. The operating system and
software platforms are Ubuntu 5.4.0, Tensorflow-gpu (1.4.0)
and Python 2.7. The metrics used to evaluate the performance
of event detection are the accuracy and F1 score. The metric
used to evaluate the performance of event clustering is the
normalized mutual information (NMI).
4.2 Baseline Methods
Since the work of fine-grained social event categorization is
relatively small, we briefly describe the baseline methods of
text matching and text distance. For all the baselines, we use
the implementations or open source codes of these models
released by authors and other researchers, and report the best
performance of the results.
Support Vector Machine with TF-IDF feature (SVM):
Support Vector Machine with pair document TF-IDF features
is the most classical approach for classification task. We ex-
tract the TF-IDF features for social messages, and then use
the SVM classifier to implement the multi-class event clas-
sification. Convolutional Matching Architecture-I (ARC-
I) [Hu et al., 2014]: It encodes text pairs by CNNs, and com-
pares the encoded representations of each text with a MLP.
Convolutional Matching Architecture-II (ARC-II) [Hu et
al., 2014]: It builds directly on the interaction space between
two texts, and models all the possible combinations of them
with 1-D and 2D convolutions. Match by Local and Dis-
tributed Representations (DUET) [Mitra et al., 2017]: It
matches two texts using both local representation and learned
distributed representation. Multiple Positional Semantic
Matching (MV-LSTM) [Wan et al., 2016]: It matches two
texts with multiple positional text representations, and ag-
gregates interactions between different positional represen-
tations. Convolutional Deep Structured Semantic Models
(C-DSSM) [Shen et al., 2014]: It learns low-dimensional se-
mantic vectors for input text by CNNs. Deep Structured
Semantic Model (DSSM) [Huang et al., 2013]: It utilizes a
deep neural network to map high-dimensional sparse features
into low-dimensional features, and calculates the semantic
similarity of the document pair. Siamese Encoded Graph
Convolutional Network (SE-GCN) [Liu et al., 2018]:
It
learns vertex representations through a Siamese neural net-
work and aggregates the vertex features though GCNs to gen-
erate the document matching.
Term Frequency-Inverse Document Frequency (TF-
IDF): It uses the bag-of-words representation divided by each
word's document frequency. Latent Dirichlet Allocation
(LDA) [Blei et al., 2003]: is a celebrated generative model
for text documents that learns representations for documents
as distributions over word topics. Marginalized Stacked De-
noising Autoencoder (mSDA) [Chen et al., 2012]: It is a
representation learned from stacked denoting autoencoders.
Componential Counting Grid (CCG) [Perina et al., 2013]:
It is a generative model that models documents as a mix-
ture of word distributions and LDA. Word Move Distance
(WMD) [Kusner et al., 2015]: It measures the dissimilarity
between two documents as the minimum amount of distance
that words of one document need to travel to reach words of
another document. Knowledge-driven document similarity
Algorithms
ARC-I
ARC-II
DUET
DSSM
C-DSSM
MV-LSTM
SVM
SE-GCN
PP-SE-GCN
PA-GCN
PP-GCN
Accuracy
0.5384
0.5437
0.5625
0.5808
0.6017
0.5562
0.7581
0.7901
0.8319
0.8818
0.9252
F1
0.4868
0.3677
0.5237
0.6468
0.4857
0.6383
0.7361
0.7893
0.8383
0.8801
0.9231
Tencent
Weibo
Accuracy
0.4910
0.5277
0.5397
0.5765
0.6170
0.6252
0.6511
0.7063
0.7317
0.7567
0.8000
F1
0.4857
0.5137
0.5523
0.5411
0.5814
0.6613
0.6268
0.7015
0.7384
0.7591
0.8134
Table 2: Accuracy and F1 results of event detection.
measure (KnowSim) [Wang et al., 2016]: It's also a meta-
paths instances based document similarity, and hasn't consid-
ered the impacts of social users. The weights of meta-paths
are estimated by the Laplacian scores of documents.
4.3 Performance Analysis
Table 2 shows the accuracy and F1-score of different algo-
rithms on the task of event detection in Tencent and Weibo
datasets. Overall, the proposed PP-GCN model consistently
and significantly outperforms all baselines in terms of ac-
curacy and F1.
In the Tencent dataset, PP-GCN achieves
13% -- 56% improvements in terms of accuracy and F1 over all
baselines. In the Weibo dataset, PP-GCN achieves 10% -- 33%
improvements in terms of accuracy and F1 over all baselines.
The improvements can be attributed to the three charac-
teristics of proposed models. First, the knowledgeable HIN
is better modeling social events than traditional text model-
ing methods, such as bag-of-words (SVM), N-gram (ARC-I,
ARC-II and C-DSSM) and sequence-of-words (MV-LSTM).
Our PP-GCN has improved overall by more than 10% in the
event detection over the SE-GCN model incorporating struc-
tural and conceptual semantics. Second, the combination of
KIES based weighted adjacent matrix and Doc2Vec is better
for fine-grained event instance representation learning than
for feature extraction on text pairs, such as DUET. Third,
the classifier based on the ratio of modulus of generated rep-
resentations of event instances is better than the traditional
pairwise distances. Here, we replace the regression module
of SE-GCN model by our proposed popularity based clas-
sifier, named by PP-SE-GCN, and the performances can be
improved 3%-5% in Tencent and Weibo. The 10%-14% im-
provements from the SE-GCN to the PP-GCN demonstrate
the advantages of knowledgeable HIN modeling and the pair-
wise popularity based feature learning framework.
Furthermore, our PP-GCN model can avoid over-fitting in
training. We replace our classifier in PP-GCN by the angle
of generated event instances feature vectors based classifier,
namely PA-GCN. In Figure 3, we visualize the test accuracies
of the PP-GAN and PA-GCN in Tencent and Weibo in 7000
epochs. From Figure 3, we observe that the overall trend of
the accuracies of the PP-GCN model is continuously increas-
Datasets TF-IDF
Tencent
0.6686
0.5824
Weibo
LDA
0.6979
0.6014
mSDA
0.7545
0.6518
CCG WMD KnowSim KIES
0.9012
0.7715
0.7820
0.6973
0.8166
0.7261
0.8059
0.7191
KIES(T)
0.8937
0.8041
Table 3: NMI results of event clustering.
method, but not the other way around. We believe the rea-
son is that Tencent dataset has more applicable meta-path
weights by training with manually labeled entities and key-
words. Based on the learned weights and the interpretable
distance metric KIES, we have achieved the best performance
of semi-supervised event clustering.
5 Conclusion
In this paper, we propose a knowledgeable HIN based so-
cial event modeling framework, and design a novel pairwise
popularity GCN model to learn both meta-paths weights and
discriminant event instance representation, and achieves fine-
grained social event categorization with state-of-the-art per-
formances. By using the proposed PP-GCN model, we are
able to overcome the problems of large category size and
sparse small number of samples per class and preventing
overfitting in our tasks. Experimental results show that our
PP-GCN and KIES similarity measure can significantly out-
perform state-of-the-art baselines methods on two real-world
social datasets.
In the future, we plan to study the inter-
pretability of the different importance of meta-paths, and ex-
tend our framework to other complex parameter leaning and
applications.
Acknowledgements
The corresponding author is Jianxin Li. This work is sup-
ported by NSFC program (No.61872022, No.61421003) and
SKLSDE-2018ZX-16. Yangqiu Song is supported by the
Early Career Scheme (ECS, No. 26206717) from Research
Grants Council in Hong Kong. Philip S. Yu is supported
by NSF through grants IIS-1526499, IIS-1763325, and CNS-
1626432, and NSFC No.61672313.
References
[Aggarwal and Subbian, 2012] Charu C Aggarwal
Karthik Subbian. Event detection in social streams.
SDM, 2012.
and
In
[Allan, 2012] James Allan. Topic Detection and Tracking:
Event-based Information Organization. Springer Publish-
ing Company, Incorporated, 2012.
[Angel et al., 2012] Albert Angel, Nikos Sarkas, Nick
Koudas, and Divesh Srivastava. Dense subgraph mainte-
nance under streaming edge weight updates for real-time
story identification. PVLDB, 2012.
[Atefeh and Khreich, 2015] Farzindar Atefeh and Wael
Khreich. A survey of techniques for event detection in
twitter. Computational Intelligence, 31(1):132 -- 164, 2015.
[Auer et al., 2007] Soren Auer, Christian Bizer, Georgi Ko-
bilarov, Jens Lehmann, Richard Cyganiak, and Zachary
Figure 3: Illustration of the Accuracy for PP-GCN and PA-GCN.
ing, but the accuracies of the angle-based PA-GCN model
have periodic fluctuations. Essentially, the ratio of the modu-
lus between vectors is more stable than the angle in iterations.
Compared to the angle-based classifier, the popularity-based
classifier has better ability to learn discriminating and stable
event instance feature and prevent overfitting.
One advantage of the proposed PP-GCN compared to other
methods is that the weights (cid:126)ω between the meta-paths can be
learned according to the event detection task. Due to the inter-
pretability of the meta-path and similarity measure KIES, the
learned weights (cid:126)ω can be utilized in other applications. Here,
we make use of different similarity measures including KIES
and other methods discussed in Section 4.2, and leverage the
popular k-means algorithm to cluster the events. For the KIES
distance metric, we use the two weights (cid:126)ω learned in the event
detection tasks of Tencent and Weibo datasets, and then cal-
culate the KIES distances between event instances by Eq. 1
to implement a semi-supervised fine-grained event clustering.
Note that the test data did not participate in the training when
learned the meta-path weights (cid:126)ω in PP-GCN.
As shown in Table 3, our proposed similarity measure
KIES achieves the best performances on the two clusters tasks
in terms of NMI. Moreover, among the baselines, the WMD,
mSDA and CGG measures have been verified to achieve
state-of-the-art effects in text similarity in [Kusner et al.,
2015]. Compared to other similarity measures, our KIES
based k-means method achieves 6% -- 24% improvements in
terms of NMI. We even implement a meta-path weights trans-
fer experiment between Tencent dataset and Weibo dataset.
We see that the performance of the Weibo dataset are im-
proved more than 2% when employing the weights of the
Tencent dataset to the Weibo by the KIES(T) based k-means
Epoch#01000200030004000500060007000Accuracy#0.650.70.750.80.850.90.95PP-GCN in TencentPP-GCN in WeiboPA-GCN in TencentPA-GCN in WeiboIves. Dbpedia: A nucleus for a web of open data.
ASWC, 2007.
In
[Becker and Gravano, 2011] Hila Becker and Luis Gravano.
Identification and characterization of events in social me-
dia. Columbia University, 2011.
[Blei et al., 2003] David M Blei, Andrew Y Ng, and
Michael I Jordan. Latent dirichlet allocation. Journal of
machine Learning research, 3(Jan):993 -- 1022, 2003.
[Blei et al., 2010] David M Blei, Thomas L Griffiths, and
Michael I Jordan. The nested chinese restaurant process
and bayesian nonparametric inference of topic hierarchies.
JACM, 2010.
[Chandola et al., 2009] Varun Chandola, Arindam Banerjee,
and Vipin Kumar. Anomaly detection: A survey. ACM
computing surveys (CSUR), 2009.
[Chen et al., 2012] Minmin Chen, WUSTL EDU, and Zhix-
iang Eddie Xu. Marginalized denoising autoencoders for
domain adaptation. In ICML, 2012.
[Griffiths et al., 2004] Thomas L Griffiths, Michael I Jordan,
Joshua B Tenenbaum, and David M Blei. Hierarchical
topic models and the nested chinese restaurant process. In
NIPS, 2004.
[Hu et al., 2014] Baotian Hu, Zhengdong Lu, Hang Li, and
Qingcai Chen. Convolutional neural network architectures
for matching natural language sentences. In NIPS, 2014.
[Huang et al., 2013] Po-Sen Huang, Xiaodong He, Jianfeng
Gao, Li Deng, Alex Acero, and Larry Heck. Learning deep
structured semantic models for web search using click-
through data. In CIKM, 2013.
[Ji and Grishman, 2008] Heng Ji and Ralph Grishman. Re-
fining event extraction through cross-document inference.
Proceedings of ACL, pages 254 -- 262, 2008.
[Kim et al., 2009] Jin-Dong Kim, Tomoko Ohta, Yoshinobu
Kano, and Jun'ichi Tsujii. Overview of bionlp'09 shared
task on event extraction. In BioNLP, 2009.
[Kipf and Welling, 2017] Thomas N. Kipf and Max Welling.
Semi-supervised classification with graph convolutional
networks. In ICLR, 2017.
[Kusner et al., 2015] Matt Kusner, Yu Sun, Nicholas Kolkin,
and Kilian Weinberger. From word embeddings to docu-
ment distances. In ICML, 2015.
[Le and Mikolov, 2014] Quoc Le and Tomas Mikolov. Dis-
In
tributed representations of sentences and documents.
ICML, 2014.
[Liu et al., 2018] Bang Liu, Ting Zhang, Di Niu, Jinghong
Lin, Kunfeng Lai, and Yu Xu. Matching long text docu-
ments via graph convolutional networks. arXiv, 2018.
[Liu et al., 2019] Yaopeng Liu, Hao Peng,
Jianxin Li,
Yangqiu Song, and Xiong Li. Event detection and evolu-
tion in multi-lingual social streams. Frontiers of Computer
Science, 2019.
[Mikolov et al., 2013] Tomas Mikolov, Ilya Sutskever, Kai
Chen, Greg S Corrado, and Jeff Dean. Distributed rep-
resentations of words and phrases and their composition-
ality. In NIPS, 2013.
[Miller, 1998] George Miller. WordNet: An electronic lexical
database. MIT press, 1998.
[Mitra et al., 2017] Bhaskar Mitra, Fernando Diaz, and Nick
Craswell. Learning to match using local and distributed
representations of text for web search. In WWW, 2017.
[Papadopoulos et al., 2012] Fragkiskos Papadopoulos, Mak-
sim Kitsak, M ´Angeles Serrano, Mari´an Bogun´a, and
Dmitri Krioukov. Popularity versus similarity in growing
networks. Nature, 489(7417):537, 2012.
[Perina et al., 2013] Alessandro Perina, Nebojsa
Jojic,
Manuele Bicego, and Andrzej Truski. Documents as
multiple overlapping windows into grids of counts.
In
NIPS, 2013.
[Ritter et al., 2012] Alan Ritter, Oren Etzioni, Sam Clark,
et al. Open domain event extraction from twitter. In KDD,
2012.
[Shao et al., 2017] Minglai Shao, Jianxin Li, Feng Chen,
Hongyi Huang, Shuai Zhang, and Xunxun Chen. An ef-
ficient approach to event detection and forecasting in dy-
namic multivariate social media networks. In WWW, 2017.
[Shen et al., 2014] Yelong Shen, Xiaodong He, Jianfeng
Gao, Li Deng, and Gr´egoire Mesnil. Learning seman-
tic representations using convolutional neural networks for
web search. In WWW. ACM, 2014.
[Shi et al., 2017] Chuan Shi, Yitong Li,
Jiawei Zhang,
Yizhou Sun, and Philip.S Yu. A survey of heterogeneous
information network analysis. TKDE, pages 17 -- 37, 2017.
[Sun and Han, 2013] Yizhou Sun and Jiawei Han. Mining
heterogeneous information networks: a structural analysis
approach. Acm Sigkdd Explorations Newsletter, 2013.
[Wan et al., 2016] Shengxian Wan, Yanyan Lan, Jiafeng
Guo, Jun Xu, Liang Pang, and Xueqi Cheng. A deep ar-
chitecture for semantic matching with multiple positional
sentence representations. In AAAI, 2016.
[Wang et al., 2016] Chenguang Wang, Yangqiu Song, Hao-
ran Li, Ming Zhang, and Jiawei Han. Text classification
with heterogeneous information network kernels. In Thir-
tieth AAAI Conference on Artificial Intelligence, 2016.
[Wang et al., 2018] Chenguang Wang, Yangqiu Song, Hao-
ran Li, Ming Zhang, and Jiawei Han. Unsupervised meta-
path selection for text similarity measure based on hetero-
geneous information networks. Data Mining and Knowl-
edge Discovery, 32(6):1735 -- 1767, 2018.
[Xu et al., 2017] Bo Xu, Yong Xu, Jiaqing Liang, Wanyun
Cui, and Yanghua Xiao. Cn-dbpedia: A never-ending chi-
nese knowledge extraction system. In IEA/AIE, 2017.
[Yu et al., 2017] Weiren Yu, Jianxin Li, Md Zakirul Alam
Ring:
Bhuiyan, Richong Zhang, and Jinpeng Huai.
Real-time emerging anomaly monitoring system over text
streams. IEEE Transactions on Big Data, 2017.
[Zacks and Tversky, 2001] Jeffrey M Zacks and Barbara
Tversky. Event structure in perception and conception.
Psychological bulletin, 2001.
[Zhang et al., 2014] Ning Zhang, Jeff Donahue, Ross Gir-
shick, and Trevor Darrell. Part-based r-cnns for fine-
grained category detection. In ECCV, 2014.
|
1803.05046 | 1 | 1803 | 2018-03-13T21:07:52 | Caveat Emptor, Computational Social Science: Large-Scale Missing Data in a Widely-Published Reddit Corpus | [
"cs.SI"
] | As researchers use computational methods to study complex social behaviors at scale, the validity of this computational social science depends on the integrity of the data. On July 2, 2015, Jason Baumgartner published a dataset advertised to include ``every publicly available Reddit comment'' which was quickly shared on Bittorrent and the Internet Archive. This data quickly became the basis of many academic papers on topics including machine learning, social behavior, politics, breaking news, and hate speech. We have discovered substantial gaps and limitations in this dataset which may contribute to bias in the findings of that research. In this paper, we document the dataset, substantial missing observations in the dataset, and the risks to research validity from those gaps. In summary, we identify strong risks to research that considers user histories or network analysis, moderate risks to research that compares counts of participation, and lesser risk to machine learning research that avoids making representative claims about behavior and participation on Reddit. | cs.SI | cs | Caveat Emptor, Computational Social Science: Large-Scale Missing Data in a
Widely-Published Reddit Corpus
Devin Gaffney
Network Science Institute, Northeastern University
177 Huntington Avenue
Boston, MA, 02115
8
1
0
2
r
a
M
3
1
]
I
S
.
s
c
[
1
v
6
4
0
5
0
.
3
0
8
1
:
v
i
X
r
a
Abstract
As researchers use computational methods to study complex
social behaviors at scale, the validity of this computational
social science depends on the integrity of the data. On July 2,
2015, Jason Baumgartner published a dataset advertised to
include "every publicly available Reddit comment" which
was quickly shared on Bittorrent and the Internet Archive.
This data quickly became the basis of many academic pa-
pers on topics including machine learning, social behavior,
politics, breaking news, and hate speech. We have discov-
ered substantial gaps and limitations in this dataset which
may contribute to bias in the findings of that research. In
this paper, we document the dataset, substantial missing ob-
servations in the dataset, and the risks to research validity
from those gaps. In summary, we identify strong risks to
research that considers user histories or network analysis,
moderate risks to research that compares counts of participa-
tion, and lesser risk to machine learning research that avoids
making representative claims about behavior and participa-
tion on Reddit.
The Baumgartner Reddit Corpus
Trace data sourced from online platforms has become an
essential component for many forms of research ranging
from sentiment analysis (Pak and Paroubek 2010) to epi-
demiological modeling (Abdullah and Wu 2011) and eco-
nomics (Bollen, Mao, and Zeng 2011). Dominant social
platforms such as Twitter and Facebook have provided re-
searchers with opportunities to directly study complex phe-
nomena that, at their root, rely strongly on the nature of so-
cial interaction (Bond et al. 2012). The reason for this, as
Tufekci argues, is that large platforms (specifically Twitter,
in this analogy) serve as a model organisms for the social
sciences, ones that allow for ideal conditions for measure-
ment of many phenomena in a relatively accessible form.
On July 2, 2015, a new model organism was provided
to researchers by Jason Baumgartner – a "complete" copy
of one of the largest forums, Reddit, which has gained
high visibility in the past several years due to events such
as the Reddit blackout (Matias 2016; Newell et al. 2016;
Baumgartner 2016) and the Gamergate controversy (Massa-
This work is licensed under a Creative Commons "Attribution-
NonCommercial-ShareAlike 3.0 Unported" License.
J. Nathan Matias
Princeton University
Peretsman-Scully Hall
Princeton, NJ, 08540
nari 2015a). Subsequently, many researchers have adopted
the dataset, and have used it to study a wide range of ques-
tions, including the evolution of social networks (Fire and
Guestrin 2016), user migration through online platforms
(Tan and Lee 2015; Newell et al. 2016), hate speech (Saleem
et al. 2016), and online behavior research methodology (Bar-
bosa et al. 2016b), among others.
As a social news platform, Reddit hosts discussions about
text posts and web links across hundreds of communi-
ties called "subreddits" (Leavitt and Clark 2014; Massanari
2015c) Discussions from public subreddits are aggregated
by a variety of news aggregators to create the "front page of
the web" that Reddit was founded to provide to its readers
(Massanari 2015b). While the site also provides chatrooms
and features for live discussions of breaking news (Leavitt
and Robinson 2017), the most common reddit experience
is centered around top-level submissions and the comnents
that people post when discussing those submissions within
their subreddit communities. The Baumgartner dataset fol-
lows this common experience and includes submissions and
comments.
Researchers are drawn to the Baumgartner Reddit dataset
for its completeness. In principle, a complete dataset im-
proves research validity by avoiding the ambiguities of sam-
ples provided by platform application programming inter-
faces (APIs) and third-party data resellers (Lotan et al. 2011;
Diaz et al. 2016). In this paper, we show that this dataset, as
distributed and used by researchers, is not as complete as re-
ported. We report on gaps in this data, categorize the risks to
research validity from these gaps, and share collaborative re-
analyses of peer-reviewed papers that have used this dataset.
Finally, we conclude with reflections on the sensitivity of
online behavioral research to the kinds of gaps we found in
the Baumgartner Reddit Dataset.
Sequential ID Analysis
The Baumgartner Reddit dataset came about through a con-
vergence of factors: a mostly-public conversation platform,
engineering details specific to the design of the Reddit
system, and a creative data scientist who capitalized on
these characteristics to contribute a unique dataset to pub-
lic knowledge.
Many databases include the concept of an Identity col-
umn, or a column that generates an internal ID to serve as a
unique reference to the row, or object, within the database.
In many cases, this value auto-increments – the first value
in the database assumes a value of 1, the next, a value of 2,
and so forth. This number can be artificially shifted within
the space – for instance engineers may partition early IDs of
1-1,000,000 for experimenting with data, for some reason,
and start all production-system data created by users with
ID 1,000,001. Aside from this possibility, if an object con-
tains an ID of n, then it is plausible to assume that there are
at least n objects within the database.
In personal correspondence, Baumgartner explained that
this intuition led him to develop systems designed to
systematically-collect all data on Reddit. Baumgartner's al-
gorithm batches up 100 integers, converts them to the Base
36 representation that Reddit uses to represent their objects,
and then queries for those objects. Reddit then returns the
request with a set of all public, found objects. Baumgart-
ner's algorithm can be run in a highly parallel environment
– many batches of 100 IDs can be concurrently requested,
with no need to interact with one another. On other plat-
forms, some error may be returned if data has been deleted.
With Reddit, no error is returned – instead, a truncated object
reflecting that this deletion has occurred is returned. There-
fore, barring technical issues, this method should provide a
complete accounting for every ID within the range 1-n for all
public comments and submissions within the dataset. Using
this method, Baumgartner archived the public record of red-
dit comments and submissions from the platform's creation
through July 2015. Baumgartner has continued to provide
this data as a freely-available resource.
In this analysis, we consider The full dataset as released
by Baumgartner in July 2015, supplemented with updates
published by Baumgartner through the end of February
2016. We also include a followup analysis extended to June
2017.
Diagnosing Missing Data
Because reddit comments and submissions have unique, se-
quential IDs, we can analyze gaps in the sequence to evalu-
ate the completeness of the dataset. We observed two kinds
of missing information: dangling references (known un-
knowns) and gaps indicated by the absence of information
that we would expect to exist given the use of sequential
integers to index comments and submissions (unknown un-
knowns).
We discovered the completeness problem when work-
ing with this dataset for our own research. Taking a ran-
dom sample of subreddits and generating a timeline of daily
comments and submissions, plots showed impossible results
given the architecture of Reddit: some comment timelines
started earlier than their corresponding submission time-
lines.
The first kind of gap we discovered were dangling refer-
ences. On Reddit, comments can only occur within a dis-
cussion of a submission and can only refer to other com-
ments or submissions. In all cases, a submission would have
to exist for a comment to refer to it, a relationship that is
unidirectional in time. By traversing these relationships, we
Data Type
Dangling References (to Feb 2016)
Unknown Unknowns (to Feb 2016)
Unknown Unknowns (to Jun 2017)
Comments
101,257
943,755
35,801,325
Submissions
405,911
1,539,583
27,795,423
Table 1: Totals for missing data in the Baumgartner dataset
observed many references to missing comments and submis-
sions. These can be thought of as "known unknowns:" com-
ments which refer to other comments or to a parent submis-
sion, where the referred-to comment or parent submission is
not contained within the Baumgartner dataset.
We also observed a second kind of gap: objects that are
never referenced in the dataset but are likely missing. If all
comments and submissions are given sequential integer IDs,
we would expect an unbroken sequence of integers to be
associated with information in the dataset. This is not the
case. Consider the comments dataset: the earliest comment
in the Baumgartner dataset is comment #2 and the highest
is #29,484,960,643. In October 2007, the Reddit Company
incremented the comment IDs by several billion IDs. When
accounting for this difference, we assume that any other gaps
in the sequence of comment IDs can be attributed to gaps in
the dataset: we count 943,755 total potentially-missing com-
ments up to February 2016.
Missing comment IDs could be attributed to many possi-
ble causes. These IDs could be dangling references, public
information that for some reason were not returned by Red-
dit's systems to Baumgartner's software at that moment, or
information that was part of a community that had set its dis-
cussions to be private. These missing IDs are not associated
with deleted content, since the Reddit platform returns infor-
mation about deleted data, which is included in the Baum-
gartner dataset.
For submissions, we are less confident about the mag-
nitude of missing unknown unknowns. While we have ob-
served 1,539583 "gaps" in the space of IDs for submissions
through February 2016, the first submission in the Baum-
gartner dataset starts at 9,970,002. When searching for sub-
missions between #1 and #9,970,001, we have successfully
found some submissions, leading us to believe that millions
of submissions from the early history of Reddit may be ab-
sent from this dataset.
Figure 1: Histograms of sampled user Submission and Com-
ment counts
Deleted content, which is included in this dataset, repre-
sents a risk to validity that we do not consider here. A user
who deletes even one comment in their posting history intro-
duces many of the problems we describe in this paper, even
if the fact of the comment is recorded in the Baumgartner
dataset.
The Per-User Risk of Missing Data
How likely is a researcher to encounter these gaps? To ad-
dress this question, we estimate the per-user risk of miss-
ing data, using a random sample of 7,400 accounts from the
Baumgartner dataset.
The average user in this sample commented 6.8 times
and commented 96.6 times from late January 2006 through
February 2016. These averages occur on a highly skewed
distribution, as illustrated by the log-histograms in 1. Based
on table 1, the known maximum amount of missing com-
ments and submissions is 943,755 and 1,539,583, respec-
tively – dangling references are a subset of "unknown
unknowns." Across the entire Baumgartner dataset, only
0.043% and 0.65% of comments and submissions, respec-
tively, are missing. The issue has a compounding effect,
since a small number of users create a large amount of
the content on the platform. The more posts and comments
someone produces, all else being equal, the more likely their
histories will be affected by the missing data issue. As we
have also showed, unknown unknowns expanded dramati-
cally in the 16 months following February 2016 and now in-
clude 36 million missing comments and 28 million missing
submissions.
c rc and(cid:80)n
rc being missing simply by(cid:80)n
What is the probability of data loss for an individual Red-
ditor history? While in reality the missing data is not uni-
formally distributed throughout the corpus, we can estimate
the effect by compounding probabilities to assess the degree
to which a user could be affected by only a small amount of
missing data. Using the averages from earlier, we can cal-
culate the risk of any individual submission rs or comment
s rs, respectively.
In this case, the "average" Redditor may be exposed to a
total maximum risk level of ∝ 4.18% likelihood for miss-
ing at least one comment and ∝ 4.46% for missing at least
one submission. In the 7,400 individual set, approximately
2% of the sampled users had a 50% or greater chance of
having a missing comment, and 2.6% of the sampled users
had a 50% or greater chance of having a missing submis-
sion. These estimates were based on the census of dangling
references and unknown unknowns from the beginning of
the corpus to February 2016; we expect relatively similar
rates in later data, since the rate of missed content has been
consistent for the past several years. We offer these rough
approximations to communicate a qualitative sense of how
this missing data issue may create an appreciable problem
for some forms of research. We include a more detailed ty-
pology of possible errors below.
Distribution of Gaps Across Time
Far from being uniformally distributed throughout
the
dataset, the instances of missing data appear to be "bursty"
– clustered at certain moments of time. Consequently, cer-
tain spaces in the Reddit network or certain time periods
Figure 2: Burstiness of missing submissions and comments
per month, 2005-June 2017
may be at greater risk of missing data than others. Impor-
tantly, we found significant gaps for comments at key mo-
ments in Reddit history that have been subjects of research,
including the SOPA/PIPA protests (Benkler et al. 2015) and
the months leading up to the Reddit blackout (Matias 2016).
Leaning on Jo et al., we employ a measure of "burstiness"
which considers the relative dispersion of errors throughout
the ID space per each month of gathered data. This mea-
sure is bounded from [-1,1], where a score of -1 indicates
completely evenly dispersed errors, and a score approach-
ing 1 indicates that errors are located in a more concentrated
set of missing blocks. Figure 2 shows many high positive
burstiness scores, indicating that missing blocks are often
distributed unevenly within months throughout the dataset.
Figure 3: Varied measures of missing submissions per
month. Medium blue circles denote the percent of submis-
sions missing for each month of data, bright blue squares
denote the rolling average percent of missing submissions,
and dark blue stars denote the cumulative total number of
missing submissions to date.
Overall, figures 3 and 4 illustrate an initially erratic distri-
bution of errors throughout the dataset. These errors appear
to occur directly within periods of substantial research inter-
est and may affect several published results (Matias 2016;
2005-122006-062006-122007-062007-122008-062008-122009-062009-122010-062010-122011-062011-122012-062012-122013-062013-122014-062014-122015-062015-122016-062016-122017-061.000.750.500.250.000.250.500.751.00Missing Submissions2006-012006-072007-102008-042008-102009-042009-102010-042010-102011-042011-102012-042012-102013-042013-102014-042014-102015-042015-102016-042016-102017-040%20%40%60%80%100%Missing SubmissionsVariable
Total Content
Month Subreddit
Created
Constant
Observations
R2
Adjusted R2
Note:
Comments
Submissions
0.212∗∗∗
(0.008)
0.005∗∗∗
(0.001)
1.198∗∗∗
(0.094)
8,176
0.086
0.086
∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01
0.217∗∗∗
(0.006)
0.002∗∗
(0.001)
−0.518∗∗∗
(0.095)
4,341
0.306
0.305
Figure 4: Varied measures of missing comments per month.
Medium blue circles denote the percent of comments miss-
ing for each month of data, bright blue squares denote the
rolling average percent of missing comments, and dark blue
stars denote the cumulative total number of missing com-
ments to date.
Figure 5: Gaps are not evenly distributed across communi-
ties. The total historical counts of comments per community
comments are mildly correlated with the number of dangling
references, while submissions are not very correlated with
the number of dangling references.
Newell et al. 2016). While the rate of error was particularly
erratic in early years, and the distribution of errors per ID
gap continues to be erratic (figure 2), the error rate per month
has evened out to around 1% missing data per month.
Distribution of Gaps Across Communities
We also considered the degree to which missing content dif-
ferentially affects individual subreddits. If data from some
communities were more affected by gaps than others, the
gaps could influence the results of comparative research
about populations communities (Hill and Shaw 2017). If
gaps affected communities equally, we would expect that
the number of missing pieces of content monotonically rises
with the number of overall pieces of content posted to a sub-
reddit. As figure 5 shows, we find only marginal evidence for
such a supposition. While more missing content is positively
and significantly associated with larger subreddits, we do not
find a direct relationship. One confounding factor may be the
temporal "center of gravity" of a subreddit – older subred-
dits are positioned at a time when more content was missing,
on average, which may differentially affect older subreddits.
Table 2: Regression exploring the relationship between
amount of missing content per subreddit and total amount of
known content per subreddit, and month in which the sub-
reddit was created. We expect that these two variables would
have meaningful explanatory power for where missing con-
tent is – we find that this appears to be the case for missing
comments but not for missing submissions, as evidenced by
the relative R2 values.
We attempted to control for subreddit age in a multiple lin-
ear regression which accounted for the size of subreddits as
well as the time at which those subreddits were created; we
did not find any meaningful increase in explanatory power
in the adjusted model. Table 2 . The time at which a subred-
dit was created, however, is a poor proxy for the true "center
of gravity" of content (i.e. the time at which a subreddit was
most active), a characteristic that these models do not ac-
count for.
In the above sections, we have considered the influence
of potentially-missing content on analyses of users, behav-
ior over time, and groups. We observed numerous sources of
potential bias in research: a substantial percentage of users
could be affected by these gaps, the gaps are not evenly
distributed across time, and gaps are not evenly distributed
across communities.
How Missing Data Affects Common Research
Methods in Computational Social Science
How might these gaps influence research in practice? We ex-
pect that researchers asking different kinds of questions will
face different kinds of risks from missing data. In the follow-
ing sections, we categorize published literature that uses this
dataset and offer a typology of the risks that these gaps rep-
resent to common research methods in computational social
science.
User history analysis papers face the highest risks from
missing data, since a missing comment or submission could
hide an important part of that user's history. A network anal-
ysis may fail to include a user's participation in a particular
community or interaction with a key user. Furthermore, sur-
vival analyses might mis-estimate the moment of a person's
departure or their participation level. Network analysis pa-
pers also face high risks, since the presence or absence of
a tie could be dependent on the missing data. Sum analyses
that count the size or incidence rate of participation in sub-
2005-122006-062006-122007-062007-122008-062008-122009-062009-122010-062010-122011-062011-122012-062012-122013-062013-122014-062014-122015-062015-122016-062016-122017-060%20%40%60%80%100%Missing Commentsreddits or the use of certain kinds of language face moder-
ate risk, especially when analyzing small communities and
rare events. Content analysis that involves training machine
learning systems on Reddit comments face minimal risk be-
cause their research rarely includes claims about the popu-
lation of Reddit users.
Risk to User History Analyses
Papers that test hypotheses based on user histories on Red-
dit may have substantial gaps in the histories that they seek
to test. Analyses on user histories that consider the history
in full are, in general, exposed to the highest risk – analyses
that are especially sensitive to high-volume users are very
likely, on average, to consider users whose histories have
gaps. Hessel, Tan, and Lee, for example, observes and com-
pares sums of comment participation between subreddits,
and observes the full chain of user history – Hessel et al.
adopts a similar approach. Barbosa et al. compares year co-
horts of individual-level behavior across all of Reddit, and
as has been shown, some years are more affected by gaps
than others. Additionally, the large number of potential miss-
ing submissions from Reddit's earliest years may also affect
these findings. If a user history analysis requires the com-
plete posting history between subreddits for a given user,
gaps in such transmissions may constitute meaningful gaps
in explaining a wide array of hypotheses.
Risks to Network Analyses
Some papers test network hypotheses by constructing inter-
action networks between users or communities, sometimes
over time. Data gaps also represent a high risk to these pa-
pers, since missing submissions may result in unobserved
ties in the network. Tan and Lee observes histories of user
accounts participating in different communities, while Fire
and Guestrin observe network ties over time modeled on
user histories. Substantial blocks of missing data, includ-
ing the potentially large amount of missing submissions
from Reddit's nascency could redraw the map of community
ties on the platform. Tree structures reconstructing threads
are also similarly affected, such as work by Hessel, Lee,
and Mimno and Fire and Guestrin, which through linkages
of comments and submissions similarly face issues due to
missing submissions (i.e. parents of threads) or comments.
Risks to Research That Counts and Compares
Participation Between Communities
Other papers test hypotheses based on participation sums
within communities. Gaps that are biased toward partic-
ular communities will represent a risk to the validity of
these studies. Matias observes levels of subreddit partici-
pation by moderators, observes relative participation lev-
els of subreddit commenters in other subreddits, and ob-
serves moderator participation in "metareddits". Newell et
al. observes comment volumes within subreddits. Barthel
observes comments about political candidates across Red-
dit during a period where many submissions are within the
dataset. Barbaresi analyzes German language text to iden-
tify relative commenting rates about places in Germany.
Horne and Adali considers posts within /r/worldnews to de-
termine linguistic characteristics of why some news frames
are more visible than others. Dosono, Semaan, and Hems-
ley considers a specific set of communities associated with
self-expression of Asian-American Pacific Islander (AAPI)
identity on the platform.
As we showed in figure 5, gaps do not appear to be evenly
distributed across communities, since the number of missing
comments and submissions per community is not strongly
correlated to the number of observed comments and sub-
missions in that community. While a simple statistical re-
gression between the total counts of missing data and known
data shows the relationship to be significant, the R2 is low
enough in both cases to lead us to conclude that studies on
some subreddits could lead towards very biased results due
to higher than random amounts of missing data.
In practice, we observe 78 subreddits where at least 20%
of the comments are missing, and 1,755 subreddits where
at least 20% of the submissions are missing. Among sub-
reddits that have any dangling references, on average they
are missing at least 35% of their submissions. The R2 score
in a model predicting the volume of a community's missing
observations from the volume of observed comments and
submissions only explains 30% of the variance of missing
comments and 10% of the variance of missing submissions
(figure 5). The risk to any specific study will depend on the
distribution of gaps across the specific communities being
compared.
Risks to Machine Learning Models
Finally, some studies train machine learning models and
conduct linguistic analysis of the Baumgartner dataset. In-
sofar as these studies do not make claims about populations,
gaps represent a minimal risk to the validity of this research.
For example, Saleem et al. trains machine learning models
on comments from particular subreddits that have since been
quarantined or banned by Reddit for harmful behavior.
In our observations of communities where the mass of
missing data is pooled, it seems to trend towards such
communities – across the three subreddits considered in
their work, one of those subreddits has a large number of
dangling references: observed comments refer to 696,642
unique missing submissions in the dataset for this one com-
munity alone. Among comments, 1,100 of 1,585,014 total
comments were known to be missing. Saleem, Dillon, Be-
nesch, and Ruths have re-analyzed their data after filling
some gaps and fail to find any substantial differences in
the performance of their machine learning models (citation
forthcoming). Furthermore, since the purpose of this kind of
machine learning research is to make inferences about out-
of-sample observations rather than to test hypotheses about
a population, such research may be less sensitive to variation
due to missing data.
Discussion
All datasets have biases, no matter how complete we wish
them to be. In the process of designing research, conscien-
tious researchers will study those biases, document them,
and account for them as best as possible. In this paper, we
have shown ways in which an influential public dataset does
not represent the "complete" record that its publisher and
users aspired to. We have documented per-user risks of miss-
ing data, risks from the uneven distribution of missing data
over time, and risks in the uneven distribution of missing
data across communities. We have outlined the risks to re-
search validity represented by these data gaps, including
some of our own work.
We have raised these issues in direct conversation with
Baumgartner, who has quickly and graciously re-processed
ID blocks with missing data and filled in any gaps that are
able to be filled. By publication time of this paper, we be-
lieve that any missing data that can be filled will have been
done so for datasets provided directly by Baumgartner up
to February 2016. Data shared from any other source may
still include these missing observations. Since any missing
data that Reddit does not provide will still be missing from
the corrected datasets, we encourage researchers to check
the integrity of your data when publishing results from this
dataset.
More widely, the case of this so-called complete dataset
draws attention to the risks to validity from research cultures
that move fast to produce new results when new data is re-
leased. While many researchers have utilized Baumgartner's
generous work on this Reddit dataset to investigate impor-
tant questions, too few of us questioned a "completeness"
statement that shouldn't have been accepted as truth. This
dataset has numerous omissions, and those issues affect dif-
ferent research agendas with varying levels of severity.
As researchers, we need to protect ourselves from the daz-
zling scale of large datasets. We encourage more people in
Baumgartner's position to collect data, share it in an ethical
manner, and contribute to knowledge through the research
that it enables. It will not always be possible or reasonable
to place strict methodological expectations upon such citi-
zen scientists – that responsibility lies firmly on academics.
We hope this paper will encourage other researchers to test
their assumptions and document data quality when conduct-
ing social scientific research with large datasets that they did
not collect.
Acknowledgements
The authors wish to thank Jason Baumgartner for provid-
ing the dataset and for corresponding with us to check our
analyses. We are also grateful to Haji Mohammad Saleem
and Derek Ruths, for valuable discussion on the risks to ma-
chine learning research. Finally, we wish to thank Jack Hes-
sel, Lillian Lee, David Mimno, and Chenhao Tan for provid-
ing a careful examination of their previous work, which they
discuss in Appendix A.
References
[Abdullah and Wu] Abdullah, S., and Wu, X. 2011. An epi-
demic model for news spreading on twitter. In 2011 IEEE
23rd International Conference on Tools with Artificial Intel-
ligence, 163–169. IEEE.
2016.
[Barbaresi] Barbaresi, A. 2015. Collection, description, and
visualization of the german reddit corpus. In 2nd Workshop
on Natural Language Processing for Computer-Mediated
Communication, 7–11.
[Barbosa et al.] Barbosa, S.; Cosley, D.; Sharma, A.; and Ce-
sar Jr, R. M. 2016a. Averaging gone wrong: Using time-
aware analyses to better understand behavior. In Proceed-
ings of the 25th International Conference on World Wide
Web, 829–841. International World Wide Web Conferences
Steering Committee.
[Barbosa et al.] Barbosa, S.; Cosley, D.; Sharma, A.; and Ce-
sar Jr, R. M. 2016b. Averaging gone wrong: Using time-
aware analyses to better understand behavior. In Proceed-
ings of the 25th International Conference on World Wide
Web, 829–841. International World Wide Web Conferences
Steering Committee.
[Barthel] Barthel, M. How the 2016 presidential campaign is
being discussed on reddit pew research center. http://
www.pewresearch.org/fact-tank/2016/05/
26/\how-the-2016-presidential-campaign\
-is-being-discussed-on-reddit/. Accessed:
2011-11-07.
I have every
[Baumgartner] Baumgartner, J.
publicly available reddit comment for research.
1.7
billion comments at 250 gb compressed. any interest in
this? : datasets.
https://www.reddit.com/r/
datasets/comments/3bxlg7/\i_have_every_
publicly_available_reddit_comment/.
Ac-
cessed: 2011-11-07.
[Benkler et al.] Benkler, Y.; Roberts, H.; Faris, R.; Solow-
Niederman, A.; and Etling, B. 2015. Social mobilization and
the networked public sphere: Mapping the sopa-pipa debate.
Political Communication 32(4):594–624.
[Bollen, Mao, and Zeng] Bollen, J.; Mao, H.; and Zeng, X.
2011. Twitter mood predicts the stock market. Journal of
Computational Science 2(1):1–8.
[Bond et al.] Bond, R. M.; Fariss, C. J.; Jones, J. J.; Kramer,
A. D.; Marlow, C.; Settle, J. E.; and Fowler, J. H. 2012. A
61-million-person experiment in social influence and politi-
cal mobilization. Nature 489(7415):295–298.
[Diaz et al.] Diaz, F.; Gamon, M.; Hofman, J. M.; KÄ´scÄ´s-
man, E.; and Rothschild, D. 2016. Online and Social Media
Data As an Imperfect Continuous Panel Survey. PLOS ONE
11(1):e0145406.
[Dosono, Semaan, and Hemsley] Dosono, B.; Semaan, B.;
and Hemsley, J. 2017. Exploring aapi identity online: Po-
litical ideology as a factor affecting identity work on red-
dit. In Proceedings of the 2017 CHI Conference Extended
Abstracts on Human Factors in Computing Systems, 2528–
2535. ACM.
[Fire and Guestrin] Fire, M., and Guestrin, C. 2016a. Time
Is of the Essence: Analyzing the Effect of Vertex-Joining
arXiv preprint
Time on Complex Network Evolution
arXiv:1603.07445.
[Fire and Guestrin] Fire, M., and Guestrin, C. 2017. The rise
and fall of network stars. arXiv preprint arXiv:1706.06690.
the third ACM international conference on Web search and
data mining, 251–260. ACM.
[Newell et al.] Newell, E.; Jurgens, D.; Saleem, H. M.; Vala,
H.; Sassine, J.; Armstrong, C.; and Ruths, D. 2016. User
migration in online social networks: A case study on reddit
during a period of community unrest. In Tenth International
AAAI Conference on Web and Social Media.
[Pak and Paroubek] Pak, A., and Paroubek, P. 2010. Twitter
as a corpus for sentiment analysis and opinion mining. In
LREc, volume 10, 1320–1326.
[Saleem et al.] Saleem, H.; Dillon, K.; Benesch, S.; and
Ruths, D. 2016. A web of hate: Tackling hateful speech
in online social spaces. In First Workshop on Text Analytics
for Cybersecurity and Online Safety (TA-COS 2016).
[Saleem et al.] Saleem, H. M.; Dillon, K. P.; Benesch, S.; and
Ruths, D. 2017. A web of hate: Tackling hateful speech in
online social spaces. arXiv preprint arXiv:1709.10159.
[Tan and Lee] Tan, C., and Lee, L. 2015. All who wander:
On the prevalence and characteristics of multi-community
engagement. In Proceedings of the 24th International Con-
ference on World Wide Web, 1056–1066. ACM.
[Tufekci] Tufekci, Z. 2014. Big questions for social media
big data: Representativeness, validity and other methodolog-
ical pitfalls. arXiv preprint arXiv:1403.7400.
Appendix A
[Hessel et al.] Hessel, J.; Schofield, A.; Lee, L.; and Mimno,
D. 2015. What do democrats do in their spare time? la-
tent interest detection in multi-community networks. arXiv
preprint arXiv:1511.03371.
[Hessel, Lee, and Mimno] Hessel, J.; Lee, L.; and Mimno,
D. 2017. Cats and captions vs. creators and the clock: Com-
paring multimodal content to context in predicting relative
In Proceedings of the 26th International Con-
popularity.
ference on World Wide Web, 927–936. International World
Wide Web Conferences Steering Committee.
[Hessel, Tan, and Lee] Hessel, J.; Tan, C.; and Lee, L. 2016.
Science, askscience, and badscience: On the coexistence of
In Tenth International AAAI
highly related communities.
Conference on Web and Social Media.
[Hill and Shaw] Hill, B. M., and Shaw, A. 2017. Studying
Populations of Online Communities. The Handbook of Net-
worked Communication. Oxford University Press, New York,
NY.
[Horne and Adali] Horne, B. D., and Adali, S. 2017. The
impact of crowds on news engagement: A reddit case study.
arXiv preprint arXiv:1703.10570.
[Jo et al.] Jo, H.-H.; Karsai, M.; Kertész, J.; and Kaski, K.
2012. Circadian pattern and burstiness in mobile phone
communication. New Journal of Physics 14(1):013055.
[Leavitt and Clark] Leavitt, A., and Clark, J. A. 2014. Up-
voting hurricane Sandy: event-based news production pro-
cesses on a social news site. In Proceedings of the SIGCHI
conference on human factors in computing systems, 1495–
1504. ACM.
[Leavitt and Robinson] Leavitt, A., and Robinson, J. J. 2017.
The Role of Information Visibility in Network Gatekeeping:
Information Aggregation on Reddit during Crisis Events. In
CSCW, 1246–1261.
[Lotan et al.] Lotan, G.; Graeff, E.; Ananny, M.; Gaffney, D.;
Pearce, I.; et al. 2011. The arab spring the revolutions
were tweeted: Information flows during the 2011 tunisian
and egyptian revolutions. International journal of commu-
nication 5:31.
[Massanari] Massanari, A. 2015a. # gamergate and the fap-
pening: How redditâ A ´Zs algorithm, governance, and cul-
ture support toxic technocultures. New Media & Society
1461444815608807.
[Massanari] Massanari, A. 2015b. # Gamergate and The Fap-
pening: How Redditâ A ´Zs algorithm, governance, and cul-
ture support toxic technocultures. New Media & Society
1461444815608807.
[Massanari] Massanari, A. 2015c. Participatory Culture,
Community, and Play: Learning from Reddit. New York:
Peter Lang Publishing Inc., 2 edition edition.
[Matias] Matias, J. N. 2016. Going dark: Social factors
in collective action against platform operators in the reddit
In Proceedings of the 2016 CHI Conference on
blackout.
Human Factors in Computing Systems, 1138–1151. ACM.
[Mislove et al.] Mislove, A.; Viswanath, B.; Gummadi, K. P.;
and Druschel, P. 2010. You are who you know: inferring
In Proceedings of
user profiles in online social networks.
Hi Devin and Nate, We would first like to thank you again for bringing this issue to our attention. Your systematic evaluation was quite thorough and much appreciated. As social media datasets continue to increase in size, more work like yours should be completed, and we very much appreciate your constructive and careful efforts. We definitely agree that "all datasets have biases, no matter how complete we wish them to be;" more explicit qualifications of this dataset's shortcomings in future work would be appropriate. While we do think that this dataset's ambition, scale, cleanliness, and reach outweigh the downsides, i.e., we don't think that scraping errors should preclude future work, users of this dataset should be explicit about the possible caveats in working with it. 1.We could not agree more that the responsibility of data validation and cleaning should not fall to Jason Baumgartner. He has done a tremendous amount of work and we are all in his debt. Future data collection and cleaning should not automatically fall to him. 2.Although we began with RedditAnalytics, as we acknowledged in Tan & Lee 2015, we constructed our (Tan & Lee 2015, from which Hessel, Tan and Lee 2016, Hessel et al. 2016, and Hessel, Lee, and Mimno 2017 were derived) reddit submissions dataset prior to Jason B. releasing the full post set on pushshift.io, and our dataset differs from it. In fact, prior to our experimental work we ran a number of consistency and validation tests on the initially extracted data, contacted Jason to alert him of some inconsistencies that were revealed by our tests, and re-scraped some systematically missing submission data (for example, the README for our data release describes the re-scraping of all 1reddit posts for a month). 3.That being said, while the systematic biases you discover may differ from the pushshift.io post set to the one we use, it's possible that the set we are using also has similar biases. We will go back and check properties of our set. When we were constructing these datasets, we were aware of a small amount of potential missing data, though we judged that the amount of it was relatively insignificant in light of several other dataset characteristics. There are several well-known shortcomings of reddit data, including the issue of deleted posts. For example, in the dataset we use, there are 101M submissions, of which around 25M are deleted with no author information available. The missing comments/submission values you report (.043% and .65% respectively) were similar to the values we discovered in our own validations. Given that deleted posts (~25%) are a well-known shortcoming of any study using reddit data, we estimated that the small amount of missing data due to scraping errors (~1%) was less significant, and was a factor we ignored after correcting for large, systematic problems. In some cases, we ran additional experiments controlling for the likely more impactful factor of deleted posts, e.g., footnote 18 in Hessel, Lee, and Mimno 2017. In Tan and Lee 2015, since 2we knew of such issues, we should not have glossed over them by being so free in 1 https://chenhaot.com/data/multi-community/README.txt 2 https://arxiv.org/pdf/1703.01725.pdf saying "all posts"; similar problematic shorthand in follow-up work should not have been used. 4.Even after Jason's latest re-scraping, though, there still are some inexplicable findings that call into question the possibility of absolute completeness of a corrected version of this dataset. Here are few observations we have made based on a reading of your work and some previous analyses we had conducted. a.In the new reddit 0-10M post scrape, only 955K (9.5%) of posts are found. Here are some (base36, base10) submissions that were found within the first 10M ids: (2pjh7, 4550875), (2pjhg, 4550884), (2pjhq, 4550894); under the one-id-per-post metric, there clearly are still a significant number of missing posts -- perhaps up to 90%. If one attempts to access posts in between these values (e.g., (2pjh8, 455086)) either via the browser or via the API, a 404 error is returned (as of 33/9/2018). We've run into similar questions before, and attempted to find out why posts might be missing. b.To be concrete: after reading your work, we conducted a test with our own set. How many of the "gaps" in our data could be filled by re-querying the API? Using a random test set of 400 uniformly sampled post ids in the base36-sequential gaps in our set, we found that only 53/400 (13%) were accessible -- the remaining 347 (87%) posts were errors (we checked to see if this was reproducible in the browser -- for the posts we checked, it was). It's not entirely clear as to what this means. This observation invites many questions, e.g., are posts always assigned a continuous sequence of base36 ids? Can reddit moderators fully delete posts? Does the availability of posts according to the API change over time? Were the 13% of found posts unavailable for some reason in 2014? Have practices remained consistent since 2007? Do these potentially missing posts mean that future reddit studies are not to be trusted? c.Among the 347 failed API queries, there was a mixture of 404 and 403 errors (specifically: 289 404 errors (generally -- these were from earlier posts), 58 403 errors (generally -- these were from later posts)). According to the reddit python API documentation, a 403 error can be caused by a variety of circumstances, e.g., if the subreddit is private and the requesting user doesn't have access to it. According to the reddit python API, a 404 error occurs if the resource does not exist; it's plausible that a non-existent resource could be caused by an id that was never allocated, though it's hard to say why this happens. We have attempted to search through cached internet resources in search of missing posts (e.g., the internet archive) to no avail. d.We have also noticed some odd patterns in early reddit ids that could plausibly be indicative of future discontinuities, particularly if the id assignment scheme has remained consistent over time. For example, when sorting the very first posts made to reddit according to Jason's latest scrape by the created_utc field, the post ids up to post 28128 appear to be in base 10 (in base36, they are highly 3 http://reddit.com/r/reddit.com/comments/1l3tm/broken_link/ inconsistent). Then, the next post's id is "sqh" which would be post 37241, made 71 minutes after. Scrolling through this list reveals many more discontinuities; in time, the following post sequence appears: 101x, 5yb9e (200 seconds later), 5yb98 (300 seconds later), 102c (50 seconds later). These oddities continue, too; for instance, here is a post from the new re-scraping that is impossible -- the 4comment was made 4 years prior to the post. e.Anecdotally, it seems that most of the oddities in the dataset occur before 2008. Jan. 2008 is when Reddit started to allow users to create their own communities. We have found that most of the missing data after 2008 are due to 403 errors, which means that these submissions are likely not publicly available. As a result, we think that the Reddit dataset curated by Jason B. is amenable to studies focused on user-created communities, particularly in comparison to other publicly available datasets. In closing, we think that your work has raised an interesting research question: given that it's generally impossible to know if one has collected a "complete" set of information (be it posts by a reddit user, a user's tweets, wikipedia talk comments, etc.) are there methods of evaluation that simultaneously allow us to ask interesting questions while making sure observations are insensitive to often-overlooked (and, in the case of reddit, potentially un-avoidable) scraping gaps? We would be happy to discuss this topic going forward! And, one bureaucratic point: if you found this email (or followup conversations) helpful, we would be happy about that, but ask that if you were to acknowledge us in any paper or the like, please include a disclaimer that we do not necessarily agree with every point made in your paper. (Obviously, you don't have to acknowledge us at all if this wasn't helpful!) Signed (alphabetically), Jack Hessel Lillian Lee David Mimno Chenhao Tan 4 http://reddit.com/r/reddit.com/comments/1l3tm/broken_link/ |
1311.3085 | 1 | 1311 | 2013-11-13T11:25:18 | Community detection thresholds and the weak Ramanujan property | [
"cs.SI"
] | Decelle et al.\cite{Decelle11} conjectured the existence of a sharp threshold for community detection in sparse random graphs drawn from the stochastic block model. Mossel et al.\cite{Mossel12} established the negative part of the conjecture, proving impossibility of meaningful detection below the threshold. However the positive part of the conjecture remained elusive so far. Here we solve the positive part of the conjecture. We introduce a modified adjacency matrix $B$ that counts self-avoiding paths of a given length $\ell$ between pairs of nodes and prove that for logarithmic $\ell$, the leading eigenvectors of this modified matrix provide non-trivial detection, thereby settling the conjecture. A key step in the proof consists in establishing a {\em weak Ramanujan property} of matrix $B$. Namely, the spectrum of $B$ consists in two leading eigenvalues $\rho(B)$, $\lambda_2$ and $n-2$ eigenvalues of a lower order $O(n^{\epsilon}\sqrt{\rho(B)})$ for all $\epsilon>0$, $\rho(B)$ denoting $B$'s spectral radius. $d$-regular graphs are Ramanujan when their second eigenvalue verifies $|\lambda|\le 2 \sqrt{d-1}$. Random $d$-regular graphs have a second largest eigenvalue $\lambda$ of $2\sqrt{d-1}+o(1)$ (see Friedman\cite{friedman08}), thus being {\em almost} Ramanujan. Erd\H{o}s-R\'enyi graphs with average degree $d$ at least logarithmic ($d=\Omega(\log n)$) have a second eigenvalue of $O(\sqrt{d})$ (see Feige and Ofek\cite{Feige05}), a slightly weaker version of the Ramanujan property. However this spectrum separation property fails for sparse ($d=O(1)$) Erd\H{o}s-R\'enyi graphs. Our result thus shows that by constructing matrix $B$ through neighborhood expansion, we regularize the original adjacency matrix to eventually recover a weak form of the Ramanujan property. | cs.SI | cs | Community detection thresholds
and the weak Ramanujan property
Laurent Massoulié
Microsoft Research–Inria Joint Centre
[email protected]
November 14, 2013
Abstract
The present work is concerned with community detection, that is reconstruction of hidden
components, in random graph models. Decelle et al. [1] conjectured the existence of a sharp
threshold on model parameters for community detection in sparse random graphs drawn from
the stochastic block model. Mossel, Neeman and Sly [2] established the negative part of the
conjecture, proving impossibility of meaningful reconstruction below the threshold. The positive
part of the conjecture remained elusive so far: results of Co ja-Oghlan [3] imply that a particular
spectral method applied to the graph’s adjacency matrix achieves non-trivial reconstruction,
but this applies only when above the conjectured threshold by a possibly large constant.
In this work we solve the positive part of the conjecture. To that end we introduce a modified
adjacency matrix B based on neighborhood expansion. Specifically B counts simple, or self-
avoiding paths of a given length ℓ between pairs of nodes. We then prove that for logarithmic
length ℓ, the leading eigenvectors of this modified matrix provide a non-trivial reconstruction
of the underlying structure, thereby settling the conjecture. A key step in the proof consists in
establishing a weak Ramanujan property of the constructed matrix B . Namely, the spectrum of
B consists in two leading eigenvalues ρ(B ), λ2 and n−2 eigenvalues of a lower order O(nǫpρ(B ))
for all ǫ > 0, ρ(B ) denoting B ’s spectral radius.
Graphs are called Ramanujan when they are d-regular with second eigenvalue λ ≤ 2√d − 1.
Random d-regular graphs were shown to have a second largest eigenvalue λ of 2√d − 1 + o(1)
by Friedman [4], thus being almost Ramanujan. Erdős-Rényi graphs with average degree d at
least logarithmic (d = Ω(log n)) were shown by Feige and Ofek [5] to have a second eigenvalue
of O(√d), a slightly weaker version of the Ramanujan property.
However this spectrum separation property fails for sparse (d = O(1)) Erdős-Rényi graphs,
whose spectrum is dominated by the presence of high-degree nodes. Our result thus shows that
by constructing matrix B through neighborhood expansion, we regularize the original adjacency
matrix to eventually recover a weak form of the Ramanujan property.
3
1
0
2
v
o
N
3
1
]
I
S
.
s
c
[
1
v
5
8
0
3
.
1
1
3
1
:
v
i
X
r
a
1 Introduction
1.1 Background
Community detection, like clustering, aims to identify groups of similar items from a global popu-
lation. It is a useful primitive for performing recommendation, e.g. of contents or contacts to users
of online social networks. The stochastic block model has been introduced by Holland et al. [6] to
represent interactions between individuals. It consists of a random graph on n nodes, each node
i ∈ N = {1, . . . , n} being assigned a type σi from some fixed set Σ. Conditionally on node types,
edge (i, j ) is present with probability p(σi , σj ) independently of other edges, for some matrix of
probabilities (p(σ, σ ′ )).
It constitutes an adequate testbed for community detection. Indeed the performance of candidate
detection schemes, captured by the fraction of nodes i for which estimated types σi and true types σi
coincide, can be compared and analysed on instances of the stochastic block model. Such analyses
can in turn suggest new schemes.
Recently Decelle et al. [1] conjectured the existence of a phase transition in the sparse regime
where the graph’s average degree is O(1). Specifically, they predicted that for parameters below a
certain threshold, no estimates σi of node types existed that would be positively correlated with
true types σi , while above the threshold, belief propagation algorithms could determine estimates σi
achieving such a positive correlation. Their conjecture is formulated on a simple symmetric instance
of the stochastic block model featuring two node types {+1, −1}. The phenomenon appears more
general though: Heimlicher et al. [7] extended the conjecture to the more general setup of labeled
stochastic block models.
The study of this phenomenon is important for two reasons. First, by localizing precisely the
transition point below which no useful signal is present in the observations, one thus characterizes
how much subsampling of the original graph can be performed before all information is lost. Second,
algorithms leading to estimates σi that achieve positive correlation all the way down to the transition
are expected to constitute more robust approaches than alternatives which would fail before the
transition. It is therefore important to determine such algorithms.
The negative part of the conjecture has been proven by Mossel, Neeman and Sly [2]. Essentially
they established that existence of estimates σi positively correlated with true types σi would imply
feasibility of a reconstruction problem on a random tree model describing the local statistics of the
original random graph. However by results of Evans et al. [8] such reconstruction is infeasible below
the conjectured transition point.
Until now, positive results in the sparse case did not apply down to the transition point. The
best results to date (see [2]) relied on Co ja-Oghlan [3], showing that spectral clustering applied to
the adjacency matrix, suitably trimmed by removal of high degree nodes, yields positively correlated
estimates. However this does not apply down to the conjectured threshold.
This limitation stems from the following fact. Spectral methods perform well on matrices en-
joying a spectral separation property, namely the spectrum should comprise a few large eigenvalues
whose associated eigenvectors reflect the sought structure and all other eigenvalues should be neg-
ligible. The prototype of such separation is the Ramanujan property, according to which d-regular
graphs have the second eigenvalue λ no larger than 2√d − 1 in absolute value. Friedman [4] es-
tablished that random d-regular graphs almost satisfy this, in that for them λ ≤ 2√d − 1 + o(1).
Erdős-Rényi graphs with average degree d are such that λ ≤ O(√d), provided d = Ω(log n) (see
Feige and Ofek [5]), but such Ramanujan-like separation is lost for smaller d. This lack of separation
inherently limits the power of spectral methods in the sparse case.
1
1.2 Main results
We focus on the stochastic block model in Decelle et al. [1]. The graph is denoted G , node types
(or spins) σi are uniformly and i.i.d. drawn from {−1, +1}. An edge is present between any two
nodes i,j with probability a/n if σi = σj , and b/n if σi = −σj , constants a and b being the model
parameters. The conjectured transition point is specified by quantity τ = (a − b)2 /[2(a + b)]: for
τ < 1 it is known that positively correlated detection is impossible; we set out to prove that it is
feasible for τ > 1.
We shall make use of the notations α := (a + b)/2, β := (a − b)/2. The detectability condition
τ > 1 can be restated as
β 2 > α.
(1)
As mentioned, Co ja-Oghlan regularizes the adjacency matrix of the random graph by removing high
degree nodes before applying spectral clustering. In contrast, we regularize the initial data through
path expansion. Namely, we do not work directly with the adjacency matrix of the orginal graph.
Instead we form matrix B (ℓ) , where B (ℓ)
ij counts the number of self-avoiding paths of graph edges of
length ℓ connecting i to j .
Our main result is then the following
ov(σ, σ ) :=
Theorem 1.1. Assume Condition (1) holds. Set the path length parameter ℓ such that ℓ ∼ c log(n)
for a constant c such that c log(α) < 1/4. Let x be a normed eigenvector corresponding to the second
largest eigenvalue of B (ℓ) . There exists t such that, defining the spin estimates σi as
σi = (cid:26) +1 if xi√n ≥ t,
−1 otherwise,
the empirical overlap between the true and estimated spins defined as
1
n Xi∈N
converges in probability to the set {−r, +r} for some strictly positive constant r > 0 as n → ∞.
It proves the positive part of Decelle et al.’s conjecture. It further identifies a specific spectral
method based on the path-expanded matrix B (ℓ) . An auxiliary result consists in showing that
matrix B (ℓ) enjoys a spectral separation property, that is a weak version of the Ramanujan property.
Namely, denoting by ρ(B (ℓ) ) the spectral radius of B (ℓ) , we show that the third largest eigenvalue
λ of matrix B (ℓ) satisfies for all positive constant ǫ:
λ ≤ nǫqρ(B (ℓ) ).
We note that computation of B (ℓ) and hence of the σi can be done in polynomial time: as shown
in Lemma 4.2 the ℓ-neighborhood of any i contains at most one cycle so that each B (ℓ)
is readily
ij
evaluated by suitable breadth-first search.
σi σi
(2)
(3)
1.3 Paper organization
Section 2 contains the intermediate results involved in the proof and how they combine to establish
Theorem 1.1. Section 3 proves Theorem 2.2, which expresses matrix B (ℓ) as an expansion in terms
2
of the matrices B (m) , m < ℓ, together with bounds on the spectral norm of the matrix coefficients
involved. Section 4 contains the so-called “local analysis” of node neighborhoods. Specifically it
gives controls on the vectors B (m) e and B (m)σ , where e is the all-ones vector and σ is the vector of
spins, establishing a quasi-deterministic growth pattern with respect to m. Section 5 concludes.
2 Proof structure
Our key ob jective is to determine the spectral structure of B (ℓ) . Specifically we wish to establish
Theorem 2.1. Assume (1) and ℓ = c log n with c log(α) < 1/4.
(i) The leading eigenvalue of B (ℓ) is up to logarithmic factors Θ(αℓ ), with corresponding eigen-
vector asymptotical ly paral lel to B (ℓ) e.
(ii) Its second eigenvalue is Ω(β ℓ ) up to logarithmic factors, with corresponding eigenvector
asymptotical ly paral lel to B (ℓ)σ .
(iii) There is a random variable X with unit mean and variance 1/(β 2 /α − 1) such that for al l x
that is an atom of neither X ’s nor −X ’s distribution, the fol lowing convergence in probability holds
for any normed vector y asymptotical ly aligned with B (ℓ)σ :
n
pnE(X 2 ) ) →
1 (yi ≥
1
x
1
Xi=1
[P(X ≥ x) − P(−X ≥ x)] .
2
n
(iv) For any ǫ > 0, al l other eigenvalues are of order nǫ√αℓ .
Before we describe the steps used to establish this, let us verify how it implies Theorem 1.1.
Note that since E(X ) = 1, writing
E(X ) = Z ∞
(P(X ≥ x) − P(−X ≥ x)) dx,
0
we see that inequality P(X ≥ x) − P(−X ≥ x) > 0 must hold on a set of x’s of positive Lebesgue
measure. Since the points x at which the distribution of either X or −X has an atom is at
most countable, there thus exists an x at which neither distribution has an atom, and the desired
inequality P(X ≥ x)−P(−X ≥ x) > 0 holds. Letting t = x/pE(X 2 ) and r = P(X ≥ x)−P(−X ≥
x) we readily have by (4) that the empirical overlap in (3) must converge to {−r, +r}.
Theorem 2.1 will follow from the combination of two analyses. Let ¯A denote the expectation of
the graph’s adjacency matrix conditional on the spin vector σ , that is
(ee′ + σσ ′ ) − I (cid:21) +
n (cid:20) 1
a
2
The first analysis establishes the following
(ee′ − σσ ′ ).
b
2n
¯A =
(4)
(5)
Theorem 2.2. Matrix B (ℓ) verifies the identity
B (ℓ) = ∆(ℓ) +
ℓ
ℓ
Xm=1
Xm=1
for matrices ∆(ℓ) , Γℓ,m such that for ℓ = O(log n) and any fixed ǫ > 0, with high probability
ρ(∆(ℓ) ) ≤ nǫαℓ/2 ,
ρ(Γℓ,m ) ≤ nǫ−1α(ℓ+m)/2 , m = 1, . . . , ℓ.
(∆(ℓ−m) ¯AB (m−1) ) −
Γℓ,m ,
(6)
(7)
(8)
3
A local analysis is then needed to establish properties of the ℓ-neighborhoods of nodes in graph
G . The key quantities in this analysis are the following
St (i) = {j : dG (i, j ) = t},
Dt (i) = Pj
dG (i,j )=tσj .
1
They are close (in a sense made precise in Section 4) to the corresponding quantities (B (t) e)i ,
(B (t)σ)i , and are easier to analyze. In particular, they enjoy a quasi-deterministic growth property:
Theorem 2.3. Under Condition (1) for some suitable constants C and ǫ, with probability 1−O(n−ǫ)
the fol lowing holds for al l i ∈ N and ℓ = O(log n):
≤ C log(n)αt , t = 1, . . . , ℓ,
St (i)
Dt (i) ≤ C log(n)β t , t = 1, . . . , ℓ.
St (i) = αt−ℓSℓ (i) + O(log(n) + plog(n)αt ), t = 1, . . . , ℓ,
Dt (i) = β t−ℓDℓ (i) + O(log(n) + plog(n)αt ), t = 1, . . . , ℓ.
This, combined with Theorem 2.2, yields the key intermediate step:
Theorem 2.4. Let ℓ = c log(n), where constant c is such that c log(α) < 1/4. Under Condition (1)
the matrix B (ℓ) counting simple paths satisfies the fol lowing weak Ramanujan property
x=1,x′B (ℓ) e=x′B (ℓ) σ=0 B (ℓ)x ≤ nǫαℓ/2 .
sup
Another key ingredient consists in coupling the neighborhoods of nodes in graph G with a random
tree process, and performing a martingale analysis of this tree process. This is done in Section 4.3.
It establishes (see Theorem 4.2) that the vector (β−ℓDℓ (i)) is close in some sense to a vector (σiDi )
where the Di are i.i.d., distributed as the limit of a martingale. This limiting martingale distribution
is precisely that of variable X in the statement of Theorem 2.1.
(11)
(10)
(9)
(12)
3 Matrix expansion and spectral radii bounds
Our aim in this section is to establish Theorem 2.2. Denoting ξij the indicator of edge (i, j )’s
presence in G we can write
ℓ
B (ℓ)
ij = Xi0 ,i1 ,...,iℓ∈N
Yt=1
Denote by Pij the set of all so-called self-avoiding, or simple paths iℓ
0 := {i0 , . . . , iℓ } from i to j
appearing in the above sum. Let
1i0=i1iℓ=j 1{i0 ,...,iℓ }=ℓ+1
ξit−1 it .
(13)
ℓ
(A − ¯A)it−1 it
:= Xiℓ
Yt=1
0∈Pij
where ¯A is as in (5). We then have the expansion:
∆(ℓ)
ij
(14)
∆(ℓ)
ij = B (ℓ)
ij −
ℓ
Xm=1 Xiℓ
0∈Pij
ℓ−m
(A − ¯A)it−1 it
Yt=1
¯Aiℓ−m iℓ−m+1
ℓ
Yt=ℓ−m+2
Ait−1 it .
(15)
4
ij of paths iℓ
Introduce the set Qm
0 defined by:
0 ∈ Qm
iℓ
ij ⇔ i0 = i & iℓ = j & {i0 , . . . , iℓ−m } = ℓ − m + 1 & {iℓ−m+1 , . . . , iℓ} = m.
ij are thus concatenations of simple paths iℓ−m
Paths in Qm
and iℓ
ℓ−m+1 . Note that Pij ⊂ Qm
ij . Let
0
0 such that both iℓ−m
Rm
ij denote the set difference Qm
and iℓ
ij \ Pij . It then consists of paths iℓ
ℓ−m+1
0
are simple, and further verify that the intersection of the corresponding sets is not empty.
Define matrix Γℓ,m as
Γℓ,m
ij
¯Aiℓ−m iℓ−m+1
ℓ
Yt=ℓ−m+2
ℓ−m
(A − ¯A)it−1 it
:= Xiℓ
Yt=1
0∈Rm
ij
With these notations at hand, one obtains from (15):
∆(ℓ)
ij = B (ℓ)
ij Qℓ−m
ij − Pℓ
¯Aiℓ−m iℓ−m+1 Qℓ
t=1 (A − ¯A)it−1 it
m=1 Piℓ
t=ℓ−m+2 Ait−1 it
0∈Qm
ij Qℓ−m
¯Aiℓ−m iℓ−m+1 Qℓ
+ Pℓ
t=1 (A − ¯A)it−1 it
m=1 Piℓ
t=ℓ−m+2 Ait−1 it
0∈Rm
= B (ℓ)
m=1 Γℓ,m
m=1 (∆(ℓ−m) ¯AB (m−1) )ij + Pℓ
ij − Pℓ
,
ij
where we noticed that the summation over paths in Qm
ij of the corresponding products yields the
(ij )-entry of the product matrix ∆(ℓ−m) ¯AB (m−1) . This is precisely expansion (6).
We then have the following
Ait−1 it .
(16)
(17)
Proposition 3.1. For al l integers k , ℓ ≥ 1, it holds that
kℓ+1
kℓ
(cid:21)e−v+1
n (cid:17)v−1 (cid:20) max(a, b)
nv [(v + 1)2 (ℓ + 1)]2k(1+e−v+1) (cid:16) α
E hρ(∆(ℓ) )2k i ≤
Xv=ℓ+1
Xe=v−1
n
The proof uses the trace method, bounding ρ(∆(ℓ) )2k by the trace of (∆(ℓ) )2k and a specific
encoding of circuits involved in this trace computation. The fact that circuits consist in concate-
nations of simple paths of length ℓ is then leveraged to control which codes of circuits have to be
considered in the trace bound. The details are provided in the Appendix.
Inequality (7) readily follows from Proposition 3.1. Indeed for ℓ = O(log(n)) and fixed ǫ > 0,
choose an integer k > 0 such that ǫ > 1/(2k). By (18), it holds that
(18)
·
Thus
E(ρ(∆(ℓ) )2k ) ≤ (1 + o(1))nαkℓ [(kℓ + 2)2 (ℓ + 1)]2k .
P(ρ ≥ nǫαℓ/2 ) ≤ E(ρ2k )
n2kǫαkℓ
≤ (1 + o(1) nαkℓ [(kℓ+2)2 (ℓ+1)]2k
n2kǫαkℓ
≤ (1 − o(1))n1−2kǫ [(kℓ + 2)2 (ℓ + 1)]2k
= o(1),
since we chose k so that 2kǫ > 1 and the last term is polylogarithmic in n. This establishes (7).
We now establish a bound on the spectral radius of the matrix Γℓ,m previously introduced.
Specifically, we have
5
E((ρ(Γℓ,m )2k ) ≤
Proposition 3.2. For al l k , ℓ ≥ 1 and m ∈ {1, . . . , ℓ} we have the fol lowing
k(ℓ+m)
1+k(ℓ+m)
n (cid:19)2k+e−v+1
Xe=v−1 (cid:18) a ∨ b
v2k [(v + 1)2 (ℓ + 1)]4k(1+e−v+1) nv (cid:16) α
n (cid:17)v−1
Xv=m∨(ℓ−m+1)
(19)
The proof, postponed to the appendix, again uses the trace method, a specific encoding of
circuits involved in the trace bound, and then leverages the constraints on circuits appearing in this
bound. It readily implies inequality (8). Indeed for ℓ = O(log(n)), and any fixed ǫ > 0, choose
k > 0 such that ǫ > 1/(2k). By (19) it holds that
E(ρ(Γℓ,m )2k ) ≤ (1 + o(1))nαk(ℓ+m) (cid:20) a ∨ b
n
P(ρ ≥ nǫ−1α(ℓ+m)/2 ) ≤ E(ρ(Γℓ,m )2k )
n2k(ǫ−1)αk(ℓ+m)
≤ (1 + o(1))n1−2kǫ (cid:2)(a ∨ b)(k(ℓ + m) + 2)5 (ℓ + 1)2 (cid:3)2k ,
and this last bound decays to zero as a power of n by the condition 2kǫ > 1 and the fact that the
last term in the product is polylogarithmic in n. This completes the proof of Theorem 2.2.
(k(ℓ + m) + 2)5 (ℓ + 1)2(cid:21)2k
Thus
.
.
4 Local Analysis: structure of expanded neighborhoods
This section is devoted to the structure of the local neighborhoods of nodes. We start with general
bounds. We then relate vectors of interest B (ℓ) e and B (ℓ)σ to the neighborhood structures. The
martingale analysis of neighborhood structures follows.
4.1 Preliminaries
For any k ≥ 0, the number of nodes with spin ± at distance k (respectively ≤ k) of node i is
k (i) (respectively, U ±
denoted U ±
≤k (i)). We thus have
(20)
t (i) − U −
t (i) + U −
t (i), Dt (i) = U +
St (i) = U +
t (i).
We shall omit indices i when considering quantities related to a fixed node i. In the remainder of
the section we condition on the spins σ of all nodes. We denote n± as the number of nodes with
spin ±.
t , U −
For fixed i ∈ N it is readily seen that, conditionally on Fk−1 := σ(U +
t , t ≤ k − 1), we have:
≤k−1 , 1 − (1 − a/n)U +
k−1 (1 − b/n)U −
k−1 (cid:17) ,
k ∼ Bin (cid:16)n+ − U +
U +
k−1 (1 − b/n)U +
≤k−1 , 1 − (1 − a/n)U −
k−1 (cid:17) .
k ∼ Bin (cid:16)n− − U −
U −
Theorem (2.3) is established based on these characterizations by extensive use of Chernoff bounds
for binomial variables. Its proof is deferred to the Appendix.
The next technical result establishes approximate independence of neighborhoods of distinct
It is instrumental in Section 4.3 e.g.
in establishing weak laws of large numbers on the
nodes.
fraction of nodes satisfying a given property.
(21)
6
Lemma 4.1. Consider any two fixed nodes i, j with i 6= j . Let ℓ = c log(n) where constant c is
such that c log(α) < 1/2. Then the variation distance between the joint law of their neighborhood
processes L((U ±
k (i))k≤ℓ , (U ±
k (j ))k≤ℓ ) and the law with the same marginals and independence between
them, denoted L((U ±
k (i))k≤ℓ ) ⊗ L((U ±
k (j ))k≤ℓ ), goes to zero as a negative power of n as n → ∞.
k (i))k≤ℓ ) and (U ±
Proof. Take two independent realizations of the processes (U ±
k (j ))k≤ℓ ). Use them to
perform a joint construction of the two processes as follows. Having constructed the sets U ±
t (i) ⊂ N ,
U ±
t (j ) ⊂ N for t = 1, . . . , k − 1 and assuming the i-sets and the j -sets have not yet met, we construct
them at step k as follows. To construct U ±
k (i) we select a size U ±
k (i) subset uniformly at random from
N ± \U ±
≤k−1 (i). We do similarly for j . The construction can proceed based on the independent inputs
so long as the resulting i-sets and j -sets do not intersect. However on ∩t≤k {St (i)∨St (j ) ≤ C log(n)},
the expected size of the intersection will be upper-bounded by O(log2 (n)α2k /n) = O(log2 (n)n−2ǫ ,
where c log(α) = 1/2 − ǫ. The controls in the proof of Theorem 2.3 ensure that the probability of
∩t≤k {St (i) ∨ St (j ) ≤ C log(n)} is 1 − O(n−ǫ) and the result follows.
We now state a lemma on the presence of cycles in the ℓ-neighborhoods of nodes. It will be
instrumental in bounding the discrepancy between vectors B (ℓ) e (resp. B (ℓ)σ) and {Sℓ (i)} (resp.
{Dℓ (i)}). Its proof, deferred to the Appendix, relies on the previous coupling Lemma 4.1.
Lemma 4.2. Assume ℓ = c log(n) with c log(α) < 1/2. Then with high probability the number of
nodes i whose ℓ-neighborhood contains one cycle is O(log4 (n)α2ℓ ). Assume further that c log(α) <
1/4. Then with high probability no node i has more than one cycle-edge in its ℓ-neighborhood.
4.2 From neighborhood variables St and Dt to path matrix B (ℓ)
We first state how to transport the deterministic growth controls (11) of Theorem 2.3 to vectors
B (m−1) e and B (m−1) σ , a key step in the proof of Theorem 2.4. One has the following
Lemma 4.3. Let B denote the set of nodes i whose ℓ-neighborhood contains a cycle. Then for
m ≤ ℓ, ℓ = c log n with c log α < 1/4: :
i /∈ B ⇒ (cid:26) (B (m−1) e)i = Sm−1 (i) = αm−1−ℓ (B (ℓ) e)i + O(log(n)) + O(plog(n)αm−1 ),
(B (m−1)σ)i = Dm−1 (i) = βm−1−ℓ (B (ℓ)σ)i + O(log(n)) + O(plog(n)αm−1 ),
m
Xt=0
Si (t) = O(log(n)αm ).
i ∈ B ⇒ (B (m) σ)i ≤ (B (m) e)i ≤ 2
Proof is in the Appendix, together with that of the following Corollary:
(22)
(23)
Corollary 4.1. For al l m ∈ {1, . . . , ℓ} it holds with high probability that
x=1,x′B (ℓ) e=x′B (ℓ) σ=0 e′B (m−1)x = O (cid:16)log3 (n)αℓ+m−1 + √n[log(n) + plog(n)αm−1 ](cid:17) ,
sup
x=1,x′B (ℓ) e=x′B (ℓ) σ=0 σ ′B (m−1)x = O (cid:16)log3 (n)αℓ+m−1 + √n[log(n) + plog(n)αm−1 ](cid:17) .
sup
We are now ready to prove Theorem 2.4:
(24)
(25)
7
ρ(Γℓ,m ).
Proof. (of Theorem 2.4). Using identity (6), write for unit norm x:
ℓ
ℓ
Xm=1
Xm=1
ρ(∆(ℓ−m) ) ¯AB (m−1)x +
B (ℓ)x ≤ ρ(∆(ℓ) ) +
We can ignore the terms ρ(∆(ℓ) ) and ρ(Γℓ,m ), known to be less than nǫαℓ/2 from (7) and (8).
Recalling the expression (5) of ¯A, one has:
a
¯AB (m−1)x ≤
n B (m−1) x + O(n−1/2 [σ ′B (m−1)x + e′B (m−1)x]).
Using the bounds (24,25), the right-hand side is no larger than
n B (m−1) x + O (cid:16)n−1/2 (cid:16)log3 (n)αℓ+m−1 + √n[log(n) + plog(n)αm−1 ](cid:17)(cid:17) .
a
By the previous inequalities (10,22,23) and the row sum bound, we have that
ρ(B (m−1) ) = O(log(n)αm−1 ).
This thus yields
+ log3 (n)αℓ+m−1
¯AB (m−1)x ≤ O (cid:16) log(n)αm−1
n
n1/2
= O(log(n) + plog(n)αm−1 ).
We thus have
B (ℓ)x ≤ nǫαℓ/2 + Pℓ
m=1 ρ(∆(ℓ−m) )O(log(n) + plog(n)αm−1 )
≤ nǫαℓ/2 + Pℓ
m=1 nǫα(ℓ−m)/2O(log(n) + plog(n)αm−1 )
≤ nǫαℓ/2O(1 + 2ℓ log(n)).
The result readily follows.
+ log(n) + plog(n)αm−1 (cid:17)
We now state two Lemmas which will allow to establish Theorem 4.1.
(26)
Lemma 4.4. The fol lowing evaluations hold whp for ℓ = c log n with c log α < 1/4:
B (ℓ) e − {Sℓ (i)}i∈N = o (cid:0)B (ℓ) e(cid:1) ,
B (ℓ)σ − {Dℓ (i)}i∈N = o (cid:0)B (ℓ)σ (cid:1) ,
< B (ℓ)e, B (ℓ)σ >
= o (cid:0)B (ℓ) e × B (ℓ)σ (cid:1)
Lemma 4.5. The fol lowing inequalities hold for ℓ = c log n with c log α < 1/4:
Ω(αℓ )B (ℓ) e ≤ B (ℓ)B (ℓ)e ≤ O(log2 nαℓ )B (ℓ) e
Ω(β ℓ )B (ℓ)σ ≤ B (ℓ)B (ℓ)σ ≤ O(log4 (n)β ℓ )B (ℓ)σ .
Using these, we now establish the following
Theorem 4.1. For ℓ = c log n with c log α < 1/4, the two leading eigenvectors of B (ℓ) are asymptoti-
cal ly aligned with vectors {Sℓ (i)}, {Dℓ (i)}, with corresponding eigenvalues of order up to logarithmic
terms Θ(αℓ ) and Ω(β ℓ ). Al l other eigenvalues are O(nǫ√αℓ ) for any fixed ǫ > 0.
Proof. Estimates (27–28) and the weak Ramanujan property of Theorem 2.4 imply that the leading
eigenvector is aligned with B (ℓ) e and has eigenvalue αℓ up to logarithmic terms. The second eigen-
vector is necessarily asymptotically in the span of {B (ℓ) e, B (ℓ)σ} and with eigenvalue Ω(β ℓ ). By
asymptotic orthonormality of vectors B (ℓ) e and B (ℓ)σ and their asymptotic alignment with {Sℓ (i)},
{Dℓ (i)} respectively, the conclusion regarding the first two eigen-elements follows. The bound on
the magnitude of other eigenvalues follows from Theorem 2.4 and the Courant-Fisher theorem.
(27)
(28)
8
4.3 Coupling with Poisson tree growth process
Introduce the stochastic process {V ±
t }t≥0 defined by
0 = 1, V −
V +
0 = 0,
, V −
V +
independent conditionally on Gt−1 ,
t
t
L(V ±
Gt−1 ) = Poi((a/2)V ±
t−1 + (b/2)V ∓
t−1 )
t
where Gt−1 = σ(V ±k , k ≤ t − 1). We then have the following
Lemma 4.6. Let i ∈ N be fixed with spin σi = σ . For a constant c > 0 such that c log(α) < 1/2,
t (i))t≤ℓ and (V ±σ
and ℓ = c log(n), the fol lowing holds. The variation distance between (U ±
)t≤ℓ goes
t
to zero as a negative power of n as n → ∞.
The proof given in the Appendix relies on the Stein-Chen method for Poisson approximation.
Define now the processes
(29)
t + V −
Mt = α−t (V +
t ),
t − V −
∆t = β−t (V +
t ),
is as defined in (29). We then have the following
where V ±
t
Lemma 4.7. The two processes {Mt }, {∆t } are Gt -martingales. Process {Mt } is uniformly inte-
grable under Condition α > 1. Under Condition β 2 > α, process {∆t } is also uniformly integrable.
Corollary 4.2. Under α < β 2 the martingale {∆t} converges almost surely to a unit mean random
variable ∆∞ . Moreover this random variable has a finite variance 1/(β 2 /α− 1) to which the variance
t − ∆2
of ∆t converges. It further holds that E∆2
∞ → 0 as t → ∞.
Together these properties allow to establish the following
(30)
(31)
(32)
(33)
Theorem 4.2. One has the fol lowing convergence in probability
lim
n→∞
1
n
β−2ℓD2
ℓ (i) = E(∆2
∞).
n
Xi=1
For al l τ ∈ R that is a point of continuity of the distribution of both ∆∞ and −∆∞ , one has the
fol lowing convergence in probability for both signs ±
1
yi≥τ /√nE(∆2
n Xi∈N :σi=±
∞ ) =
1
Let y ∈ Rn be the normed vector defined as
Dℓ (i)
qPn
j=1 Dℓ (j )2
Let x be a vector in Rn such that we have the convergence in probability
P(±∆∞ ≥ τ ).
, i = 1, . . . , n.
lim
n→∞
yi =
1
2
n→∞ x − y = 0.
lim
(34)
9
Define the spin estimates
σi = (cid:26) + if xi ≥ t/pnE(∆2
∞),
− otherwise.
For each t that is an atom of neither ∆∞ ’s or −∆∞ ’s distribution, the fol lowing convergence in
probability holds
n
1
1
Xi=1
n
2
To convey the main ideas of the proof (deferred to the Appendix), we now indicate how to
establish a property similar to (32), namely for a continuous bounded function g we establish
convergence in probability
(P(∆∞ ≥ t) − P(−∆∞ ≥ t)) .
lim
n→∞
σi σi =
(35)
(36)
1
2
(37)
Eg(±∆∞ ).
g(β−ℓDℓ (i)) →
1
n Xi∈N ”′ σi=±
The expectation of the sum in the left-hand side reads
n±
n hEg(±∆ℓ )1coupling + O(g ∞ )(1 − P(coupling))i
where the event {coupling} refers to coupling as in Lemma 4.6. By this Lemma, the martingale
convergence property of ∆ℓ , the fact that n±/n → 1/2 and continuity of g , this expectation converges
to (1/2)Eg(±∆∞ ). Now the expectation of the square of the empirical average in (37) reads
∞ ) + 2(cid:18)n±
n2 (cid:20)n±O(g 2
2 (cid:19)Eg(β−ℓDℓ (i))g(β−ℓDℓ (j ))(cid:21)
1
where i 6= j are two fixed nodes with spin ±. By the coupling lemma 4.1 it holds that
Eg(β−ℓDℓ (i))g(β−ℓDℓ (j )) = (cid:16)Eg(β−ℓDℓ (i))(cid:17)2
+ O(n−ǫ)g 2
∞ .
It follows that the variance of the empirical average in (37) goes to zero as n → ∞. Its announced
convergence in probability to (1/2)Eg(±∆∞ ) then follows by Tchebitchev’s inequality.
Theorems 4.1 and 4.2 readily imply Theorem 2.1.
5 Conclusions
The methods developed here may find further applications, e.g. to prove the more general conjecture
by Heimlicher et al. [7] of a phase transition in the labeled stochastic block model. More generally
one might ask what is the range of applicability of our path expansion approach to “fix” spectral
methods by recovering Ramanujan-like spectral separation properties.
It is likely that a similar
regularization would occur by considering matrix B defined by Bij = 1dG (,ij )=ℓ but we have not
been able to prove this yet.
acknowledgements: The author gratefully acknowledges stimulating discussions on the topic
with Marc Lelarge and Charles Bordenave.
10
References
[1] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborova, “Asymptotic analysis of the stochastic
block model for modular networks and its algorithmic applications,” Physics Review E, vol.
84:066106, 2011.
[2] E. Mossel, J. Neeman, and A. Sly, “Stochastic block models and reconstruction,” Feb. 2012,
available at: http://arxiv.org/abs/1202.1499.
partitioning
“Graph
[3] A. Co ja-oghlan,
Probab. Comput.,
19,
no.
2,
vol.
http://dx.doi.org/10.1017/S0963548309990514
via
pp.
adaptive
227–284,
spectral
2010.
techniques,”
Comb.
[Online]. Available:
[4] J. Friedman, “A proof of alon’s second eigenvalue conjecture and related problem,” Mem. Amer.
Math. Soc., no. 910., 2008.
“Spectral techniques applied to sparse random graphs,” Random
[5] U. Feige and E. Ofek,
Struct. Algorithms,
[Online]. Available:
Sept. 2005.
no. 2, pp. 251–275,
vol. 27,
http://dx.doi.org/10.1002/rsa.v27:2
[6] S. L. Paul W. Holland, Kathryn Blackmond Laskey, “Stochastic blockmodels: First steps,” Social
Networks, vol. 5, no. 2, pp. 109–137, 1983.
[7] S. Heimlicher, M. Lelarge, and L. Massoulié, “Community detection in the labelled stochastic
block model,” Nov. 2012, avaiable at: http://arxiv.org/abs/1209.2910.
[8] W. Evans, C. Kenyon, Y. Peres, and L. Schulman, “Broadcasting on trees and the ising model,”
pp. 410–433, 2000.
[9] D. Williams, Probability with martingales. Cambridge University Press, 1991.
11
A Proof of Proposition 3.1
Proof. We control the spectral radius of ∆(ℓ) using the trace method. Specifically chose k > 0. It
holds that
(38)
E(ρ(∆(ℓ) )2k ) ≤ ETr(∆(ℓ) )2k ).
Note that Tr(∆(ℓ) )2k ) is the sum over circuits of length 2k of the products of the entries ∆(ℓ)
e over
the edges e in the circuit. Moreover, given the definition of ∆(ℓ) , these correspond to products of
entries Ae − ¯Ae over edges e of circuits of length 2kℓ satisfying the property that consecutive length
ℓ-paths are simple.
We bound the expectation of the corresponding sum as follows. Let v (respectively, e) be the
number of nodes (respectively, edges) traversed by a particular circuit. The quantity c = e − v + 1
is the so-called “tree excess”, counting the number of edges that are traversed while not being part
of the tree consisting of edges whose first traversal strictly augments the number of spanned nodes.
We represent the corresponding circuit as follows.
We number nodes by the order in which they are met by the circuit, starting with node 1.
We break each length ℓ-simple path into consecutive sequences consisting of
• a path using only edges already used in the circuit, and lying on the tree of new node discoveries
• a path of discoveries of new nodes
• a cycle edge connecting the end of the two previous steps to a node already spanned. Such a
cycle edge may have already been traversed by the circuit one or several times.
Given the tree previously spanned, and the current position on it, the first part of the sequence
is characterized by the node label of its end:
indeed, since on this subsequence we enforce the
condition that the paths are simple, back-tracking is forbidden. Hence there is only one path on
the tree going from the origin to the destination. We thus represent the first part by the number of
the destination node if this part is non-empty, and by zero otherwise.
The second part of the sequence is simply represented by its length, which is constrained to lie
in {0, . . . , ℓ}. Indeed, it cannot exceed ℓ, as we consider sequences that lie within a length ℓ-simple
path.
Finally, the third part of the sequence is simply characterized by the number characterizing its
end point, and by zero if this part is not present. We must allow for this case, as when we break
up a length ℓ-simple path into constituting such sequences, the last such sequence may not end up
by traversal of such a redundant edge.
Let us now use this representation to bound the number of corresponding sequences. An in-
dividual sequence is represented by a triplet (p, q , r) with p ∈ {0, . . . , v}, q ∈ {0, . . . , ℓ}, and
r ∈ {0, . . . , v}. Note further that each such sequence corresponds to either the end of an indi-
vidual length ℓ-simple path, or the traversal of a redundant edge. The number of such edges is
c = e − v + 1, and each edge can be traversed at most 2k times by the constraint that circuits are
formed from length ℓ simple paths. Thus the number of valid circuits corresponding to v and e is
at most
[(v + 1)2 (ℓ + 1)]2k(1+e−v+1) .
For a given number of nodes v and edges e, the number of corresponding nodes in {1, . . . , n} is
upper-bounded by nv . For a given edge present with multiplicity m ∈ {1, . . . , 2k}, the corresponding
12
expectation is zero if m = 1, and for m ≥ 2, we have
a(σi , σj )
E((ξij − E(ξij σ))m σ) ≤
·
n
Here a(σi , σj ) equals a if σi = σj and b otherwise. For the cyclic edges we use the upper bound
max(a, b)/n. There are e− v + 1 such factors. We are left with a tree with v − 1 edges, for which upon
averaging over σ we get a contribution (α/n)v−1 . Now the number of nodes v on any configuration
whose contribution in expectation does not vanish must lie between ℓ + 1 and kℓ + 1: indeed each
node discovery costs one edge, but this edge must be doubled for the contribution not to vanish.
Since there are in total 2kℓ edges, at most kℓ nodes can be discovered in addition to the original
node of the circuit. The number of distinct edges is similarly bounded by kℓ in any configuration
with non-vanishing expectation. This gives the bound
kℓ
kℓ+1
n (cid:19)e−v+1
n (cid:17)v−1 (cid:18) a ∨ b
[(v + 1)2 (ℓ + 1)]2k(1+e−v+1) nv (cid:16) α
Xe=v−1
Xv=ℓ+1
E(ρ(∆(ℓ) )2k ) ≤
as announced.
B Proof of Proposition 3.2
Proof. By the trace method again, we have that ρ(Γℓ,m )2k is upper-bounded by the trace of
[Γℓ,m (Γℓ,m )′ ]k . The latter corresponds to sum over circuits of length 2ℓk of products of terms
that can be either Ae − ¯Ae , ¯Ae or Ae . The constraints are that a length ℓ chunk of the circuit is
the concatenation of two simple paths of length m − 1 and ℓ − m, and that the two of them have a
non-empty intersection.
We represent such contributions as follows. We let v denote the number of nodes traversed by
the circuit, and by e the number of edges traversed by the circuit, while ignoring edges that are
weighed by an ¯A-term. Note that by the constraint that the concatenated simple parts of each
length ℓ-chunk intersect, the corresponding graph is necessarily connected. We adopt the following
representation of the corresponding circuits.
Nodes are again denoted by the order in which they are first met, starting with node 1. We
represent each simple path that constitutes the circuit by sequences of three phases as before. Note
that there are now 4k such simple paths: each length ℓ chunk of the original circuit is broken into
an m − 1- and an ℓ − m-path. We adopt the same representation as before, except that we must
now also incorporate the label of the starting point after traversal of an ¯A-edge.
Thus we have the upper bound on the number of valid circuit labels with v nodes and e edges:
v2k [(v + 1)2 (ℓ + 1)]4k(1+e−v+1) .
Let us bound the values that v and e can take. Necessarily, v ≥ max(m, ℓ − m + 1): indeed, each
length ℓ chunk comprises simple paths of length m − 1 and ℓ − m. Moreover, there are overall
2k(ℓ − 1) edges (recall that we discount the ¯A-edges). Out of these, 2k(ℓ − m) must be doubled for
the expectation not to vanish. There are thus at most 1 + k(ℓ + m) nodes v in total, and at most
k(ℓ + m) distinct edges in total.
We thus obtain the upper bound
k(ℓ+m)
n (cid:19)2k
Xe=v−1 (cid:18) a ∨ b
n (cid:19)e−v+1
n (cid:17)v−1 (cid:18) a ∨ b
v2k [(v+1)2 (ℓ+1)]4k(1+e−v+1) nv (cid:16) α
13
E[(ρ(Γℓ,m )2k ] ≤
1+k(ℓ+m)
Xv=m∨(ℓ−m+1)
.
C Proof of Theorem 2.3
The following inequality is easily verified to hold for any non-negative U , V , a, b, n such that
a/n, b/n ≤ 1, and will be instrumental in the sequel:
(cid:19)2
2 (cid:18) aU + bV
aU + bV
1
≤ 1 − (1 − a/n)U (1 − b/n)V ≤
−
n
n
Next lemma is the key ingredient to establish Theorem 2.3.
aU + bV
n
.
(39)
Lemma C.1. The fol lowing properties hold with high probability for al l i ∈ N and al l t ≤ ℓ, with
ℓ = C log(n).
Let T = inf {t ≤ ℓ : St ≥ K log(n)} for some constant K . Then ST = Θ(log(n)).
Let ǫt := ǫα−(t−T )/2 for some constant ǫ > 0. Then for al l t, t′ ∈ {T , . . . , ℓ}, t > t′ , the vector
t , U −
Ut = (U +
t ) verifies the coordinate-wise bounds:
Ut ∈ " t
(1 − ǫs )M t−t′ +1Ut′ ,
Ys=t′+1
where M denotes the matrix (a/2 b/2, b/2 a/2).
t and U −
Proof. Recall that conditionally on Ft−1 the random variables U +
t are independent, dis-
tributed according to
t−1 (cid:17) .
t ∼ Bin (cid:16)n± − U ±
t−1 (1 − b/n)U ∓
<t , 1 − (1 − a/n)U ±
U ±
Let T be the first instant t for which Ut ≥ K log(n), for some K to be specified.
By definition of T , necessarily UT −1 < K log(n). Thus
t
(1 + ǫs )M t−t′+1Ut′ # ,
Ys=t′+1
(40)
K log(n)
U ±
T ≤ Bin(n± , (a ∨ b)
n
The mean of the Binomial distribution in the right-hand side of the above is equivalent to (a ∨
b)(1/2)K log(n) and less than κ log(n) for κ = (a ∨ b)K . Hence by Chernoff ’s inequality, for
h(x) := x log(x) − x + 1,
).
T ≤ K ′/2 log(n)FT −1 ) ≤ e−κ log(n)h(K ′ /2κ) .
P(U ±
Take K ′ so that κh(K ′ /2κ) > 2. The right-hand side of the above is then no larger than n−2 .
Thus properties (10) clearly hold for t ≤ T . We now establish that they hold with sufficiently
large probability for larger t.
Conditional on FT , the binomial distribution of U ±
T +1 has mean
T (1 − b/n)U ∓
<T +1 ] × [1 − (1 − a/n)U ±
[n± − U ±
T ].
Using the inequalities (39) we obtain that this mean lies in the interval
[(a ∧ b)
1
3
K log(n), (a ∨ b)K ′ log(n)].
14
For a given ǫ > 0, we can choose K sufficiently large so that
(a ∧ b)
It follows that U ±
T +1 admits a relative deviation from its conditional mean by ǫ with probability at
most n−2 .
We now define
K h(1 + ǫ) > 2.
1
3
ǫt = ǫα−(t−T )/2 ,
t−1+bU ∓
aU ±
and consider the events At := {U ±
t−1
}. Conditionally on AT , . . . , At , the
t ∈ [1 − ǫt , 1 + ǫt ]
2
t , U −
vector Ut = (U +
t ) verifies the announced inequality (40). Given that α is the spectral radius
of M , it follows from this condition that U ±
t ≥ (1 − O(ǫ))αt−T K ′′ log(n). We then check that
Chernoff ’s bound applies to show that the condition holds at step t with high enough probability.
It suffices to ensure that
h(ǫt ) ≥ 2 log(n),
U ±
t
where we take h(u) := min[(1 + u) log(1 + u) − u, (1 − u) log(1 − u) + u). However as we just saw
the left-hand side of this expression is lower-bounded by
(1 − O(ǫ))αt−T K ′′ log(n)h(ǫt ) ≥ (1 − O(ǫ))αt−T K ′′ log(n)K ′′′ ǫ2
t ,
where we took a second-order expansion of h around 0. The condition is therefore met as soon as
(1 − O(ǫ))K ′′K ′′′ ǫ2 ≥ 2. For K large enough this holds.
Proof. (of Theorem 2.3). For t ≤ ℓ, if t ≤ T , we necessarily have that St , Dt = O(log n). Consider
then t > T . Note that matrix M is such that
2 (cid:18) αk + β k αk − β k
αk − β k αk + β k (cid:19) ·
1
Using (40), we readily have for t, t′ ≤ T , with t > t′ :
s=t′+1 (1 + ǫs )(1, 1)M t−t′
St ≤ Qt
s=t′+1 (1 + ǫs )αt−t′
= Qt
St′ .
A similar lower bound holds with −ǫs in place of +ǫs . Setting t′ = T in the upper bound, since
ST = O(log(n), the upper bound (10) follows for St , as Qt
s=T +1(1 + ǫs ) = O(1).
Note now that
max t
t
(1 − ǫs)! = O(ǫt′ ) = O(α−t′ /2 ).
Ys=t′+1
Ys=t′+1
(1 + ǫs) − 1, 1 −
It readily follows that (11) holds for St .
Consider now Dt . Using (40) again, we have
M k =
Ut′
Iterating, we obtain
Dt−1 − αǫtSt ≤ Dt ≤ βDt−1 + αǫtSt .
Dt − β t−t′
Dt′ ≤
t
Xs=t′+1
15
αβ t−s ǫsSs .
(41)
Since Ss = O(log(n)αs−T ), DT = O(log(N ) and ǫs = O(α−(s−T )/2 ), we obtain for t′ = T :
t
Xs=T +1
Dt = O(log(n)β t +
where we have used the assumption that β 2 > α to bound Pu>0 β−uαu/2 . Property (10) thus holds
for Dt .
Finally, the right-hand side of (41) is of order
t
Xs=t′+1
Thus setting t = ℓ, for ℓ > t′ ≥ T we have
Dt′ = β t′−ℓDℓ + O(log(n)αt′ /2 ).
β t−sα(s−T )/2 log(n) = O(log(n)β t−t′
β t−s log(n)α(s−T )/2 ) = O(log(n)β t ),
αt′ /2 ).
Since for t′ < T we readily have Dt′ = O(log(n) by definition of T , property (11) follows for Dt .
D Proof of Lemma 4.2
Proof. There are two ways for creating cycles within the distance k-neighborhood of i: an edge
may be present between two nodes at distance k − 1 of i, or two nodes at distance k − 1 may be
connected to the same node at distance k of i. The number of edges of the first type is stochastically
dominated by Bin(S 2
k−1 , a ∨ b/n). Its expected number conditionally on Ωk−1(i), defined as
Ωk−1 (i) = {Sk−1 (i) ≤ C (log n)αk−1}
is at most O(log2 (n)α2ℓ /n). Thus by the union bound the probability that there is such an edge in
the ℓ-neighborhood of i is at most:
ℓ × O(log2 (n)α2ℓ /n) +
(1 − P(Ωk (i))) = O(log3 (n)α2ℓ /n).
ℓ
Xk=1
As for the second type of cycles, its number is stochastically dominated by
Bin(n, (a ∨ b/n)2S 2
k−1 ).
On Ωk−1(i) its conditional expectation is O(log2 (n)α2ℓ ).
By the same argument, the probability that there are two cycle-edges within the ℓ-neighborhood
of i is upper-bounded by O(log6 (n)α4ℓ /n2 ). By the union bound we readily have that with high
probability no node has two cycle-edges within its ℓ-neighborhood as soon as log6 (n)α4ℓ ≪ n, which
holds for ℓ = c log(n) with c log(α) < 1/4.
Let Zi denote the event that the ℓ-neighborhood of i contains a cycle. On the event
∩i∈N ∩k≤ℓ Ωk (i),
the ℓ-neighborhoods of an arbitrary pair of distinct nodes i, j are disjoint with probability 1 −
O(log2 (n)α2ℓ /n), conditionally upon which the probability that they both have a cycle in their
16
neighborhood is upper-bounded by O(log6 (n)α4ℓ /n2 ). Conditionally on the event that their neigh-
borhoods meet, the expectation of the product ZiZj is still upper-bounded by O(log3 (n)α2ℓ /n).
Eventually Markov’s inequality yields
E(Pi Zi )2
P(Pi Zi ≥ m log3 (n)α2ℓ ) ≤
m2 log6 (n)α4ℓ
≤ nE(Z1 )+n2E(Z1Z2 )
m2 log6 (n)α4ℓ
≤ O(log3 (n)α2ℓ )+n2 [O(log6 (n)α4ℓ /n2 )+(log2 (n)α2ℓ /n)(log3 (n)α2ℓ /n)
m2 log6 (n)α4ℓ
= O( 1
m2 ).
Taking m = log(n) (say), then with high probability Pi Zi = O(log4 (n)α2ℓ ).
E Proof of Lemma 4.3
Consider first those indices i /∈ B whose ℓ-neighborhood is a tree. For any k and any m ≤ ℓ, B (m)
ik
can take values only 0 or 1 (there is at most one simple path connecting i to k), and B (m)
ik = 1 if
and only if dG (i, k) = m. For such i, one therefore has the following identities:
i /∈ B ⇒ (cid:26) (B (m) e)i = Si (m),
(B (m)σ)i = Di (m),
Relations (22) readily follows from Theorem 2.3. Let us now consider an index i ∈ B whose ℓ-
neighborhood is not a tree. We know from Lemma 4.2 that such nodes have in their ℓ-neighborhood
only one cycle. Clearly only nodes at distance at most ℓ of i can be counted in (B (ℓ) e)i , and they can
be counted at most twice because the neighborhood contains only one cycle. Control (23) readily
follows.
(42)
F Proof of Corollary 4.1
Proof. Let B denote the set of nodes i such that their ℓ-neighborhood contains a cycle. Let x be a
normed vector such that x′B (ℓ)e = 0. We then have
e′B (m−1) x = Pi∈N xi (B (m−1) e)i
≤ Pi∈B xi (B (m−1) e)i
+ Pi∈B xiαm−1−ℓ (B (ℓ) e)i
+ Pi∈N xi [αm−1−ℓ (B (ℓ) e)i + O(log(n) + plog(n)αm−1 ).
Using the bound (23) for i ∈ B , we can bound the first summation, using Cauchy-Schwarz’s in-
equality by
Pi∈B xi [(B (m−1) e)i ≤ O(log(n)αm−1 )pB
≤ O(log3 (n)αℓ+m−1 ),
where we have used the bound on the size of B derived in Lemma 4.2. The second summation
in(43) is similarly bounded. As for the third summation, using the fact that e′B (ℓ)x = 0, it is
upper-bounded by
Xi∈N
xiO(log(n) + plog(n)αm−1 ).
17
(43)
By Cauchy-Schwarz again, this is no larger than
O (cid:16)√n(log(n) + plog(n)αm−1 )(cid:17) .
The announced bound (24) on e′B (m−1) x follows. Similarly, the bound (25) on σ ′B (m−1)x follows
by using property σ ′B (ℓ)x = 0 instead of property e′B (ℓ)x = 0.
G Proof of Lemma 4.6
Proof. We assume that σi = +, the case σ = − being similar. Introduce the events
Ωk = {Sk ≤ C log(n)αk }, k ≥ 1,
where constant C is as in Theorem 2.3. As established in the proof of Theorem 2.3, the probability
of each Ωk is 1 − o(n−2 ).
k , U −
Let us evaluate, conditionally on Fk−1 and on Ωk−1 the variation distance between (U +
k )
and a pair of (conditionally on Fk−1 ) independent random variables with respective distributions
k ∼ Poi aU −
k−1 + bU −
! .
! , W −
k ∼ Poi aU +
k−1 + bU +
k−1
k−1
W +
2
2
The Stein-Chen method enables to bound the variation distance between a Bin(n, λ/n) and a Poi(λ)
random variables by n min(1, λ−1 )(λ/n)2 ≤ λ/n. Furthermore, two Poisson random variables with
respective parameters λ, λ′ have variation distance at most λ − λ′ . This entails the bounds
k ) ≤ h1 − (1 − a/n)U +
k−1 (1 − b/n)U −
k−1 i
k , W +
dvar (U +
(cid:12)(cid:12)(cid:12)(cid:12)
+ (cid:12)(cid:12)(cid:12)(cid:12)
≤k−1 )[1 − (1 − a/n)U +
k−1 (1 − b/n)U −
(n+ − U +
k−1 ] −
We now use (39) to obtain
dvar (U +
k , W +
k ) ≤
aU +
k−1+bU −
k−1
2
aU +
k−1+bU −
k−1
n
≤k−1 − n/2[1 − (1 − a/n)U +
k−1 (1 − b/n)U −
+n+ − U +
k−1 ]
k−1 + bU −
4n (aU +
+ 1
k−1 )2 .
(44)
.
Let us now specify constant c such that c log(α) < 1/2, i.e. there is ǫ > 0 such that c log(α) ≤ 1/2−ǫ.
For k ≤ ℓ = c log(n), on Ωk−1 , it holds that Sk−1 ≤ C log(n)n1/2−ǫ . This, together with the bound
n/2 − n+ ≤ O(log(n)n1/2 ) ensures the upper bound
k ) ≤ O(log(n)n−ǫ).
dvar (U +
k , W +
k , W −
The same bound is readily established for the variation distance dvar (U −
k ). These bounds
readily establish by induction that the variation distance between the two sequences (U ±
k )k≤ℓ and
(V ±
k )k≤ℓ are upper-bounded by O(log2 (n)n−ǫ), establishing the Lemma.
18
H Proof of Lemma 4.7
Proof. Write
2 V ±
2 V ∓
E(V ±
t + b
t+1 Gt ) = a
t
αtMt±β t∆t
αtMt∓β t∆t
+ b
= a
2
2
2
2
= αt+1Mt ± β t+1∆t .
It readily follows that both processes {Mt }, {∆t } are martingales. To establish uniform integrability
we shall show that both processes have uniformly bounded variance. To that end we use the
conditional variance formula
Var(X ) = Var(E(X F )) + E(Var(X F )),
and the fact that the variance of a Poisson random variable equals its mean. Thus
Gt−1 ) = Var(V ±
t
This yields by the conditional variance formula
E(V ±
t
Gt−1 ) =
aV ±
t−1 + bV ∓
t−1
2
.
Var(Mt ) = Var(Mt−1 ) + E(α−tMt−1 )
= Var(Mt−1 ) + α−t .
Since Var(M0 ) = 0, it follows by induction that
1 − α−t
α − 1
The latter is uniformly bounded for α > 1 hence the uniform integrability of {Mt } under this
condition.
Write now
Var(Mt ) =
, t > 0.
t − V −
Var(∆t ) = Var(∆t−1 ) + E(β−2tVar(V +
t
= Var(∆t−1 ) + E(β−2tαtMt−1 )
= Var(∆t−1 ) + β−2tαt .
Gt−1 ))
It thus follows by Var(∆0 ) = 0 and induction that
1 − (α/β 2 )t
β 2/α − 1
thus establishing uniform integrability of martingale {∆t }.
Var(∆t ) =
, t > 0,
I Proof of Corollary 4.2
Proof. Convergence almost surely and in L1 is guaranteed under uniform integrability by the martin-
gale convergence theorem ( [9]). Finiteness of the limiting variable’s variance under uniform bounds
on the variance is also standard; it follows from Fatou’s lemma. Convergence of the variances is
established as follows. The limiting variable satisfies a distributional equation given by
Poi(a/2)
i
∆ = β−1
X1
∆′
Poi(b/2)
Xi=1
∆i −
(45)
19
where the ∆i , ∆′
i are i.i.d. and distributed as ∆. The only solution for the variance of ∆, apart
from the degenerate solution 0, is then readily seen to be 1/(β 2 /α − 1), which is indeed the limit
t to ∆2
of the variance of ∆t . The L1 -convergence of ∆2
∞ is then a direct consequence of Scheffé’s
lemma.
J Proof of Theorem 4.2
Write
Proof. Note that with probability of order 1−O(n−ǫ ) for fixed positive ǫ, σ(i)β−ℓDℓ (i) coincides with
∆ℓ by the coupling lemma 4.6. When this coupling fails, by the bounds established in Theorem 2.3,
it holds that β−ℓDℓ (i) is O(log(n)). This entails that the left-hand side of (31) verifies
ℓ (i)! = O(log2 (n))n−ǫ + E(∆2
E 1
β−2ℓD2
ℓ
n
n
Xi=1
ℓ − ∆2
∞ + E(∆2
∞ ≤ E∆2
1coupling ) − E(∆2
E(∆2
∞
ℓ
By Corollary 4.2, we have that the first term in the right-hand side goes to with ℓ; the second
term goes to zero with the probability that coupling fails (e.g. using Hardy-Littlewood-Polya’s
rearrangement inequalities). Thus the expectation converges to E∆2
∞ .
Let us now consider the second moment of the empirical sum:
ℓ !2
E 1
β−2ℓD2
n
We break it into two terms, the first being
1no coupling ).
n
Xi=1
1coupling ).
.
E
1
n2
β−4ℓD4
ℓ (i).
n
Xi=1
Using Lemma 4.6 and Theorem 2.3, using similar arguments as before we can bound this term by
1
O(log2 (n)) (cid:2)E(∆2
∞) + o(1)(cid:3)
n
which clearly goes to zero as n → ∞.
The second term is given by
β−4ℓE(D2
ℓ (i)D2
ℓ (j )).
2
n2 Xi<j
ℓ (i)D2
For given i < j , using Lemma 4.1 and Theorem 2.3, we bound the product D2
ℓ (j ) by
O(log4 (n)β 4ℓ on the event that the coupling with independent copies fails, and by E(D2
ℓ (i))E(D2
ℓ (j ))
on the event that it succeeds. We then bound each of the individual terms in this product as in the
control of the expectation done in the first half of the proof, thus obtaining the upper bound for
the second moment:
o(1) +
2
n2 Xi<j (cid:2)O(n−2ǫ log4 (n)) + (E(∆2
∞ ))2 + o(1)(cid:3) .
20
It readily follows that
lim
n→∞
n
E " 1
Xi=1
n
The convergence in probability (31) follows.
We now turn to establishing (32). We shall only consider the case of sign +, the other being han-
dled similarly. Fix some arbitrarily small δ > 0. Because τ is a continuity point of the distribution
of ∆∞ , we can find two bounded Lipschitz-continuous functions f , g such that
∞)#2
β−2ℓD2
ℓ − E(∆2
= 0.
f (u) ≤ 1u≥τ ≤ g(u), u ∈ R
(46)
and
Consider then the empirical sum
0 ≤ E(g(∆∞ ) − f (∆∞)) ≤ δ.
1
n Xi∈n+
yi =
,
Writing
by at most
f (yipnE(∆2
∞)).
β−ℓDℓ (i)
qPn
j=1 β−2ℓD2
ℓ (j )
we have that this empirical sum differs from the simpler one
1
n Xi∈n+
f (β−ℓDℓ (i))
β−ℓ Dℓ (i) × (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
A (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
1 − r E(∆2
1
∞ )
n Xi∈n+
where K is the Lipschitz continuity constant of function f and A is the empirical sum in (31). This
correction tends to zero in probability by dominated convergence. Indeed, convergence to zero of
1−pE(∆2
∞ )/A has just been established. By similar arguments as before based on Theorem 2.3 and
Lemmas 4.6 and 4.1), the empirical average of the β−ℓDℓ (i) is bounded. Convergence in probability
of (46) to (1/2)E(f (∆∞ )) is then established by evaluating the first and second moments of this
sum as previously done.
The same argument can be applied to g , eventually leading to the convergence in probability
1
n Xi∈n+
g(yipnE(∆2
∞)) =
E(g(∆∞ )).
lim
n→∞
K
,
1
2
It readily follows that
n→∞ (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
1
n Xi∈n+
lim sup
As δ is arbitrary, this establishes (32).
yi≥τ /√nE(∆2
∞ ) −
1
1
2
P(∆∞ ≥ τ )(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
≤ δ.
21
Pick again an arbitrary δ > 0, two pairs of Lipschitz-continuous functions f± and g± such that
and
f± (u) ≤ 1±u≥t ≤ g± (u),
0 ≤ E(g± (±∆∞ )) − E(f±(±∆∞ )) ≤ δ.
The empirical overlap (36) reads
n
1
(cid:16)2 · 1
∞ )≥t − 1(cid:17) .
xi√nE(∆2
− Xi∈n−
Xi∈n+
The difference (n+ − n− )/n is of order 1/√n and thus vanishes. We upper-bound the remaining
terms by
∞))
n
2
∞)) − Xi∈n−
Xi∈n+
f− (xi (−pnE(∆2
g+ (xipnE(∆2
Letting K denote the Lipschitz-continuity constant for both g+ and f− , this last display differs from
f−(−β−ℓDℓ (i))
n
2
g+ (β−ℓDℓ (i)) − Xi∈n−
Xi∈n+
n
+ β−ℓ Dℓ (i) × (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
A (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
1 − r E(∆2
∞)
∞)(cid:12)(cid:12)(cid:12)
Xi=1 (cid:12)(cid:12)(cid:12)
(xi − yi )pnE(∆2
Because of the assumed convergence in probability limn→∞ x − y = 0, the first error term neces-
sarily tends to zero in probability by Cauchy-Schwarz inequality. The second term is dealt with as
mentioned in the proof of the previous lemma. Finally, using the coupling lemmas 4.6 and 4.1, by
evaluating the first and second moments of (47), we obtain the convergence in probability
f−(−β−ℓDℓ (i))
n
2
g+ (β−ℓDℓ (i)) − Xi∈n−
Xi∈n+
= E(g+ (∆∞ ) − f−(∆∞ )).
The latter term is then an upper bound on the lim sup of the empirical overlap. By the same
approach, we obtain a lower bound of
by at most
2K
n
lim
n→∞
(47)
.
(48)
E(f+(∆∞ ) − g− (∆∞ ))
on the lim inf of the overlap. These upper and lower bounds differ by at most 2δ , and differ from
P(∆∞ ≥ t) − P(∆∞ ≤ −t) by at most δ . Since δ is arbitrary, this establishes the announced
convergence in probability of the empirical overlap to quantity x where
x = P(∆∞ ≥ t) − P(∆∞ ≤ −t)
is strictly positive by our choice of t.
22
K Proof of Lemma 4.4
Proof. The first and second evaluations follow by noting that the vectors whose difference is con-
sidered in the left-hand side agree on the set of entries i whose ℓ-neighborhood is cycle-free. Thus
B (ℓ)e − {Sℓ (i)} ≤ pB O(log(n)αℓ )
≤ O(log3 (n)α2ℓ ),
and the same bound holds for B (ℓ)σ − {Dℓ (i)}. This upper bound is o(√nβ ℓ ) so that the first two
assertions follow, by further noticing that {Dℓ (i)} = Θ(β ℓ ), as follows from combining Theorem 2.3
with Lemmas 4.6 and 4.1 as in the proof of Theorem 4.2.
For the third assertion, consider the scalar product < {Sℓ (i)}, {Dℓ (i)} >. Using the same
arguments as in the proof of Theorem 4.2 we obtain that this scalar product is indeed o({Sℓ (i)} ×
{Dℓ (i)}.
L Proof of Lemma 4.5
Proof. To establish the lower bound of (27), note that by Cauchy-Schwarz,
< e, B (ℓ)B (ℓ)e >≤ e × B (ℓ)B (ℓ)e.
However the left-hand side reads B (ℓ)e2 . Thus
B (ℓ)B (ℓ)e ≥ B (ℓ) e2
·
e
However it holds that B (ℓ) e = Θ(√nαℓ ) (this follows from the methods in the proof of Theo-
rem 4.2). Since e = √n, the lower bound in (27) follows. For the upper bound, we note that by
Lemma 4.3 and Theorem 2.3, the max row sum for matrix B (ℓ) is of order O(log(n)αℓ ).
The lower bound in (28) is established similarly, from the inequality
< σ, B (ℓ)B (ℓ)σ >≤ σ × B (ℓ)B (ℓ)σ
The upper bound requires additional arguments. Assuming the 2ℓ-neighborhood of i is cycle-free,
the i-th entry of vector B (ℓ)B (ℓ)σ can be written as
σj {k : dG (i, k) = dG (j, k) = ℓ}.
ℓ
Xd=0 Xj :dG (i,j )=2d
We control the magnitude of this quantity in the tree model; using coupling we will then transpose
the corresponding estimates to the original scenario.
Let then T denote a branching process with offspring Poi(α). The process of spins is then
constructed by sampling uniformly the root’s spin, and then propagating spins in a Markovian
fashion with transition matrix (a/(a + b)b(a + b), b(a + b), a(a + b)) that is α−1M . Its eigenvalues
are thus (1, β /α).
The variable of interest is written
ℓ
Xd=0 Xj :d(j,i)=2d
X =
σj {k : d(j, k) = d(i, k) = ℓ}.
23
We evaluate its second moment conditionally on T by writing X 2 as
X 2 = Pℓ
d=0 Pℓ
d′=0 Pj ′ :d(j ′ ,i)=2d′ Pj :d(j,i)=2d σj σj ′ ×
×{k : d(j, k) = d(i, k) = ℓ} · {k ′ : d(j ′ , k ′ ) = d(i, k ′ ) = ℓ}.
Now it holds that
α (cid:19)d(j,j ′ )! .
E(σj σj ′ T ) = O (cid:18) β
We will use this formula, and further distinguish nodes j ′ according to their distance 2(d + d′ − τ )
for τ = 0, . . . , 2(d ∧ d′ ). This yields
α (cid:17)2(d+d′−τ )(cid:19) ×
τ =0 Pj ′ :d(j ′ ,i)=2d′ Pj :d(j,i)=2d O((cid:18)(cid:16) β
d,d′=0 P2(d∧d′ )
E(X 2 T ) = Pℓ
×{k : d(j, k) = d(i, k) = ℓ} · {k ′ : d(j ′ , k ′ ) = d(i, k ′ ) = ℓ}.
Note now that with high probability, we have the following evaluations
= O(αℓ−d ),
{k : d(j, k) = d(i, k) = ℓ}
= O(αℓ−d′
{k ′ : d(j ′ , k ′ ) = d(i, k ′ ) = ℓ}
),
= O(α2d ),
{j : d(j, i) = 2d}
{j ′ : d(j ′ , i) = 2d′&d(j, j ′ ) = 2(d + d′ − τ )} = O(α2d′ −τ ).
Plugging these in, we have
d,d′=0 P2(d∧d′ )
E(X 2 T ) = Pℓ
τ =0
d,d′=0 P2(d∧d′ )
= Pℓ
τ =0
= O(α2ℓ (β 2 /α)2ℓ )
= O(β 4ℓ ).
α (cid:17)2(d+d′ −τ )(cid:19) α2ℓ−d−d′+2(d+d′ )−τ
O (cid:18)(cid:16) β
α )d+d′−τ (cid:17)
O (cid:16)α2ℓ ( β 2
By coupling (techniques of Theorem 4.2 involving Tchebitchev inequality, based on the bounds of
Theorem 2.3 and Lemmas 4.6 and 4.1) we thus have that with high probability,
B (ℓ)B (ℓ)σ = O(pnβ 4ℓ ) = O(β ℓ B (ℓ)σ )
as announced.
24
|
1910.10763 | 1 | 1910 | 2019-10-23T18:40:18 | Representation Learning in Heterogeneous Professional Social Networks with Ambiguous Social Connections | [
"cs.SI"
] | Network representations have been shown to improve performance within a variety of tasks, including classification, clustering, and link prediction. However, most models either focus on moderate-sized, homogeneous networks or require a significant amount of auxiliary input to be provided by the user. Moreover, few works have studied network representations in real-world heterogeneous social networks with ambiguous social connections and are often incomplete. In the present work, we investigate the problem of learning low-dimensional node representations in heterogeneous professional social networks (HPSNs), which are incomplete and have ambiguous social connections. We present a general heterogeneous network representation learning model called Star2Vec that learns entity and person embeddings jointly using a social connection strength-aware biased random walk combined with a node-structure expansion function. Experiments on LinkedIn's Economic Graph and publicly available snapshots of Facebook's network show that Star2Vec outperforms existing methods on members' industry and social circle classification, skill and title clustering, and member-entity link predictions. We also conducted large-scale case studies to demonstrate practical applications of the Star2Vec embeddings trained on LinkedIn's Economic Graph such as next career move, alternative career suggestions, and general entity similarity searches. | cs.SI | cs | Representation Learning in Heterogeneous
Professional Social Networks with Ambiguous
Social Connections
Baoxu Shi
LinkedIn
Jaewon Yang
Tim Weninger
LinkedIn
University of Notre Dame
Jing How
Pinterest
Qi He
LinkedIn
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
9
1
0
2
t
c
O
3
2
]
I
S
.
s
c
[
1
v
3
6
7
0
1
.
0
1
9
1
:
v
i
X
r
a
Abstract -- Network representations have been shown to im-
prove performance within a variety of tasks, including classi-
fication, clustering, and link prediction. However, most models
either focus on moderate-sized, homogeneous networks or require
a significant amount of auxiliary input to be provided by the
user. Moreover, few works have studied network representations
in real-world heterogeneous social networks with ambiguous
social connections and are often incomplete. In the present
work, we investigate the problem of learning low-dimensional
node representations in heterogeneous professional social net-
works (HPSNs), which are incomplete and have ambiguous
social connections. We present a general heterogeneous network
representation learning model called Star2Vec that learns entity
and person embeddings jointly using a social connection strength-
aware biased random walk combined with a node-structure
expansion function. Experiments on LinkedIn's Economic Graph
and publicly available snapshots of Facebook's network show that
Star2Vec outperforms existing methods on members' industry
and social circle classification, skill and title clustering, and
member-entity link predictions. We also conducted large-scale
case studies to demonstrate practical applications of the Star2Vec
embeddings trained on LinkedIn's Economic Graph such as next
career move, alternative career suggestions, and general entity
similarity searches.
Index Terms -- Network representation, Heterogeneous profes-
sional social networks
I. INTRODUCTION
Many important tasks in network analysis, for example
node classification [1], community detection [2], recommen-
dation [3], and link prediction [4], rely primarily on the
discovery and modelling of patterns hidden among the nodes
and edges in a network. To that end, recent advances in
network-based Representation Learning (RL) have shown the
ability to capture these patterns within a vector-embedding of
the network's nodes. These embeddings can then be used for
a variety of network analysis tasks.
In order to learn good network embeddings on very large
heterogeneous professional social networks (HPSNs) such as
LinkedIn's Economic Graph and power entity recommendation
or entity retrieval based products, an HPSN representation
learning model needs to:
• utilize the rich type information in HPSNs,
• learn both person and entity representations in the same
semantic space,
sklearn
LinkedIn
Representation
Learning
ML Engineer
Alice
Bob
Deep Learning
Recruiter
Onboarding
Carol
Eve
Dan
Sr. ML Engineer
Microsoft
Google
Legend:
Member
Skill
Title
Company
Fig. 1. Example professional social network represented as a heterogeneous
information network.
• handle ambiguous and unobserved social connections in
HPSNs,
• handle networks with hundreds-of-millions of nodes and
billions of edges.
Unfortunately, few systems have addressed all four require-
ments. Most existing methods in this area focus on homoge-
neous (i.e., untyped) networks [5] -- [7], which assumes that all
nodes share a single node type. Although these shallow models
have fewer parameters and can run on very large networks,
they ignore heterogeneity found in many networks. Recently
there has been some work to extend homogeneous network
models through the use of auxiliary features like node attribute
or content [8] -- [11]. However, using supplemental features
explodes the parameter space and is prone to overfitting.
Although these augmented models achieve promising results
on homogeneous networks, real-world social networks, such
as LinkedIn and Facebook, are often heterogeneous networks
with multiple node types like person, school, company, in-
terest, and many others. Therefore, one major challenge with
learning representations in heterogeneous social networks is
to find proper ways to leverage their rich type information.
Metapath2vec [12] introduced a metapath-based method that
learns node-embeddings from heterogeneous networks; but
this approach is limited by human-curated metapaths, which
requires domain-specific knowledge and can be difficult to
generate on heterogeneous social networks with complex
semantics or a large number of node types. On the other hand,
researchers have also tried to model heterogeneous social
networks as attributed graphs where persons are the nodes
in the network and all other non-person entities are treated as
attributes. These methods such as SNE [13] and LANE [8]
treat attribute entities as input features instead of nodes and
cannot learn entity and person embeddings jointly.
Besides utilizing rich type information and learning both en-
tity and person embeddings, an HPSN representation learning
model also needs to handle both unobserved and observed but
ambiguous social connections that exist in professional het-
erogeneous social networks. The majority of social networks
are incomplete and do not contain all the social connections
people have in the real world. Moreover, the social connections
captured in social networks are often ambiguous. In real-world
scenarios, relationships often take many forms; for example,
a person-to-person social connection in an HPSNs could
represent spouse, coworker, acquaintance, etc [14]. However,
most networks do not distinguish among these relationships
and often use a single semantically ambiguous relationship
connectedTo or a few coarse relationships, e.g., friend and
follow, to represent them all [4].
Social networks usually model social connections with a
limited number of ambiguous relationship types because it
is often unfeasible to automatically or even manually dis-
ambiguate these relationships, not only because such a task
is costly but also because the relationship's granularity and
interpretation are subjective. Throughout the present work we
will reference a simplified example network from LinkedIn
illustrated in Fig. 1 to aid in our discussion. In Fig. 1, the
social connection between Alice and Carol can be either
candidate-recruiter relationship or college friends. Alice and
Bob, on the other hand, can be either close coworkers or
acquaintances who work at the same company. Moreover, the
social connection between people are transient and evolves
over time, which makes it even harder to disambiguate social
connections. Again take Fig. 1 as an example, Carol and Eve
might be coworkers at some point and later becomes recruiter-
candidate relationship after Eve moves to LinkedIn. Ideally,
an HPSN representation learning model ought to be able to
infer unobserved social connections and distinguish between
different ambiguous social connection types and their social
strengths. Unfortunately, most existing network embedding
models ignore the network incompleteness and the edge het-
erogeneity, and simply assume social networks are complete
and all existing social connections are the same [7]. As a result,
those models will not handle persons with limited number of
social connections well and learn similar representations for
nodes with common social connections regardless the actual
social relationship types and connection strength.
In addition to direct connections, ambiguous social connec-
tions also affect higher-order proximity which is also used to
measure node similarity in representation learning models [6].
An implicit assumption used in these models is that indirect
(i.e., second- or third-order) connections between two nodes
are reliable, but this assumption does not apply when there are
ambiguous social connections with different social strengths.
In fact, because direct social connections do not always
represent the same degree of similarity, the error will cascade
and cause further problems when using higher-order proximity.
Consider again Fig. 1, wherein second-order proximity models
that count common neighbors of, say, Alice and Carol will
be misled by Eve and Bob to believe that Alice and Carol
have similar characteristics.
The presence of ambiguous social connections affects most
network representation models. Higher-order proximity mod-
els [6], [15], [16] overlook this issue and implicitly assume
that network connections are always reliable in all scenarios.
This problem also has a more severe impact on all random
walk-based models [17] because these models optimize node
representations based on a false assumption that nodes con-
nected within k-steps are similar. In response, more recent
network models [8], [18] include text and labels as additional
signals. Although they show promising results by adding more
parameters, they do not get to the root of the ambiguous social
connection problems discussed above.
In the present work, we develop a fast and scalable HPSN
representation learning model called Star2Vec that requires
little human supervision, contains no auxiliary features, and
can run on very large real-world networks.To address the
problems raised above, Star2Vec has the ability to 1) automati-
cally weight social connections and leverage unobserved social
connections based on heterogeneous second-order proximity,
and 2) learn person and non-person entity embeddings jointly
with a node structure expansion mechanism. In summary we
make the following contributions:
• We describe Star2Vec, a scalable model that learns person
and entity representations on very large heterogeneous pro-
fessional social networks,
• We introduce a social connection strength-aware random
walk model to overcome social connection ambiguity and
leverage unobserved social connections without increasing
the number of model parameters,
• We introduce a node-structure expansion model to expand
person node into person-entity structures and learn person
and non-person entity embeddings in the same space,
• We perform extensive experiments on LinkedIn's Economic
Graph and show the effectiveness of the learned HPSN
representations in a variety of tasks,
• We demonstrate that Star2Vec can be applied to other
heterogeneous social networks by evaluating Star2Vec on
available portions of Facebook.
The following of the work is organized as follows. We
first give formal definitions of the network representation
learning task on HPSNs in Sec. II. Section III gives a detailed
description of the proposed Star2Vec model. Then we present
our evaluation results on LinkedIn and Facebook datasets in
Sec. IV, followed by a discussion of related works in Sec. V.
II. PROBLEM DEFINITION
In this work, we define a heterogeneous professional social
network (HPSN) as a network where both nodes and edges
are labeled [19]. The formal definition of HPSN is as follows
a less important role compared to other social connections.
Definition 1. A Heterogeneous Professional Social Network
is a graph G = (V, E, T, R) in which V, E, T, R are nodes,
edges, node types, and edge types respectively. person ∈
T and R = Rppl ∪ Rent, where Rppl are person-to-person
edge types and Rent are person-to-entity edge types. T ≥ 2,
Rppl ≥ 1, and Rent ≥ 1. Each node u is associated with
a type mapping function φ(·) defined as φ(u) = Tu, Tu ∈
T. Similarly, each edge e = u → v is associated with a
relationship type mapping function ψ(e) = r, r ∈ R.
Definition 1 defines an HPSN as a social network having
more than one type of node and more than one type of edge.
The main difference between an HPSN and other definitions
of heterogeneous social networks is that instead of modeling
casual social connections, an HPSN focuses on professional
entities and emphasizes professional social relationships. For
example, LinkedIn's HPSN, call the Economic Graph, contains
person-nodes as well as entities such as skills, titles, schools,
degrees, companies, jobs, and many other professional entities.
As for edge types, besides the main person-to-person social
connections, there also exist professional connections such as
person-worksAt-company, person-knows-skill, etc.
Next, we define the path-based network representation
learning task on HPSNs to contain two sub-tasks: path gener-
ation and path-based network representation learning.
Definition 2. Given an HPSN G, Path Generation constructs
a collection of paths P = {u0 ul} as the input to the
network representation learner, where u0 ul denotes some
length-l path. The path generation process extends a length-
i path u0 ui to a length-(i + 1) path u0 ui → ui+1
based on a biased random walk transition scoring function
P(ui, ui+1, G), which determines the probability of walking
from ui
to the social
connection strength between ui and ui+1.
to ui+1 on graph G with respect
Definition 3. Given a collection of paths P and an HPSN
G, Path-based Network Representation Learning learns a
W ∈ RV×d node embedding matrix in which d ≪ V
that minimizes some loss function L(·) using path set P′ =
{F (p, G)p ∈ P} s.t. F (·) is some optional post-processing
function.
Recall the primary challenge in learning embeddings on HP-
SNs is generating meaningful paths that carry reliable semantic
meaning [12]. However, in most real-world social networks,
generating such paths becomes more challenging due to the
connection ambiguity of its social connections. As we state
before, heterogeneous social networks like LinkedIn and Face-
book primarily use a coarse person-to-person relationship type
to denote a variety of social connection types including but not
limited to coworkers, friends, acquaintance, and many others.
When learning person and entity representations on those
networks, a model should be able to properly weight such
ambiguous person-to-person social connections so that the
ones carry less relevance signals, i.e., social strength, will play
Therefore, the main focus here is how to design a biased
transition function P(·) that properly weights ambiguous so-
cial connections in HPSN. So we design the corresponding
post-processing function F (·) to generate high quality paths,
and the loss function L(·) to train the person and non-person
entity representations accordingly.
III. STAR2VEC
In this section, we present Star2Vec and its details in
three parts: (A) its social connection strength-aware, random
walk-based path generation method, (B) its node-structure
expansion-based path augmentation, and (C) its star-structure-
based person and entity representation learning method.
A. Social Connection Strength-aware Biased Random Walk
Models that operate on heterogeneous networks typically
enumerate constrained network paths so that the nodes on the
path conform to a sequence of types [20]. The path constraints
are typically called metapaths, and they are hand-curated by a
human designer. Specific metapaths are meaningful for specific
tasks; a typical example found in the related literature [21] sug-
gests that the path author→paper←author, which represents
co-authorship in a bibliographical heterogeneous network, is
important to identify communities of researchers. However,
it is not always clear which metapaths are meaningful for
heterogeneous professional social networks with many node
types, and human curators may miss important information or
introduce bias into the model. Moreover, the social connection
ambiguity nature of HPSNs and many social networks makes
manually composing reliable metapath even harder. In fact our
results in Sec. IV show that on networks with ambiguous social
connections, such as LinkedIn and Facebook, representations
learned from "intuitive" metapaths are even worse than the
ones learned from homogeneous models.
As we discussed above, social connections in HPSNs are
oftentimes ambiguous and have different connection strengths,
which makes it almost impossible to design reliable metapaths
for representation learning. To better model such ambiguous
social connections in HPSNs and general social networks, one
natural approach is to label each social connection with its true
relationship type. However, this labelling task is problematic
for two reasons. First, without sufficient signals beyond the
connection itself, the interpretation of a social connection can
be subjective. Second, the social connection between people
evolves over time.
Luckily, if an HPSN model can treat each social connection
differently based on its connection strength, then we no longer
need to disambiguate each person-to-person edge manually.
Moreover, by modeling the connection strength between two
persons, the model can even discover and leverage unobserved
social connections. Recall that the result of ambiguous social
connections is that different person-to-person edges with dif-
ferent social strengths are grouped into the same edge type
and treated equally. If we can properly model the connection
strength based on the network context, then we can weight
Traditional path-based skip gram model:
Alice
Eve
Carol
Onboarding
Carol
Bob
Alice
Rep. Learning
Bob
Pr(c1u)
Pr(c2u)
p → F (p, G): Alice
Bob
Dan
node-structure
expansion
sklearn
Alice
Pr(c3u)
Pr(c4u)
Rep. Learning
Sr. ML Engineer
Bob
Dan
structure-based
skip-gram
sklearn
Pr(c1u)
Alice
Bob
Pr(c3u)
Rep. Learning
Sr. ML Engineer
Pr(c4u)
Pr(c2u)
Dan
ML Engineer
LinkedIn
Deep Learning
ML Engineer
LinkedIn
Deep Learning
Fig. 2. Path generation and embedding learning example of Star2Vec. Star2Vec first generates a length-2 person path using P, then expands the path into stars
of size ks = 2 using F , and finally optimizes the network representation of Bob using a structure-based skip-gram with window size kw = 5. Comparing to
traditional path-based skip-gram models show at the top of the figure, Star2Vec uses social connection strength-aware random walk and therefore can walk
on social connections with high strength (Alice-Bob) and unobserved but highly similar persons (Bob-Dan). Star2Vec is also likely to optimize nodes with
semantically similar person and entity neighbors because of its node-structure expansion function.
social connections using their connection strengths and reduce
the importance of social connections such as neighbors and
friends which represent ambiguous relationships.
To estimate the strength of social connections, we need
to first identify useful network context that can help model
the social connection. According to Def. 1, we separate the
nodes in HPSNs into two groups, person-type nodes and non-
person-type entity nodes. Although person nodes are the same
and person-to-person connections are often ambiguous across
different social networks, non-person entity types and person-
to-entity connections usually represent the special interests of
each social network and therefore are reliable and have consis-
tent semantic meanings within the same relationship type. For
example, unambiguous person-to-entity relationships on Face-
book include person-to-political preference and person-likes-
post, whereas on LinkedIn, unambiguous professional person-
to-entity relationships such as person-knows-skill, person-has-
title, person-worksAt-company, etc.
Based on this observation, we assume that edges between
person and non-person entity nodes (also called attribute
nodes) are often unambiguous, because they represent the
characteristics of the person nodes. With this assumption, next
we will discuss how to estimate the strength of social connec-
tions using other unambiguous person-to-entity relationships.
Consider the example illustrated in Fig. 1, where the so-
cial connection Alice-to-Bob is an ambiguous person-to-
person connection and its reliability is hard to determine
by simply examining a single edge. By looking at other
alternative, unambiguous person-to-entity connections among
worksAt
−−−−−→ company
knows−−−−→ skill, we know Alice-Bob is a stronger
and person
social connection than Alice-Carol because Alice and
Bob are more structurally similar because they are both
indirectly connected via many unambiguous person-to-entity
paths. Hence, we can estimate the connection strength of such
person-to-person edges by modeling unambiguous alternative
person-to-entity paths between two nodes. Here we formally
define the social connection strength as follows
Alice and Bob, for example person
Definition 4. Given an HPSN G and a social connection
edge u r−→ v between two person nodes u and v, the social
connection strength of u r−→ v is defined by some support
function S(u, r, v, G) that measures the structural similarity
between u and v with respect
relationship r.
to some social connection
To model the structural similarity between nodes using
alternative unambiguous connections between two person with
respect to some social relationship r, we borrow the concept
of second-order proximity from LINE [6] and define the
support function S of some social connection u r−→ v as their
heterogeneous second-order proximity.
S(u, r, v, G) = Px∈N(u,Dr )
N (u, Dr)
I(x,v)
deg(x,φ(v))
,
(1)
where r ∈ Rppl, the relationship dependent neighbor set
N (u, Dr) = {xφ(x) ∈ Dr, (u, x) ∈ E} represents the
neighbors x of person u with node type φ(x) ∈ Dr, I(x, v) is
an indicator function testing (x, v) ∈ E, and deg(x, t) returns
the number of type-t nodes that x connects to. One can also
view Eq. 1 as a function measuring the heterogeneous second-
order proximity based on the probability that u can reach v in
two steps using only nodes within a given dependency type set
Dr. Note that one can also use Eq. 1 to measure the connection
strength of some unobserved social connection u r−→ v. When
Dr = T holds for all r ∈ R, then Eq. 1 degenerates to a
homogeneous higher-order proximity scoring function [6].
To generate dependency set Dr with respect
to social
connection relationship r, one could first collect some u r−→ v
examples, or use association rule mining [22], or predicate
path mining [23] to discover associated length-2 paths, and
then extract all intermediate non-person node types to con-
struct Dr. For example, in LinkedIn network, the dependency-
set of a simple person-to-person connection is Dconnect =
{title, skill}, which defines the social connection strength of
mutual connections by their common titles and skills. Dr
can also be manually defined, e.g., the dependency set of
LinkedIn's follower-influencer social relationship Df ollow =
{member, industry} if we are interested in modeling the con-
nection strength based on influencer popularity among their
followers' social circle and common industry experience.
In Eq. 1 we limit the order of the proximity to 2 to simplify
the computation, but it can be easily extended to higher-orders
by modeling paths instead of neighboring nodes.
With Eq. 1, we define the epsilon-greedy style social con-
nection strength-aware transition function P that determines
the transition score from person ui to person ui+1 as
+ α Xr∈Rppl
{z
walk on unobserved social connections
}
}
(2)
P(ui, ui+1, G) = (1 − α) Xrk ∈R(ui ,ui+1)
{z
walk on existing social connections
S(ui, r, ui+1, G)
S(ui, rk, ui+1, G)
where the relationship set R(ui,ui+1) contains all relationships
rk that connect ui and ui+1 in G, r is some person-to-person
relationship type from Rppl, which is defined in the HPSN
G, and α is some jump probability that allows the model to
walk on unobserved but highly possible social connections
between highly similar nodes measured by S. To reduce the
computational complexity on enumerating all possible ui+1,
we limit ui+1 to person-type nodes that can be reached from
person ui within two steps.
Equation 2 addresses the problem of ambiguous social
connections by calculating the social connection strength of
person-to-person edges to avoid walking over ambiguous
social connections that do not contribute to the professional
similarity, such as Alice→Carol in Fig. 1. Moreover, by
considering the transition score between highly similar but not
directly connected persons (second term in Eq. 2), the model
will also generate social connection paths that are not directly
observed. For example, Alice→Bob could be extended to
Alice→Bob→Dan using P even though two structurally
similar nodes Bob and Dan are not directly connected.
Note that the random walker used in previous works [5],
[17] is a special case of Eq. 2, where α = 0, u∗ ∈ V, R = 1,
and S(u, r, v, G) = 1
N (u) .
B. Node-structure Expansion
In the previous section we described a social connection
strength-aware random walk that generates paths using ob-
served and unobserved social connections with high connec-
tion strengths defined by Eq. 1. However, due to the lack of
non-person entities in the generated paths, this method cannot
learn person and entity embeddings jointly. If we explicitly
generate additional paths by specifying certain metapaths, e.g.,
person-skill-person or person-title-person, then the represen-
tations of each entity type is likely to be trained disjoint-
edly, which would produce incomparable node representations
across different node types. Such an approach may yield good
results in a node-type clustering visualization, but cannot be
used for cross-type inference, such as suggesting skills to
members, finding related skills given a title or find important
companies at some location, etc.
To remedy this issue and learn person and entity embed-
dings in the same semantic space so different type of entities
can be compared directly, we apply an extra node-structure
expansion post-processing function F on the path set P to
generate an expanded, diversified person-entity structure (i.e.,
a star) path set P′ to increase the entity-type coverage in P and
appropriately capture higher-order heterogeneous proximity in
the model.
To describe F , first recall
that network representation
learning models inspired by Word2Vec view the nodes and
paths as words and sentences respectively, and learn node
representations by maximizing the similarity between a node
in some path and its surrounding nodes.
In Star2Vec, we extend this idea by replacing the single
person u in the path with a star-structure s(u) containing ks
neighbors of u with u as the star's center. To continue the
analogy, s(u) essentially becomes a "phrase" in the overall
sentence, and we use nodes in nearby phrases to update
the representation of nodes in s(u). By doing so, we can
increase the context node similarity and diversity within a
given window size comparing to other models. In Fig. 2 we
illustrate this node expansion using a length-2 path generated
by P and expanding each node u in the path to s(u) with a
star size ks = 2. Here we define F as F (p, G) → {s(u1) →
· · · → s(ul)ui ∈ p}, s(u) = {u} ∪ {vivi ∼ Pr(viu, G), vi ∈
N (u, T)} ,
s(u) = ks + 1, and Pr(vu, π, G) is some
disproportionate stratified sampling probability defined as
Pr(vu, π, G) ∝
πφ(v)
N (u, {φ(v)})
,
(3)
where π ∈ RT is the parameter of t ∼ Multi(tπ), πφ(v)
denotes the probability of selecting node type φ(v). π can be
approximated by the confidence score of φ(ui) φ(ui+1) via
Ti for Ti ∈ T using AMIE [22] or some simple distributions
such as uniform distribution. N (u, {φ(v)}) is the number of
φ(v) typed-nodes that connect to u.
C. Structure-based Skip-gram
After we construct the star-structured paths P′, next we
discuss how to learn person and entity embeddings using
P′. In a standard random walk-based network representation
learning setting, the objective is often defined as
arg max
θ Xu∈V Xc∈C(u)
log(Pr(cu; θ)),
(4)
where c is the context node of u defined by C(u), which is
usually the neighbor of u in a random walk path p within a
window size kw. Here we can not apply this objective directly
to the proposed Star2Vec model because it is unclear about
how to generate context nodes for u from star-shaped structure
paths s(u1) s(ul) instead of simple node paths u1 ul.
So, we first define k′
w = ⌈kw/ks⌉ that represents the
smallest star window size that covers at least kw nodes. The
context nodes of u within a star window of size k′
w on
s(u1) s(ul) is then defined as
V u,p
c =
i+
k′
w
2
[
j=i−
k′
w
2
s(uj ) \ {u}, u ∈ s(ui),
(5)
c
in which s(ui) is the star-shaped structure centered at ui and
V u,p
is the superset of the context nodes of u in path p. We
then extract kw context nodes for u ∈ s(ui) by randomly
sampling from V u,p
and rewrite the objective as
c
EVALUATION DATASETS USED IN THIS WORK.
TABLE I
Dataset
#Nodes
#Members
#NodeType
#Edges
6, 319
Facebook
∼ 60K
LinkedIn-60k
LinkedIn-44M ∼ 44M
4, 039
∼ 14K
∼ 40M
29
10
10
127, 777
> 500K
> 6B
arg max
θ Xu∈V Xp∈P′
kw
Xi
E
u,p
ci∼Unif(V
c
) log(Pr(ciu; θ)),
(6)
where the conditional probability Pr(cu; θ) is actually the
log-normalized score of the embedding inner product de-
fined as exp(Wc · WT
u ), in which
W ∈ RV×d is the embedding matrix. We combine a negative
sampling function with Eq. 6 to define the loss function
u )/ Pv∈V exp(Wv · WT
kw
Xi
E
u,p
ci∼Unif(V
c
)(cid:18) log(σ(Wci · WT
u ))
+
Evj ∼Dist(u) log(σ(−Wvj · WT
L = Xu∈V Xp∈P′
Xj
kneg
(7)
u ))(cid:19),
in which σ(x) = 1/(1 + exp(−x)), Dist(u) is some negative
sampling distribution, kneg and kw are the number of negative
samples and context window size respectively. We follow the
convention of previous works [24] and use stochastic gradient
descent with back propagation to optimize Eq. 7.
Training time complexity of Star2Vec is O(V ) which is the
same as homogeneous network embedding models [5], [7] and
lower than rich feature models' O(V 2) [8].
IV. EXPERIMENTS
We compare Star2Vec to other representation learning mod-
els on LinkedIn's Economic Graph and a public available sub-
set of Facebook using a variety of tasks including industry and
social circle classification, skill / title clustering, and member-
entity link predictions. We also conduct extensive case studies
to demonstrate the possibilities of using the representations
learned from Star2Vec to solve real-world tasks LinkedIn is
facing such as skill recommendation, career suggestion, and
general entity retrieval on the LinkedIn's Economic Graph.
A. Datasets
We consider LinkedIn as a heterogeneous professional so-
cial network and Facebook as a general-purpose heterogeneous
social networks with different focus on the social connections
and entity types. Table I shows a summary of the three
datasets. LinkedIn-60k and LinkedIn-44M are two subsets of
LinkedIn's Economic Graph and Facebook is derived from
Facebook-egonet [25].
B. Experiment Setup
compared because of their high time complexity or the lack
of certain features. We use the best performing parameters
reported in each work for all tasks on the Facebook and
LinkedIn-60k. On the LinkedIn-44M network we limited the
embedding size to 64 and only generate 10 length-100 paths
per entity node for all node embedding models in order to
manage the memory and disk consumption. We generated
metapaths for the Metapath2Vec model by enumerating all
length-2 person to entity metapaths as suggested in the original
work. As in prior work, all networks are treated as undirected
graphs to avoid creating random walk sinks.
On the LinkedIn datasets, we set the dependency set of
person-to-person connection as DconnectT o = { title, skill,
company, school }. On the Facebook dataset, DconnectT o con-
tains all non-person entity types. We set πφ(⋆) to be a uniform
distribution for all datasets. As for other hyper-parameters,
we conduct a hyper-parameter test for the proposed Star2Vec
model and report the results at the end of this section. We
were unable to gather results of LINE and knowledge graph
completion models on LinkedIn-44M due to scaling issues.
The model was trained on a single machine with 48 cores,
and it took 9 hours to converge on the LinkedIn-44M dataset.
C. Multi-class and Multi-label Classification
First we explore the effectiveness of Star2Vec on multi-class
and multi-label classifications. In both cases we use external
labels with at least 10 members and train logistic regression
models on top of the learned embeddings to perform the
prediction. We vary the training size from 5% to 90% using
a stratified split w.r.t each class and treat the remaining data
as testing set. We repeat each experiment setting 10 times and
report the average Macro-F1 and Micro-F1 scores.
We perform the multi-class classification by predicting a
persons' self-reported industry on LinkedIn because each
person has exact one label. Similarly, we perform multi-label
classification task on Facebook where social circles are used
as labels. Note that users may belong to multiple social circles
so a single user can have multiple labels.
The classification results of LinkedIn-60k and LinkedIn-
44M are shown in Tab. II and Tab. IV. Due to memory
limitation and high time complexity, we are not able to com-
pare LINE and Knowledge Graph Completion based models
on the LinkedIn-44M dataset. On both networks Star2Vec
outperformed other models on Macro-F1 by up to 37.8% and
up to 10.2% on Micro-F1. Interestingly, the improvement was
more significant on the large-scale LinkedIn-44M network.
We believe the difference in improvement is because the
smaller LinkedIn-60k network is well-curated so that
the
network is more complete and the number of ambiguous
social connections is limited. The large improvement on the
less-curated LinkedIn-44M network indicates that Star2Vec is
robust on networks with ambiguous social connections due to
its social connection strength-aware random walk.
We compared Star2Vec with node embedding methods and
knowledge graph completion methods. Other matrix factor-
ization methods as well as rich-feature methods could not be
The results of the multi-label classification task on the
Facebook network are shown in Tab. III. We find that Star2Vec
works well especially when the amount of training data is
PERSON-TO-INDUSTRY CLASSIFICATION ON LINKEDIN-60K.
TABLE II
Metric
Model
5%
10%
20%
30%
Training Set %
40%
50%
60%
70%
80%
90%
Macro-F1
Micro-F1
Metapath2Vec
LINE (1+2)
DeepWalk
Node2Vec
TransE
TransR
ProjE
Star2Vec
Metapath2Vec
LINE (1+2)
DeepWalk
Node2Vec
TransE
TransR
ProjE
Star2Vec
0.0733
0.0191
0.1105
0.0504
0.0240
0.0245
0.0677
0.0943
0.4888
0.4422
0.4990
0.4621
0.4567
0.4619
0.4108
0.5038
0.1060
0.0199
0.1381
0.0888
0.0274
0.0281
0.0889
0.1334
0.5076
0.4477
0.5158
0.4919
0.4648
0.4700
0.4339
0.5197
0.1291
0.0218
0.1558
0.1251
0.0358
0.0375
0.1065
0.1617
0.5215
0.4515
0.5258
0.5140
0.4773
0.4834
0.4629
0.5317
0.1658
0.0261
0.1890
0.1759
0.0537
0.0567
0.1373
0.1979
0.5355
0.4603
0.5373
0.5330
0.4902
0.4964
0.4971
0.5436
0.1747
0.0270
0.1916
0.1864
0.0556
0.0599
0.1429
0.2056
0.5390
0.4618
0.5373
0.5357
0.4914
0.4991
0.5028
0.5434
0.1746
0.0282
0.1963
0.1954
0.0582
0.0615
0.1472
0.2113
0.5387
0.4654
0.5391
0.5399
0.4937
0.4999
0.5077
0.5466
0.1794
0.0286
0.1977
0.1981
0.0592
0.0649
0.1503
0.2131
0.5421
0.4664
0.5434
0.5434
0.4961
0.5033
0.5104
0.5505
0.1811
0.0302
0.1945
0.1961
0.0596
0.0640
0.1415
0.2149
0.5411
0.4675
0.5432
0.5402
0.4949
0.5068
0.5118
0.5500
0.1491
0.0234
0.1724
0.1457
0.0436
0.0461
0.1225
0.1802
0.5305
0.4543
0.5302
0.5246
0.4845
0.4903
0.4811
0.5368
0.1587
0.0248
0.1825
0.1648
0.0491
0.0521
0.1300
0.1902
0.5336
0.4578
0.5364
0.5316
0.4862
0.4940
0.4882
0.5410
TABLE III
PERSON-TO-SOCIAL CIRCLE CLASSIFICATION ON FACEBOOK.
Metric
Model
5%
10%
20%
30%
Training Set %
40%
50%
60%
70%
80%
90%
Macro-F1
Micro-F1
Metapath2Vec
LINE (1+2)
DeepWalk
Node2Vec
TransE
TransR
ProjE
Star2Vec
Metapath2Vec
LINE (1+2)
DeepWalk
Node2Vec
TransE
TransR
ProjE
Star2Vec
0.0504
0.1240
0.2510
0.0517
0.0755
0.0778
0.3102
0.1495
0.2233
0.4683
0.6319
0.2490
0.4176
0.4198
0.5290
0.4435
0.0958
0.1697
0.3249
0.1129
0.1175
0.1197
0.3336
0.2390
0.3346
0.5292
0.6947
0.4593
0.4705
0.4714
0.5389
0.5903
0.1338
0.2338
0.4106
0.1949
0.1589
0.1625
0.3620
0.3943
0.4139
0.6038
0.7422
0.6146
0.5144
0.5163
0.5421
0.7145
0.1690
0.2616
0.4509
0.2395
0.1960
0.1982
0.3669
0.5055
0.4434
0.6240
0.7659
0.6660
0.5456
0.5454
0.5363
0.7769
0.1960
0.2951
0.4875
0.2703
0.2117
0.2178
0.3663
0.5687
0.4746
0.6499
0.7811
0.6962
0.5548
0.5564
0.5333
0.8101
0.2167
0.3143
0.5048
0.2833
0.2305
0.2393
0.3659
0.6210
0.4899
0.6579
0.7899
0.7051
0.5655
0.5668
0.5281
0.8307
0.2414
0.3302
0.5160
0.3053
0.2443
0.2586
0.3598
0.6588
0.5050
0.6693
0.7984
0.7207
0.5680
0.5723
0.5282
0.8511
0.2603
0.3509
0.5250
0.3190
0.2618
0.2772
0.3595
0.6866
0.5251
0.6934
0.7994
0.7268
0.5727
0.5776
0.5215
0.8583
0.2666
0.3507
0.5137
0.3292
0.2746
0.2848
0.3603
0.6977
0.5296
0.6990
0.8000
0.7392
0.5791
0.5818
0.5290
0.8661
0.2426
0.3371
0.5019
0.3351
0.2830
0.2885
0.3507
0.6135
0.5305
0.6958
0.8070
0.7411
0.5834
0.5845
0.5243
0.8760
PERSON-TO-INDUSTRY CLASSIFICATION ON LINKEDIN-44M.
TABLE IV
Metric
Model
5%
10%
20%
30%
Macro-F1
Micro-F1
Metapath2Vec
DeepWalk
Node2Vec
Star2Vec
Metapath2Vec
DeepWalk
Node2Vec
Star2Vec
0.1688
0.1820
0.1943
0.2421
0.4101
0.4113
0.4259
0.4783
0.1912
0.2069
0.2218
0.2685
0.4280
0.4284
0.4434
0.4919
0.2097
0.2250
0.2437
0.2908
0.4419
0.4394
0.4555
0.5019
0.2195
0.2347
0.2539
0.3012
0.4473
0.4445
0.4607
0.5069
Training Set %
40%
50%
0.2246
0.2410
0.2606
0.3067
0.4502
0.4476
0.4637
0.5089
0.2285
0.2467
0.2658
0.3108
0.4516
0.4501
0.4664
0.5101
60%
70%
80%
90%
0.2315
0.2481
0.2683
0.3122
0.4540
0.4508
0.4671
0.5114
0.2325
0.2489
0.2691
0.3153
0.4548
0.4514
0.4678
0.5122
0.2343
0.2526
0.2707
0.3170
0.4564
0.4519
0.4694
0.5140
0.2354
0.2517
0.2692
0.3172
0.4558
0.4508
0.4674
0.5151
greater than 30%. This improvement indicates that Star2Vec is
able to learn person embeddings that better capture a person's
characteristics by modeling non-person entities with people
jointly using the node-structure expansion function.
Because many social networks are incomplete and follow a
power-law degree distribution, the ability of handling poorly
connected nodes with many unobserved social connections is
a crucial factor for an HPSN representation learning model.
To better understand Star2Vec's ability to learn embeddings
for nodes with limited connectivity, we further group the
person-nodes in LinkedIn-44M by their degree and plot the F1
improvement over the second-best performing model stratified
by the degree percentile in Fig. 3. These results clearly demon-
strates that Star2Vec works better than the best performing
%
t
n
e
m
e
v
o
r
p
m
I
e
r
o
c
s
-
1
F
Macro-F1
Micro-F1
30 %
20 %
10 %
0 %
0
20 40 60 80 100
Overall Degree Percentile
30 %
20 %
10 %
0 %
Macro-F1
Micro-F1
0
20 40 60 80 100
Member → Member Degree Percentile
Fig. 3. Classification improvement stratified by degree percentile (in ascend-
ing order) on LinkedIn-44M. Percentage is based on second best model.
model especially on nodes with low connectivity (left-hand
side of plots). This indicates Star2Vec's social connection-
strength based path generation can implicitly increase the
TOP-3 SIMILARITY RESULTS OF PROVIDED QUERIES ON LINKEDIN-44M.
TABLE V
(Query, target node type)
Top-3 Results
1
2
3
4
5
6
7
8
(Software Dev, title)
(Software Dev + KDB, title)
(Sr. Audit Accountant, title)
(Sr. Accountant Audit − Member of AICPA, title)
(FBI, skill)
(Medical Research, region)
(Deloitte, Title)
(Deep Learning, skill)
Junior Software Engineer
Quantitative Dev
Supervising Sr. Accountant
SVP Marketing Business Development
Counterintelligence
Iowa City, Iowa Area
Sr. Advisory Consultant
Machine Learning
Software Dev Team Lead
Financial Software Dev
Audit Sr.
SVP Strategy Business Development
Federal Law Enforcement
Washington D.C. Metro Area
Sr. Manager Advisory Services
Artificial Neural Networks
Software Dev Contractor
Front Office Dev
Audit Staff Accountant
SVP Human Resources Administration
Cybercrime Investigation
Gainesville, Florida Area
Sr. Associate Advisory
Neural Networks
ADJUSTED MUTUAL INFORMATION (AMI) SCORE OF NODE CLUSTERING
AUROC SCORE OF LINK PREDICTION ON LINKEDIN-44M.
TABLE VI
TABLE VII
RESULTS ON LINKEDIN-44M.
skill-to-domain
person-to-industry
title-to-specialty
Metapath2Vec
DeepWalk
Node2Vec
Star2Vec
0.5965
0.5918
0.5969
0.5992
0.1105
0.1689
0.1633
0.3294
0.3878
0.3663
0.3850
0.4200
person-region
person-industry
person-skill
Metapath2Vec
DeepWalk
Node2Vec
Star2Vec
0.5097
0.5034
0.5013
0.6370
0.5189
0.5034
0.5080
0.5840
0.5356
0.5489
0.5605
0.7175
connectivity of nodes with few connections, and therefore
learn better representations compared to other methods.
D. Node Clustering
Next, we performed three node clustering tasks on the
LinkedIn-44M network. We compare models on the Adjusted
Mutual Information (AMI) [26]. For these clustering tasks, we
used the trained node embeddings as input and assigned nodes
to clusters using k-means. The cluster labels used in each
task are summarized as follows: 1) in the skill-to-domain task
we assigned each skill to a single hand-curated domain, e.g.,
Java and Python are assigned to Computing; 2) the
person-to-industry task uses the same label as described in the
classification task; and 3) the title-to-specialty task divides job
titles by induced specialties, e.g., Junior Java Dev would
belong to Software Developer. In each task, the number
of clusters k is set to equal the number of labels observed in
the network. We present the results in Tab. VI.
We find that Star2Vec performs well on these tasks. How-
ever, the performance boost is most pronounced the person-
to-industry task. This performance boost is due to differences
in the connectivity patterns between person and non-person
entity nodes. Recall that in HPSNs ambiguous connections
are mostly person-to-person social connections, which means
person nodes are more vulnerable to ambiguity because, in
prior models, their representations were mainly defined by
their peers. On the other hand, entity nodes such as skill and
title are less likely to be affected because they usually have a
robust second-order connectivity pattern, i.e., a skill and a title
are likely to be similar if they connect to the same person.
This also explains why Metapath2Vec works well on some
clustering tasks, but not others. Under these conditions, metap-
aths such as person-entity-person tend to decouple entity node
types from each other during training. This decoupling leads
to poor person embeddings and poor clustering performance.
E. Link Prediction
tasks. Here we use 70% of the data for training, 5% for
validation, and evaluate the model performance on the remain-
ing 25% with the same amount of negative edges, which is
generated by replacing a node on an existing edge with an
incorrect random node of the same type. This strategy results
in a more difficult but more realistic link prediction problem
comparing to previous settings [7]. To speed up the evaluation
on the LinkedIn-44M dataset, we sampled 50, 000 edges at
random from 1 billion testing edges.
The area under the ROC (AUROC) score of link prediction
tasks are shown in Tab. VII. These consistent performance im-
provements indicate the proposed model can learn embeddings
that better captures the semantic meaning of nodes.
F. Case Studies
In addition to the applications that can be formed into
standard network analysis tasks, we are also interested in
applying the learned representations to other practical cases
and to gain insights from the HPSN. In this section, we
demonstrate how to employ the learned Star2Vec embeddings
to solve interesting entity retrieval tasks. We built a nearest
neighbor model that takes, as input, a query vector and a target
node type, and returns the top-k nearest nodes (in terms of
cosine similarity). The top-3 results of 8 example queries are
shown in Tab. V. Note that there are no direct relationships
between any of these query objects.
Next Career Move. The title of a person typically depends
on their skill set and experience. Thus, learning new skills
could potentially lead to new opportunities. To capture such
a change, we combine the vector of a person's current title
with their most recent skill and suggest titles based on the
combined representation [27]. In Tab. V, we see that after a
software developer learns a new skill KDB, which is a
financial database, the job recommendation shifts from general
software development to jobs in the financial sector.
In addition to the classification and clustering tasks, we also
evaluate Star2Vec on multiple person-entity link prediction
Alternative Career Suggestion. Oftentimes, individuals may
be interested in a particular job title, but do not possess the
0.8
0.6
0.4
0.2
)
1
F
(
k
s
a
T
n
o
i
t
a
c
fi
i
s
s
a
l
C
)
I
M
A
(
k
s
a
T
g
n
i
r
e
t
s
u
l
C
1
0.8
0.6
0.4
0.2
Macro-F1
Micro-F1
0.8
0.6
0.4
0.2
Macro-F1
Micro-F1
0.8
0.6
0.4
0.2
Macro-F1
Micro-F1
0.8
0.6
0.4
0.2
)
1
F
(
k
s
a
T
n
o
i
t
a
c
fi
i
s
s
a
l
C
Macro-F1
Micro-F1
0.8
0.6
0.4
0.2
Macro-F1
Micro-F1
0.8
0.6
0.4
0.2
Macro-F1
Micro-F1
6
8
10
12
50
window size kw
150
100
200
embedding size d
250
2
6
4
star size ks
8
10
40
60
80
100
120
walk length l
140
160
5
10
15
walk per node w
20
0
40
20
80
jump probability α (%)
60
Skill-Domain
Member-Industry
Title-Specialty
6
8
10
12
window size kw
1
0.8
0.6
0.4
0.2
Skill-Domain
Member-Industry
Title-Specialty
1
0.8
0.6
0.4
Skill-Domain
Member-Industry
Title-Specialty
1
0.8
0.6
0.4
)
I
M
A
(
k
s
a
T
g
n
i
r
e
t
s
u
l
C
Skill-Domain
Member-Industry
Title-Specialty
1
0.8
0.6
0.4
Skill-Domain
Member-Industry
Title-Specialty
50
200
150
100
embedding size d
15
walk per node w
Fig. 4. Parameter sensitivity test for classification and clustering tasks on LinkedIn-44M.
40 60 80 100 120 140 160
4
star size ks
walk length l
250
10
5
6
8
10
0.2
2
0.2
0.2
1
0.8
0.6
0.4
0.2
0
20
Skill-Domain
Member-Industry
Title-Specialty
20
80
jump probability α (%)
60
40
necessary skill set. In this case, we may wish to show the alter-
native job titles that do not require certain skills. We achieve
this goal by subtracting the missing skill from the title's
representation. Tab. V shows alternative job recommendations
for senior audit accountant without requiring a CPA
license. Note that the returned alternative jobs also preserves
the seniority of the given job title.
General Similarity Search. The learned representations can
also perform general similarity searches between arbitrary
nodes regardless of node types. These searches can be used
to infer relationships that are absent from the graph. These
inferred relationships allow members to gain valuable insights
to better their place in the network.
G. Hyper-parameter Sensitivity
Here we study the hyper-parameter sensitivity of Star2Vec
and report the relationship between Star2Vec performance as
a function of its various hyper-parameters. These include the
window size kw, the node embedding size d, the star size ks,
the random walk length l, the number of walks per node w,
and the jump probability α. The hyper-parameter sensitivity
results on two tasks are illustrated in Fig. 4. We find that the
performance of Star2Vec is stable and largely insensitive to
most of the hyper-parameters. The primary exception is, as
excepted, the embedding size d. Another particularly interest-
ing finding is that the model's performance remains largely
unchanged when ks or kw is changed. This demonstrates that
training with long, reliable simple paths can achieve results
similar to models trained with shorter, star-structured paths
covering the same number of nodes.
V. RELATED WORK
A variety of Representation Learning (RL) models have
been developed to learn network embeddings in recent years.
Here we group them by their inputs.
Network
Embedding.
Homogeneous
by
random walk-based RL
Word2Vec [28], a number of
models have been proposed [5], [7], [29]. Just as Word2Vec
updates each word embedding to match those within the
same sentence, these models update each node-embedding to
Inspired
match its neighboring nodes on truncated random walk paths.
LINE [6] and HOPE [30] take a different approach and learn
node-embeddings through matrix factorization-like objectives.
SNDE [15], on the other hand, uses an auto-encoder to
learn node-embeddings from second-order proximity data.
MVE [31] separates a network into multiple views and learn
node representations using attention. CTDNE [29] uses a
temporal random walk method to consider the temporal
neighborhood. Despite their differences, these models only
use un-typed topological information and therefore miss the
rich information encoded in the node types.
Network Embedding with Rich Features. To address the
limitations that accompany homogeneous network embedding,
several models have been proposed to augment the network
in order to generate better network representations. LANE [8]
uses an auxiliary attribute network and node labels to learn
node embeddings jointly. SNE [13], on the other hand, encode
attributes into embeddings and utilizes MLP to learn node
representations. TriDNR [18] uses two skip-gram models to
jointly train node embeddings from a node's content and
neighbors. Although these methods have shown promising
results by augmenting the graph with additional features, they
either have a high O(V 2) time complexity or require additional
features which may not be available in all networks. More-
over, these models were evaluated on limited sized networks,
which is not applicable to real-world online networks, such as
Economic Graph's million-node scale. Recently, RGCN [32]
studies learning robust network embeddings against small
deliberate perturbations in graph structures, but it does not
address how to handle existing ambiguous social connections
that appear in many real-world social networks.
Heterogeneous Network Embedding. Metapath2Vec [12]
is a graph embedding model that guides the random walk
with human-curated metapaths over HINs. Other models have
extended this idea into meta-graph walks [33], [34]. How-
ever, the problem of generating informative metapaths is still
unclear. ImVerde designed a vertex-diminished random walk
method to boost the probability of visiting nodes from the
same class [35]. This approach can better separate nodes
from different classes but will penalize inter-class related-
ness. Knowledge Graph Completion methods [36] -- [40] can
be viewed as heterogeneous embedding models, but they are
explicitly designed for link prediction and are not well suited
for node classification and clustering tasks, especially when
the relationship type is absent.
VI. CONCLUSIONS AND FUTURE WORK
In this work, we presented a heterogeneous professional
social network representation learning model that 1) addresses
the ambiguous social connection and incomplete network
problem by designing a social connection strength-aware
random walk method without introducing additional model
parameters, and 2) utilizes rich entity types to learn person
and entity embeddings jointly with a node-structure expansion
function. Star2Vec outperforms existing models on three het-
erogeneous social network datasets across different scales and
tasks, which highlights the necessity to rectify ambiguous so-
cial connections in heterogeneous social networks, leveraging
unobserved social connections, and modeling person and entity
embeddings jointly. We also conducted extensive case studies
to demonstrate how to use these embeddings to discover
professional insights and power other recommendation tasks.
As for future work, we will incorporate rich contextual
features into Star2Vec in a scalable way. Another interesting
extension would be to further improve the model's ability to
estimate the social connection strength.
Acknowledgements. This work is partially supported by the
US Army Research Office (ARO W911NF-17-1-0448).
REFERENCES
[1] S. Bhagat, G. Cormode, and S. Muthukrishnan, "Node classification in
social networks," in Social network data analytics. Springer, 2011, pp.
115 -- 148.
[2] S. Fortunato, "Community detection in graphs," Physics reports, vol.
486, no. 3, pp. 75 -- 174, 2010.
[3] T. Zhou, J. Ren, M. Medo, and Y.-C. Zhang, "Bipartite network
projection and personal recommendation," Physical Review E, vol. 76,
no. 4, p. 046115, 2007.
[4] D. Liben-Nowell and J. Kleinberg, "The link-prediction problem for
social networks," JASIST, vol. 58, no. 7, pp. 1019 -- 1031, 2007.
[5] B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning of
social representations," in SIGKDD, 2014, pp. 701 -- 710.
[6] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, "Line: Large-
scale information network embedding," in WWW, 2015, pp. 1067 -- 1077.
[7] A. Grover and J. Leskovec, "node2vec: Scalable feature learning for
networks," in SIGKDD, 2016, pp. 855 -- 864.
[8] X. Huang, J. Li, and X. Hu, "Label
informed attributed network
embedding," in WSDM, 2017, pp. 731 -- 739.
[9] S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, and T. S. Huang,
"Heterogeneous network embedding via deep architectures," in KDD,
2015, pp. 119 -- 128.
[10] L. Liao, X. He, H. Zhang, and T.-S. Chua, "Attributed social network
embedding," IEEE Trans. on Knowledge and Data Engineering, vol. 30,
no. 12, pp. 2257 -- 2270, 2018.
[11] H. Gao and H. Huang, "Deep attributed network embedding." in IJCAI,
2018, pp. 3364 -- 3370.
[12] Y. Dong, N. V. Chawla, and A. Swami, "metapath2vec: Scalable
representation learning for heterogeneous networks," in SIGKDD, 2017,
pp. 135 -- 144.
[13] L. Liao, X. He, H. Zhang, and T.-S. Chua, "Attributed social network
embedding," arXiv preprint arXiv:1705.04969, 2017.
[14] K. Henderson, B. Gallagher, T. Eliassi-Rad, H. Tong, S. Basu,
L. Akoglu, D. Koutra, C. Faloutsos, and L. Li, "Rolx: structural role
extraction & mining in large graphs," in SIGKDD, 2012, pp. 1231 -- 1239.
[15] D. Wang, P. Cui, and W. Zhu, "Structural deep network embedding," in
SIGKDD, 2016, pp. 1225 -- 1234.
[16] C. Yang, M. Sun, Z. Liu, and C. Tu, "Fast network embedding
enhancement via high order proximity approximation," in IJCAI, 2017.
[17] W. L. Hamilton, R. Ying, and J. Leskovec, "Representation learning on
graphs: Methods and applications," arXiv preprint arXiv:1709.05584,
2017.
[18] S. Pan, J. Wu, X. Zhu, C. Zhang, and Y. Wang, "Tri-party deep network
representation," Network, vol. 11, no. 9, p. 12, 2016.
[19] C. Shi, Y. Li, J. Zhang, Y. Sun, and P. S. Yu, "A Survey of Heterogeneous
Information Network Analysis." IEEE Trans. on Knowledge and Data
Engineering, vol. 29, no. 1, pp. 17 -- 37, 2017.
[20] N. Lao and W. W. Cohen, "Relational retrieval using a combination of
path-constrained random walks," Machine learning, vol. 81, no. 1, pp.
53 -- 67, 2010.
[21] Y. Sun, B. Norick, J. Han, X. Yan, P. S. Yu, and X. Yu, "Pathsel-
clus: Integrating meta-path selection with user-guided object clustering
in heterogeneous information networks," ACM Trans. on Knowledge
Discovery in Databases, vol. 7, no. 3, p. 11, 2013.
[22] L. A. Gal´arraga, C. Teflioudi, K. Hose, and F. Suchanek, "Amie: associ-
ation rule mining under incomplete evidence in ontological knowledge
bases," in WWW. ACM, 2013, pp. 413 -- 422.
[23] B. Shi and T. Weninger, "Discriminative predicate path mining for fact
checking in knowledge graphs," Knowledge-Based Systems, vol. 104,
pp. 123 -- 133, 2016.
[24] T. Mikolov, K. Chen, G. Corrado, and J. Dean, "Efficient estimation of
word representations in vector space," arXiv preprint arXiv:1301.3781,
2013.
[25] J. Leskovec and J. J. Mcauley, "Learning to discover social circles in
ego networks," in NeurIPS, 2012, pp. 539 -- 547.
[26] N. X. Vinh, J. Epps, and J. Bailey, "Information theoretic measures for
clusterings comparison: Variants, properties, normalization and correc-
tion for chance," Journal of Machine Learning Research, vol. 11, pp.
2837 -- 2854, 2010.
[27] L. Li, H. Jing, H. Tong, J. Yang, Q. He, and B.-C. Chen, "Nemo: Next
career move prediction with contextual embedding," in WWW, 2017, pp.
505 -- 513.
[28] T. Mikolov,
I. Sutskever, K. Chen, G. S. Corrado, and J. Dean,
"Distributed representations of words and phrases and their composi-
tionality," in NeurIPS, 2013, pp. 3111 -- 3119.
[29] G. H. Nguyen, J. B. Lee, R. A. Rossi, N. K. Ahmed, E. Koh,
and S. Kim, "Dynamic network embeddings: From random walks to
temporal random walks," in BigData.
IEEE, 2018, pp. 1085 -- 1092.
[30] M. Ou, P. Cui, J. Pei, Z. Zhang, and W. Zhu, "Asymmetric transitivity
preserving graph embedding." in SIGKDD, 2016, pp. 1105 -- 1114.
[31] M. Qu, J. Tang, J. Shang, X. Ren, M. Zhang, and J. Han, "An Attention-
based Collaboration Framework for Multi-View Network Representation
Learning." in CIKM. ACM, 2017, pp. 1767 -- 1776.
[32] D. Zhu, Z. Zhang, P. Cui, and W. Zhu, "Robust Graph Convolutional
Networks Against Adversarial Attacks," in SIGKDD. Anchorage,
AK, USA: ACM, 2019, pp. 1399 -- 1407.
[Online]. Available:
http://dl.acm.org/citation.cfm?doid=3292500.3330851
[33] V. Fionda and G. Pirr`o, "Meta structures in knowledge graphs," in ISWC,
2017, pp. 296 -- 312.
[34] H. Jiang, Y. Song, C. Wang, M. Zhang, and Y. Sun, "Semi-supervised
learning over heterogeneous information networks by ensemble of meta-
graph guided random walks," in IJCAI, 2017.
[35] J. Wu, J. He, and Y. Liu, "Imverde: Vertex-diminished random walk for
IEEE, 2018,
learning imbalanced network representation," in BigData.
pp. 871 -- 880.
[36] A. Bordes, N. Usunier, A. Garc´ıa-Dur´an, J. Weston, and O. Yakhnenko,
"Translating Embeddings for Modeling Multi-relational Data." in
NeurIPS, 2013, pp. 2787 -- 2795.
[37] Y. Lin, Z. Liu, M. Sun, Y. Liu, and X. Zhu, "Learning entity and relation
embeddings for knowledge graph completion." in AAAI, 2015, pp. 2181 --
2187.
[38] B. Shi and T. Weninger, "Proje: Embedding projection for knowledge
graph completion." in AAAI, 2017, pp. 1236 -- 1242.
[39] T. Dettmers, P. Minervini, P. Stenetorp, and S. Riedel, "Convolutional 2d
knowledge graph embeddings," arXiv preprint arXiv:1707.01476, 2017.
[40] B. Shi and T. Weninger, "Open-world knowledge graph completion," in
Thirty-Second AAAI Conference on Artificial Intelligence, 2018.
|
1912.03750 | 1 | 1912 | 2019-12-08T20:15:20 | Determining Individual Origin Similarity (DInOS): Binary Classification of Authors Using Stylometric Features | [
"cs.SI"
] | Author similarity and detection is an integral first step in detecting state-led disinformation campaigns in an automated fashion. Current detection techniques require an analyst or subject matter expert to hand-curate accounts. Stylometric features have a rich history in identifying authorship of unknown documents, but little exploration has been done to compare authors to one another. We have adapted a select handful of stylometric features for use in author similarity metrics, and show their >0.96 F-1 performance on a curated author classification task, across both traditional machine learning and deep learning models. These features should contribute to the expanding field of author similarity research, and expedite the process of detecting and mitigating large-scale social media disinformation campaigns. | cs.SI | cs |
Determining Individual Origin
Similarity (DInOS):
Binary Classification of Authors Using
Stylometric Features
Kingsland, A., Fortin, D., Cary, E., Smith, S., Pazdernik, K., and Perko, R.
Pacific Northwest National Laboratory
October 25, 2019
Abstract
Author similarity and detection is an integral first step in detecting state-led disinformation campaigns in an
automated fashion. Current detection techniques require an analyst or subject matter expert to hand-curate accounts.
Stylometric features have a rich history in identifying authorship of unknown documents, but little exploration has
been done to compare authors to one another. We have adapted a select handful of stylometric features for use in
author similarity metrics, and show their >0.96 F-1 performance on a curated author classification task, across
both traditional machine learning and deep learning models. These features should contribute to the expanding
field of author similarity research, and expedite the process of detecting and mitigating large-scale social media
disinformation campaigns.
I.
Introduction
In 2016, the Russia-based Internet Research Agency
(IRA) conducted a multifaceted information warfare
campaign at the direction of the Russian government [1,
2]. By posting a massive volume of falsified and de-
ceptive information across a spectrum of social media
and other online platforms, IRA operatives worked to
undermine Americans faith in the 2016 U.S. electoral
process and government institutions, as well as exacer-
bate political polarization by exploiting cultural and so-
cietal divisions [1, 3, 4]. Ongoing examination of these
influence campaigns show evidence that not only has
Russia continued to use this tactic to support their pol-
icy narratives and objectives, but that other state and
non-state actors are emulating these tactics for their
own use [1, 3]. Since the events of 2016, Twitter [5]
and other social media platforms such as (but not lim-
ited to) Instagram, Facebook, and Tumblr [1, 4, 6] have
collected and published evidence of the IRAs efforts
to manipulate and deceive audiences both inside and
outside of the United States. Detection of troll-like
user accounts is a first step in uncovering larger state-
sponsored adversaries that are attempting to erode pub-
lic trust in democratic institutions and processes. Un-
covering these users, though, is currently a time- and
labor-intensive process that relies on analysts, subject
matter experts, or content moderators evaluating ac-
counts by hand in an effort to discover adversary nar-
ratives and map troll dissemination networks. Many
accounts, in order to evade detection, engage in the
process of persona-building, or posting otherwise harm-
less materials to help establish their footprint as a le-
gitimate account before publishing their deceptive or
manipulative payload [1]. This can make it difficult to
detect accounts of interest using solely content-based
metrics.
There is a large body of work in authorship attribu-
tion through use of stylometrics [7 -- 14], a field which at-
tempts to match documents of unknown origins to their
author. Stylometrics applies features like frequency of
specific punctuation and n-grams, number of characters
and words, part of speech usage, vocabulary diversity,
and spelling and grammatical errors. Stylometry, how-
ever, has only just begun to be applied to the field of
author similarity detection [15 -- 17], though it has been
proposed as early as 1987 with PCA [18, 19].
We believe that by applying stylometric features
to text and incorporating them into machine learning
pipelines, we will be able to accurately predict certain
behaviors or qualities of relevance to national security.
This would increase the speed and precision by which
analysts may identify problematic accounts, and allow
institutions to counter these information warfare cam-
paigns in a more timely and effective manner. Stylo-
metrics are also inherently devoid of metadata and, as
such, they are platform-agnostic; that is, a fully-realized
model should be able to detect similar users across plat-
forms.
In this work, we focus on binary classification of Twit-
1
ter data as a proof-of-concept for the use of stylomet-
rics on author similarity tasks; we explore a custom
troll/not-troll dataset, which shows high performance
across multiple machine learning models. We also high-
light current data limitations for author similarity tasks,
and consider which models and stylistic features are
most appropriate going forward.
II. Troll / not-Troll Dataset
We developed a binary classification dataset: troll au-
thors and non-troll authors. For the positive (troll) au-
thors, we used the dataset released by Twitter [5] which
contained tweets the platform attributed to the IRA's
information warfare campaign directed against the 2016
presidential elections. The IRA dataset contains tweets
from known IRA trolls, including many tweets of "in-
nocent" persona-building as well as more nefarious and
divisive tweets (narrative payloads). Overall this class
had over 53 million English tweets across 2,560 users.
The negative (not-troll) authors were taken from a gar-
den hose Twitter drip over five days of July 2019. This
class had over 21 million English tweets across over
125,000 users.
Overall we found this dataset to be adequate to show-
case the performance of our novel author similarity fea-
tures and to compare multiple analysis methods. How-
ever, due to several assumptions made on the part of
the authors, some limitations may exist in the dataset.
We assumed that troll-like behavior was not present or
otherwise negligible in the garden hose data. We also
assumed that weighing the models' loss functions for
the different classes would account for the extreme im-
balance in the number of authors for each label, and
that the imbalance in the number of tweets would not
affect performance. The final assumption is that the
two sources are similar enough to merge, even given
the multi-year gap between them.
III. Features
III.1. Readability
• The Dale-Chall readability formula [22] (DCRF):
DCRF =
words
0.1579(cid:18) difficult words
+0.0497(cid:18) words
sentences(cid:19)
+(3.6365
if difficult words
else
0
× 100(cid:19)
(1)
words
> 0.05,
,
where "easy" words are from a 3,000-word pre-
determined list [22], and "difficult" words are all
those which are not easy.
• The Automated readability index [23] (ARI):
ARI = 4.71(cid:18) characters
words (cid:19)
+ 0.5(cid:18) words
sentences(cid:19) − 21.43
(2)
• The SMOG index [24]:
SMOG = 1.043rpolysyllables ×
+ 3.1291,
30
sentences
(3)
where "polysyllables" refer to words which have 3
or more syllables.
• The Gunning fog index [25] (GFI):
GFI = 0.4h(cid:18) words
sentences(cid:19)
+ 100(cid:18) complex
words (cid:19)i,
(4)
where "complex" words are those which are both
polysyllables, as defined by SMOG, and are diffi-
cult words, as defined by DCRF.
• The Coleman-Liau index [26] (CLI):
words(cid:19)
CLI = 0.0588(cid:18) letters
− 0.2996(cid:18) sentences
words (cid:19) − 15.8
There are many instances where an author's writing
ability and command of the English language can be
informative. Non-native English speakers may have a
more limited vocabulary [20], or make common gram-
matical and spelling errors [21].
Intuition would also
suggest that a human author would write at about the
same level, regardless of the topic, platform, or user
account that they were currently using.
We propose using the following readability metrics
as features, all intended to (roughly) represent reading
grade level from 0 -- 12, in our author similarity task:
• The Flesch Kincaid grade level [27] (FKGL):
FKGL = 0.39(cid:18) words
sentences(cid:19)
words (cid:19) − 15.59
+ 11.8(cid:18) syllables
• The Linsear write formula [28] (LW):
LW =
LWr
2
−(1
0
if LWr > 20,
else
,
2
(5)
(6)
(7)
where the provisional result, LWr, is given by:
LWr =
2 × brachysyllables + 3 × polysyllables
sentences
,
(8)
where "brachysyllables" are words with 1 or 2 sylla-
bles, and "polysyllables" are words with 3 or more
syllables.
• The text standard (µ), as defined by the mode of
the above tests:
µ = mode(cid:0)DCRF, ARI, SMOG, GFI,
.
CLI, FKGL, LW(cid:1)
(9)
We use the mode to filter out extreme values and
accurately represent the models' consensus.
III.2. Lexical
A person's lexicon and use thereof should remain con-
sistent, regardless of topic. We identified several lexical
features to use in our author similarity model:
• Statistics on a user's post length; the minimum,
mean, median, and maximum number of characters
were each used as individual features.
• The minimum, mean, median, and maximum num-
ber of unique words in a post.
• The author's overall minimum, mean, and maxi-
mum word length.
• 1,000 features from what we are calling the "Bur-
rows' Z" metric, described in detail in Section III.4,
which effectively captures an author's unique lex-
ical fingerprint, as compared to other authors in
the corpus.
III.3. Syntactic
As with lexical features, a person's use of language
should remain consistent, even across varied topics. We
calculated syntactic features for each post, and aggre-
gated them at the author level in an attempt to capture
this effect. Author aggregations were the minimum,
mean, median, and maximum across all of their post
features. We calculated the post features as:
• Punctuation density (number of punctuation to-
kens divided by total number of tokens)
• Word density
• Digit density
• Special token (e.g. emoji) density
• Stop word density
• Meaningful word density
• Parts of speech densities; that is, for every present
part of speech (e.g. "adverb") the number of its
occurrences divided by the number of words
We have provided exact definitions for each of these
categories as outlined in Section III.4.
III.4. Technical Details
For all models, all text was converted to lowercase,
and tokens were separated from the text based on
whitespace. Non-alphabetic characters were treated as
separate tokens. Token classification was done with
the Python 3.6 string [29] library: punctuation to-
kens were considered to be any with a first character
present in punctuation, word tokens with first char-
acter in ascii, and digit tokens with first character
in digits. Special tokens were defined as any token
present that was neither punctuation, word, nor digit.
Stop words were any word token present within the En-
glish list provided by nltk's [30] corpus.stopwords.
Meaningful words were any word token not within the
stop word list. Part of speech tags were calculated us-
ing nltk's [30] pos tag, with only word-labeled tokens
passed to the parser. Words' syllables were calculated
with the pyphen [31] package. Sentences were counted
approximately, by summing the number of ".", "?", and
"!" special characters in each message. We forced a min-
imum count of one sentence.
We additionally developed a set of 1,000 lexical fea-
tures (given in Appendix I) adapted from Burrows'
Delta method [32], which has been routinely used in
author identification tasks. We call this feature set Bur-
rows' Z, defined as the element-wise Z-score for author
a:
Za = (Xa − µ) ⊙(cid:20) 1
σ0
, . . . ,
1
σn(cid:21) ,
(10)
where µ is the element-wise mean of all Xa, σ is the
element-wise standard deviation of the same (a vector
from σ0 to σn), ⊙ is the element-wise multiplicative
operator, and each Xa is defined by
Xa =
Pa(w0)
Pa(w1)
...
Pa(wn−1)
Pa(wn)
,
(11)
where Pa(wi) is the fraction of author a's words that
are wi. Each Xa is calculated with the n most-common
words in the corpus; in our case we chose the top 1,000.
Calculating the Burrows' Z-score in this manner has
several important side-effects. Firstly, the corpus is nor-
malized by author vectors, Xa, so that all authors are
equally weighted within µ, regardless of the number of
posts in the corpus. Secondly, each feature, Pa(wi), is
3
scaled by the standard deviation, σi, to better differ-
entiate usage at the tails of the distribution. Finally,
scaling by the mean and standard deviation of each fea-
ture means that all of the features lie on the same scale,
regardless of the frequency of their use within the cor-
pus.
All features (readability, lexical, and syntactic) were
de-skewed using the Yeo-Johnson [33] transform, as im-
plemented by sklearn [34], and then scaled to a mean
of 0 with a standard deviation of 1.
We constructed a fourth model, an ensemble voting
classifier, using sklearn [34]. The model used each of
the previous three models as sub-models, each imple-
mented with its best hyper-parameters and weighed by
its tuned performance, as defined by macro average F1-
score, given in Table 3. The voting was conducted with
soft voting, meaning that each model's probability of
a given prediction were taken into account during the
voting.
IV. Experiments
IV.2. Deep Learning Model
IV.1. Statistical Models
We built and optimized three independent machine
learning models:
random forest, support vector ma-
chine (SVM), and extreme gradient boost (XGBoost)
decision trees, as implemented by sklearn [34] and
xgboost [35], respectively. All models used balanced
class weights, such that each class contributed equally
to the loss.
We tuned the model hyper-parameters on the
troll/not-troll dataset using Ray/Tune 0.7.3 [36] with
1,000 trials for each model. Each trial had parame-
ters randomly selected from pre-determined distribu-
tions given in Table 1. The final parameters were taken
from the best models, as defined by macro average F1-
score on validation data, and given in Table 2.
Model
Parameter
Range
Random Estimators
Forest
Max. features
Max. depth
Min. sample leaf
Min. sample split
Z ∈ [20, 1000]
{log, sqrt}
Z ∈ [10, 110]
Z ∈ [1, 5]
Z ∈ [2, 10]
SVM
Kernel
*Penalty param.
{linear, rbf}
R ∈ [1e−1, 1e3]
XGBoost Estimators
Max. depth
*Learning rate
*Gamma
Deep
Learning Nodes per layer
Batch size
Hidden layers
*Learning rate
Z ∈ [20, 1000]
Z ∈ [1, 20]
R ∈ [1e−4, 1e−1]
R ∈ [1e−4, 1e0]
Z ∈ [8, 64]
Z ∈ [16, 128]
Z ∈ [0, 16]
R ∈ [1e−5, 1e2]
Table 1: Parameter ranges used during hyper-parameter
tuning of all models. All parameters were sampled from
a random uniform distribution except where noted with an
asterisk (*), which indicates a log-uniform distribution. In-
teger parameters are represented by the letter Z, and real-
valued numbers by R. Square brackets indicate that all num-
bers within the range were considered, including both end-
points. Curly braces indicate that the possible values were
a set of equally-likely non-numerical choices.
4
We created a deep learning model with densely-
connected layers using PyTorch 1.2.0 [37]. We used
the ReLU activation between each layer. Our final ac-
tivation was a sigmoid function, and our loss function
was binary cross-entropy, which we weighed such that
each category (e.g. "troll" or "not-troll") contributed
equally to the loss, regardless of any data imbalance.
We optimized using the Adam [38] optimizer, using be-
tas of 0.9 and 0.999, epsilon 1e−8, and weight decay
0.
We
refined the model hyper-parameters using
Ray/Tune 0.7.3 [36] to perform a meta-parameter
search on 32 (troll) trials with parameter selection cri-
teria given by Table 1. Trials were stopped early if the
test loss rose above 1.0 or at 10 epochs, whichever oc-
curred sooner. We chose the final parameters, given in
Table 2 from the trial epoch with the highest macro
average F1-score.
Model
Parameter
Random Estimators
Forest
Max. features
Max. depth
Min. sample leaf
Min. sample split
SVM
Kernel
Penalty param.
XGBoost Estimators
Max. depth
Learning rate
Gamma
Deep
Learning Nodes per layer
Batch size
Hidden layers
Learning rate
Best
Value
346
sqrt
10
4
4
rbf
1.0e0
705
4
9.0e−2
3.4e−1
61
118
6
5.6e−4
Table 2: The best meta-parameters for each model, as opti-
mized on the troll/not-troll dataset. The best models were
defined as those having the highest macro average F1-score.
Model
Macro
Precision Recall F1-score
Macro Macro
Random Forest
SVM
XGBoost
Voting
Deep Learning
0.99
0.91
0.99
0.99
0.96
0.90
0.92
0.93
0.90
0.91
0.94
0.92
0.96
0.94
0.93
Table 3: Performance results for all tuned models on the
troll/not-troll dataset. Precision can be thought of as the
true positive rate, and recall as the detection rate. Both are
reported as the macro average, which is the mean of both
troll and not-troll performance (equally weighted). The F1-
score is the harmonic mean of precision and recall. XGBoost
out-performs all other models on all measures.
V. Results and Discussion
Performance results across all models are given in Ta-
ble 3. Extreme gradient boost (XGBoost) out-performs
all other models across all metrics, and all of the
statistic-based models out-performed the deep learning
model. This is likely due to the deep learning model
overfitting the data very quickly -- almost all parameters'
F1-score peaked at only one epoch. Overfitting would
likely be slowed by much smaller learning rates, but it is
unlikely that the final performance would out-perform
that of XGBoost. For the troll/not-troll dataset, we
recommend using the XGBoost model, as it is the most
performant.
Our performance is quite high, despite our imple-
menting several readability features in Section III.1 in
a crude fashion. For instance, the SMOG index was
normalized on texts of 30 sentences, a length which we
were unable to match given the short-message format of
Twitter. We also made two concessions in favor of scal-
ability: while matching against the "easy" word list for
Dale-Chall and Gunning fog, we eschewed the require-
ment that words be compared against their base form.
We forwent accurate sentence delineation, instead elect-
ing to count sentences based on quantity of punctua-
tion. As we are measuring author similarity and not
grade-level reading, we are not so much concerned with
the accuracy of a given readability score, so much as
consistency and reproducibility, which our features pro-
vide.
Indeed, the high performance of all models on
the troll/not-troll dataset indicate that our feature se-
lection was appropriately predictive for this data.
It is possible that our models over-performed due
to the inherent structure of our data set, having been
joined from two disparate sources. For instance, the
word "epstein" was trending in the garden hose data
(8,171 uses) but not in the IRA dataset (202 uses),
which could be used to create very accurate labels based
on the time period difference, but not necessarily on the
users. Most words, however, did not appear to be repre-
sentative of a given time frame. On a surface level, these
words can appear to be quite mundane, but still highly
predictive of troll-like behavior (i.e. "sports," "local,"
or "news"). Many stopwords, which are by definition
not correlated to any particular time event, were also
indicative of trolls (i.e. "after," "against," or "over").
Other stopwords were anti-correlated with troll-like be-
havior (i.e. "dont," "been," or "ve"), which we hypothe-
size is due to language mastery, specifically with regard
to contractions. Overall, these seemingly-benign words
show some of the underlying structure of the troll-like
narratives, and in a manner detectable by our features.
Our approach provides a solid foundation for author
similarity detection, even with a noisy data source.
VI. Conclusions
High-volume author similarity and detection techniques
are critical, not only in research applications, but with
grave national security consequences. Through the
course of this study, we showed how the study of sty-
lometrics, mostly used for author attribution, could be
successfully adopted for author similarity and detection
tasks. Our classification models were highly performant
on our stlye-based features, independently of model se-
lection and implementation. Our results could be some-
what inflated due to the incongruence of our data set:
for future work, we heartily recommend more balanced
data all taken within the same context and time period.
Author similarity models should help not only pre-
vent future adversary-sponsored attempts at election
interference, but also in detecting other coordinated at-
tempts to sow discord, undermine civic trust in gov-
ernment institutions and processes, and propagate ad-
versarial policy objectives and narratives. Stylometric
features, specifically, are inherently well-suited to cross-
platform research and threat detection; they are not
limited to one social media website's metadata format.
As more robust datasets for author similarity emerge,
we expect to see stylometric features increase in promi-
nence. More complex features, such as bigrams, gram-
matical errors, and usage anomalies, should be inves-
tigated. We also hope to explore multilingual models
in order to remove the current requirement of English-
only text when threats exist world-wide. Finally, with
more refined data, features, and models, we would hope
to accomplish true author detection tasks. In particu-
lar, pinpointing a specific human with multiple user ac-
counts, rather than this first elementary step of binary
classification.
VII. References
[1] Select Committee on Intelligence. Russian Active Mea-
sures Campaigns and Interference in the 2016 U.S.
Election, Report 116-XX, volume 2: Russia's use of
5
Social Media with Additional Views. United States
Senate, 116th Congress, 1st Session.
[2] Assessment, I. C. Assessing russian activities and inten-
tions in recent US elections 2017-01d. Technical report,
Office of the Director of National Intelligence, 2017.
[3] Mazarr, M. J., et al. Hostile social manipulation
present realities and emerging trends. Technical report,
RAND Corporation Santa Monica United States, 2019.
[4] DiResta, R., et al. The Tactics & Tropes of the Internet
Research Agency. New Knowledge, 2018.
[5] Twitter.
IRA Twitter data,
2018.
URL
[18] Burrows, J. F. Word-patterns and story-shapes: The
statistical analysis of narrative style. Literary & Lin-
guistic Computing, 2(2):61 -- 70, 1987.
[19] Burrows, J. F. Not unles you ask nicely: The interpreta-
tive nexus between analysis and information. Literary
and Linguistic Computing, 7(2):91 -- 109, 1992.
[20] Mokhtar, A. A. Achieving native-like English lexical
knowledge: The non-native story. Journal of Language
Teaching & Research, 1(4), 2010.
[21] Futagi, Y., P. Deane, M. Chodorow, and J. Tetreault.
A computational approach to detecting collocation er-
rors in the writing of non-native speakers of English.
Computer Assisted Language Learning, 21(4):353 -- 367,
2008.
https://about.twitter.com/en_us/values/elections-integrity.html#data.
[6] Tumbler.
Public record of usernames linked to
state-sponsored disinformation campaigns, 2018. URL
https://tumblr.zendesk.com/hc/en-us/articles/360002280214.
[22] Chall, J. S. and E. Dale. Readability Revisited: The
New Dale-Chall Readability Formula. Brookline Books,
1995.
[7] Malyutov, M. B. Authorship attribution of texts: A
review. In General Theory of Information Transfer and
Combinatorics, pages 362 -- 380. Springer, 2006.
[8] Pavelec, D., et al. Compression and stylometry for au-
thor identification.
In 2009 International Joint Con-
ference on Neural Networks, pages 2445 -- 2450. IEEE,
2009.
[9] Stamatatos, E. A survey of modern authorship at-
tribution methods. Journal of the American Society
for information Science and Technology, 60(3):538 -- 556,
2009.
[10] Layton, R., P. Watters, and R. Dazeley. Authorship
attribution for Twitter in 140 characters or less.
In
2010 Second Cybercrime and Trustworthy Computing
Workshop, pages 1 -- 8. IEEE, 2010.
[11] Narayanan, A., et al. On the feasibility of internet-
scale author identification. In 2012 IEEE Symposium
on Security and Privacy, pages 300 -- 314. IEEE, 2012.
[12] Rocha, A., et al. Authorship attribution for social
IEEE Transactions on Information
media forensics.
Forensics and Security, 12(1):5 -- 33, 2016.
[13] Overdorf, R. and R. Greenstadt. Blogs, Twitter feeds,
and reddit comments: Cross-Domain authorship attri-
bution. Proceedings on Privacy Enhancing Technolo-
gies, 2016(3):155 -- 171, 2016.
[14] Neal, T., et al. Surveying stylometry techniques and ap-
plications. ACM Computing Surveys (CSUR), 50(6):86,
2018.
[15] Stolerman, A., R. Overdorf, S. Afroz, and R. Green-
stadt. Classify, but verify: Breaking the closed-world
assumption in stylometric authorship attribution.
In
IFIP Working Group, volume 11, page 64. 2013.
[16] Afroz, S., et al. Doppelganger finder: Taking stylome-
try to the underground. In 2014 IEEE Symposium on
Security and Privacy, pages 212 -- 226. IEEE, 2014.
[17] Almishari, M., D. Kaafar, E. Oguz, and G. Tsudik. Sty-
lometric linkability of tweets. In Proceedings of the 13th
Workshop on Privacy in the Electronic Society, pages
205 -- 208. ACM, 2014.
[23] Smith, E. A. and R. J. Senter. Automated readability
index. Aerospace Medical Research Laboratories, 1967.
[24] McLaughlin, G. H. SMOG grading -- A new readability
formula. Journal of Reading, 12(8):639 -- 646, 1969.
[25] Gunning, R. Technique of Clear Writing. McGraw-Hill,
1968.
[26] Coleman, M. and T. L. Liau. A computer readabil-
ity formula designed for machine scoring. Journal of
Applied Psychology, 60(2):283, 1975.
[27] Kincaid, J. P., R. P. Fishburne Jr, R. L. Rogers, and
B. S. Chissom. Derivation of new readability formu-
las (automated readability index, fog count and flesch
reading ease formula) for Navy enlisted personnel. In-
stitute for Simulation and Training, University of Cen-
tral Florida, 1975.
[28] Klare, G. R. Assessing readability. Reading Research
Quarterly, 10(1):62 -- 102, 1974.
[29] Python
Software
--
Common
URL
https://docs.python.org/3.6/library/string.html.
Foundation.
operations,
string
string
2016.
[30] Bird, S., E. Klein, and E. Loper. Natural Language Pro-
cessing With Python: Analyzing Text With The Natural
Language Toolkit. O'Reilly Media, Inc., 2009.
[31] Kozea Community.
https://pyphen.org.
Pyphen,
2008.
URL
[32] Burrows, J. Delta: A measure of stylistic difference and
a guide to likely authorship. Literary and Linguistic
Computing, 17(3):267 -- 287, 2002.
[33] Yeo, I.-K. and R. A. Johnson. A new family of power
transformations to improve normality or symmetry.
Biometrika, 87(4):954 -- 959, 2000.
[34] Pedregosa, F., et al. Scikit-learn: Machine learning
Journal of Machine Learning Research,
in Python.
12:2825 -- 2830, 2011.
[35] Chen, T. and C. Guestrin. XGBoost: A scalable tree
boosting system.
In Proceedings of the 22nd ACM
SIGKDD International Conference on Knowledge Dis-
covery and Data Mining, pages 785 -- 794. ACM, New
York, NY, USA, 2016.
6
[36] Liaw, R., et al. Tune: A research platform for dis-
tributed model selection and training. arXiv preprint
arXiv:1807.05118, 2018.
[37] Paszke, A., et al. Automatic differentiation in PyTorch.
In NIPS Autodiff Workshop. 2017.
[38] Kingma, D. P. and J. Ba. Adam: A method for stochas-
arXiv preprint arXiv:1412.6980,
tic optimization.
2014.
7
Appendix I: Top
troll/not-troll dataset
1,000 words
in
token
9
1
0
2
c
e
D
8
]
I
S
.
s
c
[
1
v
0
5
7
3
0
.
2
1
9
1
:
v
i
X
r
a
All word tokens used in the calculation of Burrows' Z.
The number of uses (counts) are the number of times
that token (regardless of case) appeared in our troll
corpus. The troll percentage is the percentage of usages
by positively-labeled trolls. Trolls accounted for 72.00%
of the word tokens in the corpus. We also show the
percentage points from random chance for each word
token. Stopword tokens are indicated in bold.
word token
number
of uses
troll per-
centage
foke
fukushima2015
fukushimaagain
blicqer
giselleevns
danageezus
blacklivesmatter
topnews
uthornsrawk
lsu
sanjose
pjnet
enlist
showbiz
newyork
workout
cleveland
sports
tcot
talibkweli
ukraine
exercise
fatal
baltimore
politics
kansas
mt
shooting
syria
obamacare
local
charlottesville
suspect
nfl
midnight
news
injured
chicago
cruz
crash
isis
hillary
entertainment
comey
nuclear
28,633
14,575
9,318
8,795
7,463
7,210
15,236
16,425
8,502
7,794
8,284
10,601
6,302
10,927
13,795
44,690
12,268
105,633
14,141
6,697
12,800
15,376
6,506
11,477
85,456
7,637
6,410
26,920
10,845
7,675
62,112
6,434
12,981
12,724
13,504
280,799
10,135
37,828
7,177
16,080
18,457
41,684
11,457
8,482
13,218
100.0
100.0
100.0
100.0
100.0
100.0
99.94
99.92
99.88
99.80
99.80
99.76
99.66
99.62
99.62
99.47
99.33
99.23
99.21
99.17
99.00
98.71
98.63
98.45
98.29
98.28
98.20
98.02
97.93
97.90
97.89
97.77
97.77
97.64
97.45
97.36
97.27
97.22
97.21
97.12
96.98
96.95
96.80
96.80
96.65
points
from
random
(72.00)
+27.99
+27.99
+27.99
+27.99
+27.99
+27.99
+27.93
+27.92
+27.88
+27.80
+27.80
+27.76
+27.66
+27.62
+27.62
+27.47
+27.33
+27.22
+27.21
+27.17
+27.00
+26.71
+26.63
+26.45
+26.29
+26.28
+26.20
+26.02
+25.93
+25.90
+25.89
+25.77
+25.77
+25.64
+25.45
+25.35
+25.27
+25.22
+25.21
+25.11
+24.98
+24.94
+24.80
+24.80
+24.65
baseball
texas
dies
cops
orleans
arizona
foxnews
bush
police
christmas
stocks
weight
county
san
officer
obama
ohio
charged
islamic
driver
clinton
north
gun
debate
health
cop
russia
ban
march
teen
rap
environment
budget
sanders
loss
maga
rally
breaking
turkey
officers
shot
fired
trial
murder
houston
viral
coach
business
tech
killed
islam
quote
fbi
louisiana
schools
hillaryclinton
east
mayor
liberals
student
university
students
nyc
1
count
9,326
31,408
12,687
12,978
11,948
6,392
11,284
7,075
75,410
8,027
6,649
10,565
16,190
17,726
14,784
74,987
7,790
13,819
7,552
7,962
37,896
17,414
14,372
9,847
36,862
9,530
18,950
9,232
6,747
10,333
14,825
6,852
6,661
8,700
8,435
23,924
9,212
58,196
6,787
7,232
24,120
7,542
7,285
12,366
7,067
6,304
6,589
39,739
15,139
29,967
6,460
13,455
13,250
7,953
6,468
7,547
8,590
9,826
10,648
8,357
6,431
8,955
13,946
troll %
points
96.63
96.61
96.59
96.36
96.18
96.05
95.79
95.63
95.61
95.58
95.47
95.25
95.19
95.14
94.97
94.85
94.82
94.54
94.43
94.43
94.29
94.18
94.16
93.95
93.95
93.92
93.71
93.59
93.59
93.51
93.44
93.38
93.37
93.10
93.05
92.95
92.94
92.92
92.91
92.78
92.73
92.66
92.57
92.36
92.27
92.24
92.16
92.09
92.08
92.07
92.04
91.84
91.81
91.72
91.65
91.51
91.46
91.42
91.40
91.39
91.36
91.22
91.20
+24.63
+24.61
+24.59
+24.36
+24.18
+24.05
+23.79
+23.63
+23.61
+23.58
+23.47
+23.25
+23.19
+23.14
+22.97
+22.85
+22.82
+22.54
+22.43
+22.43
+22.29
+22.18
+22.16
+21.95
+21.95
+21.92
+21.71
+21.59
+21.59
+21.51
+21.44
+21.38
+21.37
+21.10
+21.05
+20.95
+20.94
+20.92
+20.91
+20.78
+20.73
+20.66
+20.57
+20.36
+20.27
+20.24
+20.16
+20.08
+20.07
+20.06
+20.04
+19.84
+19.81
+19.72
+19.64
+19.51
+19.46
+19.41
+19.40
+19.39
+19.36
+19.22
+19.20
token
fire
terror
california
senate
governor
crime
arrested
science
protesters
korea
near
guilty
death
violence
football
wins
accused
reports
plans
http
hospital
state
protest
russian
west
florida
bill
arrest
muslims
officials
claims
study
usa
liberal
presidential
charges
gov
refugees
dead
threat
calls
poll
john
supporters
college
washington
school
car
search
drug
judge
st
battle
ny
gop
victim
election
george
freedom
fraud
latest
woman
talks
count
25,081
6,619
13,457
12,432
6,586
17,708
19,781
7,753
6,330
11,232
12,701
8,387
24,971
9,990
8,543
9,307
12,238
9,046
8,089
16,494
6,548
39,911
7,579
10,814
12,474
8,024
24,629
7,988
7,414
11,239
9,812
7,406
19,999
10,730
7,821
9,103
7,053
8,155
25,009
7,315
15,508
9,948
15,772
8,583
10,025
9,692
26,209
20,274
6,683
8,273
15,304
12,522
6,344
6,337
24,482
6,473
15,674
6,997
9,781
6,269
13,380
40,607
7,454
troll %
points
token
count
troll %
points
12,683
10,125
10,031
6,615
16,311
13,086
11,311
9,359
14,746
10,895
8,577
21,360
19,274
15,312
12,764
7,577
102,054
11,460
53,886
6,372
6,630
9,224
54,695
7,496
9,396
18,775
12,258
9,892
10,831
15,547
7,841
11,180
7,507
17,051
31,799
29,167
7,413
7,784
21,419
6,348
6,813
11,230
7,573
10,004
10,311
6,828
6,915
19,155
7,953
22,458
15,611
11,075
9,610
221,430
102,962
25,350
21,338
12,791
28,181
13,098
13,566
10,659
20,374
87.14
87.00
86.93
86.89
86.89
86.86
86.85
86.77
86.72
86.67
86.61
86.61
86.56
86.53
86.50
86.40
86.38
86.30
86.24
86.20
86.13
86.09
86.04
85.97
85.94
85.76
85.73
85.72
85.65
85.60
85.46
85.45
85.40
85.38
85.33
85.31
85.30
85.29
85.01
84.98
84.98
84.95
84.82
84.74
84.74
84.73
84.72
84.72
84.72
84.70
84.57
84.55
84.40
84.27
84.24
84.23
84.15
84.14
84.02
84.00
83.89
83.76
83.66
+15.14
+15.00
+14.92
+14.89
+14.89
+14.86
+14.85
+14.77
+14.72
+14.67
+14.61
+14.60
+14.56
+14.53
+14.50
+14.40
+14.37
+14.30
+14.24
+14.20
+14.13
+14.08
+14.04
+13.97
+13.93
+13.76
+13.73
+13.72
+13.65
+13.60
+13.45
+13.45
+13.39
+13.38
+13.33
+13.31
+13.30
+13.28
+13.01
+12.98
+12.98
+12.95
+12.82
+12.74
+12.74
+12.73
+12.72
+12.72
+12.72
+12.70
+12.57
+12.54
+12.40
+12.27
+12.23
+12.23
+12.15
+12.14
+12.01
+12.00
+11.89
+11.76
+11.65
91.17
91.08
91.01
90.98
90.98
90.96
90.77
90.54
90.45
90.44
90.39
90.34
90.28
90.18
90.05
89.94
89.93
89.78
89.76
89.75
89.70
89.66
89.64
89.49
89.45
89.34
89.23
89.23
89.20
89.12
89.11
89.08
89.06
89.04
88.99
88.93
88.91
88.90
88.82
88.81
88.73
88.70
88.60
88.52
88.41
88.41
88.30
88.16
88.14
88.11
88.08
88.03
87.98
87.97
87.75
87.74
87.58
87.52
87.46
87.46
87.44
87.27
87.25
+19.17
+19.08
+19.01
+18.98
+18.97
+18.96
+18.77
+18.54
+18.45
+18.44
+18.39
+18.34
+18.28
+18.17
+18.04
+17.94
+17.93
+17.78
+17.76
+17.75
+17.70
+17.66
+17.64
+17.49
+17.45
+17.34
+17.23
+17.23
+17.20
+17.12
+17.11
+17.08
+17.06
+17.04
+16.98
+16.93
+16.91
+16.90
+16.82
+16.81
+16.73
+16.69
+16.59
+16.52
+16.41
+16.41
+16.30
+16.16
+16.14
+16.11
+16.08
+16.03
+15.98
+15.97
+15.75
+15.74
+15.58
+15.52
+15.46
+15.46
+15.44
+15.27
+15.25
ex
killing
speech
defense
lose
tax
missing
attacks
south
lead
investigation
report
court
campaign
muslim
bernie
man
park
says
cancer
fat
wall
black
success
street
cnn
lives
prison
military
plan
afraid
la
ahead
war
true
city
meeting
victims
potus
problems
david
security
voters
gives
iran
return
patriots
attack
fox
donald
national
fall
james
trump
after
found
fight
takes
game
kill
star
hurt
run
2
token
possible
former
leaders
j
https
force
race
peace
players
case
truth
climate
china
may
early
hit
chief
among
hits
train
york
million
control
gets
top
video
caught
change
service
world
worth
five
high
htt
rock
money
matter
jobs
beat
monday
against
die
year
son
winning
rape
trade
mother
dog
died
ft
new
saturday
secret
deal
air
life
jail
tv
center
policy
broken
vs
count
troll %
points
token
count
troll %
points
12,629
7,431
16,503
15,148
12,735
6,636
8,575
7,544
7,580
48,934
6,276
9,418
13,874
10,724
10,058
7,202
75,434
7,293
10,387
11,998
27,376
8,659
40,117
9,917
11,002
9,499
46,709
14,803
6,904
8,404
22,817
8,409
8,807
20,503
15,480
7,884
8,810
10,834
6,486
13,257
6,943
6,655
11,659
787,576
7,306
9,518
8,007
19,882
15,794
12,571
15,575
9,510
11,040
6,324
7,240
11,234
32,570
8,210
31,332
9,516
37,111
7,747
6,682
80.44
80.36
80.33
80.28
80.22
80.16
80.16
80.06
80.02
79.98
79.95
79.95
79.85
79.84
79.83
79.70
79.65
79.65
79.61
79.61
79.59
79.58
79.48
79.48
79.47
79.43
79.35
79.33
79.28
79.27
79.26
79.15
79.15
79.12
78.98
78.98
78.92
78.91
78.90
78.88
78.87
78.84
78.83
78.76
78.74
78.69
78.65
78.48
78.42
78.38
78.38
78.33
78.32
78.30
78.30
78.20
78.15
78.12
78.11
78.11
78.10
78.10
78.06
+8.44
+8.36
+8.32
+8.27
+8.22
+8.16
+8.16
+8.06
+8.02
+7.98
+7.95
+7.95
+7.85
+7.84
+7.83
+7.69
+7.65
+7.65
+7.61
+7.61
+7.59
+7.58
+7.48
+7.48
+7.47
+7.43
+7.35
+7.33
+7.28
+7.27
+7.26
+7.15
+7.15
+7.12
+6.98
+6.98
+6.92
+6.91
+6.90
+6.88
+6.86
+6.84
+6.83
+6.76
+6.74
+6.69
+6.65
+6.48
+6.42
+6.38
+6.38
+6.33
+6.32
+6.30
+6.29
+6.20
+6.15
+6.12
+6.11
+6.10
+6.10
+6.10
+6.05
8,769
16,979
6,978
10,662
67,955
7,785
11,948
8,816
6,372
18,632
17,734
6,536
11,496
34,566
9,317
18,215
9,437
6,656
7,319
7,416
11,358
19,845
10,746
21,234
31,253
57,773
7,387
22,311
8,834
81,513
10,797
6,912
21,834
8,888
7,544
35,021
15,758
8,465
11,247
7,399
36,139
11,177
48,396
10,613
7,802
6,593
7,020
10,565
11,871
7,172
6,478
127,684
6,740
7,678
19,520
9,943
68,278
8,085
10,859
8,329
6,474
6,701
11,630
83.65
83.63
83.57
83.50
83.45
83.30
83.23
83.21
83.20
83.16
83.06
82.98
82.95
82.91
82.89
82.79
82.76
82.76
82.71
82.68
82.67
82.61
82.58
82.44
82.43
82.42
82.40
82.38
82.26
82.25
82.21
82.20
82.05
81.97
81.90
81.72
81.66
81.66
81.51
81.51
81.43
81.43
81.37
81.28
81.19
81.05
81.01
80.95
80.93
80.89
80.88
80.86
80.78
80.72
80.72
80.71
80.69
80.66
80.63
80.53
80.53
80.52
80.44
+11.65
+11.63
+11.57
+11.50
+11.45
+11.29
+11.23
+11.21
+11.20
+11.16
+11.05
+10.98
+10.95
+10.91
+10.89
+10.79
+10.76
+10.76
+10.71
+10.68
+10.67
+10.61
+10.58
+10.44
+10.43
+10.42
+10.40
+10.37
+10.26
+10.24
+10.21
+10.20
+10.05
+9.97
+9.90
+9.72
+9.66
+9.66
+9.51
+9.50
+9.43
+9.43
+9.37
+9.28
+9.19
+9.05
+9.01
+8.95
+8.93
+8.89
+8.88
+8.86
+8.78
+8.72
+8.72
+8.70
+8.69
+8.66
+8.63
+8.53
+8.53
+8.52
+8.44
others
community
fake
water
goes
general
pro
michael
awesome
white
billion
strong
side
past
photos
wake
over
dem
federal
sometimes
win
worst
house
inside
antifa
record
america
stand
bank
father
makes
late
action
during
set
walk
friday
justice
released
shows
rules
games
food
in
fear
wife
major
law
cause
body
history
al
future
issues
tells
special
media
system
home
leader
old
visit
cat
3
token
via
political
terrorist
lies
pay
ryan
power
facebook
paul
open
due
break
public
family
behind
republicans
americans
live
must
without
rights
running
office
ht
meet
road
class
town
step
sexual
safe
de
problem
mind
become
face
season
second
won
down
cut
head
low
wants
questions
line
joe
self
under
government
outside
lost
three
turn
two
anti
great
art
happened
make
dems
storm
perfect
count
troll %
points
token
count
troll %
points
6,861
11,174
9,810
7,217
11,023
16,927
8,032
45,123
27,402
43,924
6,741
32,807
10,251
7,659
23,945
10,044
13,033
9,650
15,581
9,842
6,612
22,743
6,598
6,718
8,090
9,322
7,694
9,928
7,721
8,579
7,681
6,865
6,728
37,724
9,920
7,500
9,934
60,234
24,974
17,647
9,148
8,178
9,389
6,622
9,964
232,479
35,667
32,493
8,028
6,403
15,201
12,488
659,166
21,252
6,990
21,657
63,784
12,962
8,638
6,294
6,396
13,131
7,129
76.11
76.06
76.06
76.04
76.03
76.00
75.97
75.89
75.89
75.88
75.87
75.84
75.84
75.83
75.82
75.71
75.70
75.68
75.66
75.64
75.60
75.59
75.58
75.57
75.55
75.53
75.39
75.35
75.33
75.33
75.32
75.32
75.26
75.20
75.19
75.17
75.15
75.11
75.11
75.11
75.08
75.07
75.03
74.96
74.93
74.93
74.92
74.84
74.83
74.74
74.73
74.72
74.65
74.53
74.43
74.42
74.42
74.40
74.26
74.24
74.23
74.20
74.20
+4.11
+4.06
+4.06
+4.04
+4.03
+4.00
+3.96
+3.89
+3.89
+3.88
+3.87
+3.84
+3.84
+3.83
+3.82
+3.71
+3.70
+3.68
+3.66
+3.64
+3.60
+3.59
+3.58
+3.57
+3.54
+3.52
+3.39
+3.35
+3.33
+3.33
+3.32
+3.32
+3.26
+3.20
+3.19
+3.17
+3.15
+3.11
+3.11
+3.11
+3.08
+3.07
+3.03
+2.96
+2.93
+2.92
+2.92
+2.83
+2.83
+2.74
+2.73
+2.72
+2.64
+2.53
+2.43
+2.42
+2.42
+2.40
+2.26
+2.24
+2.23
+2.20
+2.20
42,667
10,352
7,819
7,411
14,083
7,571
19,070
8,874
9,201
17,325
6,349
11,063
12,316
23,461
11,542
9,372
16,956
36,996
27,337
23,115
11,062
9,733
11,642
7,885
11,595
8,897
7,148
7,303
6,523
6,513
8,300
7,264
10,742
15,619
11,579
19,493
10,869
12,286
27,779
47,488
8,053
15,218
6,473
17,774
7,067
9,890
6,408
9,469
18,868
16,776
8,773
14,791
12,467
10,691
32,482
17,497
39,449
9,952
9,731
69,954
11,912
6,779
9,805
78.02
78.00
77.86
77.85
77.85
77.84
77.83
77.81
77.74
77.73
77.71
77.63
77.48
77.41
77.41
77.36
77.33
77.30
77.27
77.23
77.22
77.22
77.22
77.19
77.19
77.12
77.07
77.06
76.95
76.95
76.95
76.94
76.91
76.91
76.90
76.88
76.81
76.75
76.73
76.73
76.71
76.70
76.67
76.65
76.58
76.57
76.56
76.55
76.51
76.50
76.45
76.43
76.37
76.37
76.35
76.29
76.29
76.28
76.28
76.26
76.25
76.25
76.17
+6.01
+6.00
+5.86
+5.85
+5.85
+5.84
+5.83
+5.81
+5.74
+5.73
+5.71
+5.63
+5.48
+5.41
+5.41
+5.36
+5.33
+5.30
+5.27
+5.23
+5.22
+5.22
+5.21
+5.19
+5.19
+5.12
+5.06
+5.06
+4.95
+4.95
+4.95
+4.93
+4.91
+4.91
+4.90
+4.88
+4.81
+4.75
+4.73
+4.73
+4.71
+4.70
+4.67
+4.64
+4.57
+4.57
+4.55
+4.55
+4.51
+4.50
+4.44
+4.43
+4.37
+4.37
+4.35
+4.29
+4.29
+4.28
+4.28
+4.26
+4.24
+4.24
+4.17
series
comes
list
paid
move
job
trust
into
nothing
off
daughter
things
sign
un
believe
super
join
republican
stay
save
brown
away
mark
company
shut
learn
ones
red
mueller
chance
daily
mexico
cover
could
weekend
release
stupid
than
care
wrong
small
light
happen
issue
eat
at
watch
american
gay
lying
child
hell
s
n
himself
end
never
words
dream
thinks
deep
young
israel
4
token
co
more
for
times
us
play
between
another
tomorrow
press
work
mom
cannot
to
close
tried
take
crazy
place
women
king
everything
alone
before
by
find
long
lie
big
least
try
app
moment
on
start
real
wanted
day
president
say
will
left
doesn
music
pick
sick
forget
mike
message
week
huge
official
through
call
again
night
of
kids
bring
easy
living
protect
smile
count
troll %
points
token
count
troll %
points
31,185
121,907
23,286
10,025
23,971
8,722
23,427
9,616
12,448
109,820
31,478
8,709
7,036
15,985
9,756
27,438
274,393
9,905
51,218
11,370
8,094
45,012
10,304
34,737
30,461
10,976
9,885
79,009
24,861
175,889
52,202
7,740
6,626
9,683
7,881
11,055
9,141
43,638
8,846
37,826
7,084
6,309
15,836
7,113
149,723
6,455
14,381
13,741
44,767
124,788
9,167
156,218
8,005
16,218
46,970
6,363
20,290
8,119
6,765
8,438
57,495
6,551
19,254
72.37
72.35
72.28
72.26
72.23
72.21
72.21
72.19
72.18
72.15
72.13
72.07
72.07
72.06
72.04
72.04
72.01
72.00
72.00
71.98
71.96
71.95
71.94
71.92
71.90
71.89
71.84
71.76
71.76
71.74
71.69
71.69
71.64
71.64
71.56
71.56
71.55
71.55
71.53
71.51
71.48
71.46
71.44
71.43
71.39
71.38
71.31
71.31
71.31
71.28
71.27
71.21
71.20
71.15
71.10
71.03
71.01
70.99
70.98
70.97
70.96
70.95
70.93
+0.37
+0.35
+0.28
+0.26
+0.23
+0.21
+0.21
+0.19
+0.18
+0.15
+0.13
+0.07
+0.07
+0.06
+0.04
+0.04
+0.01
+0.00
+0.00
-0.01
-0.03
-0.04
-0.05
-0.07
-0.09
-0.10
-0.15
-0.23
-0.23
-0.25
-0.30
-0.30
-0.35
-0.36
-0.43
-0.44
-0.44
-0.45
-0.46
-0.48
-0.51
-0.53
-0.55
-0.56
-0.61
-0.61
-0.68
-0.68
-0.68
-0.71
-0.72
-0.78
-0.79
-0.84
-0.89
-0.96
-0.98
-1.00
-1.01
-1.02
-1.03
-1.05
-1.06
74.11
7,743
74.11
98,676
74.11
534,952
74.05
16,653
73.97
87,455
73.95
17,237
73.95
11,695
73.94
27,838
73.86
11,211
73.82
8,031
73.82
30,182
73.81
11,831
8,506
73.75
1,201,900 73.74
73.74
9,742
73.73
7,355
43,665
73.72
73.67
8,166
73.66
13,920
73.56
34,276
73.53
9,986
22,127
73.48
73.44
8,236
73.43
32,136
73.42
148,300
73.38
23,049
73.37
22,337
8,617
73.34
73.31
30,027
73.29
10,995
73.28
16,730
73.26
7,315
10,655
73.25
73.20
401,509
73.18
19,397
73.17
29,643
73.16
10,987
67,552
73.13
73.08
57,943
73.05
54,576
72.97
143,648
72.96
24,848
72.90
28,058
24,237
72.89
72.85
6,969
72.84
8,397
72.84
13,037
72.83
7,786
6,972
72.83
72.82
22,192
72.81
6,648
72.75
10,532
72.74
18,927
22,671
72.71
72.71
37,164
72.66
22,315
72.64
717,733
72.55
16,278
10,345
72.52
72.47
6,488
72.43
8,315
72.41
7,262
8,217
72.38
+2.11
+2.11
+2.11
+2.05
+1.97
+1.95
+1.95
+1.94
+1.86
+1.82
+1.82
+1.81
+1.75
+1.74
+1.74
+1.73
+1.72
+1.66
+1.66
+1.56
+1.53
+1.48
+1.44
+1.43
+1.42
+1.38
+1.37
+1.34
+1.30
+1.29
+1.28
+1.25
+1.25
+1.20
+1.18
+1.17
+1.16
+1.13
+1.08
+1.05
+0.97
+0.96
+0.90
+0.89
+0.84
+0.84
+0.84
+0.83
+0.83
+0.82
+0.81
+0.75
+0.74
+0.71
+0.70
+0.66
+0.63
+0.55
+0.52
+0.47
+0.43
+0.41
+0.38
better
people
next
photo
men
sunday
bad
important
tonight
love
help
parents
short
enough
order
something
with
act
first
racism
fighting
ll
hold
years
show
taking
eyes
u
own
what
right
crisis
fast
four
cool
wish
heard
best
gone
stop
kim
loves
story
blue
as
taken
needs
ready
look
up
less
from
following
boy
still
continue
use
knows
biggest
ppl
need
poor
heart
5
token
reason
days
understand
dad
lol
be
no
person
immigration
rich
means
half
buy
does
mad
gave
t
nation
way
wouldn
who
d
else
minutes
about
nowplaying
agree
looks
not
support
book
rest
phone
keep
funny
little
hands
while
out
hope
nice
idea
age
hard
called
time
give
hate
children
don
later
should
wonder
looking
until
group
get
word
congress
final
month
w
respect
count
troll %
points
11,308
18,488
11,466
6,415
24,693
239,919
128,801
24,871
10,053
6,800
8,867
7,949
11,010
27,887
7,984
8,416
368,688
7,750
42,701
6,689
149,564
36,942
12,363
6,884
131,104
8,453
9,609
16,325
210,466
22,878
11,170
7,341
8,530
27,964
10,398
21,766
6,905
25,338
117,249
20,879
12,519
7,561
6,498
19,463
17,194
80,339
29,400
26,690
18,215
125,595
6,431
49,120
6,693
16,646
13,327
13,409
101,518
10,098
15,208
8,827
7,839
24,856
7,061
70.92
70.89
70.87
70.83
70.81
70.80
70.74
70.71
70.65
70.64
70.58
70.54
70.43
70.39
70.37
70.33
70.31
70.27
70.26
70.23
70.23
70.22
70.20
70.20
70.17
70.17
70.12
70.08
70.07
70.07
70.02
70.00
69.97
69.97
69.96
69.93
69.83
69.81
69.77
69.77
69.76
69.76
69.75
69.75
69.72
69.70
69.69
69.69
69.68
69.65
69.63
69.62
69.62
69.58
69.56
69.55
69.55
69.51
69.50
69.46
69.43
69.43
69.39
-1.07
-1.10
-1.12
-1.16
-1.18
-1.19
-1.25
-1.28
-1.34
-1.35
-1.41
-1.45
-1.56
-1.60
-1.62
-1.67
-1.68
-1.73
-1.73
-1.76
-1.76
-1.77
-1.79
-1.79
-1.82
-1.82
-1.87
-1.91
-1.92
-1.92
-1.97
-1.99
-2.02
-2.02
-2.03
-2.06
-2.16
-2.18
-2.22
-2.22
-2.23
-2.23
-2.24
-2.24
-2.27
-2.29
-2.30
-2.30
-2.31
-2.34
-2.36
-2.37
-2.37
-2.41
-2.43
-2.44
-2.44
-2.48
-2.49
-2.53
-2.56
-2.56
-2.60
token
can
party
team
online
always
girl
post
states
myself
human
there
o
good
flag
working
trying
got
too
c
is
thing
put
around
every
someone
those
waiting
sex
cry
god
free
room
gotta
only
it
anything
a
making
using
our
baby
thanks
made
most
your
used
the
going
tell
yourself
why
ain
morning
last
l
leave
clear
think
isn
forever
its
are
ask
6
count
troll %
points
69.38
163,704
69.33
20,960
69.29
16,127
69.28
8,298
69.24
35,321
69.18
25,745
69.16
17,267
69.12
11,801
69.08
9,747
69.07
10,963
69.06
78,019
69.05
17,221
69.03
67,893
69.01
8,518
69.01
11,090
69.01
20,930
68.96
46,612
68.96
48,058
68.86
16,086
68.86
605,936
68.79
26,671
68.75
19,328
68.65
17,405
68.61
36,235
68.58
34,734
68.56
28,402
68.56
7,058
68.54
17,312
68.53
6,804
68.48
32,541
68.47
29,637
68.46
7,710
68.41
7,628
68.41
61,076
68.40
418,877
68.39
16,498
68.31
809,249
68.29
15,359
68.26
10,448
68.18
93,644
68.15
18,196
68.15
17,954
68.09
27,773
68.04
35,493
68.01
187,607
12,964
68.01
1,360,727 67.93
67.88
42,230
25,568
67.87
67.86
17,953
67.83
68,491
67.80
10,746
67.78
20,276
28,236
67.74
67.74
9,980
67.59
15,711
67.57
6,323
67.57
52,491
17,356
67.56
67.51
6,376
67.50
30,168
67.50
253,816
13,041
67.45
-2.61
-2.66
-2.70
-2.71
-2.75
-2.81
-2.83
-2.88
-2.91
-2.92
-2.93
-2.94
-2.96
-2.98
-2.98
-2.99
-3.03
-3.04
-3.13
-3.13
-3.20
-3.24
-3.34
-3.38
-3.41
-3.43
-3.44
-3.45
-3.46
-3.51
-3.52
-3.53
-3.58
-3.58
-3.59
-3.61
-3.69
-3.70
-3.73
-3.81
-3.84
-3.84
-3.90
-3.95
-3.98
-3.98
-4.06
-4.11
-4.12
-4.13
-4.16
-4.19
-4.21
-4.25
-4.25
-4.40
-4.42
-4.42
-4.43
-4.48
-4.49
-4.49
-4.54
token
youtube
feel
army
amp
friend
miss
one
democrat
wanna
has
wow
do
would
finally
when
k
you
let
far
how
fun
being
remember
tired
ya
knew
summer
we
feeling
aren
instead
movie
p
guess
soon
just
talk
might
read
amazing
done
f
months
wasn
hear
sleep
welcome
want
know
well
but
playing
giving
uk
go
share
took
sad
coming
yet
all
re
his
count
troll %
points
token
count
troll %
points
93,117
12,339
41,450
176,922
94,129
28,634
59,686
49,705
14,897
32,277
7,849
49,176
15,026
9,531
23,700
8,895
331,146
8,449
7,502
31,460
29,820
6,469
38,111
16,112
80,103
32,098
29,303
1,843,554
49,141
8,331
8,351
11,477
24,147
19,245
6,541
19,550
20,397
13,725
123,396
14,951
17,906
144,827
13,265
14,145
6,763
37,207
10,646
7,530
6,485
9,981
10,477
17,350
39,189
57,554
13,694
11,770
16,253
11,343
22,480
9,049
70,277
10,984
12,246
65.42
65.40
65.36
65.34
65.32
65.32
65.32
65.29
65.28
65.20
65.16
65.12
65.10
65.09
65.02
64.96
64.95
64.82
64.82
64.81
64.80
64.80
64.77
64.65
64.64
64.64
64.52
64.44
64.42
64.36
64.33
64.31
64.29
64.27
64.22
64.21
64.20
64.17
64.16
64.13
64.09
64.09
64.05
63.96
63.90
63.87
63.81
63.78
63.77
63.77
63.74
63.71
63.70
63.68
63.64
63.57
63.57
63.50
63.31
63.28
63.26
63.25
63.24
-6.57
-6.59
-6.64
-6.65
-6.67
-6.68
-6.68
-6.71
-6.71
-6.79
-6.83
-6.87
-6.89
-6.90
-6.97
-7.03
-7.04
-7.17
-7.17
-7.18
-7.19
-7.19
-7.22
-7.34
-7.35
-7.35
-7.47
-7.55
-7.57
-7.63
-7.66
-7.69
-7.70
-7.73
-7.77
-7.78
-7.80
-7.82
-7.83
-7.86
-7.90
-7.90
-7.94
-8.03
-8.09
-8.12
-8.18
-8.21
-8.22
-8.23
-8.25
-8.28
-8.29
-8.31
-8.35
-8.42
-8.42
-8.49
-8.68
-8.71
-8.73
-8.74
-8.75
10,232
23,630
11,632
130,858
14,777
13,041
114,211
8,898
16,971
98,794
11,273
123,663
56,904
9,607
122,781
7,784
647,202
51,469
11,319
111,908
10,548
49,176
18,856
6,900
7,286
7,316
10,868
215,205
6,996
7,849
8,217
9,326
10,203
7,577
10,295
149,329
15,856
11,033
18,096
11,410
17,940
12,921
7,404
8,057
11,852
10,259
6,474
68,601
77,243
30,060
151,964
15,754
7,814
7,055
67,916
9,246
10,387
10,835
16,108
13,122
172,300
87,384
104,995
67.45
67.43
67.42
67.38
67.37
67.37
67.29
67.28
67.27
67.27
67.14
67.14
67.13
67.12
67.11
67.08
67.01
66.99
66.87
66.85
66.84
66.77
66.75
66.73
66.71
66.70
66.60
66.52
66.46
66.37
66.37
66.34
66.30
66.18
66.17
66.17
66.12
66.11
66.11
66.11
66.11
66.07
66.05
66.02
66.01
65.99
65.97
65.95
65.91
65.90
65.89
65.88
65.86
65.79
65.79
65.67
65.60
65.57
65.54
65.53
65.53
65.50
65.47
-4.54
-4.56
-4.57
-4.61
-4.62
-4.62
-4.70
-4.71
-4.72
-4.73
-4.85
-4.86
-4.86
-4.87
-4.88
-4.91
-4.98
-5.00
-5.12
-5.14
-5.15
-5.22
-5.24
-5.26
-5.28
-5.29
-5.39
-5.47
-5.53
-5.62
-5.62
-5.65
-5.69
-5.81
-5.82
-5.82
-5.87
-5.88
-5.88
-5.88
-5.88
-5.92
-5.94
-5.97
-5.98
-6.01
-6.02
-6.04
-6.08
-6.09
-6.10
-6.11
-6.13
-6.20
-6.20
-6.32
-6.40
-6.42
-6.45
-6.46
-6.46
-6.49
-6.52
now
once
had
have
an
vote
back
some
h
ever
almost
today
name
question
didn
kind
that
hours
though
happy
come
haven
much
r
or
where
any
rt
because
nobody
calling
point
same
democrats
democratic
getting
doing
already
m
b
friends
if
guy
mean
yesterday
then
e
probably
drop
damn
maybe
gonna
even
see
thought
seen
part
together
oh
hand
their
pretty
such
7
token
count
troll %
points
token
count
troll %
points
were
beautiful
and
g
really
thinking
wait
administration
other
check
united
girls
was
fan
since
did
full
hot
ve
started
global
watching
i
like
listen
country
exactly
fans
illegal
favorite
proud
sure
they
dear
them
absolutely
each
very
which
single
social
her
having
mr
few
both
talking
many
fact
lot
he
me
these
yeah
born
speak
am
my
him
actually
anyone
told
here
37,777
16,087
615,184
6,697
46,587
7,999
13,709
6,298
30,643
15,895
10,621
14,579
145,692
6,911
16,200
41,708
13,839
11,219
37,895
8,000
6,481
8,546
730,059
136,660
12,352
28,156
7,680
9,772
12,128
7,505
8,019
14,730
163,815
8,572
61,702
6,800
10,292
25,328
21,143
10,248
10,822
75,538
13,173
6,695
8,881
11,959
10,790
29,765
10,185
13,395
161,802
177,149
40,456
10,421
7,673
8,425
33,420
228,066
49,829
15,118
16,241
12,431
60,018
63.23
63.21
63.19
63.14
63.14
63.13
63.03
63.00
62.95
62.90
62.90
62.87
62.87
62.84
62.83
62.82
62.75
62.68
62.64
62.56
62.28
62.27
62.25
62.16
62.12
62.08
62.00
61.93
61.92
61.89
61.82
61.81
61.57
61.52
61.51
61.44
61.43
61.35
61.23
61.21
61.18
61.05
61.01
61.00
60.82
60.67
60.54
60.50
60.45
60.44
60.39
60.36
60.24
60.17
60.05
59.95
59.83
59.80
59.74
59.59
59.57
59.32
59.26
-8.76
-8.78
-8.80
-8.85
-8.85
-8.86
-8.96
-8.99
-9.05
-9.09
-9.09
-9.13
-9.13
-9.15
-9.16
-9.17
-9.24
-9.31
-9.35
-9.43
-9.71
-9.72
-9.74
-9.83
-9.87
-9.91
-9.99
-10.06
-10.07
-10.10
-10.17
-10.18
-10.43
-10.47
-10.48
-10.56
-10.56
-10.64
-10.76
-10.78
-10.82
-10.94
-10.98
-11.00
-11.17
-11.32
-11.45
-11.50
-11.54
-11.56
-11.60
-11.64
-11.75
-11.82
-11.94
-12.04
-12.16
-12.19
-12.25
-12.40
-12.42
-12.67
-12.73
8,566
8,590
10,018
77,832
6,555
11,803
46,964
29,458
6,949
152,058
7,654
7,958
8,190
10,461
13,655
9,100
26,621
16,104
25,940
36,134
8,457
302,011
6,633
8,769
9,409
10,306
18,162
10,284
48,122
22,061
13,573
7,778
6,846
13,206
11,566
20,748
11,553
6,416
16,298
9,763
11,292
6,749
6,869
27,529
9,749
7,194
6,902
22,383
33,088
12,199
6,495
16,605
11,252
8,767
8,170
9,526
22,185
9,018
7,780
14,221
7,737
18,360
13,589
59.23
59.20
59.16
59.07
58.94
58.69
58.61
58.52
58.42
58.33
58.23
58.14
57.98
57.84
57.60
57.59
57.49
57.48
57.28
57.23
57.11
57.07
57.01
56.99
56.66
56.60
55.99
55.70
55.64
55.24
54.65
54.42
54.36
54.11
53.95
53.91
53.08
52.89
52.81
52.05
51.78
51.05
50.74
50.26
49.56
49.48
49.10
48.70
47.88
47.83
47.57
47.32
47.09
46.99
46.63
46.54
46.23
45.87
44.57
41.83
40.85
39.84
39.52
-12.76
-12.79
-12.83
-12.93
-13.05
-13.30
-13.38
-13.48
-13.57
-13.66
-13.77
-13.85
-14.01
-14.15
-14.39
-14.40
-14.50
-14.51
-14.71
-14.76
-14.88
-14.93
-14.98
-15.00
-15.33
-15.39
-16.00
-16.29
-16.35
-16.75
-17.34
-17.57
-17.63
-17.88
-18.05
-18.08
-18.91
-19.10
-19.18
-19.94
-20.22
-20.94
-21.25
-21.73
-22.43
-22.51
-22.89
-23.29
-24.11
-24.16
-24.42
-24.67
-24.90
-25.00
-25.36
-25.45
-25.76
-26.12
-27.42
-30.16
-31.14
-32.15
-32.47
saw
voting
ago
she
rep
hey
been
gt
boys
so
hair
send
different
went
saying
birthday
twitter
area
everyone
said
asked
this
immigrants
members
th
sorry
yes
ok
realdonaldtrump
shit
whole
lt
number
ass
song
also
border
telling
tweet
omg
tweets
imagine
update
thank
came
x
account
racist
please
guys
album
fuck
fucking
bitch
tour
cute
follow
ur
okay
retweet
dont
y
ice
8
token
literally
july
im
followers
epstein
bts
exo
aoc
bts twt
mgmavote
count
8,362
9,686
16,296
11,972
8,373
11,879
7,737
9,821
10,967
10,389
troll %
points
39.27
37.35
37.23
30.06
2.41
1.10
0.33
0.01
0.00
0.00
-32.72
-34.64
-34.76
-41.93
-69.58
-70.89
-71.66
-71.99
-71.99
-72.00
9
|
1905.10668 | 1 | 1905 | 2019-05-25T19:57:57 | Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding | [
"cs.SI",
"cs.IR",
"cs.LG"
] | Networks have been widely used as the data structure for abstracting real-world systems as well as organizing the relations among entities. Network embedding models are powerful tools in mapping nodes in a network into continuous vector-space representations in order to facilitate subsequent tasks such as classification and link prediction. Existing network embedding models comprehensively integrate all information of each node, such as links and attributes, towards a single embedding vector to represent the node's general role in the network. However, a real-world entity could be multifaceted, where it connects to different neighborhoods due to different motives or self-characteristics that are not necessarily correlated. For example, in a movie recommender system, a user may love comedies or horror movies simultaneously, but it is not likely that these two types of movies are mutually close in the embedding space, nor the user embedding vector could be sufficiently close to them at the same time. In this paper, we propose a polysemous embedding approach for modeling multiple facets of nodes, as motivated by the phenomenon of word polysemy in language modeling. Each facet of a node is mapped as an embedding vector, while we also maintain association degree between each pair of node and facet. The proposed method is adaptive to various existing embedding models, without significantly complicating the optimization process. We also discuss how to engage embedding vectors of different facets for inference tasks including classification and link prediction. Experiments on real-world datasets help comprehensively evaluate the performance of the proposed method. | cs.SI | cs | Is a Single Vector Enough? Exploring Node Polysemy for
Network Embedding
Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1
1Department of Computer Science and Engineering, Texas A&M University, TX, USA
{nhliu43,qytan,liyuening,xiahu}@tamu.edu,{yang.yhx,jingren.zhou}@alibaba-inc.com
2Alibaba Group, Hangzhou, China
9
1
0
2
y
a
M
5
2
]
I
S
.
s
c
[
1
v
8
6
6
0
1
.
5
0
9
1
:
v
i
X
r
a
ABSTRACT
Networks have been widely used as the data structure for abstract-
ing real-world systems as well as organizing the relations among
entities. Network embedding models are powerful tools in mapping
nodes in a network into continuous vector-space representations
in order to facilitate subsequent tasks such as classification and link
prediction. Existing network embedding models comprehensively
integrate all information of each node, such as links and attributes,
towards a single embedding vector to represent the node's general
role in the network. However, a real-world entity could be multifac-
eted, where it connects to different neighborhoods due to different
motives or self-characteristics that are not necessarily correlated.
For example, in a movie recommender system, a user may love
comedies or horror movies simultaneously, but it is not likely that
these two types of movies are mutually close in the embedding
space, nor the user embedding vector could be sufficiently close
to them at the same time. In this paper, we propose a polysemous
embedding approach for modeling multiple facets of nodes, as moti-
vated by the phenomenon of word polysemy in language modeling.
Each facet of a node is mapped as an embedding vector, while we
also maintain association degree between each pair of node and
facet. The proposed method is adaptive to various existing embed-
ding models, without significantly complicating the optimization
process. We also discuss how to engage embedding vectors of dif-
ferent facets for inference tasks including classification and link
prediction. Experiments on real-world datasets help comprehen-
sively evaluate the performance of the proposed method.
KEYWORDS
Network Embedding; Disentangled Representation Learning; Rec-
ommender Systems; Graph Mining
ACM Reference Format:
Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2
Xia Hu1. 2019. Is a Single Vector Enough? Exploring Node Polysemy for
Network Embedding. In The 25th ACM SIGKDD Conference on Knowledge
Discovery and Data Mining (KDD '19), August 4 -- 8, 2019, Anchorage, AK,
USA. ACM, New York, NY, USA, Article 4, 9 pages. https://doi.org/10.1145/
3292500.3330967
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA
© 2019 Association for Computing Machinery.
ACM ISBN 978-1-4503-6201-6/19/08...$15.00
https://doi.org/10.1145/3292500.3330967
Figure 1: An example of multiple facets within a node. The
network is built from online purchase history, where cus-
tomers and items are nodes, and purchase actions are links.
1 INTRODUCTION
Networks are ubiquitous data structures utilized for modeling in-
formation systems [1], such as social networks, recommender sys-
tems, biological networks and knowledge graphs. In these systems,
real-world entities such as users, items, molecules and knowledge
concepts are abstracted as nodes in networks, while the relations
between entities are modeled as links between them. The recent
advances in network embedding propose to represent each node
as a low-dimensional vector, by considering the node's neighbor-
hood and feature information [5, 14, 26, 30 -- 32]. Similar nodes are
mapped close to each other in the embedding space. Node embed-
ding has been shown to be an effective representation scheme that
facilitates downstream network analysis tasks such as classification,
clustering and link prediction [1, 7].
It has been shown that, in many real-world applications, entities
may possess disparate characteristics or aspects [25, 28]. In other
words, a node in the network can be seen as a capsule containing
different aspects. Different links stretching out from an entity to
their neighbors could in fact result from the expression of its differ-
ent aspects. In some scenarios, it could be problematic to fuse these
disparate aspects into a single vector-space representation for a
node. For example, in an online shopping website in Figure 1 where
customers and items are the nodes, a customer may have bought
items of disparate genres. If we represent each customer with only
a single vector, then the embedding vectors of the customer and
items have to be simultaneously close to each other. It could be hard
to achieve this, because other customers have different interests
and it may mess up the distribution of embedding vectors.
In this paper, we call such phenomenon as node polysemy, where
each node could have multiple facets, by making an analogy to
a similar property possessed by words in natural language (e.g.,
Node: Personis interested inNetwork: Purchase HistoryKDD '19, August 4 -- 8, 2019, Anchorage, AK, USA
Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1
"bank" can refer to either financial institutions or land near a river,
depending on different contexts) [10, 28]. In this setting, each node
has multiple facets, while each facet of a node owns an embedding
vector. In this work, we want to develop a polysemous network
embedding method in order to discover multiple facets of nodes
and learn representations for them.
The challenges of developing polysemous network embedding
models are three-fold. The first is how to determine the facets of
nodes, as well as to flexibly update embeddings of different facets
in the vector space. For each data sample (e.g., links or random
walks), we need to determine which facet of each node is likely
to be activated, so as to update the corresponding embedding of
that facet in the training process. The second challenge is how
to maintain the correlation among embedding vectors of differ-
ent facets. Although we split a node into multiple facets, different
facets may not be completely uncorrelated to each other. Some in-
formation will be lost if we simply model each facet independently.
Third, when considering node polysemy, how to make the model-
ing process adaptive to the existing well-established base models
such as Deepwalk [26], LINE [31], PTE [30] and GCN [14]. Besides,
the computational complexity of the new model will inevitably
increase when different facets of nodes are considered. Therefore,
an efficient optimization algorithm is also needed, especially when
considering its compatibility to negative sampling.
Specifically, in this paper, we propose a polysemous network
embedding method in order to take into account multiple facets
of nodes in network data. Each facet of a node is represented us-
ing an embedding vector. The correlation between different node
facets can be preserved in our method. The developed modeling
strategy is flexible to be applied to various base embedding mod-
els without making radical changes to their base formulation. We
first show how to revise Deepwalk to tackle node polysemy, and
then extend our discussion to more base embedding models and
more complex application scenarios. The optimization process for
training the polysemous embedding models is specially designed to
guarantee its efficiency and implementation feasibility, especially
when applying negative sampling. Finally, to evaluate whether con-
sidering multiple aspects of nodes could actually benefit learning
node representations and downstream data mining tasks, we con-
duct experiments with different tasks to compare the performance
between polysemous embedding models and their corresponding
single-vector base models. The contribution of this paper is sum-
marized as follows:
• We propose a novel polysemous network embedding method
to incorporate different facets of nodes into representation
learning. Each aspect of a node owns an embedding vec-
tor, and the relations among embedding vectors of different
aspects are also considered.
• We specifically formulate the problem to guarantee that the
resultant optimization algorithm is efficient and feasible for
implementation. Also the proposed method is flexible to be
adapted to various existing transductive embedding models.
• We conduct intensive experiments considering different down-
stream tasks and application scenarios, providing insights
on how and when we benefit from modeling node polysemy
in the network embedding.
2 POLYSEMOUS NETWORK EMBEDDING
In this section, we introduce the core idea of polysemous network
embedding, by using Deepwalk as the base model. Then, we de-
sign an optimization algorithm to train the polysemous embedding
model. We will also discuss how to estimate the facet of a node in
different contexts. Finally, we introduce how to combine embed-
ding vectors of different facets towards downstream tasks such as
classification and link prediction.
2.1 Polysemous Deepwalk
In the setting of polysemous embedding, for the Deepwalk model,
each node vi is associated with a target embedding matrix Ui ∈
RKi×D and a context embedding matrix Hi ∈ RKi×D. Here Ki is
the number of embedding vectors possessed by node vi considering
its different possible facets. The traditional Deepwalk model could
be seen as a special case where Ki = 1. The embedding vector for
i ∈ RD, and D is
facet k of node vi is denoted as Uk
the dimension of each embedding vector. Different nodes may be
associated with different number of embedding vectors, depending
on the diversity of their characteristics in the network. In this work,
for illustration purposes, we simply let all nodes have the same
number of embedding vectors, so that Ki = K and K is a predefined
constant integer. In practice, the value of K could be estimated from
data. For examples, K can be approximately set as the number of
latent interest categories in recommender systems, or be estimated
as the number of major topics in an academic network. We will
discuss in later sections about how to assign facets to nodes with
different probabilities.
i ∈ RD or Hk
Deepwalk utilizes the skip-gram model [22] that is trained using
the maximum likelihood estimation, where we try to find the model
parameters that maximize the likelihood of obtained observations.
Specifically, let θ be the parameters to be optimized and O be the
set of all observations, the objective function to be maximized is:
log p(cid:0)(N(vi), vi)θ(cid:1)
LDW (θ) =
=
o∈O
log p(oθ) =
o∈O
log p(vjvi),
o∈O
vj ∈N(vi)
(1)
where each observation o ∈ O is defined as a tuple, o = (N(vi), vi),
consisting of a central node vi and its context N(vi). Each node
within the context is denoted as vj so that vj ∈ N(vi). The model
parameters, i.e., the embedding vectors of nodes, are used in com-
puting p(vjvi) which is the conditional probability of having vj as
one of the contexts given vi.
However, in our settings where each node owns multiple facets,
the activated facet of a node varies under different contexts. Also,
the facet of a given context is determined by the combination of
all facets of the nodes within the context. Suppose the distribution
of node facets are known in advance, and we treat them as prior
knowledge denoted as P. Taking the additional information into
account, the objective is reformulated as:
LPolyDW (θ) =
=
o∈O
log p(oP, θ)
log [
o∈O
s(o)
p(os(o), P, θ) · p(s(o)P, θ)].
(2)
Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding
KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA
Figure 2: The overall training procedure of Polysemous Deepwalk. Each color refers to one facet contained in the input net-
work. Each histogram visualizes a probability distribution. Note that the above network is only a toy example for illustration
purposes, where numerical values do not reflect real results.
Here s(o) is defined as one case of activated facets of all nodes within
o, so s(o) = {s(vo) v ∈ vi ∪ N(vi)} where s(vo) is the activated
facet of node v in the context of o. In a given observation o, suppose
the activated facet of vi is ki and the facet of each vj ∈ N(vi) is kj,
the conditional probability p(os(o), P, θ) is thus defined as:
1 ≤ i ≤ N ;
for o ∈ O do
Algorithm 1: Polysemous Deepwalk
Input: Input network G, number of nodes N , facet sampling rate R.
Output: Embedding matrix U, context embedding matrix H.
1 Initialize U and H ;
2 Estimate facet distribution p(vi) for each node, so that P = {p(vi)},
3 Obtain observations O via random walks and context window sliding ;
4 while not converged do
5
6
7
8
9
Obtain a target-context tuple o = (N(vi), vi) ;
for 1 ≤ r ≤ R do
Sample a facet ki = s(vi o) ∼ p(vi o), defined in Eq. 7 ;
Sample a facet kj = s(vj o) ∼ p(vj o), defined in Eq. 7,
for each context node vj ∈ N(vi) ;
Obtain negative samples ;
for vj ∈ N(vi), as well as facet
Update Uki
i
embeddings of negative samples, using stochastic
gradient descent ;
, Hkj
j
10
11
The intuition behind the above transformation is that, instead of
maximizing the original objective function, we propose to maximize
its lower bound [13], denoted as L∗
PolyDW (θ), by applying Jensen's
inequality. The final form of the objective function is similar to that
of the skip-gram model, except the external summation over s(o).
As a result, we could adopt the same negative sampling strategy as
in the traditional skip-gram model to approximate the normaliza-
tion term in p(vjvi , s(o)). Therefore, one major advantage of the
proposed polysemous embedding model is that the training process
can be easily implemented through minimal modification to the
existing learning frameworks, by adding an additional sampling
step of assigning activated facets to nodes in each observation o.
s(o), following the distribu-
tion of p(s(o)P), is implemented through facet sampling separately
for each node in o. The overall optimization algorithm is specified
Specifically, the summation over
p(os(o), P, θ) =
vj ∈N(vi)
and each product factor is calculated as
i >)
exp(< Hkj
, Uki
j
i >) ,
v,k exp(< Hk
v , Uki
p(vjvi , s(o)) =
p(vjvi , s(o)),
(3)
(4)
which is similar to the softmax function in traditional skip-gram
models, except that general node embeddings are replaced by node
facet embeddings. Here "< · , · >" denotes the inner product of two
vectors. The denominator acts as normalization over all possible
nodes and facets. For readability, we omit P after the expansion in
Equation 3, as it is no longer applied in later steps.
It is cumbersome to directly apply gradient descent to optimize
the objective function in Equation 2 ∼ Equation 4, due to the sum-
mation term inside the logarithm function. Also, it becomes unclear
of how to incorporate negative sampling [22] to approximate the
normalization term for more efficient computation. Therefore, we
further derive the objective function as below:
LPolyDW (θ) =
≥
=
o∈O
o∈O
log [
p(s(o)P) · [
s(o)
p(os(o), P, θ) · p(s(o)P, θ)]
s(o)
p(s(o)P, θ) · log p(os(o), P, θ)
o∈O
s(o)
= L∗
PolyDW (θ)
vj ∈N(vi)
log p(vjvi , s(o))]
(5)
Random
Walk
1
(𝑜")v1v2v3v4v6Random
Walk
2
(𝑜#)v6v7v8v9v10………46712358109Node Facet DistributionInput NetworkaverageaverageminFacetAssignmentObjectiveOptimization𝐔%"𝐔%#𝐔%%𝐇""𝐇#"𝐇'#𝐇("𝐔)"𝐔)#𝐔)%𝐇(#𝐇*#𝐇+%𝐇",%facet
sampling
for
context
nodes
facet
sampling
for
context
nodes
facet
sampling
for
target
node
min𝐩(𝑜")𝐩(𝑜#)KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA
Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1
in Algorithm 1. After initialization and node-facet distribution esti-
mation (will be introduced later), a number of random walks are
sampled just as in traditional Deepwalk (Line 3). Then, for each
observation o, several rounds of facet sampling are conducted on
each node within o (the loop in Line 7). In each round, each node
has one facet activated (Line 8 ∼ 10), so that the embedding vector
corresponding to that facet will be updated using SGD (Line 11).
The major additional computation cost, compared with traditional
Deepwalk, comes from the increased size of training data in O by a
factor of sampling rate R.
The overall process of polysemous Deepwalk is illustrated in
Figure 2, where "Objective Optimization" has been introduced as
above, while the other steps related with facet distribution and facet
assignment will be discussed in detail in the next subsection.
2.2 Node-Facet Assignment
We now introduce how the prior knowledge P can be obtained, and
how to determine the facet of nodes given a specific observation o.
For now, we limit the discussion to undirected homogeneous plain
networks, and provide one method to obtain the global distribution
of node facets by only leveraging the network adjacency matrix. For
networks with attribute information or heterogeneous information
networks, we may resort to other strategies and we leave it to future
work. Let A be the symmetric adjacency matrix of the network, we
perform community discovery on the network [15][36]:
+ α∥P∥2
F ,
(6)
F
P≥0 ∥A − P · PT ∥2
min
Pv,k
c =1, . . .,K Pv,c
where P can be solved using gradient search algorithms. The proba-
bility p(kv), that node v is assigned with the k-th facet, can be cal-
culated as p(kv) =
. We define the facet distribution
of a node as p(v) = [p(1v), ..., p(Kv)]. We treat p(vi), 1 ≤ i ≤ N
as the prior knowledge P, as it encodes the global understanding of
the network states. Applying attribute information could achieve
better estimation, but it is beyond the discussion in this work.
After obtaining the prior knowledge P, we are able to estimate
the overall facet of each observation o as well as the facet of nodes
within o. Given an observation o = (N(vi), vi), a straightforward
way to define its facet distribution p(o) is by averaging the facet
distributions of nodes inside the observation, i.e., p(o) =(cid:0)p(vi) +
vj ∈N(vi) p(vj)(cid:1)/(N(vi)+1). Considering that the activated facet
of a node depends on the specific context where it is observed, given
o, the node's facet s(vo) is sampled according to the distribution
p(vo), which is defined heuristically as below
p(vo) = min(p(v), p(o)),
(7)
where we include a min(·, ·) operator because it is undesirable to
assign a node vi with facet k if p(kvi) ≈ 0, even when the k-th
entry in p(o) is large. To make it a valid probability distribution,
p(vo) is further normalized to sum to 1.
Till now, we have introduced the whole training process of poly-
semous Deepwalk as shown in Figure 2. Given the input network,
we first estimate node facet distributions as prior knowledge P.
Then, random walks are performed to construct node-context ob-
servations O. After that, within each walk sample o, each node
is assigned with an activated facet. Finally, node embeddings of
correspondent facets are updated through optimization.
2.3 Joint Engagement of Multiple Embeddings
for Inference
We are able to obtain multiple embedding vectors for each node
after training the polysemous model. Then the question arises that,
during inference, how to collectively consider different embedding
vectors for subsequent tasks. Here we discuss two major network
analysis tasks including classification and link prediction.
tiple vectors {Uk
options include:
For classification, for each node, our strategy is to combine mul-
i }k =1, ...,K into a joint vector Ui. Specifically, some
(cid:1),
Ui = U1
i ⊕ U2
i ⊕ ... ⊕ UK
i ,
(cid:1) ⊕(cid:0)p(2vi) · U2
Ui =(cid:0)p(1vi) · U1
(cid:1) ⊕ ... ⊕(cid:0)p(Kvi) · UK
(8)
where we directly concatenate embeddings of different facets, or
(9)
where we first scale each embedding vector with the probability of
belonging to the corresponding facet and then concatenate these
scaled vectors. Here ⊕ denotes the concatenation operation. The
resultant embedding vectors { Ui}i =1, ..., N can be directly used in
node classification. We adopt Equation 9 in experiments.
For link prediction or network reconstruction tasks, a higher
similarity score between the representations of two nodes indicates
greater possibility that a link exist between the nodes. We can define
the similarity between two nodes vi and vj as:
similarity(vi , vj) =
′vj) < Uk
p(kvi) p(k
K
K
i , Uk′
j >,
(10)
i
i
i
k =1
k′=1
where different facet pairs of embedding vectors contribute to the
overall similarity computation, weighted by the probability that
the node belongs to the corresponding facet.
2.4 Discussion
The proposed work can be regarded as an example of disentangled
representation learning [9], since different representation dimen-
sions are sensitive to varying factors behind the data. Moreover, it
helps improving the interpretability of representation learning [3],
because representation dimensions are separated according to node
facets that could be associated with concrete meanings or charac-
teristics of real-world networked objects.
3 MODELS EXTENDED BY POLYSEMOUS
EMBEDDING
The methodology of polysemous embedding can also be applied
to extend other fundamental single-embedding models. In this sec-
tion, we elaborate two scenarios as examples. First, we show how
polysemous embedding can be used in heterogeneous networks
where links exist between nodes of different types. Second, we
show how polysemous embedding can be combined with graph
neural networks, where the embedding look-up tables in Deepwalk
is replaced by feedforward modules.
3.1 Polysemous PTE for Heterogeneous
Networks
We show how to consider node polysemy when modeling hetero-
geneous networks. We choose PTE [30] as the base model to be
Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding
KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA
example and show how it could be extended as PolyGCN to con-
sider node polysemy. Different from PolyDeepwalk and PolyPTE
that keep embedding look-up tables to store embedding vectors,
PolyGCN uses a feedforward network module to generate embed-
ding of each node by gathering information from neighborhoods.
The core step of embedding generation in GCN is to aggregate
information from a node's local neighborhood. Let ud(i) denote the
intermediate representation of node vi on layer of depth d, then
the forward propagation is
(cid:19)
(cid:19)
extended, as it is a fundamental model for tackling the problem.
To simplify the illustration, we only consider bipartite networks
during model development. The discussion can be applied for more
complex networks, since the objective function of PTE could be
extended as the sum of several terms considering multiple bipartite
or homogeneous networks.
Given a network containing two types of nodes VA and VB, as
well as a set of links denoted as E, each observation o is defined
as a link o = (uj , vi) ∈ E where vi ∈ VA, uj ∈ VB. The set of all
observations is thus defined as O = E. Similar to the derivation in
Section 2.1, the objective function is formulated as:
LpolyPT E(θ) =
≥
=
o∈E
o∈E
log [
s(o)
o∈E
s(o)
where
p(ujvi , s(o)) =
p(os(o), P, θ)) · p(s(o)P, θ)]
s(o)
p(s(o)P, θ) · log p(os(o), P, θ)
p(s(o)P) · log p(ujvi , s(o)),
i >)
exp(< Hkj
, Uki
j
i >) .
v,k exp(< Hk
v , Uki
(11)
(12)
According to the original PTE model, the matrix U contains the
embedding vectors of nodes in VA, and H contains the embedding
vectors of nodes in VB. The resultant lower bound objective is
denoted as L∗
3.1.1 Node Facet Assignment. The strategy of determining hetero-
geneous node facet distribution is similar to that of the previous
section. Given the asymmetric adjacency matrix A, we first solve
(13)
, which is to be optimized.
polyPT E
P≥0,Q≥0 ∥A − P · QT ∥2
min
F
+ α(∥P∥2
F
+ ∥Q∥2
F),
(i.e., an edge) is computed as p(o) = (cid:0)p(vi) + p(uj)(cid:1)/2. Different
where we set α = 0.05 in experiments. The resultant factor matrix
P contains the association intensity between VA and facets, while
Q contains the facet association information for nodes in VB. Then,
we normalize P and Q to obtain the probabilities of belonging to
different facets for each node vi ∈ VA and uj ∈ VB [36]. If we
denote the facet distribution as p(vi) and p(uj) respectively for the
two types of nodes, then the facet distribution of an observation
from polysemous Deepwalk, here we simply let p(vo) = p(o) be
applied for node-facet sampling, because the window size in PTE
equals to 1 which is much smaller than Deepwalk.
3.1.2 Engage Multiple Embeddings for Inference. The way of jointly
considering a node's multiple embedding vectors, for downstream
tasks, is similar to what is introduced in Section 2.3. The only dif-
ference is that the measurement of similarity between two different
types of nodes is adjusted as:
similarity(vi , uj) =
p(kvi) p(k
′uj) < Uk
i , Hk′
j > .
(14)
K
K
k =1
k′=1
3.2 Polysemous Embedding with GCN
The idea of polysemous embedding can be realized with models of
other architectures. In this subsection, we consider GCN [14] as an
(cid:18)
(cid:18)
ud(i) ← σ
Wd · MEAN(ud−1(i) ∪ {ud−1(j),∀vj ∈ N(vi)})
,
(15)
where Wd is the weight matrix on layer d, MEAN refers to the
aggregator based on the pre-processed adjacency matrix, and N(vi)
is the local neighborhood of vi. The final embedding output for vi
is defined as Ui = udmax (i), where dmax denotes the depth of the
final layer. After forward propagation, GCN can be trained in an
unsupervised manner similar to Deepwalk or PTE.
We here propose a feasible approach to incorporate node pol-
ysemy into GCN-based models, where each facet of embeddings
corresponds to one GCN model, while the internal architecture of
each GCN is unchanged. Specifically, within a certain facet k, we
limit the local neighborhood of the node as other nodes with the
same facet k activated, so that
dmax
= uk
d−1(i) ∪ {uk
d · MEAN(uk
Wk
d−1(j),∀vj ∈ Nk(vi)})
d(i) ← σ
uk
,
(16)
where Nk(vi) denotes the local neighborhood under facet k. The
(i). The main
final embedding output for facet k of vi is Uk
i
question to be answered is how to construct the local neighborhood
for a specific facet k of node v. Here we still consider bipartite
networks as the scenario, so for each facet there are two GCNs
respectively for generating embeddings for each type of nodes.
Following the similar strategy as in Section 3.1, the observed links
are decomposed into interaction results of different facet pairs. We
further relax the problem so that embeddings of different facets
are mutually independent. Specifically, the original observation
k Ak, where Ak ≥ 0 and Ak(i, j) is proportional to
P(i, k) · Q(j, k). vj ∈ Nk(vi) if both vi and vj connect to the same
node of the other type under facet k. For training each GCN pair,
we adopt the similar unsupervised training strategies as proposed
in [6], where nodes are encouraged to have similar embeddings
of facet k if they are connected according to the corresponding
observation matrix.
matrix A =
4 EXPERIMENTS
We try to answer several questions through experiments. First, how
effective is the proposed polysemous embedding method compared
with single-vector embedding counterparts? Second, is considering
node polysemy beneficial for network embedding when evaluated
on different downstream tasks? Third, how will polysemous em-
bedding models react to the changes of hyperparameters?
KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA
Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1
4.1 Experimental Settings
We first introduce the applied datasets as below. The detailed infor-
mation is shown in Table 1.
• BlogCatalog: A social network dataset built based on connec-
tions between online bloggers. The original dataset contains both
link and attribute information, while we only keep the links in
our experiments. Each node is also associated with a label deter-
mined from some predefined interest categories of bloggers.
• Flickr: A network dataset constructed from interactions between
users on a multimedia hosting website. Each link corresponds to
a following relation between users. The groups that users joined
are regarded as labels.
• MovieLens: A movie rating dataset widely used for evaluating
collaborative filtering models. In our experiments, we treat it as
a heterogeneous network where links exist between users and
items (i.e., movies). We transform rating scores into implicit data,
so that each entry is either 0 or 1 indicating whether the user
rated the movie [8]. In this way, conducting recommendation on
this dataset can also be regarded as performing link prediction.
• Pinterest: An implicit feedback data originally constructed for
image recommendation. Users and images are regarded as nodes.
Each link is a pin on an image initiated by a user. Each user has
at least 20 links. Similarly, the link prediction task can be seen as
recommending images to users.
The networks in BlogCatalog and Flickr are homogeneous, and
we use them in classification and link prediction. The networks
in MovieLens and Pinterest are heterogeneous, and we will apply
them in link prediction tasks which can also be seen as doing rec-
ommendation. The baseline methods for comparison are as below.
• Deepwalk [26], PTE [30], GCN [38]: Some commonly used net-
work embedding models that map each node to a single vector.
We include them as baseline methods to analyze whether their
polysemous embedding counterparts achieve better performance.
Here GCN is only applied in heterogeneous link prediction.
• NMF [15, 16]: A traditional model that learns latent factors from
data. We include NMF as one of the baseline methods because
we applied it in estimating the global facets contained in data.
The number of latent factors is the same as the number of facets
in the proposed polysemous model.
• MSSG [23]: A multi-sense word embedding model original de-
veloped for natural language processing. Senses of words de-
termined by clustering their average context representations.
Each word has only one embedding vector when it is regarded
as context. The model is adapted for network analysis tasks.
• MNE [37]: A model that factorizes the network proximity matrix
into several group of embedding matrices, and adds a diversity
constraint to force different matrices focus on different aspects
of nodes. We only use MNE for node classification since the way
of performing link prediction is not discussed in the paper.
4.2 Node Classification
Node classification is a commonly applied task for evaluating net-
work embedding outcomes. In this experiment, we compare the
performance of the proposed polysemous models compared with
baseline models. We use Deepwalk as the base single-embedding
BlogCatalog
Flickr
MovieLens
Pinterest
VA
5,196
7,575
6,040
55,187
VB
−
−
3,952
9,916
E
171,743
239,738
1,000,209
1,500,809
Table 1: Statistics of datasets.
model. The proposed model is named as PolyDeepwalk. The Blog-
Catalog and Flickr datasets are applied in this experiment.
Unless specifically stated in each task, the default model hyper-
parameters are set as follows. For BlogCatalog dataset, the number
of walks generated per node is 110, the length of walk is 11, the con-
text size is 8, the number of facets is 6 considered for PolyDeepwalk,
the embedding of dimension is 210 for each node in Deepwalk and
210/6 = 35 for each node's facet in PolyDeepwalk, the number of
negative samples is 5 for Deepwalk and 10 for PolyDeepwalk. For
Flickr dataset, the parameter settings are similar, except that the
number of facets is 5 for PolyDeepwalk, the embedding dimension
is 180 for each node in Deepwalk and 180/5 = 36 for each node's
facet in PolyDeepwalk, and the number of negative samples is 15
for PolyDeepwalk. It is worth noting that the dimension of polyse-
mous embedding is divided by the number of facets, so that after
concatenation, the resultant embedding has the same length as the
single-embedding counterpart. We use Support Vector Machine as
the classification model, where 80% of data samples are used as
training data. The performance comparison is illustrated in Figure 3
and Figure 4. Note that we do not plot the performance of NMF as
its F1 scores are much lower than other models. Some work includes
node attributes as additional information source when using NMF
related models for node classification [11, 17], but this is beyond
our experiment setting. From the figures, some observations are
summarized as below:
• In general, PolyDeepwalk achieves better performances than
other polysemous embedding models. Also, by varying the di-
mensionality, we can observe that polysemous embedding models
are less likely to be affected, while the classification performance
of Deepwalk gradually decreases as dimensionality increases.
• Deepwalk and PolyDeepwalk have different responses to the
change of context size. The former achieves better performances
as context size increases, while the latter shows the opposite
trend. A possible reason is that, as the context window enlarges
in PolyDeepwalk, random walks from each node are more likely
to reach other network regions of different facets. As a result,
the facet distributions are over smoothed, so it becomes more
difficult to decide which facet a context window belongs to. It
could be one of the challenges to be tackled in future work.
Besides making comparisons to baseline models, we also analyze
the sensitivity of PolyDeepwalk to some of the key parameters
when modeling node polysemy. The experiment results are shown
in Figure 5. Some observations are made as below:
• Increasing the number of facets has positive influence on the
classification performance of the proposed model. It is also worth
noting that we keep the total embedding dimension (i.e., K ×
DPolyDeepwalk) to be fixed, where DPolyDeepwalk actually decreases
as K increases, so that the downstream classification task will
not be affected by the feature size.
Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding
KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA
0.74
0.72
0.7
0.68
0.66
1
F
-
o
r
c
i
M
Deepwalk
MSSG
PolyDeepwalk
MNE
100
50
200
DDeepwalk (or Dpolydeepwalk*K)
150
1
F
-
o
r
c
i
M
0.74
0.72
0.7
0.68
0.66
0.64
Deepwalk
PolyDeepwalk
5
context size
10
Figure 3: Node classification evaluation on BlogCatalog dataset.
1
F
-
o
r
c
i
M
0.58
0.56
0.54
0.52
0.5
1
F
-
o
r
c
i
M
0.6
0.58
0.56
0.54
0.52
Deepwalk
PolyDeepwalk
5
context size
10
Deepwalk
MSSG
PolyDeepwalk
MNE
100
50
200
DDeepwalk (or DPolyDeepwalk*K)
150
Figure 4: Node classification evaluation on Flickr dataset.
1
F
-
o
r
c
i
M
0.8
0.7
0.6
0.5
0.4
1
F
-
o
r
c
i
M
0.8
0.7
0.6
0.5
0.4
BlogCatalog
Flickr
6
4
K
BlogCatalog
Flickr
15
5
10
R
Figure 5: Parameter analysis for node classification.
• In this part of experiment, changing the facet sampling rate for
each observation (i.e., context window) does not significantly
perturb the results. The possible reason is that many random
walks have been generated from each node, so the facet sampling
is also implicitly performed for each random walk. The training
samples are already adequate even when we reduce the facet
sampling rate for each context window.
4.3 Link Prediction in Homogeneous Networks
Besides node classification, we also include link prediction as one of
the tasks for evaluating the embedding results. We randomly select
one link for each node as test data, and use the remaining network
as training data. The default settings of hyperparameters are similar
to those applied in the last experiment. The main difference lies
on the embedding dimensionality, where we let the embedding
dimension to be DDeepwalk = DPolyDeepwalk. In other words, the
embedding space of PolyDeepwalk is the same as that of Deepwalk.
The default dimension value, unless otherwise stated, is chosen as
150. The performance of link prediction is summarized in Table 2,
from which we could observe that:
• There is no significant advantage for PolyDeepwalk on BlogCat-
alog dataset compared with Deepwalk. Although PolyDeepwalk
achieves better performance in terms of AUC score, Deepwalk
is more advantageous when evaluated using HR@k and k is
small. However, it implicitly indicates that Deepwalk is gradu-
ally surpassed by PolyDeepwalk when k increases, which means
PolyDeepwalk could be better at recovering links that do not
match the major connection patterns of a node.
• PolyDeepwalk performs better than NMF, which indicates that
the effectiveness of polysemous embedding is not purely inher-
ited from the matrix factorization step which provides prior
knowledge of node facet distribution.
In addition, we also analyze the sensitivity of PolyDeepwalk by
varying the values of certain hyperparameters, including dimen-
sionality, the number of facets (K), and the facet sampling rate (R)
for each context window. The results are shown in Figure 6. Some
phenomenons are observed as below:
• Network embedding models are sensitive to embedding dimen-
sion in link prediction tasks, as we can observe a clear growth of
AUC score when embedding dimension increases.
• Increasing the number of facets K appropriately could boost
link prediction performance. However, increasing K will also
augment the embedding storage and inference computation cost.
We should better keep an appropriate K value, in order to balance
the performance and efficiency.
• Similar to what we have discussed in node classification, in-
creasing the facet sampling rate does not bring much benefits.
Therefore, when the number of walks per node is large enough,
we can keep the face sampling rate to be low in order to reduce
computation costs.
4.4 Link Prediction in Heterogeneous
Networks
In some application scenarios such as recommender systems, each
link stretches across two types of nodes. Here we construct two
bipartite networks from two recommendation datasets: MovieLens
and Pinterest. Models such as PTE and unsupervised GCN can
handle such scenario, and we extend them as PolyPTE and PolyGCN
to be evaluated. For each user node, we hold out its latest interaction
as the test set and use the remaining data for training.
The default values of hyperparameters, unless otherwise stated,
are as follows. For both datasets, the number of facets K is 5, the
embedding dimension is set as 30, and the facet sampling rate R
2. The negative sampling
for each observation (i.e., link) equals K
rate is set as 30 for PolyPTE. Different from the last experiment
where DPolyDeepwalk = DDeepwalk, the embedding dimension in
this experiment is set as D/K. Performances of heterogeneous link
prediction are shown in Table 3 under different metrics, where we
can observe that:
• Polysemous embedding models achieves better performances
than their single-embedding counterparts. It thus suggests that
considering node polysemy is beneficial for modeling the associ-
ation relation between different types of node entities.
• Polysemous embedding models in general perform better than
NMF, which demonstrates that the effectiveness of polysemous
models comes beyond the prior knowledge obtained from NMF.
• PolyGCN is not as good as PolyPTE in performance boosting. A
possible reason is that we do not consider inter-facet relations in
KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA
Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1
BlogCatalog
Flickr
PolyDeepwalk
Deepwalk
NMF
MSSG
HR@10 HR@50 HR@100 HR@200 AUC HR@10 HR@50 HR@100 HR@200 AUC
0.928
0.912
0.852
0.811
0.493
0.512
0.132
0.272
Table 2: Performance of Homogeneous Link Prediction
0.590
0.530
0.335
0.268
0.737
0.764
0.280
0.505
0.487
0.430
0.226
0.207
0.615
0.639
0.196
0.376
0.957
0.950
0.801
0.910
0.234
0.253
0.041
0.102
0.210
0.195
0.048
0.071
0.395
0.348
0.148
0.152
MovieLens
Pinterest
PolyPTE
PTE
PolyGCN
GCN
NMF
MSSG
HR@10 HR@50 HR@100 HR@200 AUC HR@10 HR@50 HR@100 HR@200 AUC
0.919
0.703
0.801
0.721
0.654
0.838
0.491
0.336
0.389
0.313
0.404
0.427
0.460
0.088
0.236
0.130
0.075
0.304
0.318
0.052
0.159
0.087
0.040
0.199
0.334
0.227
0.250
0.204
0.265
0.288
0.067
0.040
0.050
0.039
0.051
0.060
0.892
0.832
0.863
0.813
0.865
0.868
0.062
0.007
0.036
0.028
0.005
0.039
0.210
0.143
0.158
0.130
0.165
0.181
0.204
0.030
0.102
0.059
0.021
0.128
Table 3: Performance of Heterogeneous Link Prediction
1
0.95
0.9
C
U
A
0.85
50
100
C
U
A
0.96
0.94
0.92
0.9
2
250
BlogCatalog
Flickr
8
4
6
K
C
U
A
0.98
0.96
0.94
0.92
0.9
BlogCatalog
Flickr
15
5
10
R
BlogCatalog
Flickr
200
150
DPolyDeepwalk
Figure 6: Parameter analysis for link prediction on homogeneous networks.
0.9
C
U
A
0.8
0.7
MovieLens
Pinterest
6
2
4
K
C
U
A
0.95
0.9
0.85
0.8
MovieLens
Pinterest
30
10
20
R
Figure 7: Parameter analysis for PolyPTE.
PolyGCN. However, GCN-based models still have much room for
improvement, especially when attribute information is available.
Similar to previous experiment tasks, here we also analyze the
sensitivity of PolyPTE to model hyperparameters, as shown in
Figure 7 for MovieLens and Pinterest. Besides some similar ob-
servations as in the last experiment, PolyPTE is sensitive to the
facet sampling rate, especially when its value is low. A possible
reason for such contrasting observations between PolyDeepwalk
and PolyPTE could be the different forms of observation samples
o ∈ O. PolyDeepwalk samples plenty of random walks from each
node (i.e., o = {N(v), v}), while PolyPTE uses edge based sampling
strategy (i.e., o = (vi , vj)). Therefore, if the facet sampling rate is
low, PolyPTE could not fully consider all the possible correlation
patterns between different facets of users and items. It will thus
negatively affect the embedding performance.
5 RELATED WORK
Network embedding models have received a lot of attention recently
due to its effectiveness in learning representations for nodes in net-
work data. Existing work on network embedding can be categorized
based on various criteria. Many basic models such as Deepwalk [26],
LINE [31], node2vec [5] and SDNE [32] focus on analyzing plain
networks, while more recent work starts tackling more complex
networks such as considering attributes [11, 18], community struc-
tures [33] and node heterogeneity [2, 30]. Many methods solve the
embedding problem by resorting to matrix factorization [27], either
explicitly [24] or implicitly [26, 31], while recently feed-forward
modules such as graph convolutional networks [6, 14] are attract-
ing more and more attention. In addition, some challenges that
have been tackled in network embedding include model scalability
improvement [38], modeling dynamic networks [40], considering
human-in-the-loop scenarios [12]. Finally, network embedding has
been applied in applications such as recommender systems [4],
fraud detection [35] and behavioral modeling [34].
Some recently proposed models, not limited to network analysis,
start to utilize the structural knowledge for representation learning.
Ma et al. make use of hierarchical taxonomy to regularize node
representation learning [21], which does not solve the same problem
as in this paper since each node is still assigned only one embedding
vector. Yang et al. extends matrix factorization models to explore
multiple facets of homogeneous networks towards embedding [37],
Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding
KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA
where the method may not be extended to other base models or
scenarios. Some other work such as [39] and [20] try to extract
hierarchical taxonomy from embedding results, which also do not
solve the same problem as in this paper.
The property of multiple facets owned by network nodes can
be analogized to a similar phenomenon of word polysemy in nat-
ural languages [28]. However, the modeling methods cannot be
directly applied to our problem of network analytics due to various
incompatibility issues [10, 19], such as the differences in language
models and network models, the difference of sample formats, and
the absence of the concept of documents in network data. Also, [23]
does not consider polysemy in the context vectors or the correlation
between different word senses. Some relevant problems have been
discussed in Heterogeneous Information Networks [29], but it is
hard to adapt the methodology to other scenarios.
6 CONCLUSION AND FUTURE WORK
In this paper, we propose a polysemous embedding method for con-
sidering multiple facets of nodes in network embedding. After esti-
mating the degrees of association between each node and its facets,
each facet of a node owns a embedding vector. The proposed method
is flexible as it can be used to extend various existing embedding
models. During the training process, embedding vectors of different
facets are updated, based on the observation where the nodes locate.
We also introduce how to combine multiple embedding vectors of
each node during classification and link prediction. Experiments
on real-world datasets comprehensively evaluate when we benefit
from considering node polysemy compared with single-vector em-
bedding baseline methods. Some possible future work are as follow:
(1) Exploring the possibility of doing node facets association and
polysemous embedding simultaneously, (2) Applying polysemous
network embedding models to more complicated network systems
such as knowledge graphs, (3) Developing optimization algorithms
to further accelerate the training procedure.
ACKNOWLEDGMENTS
The work is, in part, supported by NSF (#IIS-1657196, #IIS-1718840,
#IIS-1750074). The views and conclusions contained in this paper
are those of the authors and should not be interpreted as represent-
ing any funding agencies.
REFERENCES
[1] Peng Cui, Xiao Wang, Jian Pei, and Wenwu Zhu. A survey on network embedding.
arXiv preprint arXiv:1711.08752, 2017.
[2] Yuxiao Dong, Nitesh V Chawla, and Ananthram Swami. metapath2vec: Scalable
representation learning for heterogeneous networks. In KDD. ACM.
[3] Mengnan Du, Ninghao Liu, and Xia Hu. Techniques for interpretable machine
learning. arXiv preprint arXiv:1808.00033, 2018.
[4] Mihajlo Grbovic and Haibin Cheng. Real-time personalization using embeddings
for search ranking at airbnb. In KDD, 2018.
[5] Aditya Grover and Jure Leskovec. node2vec: Scalable feature learning for networks.
In KDD. ACM, 2016.
[6] Will Hamilton, Zhitao Ying, and Jure Leskovec. Inductive representation learning
on large graphs. In NIPS, 2017.
[7] William L Hamilton, Rex Ying, and Jure Leskovec. Representation learning on
graphs: Methods and applications. arXiv preprint arXiv:1709.05584, 2017.
[8] Xiangnan He, Hanwang Zhang, Min-Yen Kan, and Tat-Seng Chua. Fast matrix
factorization for online recommendation with implicit feedback. In SIGIR, 2016.
[9] Irina Higgins, Loic Matthey, Arka Pal, Christopher Burgess, Xavier Glorot,
Matthew Botvinick, Shakir Mohamed, and Alexander Lerchner. beta-vae: Learning
basic visual concepts with a constrained variational framework. In ICLR, 2017.
[10] Eric H Huang, Richard Socher, Christopher D Manning, and Andrew Y Ng.
Improving word representations via global context and multiple word prototypes. In
ACL, 2012.
[11] Xiao Huang, Jundong Li, and Xia Hu. Label informed attributed network embed-
ding. In WSDM. ACM, 2017.
[12] Xiao Huang, Qingquan Song, Jundong Li, and Xia Hu. Exploring expert cognition
for attributed network embedding. In WSDM, 2018.
[13] Diederik P Kingma and Max Welling. Auto-encoding variational bayes. arXiv
preprint arXiv:1312.6114, 2013.
[14] Thomas N Kipf and Max Welling. Semi-supervised classification with graph
convolutional networks. arXiv preprint arXiv:1609.02907, 2016.
[15] Da Kuang, Chris Ding, and Haesun Park. Symmetric nonnegative matrix factor-
ization for graph clustering. In SDM, 2012.
[16] Daniel D Lee and H Sebastian Seung. Algorithms for non-negative matrix
factorization. In NIPS, 2001.
[17] Jundong Li, Harsh Dani, Xia Hu, Jiliang Tang, Yi Chang, and Huan Liu. Attributed
network embedding for learning in a dynamic environment. In CIKM, 2017.
[18] Lizi Liao, Xiangnan He, Hanwang Zhang, and Tat-Seng Chua. Attributed social
network embedding. IEEE Transactions on Knowledge and Data Engineering, 2018.
[19] Yang Liu, Zhiyuan Liu, Tat-Seng Chua, and Maosong Sun. Topical word embed-
dings. In AAAI, 2015.
[20] Ninghao Liu, Xiao Huang, Jundong Li, and Xia Hu. On interpretation of network
embedding via taxonomy induction. KDD, 2018.
[21] Jianxin Ma, Peng Cui, Xiao Wang, and Wenwu Zhu. Hierarchical taxonomy
aware network embedding. In KDD, 2018.
[22] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. Dis-
tributed representations of words and phrases and their compositionality. In NIPS,
2013.
[23] Arvind Neelakantan, Jeevan Shankar, Alexandre Passos, and Andrew McCallum.
Efficient non-parametric estimation of multiple embeddings per word in vector space.
In EMNLP, 2014.
[24] Mingdong Ou, Peng Cui, Jian Pei, Ziwei Zhang, and Wenwu Zhu. Asymmetric
transitivity preserving graph embedding. In KDD, 2016.
[25] Adam Perer, Ido Guy, Erel Uziel, Inbal Ronen, and Michal Jacovi. Visual social
network analytics for relationship discovery in the enterprise. In Visual Analytics
Science and Technology (VAST), 2011 IEEE Conference on, 2011.
[26] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. Deepwalk: Online learning of
social representations. In KDD. ACM, 2014.
[27] Jiezhong Qiu, Yuxiao Dong, Hao Ma, Jian Li, Kuansan Wang, and Jie Tang. Net-
work embedding as matrix factorization: Unifying deepwalk, line, pte, and node2vec.
In WSDM. ACM, 2018.
[28] Joseph Reisinger and Raymond J Mooney. Multi-prototype vector-space models
of word meaning. In Human Language Technologies: The 2010 Annual Conference of
the North American Chapter of the Association for Computational Linguistics, 2010.
[29] Yu Shi, Qi Zhu, Fang Guo, Chao Zhang, and Jiawei Han. Easing embedding
learning by comprehensive transcription of heterogeneous information networks. In
KDD, 2018.
[30] Jian Tang, Meng Qu, and Qiaozhu Mei. Pte: Predictive text embedding through
large-scale heterogeneous text networks. In KDD. ACM, 2015.
[31] Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei.
Line: Large-scale information network embedding. In WWW, 2015.
[32] Daixin Wang, Peng Cui, and Wenwu Zhu. Structural deep network embedding.
In KDD. ACM, 2016.
[33] Xiao Wang, Peng Cui, Jing Wang, Jian Pei, Wenwu Zhu, and Shiqiang Yang.
Community preserving network embedding. In AAAI, 2017.
[34] Daheng Wang, Meng Jiang, Qingkai Zeng, Zachary Eberhart, and Nitesh V
Chawla. Multi-type itemset embedding for learning behavior success. In KDD, 2018.
[35] Haibo Wang, Chuan Zhou, Jia Wu, Weizhen Dang, Xingquan Zhu, and Jilong
Wang. Deep structure learning for fraud detection. In KDD, 2018.
[36] Wei Xu, Xin Liu, and Yihong Gong. Document clustering based on non-negative
matrix factorization. In SIGIR, 2003.
[37] Liang Yang, Yuanfang Guo, and Xiaochun Cao. Multi-facet network embedding:
Beyond the general solution of detection and representation. In AAAI, 2018.
[38] Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L Hamilton,
and Jure Leskovec. Graph convolutional neural networks for web-scale recommender
systems. In KDD, 2018.
[39] Chao Zhang, Fangbo Tao, Xiusi Chen, Jiaming Shen, Meng Jiang, Brian Sadler,
Michelle Vanni, and Jiawei Han. Taxogen: Unsupervised topic taxonomy construction
by adaptive term embedding and clustering. In KDD, 2018.
[40] Lekui Zhou, Yang Yang, Xiang Ren, Fei Wu, and Yueting Zhuang. Dynamic
network embedding by modeling triadic closure process. 2018.
|
1708.00379 | 1 | 1708 | 2017-08-01T15:06:56 | Exponentially Twisted Sampling: a Unified Approach for Centrality Analysis in Attributed Networks | [
"cs.SI",
"physics.soc-ph"
] | In our recent works, we developed a probabilistic framework for structural analysis in undirected networks and directed networks. The key idea of that framework is to sample a network by a symmetric and asymmetric bivariate distribution and then use that bivariate distribution to formerly defining various notions, including centrality, relative centrality, community, and modularity. The main objective of this paper is to extend the probabilistic definition to attributed networks, where sampling bivariate distributions by exponentially twisted sampling. Our main finding is that we find a way to deal with the sampling of the attributed network including signed network. By using the sampling method, we define the various centralities in attributed networks. The influence centralities and trust centralities correctly show that how to identify centralities in signed network. The advertisement-specific influence centralities also perfectly define centralities when the attributed networks that have node attribute. Experimental results on real-world dataset demonstrate the different centralities with changing the temperature. Further experiments are conducted to gain a deeper understanding of the importance of the temperature. | cs.SI | cs |
1
Exponentially Twisted Sampling: a Unified
Approach for Centrality Analysis in Attributed
Networks
Cheng-Hsun Chang and Cheng-Shang Chang
Abstract
In our recent works, we developed a probabilistic framework for structural analysis in undirected networks and
directed networks. The key idea of that framework is to sample a network by a symmetric and asymmetric bivariate
distribution and then use that bivariate distribution to formerly defining various notions, including centrality, relative
centrality, community, and modularity. The main objective of this paper is to extend the probabilistic definition to
attributed networks, where sampling bivariate distributions by exponentially twisted sampling. Our main finding
is that we find a way to deal with the sampling of the attributed network including signed network. By using
the sampling method, we define the various centralities in attributed networks. The influence centralities and trust
centralities correctly show that how to identify centralities in signed network. The advertisement-specific influence
centralities also perfectly define centralities when the attributed networks that have node attribute. Experimental re-
sults on real-world dataset demonstrate the different centralities with changing the temperature. Further experiments
are conducted to gain a deeper understanding of the importance of the temperature.
centralities, signed networks, sampled graph, exponentially twisted sampling.
Index Terms
I. INTRODUCTION
I N social network analysis, centrality [1], [2], [3] have been widely used for ranking the important
nodes. To obtain a viewpoint of a network, one typical method is to "sample" the network, e.g., edge
sampling, random walks, diffusion [4], or random gossiping [5]. Mathematically, each sampling method
renders a (probability) measure for a network that enables us to carry out further analysis. As in the
probabilistic framework in [6], we model a network as a graph G and sample the graph to generate a
bivariate distribution p(·,·) for a pair of two nodes. In this paper, we only consider the case that the
bivariate distribution is symmetric. Under this assumption, the two marginal distributions of the bivariate
distribution are the same. As such, the marginal distribution can be used for defining the centrality. Then,
we can use centrality to rank nodes. Ranking nodes in the unsigned network have existed a long time such
as PageRank [7]. There are many papers in the development of new centralities has made great progress
in a static network [8], [9], [10]. Moreover, they extend network properties to the dynamic network [11],
[12]. Also, many researchers have proposed heuristics on the standard methods to make them computable
in signed networks [13] and attributed network [14], but there is no unified approach for centrality. In
this paper, we propose "exponentially twisted sampling," the exponential change of measure to get the
bivariate distribution p(·,·), to sample the graph G. We show that our centrality measure digs out various
centrality, including the influence centralities, the trust centralities, the advertisement-specific influence
centralities, and homophily centrality.
The main objective of this paper is to extend the centrality in [6], [15], [16] to attributed networks
which contain edge attribute and node attribute. Our main finding is that we can find the path measure f
to sample the path r. For this, we show that one can construct another sampled graph with a exponentially
twisted sampling, and then the path measure f can be represented as a function of attributes of the nodes
C.-H. Chang and C.-S. Chang are with the Institute of Communications Engineering, National Tsing Hua University, Hsinchu 30013,
Taiwan, R.O.C. Email: [email protected]; [email protected].
and edges along the path. In this paper, we also address a method for sampling an attributed network
with a bivariate distribution and a path measure.
A. Review of the probabilistic framework of sampled graphs
II. SAMPLED GRAPH
2
In [15], [16], a probabilistic framework for structural analysis in undirected/directed networks was
proposed. The main idea in that framework is to sample a network by randomly selecting a path in the
network. A network with a path sampling distribution is then called a sampled graph in [15], [16] that can
in turn be used for structural analysis of the network, including centrality and community. Specifically,
suppose a network is modeled by a graph G(V, E), where V denotes the set of vertices (nodes) in the
graph and E denotes the set of edges (links) in the graph. Let n = V be the number of vertices in the
graph and index the n vertices from 1, 2, . . . , n. Also, let A = (ai,j) be the n× n adjacency matrix of the
graph, i.e.,
if there is an edge from vertex i to vertex j,
ai,j =
0, otherwise.
Let Ru,w be the set of (directed) paths from u to w and R = ∪u,w∈V Ru,w be the set of paths in the graph
G(V, E). According to a probability mass function p(·), called the path sampling distribution, a path
r ∈ R is selected at random with probability p(r). In [15], [16], there are many methods for sampling a
graph with a randomly selected path. Here we introduce the following three commonly used approaches:
(i) sampling by uniformly selecting a directed edge, (ii) sampling by a Markov chain, and (iii) sampling
by a random walk on an undirected network with path length 1 or 2.
Example 1. (Sampling by uniformly selecting a directed edge) Given a directed graph G = (V, E)
with the adjacency matrix A = (ai,j), one only sample directed paths with length 1 and this is done
uniformly among all the directed edges. Specifically, sampling by uniformly selecting a directed edge has
the following probability mass function:
(cid:26) 1,
(cid:26) 1/m,
0,
p(r) =
if r is an edge from vertex i to vertex j,
otherwise.
,
where m = E is the total number of directed edges in the graph.
Example 2. (Sampling by a Markov chain) Given a directed graph G = (V, E) with the adjacency
matrix A = (ai,j), consider an ergodic Markov chain on this graph. Let pu,w be the transition probability
from node u to node w and πu be the steady state probability of node u. In particular, for PageRank [17]
with the web surfing probability λ, the transition probability of the corresponding Markov chain is
is the out-degree of node u. Its steady state probabilities (with(cid:80)n
pu,w = (1 − λ)
au,w
kout
u
+ λ
1
n
,
where kout
from solving the following system of equations:
u
u=1 πu = 1) can be obtained
πu = (1 − λ)
1
n
+ λ
awu
kout
w
πw,
for all u = 1, 2, . . . , n.
(2)
For a path r that traverses a sequence of nodes {u1, u2, . . . , uk−1, uk} in a directed network, we have
from the Makrov property that
p(r) = πu1 · pu1,u2 · . . . · puk−1,uk.
(1)
(3)
n(cid:88)
w=1
Consider the reverse path of r, denoted by Rev(r), that traverses a sequence of nodes {uk, uk−1, . . . , u2, u1}.
If the Markov chain is reversible, then it follows from the detailed balance equation that
(4)
It is known that the corresponding Markov chain for PageRank is in general not reversible. However, the
corresponding Markov chain for a random walk on an undirected graph is reversible. We will discuss this
further in the next example.
p(r) = p(Rev(r)).
3
Example 3. (Sampling by a random walk on an undirected network with path length 1 or 2) For
an undirected graph G(V, E), let m = E be the total number of edges and kv be the degree of node v,
v = 1, 2, . . . , n. A path r with length 1 can be represented by the two nodes {u1, u2} it traverses. Similarly,
a path with length 2 can be represented by the three nodes {u1, u2, u3} it traverses. A random walk with
path length not greater than 2 can be generated by the following two steps: (i) with the probability kv/2m,
an initial node v is chosen, (ii) with probability βi, i = 1, 2, a walk with length i is chosen. As such, we
have
β1
β2
2m
2m au1,u2,
au1,u2 au2,u3
,
ku2
p(r) =
if r = {u1, u2},
if r = {u1, u2, u3}.
where β1 + β2 = 1 and βi ≥ 0, i = 1, 2. For an undirected network, we have ai,j = aj,i for all
i, j = 1, 2, . . . , n. Thus, in view of (5), we also have
in this example.
p(r) = p(Rev(r))
(6)
Let U (resp. W ) be the starting (resp. ending) node of a randomly select path by using the path sampling
distribution p(·). Then the bivariate distribution
pU,W (u, w) = P(U = u, W = w) =
p(r)
(7)
(cid:88)
r∈Ru,w
is the probability that the ordered pair of two nodes (U, W ) is selected. As such, pU,W (u, w) can be viewed
as a similarity measure from node u to node w and this leads to the definition of a sampled graph in [15],
[16]. In general, the bivariate distribution in (7) is not symmetric by using the path sampling distributions
in Example 1 and Example 2. However, if p(r) = p(Rev(r)) for any path r, then the bivariate distribution
in (7) is clearly symmetric.
Definition 4. (Sampled graph [15], [16]) A graph G(V, E) that is sampled by randomly selecting an
ordered pair of two nodes (U, W ) according to a specific bivariate distribution pU,W (·,·) in (7) is called
a sampled graph and it is denoted by the two-tuple (G(V, E), pU,W (·,·)).
Let pU (u) (resp. pW (w)) be the marginal distribution of the random variable U (resp. W ), i.e.,
(5)
(8)
(9)
pU (u) = P(U = u) =
and
pU,W (u, w),
pW (w) = P(W = w) =
pU,W (u, w).
n(cid:88)
n(cid:88)
w=1
Then pU (u) is the probability that node u is selected as a starting node of a path and it can be viewed as
an out-centrality of u. On the other hand, pW (w) is the probability that node w is selected as a ending
u=1
4
node of a path and it can be viewed as an in-centrality of w. The in-centrality and the out-centrality are
in general not the same. Clearly, if the bivariate distribution pU,W (·,·) is symmetric, then the in-centrality
and the out-centrality are the same. A recent advance in [16] shows that one does not need a symmetric
bivariate distribution to ensure the equality between the in-centrality and the out-centrality. In particular,
for the Markov chain sampling methods in Example 2, one still has pU (u) = pW (u) and the in-centrality
and the out-centrality are the same. In that case, we will simply refer PU (u) as the centrality of node u.
The framework of sampled graphs in [15], [16] can further be used to define the notions of community
and modularity. There are two different types of communities for directed networks that are commonly
addressed in the literature (see e.g., [18], [19]): structural communities (based on the densities of edges)
and flow communities (based on the flow of probabilities). For (probabilistic) flow communities, they
can be detected by using Markov chains in Example 2. On the other hand, structural communities can
be detected by using uniform edge sampling in Example 1 to produce communities that are densely
connected inside and sparsely connected outside. These two notions of community and modularity will
not be pursued further in this paper.
B. Exponentially twisted sampling
Now we generalize the probabilistic framework in [15], [16] to attributed networks. An attributed
network is a generalization of a graph G(V, E) by assigning each node u ∈ V an attribute hV (u) and each
edge e ∈ E an attribute hE(e). As such, an attributed network can be represented as G(V, E, hV (·), hE(·)),
where hV (·) and hE(·) are called the node attribute function and the edge attribute function, respectively.
For a path r that traverses a sequence of nodes {u1, u2, . . . , uk−1, uk} in a attributed network, we can
define a path measure f (r) as a function of the attributes of the nodes and edges along the path r, i.e.,
{hV (u1), . . . , hV (uk), hE(u1, u2), . . . , hE(uk−1, uk)}.
In this paper, we assume that a path measure f (·) is a mapping from the set of paths R to a p-dimensional
real-valued vector in Rp, i.e.,
f (r) = (f1(r), f2(r), . . . , fp(r)),
where fi(·), i = 1, 2, . . . , p, are real-valued functions.
Now suppose that we have already had a sampled graph (G(V, E), p0(·)) that uses the probability mass
function p0(r) to sample a path r in G(V, E). The question is how the sampling distribution should be
changed so that the average path measure is equal to a specified vector ¯f. In other words, what is the most
likely sampling distribution p(·) that leads to the average path measure ¯f given that the original sampling
distribution is p0(·)? For this, we introduce the Kullback-Leibler distance between two probability mass
functions p(·) and p0(·):
(cid:88)
r∈R
(cid:88)
(cid:88)
r∈R
r∈R
D(p(cid:107)p0) =
p(r) log(
).
(10)
p(r)
p0(r)
The Kullback-Leibler distance is known to be nonnegative and it is zero if and only if p(·) = p0(·) (see
e.g., [20]). Also, according to the Sanov theorem (see e.g., the books [20], [21]), the larger the Kullback-
Leibler distance is, the more unlikely for p0(·) to behave like p(·). Thus, to address the question, we
consider the following constrained minimization problem:
D(p(cid:107)p0)
min
s.t.
p(r) = 1,
f (r)p(r) = f .
(11)
The first constraint states that the total probability must be equal to 1. The second constraint states that the
average path measure must be equal to ¯f with the new sampling distribution p(·). The above minimization
problem can be solved by using Lagrange's multipliers α ∈ R and θ ∈ Rp as follows:
I = D(p(cid:107)p0) + α(1 −(cid:88)
p(r)) + θ · (f −(cid:88)
f (r)p(r)).
r∈R
r∈R
Taking the partial derivative with respect to p(r) yields
Thus,
Since(cid:80)
where
∂I
∂p(r)
= log p(r) + 1 − log p0(r) − α − θ · f (r) = 0.
p(r) = exp(α − 1) ∗ exp(θ · f (r)) ∗ p0(r).
r∈R p(r) = 1, it then follows that
p(r) = C ∗ exp(θ · f (r)) ∗ p0(r),
(cid:80)
r∈R exp(θ · f (r)) ∗ p0(r)
1
C =
5
(12)
(13)
(14)
(15)
(16)
is the normalization constant. The new sampling distribution in (15) is known as the exponentially twisted
distribution in the literature (see e.g., [22]).
To solve θ, we let
F = log(1/C).
The quantity F is called the free energy as it is analogous to the free energy in statistical mechanic [2].
It is easy to see that for i = 1, 2, . . . , p that
∂F
∂θi
fi(r)p(r) = f i.
(cid:88)
(17)
=
r∈R
These p equations can then be used to solve θi, i = 1, 2, . . . , p.
Once we have the sampling distribution in (15), we can define a bivariate distribution pU,W (u, w) as in
(7). Specifically, let U (resp. W ) be the starting (resp. ending) node of a randomly select path according
to the sampling distribution in (15). Then the bivariate distribution
(cid:88)
r∈Ru,w
pU,W (u, w) = P(U = u, W = w) =
p(r)
(18)
is the probability that the ordered pair of two nodes (U, W ) is selected and it can be viewed as a similarity
measure from node u to node w. Analogous to the discussion of a sampled graph in the previous section,
the marginal distribution of the random variable U (resp. W ), i.e., pU (u) (resp. pW (w)), can be viewed
as an out-centrality of u (resp. in-centrality of w).
III. CENTRALITIES
A. Centralities in signed networks
In this section, we consider a special class of attributed networks, called signed networks. A signed
network G = (V, E, hE(·)) is an attributed network with an edge attribute function hE(·) that maps every
undirected edge in E to the two signs {+,−}. In this paper, we represent the positive (resp. negative)
sign by 1 (resp. -1). An edge (u, w) mapped with the + sign is called a positive edge, and it is generally
used for indicating the friendship between the two nodes u and w. On the other hand, an edge mapped
with the − sign is called a negative edge. A negative edge (u, w) indicates that u and w are enemies.
6
1) Influence centralities: Such a problem was previously studied in [13] for ranking nodes in signed
networks. In SRWR [13], a signed random surfer was used. They use the balance theory to imply the
signed random walks. In our paper, it is our special case because it is as same as our how to sampling
the path. In [13], it divides the equation into positive surfer r+
u . However, we can
consider positive and negative situations in a comprehensive way.
u and negative surfer r−
One interesting question for signed networks is how the nodes in signed networks are ranked. Our idea
for this is to use opinion dynamics. If u and w are connected by a positive (resp. negative) edge, then it
is very likely that u will have a positive (resp. negative) influence on w and vice versa. As such, if we
start from a node u with a positive opinion on a certain topic, then a neighbor of node u connected by a
positive (resp. negative) edge will tend to have the same (resp. the opposite) opinion as node u has. Now
we can let the opinion propagate through the entire network (via a certain opinion dynamic) and count
the (expected) number of nodes that have the same opinion as node u has. If such a number is large, then
it seems reasonable to say that node u has a large positive influence on the other nodes in the network.
In other words, a node u has a large positive influence if there is a high probability that the other end
of a randomly selected path has the same opinion as node u. This then leads us to define the notion of
influence centralities for ranking nodes in signed networks.
The above argument is based on the general belief that "a friend of my friend is likely to be my friend"
and "an enemy of my enemy can be my friend" in [2]. As such, for a path r that traverses a sequence of
nodes {u1, u2, . . . , uk−1, uk} in a signed network, we define the following path measure as the product of
the edge signs along the path, i.e.,
f (r) =
hE(ui, ui+1).
(19)
(cid:89)
(ui,ui+1)∈r
Note that f (r) is either 1 or -1 as the edge attribute function hE(·) that maps every undirected edge in
E to {1,−1}. In addition to the path measure, we also need to specify the probability that the path r is
selected, i.e., p0(r) in (15). For this, we consider a random walk with path length 1 or 2 in Example 3.
It then follows from (15), (19) and (5) that
p(r) =
(cid:104)
C · eθhE (u1,u2) · β1
if r = {u1, u2},
2m au1,u2,
C · eθ·hE (u1,u2)·hE (u2,u3) · β2
if r = {u1, u2, u3}.
2m
au1,u2 au2,u3
ku2
,
(20)
The constant C in (20) is the normalization constant. Summing all the paths from u to w yields the
bivariate distribution
pU,W (u, w) = C
eθhE (u,w) · β1
2m
au,w +
eθ·hE (u,u2)·hE (u2,w) · β2
2m
au,u2au2,w
ku2
.
(21)
(cid:105)
(cid:88)
u2∈V
The marginal distribution of the bivariate distribution, denoted by PU (u), is the influence centrality of
node u (with respect to the temperature θ).
If we only select paths with length 1, i.e., β2 = 0 in (21), then there is a closed-form expression for
the influence centrality. For this, we first compute the normalization constant C by summing over u and
w in (21) and this yields
m
C =
m+eθ + m−e−θ ,
(22)
(cid:88)
∂F
∂θ
(cid:115)
7
(24)
(25)
where m+ (resp. m−) is the total number of positive (resp. negative) edges in the graph. Thus, for β2 = 0,
pU (u) =
=
w∈V
pU,W (u, w)
u eθ + k−
u e−θ)
(k+
2(m+eθ + m−e−θ)
,
(23)
u (resp. k−
where k+
Now suppose we require the average path measure ¯f to be equal to some fixed constant −1 < γ < 1,
u ) is the number of positive (resp. negative) edges of node u.
then we have from (17) that
where F = log(1/C) with C in (22) is the free energy. This then leads to
γ = ¯f =
m+ exp(θ) − m− exp(−θ)
m+ exp(θ) + m− exp(−θ)
,
=
θ = ln( 2
m−(1 + γ)
m+(1 − γ)
).
2) Trust centralities: As discussed in the previous section, the influence centralities are based on
the general belief that "an an enemy of my enemy can be my friend." Such a statement might be
valid for modelling opinion dynamics. However, it is not suitable for modelling trust. In addition to the
interpretation of a signed edge as the friend/enemy relationship, another commonly used interpretation
is the trusted/untrusted link. A path r that traverses a sequence of nodes {u1, u2, . . . , uk−1, uk} can be
trusted if every edge is a trusted link so that there exists a chain of trust. In view of this, we consider
another path measure as the minimum of the edge signs along the path, i.e.,
f (r) = min
(ui,ui+1)∈r
hE(ui, ui+1).
(26)
If we use the random walk with path length 1 or 2 to sample a path r in G(V, E) as in (5), then the
sampling distribution for the signed network with the path measure in (26) can be written as follows:
C · eθhE (u1,u2) · β1
if r = {u1, u2},
2m au1,u2,
C · eθ·min[hE (u1,u2),hE (u2,u))] · β2
if r = {u1, u2, u3}.
au1,u2 au2,u3
ku2
,
2m
p(r) =
(cid:104)
Moreover, we have the following bivariate distribution
pU,W (u, w) = C
eθhE (u,w) · β1
2m
au,w +
eθ·min[hE (u,u2),hE (u2,w)] · β2
2m
au,u2au2,w
ku2
(cid:88)
u2∈V
(cid:105)
,
(27)
(28)
where C is the normalization constant. The marginal distribution of the bivariate distribution, denoted by
PU (u), is the trust centrality of node u (with respect to the temperature θ). We note that if we only select
paths with length 1, i.e., β2 = 0, then the trust centrality is the same as the influence centrality in (23).
B. Advertisement-specific influence centralities in networks with node attributes
G(V, E) with the node attribute function hV (u) that maps every node u to a vector in Rp
In this section, we consider another class of attributed networks that have node attributes. For a graph
(hV,1(u), hV,2(u), . . . , hV,p(u)).
(29)
8
One intuitive way to interpret such an attributed network is to view the graph G(V, E) as a social network
with n users and the attribute vector in (29) as the scores of user u on various topics. Now suppose
an advertisement z can be represented by a vector of scores (z1, z2, . . . , zp) with zi being the score of
the ith topic. Then we would like to find out who are the most influential users in the network to pass
on the advertisement z. Such a problem was previously studied in [14] for ranking nodes in Twitter. In
TwitterRank [14], a two-step approach was used. First, a topic-specific ranking is obtained for each topic
by using a random surfer model similar to that in PageRank [17]. The second step is then to take the
weighted average over these topic-specific rankings. Specifically, suppose that RTi(u) is the ranking for
topic i and user u. TwitterRank for advertisement z and user u is then defined as the following weighted
average:
ziRTi(u).
(30)
p(cid:88)
i=1
One flaw for such a two-step approach is that it neglects the fact that the propagation of a specific
advertisement through a user depends on how much a user "likes" the advertisement. To model how
much a user "likes" an advertisement, we use the similarity measure from the inner product of the score
vector of the user and that of the advertisement. It is possible that in a cascade of two users {u1, u2},
both users like the advertisement because their inner products are large, but user u1 likes one topic in
that advertisement and user u2 likes another different topic in that advertisement. Such a cascade cannot
be caught by using the two-step approach in TwitterRank [14]. In view of this, it might be better to
use a single-step approach for computing advertisement-specific influence centralities. As the influence
centralities in the previous section, we propose using opinion dynamics through a path. For a path r that
traverses a sequence of nodes {u1, u2, . . . , uk−1, uk} in the attributed network, we define the following
path measure
(31)
where
z · hV (ui) =
zi · hV,i(ui)
f (r) = min
ui∈r
[z · hV (ui)],
p(cid:88)
i=1
is the inner product of z and hV (u), If we use the random walk with path length 1 or 2 to sample a path
r in G(V, E) as in (5), then the sampling distribution for the attributed network with the path measure in
(31) can be written as follows:
p(r) =
C · eθ min[z·hV (u1),z·hV (u2)] · β1
if r = {u1, u2},
2m au1,u2,
C · eθ·min[z·hV (u1),z·hV (u2),z·hV (u3)] · β2
2m
if r = {u1, u2, u3}.
au1,u2 au2,u3
ku2
,
(32)
TABLE I: The Jaccard index results of influence centralities for various γ settings by β2=0
9
ranking by
positive edge
ranking by
negative edge
ranking by
total edge
γ=-0.99
θ=-3.8310
γ=-0.9
θ=-2.6566
γ=-0.5
θ=-1.7337
γ=0
θ=-1.1844
γ=0.5
θ=-0.6351
γ=0.9
θ=0.2878
γ=0.99
θ=1.4323
0.0417
0.0753
0.2658
0.7241
0.8868
1
1
0.7544
0.6667
0.3514
0.0989
0.0638
0.0417
0.0417
0.0417
0.0753
0.2658
0.7241
0.8868
0.9608
0.9608
Moreover, we have the following bivariate distribution
(cid:104)
pU,W (u, w) = C
(cid:88)
u2∈V
+
eθ min[z·hV (u),z·hV (w)] · β1
2m
au,u2au2,w
au,w
eθ·min[z·hV (u),z·hV (u2),z·hV (w)] · β2
2m
ku2
(cid:105)
,
(33)
where C is the normalization constant. The marginal distribution of the bivariate distribution, denoted by
PU (u), is the advertisement-specific influence centrality of node u for advertisement z (with respect to
the temperature θ).
A. Experiment for influence centrality
IV. EXPERIMENT
In this section, we evaluate our model on the real-world network proposed in [23] which is a directed
network of hyperlinks between weblogs of US politics recorded by Adamic and Glance. The data on
political leaning come from blog directories as indicated. Some blogs were labeled manually, based on
incoming and outgoing links and posts around the time of the United States presidential election of 2004.
Basically, there are 1,490 nodes and 19,090 edges in this dataset. For our purposes, we would like to
examine our algorithm in a undirected signed network. Therefore, we choose the nodes from different
community and adding 4,000 negative edges to this network. As a reason that every node should be treated
fairly, we randomly pick up the node in the different community instead of choosing those with a higher
degree. Then let the the adjacency matrix A = A + AT because we want to get the undirected network.
Before we rank these nodes, we have to delete the nodes with degree smaller than 7, that is, their ranks
are not important. Furthermore, we also remove the edges which are self-loop and the edges between two
nodes if they are connected by more than one edges. As a result, we obtain the directed signed network
containing 863 nodes and 16,650 edges, including 15,225 positive edges and 1,425 negative edges.
1) Experiment by β2=0: In Figure 1, we show the distribution of ranking by β2=0. Initially, the top 100
nodes are uniformly distributed on the right side on (a). However, when the value of gamma increases,
the top 100 nodes gradually gather in the middle of two community where nodes have more edges than
those on the edge of the graph. Also, these top 100 nodes are divided into two clusters and for the nodes
in each cluster, they are closely compact with each other. From so, the key persons for these two clusters
can be found at ease. On the other hand, we can get the information of which nodes are affecting others
in a negative way while gamma is lower. That is to say; these nodes usually have a much higher negative
10
(a) γ = -0.9, θ=-2.6566
(b) γ =-0.5, θ=-1.7337
(c) γ =0, θ=-1.1844
(d) γ =0.5, θ=-0.6351
(e) γ =0.9, θ=0.2878
(f) γ =0.99, θ=1.4623
Fig. 1: The ranking result of influence centralities by β2=0 with different theta
degree compared to others. We can view the nodes with a higher negative degree as people who are sent
to attack the opponent team, which we call a hitman in this paper. Since these graphs only provide the
fact that the top 100 nodes would gather in the middle of the graph if gamma is close to 1, we use Jaccard
index for more detail explanation. The Jaccard index is a statistic used for comparing the similarity and
diversity of sample sets. It can be denoted as
J(S1, S2) =
S1 ∩ S2
S1 ∪ S2 ,
(34)
where S1 and S2 are the sample sets.
In Table I, we use three kinds of Jaccard index as metrics for comparing the similarity between two
sample sets. The negative Jaccard index, the similarity between the set ranked by negative edges and the
set ranked by β2 = 0. Similarly, the positive (total) Jaccard index is the similarity between the set ranked
by positive (total) edges and the set ranked by β2 = 0. It is easy for us to conclude that the increment
of gamma has a positive impact on raising theta. Also, the change of theta causes the change of all three
Jaccard indexes. More specifically, the negative Jaccard index decreases and the positive Jaccard index
increases along with the increment of theta. Interestingly, the total Jaccard index has a larger value when
theta is closer to zero. In order to look into the relationship between these three parameters, Figure 2 is
plotted.
In Figure 2, we can make a conclusion that the positive Jaccard index and the negative Jaccard index have
positive and negative relation with gamma respectively. For the total Jaccard index, it has its maximum
11
Fig. 2: The Jaccard index compare of influence centralities by β2 = 0
TABLE II: The Jaccard index results of influence centralities for various θ settings by β1=0.7 and β2=0.3.
ranking by
positive edge
ranking by
negative edge
ranking by
total edge
θ=-2
θ=-1.5
θ=-1
θ=-0.5
θ=0
θ=0.5
θ=1
θ=1.5
θ=2
0.3423
0.4925
0.6949
0.8868
0.9608
0.9802
1
1
1
0.3423
0.1976
0.1299
0.0753
0.0638
0.0638
0.0582
0.0582
0.0582
0.3605
0.5152
0.7241
0.9231
1
0.9802
0.9608
0.9608
0.9608
when gamma is close to 0.8. This implies the fact that the closer to 0.8 the gamma is, the closer to
zero the theta is. As a result, we can use this fact as a pioneering method to define the centrality for a
signed network. That is to say, the centrality can be defined by the adjustment of temperature (theta). By
using opinion dynamic, there are three different centralities able to be defined. First, the positive influence
centrality, representing those people who give you positive influences (e.g., your friends), can be found
by increasing the temperature (theta). On the contrary, the negative influence centrality stands for those
people giving you negative influences like your enemy. We figure it out by lowering down the temperature
(theta). Last, the total influence centrality is the representation for the famous people among all. For these
famous people, the thing we only care about is how many people know him instead of how many people
love him or hate him. Thus, we make the temperature (theta) close to zero to find the total influence
centrality.
2) Experiment by β1 = 0.7 and β2 = 0.3: In Figure 3, we show the distribution of ranking by β1 = 0.7
and β2 = 0.3. Same as Figure 1, theta has the same effect for gathering node in the middle of graphs.
In addition, we can observe that the hitmen by setting β1 = 0.7 and β2 = 0.3 are slightly different from
ranking by β2 = 0. The reason is that when we have the information from our neighbors' neighbor, some
messages that our neighbors are unwilling to tell may be revealed. Therefore, these hidden hitmen will
emerge due to the exposure of these secret messages. More details are provided in Table II.
In Table II, the values for the three Jaccard indexes we proposed are listed. As the theta increases,
the positive Jaccard index does increase as a very similar way as listed in Table I. However, the positive
gamma-1-0.500.51Jaccard index00.20.40.60.81Jaccard index compare for first 100Positive Jaccard indexNegative Jaccard indexTotal Jaccard index12
(a) θ =-3
(b) θ =-2
(c) θ =-1
(d) θ =0
(e) θ =1
(f) θ =2
Fig. 3: The ranking result of influence centralities by β1 = 0.7 and β2 = 0.3
Jaccard index in Table I is one when θ is 0.2878 and the positive Jaccard index is one when θ is one.
We can find if we consider the path which length is two, the positive Jaccard index converges slowly. It
is because we have to consider more information than only consider the path which length is one. The
obvious difference is that the negative Jaccard index values are much lower compared to the result that
only consider the path which length is one. Due to the fact that when considering not just the neighbors of
a node but both its neighbors and its neighbors' neighbors, we would get more information and thus find
a more global ranking. The negative Jaccard index and the total Jaccard index have very similar changes
of behavior as the positive Jaccard index when considering the path which length is two. To study more
about the difference between these two path sampling, Figure 4 provides more graphical details.
For the negative Jaccard index, it is relatively lower compared to the result of considering the path
which length is one in Figure 4. Since considering the path which length is two would consider two
edges rather than one, it means that there will be four circumstances to consist a two-step edge pair
including negative/negative, negative/positive, positive/negative and positive/positive. We have to consider
the positive/negative and negative/positive edge pairs to figure out the negative Jaccard index. Therefore,
the lower negative Jaccard index has been generated. In the same way, we have to add the positive/positive
and negative/negative edge pairs into our consideration for the calculation of the positive Jaccard index.
We also look forward to a relatively lower positive Jaccard index when θ is not too large same as the
negative Jaccard index does. However, there are only 8.5% of negative edges in this network such that
the influence of negative edges can be ignored. As a result, the positive Jaccard index acts in the same
13
Fig. 4: The Jaccard index compare of influence centralities by β1=0.7 and β2=0.3.
(a) θ =0
(b) θ =1
(c) θ =2
Fig. 5: The ranking result of trust centralities by β1=0.7 and β2=0.3 with different theta
way as it does in considering the path which length is only one when theta grows larger.
In opinion dynamic, we say that the spread of the information is a way to define centrality. Considering
the path which length is only one provides a way to find the influence centrality for a node to its neighbors.
Moreover, if we want to find the influence centrality for a node to those nodes which can not be reached
in random walk only one step, we have to apply random walk more step to figure this out.
B. Experiment for trust centrality
We use the same data as used in the experiment for influence centrality. In trust centrality, we have
to consider the path which length is two because if only considering the path which length is one the
result is as same as the influence centrality considering only the path which length is one. In Figure 5,
no matter how we adjust theta, figure (a), (b) and (c) look similar. It is because the higher ranking node
has more positive edges in trust centrality, and we have to consider positive/positive edges in two-step
approach. Then in this dataset, the positive edges accounted for 91.5%. When theta is closer to zero, the
rank is more similar to rank by total edges. When theta is larger, the rank is more similar to rank by
positive edges. It is different from Figure 4.
theta-3-2-10123Jaccard index00.20.40.60.81Jaccard index compare for first 100Positive Jaccard indexNegative Jaccard indexTotal Jaccard index14
Fig. 6: The Jaccard index compare of trust centralities.
(a) θ =0
(b) θ =0.05
(c) θ =0.1
Fig. 7: The ranking result of advertisement-specific influence centralities with different theta
In Figure 4, the line of positive Jaccard index slowly close to one when theta is larger. It is because it
has to consider the negative/negative and positive/positive edges. In Figure 6, we only have to consider
positive/positive edges, so the line is equal to one when theta is larger. It is as same as the line in Figure
2. With the increase of theta, we can find who is worthy of our trust. It is our definition of trust centrality.
C. Experiment for advertisement-specific influence centrality
We evaluate our model on MemeTracker dataset [24], which tracks the quotes and phrases that frequently
appear over time across mass media and personal blogs. Each cascade is composed of a "meme' (the
phrase being mentioned), and the timestamps records of sites which have mentioned that phrase. To get
advertisement information from these memes, we leverage Carrot2 [25], an open source clustering engine,
with STC clustering algorithm to classify memes into fifteen topics including People, Going, Know, Years,
Way, United States, States, Life, Believe, Lot, Love, America, Country, Barack Obama and Obama. For
the data-independency purpose, we delete United States and Barack Obama since they are subsets of topic
theta-3-2-10123Jaccard index00.20.40.60.81Jaccard index compare for first 100Positive Jaccard indexTotal Jaccard index15
States and Obama. Therefore, we obtain a dataset with thirteen regularly-used phrases in it. Before we
rank these nodes, we have to delete the nodes with degree smaller than 7 and self-loop edges, that is,
their ranks are not important. As a result, we obtain the attributed network containing 2082 nodes and
16,503 edges.
We choose the phrase "Going" as an advertisement and input it into the existing attributed network
that has node attribute. Since the ranking results by the sampling with path length 1 and the sampling
with path length 2 are almost the same, we simply use the rank of sampling with path length 1 to do
performance evaluation. Then, treating the advertisement as a sampling bias to find the pass measure and
plot it as Figure 7 varying with θ. As so, it is obvious to see that the red nodes with higher rank gradually
gather in the middle of the graph while θ slowly decrease down to zero. Then, we use Jaccard index for
more detail explanation.
Fig. 8: The Jaccard index compare of advertisement-specific influence centralities.
In this paper, we simply call the Jaccard index between the rank of degree and the rank generated by
setting β2 = 0 as Degree Jaccard index. Also, we call the Jaccard index between the rank of the regularly-
used phrases and rank generated by setting the β2 = 0 as Advertisement Jaccard index. In Figure 8, we
show the relationship between θ and the two Jaccard index respectively. Degree Jaccard index has an
escalating trend while θ is close to zero. On the other hand, Advertisement Jaccard index raises up as
θ grows large, we claim it as advertisement-specific influence centrality. Then, the smaller the θ is, the
more similar the ranking is to the rank of degree. On the contrary, if the θ increases, the rank would be
more relevant to the rank of advertisement.
For experimental settings, we set θ as 0.2 because the top 250 nodes do not change by increasing the
θ over than 0.2. Then we choose the top six most frequently-used phrases as test data, including Going,
Know, People, Years, America, and Obama. We apply each phrase to our algorithm one by one and find
that the top rank nodes are not in complete accord. Figure 9 leads to the fact that the top rank nodes may
not be the same between any two topics.
Besides, we combine advertisements from different aspects and do the performance evaluation to find
the top rank node of these advertisements. In Figure 10, figure (a) is combined by two advertisements that
is "Going" and "Obama," and figure (b) is combined by the advertisement "Know" and the advertisement
"America". The result is not necessarily the same compared to the result of each advertisement we used
to combine in.
theta00.050.10.150.2Jaccard index00.20.40.60.81Jaccard index compare for first 250Advertisement Jaccard indexDegree Jaccard index16
(a) Going
(b) Know
(c) People
(a) Years
Fig. 9: The ranking result of advertisement-specific influence centralities with different advertisement
(b) America
(c) Obama
As a result, if there is an advertisement containing all sort of contents and we would like to know who
is the most influential person to it in the existing network, we can get the answer through this experiment.
Briefly speaking, we pick up those important phrases in the contents manually and apply them to our
algorithms. Thus, those nodes which are truly beneficial to the promotion for the advertisement can be
found out. This may be very different to the fact that people usually think the higher degree a node has
the more value the node can create for an advertisement.
V. CONCLUSION
In this paper, we extend our previous work in [16] to attributed networks. Our approach is to extend
the bivariate distributions in an unsigned network to a signed network by using the exponential change
of measure. Hence, the centrality is also being separated into three different terms of centrality which are
the positive influence centrality, negative influence centrality, and the total influence centrality. Besides,
the experimental results also help us learn the relationship between temperature (theta) and the three
centralities. We also would like to extend this definition to community detection and not just using it as
centrality.
[1] L. C. Freeman, "A set of measures of centrality based on betweenness," Sociometry, pp. 35 -- 41, 1977.
[2] M. Newman, Networks: an introduction. Oxford university press, 2010.
[3] L. C. Freeman, "Centrality in social networks conceptual clarification," Social networks, vol. 1, no. 3, pp. 215 -- 239, 1978.
REFERENCES
17
(a) Going and Obama
(b) Know and America
Fig. 10: The ranking result of advertisement-specific influence centralities with combining two advertise-
ment
[4] P. J. Mucha, T. Richardson, K. Macon, M. A. Porter, and J.-P. Onnela, "Community structure in time-dependent, multiscale, and
multiplex networks," science, vol. 328, no. 5980, pp. 876 -- 878, 2010.
[5] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Gossip algorithms: Design, analysis and applications," in INFOCOM 2005. 24th Annual
Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 3.
IEEE, 2005, pp. 1653 -- 1664.
[6] C.-S. Chang, C.-Y. Hsu, J. Cheng, and D.-S. Lee, "A general probabilistic framework for detecting community structure in networks,"
in INFOCOM, 2011 Proceedings IEEE.
IEEE, 2011, pp. 730 -- 738.
[7] L. Page, S. Brin, R. Motwani, and T. Winograd, "The pagerank citation ranking: Bringing order to the web." Stanford InfoLab, Tech.
[8] V. Latora and M. Marchiori, "A measure of centrality based on network efficiency," New Journal of Physics, vol. 9, no. 6, p. 188,
[9] E. Estrada and J. A. Rodriguez-Velazquez, "Subgraph centrality in complex networks," Physical Review E, vol. 71, no. 5, p. 056103,
Rep., 1999.
2007.
2005.
[10] A. Mohammadinejad, R. Farahbakhsh, and N. Crespi, "Employing personality feature to rank the influential users in signed
networks," in Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing
and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), 2016 IEEE International Conferences on.
IEEE, 2016, pp.
346 -- 353.
[11] H. Kim and R. Anderson, "Temporal node centrality in complex networks," Physical Review E, vol. 85, no. 2, p. 026107, 2012.
[12] D. Taylor, S. A. Myers, A. Clauset, M. A. Porter, and P. J. Mucha, "Eigenvector-based centrality measures for temporal networks,"
Multiscale Modeling & Simulation, vol. 15, no. 1, pp. 537 -- 574, 2017.
[13] J. Jung, W. Jin, L. Sael, and U. Kang, "Personalized ranking in signed networks using signed random walk with restart," in Data
Mining (ICDM), 2016 IEEE 16th International Conference on.
IEEE, 2016, pp. 973 -- 978.
[14] J. Weng, E.-P. Lim, J. Jiang, and Q. He, "Twitterrank: finding topic-sensitive influential twitterers," in Proceedings of the third ACM
international conference on Web search and data mining. ACM, 2010, pp. 261 -- 270.
[15] C.-S. Chang, C.-J. Chang, W.-T. Hsieh, D.-S. Lee, L.-H. Liou, and W. Liao, "Relative centrality and local community detection,"
Network Science, vol. 3, no. 4, pp. 445 -- 479, 2015.
[16] C.-S. Chang, D.-S. Lee, L.-H. Liou, S.-M. Lu, and M.-H. Wu, "A probabilistic framework for structural analysis in directed networks,"
in Communications (ICC), 2016 IEEE International Conference on.
IEEE, 2016, pp. 1 -- 6.
[17] S. Brin and L. Page, "Reprint of: The anatomy of a large-scale hypertextual web search engine," Computer networks, vol. 56, no. 18,
[18] M. Rosvall and C. Bergstrom, "Maps of information flow reveal community structure in complex networks," arXiv preprint physics.soc-
pp. 3825 -- 3833, 2012.
ph/0707.0609, 2007.
[19] R. Lambiotte, J.-C. Delvenne, and M. Barahona, "Random walks, markov processes and the multiscale modular organization of complex
networks," IEEE Transactions on Network Science and Engineering, vol. 1, no. 2, pp. 76 -- 90, 2014.
[20] T. M. Cover and J. A. Thomas, Elements of information theory.
[21] C.-S. Chang, Performance guarantees in communication networks. Springer Science & Business Media, 2012.
John Wiley & Sons, 2012.
[22] S. Juneja and P. Shahabuddin, "Rare-event simulation techniques: an introduction and recent advances," Handbooks in operations
research and management science, vol. 13, pp. 291 -- 350, 2006.
18
[23] L. A. Adamic and N. Glance, "The political blogosphere and the 2004 us election: divided they blog," in Proceedings of the 3rd
international workshop on Link discovery. ACM, 2005, pp. 36 -- 43.
[24] J. Leskovec, L. Backstrom, and J. Kleinberg, "Memetracker data," 2008.
[25] S. Osi´nski and D. Weiss, "Carrot2: Design of a flexible and efficient web information retrieval framework," in International atlantic
web intelligence conference. Springer, 2005, pp. 439 -- 444.
|
1210.3587 | 1 | 1210 | 2012-10-12T18:04:45 | Inferring the Underlying Structure of Information Cascades | [
"cs.SI",
"cs.AI",
"physics.soc-ph"
] | In social networks, information and influence diffuse among users as cascades. While the importance of studying cascades has been recognized in various applications, it is difficult to observe the complete structure of cascades in practice. Moreover, much less is known on how to infer cascades based on partial observations. In this paper we study the cascade inference problem following the independent cascade model, and provide a full treatment from complexity to algorithms: (a) We propose the idea of consistent trees as the inferred structures for cascades; these trees connect source nodes and observed nodes with paths satisfying the constraints from the observed temporal information. (b) We introduce metrics to measure the likelihood of consistent trees as inferred cascades, as well as several optimization problems for finding them. (c) We show that the decision problems for consistent trees are in general NP-complete, and that the optimization problems are hard to approximate. (d) We provide approximation algorithms with performance guarantees on the quality of the inferred cascades, as well as heuristics. We experimentally verify the efficiency and effectiveness of our inference algorithms, using real and synthetic data. | cs.SI | cs | Inferring the Underlying Structure of Information Cascades
Bo Zong, Yinghui Wu, Ambuj K. Singh, and Xifeng Yan
Department of Computer Science
University of California at Santa Barbara
Santa Barbara, CA 93106-5110, USA
{bzong, yinghui, ambuj, xyan}@cs.ucsb.edu
2
1
0
2
t
c
O
2
1
]
I
S
.
s
c
[
1
v
7
8
5
3
.
0
1
2
1
:
v
i
X
r
a
Abstract -- In social networks,
information and influence
diffuse among users as cascades. While the importance of
studying cascades has been recognized in various applications,
it is difficult to observe the complete structure of cascades
in practice. Moreover, much less is known on how to infer
cascades based on partial observations. In this paper we
study the cascade inference problem following the independent
cascade model, and provide a full treatment from complexity
to algorithms: (a) We propose the idea of consistent trees
as the inferred structures for cascades; these trees connect
source nodes and observed nodes with paths satisfying the
constraints from the observed temporal information. (b) We
introduce metrics to measure the likelihood of consistent trees
as inferred cascades, as well as several optimization problems
for finding them. (c) We show that the decision problems
for consistent trees are in general NP-complete, and that the
optimization problems are hard to approximate. (d) We provide
approximation algorithms with performance guarantees on the
quality of the inferred cascades, as well as heuristics. We
experimentally verify the efficiency and effectiveness of our
inference algorithms, using real and synthetic data.
Keywords-information diffusion; cascade inference
I. INTRODUCTION
In various real-life networks, users frequently exchange
information and influence each other. The information (e.g.,
messages, articles, recommendation links) is typically cre-
ated from a user and spreads via links among users, leaving a
trace of its propagation. Such traces are typically represented
as trees, namely, information cascades, where (a) each node
in a cascade is associated with the time step at which it
receives the information, and (b) an edge from a node to
another indicates that a user propagates the information to
and influences its neighbor [4], [12].
A comprehensive understanding and analysis of cascades
benefit various emerging applications in social networks [6],
[16], viral marketing [1], [9], [27], and recommendation
networks [24]. In order to model the propagation of infor-
mation, various cascade models have been developed [8],
[31], [33]. Among the most widely used models is the
independent cascade model [16], where each node has only
one chance to influence its inactive neighbors, and each node
is influenced by at most one of its neighbors independently.
Nevertheless, it is typically difficult to observe the entire
cascade in practice, due to the noisy graphs with missing
data, or data privacy policies [21], [29]. It is important to
"Iphone 4s"
Bill,1
0.7
Ann,0
Ann,0
0.7
0.8
Ann,0
Bill,1
Mike
...
0
.
5
0.8
0
.
3
0
.
8
Jack
0.8
0.3
Tom
0.6
G
0.7
0.9
0.4
0
.
8
Mary,3
0.7
Mike
0.9
Mary,3
T1
Jack
0.7
0.8
Bill,1
Jack
0.8
Mary,3
T2
Figure 1: A cascade of an Ad (partially observed) in a
social network G from user Ann, and its two possible tree
representations T1 and T2.
develop techniques that can infer the cascades using partial
information. Consider the following example.
Example 1: The graph G in Fig. 1 depicts a fraction of a
social network (e.g., Twitter), where each node is a user, and
each edge represents an information exchange. For example,
edge (Ann, Bill) with a weight 0.7 represents that a user Ann
sends an advertisement (Ad) about a released product (e.g.,
"Iphone 4s") with probability 0.7. To identify the impact of
an Ad strategy, a company would like to know the complete
cascade starting from their agent Ann. Due to data privacy
policies, the observed information may be limited: (a) at
time step 0, Ann posts an Ad about "Iphone 4s"; (b) at time
step 1, Bill is influenced by Ann and retweets the Ad; (c)
by time step 3, the Ad reaches Mary, and Mary retweets
it. As seen, the information diffuses from one user to his
or her neighbors with different probabilities, represented by
the weighted edges in G. Note that the cascade unfolds as
a tree, rooted at the node Ann.
To capture the entire topological information of the cas-
cades, we need to make inferences in the graph-time domain.
Given the above partially observed information, two such
inferred cascades are shown as trees T1 and T2 in Fig. 1. T1
illustrates a cascade where each path from the source Ann to
each observed node has a length that exactly equals to the
time step, at which the observed node is influenced, while
T2 illustrates a cascade where any path in T2 from Ann to an
observed node has a length no greater than the observed time
step when the node is influenced, due to possible delay in
observation, e.g., Mary is known to be influenced by (instead
of exactly at) time step 3. The inferred cascades provide
useful information about the missing links and users that
are important in the propagation of the information.
The above example highlights the need to make reason-
able inference about the cascades, according to only the
partial observations of influenced nodes and the time at
or by which they are influenced. Although cascade models
and a set of related problems, e.g., influence maximization,
have been widely studied, much less is known on how to
infer the cascade structures, including complexity bounds
and approximation algorithms.
Contributions. We investigate the cascade inference prob-
lem, where cascades follow the widely used independent
cascade model. To the best of our knowledge,
this is
the first work towards inferring cascades as general trees
following independent cascade model, based on the partial
observations.
(a) We introduce the notions of (perfect and bounded) con-
sistent trees in Section II. These notions capture the inferred
cascades by incorporating connectivity and time constraints
in the partial observations. To provide a quantitative measure
of the quality of inferred cascades, we also introduce two
metrics in Section II, based on (i) the size of the consistent
trees, and (ii) the likelihood when a diffusion function of
the network graph is taken into account, respectively. These
metrics give rise to two optimization problems, referred to as
the minimum consistent tree problem and minimum weighted
consistent tree problem.
(b) We investigate the problems of identifying perfect and
bounded consistent trees, for given partial observations, in
Section III and Section IV, respectively. These problems are
variants of the inference problem.
(i) We show that these problems are all NP-complete. Worse
still, the optimization problems are hard to approximate:
unless P = NP, it is not possible to approximate the problems
within any constant ratio.
(ii) Nevertheless, we provide approximation and heuristic
algorithms for these problems. For bounded trees, the prob-
lems are O(X ∗ log fmin
)-approximable, where X is the
log fmax
size of the partial observation, and fmin (resp. fmax) are the
minimum (resp. maximum) probability on the graph edges.
We provide such polynomial approximation algorithms. For
perfect trees, we show that it is already NP-hard to even
find a feasible solution. However, we provide an efficient
heuristics using a greedy strategy. Finally, we address a
practical special case for perfect tree problems, which are
O(d∗ log fmin
)-approximable, where d is the diameter of the
log fmax
graph, which is typically small in practice.
(c) We experimentally verify the effectiveness and the effi-
ciency of our algorithms in Section V, using real-life data
and synthetic data. We show that our inference algorithms
can efficiently infer cascades with satisfactory accuracy.
Related work. We categorize related work as follows.
Cascade Models. To capture the behavior of cascades, a
variety of cascade models have been proposed [2], [13], [15],
[17], [18], such as Suscepctible/Infected (SI) model [2], de-
creasing cascade model [17], triggering model [16], Shortest
Path Model [19], and the Susceptible/Infected/Recover (SIR)
model [18]. In this paper, we assume that the cascades follow
the independent cascade model [13], which is one of the
most widely studied models (the shortest path model [19] is
one of its special cases).
Cascade Prediction. There has been recent work on cas-
cade prediction and inference, with the emphasis on global
properties (e.g., cascade nodes, width, size) [5], [11], [20],
[23], [29], [31], [33] with the assumption of missing data
and partial observations. The problem of identifying and
ranking influenced nodes is addressed in [20], [23], but
the topological inference of the cascades is not considered.
Wang et al. [33] proposed a diffusive logistic model to
capture the evolution of the density of active users at a
given distance over time, and demonstrated the prediction
ability of this model. Nevertheless, the structural informa-
tion about the cascade is not addressed. Song et al. [31]
studied the probability of a user being influenced by a given
source. In contrast, we consider a more general inference
problem where there are multiple observed users, who are
influenced at different time steps from the source. Fei et
al. [11] studied social behavior prediction and the effect of
information content. In particular, their goal is to predict
actions on an article based on the training dataset. Budak et
al. [5] investigated the optimization problem of minimizing
the number of the possible influencing nodes following
a specified cascade model, instead of predicting cascades
based on partial observations.
All the above works focus on predicting the nodes and
their behavior in the cascades. In contrast, we propose
approaches to infer both the nodes and the topology of the
cascades in the graph-time domain.
Network Inference. Another host of work study network
inference problem, which focuses on inferring network
structures from observed cascades over the unknown net-
work, instead of inferring cascade structures as trees [10],
[14]. Manuel et al.
[14] proposes techniques to infer the
structure of a network where the cascades flow, based on
the observation over the time each node is affected by a
cascade. Similar network inference problem is addressed
in [10], where the cascades are modeled as (Markov random
walk) networks. The main difference between our work and
theirs is (a) we use consistent trees to describe possible
cascades allowing partial observations; (b) we focus on
inferring the structure of cascades as trees instead of the
backbone networks.
Closer to our work is the work by Sadikov et al. [29] that
consider the prediction of the cascades modeled as k-trees, a
Ann,0
Ann,0
Ann,0
Ann,0
Bill,1
Bill,1
Jack
Bill,1
Mike
Bill,1
Jack
Tom
Jack
Tom
Mary,3
T3
Mary,3
T4
Mary,3
T5
Mary,3
T6
Figure 2: Tree representations of a partial observation X =
{(Ann, 0), (Bill, 1), (Mary, 3)}: T3, T4 and T5 are consistent
Trees, while T6 is not.
balanced tree model. The global properties of cascades such
as size and depth are predicted based on the incomplete
cascade. In contrast to their work, (a) we model cascades as
general trees instead of k-balanced trees, (b) while Sadikov
et al. [29] assume the partial cascade is also a k-tree and
predict only the properties of the original cascade, we infer
the nodes as well as topology of the cascades only from a set
of nodes and their activation time, using much less available
information. (c) The temporal information (e.g., time steps)
in the partial observations is not considered in [29].
II. CONSISTENT TREES
We start by introducing several notions.
Diffusion graph. We denote a social network as a directed
graph G = (V, E, f ), where (a) V is a finite set of nodes,
and each node u ∈ V denotes a user; (b) E ⊆ V × V is
a finite set of edges, where each edge (u, v) ∈ E denotes
a social connection via which the information may diffuse
from u to v; and (c) a diffusion function f : E → R+ which
assigns for each edge (u, v) ∈ E a value f (u, v) ∈ [0, 1], as
the probability that node u influences v.
Cascades. We first
review the independent cascade
model [16]. We say an information propagates over a graph
G following the independent cascade model if (a) at any
time step, each node in G is exactly one of the three states
{active, newly active, inactive}; (b) a cascade starts from
a source node s being newly active at time step 0; (c) a
newly active node u at time step t has only one chance to
influence its inactive neighbors, such that at time t + 1, (i)
if v is an inactive neighbor of u, v becomes newly active
with probability f (u, v); and (ii) the state of u changes from
newly active to active, and cannot influence any neighbors
afterwards; and (d) each inactive node v can be influenced
by at most one of its newly active neighbors independently,
and the neighbors' attempts are sequenced in an arbitrary
order. Once a node is active, it cannot change its state.
Based on the independent cascade model, we define a
cascade C over graph G = (V, E, f ) as a directed tree
(Vc, Ec, s, T ) where (a) Vc ⊆ V , Ec ⊆ E; (b) s ∈ Vc is the
source node from which the information starts to propagate;
and (c) T is a function which assigns for each node vi ∈ Vc
a time step ti, which represents that vi is newly active at
time step ti. Intuitively, a cascade is a tree representation of
the "trace" of the information propagation from a specified
source node s to a set of influenced nodes.
Indeed, one may verify that any cascade from s following
the independent cascade model is a tree rooted at s.
Example 2: The graph G in Fig. 1 depicts a social graph.
The tree T1 and T2 are two possible cascades following the
independent cascade model. For instance, after issuing an ad
of "Iphone 4s", Ann at time 0 becomes "newly active". Bill
and Jack retweet the ad at time 1. Ann becomes "active",
while Bill and Jack are turned to "newly active". The process
repeats until the ad reaches Mary at time step 3. The trace
of the information propagation forms the cascade T1.
As remarked earlier, it is often difficult to observe the
entire structure of a cascade in practice. We model the
observed information for a cascade as a partial observation.
Partial observation. Given a cascade C = (Vc, Ec, s, T ),
a pair (vi, ti) is an observation point, if vi ∈ V is known
(observed) to be newly active at or by time step ti. A partial
observation X is a set of observation points. Specifically,
X is a complete observation if for any v ∈ Vc, there is an
observation point (v, t) ∈ X. To simplify the discussion,
we also assume that pair (s, 0) ∈ X where s is the source
node. The techniques developed in this paper can be easily
adapted to the case where the source node is unknown.
We are now ready to introduce the idea of consistent trees.
A. Consistent trees
Given a partial observation X of a graph G = (V, E, f ),
a bounded consistent tree Ts = (VTs , ETs, s) w.r.t. X is a
directed subtree of G with root s ∈ V , such that for every
(vi, ti) ∈ X, vi ∈ VTs, and s reaches vi by ti hops, i.e., there
exists a path of length at most ti from s to vi. Specifically,
we say a consistent tree is a perfect consistent tree if for
every (vi, ti) ∈ X and vi ∈ VTs, there is a path of length
equals to ti from s to vi.
Intuitively, consistent trees represent possible cascades
which conform to the independent cascade model, as well
as the partial observation. Note the following: (a) the path
from the root s to a node vi in a bounded consistent tree
Ts is not necessarily a shortest path from s to vi in G,
as observed in [22]; (b) the perfect consistent trees model
cascades when the partial observation is accurate, i.e., each
time ti in an observation point (vi, ti) is exactly the time
when vi is newly active; in contrast, in bounded consistent
trees, an observation point (v, t) indicates that node v is
newly active at the time step t′ ≤ t, due to possible delays
in the information propagation, as observed in [6].
Example 3: Recall the graph G in Fig. 1. The partial
observation of a cascade in G is X = {(Ann, 0), (Bill, 1),
(Mary, 3)}. The tree T1 is a perfect consistent tree w.r.t. X,
where T2 is a bounded consistent tree w.r.t. X.
Now consider the trees in Fig. 2. One may verify that (a)
T3, T4 and T5 are bounded consistent trees w.r.t. X; (b) T3
and T4 are perfect consistent trees w.r.t. X, where T5 is not
a perfect consistent tree. (c) T6 is not a consistent tree, as
there is no path from the source Ann to Mary with length
no greater than 3 as constrained by the observation point
(Mary, 3).
B. Cascade inference problem
We introduce the general cascade inference problem.
Given a social graph G and a partial observation X, the
cascade inference problem is to determine whether there
exists a consistent tree T w.r.t. X in G.
There may be multiple consistent trees for a partial ob-
servation, so one often wants to identify the best consistent
tree. We next provide two quantitative metrics to measure
the quality of the inferred cascades. Let G = (V, E, f ) be a
social graph, and X be a partial observation.
Minimum weighted consistent trees. In practice, one often
wants to identify the consistent trees that are most likely to
be the real cascades. Recall that each edge (u, v) ∈ E in a
given network G carries a value assigned by a diffusion
function f (u, v), which indicates the probability that u
influences v. Based on f (u, v), we introduce a likelihood
function as a quantitative metric for consistent trees.
Likelihood function. Given a graph G = (V, E, f ), a partial
observation X and a consistent tree Ts = (VTs , ETs , s), the
likelihood of Ts, denoted as LX (Ts), is defined as:
LX (Ts) = P(X Ts) = Y
f (u, v).
(1)
(u,v)∈ETs
Following common practice, we opt
to use the log-
likelihood metric, where
LX(Ts) = X
log f (u, v)
(u,v)∈ETs
Given G and X, a natural problem is to find the consistent
tree of the maximum likelihood in G w.r.t. X. Using log-
likelihood, the minimum weighted consistent tree problem
is to identify the consistent
tree Ts with the minimum
−LX(Ts), which in turn has the maximum likelihood.
Minimum consistent trees. Instead of weighted consistent
trees, one may simply want to find the minimum structure
that represents a cascade [25]. The minimum consistent tree,
as a special case of the minimum weighted consistent tree,
depicts the smallest cascades with the fewest communication
steps to pass the information to all the observed nodes. In
other words, the metric favors those consistent trees consist
with the given partial observation with the fewest edges.
Given G and X, the minimum consistent tree problem is
to find the minimum consistent trees in G w.r.t. X.
In the following sections, we investigate the cascade
inference problem, and the related optimization problems
using the two metrics. We investigate the problems for
perfect consistent
trees in Section III, and for bounded
consistent trees in Section IV, respectively.
III. CASCADES AS PERFECT TREES
As remarked earlier, when the partial observation X is
accurate, one may want to infer the cascade structure via
perfect consistent trees. The minimum (resp. weighted)
perfect consistent tree problem, denoted as PCTmin (resp.
PCTw) is to find the perfect consistent trees with minimum
size (resp. weight) as the quality metric.
Though it is desirable to have efficient polynomial time
algorithms to identify perfect consistent trees, the problems
of searching PCTmin and PCTw are nontrivial.
Proposition 1: Given a graph G and a partial observation
X, (a) it is NP-complete to determine whether there is a
perfect consistent tree w.r.t. X in G; and (b) the PCTmin
and PCTw problems are NP-complete and APX-hard.
One may verify Proposition 1(a) by a reduction from
the Hamiltonian path problem [32], which is to determine
whether there is a simple path of length V −1 in a graph G
=(V, E). Following this, one can verify that the PCTmin and
PCTw problems are NP-complete as an immediate result.
Proposition 1(b) shows that the PCTmin and PCTw prob-
lems are hard to approximate. The APX class [32] consists
of NP optimization problems that can be approximated by
a polynomial time (PTIME) algorithm within some positive
constant. The APX-hard problems are APX problems to
which every APX problem can be reduced. Hence, the prob-
lem for computing a minimum (weighted) perfect consistent
tree is among the hardest ones that allow PTIME algorithms
with a constant approximation ratio.
It is known that if there is an approximation preserving
reduction (AFP-reduction) [32] from a problem Π1 to a
problem Π2, and if problem Π1 is APX-hard, then Π2 is
APX-hard [32]. To see Proposition 1(b), we may construct
an AFP-reduction from the minimum directed steiner tree
(MST) problem. An instance of a directed steiner tree
problem I = {G, Vr, Vs, r, w} consists of a graph G, a set of
required nodes Vr, a set of steiner nodes Vs, a source node
r and a function w which assigns to each node a positive
weight. The problem is to find a minimum weighted tree
rooted at r, such that it contains all the nodes in Vr and a
part of Vs. We show such a reduction exists. Since MST is
APX-hard, PCTmin is APX-hard.
A. Bottom-up searching algorithm
Given the above intractability and approximation hardness
result, we introduce a heuristic WPCT for the PCTw
problem. The idea is to (a) generate a "backbone network"
Gb of G which contains all the nodes and edges that are
possible to form a perfect consistent tree, using a set of
pruning rules, and also rank the observed nodes in Gb with
2.
3.
4.
5.
6.
Input: graph G and partial observation X.
Output: a perfect consistent tree T in G.
1.
tree T = (VT , ET ), where VT := {v(v, t) ∈ X},
set level l(v):= t for each (v, t) ∈ X, E := ∅;
set Vb := {vbdist(s, vb) ≤ tmax};
if there is a node v in X and v /∈ Vb then return ∅;
set Eb := {(v′, v)(v′, v) ∈ E, v′ ∈ Vb, v ∈ Vb)};
for each v ∈ Vb do
if there is no (vi, ti) ∈ X that
dist(s, v)+dist(v, vi) ≤ ti then
Vb = Vb \ {v};
Eb = Eb \ {(v1, v2)} where v1 = v or v2 = v;
7.
8.
9. graph Gb := (Vb, Eb);
10. list L := {(v1, t1), . . . , (vk, tk)}
where ti ≤ ti+1, (vi, ti) ∈ X, i ∈ [1, k − 1];
11. for each i ∈ [1, tmax] following descending order do
12. Vt:= V1 ∪ V2 ∪ V3, V1 := {vi(v, ti) ∈ X};
V2 := {vv ∈ VT , l(v) = ti};
V3 := {v′(v′, v) ∈ Eb, v ∈ V1 ∪ V2, v′ /∈ VT };
construct Gt = (Vt, Et);
T := T ∪ PCTl(Gt, V1 ∪ V2, V3, i);
13. Et := {(v′, v)v′ ∈ V3, v ∈ V1 ∪ V2, (v′, v) ∈ Eb};
14.
15.
16. if T is a tree then return T ;
17. return ∅;
Procedure PCTl
Input: A bipartite graph Gt,
node set V , node set Vs, a number ti;
Output: a forest Tt.
1. Tt = ∅;
2. construct Tt as a minimum weighted steiner forest
which cover V as the required nodes;
3. for each tree Ti ∈ Tt do
4.
5. return Tt;
l(r) := ti − 1 where r ∈ Vs is the root of Ti;
Figure 3: Algorithm WPCT: initialization, pruning and local
searching
the descending order of their time step in X, and (b) perform
a bottom-up evaluation for each time step in Gb using a
local-optimal strategy, following the descending order of the
time step.
Backbone network. We consider pruning strategies to re-
duce the nodes and the edges that are not possible to be in
any perfect consistent trees, given a graph G = (V, E, f ) and
a partial observation X = {(v1, t1), . . . , (vk, tk)}. We define
a backbone network Gb = (Vb, Eb), where
• Vb = S{vjdist(s, vj) + dist(vj, vi) ≤ ti} for each
(vi, ti) ∈ X; and
• Eb = {(v′, v)v′ ∈ Vb, v ∈ Vb, (v′, v) ∈ E}
Intuitively, Gb includes all the possible nodes and edges
that may appear in a perfect consistent tree for a given
partial observation. In order to construct Gb, a set of
pruning rules can be developed as follows: if for a node
v′ and each observed node v in a cascade with time step
t, dist(s, v′) + dist(v′, v) > t, then v′ and all the edges
connected to v′ can be removed from Gb.
Algorithm. Algorithm WPCT, as shown in Fig. 3, consists
of the following steps:
Initialization (line 1). The algorithm WPCT starts by initial-
izing a tree T , by inserting all the observation points into
T . Each node v in T is assigned with a level l(v) equal to
its time step as in X. The edge set is set to empty.
Pruning (lines 2-10). The algorithm WPCT then constructs
a backbone network Gb with the pruning rules (lines 2-9). It
initializes a node set Vb within tmax hop of the source node
s, where tmax is the maximum time step in X (line 2). If
there exists some node v ∈ X that is not in Vb, the algorithm
returns ∅, since there is no path from s reaching v with t
steps for (v, t) ∈ X (line 3). It further removes the redundant
nodes and edges that are not in any perfect trees, using the
pruning rules (lines 5-8). The network Gb is then constructed
with Vb and Eb at line 9. The partial observation X is also
sorted w.r.t. the time step (line 10).
Bottom-up local searching (lines 11-17). Following a
bottom-up greedy strategy, the algorithm WPCT processes
each observation point as follows. For each i in [1, tmax], it
generates a (bipartite) graph Gt. (a) It initializes a node set
Vt as the union of three sets of nodes V1, V2 and V3 (line 12),
where (i) V1 is the nodes in the observation points with time
step ti, (ii) V2 is the nodes v in the current perfect consistent
tree T with level l(v) = ti, and (iii) V3 is the union of the
parents for the nodes in V1 and V2. (b) It constructs an edge
set Et which consists of the edges from the nodes in V3 to
the nodes in V1 and V2. (c) It then generates Gt with Vt
and the edge set Et, which is a bipartite graph. After Gt is
constructed, the algorithm WPCT invokes procedure PCTl
to compute a "part" of the perfect tree T , which is an optimal
solution for Gt, a part of the graph Gb which contains all
the observed nodes with time step ti. It expands T with the
returned partial tree (line 15). The above process (lines 11-
15) repeats for each i ∈ [1, tmax] until all the nodes in X are
processed. Algorithm WPCT then checks if the constructed
T is a tree. If so, it returns T (line 16). Otherwise, it returns
∅ (line 17). The above procedure is as illustrated in Fig. 4.
Procedure PCTl. Given a (bipartite) graph Gt, and two sets
of nodes V and Vs in Gt, the procedure PCTl computes for
Gt a set of trees Tt = {T1, . . . , Ti} with the minimum total
weight (line 2), such that (a) each Ti is a 2-level tree with
a root in Vs and leaves in V , (b) the leaves of any two trees
in Tt are disjoint, and (c) the trees contain all the nodes in
V as leaves. For each Ti, PCTl assigns its root r in Vs a
level l(r) = ti − 1 (line 4). Tt is then returned as a part
of the entire perfect consistent tree (line 5). In practice, we
may either employ linear programming, or an algorithm for
MST problem (e.g., [28]) to compute Tt.
Example 4: The cascade T1 in Fig. 1, as a minimum
weighted perfect consistent tree, can be inferred by algo-
rithm WPCT as illustrated in Fig. 4. WPCT first initializes
a tree T with the node Mary. It
then constructs Gt as
...
...
...
...
t 1
t i
t i+1
t max
s
Ann,0
...
...
V3
Bill,1
Jack
Tom
Jack
Mike
V1
V2
Mary,3
Gb
Figure 4: The bottom-up searching in the backbone network
to T . Following Mike,
the graph induced by edges (Tom, Mary), (Jack, Mary), and
(Mike, Mary). Intuitively, the three nodes as the parents of
Mary are the possible nodes which accepts the message
at time step 2. It then selects the tree with the maximum
probability, which is a single edge (Mike, Mary), and adds
it
it keeps choosing the optimal
tree structure for each level, and identifies nodes Jack. The
process repeats until WPCT reaches the source Ann. It then
returns the perfect consistent tree T as the inferred cascade
from the partial observation X.
Correctness. The algorithm WPCT either returns ∅, or
correctly computes a perfect consistent tree w.r.t. the partial
observation X. Indeed, one may verify that (a) the pruning
rules only remove the nodes and edges that are not in any
perfect consistent tree w.r.t. X, and (b) WPCT has the loop
invariant that at each iteration i (lines 11-15), it always
constructs a part of a perfect tree as a forest.
Complexity. The algorithm WPCT is in time O(V E +
X2 + tmax ∗ A), where tmax is the maximum time step in
X, and A is the time complexity of procedure PCTl. Indeed,
(a) the initialization and preprocessing phase (lines 1-9)
takes O(V E) time, (b) the sorting phase is in O(X2)
time, (c) the bottom-up construction is in O(tmax ∗ A),
which is further bounded by O(tmax ∗ V 3) if an approx-
imable algorithm is used [28]. In our experimental study, we
utilize efficient linear programming to compute the optimal
steiner forest.
The algorithm WPCT can easily be adapted to the prob-
lem of finding the minimum perfect consistent trees, where
each edge has a unit weight.
Perfect consistent SP trees. The independent cascade model
may be an overkill for real-life applications, as observed
in [7], [19]. Instead, one may identify the consistent trees
which follow the shortest path model [19], where cascades
propagate following the shortest paths. We define a perfect
shortest path (sp) tree rooted at a given source node s as a
perfect consistent tree, such that for each observation point
(v, t) ∈ X of the tree, t = dist(s, v); in other words, the
path from s to v in the tree is the shortest path in G. The
PCTw (resp. PCTmin) problem for sp trees is to identify the
sp trees with the maximum likelihood (resp. minimum size).
Proposition 2: Given a graph G and a partial observation
X, (a) it is in PTIME to find a sp tree w.r.t. X; (b) the PCTmin
and PCTw problems for perfect sp trees are NP-hard and
APX-hard; (c) the PCTw problem is approximable within
O(d ∗ log fmin
), where d is the diameter of G, and fmax
log fmax
(resp. fmin) is the maximum (resp. minimum) probability
by the diffusion function f .
We next provide an approximation algorithm to the PCTw
problem for sp trees. Given a graph G and a partial
observation X,
the algorithm, denoted as WPCTsp (not
shown), first constructs the backbone graph Gb as in the al-
gorithm WPCT. It then constructs node sets Vr = {v(v, t) ∈
X}, and Vs = V \ Vr. Treating Vr as required nodes, Vs as
steiner nodes, and the log-likelihood function as the weight
function, WPCTsp approximately computes an undirected
minimum steiner tree T . If the directed counterpart T ′ of T
in Gb is not a tree, WPCTsp transforms T ′ to a tree: for
each node v in T ′ with more than one parent, it (a) connects
s and v via the shortest path, and (b) removes the redundant
edges attached to v. It then returns T ′ as an sp tree.
One may verify that (a) T ′ is a perfect sp tree w.r.t. X, (b)
the weight −LX(T ′) is bounded by O(d ∗ log fmin
) times of
log fmax
the optimal weight, and (c) the algorithm runs in O(V 3)
time, leveraging the approximation algorithm for the steiner
tree problem [32]. Moreover, the algorithm WPCTsp can be
used for the problem PCTmin for sp trees, where each edge
in G has the same weight. This achieves an approximation
ratio of d.
IV. CASCADES AS BOUNDED TREES
In this section, we investigate the cascade inference
problems for bounded consistent trees.
In contrast to the
intractable counterpart in Proposition 1(a), the problem of
finding a bounded consistent tree for a given graph and a
partial observation is in PTIME.
Proposition 3: For a given graph G and a partial obser-
vation X, there is a bounded consistent tree in G w.r.t. X
if and only if for each (v, t) ∈ X, dist(s, v) ≤ t, where
dist(s, v) is the distance from s to v in G.
Indeed, one may verify the following: (a) if there is
a node (vi, ti) ∈ X where dist(s, vi) > ti, there is no
path satisfies the time constraint and T is empty; (b) if
dist(s, vi) ≤ ti for each node (vi, ti) ∈ X, a BFS tree
rooted at s with each node vi in X as its internal node or
leaf is a bounded consistent tree. Thus, to determine whether
there is a bounded consistent tree is in O(E) time, via a
BFS traversal of G from s.
Given a graph G and a partial observation X, the mini-
mum weighted bounded consistent tree problem, denoted as
BCTw, is to identify the bounded consistent tree T ∗
s w.r.t.
X with the minimum − log LX (T ∗
s ) (see Section II).
Input: graph G and partial observation X.
Output: a bounded consistent tree T in G.
1.
2.
3.
4.
5.
6.
tree T = (Vt, Et), where Vt := {s(s, 0) ∈ X}, Et := ∅;
compute tk bounded BFS DAG Gd of s in G;
for each ti ∈ [t1, tk] do
for each node v where (v, ti) ∈ X and l(v) = i do
if i > ti then return ∅;
find a path ρ from s to v with the
minimum weight w(ρ) = −Σ log f (e) for each e ∈ ρ;
T = T ∪ ρ;
7.
8.
return T as a bounded consistent tree;
Figure 5: Algorithm WBCT: searching bounded consistent
trees via top-down strategy
Theorem 1: Given a graph G and a partial observation
X, the BCTw problem is
(a) NP-complete and APX-hard; and
(b) approximable within O(X ∗ log fmin
log fmax
), where fmax
(resp. fmin) is the maximum (resp. minimum) prob-
ability by the diffusion function f over G.
We can prove Theorem 1(a) as follows. First, the BCTw
problem, as a decision problem, is to determine whether
there exists a bounded consistent tree T with −LX(T ) no
greater than a given bound B. The problem is obviously in
NP. To show the lower bound, one may show there exists a
polynomial time reduction from the exact 3-cover problem
(X3C). Second, to see the approximation hardness, one may
verify that there exists an AFP-reduction from the minimum
directed steiner tree (MST) problem.
We next provide a polynomial time algorithm, denoted as
WBCT, for the BCTw problem. The algorithm runs in linear
time w.r.t. the size of G, and with performance guarantee as
in Theorem 1(b).
Algorithm. The algorithm WBCT is illustrated in Fig. 5.
Given a graph G and a partial observation X, the algorithm
first initializes a tree T = (Vt, Et) with the single source
node s (line 1). It then computes the tk bounded BFS
directed acyclic graph (DAG ) [3] Gd of the source node s,
where tk is the maximum time step of the observation points
in X, and Gd is a DAG induced by the nodes and edges
visited by a BFS traversal of G from s (line 2). Following
a top-down strategy, for each node v of (v, t) ∈ X, WBCT
then (a) selects a path ρ with the minimum Σ log f (e) from
s to v, and (b) extends the current tree T with the path
ρ (lines 3-7). If for some observation point (v, t) ∈ T ,
dist(s, v) > t, then WBCT returns ∅ as the tree T (line 5).
Otherwise,
the
observation points in X are processed.
Correctness and complexity. One may verify that algo-
rithm WBCT either correctly computes a bounded consistent
tree T , or returns ∅. For each node in the observation point
X, there is a path of weight selected using a greedy strategy,
and the top-down strategy guarantees that the paths form a
consistent tree. The algorithm runs in time O(E), since it
the tree T is returned (line 8) after all
visits each edges at most once following a BFS traversal.
We next show the approximation ratio in Theorem 1(b).
Observe that for a single node v in X, (a) the total weight
of the path w from s to v is no greater than −w log fmin,
where w
is the length of w; and (b) the weight of
the counterpart of w in T ∗, denoted as w′,
is no less
than −w∗ log fmax. Also observe that w ≤ w∗. Thus,
w/w∗ ≤ log fmin
. As there are in total X such nodes,
log fmax
. Theorem 1(b)
LX (T )/LX(T ∗) ≤ X w
thus follows.
w∗ ≤ X log fmin
log fmax
Minimum bounded consistent tree. We have considered
the likelihood function as a quantitative metric for the
quality of the bounded consistent trees. As remarked earlier,
one may simply want to identify the bounded consistent
trees of the minimum size. Given a social graph G and
a partial observation X, the minimum bounded consistent
tree problem, denoted as BCTmin, is to identify the bounded
consistent tree with the minimum size, i.e., the total number
of nodes and edges. The BCTmin problem is a special case
of BCTw, and its main result is summarized as follows.
Proposition 4: The BCTmin problem is (a) NP-complete,
(b) APX-hard, and (c) approximable within O(X), where
X is the size of the partial observation X.
Proposition 4(a) and 4(b) can both be shown by construct-
ing reductions from the MST problem, which is NP-complete
and APX-complete [32].
Despite of the hardness, the problem can be approximated
within O(X) in polynomial time, by applying the algo-
rithm WBCT over an instance where each edge has a unit
weight. This completes the proof of Proposition 4(c).
V. EXPERIMENTS
We next present an experimental study of our proposed
methods. Using both real-life and synthetic data, we conduct
three sets of experiments to evaluate (a) the effectiveness of
the proposed algorithms, (b) the efficiency and the scalability
of WPCT and WBCT.
Experimental setting. We used real-life data to evaluate the
effectiveness of our methods, and synthetic data to conduct
an in-depth analysis on scalability by varying the parameters
of cascades and partial observations.
(a) Real-life graphs and cascades. We used the following
real-life datasets. (i) Enron email cascades. The dataset of
Enron Emails 1 consists of a social graph of 86, 808 nodes
and 660, 642 edges, where a node is a user, and two nodes
are connected if there is an email message between them.
We tracked the forwarded messages of the same subjects and
obtained 260 cascades of depth no less than 3 with more
than 8 nodes. (ii) Retweet cascades (RT). The dataset of
Twitter Tweets 2 [35] contains more than 470 million posts
1http://www.cs.cmu.edu/ enron/
2http://snap.stanford.edu/data/twitter7.html
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
1
0.8
0.6
0.4
0.2
0
WPCT
PCTr
PCTg
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.6
0.7
0.5
(a) PCT@Enron: prec
1
0.8
0.6
0.4
0.2
0
WPCT
PCTr
PCTg
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.6
0.7
0.5
l
l
a
c
e
R
l
l
a
c
e
R
0.6
0.5
0.4
0.3
0.2
0.1
0
WPCT
PCTr
PCTg
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.5
0.6
0.7
i
i
n
o
s
c
e
r
P
1
0.8
0.6
0.4
0.2
0
WBCT
BCTr
BCTlp
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.5
0.6
0.7
l
l
a
c
e
R
1
0.8
0.6
0.4
0.2
0
WBCT
BCTr
BCTlp
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.5
0.6
0.7
(b) PCT@Enron: rec
(c) BCT@Enron: prec
(d) BCT@Enron: rec
0.6
0.5
0.4
0.3
0.2
0.1
0
WPCT
PCTr
PCTg
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.5
0.6
0.7
i
i
n
o
s
c
e
r
P
1
0.8
0.6
0.4
0.2
0
WBCT
BCTr
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.5
0.6
0.7
l
l
a
c
e
R
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
WBCT
BCTr
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.5
0.6
0.7
(e) PCT@RT: prec
(f) PCT@RT: rec
(g) BCT@RT: prec
(h) BCT@RT: rec
Figure 6: The prec and rec of the inference algorithms over Enron email cascades and Retweet cascades
from more than 17 million users, covering a period of 7
months from June 2009. We extracted the retweet cascades
of the identified hashtags [35]. To guarantee that a cascade
represents the propagation of a single hashtag, we removed
those retweet cascades containing multiple hashtags. In the
end, we obtain 321 cascades of depth more than 4, with
node size ranging from 10 to 81. Moreover, we used the
EM algorithm from [30] to estimate the diffusion function.
(b) Synthetic cascades. We generated a set of synthetic cas-
cades unfolding in an anonymous Facebook social graph 3,
which exhibits properties such as power-law degree distri-
bution, high clustering coefficient and positive assortativ-
ity [34]. The diffusion function is constructed by randomly
assigning real numbers between 0 and 1 to edges in the
network. The generating process is controlled by size T .
We randomly choose a node as the source of the cascade. By
simulating the diffusion process following the independent
cascade model, we then generated cascades w.r.t. T and
assigned time steps.
(c) Partial observation. For both real life and synthetic
cascades, we define uncertainty of a cascade T as σ =
1− X
VT , where VT is the size of the nodes in T , and X is
the size of the partial observation X. We remove the nodes
from the given cascades until the uncertainty is satisfied, and
collect the remaining nodes and their time steps as X.
(d) Implementation. We have implemented the following in
C++: (i) algorithms WPCT, and WBCT; (ii) two linear
programming algorithms PCTlp and BCTlp, which iden-
tify the optimal weighted bounded consistent
trees and
the optimal perfect consistent trees using linear program-
ming, respectively; (iii) two randomized algorithms PCTr
and BCTr, which are developed to randomly choose trees
Algorithms
Precision
WPCT
WBCT
precv
prece
precv
prece
Enron
Twitter
d=4
d = 4
d=3
d = 5
100% 100% 97.2% 93.2%
78.2% 82.4% 86.1% 82.6%
100% 70.1% 73.6% 66.1%
69%
55.7% 60.6% 41.7%
Table I. precv and prece over real cascades
from given graphs. PCTr
is developed using a similar
strategy for WPCT, especially for each level the steiner
forest is randomly selected (see Section III); as WBCT
does, BCTr runs on bounded BFS directed acyclic graphs,
but randomly selects edges. (iv) to verify various imple-
mentations of WPCT, an algorithm PCTg is developed by
using a greedy strategy to choose the steiner forest for each
level (see Section III). We used LP solve 5.5 4 as the linear
programming solver.
We used a machine powered by an Intel(R) Core 2.8GHz
CPU and 8GB of RAM, using Ubuntu 10.10. Each experi-
ment was run by 10 times and the average is reported here.
Experimental results. We next present our findings.
Effectiveness of consistent trees. In the first set of experi-
ments, using real life cascades, we investigated the accuracy
and the efficiency of our cascade inference algorithms.
′ , ETi
′ = (VTi
life cascade T = {T1, . . . , Tk},
(a) Given a set of real
for each cascade Ti = (VTi , ETi ) ∈ T, we computed an
′ ) according to a partial
inferred cascade Ti
observation with uncertainty σ. Denote the nodes in the
partial observation as VX . We evaluated the precision as
prec = Σ((VTi
′ ∩VTi )\VX )
.
Intuitively, prec is the fraction of inferred nodes that are
missing from Ti, while rec is the fraction of missing nodes
that are inferred by Ti
, and rec = Σ((VTi
′ ∩VTi )\VX )
Σ(VTi \VX )
Σ(VTi
′ \VX )
′.
3http://current.cs.ucsb.edu/socialnets
4http://lpsolve.sourceforge.net/5.5/
)
c
e
s
(
e
m
i
t
n
o
i
t
u
c
e
x
e
e
g
a
r
e
v
A
100000
10000
1000
100
10
1
0.1
0.01
WBCT
BCTr
BCTlp
50
100
150
200
Cascade Size
(a) Varying T
)
c
e
s
(
e
m
i
t
n
o
i
t
u
c
e
x
e
e
g
a
r
e
v
A
1000
100
10
1
0.1
0.01
WBCT
BCTr
BCTlp
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.5
0.6
0.7
)
c
e
s
(
e
m
i
t
n
o
i
t
u
c
e
x
e
e
g
a
r
e
v
A
4
3.5
3
2.5
2
1.5
1
0.5
0
WPCT
PCTr
PCTg
50
100
150
200
Cascade Size
250
300
)
c
e
s
(
e
m
i
t
n
o
i
t
u
c
e
x
e
e
g
a
r
e
v
A
0.6
0.5
0.4
0.3
0.2
0.1
0
WPCT
PCTr
PCTg
0.4
0.3
0.8
The uncertainty of the observation (σ)
0.5
0.6
0.7
(b) Varying σ
(c) Varying T
(d) Varying σ
Figure 7: Efficiency and scalability over synthetic cascades
For Enron email cascades, Fig. 6(a) and Fig. 6(b) show the
accuracy of WPCT, PCTg and PCTr for inferring cascades,
while σ is varied from 0.25 to 0.85. PCTlp does not scale
over the Enron dataset and thus is not shown. (i) WPCT
outperforms PCTg and PCTr on both prec and rec. (ii)
When the uncertainty increases, both the prec and rec of the
three algorithms decrease. In particular, WPCT successfully
infers cascade nodes with prec no less than 70% and rec
no less than 25% even when 85% of the nodes in the
cascades are removed. Using the same setting, the perfor-
mance of WBCT, BCTlp and BCTr are shown in Fig. 6(c)
and Fig.
6(d), respectively. (i) Both BCTlp and WBCT
outperform BCTr, and their prec and rec decrease while
the uncertainty increases. (ii) BCTlp has better performance
than WBCT. In particular, both BCTlp and WBCT success-
fully infer the cascade nodes with the prec no less than 50%
and with the rec no less than 25%, even when 85% of the
nodes in the cascades are removed.
For
retweet
the
the
and
cascades,
prec
rec
of WPCT, PCTg and PCTr are shown in Fig. 6(e)
and in Fig. 6(f),
respectively. While the uncertainty
increases from 0.25 to 0.85, (i) WPCT outperform PCTr
and PCTg, and (ii) the performance of all the algorithms
decreases.
In particular, WPCT successfully infers the
nodes with the prec more than 80% and the rec more than
35%, while the uncertainty is 25%. Similarly, the prec and
the rec of WBCT and BCTr are presented in Fig. 6(g)
and Fig. 6(h), respectively. As BCTlp does not scale on
retweet cascades,
its performance is not shown. While
the uncertainty σ increases, the prec and the rec of the
algorithms decrease. For all σ, WBCT outperforms BCTr;
in particular, WBCT correctly infers the nodes with prec no
less than 60% and rec no less than 25%, when σ is 25%.
(b) To further evaluate the structural similarity of Ti and
′ as described in (a), we also evaluate (i) precv = V ′′
Ti
V ′
′ ∩ VTi ) \ VX, where V ′′ ∈ V ′ are
for nodes V ′ = (VTi
the nodes with the same topological order in both T ′
i and
Ti, and (ii) prece = E ′
′, following
ETi
the metric for measuring graph similarity [26]. The average
results are as shown in Table I, for σ =50%, and the
cascades of fixed depth. As shown in the table, for WPCT,
the average precv is above 90%, and the average prece is
′ for E′ = ETi ∩ ETi
above 75% over both datasets. Better still, the results hold
even when we set σ = 85%. For WBCT, precv and prece
are above 65% and above 40%, respectively. For WPCT,
precv and prece have almost consistent performance on both
datasets; however, for WBCT, the precv and prece of the
inferred Enron cascades are higher than those of the inferred
retweet cascades. The gap might result from the different
diffusion patterns between these two datasets: we observed
that there are more than 70% of cascades in the Enron
dataset whose structures are contained in the BFS directed
acyclic graphs of WBCT, while in the Twitter Tweets there
are less than 45% of retweet cascades following the assumed
graph structures of WBCT.
Efficiency over real datasets. In all
the tests over real
datasets, PCTr, BCTr, PCTg and WBCT take less than
1 second. BCTlp does not scale for retweet cascades, while
PCTlp does not scale for both datasets. On the other hand,
while WPCT takes less than 0.4 seconds in inferring all the
Enron cascades, it takes less than 20 seconds to infer Twitter
cascades where d=4, and 100 seconds when d = 5. Indeed,
for Twitter network the average degree of the nodes is 20,
while the average degree for Enron dataset is 7. As such, it
takes more time for WPCT to infer Twitter cascades in the
denser Twitter network. In our tests, the efficiency of all the
algorithms are not sensitive w.r.t. the changes to σ.
Efficiency and scalability over synthetic datasets. In the
second set of experiments, we evaluated the efficiency and
the scalability of our algorithms using synthetic cascades.
(a) We first evaluate the efficiency and scalability of WPCT
and compare WPCT with PCTr and PCTg.
Fixing uncertainty σ = 50%, we varied T from 30 to
240. Fig. 7(c) shows that WPCT scales well with the size
of the cascade. Indeed, it only takes 2 seconds to infer the
cascades with 300 nodes.
Fixing size T = 100, we varied the uncertainty σ from
0.25 to 0.85. Fig. 7(d) illustrates that while all the three
algorithms are more efficient with larger σ, WPCT is more
sensitive. All the three algorithms scale well with σ.
As PCTlp does not scale well, its performance is not
shown in Fig. 7(c) and Fig. 7(d).
(b) Using the same setting, we evaluated the performance
of WBCT, compared with BCTlp and BCTr.
Complexity
Approximation
Problem
BCTmin
BCTw
PCTmin (sp tree)
PCTw (sp tree)
PCTmin
PCTw
NP-c, APX-hard
NP-c,APX-hard
NP-c, APX-hard
NP-c, APX-hard
NP-c, APX-hard
NP-c, APX-hard
X
X ∗ log fmax
log fmin
d
d ∗ log fmax
log fmin
time
O(E)
O(E))
OV 3
OV 3
--
--
O(tmax ∗ V 3)
O(tmax ∗ V 3)
Table II. Summary: complexity and approximability
the result
Fixing σ and varying T ,
is reported in
Fig. 7(a). First, WBCT outperforms BCTlp, and is almost as
efficient as the randomized algorithm BCTr. For the cascade
of 240 nodes, WBCT takes less than 0.5 second to infer the
structure, while BCTlp takes nearly 1000 seconds. Second,
while WBCT is not sensitive to the change of T , BCTlp is
much more sensitive.
Fixing T and varying σ, Fig. 7(b) shows the performance
of the three algorithms. The figure tells us that WBCT
and BCTr are less sensitive to the change of σ than BCTlp.
This is because WBCT and BCTr identify bounded con-
sistent tree by constructing shortest paths from the source
to the observed nodes. When the maximum depth of the
observation point is fixed, the total number of nodes and
edges visited by WBCT and BCTr are not sensitive to σ.
Summary. We can summarize the results as follows. (a)
Our inference algorithms can infer cascades effectively.
For example, the original cascades and the ones inferred
by WPCT have structural similarity (measured by prece) of
higher than 75% in both real-life datasets. (b) Our algorithms
scale well with the sizes of the cascades, and uncertainty.
They seldom demonstrated their worst-case complexity. For
example, even for cascades with 240 nodes, all of our
algorithms take less than two seconds.
VI. CONCLUSION
In this paper, we investigated cascade inference problem
based on partial observation. We proposed the notions of
consistent trees for capturing the inferred cascades, namely,
bounded consistent trees and perfect consistent trees, as well
as quantitative metrics by minimizing either the size of the
inferred structure or maximizing the overall likelihood. We
have established the intractability and the hardness results
for the optimization problems as summarized in Table II.
Despite the hardness, we developed approximation and
heuristic algorithms for these problems, with performance
guarantees on inference quality, We verified the effectiveness
and efficiency of our techniques using real life and synthetic
cascades. Our experimental results have shown that our
methods are able to efficiently and effectively infer the
structure of information cascades.
REFERENCES
[1] D. Arthur, R. Motwani, A. Sharma, and Y. Xu. Pricing
Internet
strategies for viral marketing on social networks.
and Network Economics, pages 101 -- 112, 2009.
[2] N. Bailey. The mathematical theory of infectious disease and
its applications. 1975.
[3] J. Bang-Jensen and G. Z. Gutin. Digraphs: Theory, Algo-
rithms and Applications. Springer, 2008.
[4] S. Bikhchandani, D. Hirshleifer, and I. Welch. A theory of
fads, fashion, custom, and cultural change as informational
cascades.
Journal of political Economy, pages 992 -- 1026,
1992.
[5] C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread
of misinformation in social networks. In WWW, 2011.
[6] M. Cha, F. Benevenuto, Y.-Y. Ahn, and P. K. Gummadi. De-
layed information cascades in flickr: Measurement, analysis,
and modeling. Computer Networks, 56(3):1066 -- 1076, 2012.
[7] W. Chen, C. Wang, and Y. Wang. Scalable influence max-
imization for prevalent viral marketing in large-scale social
networks. In KDD, 2010.
[8] K. Dave, R. Bhatt, and V. Varma. Modelling action cascades
in social networks. In AAAI, 2011.
[9] P. Domingos and M. Richardson. Mining the network value
of customers. In KDD, 2001.
[10] M. Eslami, H. R. Rabiee, and M. Salehi. Dne: A method for
extracting cascaded diffusion networks from social networks.
In The Third IEEE International Conference on Social Com-
puting, 2011.
[11] H. Fei, R. Jiang, Y. Yang, B. Luo, and J. Huan. Content based
social behavior prediction: a multi-task learning approach. In
CIKM, 2011.
[12] J. Goldenberg, B. Libai, and E. Muller. Talk of the network:
A complex systems look at the underlying process of word-
of-mouth. Marketing Letters, pages 211 -- 223, August 2001.
[13] J. Goldenberg, B. Libai, and E. Muller. Talk of the Network:
A Complex Systems Look at the Underlying Process of Word-
of-Mouth. Marketing Letters, pages 211 -- 223, 2001.
[14] M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring
networks of diffusion and influence. TKDD, 5(4):21, 2012.
[15] M. Granovetter. Threshold models of collective behavior.
American Journal of Sociology, 83(6), 1978.
[16] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the
spread of influence through a social network. In KDD, 2003.
[17] D. Kempe, J. Kleinberg, and E. Tardos. Influential nodes in
a diffusion model for social networks. In ICALP, 2005.
[18] W. O. Kermack and A. G. Mckendrick. A contribution to
the mathematical theory of epidemics. Proc R Soc Lond A,
115:700 -- 721, 1927.
[19] M. Kimura and K. Saito. Tractable models for information
diffusion in social networks. PKDD, pages 259 -- 271, 2006.
[20] M. Kimura, K. Saito, R. Nakano, and H. Motoda. Finding
influential nodes in a social network from information diffu-
sion data. Social Computing and Behavioral Modeling, pages
1 -- 8, 2009.
[21] G. Kossinets. Effects of missing data in social networks.
Social networks, 28(3), 2006.
[22] G. Kossinets, J. Kleinberg, and D. Watts. The structure of
information pathways in a social communication network. In
SIGKDD, 2008.
[23] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila. Finding
effectors in social networks. In KDD, pages 1059 -- 1068, 2010.
[24] J. Leskovec, A. Singh, and J. Kleinberg. Patterns of influence
Advances in Knowledge
in a recommendation network.
Discovery and Data Mining, pages 380 -- 389, 2006.
[25] M. Mathioudakis, F. Bonchi, C. Castillo, A. Gionis, and
In
Sparsification of influence networks.
A. Ukkonen.
SIGKDD, pages 529 -- 537, 2011.
[26] J. W. Raymond, E. J. Gardiner, and P. Willett. Rascal:
Calculation of graph similarity using maximum common edge
subgraphs. The Computer Journal, 45:2002, 2002.
[27] M. Richardson and P. Domingos. Mining knowledge-sharing
sites for viral marketing. In SIGKDD, 2002.
[28] G. Robins and A. Zelikovsky. Tighter bounds for graph
steiner tree approximation. SIAM J. Discrete Math., 19(1),
2005.
[29] E. Sadikov, M. Medina, J. Leskovec, and H. Garcia-Molina.
In
Correcting for missing data in information cascades.
WSDM, 2011.
[30] K. Saito, R. Nakano, and M. Kimura. Prediction of informa-
[31] X. Song, Y. Chi, K. Hino, and B. L. Tseng. Information flow
modeling based on diffusion rate for prediction and ranking.
In WWW, 2007.
[32] V. V. Vazirani. Approximation Algorithms. 2001.
[33] F. Wang, H. Wang, and K. Xu. Diffusive Logistic Model
Towards Predicting Information Diffusion in Online Social
Networks. ArXiv e-prints, 2011.
tion diffusion probabilities for independent cascade model. In
KES, 2008.
[34] C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao.
User interactions in social networks and their implications. In
EuroSys, 2009.
[35] J. Yang and J. Leskovec. Patterns of temporal variation in
online media. In Proceedings of the fourth ACM international
conference on Web search and data mining, WSDM, 2011.
|
1903.11451 | 1 | 1903 | 2019-03-27T14:27:22 | Sensing Social Media Signals for Cryptocurrency News | [
"cs.SI",
"cs.LG",
"stat.ML"
] | The ability to track and monitor relevant and important news in real-time is of crucial interest in multiple industrial sectors. In this work, we focus on the set of cryptocurrency news, which recently became of emerging interest to the general and financial audience. In order to track relevant news in real-time, we (i) match news from the web with tweets from social media, (ii) track their intraday tweet activity and (iii) explore different machine learning models for predicting the number of the article mentions on Twitter within the first 24 hours after its publication. We compare several machine learning models, such as linear extrapolation, linear and random forest autoregressive models, and a sequence-to-sequence neural network. We find that the random forest autoregressive model behaves comparably to more complex models in the majority of tasks. | cs.SI | cs |
Sensing Social Media Signals for Cryptocurrency News
Johannes Beck ∗1, Roberta Huang *1, David Lindner *1, Tian Guo2, Ce Zhang3, Dirk
Helbing2, and Nino Antulov-Fantulin†2
1Department of Computer Science, ETH Zurich
2Computational Social Science, ETH Zurich
Abstract
The ability to track and monitor relevant and impor-
tant news in real-time is of crucial interest in multi-
ple industrial sectors. In this work, we focus on the
set of cryptocurrency news, which recently became of
emerging interest to the general and financial audi-
ence. In order to track relevant news in real-time, we
(i) match news from the web with tweets from social
media, (ii) track their intraday tweet activity and (iii)
explore different machine learning models for predict-
ing the number of article mentions on Twitter within
the first 24 hours after its publication. We compare
several machine learning models, such as linear ex-
trapolation, linear and random forest autoregressive
models, and a sequence-to-sequence neural network.
We find that the random forest autoregressive model
behaves comparably to more complex models in the
majority of tasks.
1
Introduction
Social media and news play an important role in driv-
ing the fluctuation of economic indicators and finan-
cial markets [1], [2], [3], [4] in a nontrivial fashion.
Recently, novel financial markets have emerged, that
are exchanging from fiat money (USD, EUR, CNY)
to cryptocurrencies and vice versa [5, 6]. As of De-
cember 2018, cryptocurrencies have a total market
capitalization of $120 billion, with more than 250000
∗Contributed equally to the first authorship
†[email protected]
transactions per day.
In 2017 Bitcoin was ranked
second on the Google Trends list of popular topics in
global news. Despite a decrease of interest towards
cryptocurrencies in 2018 according to Google Trends,
the number of daily articles related to cryptocurren-
cies is still notably high. Therefore, it is not surpris-
ing that the rapid development of cryptocurrency has
attracted increasing attention from news and social
media.
A large volume of news articles about cryptocur-
rencies, published daily can make it hard for individ-
uals to filter out relevant information and make in-
formed decisions in this domain. Fortunately, people
share and discuss news every day in large quantities
on social media platforms, e.g. on Twitter, which is
the focus of this paper. Therefore, social media can
be a good proxy to monitor and track "important"
news about cryptocurrencies. Our work is motivated
by the hypothesis that high engagement with a news
article on Twitter is related to the "importance" of
an article.
In this paper, we introduce an online data mining
system which connects news and tweets discussing it.
We also perform preliminary data exploratory and
predictive analytic using machine learning and deep
learning. Overall, the contribution of this paper is as
follows: (i) We build an online data mining pipeline
to extract news articles from a discussion on Twit-
ter and collect tweets associated with the articles.
This paired news and tweet data is continuously up-
dated in a cloud database. This data is a rich source
for studying public interest and attention on cryp-
1
tocurrency and the potential effect of social media
on the market.
(ii) Based on the news and asso-
ciated tweets collected by the pipeline, we perform
exploratory data analysis to characterize news dis-
cussion on Twitter. (iii) We apply machine learning
and deep learning models to predict the popularity
of news articles on Twitter. We aim to predict the
number of tweets mentioning an articles related to
cryptocurrencies, which we consider as a measure of
its "importance".
2 Related work
Many studies have focused on the relationship be-
tween social media, news, and other information from
the www onto financial markets [7, 8, 3]. However,
the main focus of our work is modeling and prediction
of news popularity via social media. In [9], the au-
thors link a given news article to social media utter-
ances that implicitly reference it through a dedicated
query model. Tracking and automatically connect-
ing news articles to Twitter conversations by Twitter
hashtags was studied in [10]. In [11], the authors con-
structed a multi-dimensional feature space derived
from an article and use a conventional SVM to pre-
dict its popularity. The authors in [12] show how the
class of temporal point processes (Hawkes) can be
used for predicting Retweet dynamics. The authors
in [13] propose how to leverage knowledge base infor-
mation for improving popularity prediction. Starting
from the idea that only a small amount of news arti-
cles become popular, [14] focused on the subset of the
most popular news to rank articles. In [15] it formu-
lates article importance prediction as a classification
task using SVM.
In this paper, we exploit ensemble machine learn-
ing and sequence to sequence (seq2seq) deep learning
to study the predictability of crypto news popularity
on Twitter in real-time mode. In contrast to others,
our analysis is focused on the intraday importance
prediction.
Figure 1: The tracking of crypto news intraday ac-
tivity on 24th Jan 2018 at 15:28:37 CET, visualized
by our server.
3 Data pipeline
The data pipeline consists of a real-time online sys-
tem, with the following components: Twitter collec-
tion, article collection, and tweet-article matching.
Figure 2: Architecture of the data pipeline.
The Twitter data collection was implemented
by using the publicly accessible Twitter streaming
API with real-time filtering by a list of cryptocur-
rency related keywords. The Twitter API does only
provide a random sample of all tweets.
2
# hours since publication03691215182124# mentions020406080100120140160180Samsung Galaxy S10 Bitcoin Wallet Leaked by Insider: Is it Official?Samsung Galaxy S10 Bitcoin Wallet Leaked by Insider: Is it Official?$20 Million Funding Round in Blockchain Firm Symbiont Includes Citigroup and Nasdaq$20 Million Funding Round in Blockchain Firm Symbiont Includes Citigroup and NasdaqUS: New Hampshire Bill Aims to Legalize Bitcoin for State Payments in 2020US: New Hampshire Bill Aims to Legalize Bitcoin for State Payments in 2020CBOE Withdraws Rule Change Request to List Bitcoin Exchange-Traded FundCBOE Withdraws Rule Change Request to List Bitcoin Exchange-Traded FundBlockchain Startup to Boost Patient Safety and Prevent OverprescribingBlockchain Startup to Boost Patient Safety and Prevent OverprescribingUK Standards Institution Partners With Blockchain Startup for Supply Chain ComplianceUK Standards Institution Partners With Blockchain Startup for Supply Chain ComplianceThe Simple Reasons Why the Bitcoin Price Will Never Go to ZeroThe Simple Reasons Why the Bitcoin Price Will Never Go to ZeroEnterprise Blockchain Platform Records 10K Transactions per Second in Testnet LaunchEnterprise Blockchain Platform Records 10K Transactions per Second in Testnet LaunchWhy the Bitcoin Price Barely Moved Following CBOE's Withdrawal of ETF ProposalWhy the Bitcoin Price Barely Moved Following CBOE's Withdrawal of ETF ProposalMost US Investing Pros are Waiting on a Bitcoin ETF Before Buying CryptoMost US Investing Pros are Waiting on a Bitcoin ETF Before Buying CryptoStreaming TweetsNews ArticlesPairs of News and TweetsDBPredictingEngineVisualizationPre-processingThe article data colletion is obtained by scrap-
ing news from the dynamic set of gazetteer source
URLs. The set of gazetteer source URLs is auto-
matically updated by extracting the URLs from the
content of downloaded tweets.
The tweet-article matching data is
the
document-oriented database online instance, that
contains matchings between news articles and tweets.
The matching exists if the tweet explicitly contains
the URL of an article.
Before extracting features from the data, we first
process the data for further usage. In a first step, we
merge some of the matchings together. This is done
for two reasons. First, the online database only con-
tains incremental matchings which have to be merged
together in order to provide a complete matching of
the article to tweets. Secondly, the raw URLs of the
articles can contain query strings, which often con-
tain information not related to which article the URL
refers to. Hence, by changing those parameters one
can obtain arbitrarily many different URLs linking to
the same article. Because of this, there are often mul-
tiple different article entries in the database or data
file for the same article. On the other hand, there are
also some websites that use the query string to dis-
tinguish between articles. Therefore, we merge the
matchings of two articles if they fulfill the following
3 conditions:
1. The URLs of both articles share the same host
as well as the same path.
2. Both articles have the same title.
3. Both articles were published at the same time.
These conditions allow for merging of articles of
which the URLs have different query strings while the
last two conditions prevent the system from merging
articles which are distinguished by the query string
in the URL. While merging the articles we also re-
move duplicate entries for the same tweet which are
sometimes present in the database.
According to the publication time in the data,
some of the articles were published 2000 years ago
or even in the future. These publication dates are
clearly wrong. We, therefore, remove all articles
that were published outside of an acceptable time-
interval.
Figure 3: Top publishers and top keywords on 24th
Jan 2018 at 15:28:37 CET, visualized by our server.
Let us describe the data, that we are gathering and
then go on to describe how we process this data. We
work with three entities in our dataset: news articles,
tweets, and matchings, i.e. the relations between arti-
cles and tweets. While these concepts are easy to un-
derstand intuitively, we specify their attributes here
to avoid confusion.
In Tab. 1 and 2, we provide a list of the properties
of a news article and a tweet respectively. A matching
(see Tab. 3) relates to a set of tweets that reference
the article.
In Fig. 5 we observe that the number of men-
3
Top publishersTop keywords21.3%14.5%6.0%44.6%CointelegraphCointelegraphCitlhCilhCcnCcnCCCoindeskCoindeskCidkCidkBitcoin0BitcoinoBitiBiiBitcoinistBitcoinistBitiitBiiiCoinspectatorCoinspectatorCittCiTwitterTwitterTittTiTribeticaTribeticaRedditRedditNewsbtcNewsbtcEthereumworldnews0EthereumworldnewsCoinpathCoinpathOthersOthers66.8%21.1%BitcoinBitcoinBitiBiicryptocurrencycryptocurrencytEthereumEthereumEthEhDash0DashDDhDhEOSEOSEOSEOSRippleRippleRilRilEthosEthosEthEhNanoNanoNNEthereum ClassicEthereum ClassicWaves00WavesNEONEOSteemSteemOthersOthersTable 2: Properties of a tweet entity.
user
text
publication time The timestamp of the tweet.
links
The Twitter username.
The content of the tweet.
The urls in the text.
Table 3: Properties of a matching entity.
article An article as described in Tab.1.
tweets
A list of matched tweets.
time t0 and t0 + δ. Here t1 is the prediction starting
time, which represents how much historical data can
be used to predict.
Figure 4: Top article ranked by our system on 24th
Jan 2018 at 15:28:37 CET.
4.1 Feature Extraction
Table 1: Properties of an article entity.
The url of the article.
URL
The headline of the article.
title
publication time The publication timestamp.
The text body of the article.
text
tions on Twitter saturates generally within the first
24 hours after publication. We, therefore, define our
prediction target as the number of mentions during
24 hours after publication. We also found that there
is a strong seasonality effect at weekends.
4 Predictive analytics
We aim to explore the different machine learning
models on the task of predicting the total number
of article mentions within a defined time horizon af-
ter the article's publication time. Let t0, t1 be two
timestamps with t0 < t1 < t0 + δ, where we set δ
to 24 hours in this paper. The task of our machine
learning models is as follows: Given an article pub-
lished at time t0 and all tweets published between t0
and t1 that mention the article, predict the cumula-
tive number of tweets mentioning the article between
For our predictive models we use three sets of fea-
tures, which we name time series, content and con-
text features.
Time series features Let t0 be the publication
time of an article and t1 the current time. Let d a
timestep size (set to 1 hour in our experiments). The
time series feature fk is then given by the number of
mentions of the article between t0 and t0 + kd where
k ∈ {j ∈ {1, 2, ...}t0 + jd ≤ t1}. As an example
suppose that t1 is 3 hours after t0 and the article is
mentioned twice, once and three times in hours 1, 2
and 3 since publication respectively. Then there are
3 time series features: f1 = 2, f2 = 3, f3 = 6. Note
that the number of these features is not constant, but
depends on t1 as defined in 4.
Content features We extract a vector of content
features from each article, by using a keyword list
to allow the models to learn individual dynamics for
articles related to different cryptocurrencies. Each
cryptocurrency related concept is represented by a
binary feature, that is set to 1 if one of the keywords
related to the concept is present in the title of the
article.
4
4.2.2 Autoregressive models
A common type of time series model is an autoregres-
sive model [16]. An autoregressive model of order k
predicts the value at the next timestep K + 1 based
on the values observed at the previous k timesteps
K − k + 1, ..., K. In our experiments, we provide K
as an additional input to the model. The idea is,
that the dynamics can be very different a few hours
after the publication and shortly before the end of the
prediction window. In some experiments, we will fur-
ther provide content and/or context features to the
model. In our case, we have to predict multiple steps
in the future. This is achieved by first predicting a
single timestep. We then assume that the predicted
value is the correct value and use it as an input for
the prediction of the next timestep. By recursively
applying this strategy, we can predict an arbitrary
amount of timesteps ahead.
For autoregressive models of order k, we gener-
ate multiple training samples from each time series
f1, ..., fN . The first sample uses f1, ..., fk to pre-
dict fk+1. The second sample predicts fk+2 from
f2, ..., fk+1 and so on.
We use two different kinds of autoregressive mod-
els. The first one uses a linear model to predict the
next timestep and the second one uses the random
forest regressor.
4.2.3 Random forest regressor
A random forest is an ensemble of decision trees. The
total response of the random forest model is the av-
erage prediction of all decision trees.
In order to
increase the variety of the individual decision trees,
each tree is trained on a bootstrapped sample from
the original dataset and uses only random subsets of
the features for each decision. For more details about
random forests see [17] or the documentation of the
scikit-learn implementation that we use for our ex-
periments.1
1https://scikit-learn.org/stable/modules/generated/
sklearn.ensemble.RandomForestRegressor.html#sklearn.
ensemble.RandomForestRegressor
Figure 5: Histogram of article lifespan during one
week starting at 13.10.2018, defined as the time after
which an article reaches 90% of its total mentions
(on the right). We observe that most articles, with
at least 100 mentions, reach the end of their lifespan
around 24 hours after publication.
Context features The amount of Twitter men-
tions might further be related to the publisher of an
article. There seem to be very few publishers with
significantly more mentions on Twitter than the other
publishers. We count the total number of mentions
of each publisher in our training set. We then extract
the 10 publishers with the highest numbers of men-
tions. For each of these publishers, we introduce a
binary feature set to 1 if the article was published by
the respective publisher.
4.2 Predictive Models
4.2.1 Baseline model
As a baseline model, we use a linear extrapolation
of the last k time series features by fitting a linear
function of the time step to the dataset given by
{(K − k + 1, fK−k+1), ..., (K, fK)}. Here K is the
number of time series features available for the arti-
cle. To predict the total number of mentions at the
target time, we evaluate the model for the time step
N , such that N d = δ. The model ignores content and
context features. In our experiments, we will choose
k = 3.
5
020406080100article lifespan in hours05101520number of articles4.2.4 Sequence-to-sequence model
implementation.2
As described in [18], sequence-to-sequence model con-
sists of two recurrent neural networks (RNN). The
first RNN is called the encoder. This recurrent net-
work receives as inputs all available time series fea-
tures. The outputs of this model are discarded. The
second RNN is called the decoder. The initial hid-
den state is given by the final hidden state of the
encoder. The first input to the decoder is the last
time series feature. In our architecture, the output
of the decoder at each timestep serves as input for a
fully connected network with one hidden layer that
outputs the predicted value for the next timestep. If
context or content features are used, those features
serve as additional inputs to the fully connected net-
work. The predicted value is then used as the input
at the next timestep. As a loss function, we use the
sum of squared errors between the predicted values
and the real values. Be f1, ..., fl the input time series
and fl+1, ..., fK the real continuation. Be fK+1, ... fN
the predicted values. The loss for this time series is
then given by
K(cid:88)
L =
(fi − fi)2
i=l+1
Gated recurrent units Our sequence-to-sequence
model implementation is based on the gated recur-
rent unit (GRU), a variant of recurrent neural net-
works (RNN). The following definition of a GRU is
taken from [19]. Let σ(·) denote the sigmoid function,
tanh(·) the hyperbolic tangent and (cid:12) the element-
wise matrix multiplication operator. Be x1, x2, ..., xn
a sequence of inputs (e.g. a time series) and h0 the so-
called initial hidden state usually set to 0. The RNN
using GRUs then outputs a sequence h1, h2, ..., hn de-
fined by
zt = σ(Wzxt + Uzht−1)
rt = σ(Wrxt + Urht−1)
ht = tanh(W xt + U (rt (cid:12) ht−1))
ht = (1 − zt) (cid:12) ht−1 + zt (cid:12) ht
4.3 Evaluation set-up
4.3.1 Dataset
In this paper, we have done the evaluation of our
real-time model on 23535 articles published between
2018-12-02 00:00:00 and 2018-12-09 00:00:00 and all
tweets mentioning those articles. The correspond-
ing training set contains all articles published before
2018-12-02 00:00:00 with the related tweets. In to-
tal, the training set consists of 125248 articles from
roughly 35 days.
Bootstrapping We want to estimate confidence
intervals of the performance of the different models
instead of just obtaining point estimates. Therefore,
we use bootstrapping to generate 100 new datasets
consisting of 2000 samples from the validation set.
Balancing Because popular articles are rare, we
balance the training set. Let M = .05 ∗ Ntrain where
Ntrain is the total number of articles in the train-
ing set. We first sort the training set in descending
order by the number of mentions and then keep the
top M articles with most mentions. We also draw
M random samples from each of the sets of articles
lying between the 75th and 95th percentile and be-
low the 75th percentile. We hence obtain a training
set with an equal number of high importance (above
95th percentile), medium importance (between 75th
and 95th) and low importance (below 75th) articles.
4.3.2 Models
For the baseline model, we choose a linear interpo-
lation of the most recent 3 time series features. The
linear autoregressive model is evaluated for orders 1,
3 and 5. The random forest autoregressive models
are all of order 3 with 50 and 500 estimators. The
sequence-to-sequence model has a hidden state size
of 200 for the encoder and the decoder. The hidden
dense layer consists of 200 units. During training, we
where Wr, Wz, W, Ur, Uz, U are model parameters
learned during training. We use the TensorFlow GRU
2https://www.tensorflow.org/api_docs/python/tf/nn/
rnn_cell/GRUCell
6
drop out 30 percent of the inputs to the dense layer
as well as 10 percent of the hidden state passed to the
next step of the RNN. The network is then trained in
an end-to-end fashion, using back-propagation with
training batches of size 64. The model is trained for
30 epochs with a learning rate .001, then for another
30 epochs with learning rate .0001 and finally for yet
another 30 epochs using learning rate .000001 using
Adam optimizer.
The baseline model is only provided the time se-
ries features. The autoregressive models and the
sequence-to-sequence model are trained using the
time series, content and context features.
4.3.3 Evaluation metrics
The goal of our prediction is to extract the most rel-
evant cryptocurrency related articles. Most articles
accumulate very few mentions on Twitter. Those ar-
ticles would heavily influence the performance scores
because they represent the vast majority of articles in
the validation set. However, the performance of those
articles does not represent the performance with re-
spect to our goal. For this reason, our evaluation
focuses on the top k articles with most mentions on
Twitter.
There are two different properties of the predic-
tions that can be used to assess performance: the
accuracy of the predicted number of mentions, and
the quality of the induced ranking of articles. We use
mean absolute percentage error to measure the for-
mer property and normalized discounted cumulative
gain to measure the latter.
mentions. The MAPE is defined as follows
(cid:12)(cid:12)(cid:12)(cid:12) f (i)
n(cid:88)
i=1
δ − f (i)
f (i)
δ
δ
(cid:12)(cid:12)(cid:12)(cid:12)
MAPE =
1
n
where δ = 24 denotes 24 hour window from the pub-
lication date.
discounted
cumulative
gain
Normalized
(NDCG) The second interesting property of the
predictions is the ordering of the articles induced
by the predicted values. We could obtain the most
important articles from a model that achieves poor
performance with respect to the MAPE but yields
a good approximation of the ordering of the news.
The discounted cumulative gain (DCG) is high if
the top k predicted articles achieve a high number
of mentions. To compute the DCG, the articles are
first ordered by their predicted importance such that
f (1)
the observed
δ
importance values of the first k articles from this
ordered set. DCGk is then defined as
. Be f (1)
, f (2)
, ..., f (N )
δ
δ
, f (2)
, ..., f (k)
δ
δ
δ
k(cid:88)
DCGk =
f (i)
δ
log2(i + 1)
i=1
IDCGk is now defined as the maximal achievable
DCGk which is computed as the DCGk based on an
ordering according to the observed instead of the pre-
dicted values. The NDCG can be computed as
NDCGk =
DCGk
IDCGk
Hence the maximal achievable NDCGk is 1.
4.4 Results
Mean absolute percentage error (MAPE)
The MAPE is used to evaluate the quality of the
predicted value. It computes by how many percents
the predicted value deviates from the actual value on
average. The reason for using percentage errors in-
stead of absolute errors lies in the great difference
between numbers of mentions of articles. A metric
based on absolute errors would most likely be domi-
nated by the very few articles with significantly more
We will discuss the overall results of our models and
compare their performance in the prediction of the
number of mentions and the order of the articles.
We vary the prediction start time to be 5, 10, 15
or 20 hours after publication time while keeping the
target prediction time fixed at δ = 24 hours after the
publication. For instance, for a start time of 5 hours,
the model gets five data points as input, describing
the mentions in the first 5 hours. It then predicts the
7
number of mentions after another 19 hours. Similarly,
for a start-time of 15 hours, the model gets 15 points
as input and has to predict 9 hours into the future.
curate prediction about the popularity of an article
as soon as possible after its publication. At predic-
tion start time 5 hours after publication advanced
models achieve a significantly lower MAPE than the
baseline. RF and S2S model achieve a MAPE around
30− 40%, while the linear model is at about 45% and
the baseline at 70%. For predictions starting 10 hours
after publication, the baseline and the linear model
improve significantly over their performance 5 hours
after publication. However, RF and S2S model still
achieve a significantly lower MAPE.
Overall, we can say that RF and S2S model is able
to achieve significantly lower error rates close to the
publication time of an article. All models are com-
parable about 20 hours after publication. The RF
model achieves the lowest MAPE overall.
Figure 6: MAPE and NDCG of the different models
evaluated on the test data set. The quantiles are
determined using 100 bootstrap samples. Predictions
are evaluated at 4 different prediction times, 5, 10, 15,
and 20 hours after publication of an article.
4.4.1 Overall performance
In Fig. 6 we show the experimental results of the
baseline model, autoregressive model, random for-
est autoregressive model and sequence-to-sequence
model on the test dataset.
As expected, we see that all models make better
predictions, the closer the prediction start time is to
the target time. After 15 and 20 hours from the publi-
cation time, the baseline model already achieves very
good performance with MAPE of 20% and less. As
we have seen, the number of mentions in most news
articles starts to saturate after 10−20 hours. Because
of this, the linear extrapolation that is performed by
the baseline model can be quite accurate at later pre-
diction points. At prediction start times of 15 and
20 hours, the random forest (RF) and sequence-to-
sequence (S2S) model achieve a slightly lower MAPE
than the baseline.
However, we are more interested in the early pre-
diction start points. Ideally, we want to make an ac-
Figure 7: MAPE and NDCG of a linear model of or-
ders 1, 3 and 5 evaluated on the test dataset. The
quantiles are determined using 100 bootstrap sam-
ples. Predictions are evaluated at 4 different predic-
tion times, 5, 10, 15, and 20 hours after publication
of an article.
It is instructive to look at the NDCG as well. Here
we do not see any model being significantly better
than the baseline model, which is mainly due to the
fact that the baseline model is already very good at
predicting the final order of the news articles shortly
after publication. It achieves an NDCG of around 0.9
only 5 hours after publication. The S2S model seems
to perform worse than the other two models in pre-
8
5101520predictionstarttime0.00.20.40.60.8MAPEExtrap.BaselineLinearModelSeq.toSeq.RandomForest5101520predictionstarttime0.750.800.850.900.951.00NDCGExtrap.BaselineLinearModelSeq.toSeq.RandomForest5101520predictionstarttime0.20.40.60.8MAPEorder=1order=3order=55101520predictionstarttime0.800.850.900.951.00NDCGorder=1order=3order=5Figure 9: Predictions of the RFAR model for two
articles from the test set. The shaded area shows
95% prediction intervals that are determined from
the distribution of the predictions by the ensemble
estimators.
The results are shown in Fig. 7. We find that for
each prediction start time the MAPE of the order =
3 model is significantly lower than the MAPE of the
order = 1 model. However, increasing the order of the
model to 5 does not seem to give a significant error
reduction. The NDCG is not significantly different
between the different choices of the order.
In view of these results, we choose an order of 3
for all autoregressive models from here on. While we
might be able to gain slightly better predictions by
choosing an order of more than 5, choosing 3 seems
to be a good compromise between model performance
and computational cost.
Random forest models provide a number of hyper-
parameters such as the number of estimators, the
depth of the tree or the size of the leaf nodes. To this
end, we compare a random forest autoregressor with
50 to one with 500 estimators. The results, depicted
in Fig. 8, show no significant different in MAPE or
NDCG for both models. Choosing 500 instead of 50
estimators somewhat decreases the variance of the
NDCG. For the random forest models in our other
experiments, we will, therefore, use 500 estimators,
which are still manageable in computation. Experi-
menting with other hyperparameters was out of the
scope of this work and is left for future work.
4.4.3 Uncertainty prediction
In addition to achieving the best model performance
in our experiments, the random forest model also
gives us a natural way to quantify the prediction un-
Figure 8: MAPE and NDCG of a random forest
model with 50 and 500 estimators evaluated on the
test dataset. The quantiles are determined using 100
bootstrap samples. Predictions are evaluated at 4 dif-
ferent prediction times, 5, 10, 15, and 20 hours after
publication of an article.
dicting the order of the articles. This is likely due to
the fact, that it has a large degree of freedom in the
model parameter space and probably the rank regu-
larization could help. However, additional tuning of
the objective function of the S2S model was left for
future work.
Predicting a rough order of popular news articles
seems to be possible by just linearly extrapolating the
number of mentions in the first few hours. Improving
over that is hard due to the high uncertainty of the
predictions of the number of mentions after 24 hours.
Looking at the performance of the linear model and
the RF, it seems to be feasible to improve over the
baseline, but the uncertainty of the predictions re-
mains high.
4.4.2 Effect of order
For all autoregressive models, we have to choose an
order. A higher order increases computational cost
but potentially also the prediction quality. To mea-
sure the effect on the prediction quality, we evaluate
the linear autoregressive model on different orders 1,
3 and 5.
9
SensingSocialMediaSignalsforCryptocurrencyNewsWWW'19-MSM'19,,5101520predictionstarttime0.10.20.30.4MAPE50estimators500estimators5101520predictionstarttime0.800.850.900.951.00NDCG50estimators500estimatorsFigure8:MAPEandNDCGofarandomforestmodelwith50and500estimatorsevaluatedonthetestdataset.Thequan-tilesaredeterminedusing100bootstrapsamples.Predic-tionsareevaluatedat4differentpredictiontimes,5,10,15,and20hoursafterpublicationofanarticle.TheresultsareshowninFig.7.WefindthatforeachpredictionstarttimetheMAPEoftheorder=3modelissignificantlylowerthantheMAPEoftheorder=1model.However,increasingtheorderofthemodelto5doesnotseemtogiveasignificanterrorreduction.TheNDCGisnotsignificantlydifferentbetweenthedifferentchoicesoftheorder.Inviewoftheseresults,wechooseanorderof3forallautoregres-sivemodelsfromhereon.Whilewemightbeabletogainslightlybetterpredictionsbychoosinganorderofmorethan5,choosing3seemstobeagoodcompromisebetweenmodelperformanceandcomputationalcost.Randomforestmodelsprovideanumberofhyper-parameterssuchasthenumberofestimators,thedepthofthetreeorthesizeoftheleafnodes.Tothisend,wecomparearandomforestautore-gressorwith50toonewith500estimators.Theresults,depictedinFig.8,shownosignificantdifferentinMAPEorNDCGforbothmodels.Choosing500insteadof50estimatorssomewhatdecreasesthevarianceoftheNDCG.Fortherandomforestmodelsinourotherexperiments,wewill,therefore,use500estimators,whicharestillmanageableincomputation.Experimentingwithotherhyperparameterswasoutofthescopeofthisworkandisleftforfuturework.4.4.3Uncertaintyprediction.Inadditiontoachievingthebestmodelperformanceinourexperiments,therandomforestmodelalsogivesusanaturalwaytoquantifythepredictionuncertainty.Insteadofjustcalculatingthemeanoftheensemblepredictions,wecancalculatepercentilesofthepredictionstogetpredictionintervalswith95%coverage.ThisisshownintwoexampletimeseriesinFig.9.0510152025hours1015202530354045numberofmentionspredictiontrue0510152025hours50100150200250300numberofmentionspredictiontrueFigure9:PredictionsoftheRFARmodelfortwoarticlesfromthetestset.Theshadedareashows95%predictionin-tervalsthataredeterminedfromthedistributionofthepre-dictionsbytheensembleestimators.4.5ModelDeploymentWeusethetrainedautoregressivemodeltodoonlinepredictionsonreal-timedata.Thedataextractionserver3constantlyretrievesnewtweetsandarticlesandfindsthetweet-articlematchings,whicharesavedasanewbatchintoanonlinedatabase4.Wegeneratethedatasetforpredictionbyqueryingthedatabaseforarticlespub-lishedinthelast24hours.Thequerieddataisthenpre-processedinordertoextracttimeseries,content,andcontextfeatures,asdescribedearlier.Then,wepredicttheimportancevaluesofnewarticlesat24hoursafterthearticle'spublicationtime,usingthepreviouslytrainedmodel.Thepredictionisperformedevery10minutes.Thecurrentpredictedimportancevaluesarevisualizedinanin-teractivewebpage5.ThewebapplicationisdevelopedusingPython-basedFlaskwebdevelopmentframework6:thefront-endmakesconstantlyAjaxGETrequeststotheback-end,whichreadstheupdatedimportancevaluesfromJSONfiles.Fordatavisualization,wegenerateinteractivechartswiththeJavaScriptC3.jslibrary7.Thewebfront-endprovidesthreestabs(i-iii),showingthefollow-ingdynamiccontent.(i)Atablewiththemostimportantarticlescanbesortedbythecurrentnumberoftweetsmentionsorbythepredictedimportancevalueatthetargetof24hoursafterpubli-cation.Italsoembedsthelinktoeacharticleanddisplayssomerelevantinformationaboutthearticle,suchasthepublisherandpublicationtime.(ii)Acombinedlinechartshowsthecumulativetimeseriesofthemostimportantarticles-acontinuouslinefortheobservedhourlymentionsandadashedlineforthepredictedvaluesupto24hourssincethearticle'spublication(seeFig.1).(iii)Twopiechartspresentthestatisticsrelatedtoarticlepublisher(context)andcryptocurrency(content)basedkeywords(seeFig.3).5CONCLUSIONInthispaper,weintroduceanonlinedataminingsystemrelat-ingcryptocurrencynewstothetweetsdiscussingthem.Thisdatapipelinepavesthewayformonitoringcryptocurrencynewsofpub-lic'sinterest,identifyingandpredictingpoplarnews,andtrackingpublicopinionstowardscryptocurrencies.3deployedontheGoogleCloud(GC)4MongoDBdeployedonAmazonWebServices(AWS)5Linktowebpage:http://35.246.215.2066http://flask.pocoo.org/7https://c3js.org0510152025hours1015202530354045numberofmentionspredictiontrue0510152025hours50100150200250300numberofmentionspredictiontruecertainty. Instead of just calculating the mean of the
ensemble predictions, we can calculate percentiles of
the predictions to get prediction intervals with 95%
coverage. This is shown in two example time series
in Fig. 9.
hourly mentions and a dashed line for the predicted
values up to 24 hours since the article's publica-
tion (see Fig.1).
(iii) Two pie charts present the
statistics related to article publisher (context) and
cryptocurrency (content) based keywords (see Fig.3).
4.5 Model Deployment
We use the trained autoregressive model to do on-
line predictions on real-time data. The data extrac-
tion server3 constantly retrieves new tweets and arti-
cles and finds the tweet-article matchings, which are
saved as a new batch into an online database4. We
generate the dataset for prediction by querying the
database for articles published in the last 24 hours.
The queried data is then pre-processed in order to
extract time series, content, and context features, as
described earlier.
Then, we predict the importance values of new ar-
ticles at 24 hours after the article's publication time,
using the previously trained model. The prediction
is performed every 10 minutes.
The current predicted importance values are
visualized in an interactive webpage5. The web
application is developed using Python-based Flask
web development framework6: the front-end makes
constantly Ajax GET requests to the back-end,
which reads the updated importance values from
JSON files. For data visualization, we generate
interactive charts with the JavaScript C3.js li-
brary7. The web front-end provides threes tabs
(i-iii), showing the following dynamic content.
(i)
A table with the most important articles can be
sorted by the current number of tweets mentions
or by the predicted importance value at the target
of 24 hours after publication.
It also embeds the
link to each article and displays some relevant
information about the article, such as the publisher
and publication time.
(ii) A combined line chart
shows the cumulative time series of the most im-
portant articles - a continuous line for the observed
3deployed on the Google Cloud (GC)
4MongoDB deployed on Amazon Web Services (AWS)
5Link to webpage: http://cryptodatathon.com/ranknews
6http://flask.pocoo.org/
7https://c3js.org
5 Conclusion
In this paper, we introduce an online data mining
system relating cryptocurrency news to the tweets
discussing them. This data pipeline paves the way for
monitoring cryptocurrency news of public's interest,
identifying and predicting poplar news, and tracking
public opinions towards cryptocurrencies.
Data exploration on the collected paired news ar-
ticles and tweets characterized top publishers, top
cryptocurrencies discussed on Twitter as well as the
lifespan of these news discussions. We also perform
preliminary predictive analytics using machine learn-
ing and deep learning models. This work is a first step
towards providing a prediction system, that detects
articles that are going to become popular shortly af-
ter they are published.
Our current system still needs to observe a few
hours of data before making a prediction. For future
work, the goal would be to make more accurate pre-
dictions within the first hour after publication. This
is possible, by exploring different representations of
the article content by more advanced NLP models.
6 Acknowledgments
N.A.-F. and T.G. are grateful for financial support
from the EU Horizon 2020 projects: SoBigData under
grant agreement No. 654024. J.B., R.H. and D.L are
grateful for the support of professor A. Krause on the
Data Science Lab 2018 course at ETH Zurich.
References
[1] S. Chakraborty, A. Venkataraman, S. Jaga-
bathula, and L. Subramanian, "Predicting socio-
economic indicators using news events," in Pro-
10
ceedings of the 22nd ACM SIGKDD Interna-
tional Conference on Knowledge Discovery and
Data Mining, pp. 1455 -- 1464, ACM, 2016.
[2] Z. Hu, W. Liu, J. Bian, X. Liu, and T.-Y. Liu,
"Listening to chaotic whispers: A deep learning
framework for news-oriented stock trend predic-
tion," in Proceedings of the Eleventh ACM In-
ternational Conference on Web Search and Data
Mining, pp. 261 -- 269, ACM, 2018.
[3] M. Piskorec, N. Antulov-Fantulin, P. K. Novak,
I. Mozetic, M. Grcar, I. Vodenska, and T. Smuc,
"Cohesiveness in financial news and its relation
to market volatility," Scientific Reports, vol. 4,
no. 1, 2014.
[4] W. Zhang and S. Skiena, "Trading strategies
to exploit blog and news sentiment," in In
Fourth Int. Conf. on Weblogs and Social Media
(ICWSM), 2010.
[5] T. Guo, A. Bifet, and N. Antulov-Fantulin,
"Bitcoin volatility forecasting with a glimpse
into buy and sell orders," in 2018 IEEE Inter-
national Conference on Data Mining (ICDM),
IEEE, 2018.
[6] N. Antulov-Fantulin, D. Tolic, M. Piskorec,
Z. Ce, and I. Vodenska, "Inferring short-
term volatility indicators
from the bitcoin
blockchain," in Complex Networks and Their
Applications VII (L. M. Aiello, C. Cherifi,
H. Cherifi, R. Lambiotte, P. Li´o, and L. M.
Rocha, eds.), (Cham), pp. 508 -- 520, Springer In-
ternational Publishing, 2019.
[7] H. Chen, P. De, Y. J. Hu, and B.-H. Hwang,
"Customers as advisors: The role of social media
in financial markets," SSRN Electronic Journal,
2012.
[8] T. G. Andersen, T. Bollerslev, F. X. Diebold,
and C. Vega, "Real-time price discovery in global
stock, bond and foreign exchange markets,"
Journal of International Economics, vol. 73,
no. 2, pp. 251 -- 277, 2007.
[9] M. Tsagkias, M. De Rijke, and W. Weerkamp,
"Linking online news and social media," in Pro-
ceedings of the fourth ACM international confer-
ence on Web search and data mining, pp. 565 --
574, ACM, 2011.
[10] B. Shi, G. Ifrim, and N. Hurley, "Insight4news:
Connecting news to relevant social conversa-
tions," in Joint European Conference on Ma-
chine Learning and Knowledge Discovery in
Databases, pp. 473 -- 476, Springer, 2014.
[11] R. Bandari, S. Asur, and B. A. Huberman, "The
pulse of news in social media: Forecasting pop-
ularity.," ICWSM, vol. 12, pp. 26 -- 33, 2012.
[12] R. Kobayashi and R. Lambiotte, "Tideh: Time-
dependent hawkes process for predicting retweet
dynamics," in Tenth International AAAI Con-
ference on Web and Social Media, 2016.
[13] H. Dou, W. X. Zhao, Y. Zhao, D. Dong, J.-R.
Wen, and E. Y. Chang, "Predicting the popular-
ity of online content with knowledge-enhanced
neural networks," in ACM KDD, 2018.
[14] N. Moniz, L. Torgo, and F. Rodrigues, "Resam-
pling approaches to improve news importance
prediction," in International Symposium on In-
telligent Data Analysis, 2014.
[15] I. Arapakis, B. B. Cambazoglu, and M. Lalmas,
"On the feasibility of predicting news popularity
at cold start," in International Conference on
Social Informatics, 2014.
[16] R. H. Shumway and D. S. Stoffer, Time Series
Analysis and Its Applications. Springer Interna-
tional Publishing, 2017.
[17] L. Breiman, "Random forests," Machine learn-
ing, vol. 45, no. 1, pp. 5 -- 32, 2001.
[18] I. Sutskever, O. Vinyals, and Q. V. Le, "Se-
quence to sequence learning with neural net-
works," in Advances in neural information pro-
cessing systems, 2014.
11
[19] J. Chung, C. Gulcehre, K. Cho, and Y. Bengio,
"Empirical evaluation of gated recurrent neural
networks on sequence modeling," arXiv e-prints,
vol. abs/1412.3555, 2014.
12
|
1503.05502 | 3 | 1503 | 2015-05-30T11:37:20 | Urban Magnetism Through The Lens of Geo-tagged Photography | [
"cs.SI",
"physics.soc-ph"
] | There is an increasing trend of people leaving digital traces through social media. This reality opens new horizons for urban studies. With this kind of data, researchers and urban planners can detect many aspects of how people live in cities and can also suggest how to transform cities into more efficient and smarter places to live in. In particular, their digital trails can be used to investigate tastes of individuals, and what attracts them to live in a particular city or to spend their vacation there. In this paper we propose an unconventional way to study how people experience the city, using information from geotagged photographs that people take at different locations. We compare the spatial behavior of residents and tourists in 10 most photographed cities all around the world. The study was conducted on both a global and local level. On the global scale we analyze the 10 most photographed cities and measure how attractive each city is for people visiting it from other cities within the same country or from abroad. For the purpose of our analysis we construct the users mobility network and measure the strength of the links between each pair of cities as a level of attraction of people living in one city (i.e., origin) to the other city (i.e., destination). On the local level we study the spatial distribution of user activity and identify the photographed hotspots inside each city. The proposed methodology and the results of our study are a low cost mean to characterize a touristic activity within a certain location and can help in urban organization to strengthen their touristic potential. | cs.SI | cs | Urban Magnetism Through The Lens of Geo-tagged Photography
Silvia Paldino1, Iva Bojic2, Stanislav Sobolevsky2*, Carlo Ratti2, Marta C. González3
1Department of Physics,
University of Calabria,
Via Pietro Bucci, 87036 Arcavacata, Rende CS, Italy
2SENSEable City Laboratory,
Massachusetts Institute of Technology,
77 Massachusetts Avenue, Cambridge, 02139, USA
3Department of Civil and Environmental Engineering,
Massachusetts Institute of Technology,
77 Massachusetts Avenue, Cambridge, MA 02139, USA
Abstract
There is an increasing trend of people leaving digital traces through social media. This reality opens new
horizons for urban studies. With this kind of data, researchers and urban planners can detect many aspects of
how people live in cities and can also suggest how to transform cities into more efficient and smarter places
to live in. In particular, their digital trails can be used to investigate tastes of individuals, and what attracts
them to live in a particular city or to spend their vacation there. In this paper we propose an unconventional
way to study how people experience the city, using information from geotagged photographs that people take
at different locations. We compare the spatial behavior of residents and tourists in 10 most photographed
cities all around the world. The study was conducted on both a global and local level. On the global scale we
analyze the 10 most photographed cities and measure how attractive each city is for people visiting it from
other cities within the same country or from abroad. For the purpose of our analysis we construct the users’
mobility network and measure the strength of the links between each pair of cities as a level of attraction of
people living in one city (i.e., origin) to the other city (i.e., destination). On the local level we study the
spatial distribution of user activity and identify the photographed hotspots inside each city. The proposed
methodology and the results of our study are a low cost mean to characterize touristic activity within a
certain location and can help cities strengthening their touristic potential.
Key words: city attractiveness, big data, human mobility, urban planning, tourism study, smart city, complex
systems, collective sensing, geo-tagged Flickr
1 Introduction
The traces of communication and information technologies are currently considered to be an efficient and
consolidated way of collecting useful and large data sources for urban studies. There are in fact various ways
to electronically track human behavior and the most diffuse one is collecting data from mobile phones [1-2].
It was already demonstrated that this technique can be used as an accurate method for understanding crowds
[1] and individual mobility patterns [3-5], to classify how the land is used [6-9] or to delineate the regional
boundaries [10-12]. Moreover, it was shown how to identify some of user characteristics from mobile call
patterns, for example how to determinate if a user is a tourist or a resident [13]. However, when it comes to
studying human mobility patterns, exploring detailed call records is not the only possibility – other sources
of big data collected from digital maps [14], electronic toll systems [15], credit cards payments [16-17],
twitter [18], circulation of bank notes [19], vehicle GPS traces [20] and also using geotagged photographs
[21-22] can be successfully applied.
* Correspondence: [email protected]
2
The focus of this paper is on geotagged photographs that provide novel insights into how people visit
and experience a city, revealing aspects of mobility and tourism, and discovering the attractions in the urban
landscape. In the past, photography was already considered as a good mean of inquiry in architecture and
urban planning, being used for understanding landscapes [23]. Moreover, Girardin et al. showed that it was
possible to define a measure of city attractiveness by exploring big data from photograph sharing websites
[24]. They analyzed two types of digital footprints generated by mobile phones that were in physical
proximity to the New York City Waterfalls: cellular network activity from AT&T and photo activity from
Flickr. They distinguished between attractiveness and popularity. Regarding attractiveness they defined the
Comparative Relative Strength indicator to compare the activity in one area of interest with respect to the
overall activity of the city. They measured the attractiveness of a particular event in New York City. In this
study we consider the attractiveness in the overall area of the city during three years, comparing the
attractiveness and spatial distribution of activities in different cities.
Discovering how to increase the global city attractiveness or the local attractiveness of hotspots
requires knowing the differences in the visits made by residents and tourists. While both residents and
tourists take photographs at locations that they consider important, the reasons why they are taking
photographs are different. This knowledge helps us to understand the different usages of the urban
infrastructure in people spare time. The overall goal is to find the ways how passively collected data can be
used for low cost applications that inform urban innovation. These information trends can be of interest for
planning, forecasting of economic activity, tourism, or transportation [25]. Finally, a comparative study of
cities from different parts of the world is a relevant objective to discern how the patterns of human behavior
largely depend on a particular city [26].
In this paper we define city global attractiveness as the absolute number of photographs taken in a
city by tourists, while local attractiveness of hotspots within a city is defined by the spatial distribution of
photographs taken by all users (either local residents or tourists). In our analysis we are using a dataset that
consist of more than 100 million publicly shared geotagged photographs took during a period of 10 years.
The dataset is divided into 8,910 files denoting 3,015 different locations (e.g., cities or certain areas of
interest such as Niagara Falls) where for almost every location three different labels are given: resident,
tourist and unknown, to denote people who are living in the area, visiting the area or are uncategorized.
2 Data
For each photograph in the dataset, which is publicly available on the website sfgeo.org, the following data is
given: user id, timestamp, geo coordinates and link from which the photograph can be downloaded. From the
given dataset we omitted duplicates (9.33% of the dataset in total) together with the photographs with
incorrect timestamps (0.01% of the dataset in total). In the end we were left with more than 90 million
photographs. Figure 1 shows how the number of taken photographs and users changed over the period of 10
years. We can see that almost 75% of the photographs were taken from 2007 until 2010. In the further
analysis we are thus considering only photographs taken during those three years (about 70 million of
photographs in total).
3
Figure 1 -
Number of geotagged photographs (blue line) and users (green line) from 2000 until 2010.
3 Definition of user home cities and countries
In order to determinate if there is any difference between how residents vs. tourists are attracted to a
certain location, for each user in the dataset we have to determinate his/her home city and country. Even
though the dataset has tags for: resident, tourist and unknown, the given categorization is not comprehensive
and in some cases is not consistent. For instance, for more than 85% of users in the dataset their home city is
not defined (i.e., their photographs are always in unknown files). In addition, for almost 25% of users for
who their home city is defined at least two or more cities are listed as their home cities making the proposed
categorization inconsistent.
Due to the aforementioned reasons, we used our own criteria to determinate if a person is living in
the area where he/she took a photograph or not. We are considering that a person is a resident if at that
location he/she took the highest number of the photographs (at least 10 of them) over the longest period of
time (at least longer than 180 days) calculated as the time between the first and last photograph taken at the
location. Once when we determinate a user home city, he/she is automatically becoming a tourist in all other
cities in the dataset. A category “tourist” in this sense denotes many different kinds of visitors including
business visitors. However, most of people taking photographs at locations other than their home cities in
fact act like tourists during this particular instance of time.
From almost 1 million users that took photographs between 2007 and 2010, for only 11% of them we
were able to determinate their home city and country using our criteria. However, these users took more than
40% of all photographs (i.e., almost 30 millions). Our classification was not consistent with the initial
categorization (i.e., users whose photographs were listed in only one resident file) for only less than 2% of
users. Moreover, for every city in the dataset we identified its country code allowing us to classify tourists as
domestic or foreign ones, where domestic tourists are coming from the same country as the considered city,
while foreign tourists are all the others – visitors from different countries. Finally, for every city all the
observed activity is assigned to residents, domestic tourists or foreign tourists and for each of these
categories, we keep the following data: user id, geo coordinates and for tourists their home city id together
with their country code and continent id.
4
4 Attractiveness
4.1 Global Attractiveness
Considering our original question what attracts people to a certain location, we start our analysis
looking at different locations and their absolute global attractiveness that is quantified by the number of
photographs taken in them by either domestic or foreign tourists, leaving out the contribution that was made
by their residents. Once we determined user home cities and countries, in order to calculate global
attractiveness for different locations, we ranked locations by the total number of photographs taken in them
by tourists. We find that the first 10 ranked cities by photographs are: New York City, London, Paris, San
Francisco, Washington, Barcelona, Chicago, Los Angeles, Rome and Berlin. Further, we focus this study on
the global attractiveness of these 5 US cities and 5 European Union cities (EU), and add together the
remaining information as the rest of Europe, the rest of the US and the rest of world.
From the aforementioned ranking we were able to extract the origin-destination (O/D) network
between the 10 most photographed cities, the rest of the US, and Europe as well as the rest of the world.
Figure 2 shows O/D flows among the top 10 city-to-city estimated flows of visitors. Colors of the ribbons
correspond to destination cities and origin cities are marked with a thin stripe at the end of a ribbon
(visualization method based on Krzywinski [27]). With this visualization it is evident that the most attractive
cities are London and New York City, followed by San Francisco, Washington and Paris. It is interesting to
point out that the most important flows happen exactly between these cities and New York City (New York
City – Washington, New York City – San Francisco, New York City – London, New York City - Paris),
while London and Paris have the strongest flow between each other. The less active cities are Berlin and
Rome.
Figure 2 – Origin-destination (O/D) network among the top 10 city-to-city estimated flows of visitors. Ribbons represent
“outgoing” fluxes on each side. For example, following the ribbon between London - New York City, on London side it represents
people living in London who visit and take photographs in New York City.
5
linear, having R² ≅ 0.87 for the linear approximation. Therefore, the analysis based on the number of taken
The dependence between the number of users and the number of photographs they took is quite close to
photographs is to some extent also a good proxy for the number of active users; further we will use the
number of photographs as the main measure of attractiveness. However, using this measure one should also
be aware of the heterogeneity of Flickr activity belonging to users coming from different parts of the world.
As shown in Table 1 this heterogeneity is quite noticeable – number of photographs taken by the residents
varies from 1.16 for the rest of the world to more than 1000 for San Francisco. In many places across the
world people are almost never using geotagging location services (e.g., Flickr) and are not sharing their
photographs publicly because of different reasons: e.g., technical, cultural or even political ones. Among the
10 top ranked cities this activity varies in a magnitude of 20 times between people living in San Francisco
(the most active population) and Rome (the least active).
Table 1 - Ratio between total number of photographs taken by tourists and their official population.
City
New York City
London
Paris
San Francisco
Washington
Barcelona
Chicago
Los Angeles
Rome
Berlin
Rest of EU
Rest of the US
Rest of the world
Population (mln)
Photographs taken
Photographs per 1000 residents
8.36
7.81
2.23
0.81
0.59
1.62
2.85
3.83
2.71
3.43
4,82.61
2,87.61
5,905.14
1,026,199
1,151,799
534,092
851,425
525,313
255,038
412,246
289,810
126,011
182,325
8,637,148
7,347,003
6,877,894
122.75
147.48
239.50
1,051.14
890.36
157.43
144.65
75.67
46.50
53.16
17.90
25.55
1.16
In order to use the O/D flows of geotagged photography as a proxy for actual human mobility
between cities across the globe, the appropriate normalization for the above heterogeneity is required. One
way of doing it is by normalizing the O/D flows shown in Figure 2 by the number of photographs taken per
1000 of residents of the origin location reported in Table 1. However, this would require further assumptions
about the homogeneity of the dataset representativeness for different modes of people travel behavior that
would be a questionable assumption given the dataset sparsity and heterogeneity. Therefore, in the further
analysis we will refrain from extrapolating the original values of O/D flows defined by the actual number of
photographs taken to represent actual human mobility. In this way we will focus our analysis on the actual
photographic activity of the users, keeping in mind that flows of the activity from different origins might
actually have different representativeness across the entire human population and might not represent the
entire variety of types of human activity from the considered origins in the considered destinations.
However, we believe that photographic activity by itself is an important component of visitor behavior and
might serve as a relevant proxy for measuring city visual attractiveness for the visitors.
The cumulative incoming flow for each destination in the O/D network from all the origins other
than the considered destination represents the destination’s total global attractiveness in terms of geotagged
photographic activity of tourists. Normalized by the population of destination, this measure becomes a
relative global attractiveness of the destination stating how much visitors per capita of residential population
the location has.
a) b)
6
c)
Figure 3 – Relative attractiveness. (a) A relative global attractiveness of top 10 cities measured as the estimated amount of touristic
activity per capita of urban population, it is plotted in the decreasing order of total attractiveness, (b) the structure of photographic
activity within a city and (c) the structure of photographic activity of city residents. Figure 3 (a) shows the number of domestic and
foreign photographs divided by the city population (i.e., attractiveness per capita for domestic and foreign tourists). Figure 3 (b)
shows the percentage of photographs within each city depending on the type of user, while Figure 3 (c) shows the share of activity
type of users that reside in the particular city. For example, as depicted in Figure 3 (b), Rome receives the largest amount of foreign
tourist activity and Washington D.C. the smallest. And as depicted in Figure 3 (c) people living in Washington D.C have the largest
share of domestic tourists while Parisians have the smallest.
Figure 3a shows the relative global attractiveness in relation to the population of the city (with
additional distinction by domestic and foreign tourists). This gives a completely different city ranking from
the initial one (e.g., New York City, London, Paris, San Francisco, Washington, Barcelona, Chicago, Los
Angeles, Rome and Berlin) – now the top relative attractiveness is observed in San Francisco and in
Washington for domestic tourists, while the top destination by relative attractiveness for the foreign tourists
is observed in Paris. Zooming into the relative structure of photographic activity within each city (Figure 3b),
a clearly distinctive pattern between European and American cities can be observed. Namely, in American
cities the city residents take most of the photographs; followed by the domestic tourists mostly taking the
rest, while in EU cities the activity within the cities is much more diverse showing a higher fraction of
touristic and specifically foreign touristic activity. The borderline cases from both groups are London and
New York City, the former having the highest fraction of residential activity among European cities making
it more similar to the American cities, while the latter has the highest fraction of foreign activity among
American cities, making it more similar to European ones. One of the possible explanations could be that the
observed pattern is attributed to the cultural similarities going back in the history of British-American ties.
7
Additionally, for every city we can define a measure that shows how mobile its residents are (i.e., if
their activity is home-oriented or not) by looking at the ratio of loop edges to the total outgoing weights from
the O/D matrix (i.e., user activities in their home cities compared to their total activities). We depict these
results in Figure 3c. Although this ratio is nearly flat varying between 50-60%, an interesting pattern appears
when looking at the destinations of activities. Again, American and European patterns are surprisingly
distinctive – while the American tourists seem to be mostly engaged in domestic tourism, EU citizens’ travel
more abroad. This difference can be explained because the US is much bigger and at the same time much
more geographically diverse when compared to the EU countries of our studied cities. American users thus
have more options when engaged in domestic tourism and are consequently less likely to travel to foreign
destinations.
When considering the strength of each particular O/D flow 𝑎(𝑖,𝑗) between the origin 𝑖 and
destination 𝑗 (i.e., a number of photographs taken by the residents of 𝑖 when visiting city 𝑗), one should
loop edge (𝑖≠𝑗) the null model is: 𝑚𝑜𝑑𝑒𝑙(𝑖,𝑗)=𝑤!"#∗(𝑖) 𝑤!"∗(𝑗)
(𝑤!"∗(𝑘))
where 𝑤!"#/!"∗(𝑖)=𝑤!"#/!"(𝑖)−𝑎(𝑖,𝑖), 𝑎 is the actual normalized O/D edge, 𝑤!"𝑐 is the total number
of photographs taken in city 𝑐 and 𝑤!"#𝑐 is the total number of photographs taken worldwide by city 𝑐
residents. Using the aforementioned model, we compute the fraction 𝑎(𝑖,𝑗)/𝑚𝑜𝑑𝑒𝑙(𝑖,𝑗) (see Table 2) in
expect that the number of people travelling between larger or more significant cities is higher. Therefore, in
order to estimate the qualitative strength of each particular O/D flow beyond just the effect of scale, we
compare all the non-loop edges of the normalized network versus the homogenous null-model where all the
outgoing mobility is distributed in the relative proportion to the destination attractiveness, i.e., for each non-
!!!
order to see how qualitatively strong the links between each pair of cities are, i.e., how people from each
origin are attracted to each destination beyond just the effect of scale.
Table 2 – Relative strength of the links between each pair of cities, normalized by the null-model estimation.
O / D -->
New York City
London
Paris
San Francisco
Washington
Barcelona
Chicago
Los Angeles
Rome
Berlin
New York
City
-
0.92
0.76
1.58
1.70
0.67
1.25
1.31
0.76
0.64
London Paris
San Francisco Washington Barcelona Chicago Los Angeles Rome
Berlin
0.99
-
2.44
0.83
0.38
2.40
0.77
0.56
1.63
1.79
0.88
1.57
-
0.44
0.77
1.29
0.78
0.24
1.70
1.15
1.11
0.73
0.60
-
1.40
0.20
1.37
3.31
0.21
0.61
2.08
0.35
0.21
0.86
-
0.05
1.62
0.39
0.29
0.37
0.32
1.59
1.60
0.45
0.75
-
0.58
0.50
2.25
2.15
1.60
0.31
0.13
1.46
1.07
0.12
-
1.07
0.36
0.16
0.79
0.44
0.24
2.43
0.89
0.19
1.37
-
0.07
0.09
0.61
1.50
1.41
0.41
0.67
1.24
0.41
0.31
-
2.22
0.53
1.37
1.60
0.32
0.51
3.32
0.34
0.31
1.69
-
One clear pattern, which can be immediately recognized, is a high level of attractiveness between
pairs of American cities, as well as a lower level of connectivity between American cities and EU ones (see
Figure 4a). This pattern was rather expected, as trans-Atlantic links are likely to be weaker than more local
ones. To a certain extent it could be attributed to a general decay of links with distances (similar to Krings
[28]) – indeed the overall trend is well approximated by an exponential function (Figure 4b) going sharply
down once when crossing the ocean. However, an interesting finding shown in both Figures 4-a and 4b is
that the links going from the US to EU are stronger than same distance links going in the reciprocal direction
from EU to the US (see Figure 4a). According to this, Americans are more attracted by EU destinations than
Europeans are by the US cities.
a) b)
8
Figure 4 – (a) Relative strength of different types of links, (b) Relative strength of different types vs. distance.
4.2 Local Attractiveness
Until this point, cities have been considered only as aggregated spatial units. However, cities all
around the world are not spatially homogenous and there are always relatively more attractive areas within
them to which one can refer as “hotspots”. Moreover, attractiveness of different locations across the city
could vary for different categories of users. In order to investigate this local attractiveness, we identified
spatial distribution of photographs taken by users belonging to resident, domestic or foreign tourist groups.
Visualizing them on the map, where each dot represents a photograph taken, Figure 5 shows different spatial
patterns of how different categories of users take photographs in New York City, which was taken as an
example. As expected, tourists in general take more photographs in central areas within the city while
residents take photographs at locations that are much more spatially distributed – scattered all over the city.
By putting those dots onto the map, we can create “maps of attractiveness” for every city and for its residents
and tourists.
a) b)
c) d)
9
the three contributions together.
Figure 5 – Spatial distribution in New York City. Dots represent photographs taken by New York City (a) residents, (b) domestic
tourists, (c) foreign tourists creating a map of attractiveness for three different categories, while (d) is the map of attractiveness for
In order to analyze the spatial activity we use 500x500m rectangular grids covering each city.
First
we start with a standard analysis of the distribution functions of the activity density values across the grid
cells for different categories of users – residents, domestic and foreign visitors, as well as for the total
activity. All of activities can be fitted to truncated lognormal distributions (distribution truncation is an
important consideration from a technical standpoint as by its definition the cells covered by user activity
cannot have less than one photograph taken inside of them) as shown in Figure 6 for New York City. We
took New York City just as an example as patterns for the other cities are similar with the only difference in
the relative position of the curves corresponding to the foreign and domestic visitors.
Figure 6 – Cumulative distribution functions of activity density. The plot shows the cumulative distribution functions of activity
density over 500x500m grid for city residents, domestic and foreign visitors as well as the total activity in New York City fitted to
truncated log-normal distributions.
10
Log-normal distribution is characterized by its mean and variance. While means vary for different
types of users due to the differences of their total activity level, variance characterizes how broad or narrow
the distribution is, i.e., how strongly the activity density varies over the area of the city covered by the
considered user activity. The values of variance for all 10 cities and different categories of users reported in
Table 3 show a consistent pattern – with the only exception of Los Angeles variance of domestic visitor
where their spatial activity is always the lowest one, while variance of the foreign activity is higher for all the
EU cities compared to the residential activity and lower for all the American cities. Variance of the total
activity is usually the highest one with the exception of three EU cities – London, Barcelona and Rome.
Table 3 – Variance of the fitted lognormal distributions. Variance of the fitted lognormal distributions to the activity density is
shown in 500x500m grid for city residents, domestic and foreign visitors, as well as for the total activity in the different cities.
City
New York City
London
Paris
San Francisco
Washington
Barcelona
Chicago
Los Angeles
Rome
Berlin
Residents
Domestic tourists
Foreign tourists
Total activity
2.37
1.86
2.24
2.19
2.21
2.20
2.17
1.86
2.04
1.86
2.17
1.89
1.62
2.07
2.10
1.77
2.03
1.84
1.88
1.78
2.26
2.22
2.33
2.09
2.17
2.42
2.08
1.71
2.95
2.04
2.44
1.92
2.39
2.22
2.22
2.38
2.23
1.91
2.39
2.07
Another perspective of user activity spatial distribution across different cities can be expressed by
considering the dimensions of the areas covered by different quintiles of the top density cells. Figure 7
visualizes the shape of the curve characterizing those distributions (normalization is performed by the
number of cells covering 50% of the total activity in order to bring different distributions on the same scale)
in all 10 cities for all types of users (i.e., residents, domestic and foreign tourists). The curve shows how
large is the most photographed area covering a given quintile of the total activity within the city in relation to
the total area covered. Interestingly, curves for all 10 cities and three different types of users nearly follow
one single shape which seems to represent a universal pattern of spatial distribution of the photographic
activity across the city.
Figure 7 – Normalized spatial distribution. Normalized spatial distribution of city attractiveness is shown for city residents,
domestic tourists and foreign tourists – normalized total area of most photographed locations is covering a given quintile of the entire
photographic activity (area covered by 50% of activity counted as a unit after normalization).
11
However, quantitatively the areas covered by the activity of city residents, domestic and foreign
visitors within each city are quite different. Considering an average ratio between the size of areas covered
by different activity quintiles (given the similarity of the spatial distribution shapes) for domestic/foreign
tourists vs. the corresponding areas covered by the activity of residents for each city, we can see that these
values vary largely from one city to another (see Table 4). The pattern is always the same – foreign tourist
activity (in any given quintile) covers smaller areas compared to that one of domestic (the only exception is
Berlin where those are almost the same) and, with the only exception of Los Angeles, the areas covered by
both types of visitors are always smaller compared to the areas covered by the activity of residents. Once
more, a very clear difference between the US and EU cities can be noticed – tourists visiting the US cities
(with the exception of Chicago) explore more extensively the area compared to the ones visiting EU cities.
Table 4 – Top photographed area. Relative size of the top photographed area is covered by the activity of domestic and foreign
visitors versus the corresponding area covered by residents in the different cities.
New York
City
City
London
Paris
San Francisco
Washington
Barcelona
Chicago
Los Angeles
Rome
Berlin
Domestic tourists
Foreign tourists
0.47
0.40
0.33
0.64
0.45
0.45
0.37
1.32
0.47
0.25
0.35
0.25
0.27
0.48
0.32
0.26
0.21
0.74
0.33
0.26
The existing spatial activity coverage in each city is not homogenous as people are often initially
attracted by its main destinations that become “must visit” locations consequentially getting the highest
photographic activity. For city residents those locations, which are often called “hotspots”, include parks,
squares or sport facilities, while tourists are usually more attracted to the key places for the city identity (e.g.,
Times Square in New York City, Big Ben in London). The overall tourist activity in the New York City is
visualized in Figure 8 by grouping coordinates of taken photographs into cells and creating a 3D map of the
city perception. Our findings of New York City “hotspots” are similar to those previously identified in [22].
Figure 8 – A tourist density attractiveness map of New York City. The most photographed place in the city is Times Square. In
Bronx, which does not attract many people, tourists are mostly taking photographs of Yankees stadium.
Further we give a definition of the hotspots as spatially connected areas on the rectangular grid
which consist of the high-density cells and possess the highest cumulative activity. The given algorithm
allows us to define a given number of spatial hotspots in all types of user activity, ordering them according to
12
their cumulative activity level. Specifically we identify the top 𝑛 (in further analysis 𝑛=12) activity
1. Consider top 𝑛 density cells in the grid and let 𝑎 be the lowest activity level among them.
2. Select all the cells with activity higher or equal to 𝑎 and divide them into spatially connected
3. If resulting number of connected components is equal or higher than 𝑛 (could be higher if a number
of cells has the same activity level 𝑎) stop the algorithm defining selected connected components as
4. Otherwise, if the number of components is 𝑡<n, select n−t top activity cells from the remaining
ones (not covered by selected components) and let 𝑎 be the lowest activity level among them. Repeat
area is their downtown and moreover,
one hotspot represents their stadiums – Yankee Stadium in New York
from Step 2.
In Figure 9 we show examples of the resulting maps for the total user activity (including residents
and tourists) in one US city (i.e., New York City) and one EU city (i.e., Rome). In both cities the most active
components (considering cells having at least one common vertex to be connected).
hotspots within each city using a following algorithm:
the hotspots.
City and Olimpico in Rome. Another similarity is that in both cities among their top 12 hotspots are their
squares and parks, meaning that outside of their downtowns and besides their most famous attractions,
people take photographs and spend their time at locations where they can meet and talk with other people.
The only two cultural hotspots outside the downtown of Rome are the Church San Paolo Fuori le Mura and
the Capitolium. Similarly, in New York City hotspots that are outside downtown are two museums located
close to Central Park – the Metropolitan Museum of Art and the American Museum of Natural History.
Table 5 gives the complete list of top 12 hotspots in Rome and New York City.
a) b)
Figure 9 – City maps of (a) New York City and (b) Rome.
Hotspot rank
1
2
3
4
5
6
7
8
9
10
11
12
Table 5 – Hotspots in New York City and Rome.
New York
City
Downtown
New York City Hall
Metropolitan Museum of Art
Union Square
Citi Field
Yankee Stadium
American Museum of Natural History
Penn Station
Grand Central Terminal
Javitz Center
Brooklyn Bridge
Central Park
13
Rome
Downtown
San Giovanni in Laterano square
Olimpico Stadium
Auditorium Parco della Musica
Caio Cestio Pyramide
IED – Istituto Europeo di Design
Papillo Hotel
Capitolium
Villa Torlonia
Church San Paolo Fuori Le Mura
Parco dei Caduti
Passeggiata del Gianicolo
Once that we identified the first dozen of the most photographed spatial hotspots for each city for all types of
users, we define the cumulative activity within each of them separately for residents, domestic and foreign
visitors and rank them in the decreasing order by the number of photographs taken. We then plot that number
vs. the hotspot rank (similar to the approach used in González et al., 2008). Approximating these rank plots
with power law dependences ℎ𝑜𝑡𝑠𝑝𝑜𝑡𝐴𝑐𝑡𝑖𝑣𝑖𝑡𝑦(𝑟𝑎𝑛𝑘)=𝑐 𝑟𝑎𝑛𝑘!! (by doing so we get R2 above 90% on
distributions on an example of New York City where the distribution is more flat (i.e., lower 𝑞) for the
residents and sharper for domestic and especially foreign tourists (i.e., higher 𝑞).
average) gives us another important quantitative relative characteristic of how concentrated or distributed
between the key destinations across the city is the activity of different types of people. Figure 10 shows those
Figure 10 – Log-log rank plot of 12 hotspots relative attractiveness in New York City fitted to power-laws. The top hotspot
attractiveness is considered as a unit for each type of users.
14
Detailed comparison of 𝑞 exponents for different cities is presented in Table 6. From the values of
q we can see how concentrated or distributed resident and tourist activity is within them. If the value of 𝑞
quantifying 𝑞 separately for residents, domestic and foreign tourists, we can conclude that their values
exponent is higher, then it means that people are more focused on just visiting the major attractions, while a
lower exponent means that people attention is more equally distributed among different attractions. By
largely vary from one city to another, corresponding to the unique city spatial layout. However, we can still
discover additional strongly consistent pattern in human behavior across different cities: the distribution
always becomes sharper for the visitors and especially for the foreign visitors with the only exception of
Berlin where foreign activity has almost the same exponent as the activity of the city residents.
Table 6 – Values of 𝒒 exponents for residents and tourists in the different cities. 𝒒 exponent is a measure of how concentrated or
distributed people activity is across different “hotspots”. Namely, a higher value means that people are more focused on just visiting
major attractions.
Residents
Domestic tourists
Foreign tourists
Total activity
City
New York City
London
Paris
San Francisco
Washington
Barcelona
Chicago
Los Angeles
Rome
Berlin
1.06
1.29
1.25
1.10
1.21
1.65
1.48
1.25
2.37
1.60
1.39
1.35
1.38
1.12
2.51
2.18
1.91
1.46
2.77
2.19
1.63
1.61
1.43
1.21
2.81
2.26
2.71
1.84
3.17
1.60
1.21
1.25
1.23
1.02
1.42
1.69
1.54
0.92
2.61
1.56
5 Summary and Conclusion
The importance of cities in our society is well founded and it is evident that cities play a crucial role
as more than half of world population lives in them. “Rethinking” cities is thus the key component of the
world sustainable development paradigm. The first and the most direct way of doing that is by rethinking the
way we plan them. In order to become a better planner, one needs to start considering people needs. Not only
do people need efficiency, better transportation and green energy, but also do they need a better experience
of living in cities enjoying the things that they have interest in and that they find attractive. In this study we
thus conducted an analysis of cities through the city attractiveness and derived patterns. The novelty of the
study is in the kind of data that was used in it: geotagged photographs from publicly available photograph
sharing web sites (e.g., Flickr).
Over the last decade big data analyses have being increasingly utilized in urban planning (e.g.,
analysis of cell phone records for the transportation planning). However, information from geotagged
photographs was not very often analyzed although they can provide us with an additional layer of
information useful for the urbanism in general. Namely, taken photographs indicate places in cities important
enough for people to visit them and to decide to leave their digital trails there. By analyzing the global
dataset of geotagged photographs we identified 10 most photographed cities, which happened to be
distributed evenly between the US and EU. Focusing on top 10 selected destinations, we studied spatial
patterns of visitor attraction versus behavior of the residential users together with analyzing people mobility
between those 10 cities and other places all around the world.
15
Although intercity origin/destination fluxes in a rather predictable way depend on the distance
between two cities, links between American and European cities are surprisingly asymmetric. Namely, links
going from American origins to EU destinations are on average stronger than the ones going in the opposite
direction. Another clearly distinctive pattern between EU and American cities is related to the structure of
the photographic activity within them. The results showed that in the US cities their residents take most of
the photographs while the domestic tourists mostly cover the rest leaving not much for foreigners. The
activity that happens in the EU cities is much more diverse showing a higher fraction of touristic and
specifically foreign activity. Finally, when investigating the qualitative structure of destinations, again
American and EU patterns are surprisingly distinctive – while Americans seem mostly engaged in domestic
tourism, the Europeans travel more abroad than within their own home countries.
Moreover, we extracted the photographic activity at the local scale comparing attraction patterns for
residents, domestic and foreign tourists within a city. Spatial distribution of photographic activity of all those
user categories follows the same universal pattern – activity density distributions of all types of users follow
log-normal law pretty well while the shapes of the curves for area size vs. activity quintile appear to be
strongly consistent. However, the areas covered by tourist activities are always smaller compared to the areas
covered by residents with the only exception of Los Angeles where domestic tourist activities cover larger
areas compared to city residents. The ratio between areas covered by tourists and city residents is different
for domestic and foreign tourists and is always higher for domestic tourists with only exception of Berlin
where those factors are almost the same.
Once again, we find the activities within American and European cities are different from the
quantitative standpoint. First, tourists visiting American cities (with the exception of Chicago) explore them
more extensively covering bigger parts of areas of residential activity. More strikingly the variance of the
foreign activity density distribution is always higher for all the European cities compared to the residential
activity and lower for all the American cities. Finally, we identified the hotspots in each city focusing on the
most photographed places of each city. We noted that hotspot attractiveness follows a power-law distribution
where the exponent of this distribution serves as an indicator of how focused people’s attention is on the
major attractiveness compared to how distributed it is among a number of objectives. For all cities with the
exception of Berlin, activity of the tourists and especially foreign tourists appeared to be more concentrated
on the major attractions.
To conclude, by showing differences between people visiting the US and EU cities our study
revealed interesting patterns in human activity. The results of our study are useful for understanding of what
has to be enhanced in cities and where it can be appropriate to increase services targeting different categories
of users. In past those questions were traditionally answered by analyzing different available datasets such as
hotel information or survey data. However, collecting or getting the access to such datasets usually requires
significant efforts and/or expenses, while geotagged photography is publicly available while providing a
unique global perspective on addressing many research questions at both global and local scale. In future
work we will also consider the longitudinal perspective of data analysis by showing how the observed human
patterns evolve over time.
Acknowledgements
The authors wish to thank Ericsson, the MIT SMART Program, the Center for Complex Engineering
Systems (CCES) at KACST and MIT CCES program, the National Science Foundation, the MIT Portugal
Program, the AT&T Foundation, Audi Volkswagen, BBVA, The Coca Cola Company, Expo 2015,
Ferrovial, Liberty Mutual, The Regional Municipality of Wood Buffalo, UBER and all the members of the
MIT SENSEable City Lab Consortium for supporting the research. We further thank MIT research support
committee via the NEC and Bushbaum research funds, as well as Fulbright. Finally, we would like to thank
Eric Fisher for providing the dataset for this research, Alexander Belyi for some help with the visualizations
and also Jameson L. Toole, Yingxiang Yang, Lauren Alexander for useful recommendations at the early
stage of this work.
References
16
1. Ratti C, Pulselli RM, Williams S, Frenchman D (2006) Mobile landscapes: Using location data from
cell-phones for urban analysis. Environment and Planning B: Planning and Design, 33(5):727 – 748.
2. Reades J, Calabrese F, Sevtsuk A, Ratti C (2007) Cellular census: Explorations in urban data
collection. Pervasive Computing, IEEE, 6(3), 30-38.
3. González MC, Hidalgo CA, Barabási AL (2008) Understanding individual human mobility patterns.
Nature, (453):779–782.
4. Kung KS, Greco K, Sobolevsky S, Ratti C (2014) Exploring Universal Patterns in Human Home-
e96180.
from Mobile
Phone Data.
PLoS ONE
9(6):
Work
doi:10.1371/journal.pone.0096180
Commuting
5. Hoteit S, Secci S, Sobolevsky S, Ratti C, Pujolle G (2014) Estimating human trajectories and
hotspots through mobile phone data. Computer Networks, 64: 296-307
6. Reades J, Calabrese F, Sevtsuk A, Ratti C (2007) Cellular census: Explorations in urban data
collection. Pervasive Computing, IEEE, 6(3), 30-38.
7. Toole J L, Ulm M, González MC, Bauer D (2012) Inferring land use from mobile phone activity. In
Proceedings of the ACM SIGKDD international workshop on urban computing (pp. 1-8). ACM.
8. Grauwin S, Sobolevsky S, Moritz S, Godor I, Ratti C (2014) Towards a comparative science of
cities: using mobile traffic records in New York, London and Hong Kong. arXiv:1406.4400.
9. Pei T, Sobolevsky S, Ratti C, Shaw SL, Li T, Zhou C (2014) A new insight into land use
classification based on aggregated mobile phone data. International Journal of Geographical
Information Science, 28(9) p.1-20.
10. Ratti C, Sobolevsky S, Calabrese F, Andris C, Reades J, Martino M, Claxton R, Strogatz SH (2010)
Redrawing the Map of Great Britain from a Network of Human Interaction. PLoS ONE -December
08, 2010 - DOI: 10.1371/journal.pone.0014248.
11. Sobolevsky S, Szell M, Campari R, Couronné T, Smoreda Z, Ratti C (2013) Delineating
Geographical Regions with Networks of Human Interactions in an Extensive Set of Countries. PLoS
ONE 8(12), e81707 DOI: 10.1371/journal.pone.0081707.
12. Amini A, Kung K, Kang C, Sobolevsky S, Ratti C (2014) The impact of social segregation on
Data
industrialized
regions.
EPJ
and
human
developing
Science 2014, 3(1):6 doi:10.1140/epjds31.
mobility
in
13. Furletti B, Gabrielli L, Renso C, Rinzivillo S (2012) Identifying users profiles from mobile calls
habits. ACM SIGKDD International Workshop on Urban Computing.
14. Fisher D (2007) Hotmap: Looking at geographic attention. IEEE Trans. Vis. Comput. Graph.,
13(6):1184–1191.
15. Houée M, Barbier C (2008) Estimating foreign visitors flows from motorways toll management
system. In 9th International Forum on Tourism Statistics.
16. Sobolevsky S et al. (2014) Mining Urban Performance: Scale-Independent Classification of Cities
Based on Individual Economic Transactions. ASE BigDataScience 2014 (Stanford, CA), arXiv
preprint arXiv:1405.4301
17
17. Sobolevsky S, Sitko I, Tachet des Combes R, Hawelka B, Murillo Arias J, Ratti C (2014) Money on
the Move: Big Data of Bank Card Transactions as the New Proxy for Human Mobility Patterns and
Regional Delineation. The Case of Residents and Foreign Visitors in Spain. 2014 IEEE International
Congress on Big Data (Anchorage, AK)
18. Hawelka B, Sitko I, Beinat E, Sobolevsky S, Kazakopoulos P, Ratti C (2014) "Geo-located Twitter
as proxy for global mobility patterns." Cartography and Geographic Information Science 41(3):
260-271.
19. Brockmann D, Hufnagel L, Geisel T (2006) The scaling laws of human travel. In Nature, (439), 462-
465.
20. Kang C, Sobolevsky S, Liu Y, Ratti C (2013) Exploring human movements in Singapore: A
comparative analysis based on mobile phone and taxicab usages. In Proceedings of the 2nd ACM
SIGKDD International Workshop on Urban Computing (p. 1). ACM.
21. Girardin F, Calabrese F, Dal Fiore F, Ratti C, Blat J (2008) Digital footprinting: Uncovering tourists
with user-generated content. IEEE Pervasive Computing, 7(4):36–43.
22. Crandall DJ, Backstrom L, Huttenlocher D, Kleinberg J (2009) Mapping the world’s photos. In
WWW ’09: Proceedings of the 18th international conference on World wide web, pages 761–770,
New York City, NY, USA. ACM.
23. Spirn A (1998) The Language of Landscape. pp. 3-81.
24. Girardin F, Vaccari A, Gerber A, Ratti C (2009) Quantifying urban attractiveness from the
distribution and density of digital footprints. Journal of Spatial Data Infrastructures.
25. Sinkiene J, Kromolcas S (2010) Concept, Direction and Practice of City Attractiveness
Improvement. Public Policy and Administration. No. 31, pp. 147 – 154.
26. Van den Berg L, Van der Meer J, Otgaar AHJ (2007) The attractive city: catalyst of sustainable
urban development. In: P. Ache and P. Lehtovuori (2007), European Urban and Metropolitan
Planning. Proceedings of the first Openings. Seminar 12th October 2007 YTK-Espoo, Centre for
Urban and Regional Studies Publication C 67, p. 48-63
27. Krzywinski M, Schein J, Birol I, Connors J, Gascoyne R, Horsman D, Jones SJ, Marra MA (2009)
“Circos: An Information Aesthetic for Comparative Genomics.” Genome Research 19 (9): 1639–
1645. doi:10.1101/gr.092759.109.
28. Krings G, Calabrese F, Ratti C, Blondel VD (2009) Urban gravity: a model for inter-city
telecommunication flows. Journal of Statistical Mechanics: Theory and Experiment, 2009(07),
L07003.
|
1908.01297 | 5 | 1908 | 2019-12-17T20:48:26 | A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models | [
"cs.SI",
"cs.CR",
"cs.LG",
"stat.ML"
] | With the great success of graph embedding model on both academic and industry area, the robustness of graph embedding against adversarial attack inevitably becomes a central problem in graph learning domain. Regardless of the fruitful progress, most of the current works perform the attack in a white-box fashion: they need to access the model predictions and labels to construct their adversarial loss. However, the inaccessibility of model predictions in real systems makes the white-box attack impractical to real graph learning system. This paper promotes current frameworks in a more general and flexible sense -- we demand to attack various kinds of graph embedding model with black-box driven. To this end, we begin by investigating the theoretical connections between graph signal processing and graph embedding models in a principled way and formulate the graph embedding model as a general graph signal process with corresponding graph filter. As such, a generalized adversarial attacker: GF-Attack is constructed by the graph filter and feature matrix. Instead of accessing any knowledge of the target classifiers used in graph embedding, GF-Attack performs the attack only on the graph filter in a black-box attack fashion. To validate the generalization of GF-Attack, we construct the attacker on four popular graph embedding models. Extensive experimental results validate the effectiveness of our attacker on several benchmark datasets. Particularly by using our attack, even small graph perturbations like one-edge flip is able to consistently make a strong attack in performance to different graph embedding models. | cs.SI | cs | A Restricted Black-box Adversarial Framework Towards Attacking Graph
Embedding Models
Heng Chang∗,1 Yu Rong,2 Tingyang Xu,2 Wenbing Huang,2 Honglei Zhang,2
Peng Cui,3 Wenwu Zhu†,1,3 Junzhou Huang2
1Tsinghua-Berkeley Shenzhen Institute, Tsinghua University, China
3Department of Computer Science and Technology, Tsinghua University, China
[email protected], [email protected], [email protected], [email protected],
[email protected], [email protected], [email protected], [email protected]
2Tencent AI Lab, China
9
1
0
2
c
e
D
7
1
]
I
S
.
s
c
[
5
v
7
9
2
1
0
.
8
0
9
1
:
v
i
X
r
a
Abstract
With the great success of graph embedding model on both
academic and industry area, the robustness of graph embed-
ding against adversarial attack inevitably becomes a central
problem in graph learning domain. Regardless of the fruitful
progress, most of the current works perform the attack in a
white-box fashion: they need to access the model predictions
and labels to construct their adversarial loss. However, the
inaccessibility of model predictions in real systems makes the
white-box attack impractical to real graph learning system.
This paper promotes current frameworks in a more general
and flexible sense -- we demand to attack various kinds of
graph embedding model with black-box driven. To this end,
we begin by investigating the theoretical connections between
graph signal processing and graph embedding models in a
principled way and formulate the graph embedding model
as a general graph signal process with corresponding graph
filter. As such, a generalized adversarial attacker: GF-Attack
is constructed by the graph filter and feature matrix. Instead of
accessing any knowledge of the target classifiers used in graph
embedding, GF-Attack performs the attack only on the graph
filter in a black-box attack fashion. To validate the generaliza-
tion of GF-Attack, we construct the attacker on four popular
graph embedding models. Extensive experimental results val-
idate the effectiveness of our attacker on several benchmark
datasets. Particularly by using our attack, even small graph
perturbations like one-edge flip is able to consistently make
a strong attack in performance to different graph embedding
models.
Introduction
Graph embedding models
(Scarselli et al. 2009; Cui et
al. 2018), which elaborate the expressive power of deep
learning on graph-structure data, have achieved promis-
ing success in various domains, such as predicting proper-
ties over molecules (Duvenaud et al. 2015), biology analy-
sis (Hamilton, Ying, and Leskovec 2017), financial surveil-
lance (Paranjape, Benson, and Leskovec 2017) and struc-
tural role classification (Tu et al. 2018). Given the increas-
ing popularity and success of these methods, a bunch of
∗Work done while interning at Tencent AI Lab.
†Wenwu Zhu is the corresponding author.
Copyright c(cid:13) 2020, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
recent works have posed the risk of graph embedding mod-
els against adversarial attacks, just like what the researchers
are anxious for convolutional neural networks (Akhtar and
Mian 2018). A strand of research works (Dai et al. 2018;
Zugner, Akbarnejad, and Gunnemann 2018; Bojchevski and
Gunnemann 2019) have already shown that various kinds of
graph embedding methods, including Graph Convolutional
Networks, DeepWalk, etc., are vulnerable to adversarial at-
tacks. Undoubtedly, the potential attacking risk is rising for
modern graph learning systems. For instance, by sophisti-
cated constructed social bots and following connections, it's
possible to fool the recommendation system equipped with
graph embedding models to give wrong recommendations.
Regarding the amount of information from both target
model and data required for the generation of adversarial
examples, all graph adversarial attackers fall into three cate-
gories (arranged in an ascending order of difficulties):
• White-box Attack (WBA): the attacker can access any
information, namely, the training input (e.g., adjacency
matrix and feature matrix), the label, the model parameters,
the predictions, etc.
• Practical White-box Attack (PWA): the attacker can any
• Restrict Black-box Attack (RBA): the attacker can only
access the training input and limited knowledge of the
model. The access of parameters, labels and predictions is
prohibited.
Despite the fruitful results (Sun et al. 2018; Zugner, Ak-
barnejad, and Gunnemann 2018; Zugner and Gunnemann
2019) which absorb ingredients from exiting adversarial
methods on convolutional neural networks, obtained in at-
tacking graph embeddings under both WBA and PWA setting,
however, the target model parameter as well as the labels and
predictions are seldom accessible in real-life applications.
In the other words, the WBA and PWA attackers are almost
impossible to perform a threatening attack to real systems.
Meanwhile, current RBA attackers are either reinforcement
learning based (Dai et al. 2018), which has low computa-
tional efficiency and is limited to edge deletion, or derived
merely only from the structure information without consid-
ering the feature information (Bojchevski and Gunnemann
2019). Therefore, how to perform the effective adversarial
information except the model parameters.
Figure 1: The overview of whole attack procedure of GF-Attack. Given target vertices 5 and 7, GF-Attack aims to misclassify
them by attacking the graph filter and producing adversarial edges (edge e45 deleted and edge e78 added ) on graph structure.
The common graph embedding block refers to the general target GNN model and can be any kind of potential GNN models,
illustrating the flexibility and extensibility of GF-Attack. In this vein, GF-Attack would not change the target embedding model.
attack toward graph embedding model relying on the train-
ing input, a.k.a., RBA setting, is still more challenging yet
meaningful in practice.
The core task of the adversarial attack on graph embed-
ding model is to damage the quality of output embeddings
to harm the performance of downstream tasks within the
manipulated features or graph structures, i.e., vertex or edge
insertion/deletion. Namely, finding the embedding quality
measure to evaluate the damage of embedding quality is
vital. For the WBA and PWA attackers, they have enough
information to construct this quality measure, such as the
loss function of the target model. In this vein, the attack
can be performed by simply maximize the loss function re-
versely, either by gradient ascent (Dai et al. 2018) or a sur-
rogate model (Zugner, Akbarnejad, and Gunnemann 2018;
Zugner and Gunnemann 2019) given the known labels. How-
ever, the RBA attacker can not employ the limited informa-
tion to recover the loss function of the target model, even
constructing a surrogate model is impossible. In a nutshell,
the biggest challenge of the RBA attacker is: how to figure
out the goal of the target model barely by the training input.
In this paper, we try to understand the graph embedding
model from a new perspective and propose an attack frame-
work: GF-Attack, which can perform adversarial attack on
various kinds of graph embedding models. Specifically, we
formulate the graph embedding model as a general graph
signal processing with corresponding graph filter which can
be computed by the input adjacency matrix. Therefore, we
employ the graph filter as well as feature matrix to construct
the embedding quality measure as a T -rank approximation
problem. In this vein, instead of attacking the loss function,
we aim to attack the graph filter of given models. It enables
GF-Attack to perform attack in a restrict black-box fashion.
Furthermore, by evaluating this T -rank approximation prob-
lem, GF-Attack is capable to perform the adversarial attack
on any graph embedding models which can be formulate to
a general graph signal processing. Meanwhile, we give the
quality measure construction for four popular graph embed-
ding models (GCN, SGC, DeepWalk, LINE). Figure 1 pro-
vides the overview of whole attack procedure of GF-Attack.
Empirical results show that our general attacking method
is able to effectively propose adversarial attacks to popular
unsupervised/semi-supervised graph embedding models on
real-world datasets without access to the classifier.
Related work
For explanation of graph embedding models, (Xu et al. 2018)
and (Qiu et al. 2018) show some insights on the under-
standing of Graph Convolutional Networks and sampling-
based graph embedding, respectively. However, they focus
on proposing new graph embedding frameworks in each type
of methods rather than building up a theoretical connection.
Only recently adversarial attacks on deep learning for
graphs have drawn unprecedented attention from researchers.
(Dai et al. 2018) exploits a reinforcement learning based
framework under RBA setting. However, they restrict their
attacks on edge deletions only for node classification, and
do not evaluate the transferability. (Zugner, Akbarnejad, and
Gunnemann 2018) proposes attacks based on a surrogate
model and they can do both edge insertion/deletion in con-
trast to (Dai et al. 2018). But their method utilizes additional
information from labels, which is under PWA setting. Fur-
ther, (Zugner and Gunnemann 2019) utilizes meta-gradients
to conduct attacks under black-box setting by assuming the
attacker uses a surrogate model same as (Zugner, Akbarnejad,
and Gunnemann 2018). Their performance highly depends on
the assumption of the surrogate model, and also requires label
information. Moreover, they focus on the global attack set-
ting. (Xu et al. 2019) also proposes a gradient-based method
under WBA setting and overcomes the difficulty brought by
discrete graph structure data. (Bojchevski and Gunnemann
2019) considers a different adversarial attack task on vertex
embeddings under RBA setting. Inspired by (Qiu et al. 2018),
they maximize the loss obtained by DeepWalk with matrix
perturbation theory while only consider the information from
adjacent matrix. In contrast, we focus on semi-supervised
learning on node classification combined with features. Re-
markably, despite all above-introduced works except (Dai
OriginalPathAttackedPathAttackedPredictionOriginalPredictionOriginalEmbeddingAttackedEmbeddingGraphEmbedding12345678OriginalGraphFilter1=𝜆0>⋯>𝜆𝑛OriginalGraph1243567812345678AttackedGraphFilter1=𝜆′0>⋯>𝜆′𝑛1243567812435678ClassifierGF-Attacket al. 2018) show the existence of transferability in graph
embedding methods by experiments, they all lack theoreti-
cal analysis on the implicit connection. In this work, for the
first time, we theoretically connect different kinds of graph
embedding models and propose a general optimization prob-
lem from parametric graph signal processing. An effective
algorithm is developed afterwards under RBA setting.
Preliminary
i
2 AD− 1
with dimension l. Dii = (cid:80)
(cid:80)
j Aij =(cid:80)
vol(G) =(cid:80)
Let G(V,E) be an attributed graph, where V is a ver-
tex set with size n = V and E is an edge set. Denote
A ∈ {0, 1}n×n as an adjacent matrix containing informa-
tion of edge connections and X ∈ Rn×l as a feature matrix
j Aij refers the degree matrix.
i Dii denotes the volume of G.
For consistency, we denote the perturbed adjacent matrix as
A(cid:48) and the normalized adjacent matrix as A = D− 1
2 AD− 1
2 .
Symmetric normalized Laplacian and random walk normal-
ized Laplacian are referred as Lsym = In − D− 1
2 and
Lrw = In − D−1A, respectively.
Given a graph embedding model MΘ parameterized by Θ
and a graph G(V,E), the adversarial attack on graph aims to
perturb the learned vertex representation Z = MΘ(A, X) to
damage the performance of the downstream learning tasks.
There are three components in graphs that can be attacked as
targets:
• Attack on V: Add/delete vertices in graphs. This operation
• Attack on A: Add/delete edges in graphs. This operation
would lead to the changes of entries in the adjacency matrix
A. This kind of attack is also known as structural attack.
• Attack on X: Modify the attributes attached on vertices.
Here, we mainly focus on adversarial attacks on graph struc-
ture A, since attacking A is more practical than others in real
applications (Tong et al. 2012).
may change the dimension of the adjacency matrix A.
Adversarial Attack Definition
Formally, given a fixed budget β indicating that the attacker
is only allowed to modify 2β entries in A (undirected), the
adversarial attack on a graph embedding model MΘ can be
formulated as (Bojchevski and Gunnemann 2019):
Methodologies
Graph Signal Processing (GSP) focuses on analyzing and
processing data points whose relations are modeled as graph
(Shuman et al. 2013; Ortega et al. 2018). Similar to Discrete
Signal Processing, these data points can be treated as signals.
Thus the definition of graph signal is a mapping from vertex
set V to real numbers x : V → R. In this sense, the feature
matrix X can be treated as graph signals with l channels.
From the perspective of GSP, we can formulate graph embed-
ding model M : (A, X) → Rn×d as the generalization of
signal processing. Namely, A graph embedding model can
be treated as producing the new graph signals according to
graph filter H together with feature transformation:
X = H (X), X(cid:48) = σ( XΘ),
h(x) = (cid:80)L
(2)
where H denotes a graph signal filter, σ(·) denotes the ac-
tivation function of neural networks, and Θ ∈ Rl×l(cid:48)
de-
notes a convolution filter from l input channels to l(cid:48) output
channels. H can be constructed by a polynomial function
i=0 aixi ∈ Rn×n with graph-shift filter S, i.e.,
X = h(S)X. Here, the graph-shift filter S reflects the lo-
cality property of graphs, i.e., it represents a linear transfor-
mation of the signals of one vertex and its neighbors. It's
the basic building blocks to construct H . Some common
choices of H include the adjacency matrix A and the Lapla-
cian L = D − A. We call this general model Graph Filter At-
tack (GF-Attack). GF-Attack introduces the trainable weight
matrix Θ to enable stronger expressiveness which can fuse
the structural and non-structural information.
Embedding Quality Measure L (A(cid:48), Z) of
GF-Attack
According to (2), in order to avoid accessing the target model
parameter Θ, we can construct the restricted black-box attack
loss L (A(cid:48), Z) by attacking the graph filter H . Recent works
(Yang et al. 2015; Nar et al. 2019) demonstrate that the output
embeddings of graph embedding models can have very low-
rank property. Since our goal is to damage the quality of
output embedding Z, we establish the general optimization
problem accordingly as a T -rank approximation problem
inspired from (Qiu et al. 2018):
L (A(cid:48), Z)
arg max
A(cid:48)
s.t. Z = MΘ(A(cid:48), X),
Θ∗ = arg min
Θ
L(Θ; A(cid:48), X),(cid:107)A(cid:48) − A(cid:107) = 2β,
(1)
where Z is the embedding output of the model MΘ and
L(·,·) is the loss function minimized by Θ. L (A(cid:48), Z) is
defined as the loss measuring the attack damage on output
embeddings, lower loss corresponds to higher quality. For
the WBA, L (A(cid:48), Z) can be defined by the minimization of
L(A(cid:48), Z). This is a bi-
the target loss, i.e., L (A(cid:48), Z) = inf
level optimization problem if we need to re-train the model
during attack. Here we consider a more practical scenario:
Θ∗ = arg minΘ L(Θ; A, X) are learned on the clean graph
and remains unchanged during attack.
Θ
n(cid:88)
λ
i X(cid:107)F ≤ n(cid:88)
n(cid:88)
L (A(cid:48), Z) = (cid:107)h(S(cid:48))X − h(S(cid:48))T X(cid:107)2
F ,
(3)
where h(S(cid:48)) is the polynomial graph filter, S(cid:48) is the graph
shift filter constructed from the perturbed adjacency matrix
A(cid:48). h(S(cid:48))T is the T -rank approximation of h(S(cid:48)). According
to low-rank approximation, L (A(cid:48), Z) can be rewritten as:
i=T +1
i=T +1
i=T +1
2 ·
(cid:48)
i
λ
(cid:107)uT
(cid:48)
L (A
(cid:48)
iuiuT
, Z) = (cid:107)
i X(cid:107)2
2,
(4)
where n is the number of vertices. h(S(cid:48)) = U ΛU T is
the eigen-decomposition of the graph filter h(S(cid:48)). h(S(cid:48))
is a symmetric matrix. Λ = diag(λ1,··· , λn), U =
1 ,··· , uT
n ] are the eigenvalue and eigenvector of graph
[uT
filter H , respectively, in order of λ1 ≥ λ2 ≥ ··· ≥ λn.
λ(cid:48)
i is the corresponding eigenvalue after perturbation. While
n(cid:88)
n(cid:88)
i=T +1 λiuiuT
i X(cid:107) is hard to optimized, from (4), we can
compute the upper bound instead of minimizing the loss
directly. Accordingly, the goal of adversarial attack is to max-
imize the upper bound of the loss reversely. Thus the restrict
black-box adversarial attack is equivalent to optimize:
λ(cid:48)
2 ·
arg max
A(cid:48)
s.t. (cid:107)A(cid:48) − A(cid:107) = 2β.
i=T +1
i=T +1
i
(cid:107)uT
i X(cid:107)2
2,
(5)
Now our adversarial attack model is a general attacker.
Theoretically, we can attack any graph embedding model
which can be described by the corresponding graph filter
H . Meanwhile, our general attacker provides theoretical
explanation on the transferability of adversarial samples
created by (Zugner, Akbarnejad, and Gunnemann 2018;
Zugner and Gunnemann 2019; Bojchevski and Gunnemann
2019), since modifying edges in adjacent matrix A implicitly
perturbs the eigenvalues of graph filters. In the following, we
will analyze two kinds of popular graph embedding methods
and aim to perform adversarial attack according to (5).
GF-Attack on Graph Convolutional Networks
Graph Convolution Networks extend the definition of con-
volution to the irregular graph structure and learn a repre-
sentation vector of a vertex with feature matrix X. Namely,
we generalize the Fourier transform to graphs to define the
convolution operation: gθ ∗ x = U gθU T x. To accelerate cal-
culation, ChebyNet (Defferrard, Bresson, and Vandergheynst
k=0 θkΛk
and approximated gθ(Λ) by a truncated expansion concern-
ing Chebyshev polynomials Tk(x):
2016) proposed a polynomial filter gθ(Λ) = (cid:80)K
gθ(cid:48) ∗ x ≈ K(cid:88)
kTk((cid:101)L)x,
θ(cid:48)
k=0
(6)
(cid:107)(cid:80)n
where(cid:101)L = 2
λmax
L − In and λmax is the largest eigenvalue of
Laplacian matrix L. θ(cid:48) ∈ RK is now the parameter of Cheby-
shev polynomials Tk(x). K denotes the Kth order polyno-
mial in Laplacian. Due to the natural connection between
Fourier transform and single processing, it's easy to formu-
late ChebyNet to GF-Attack:
Lemma 1. The K-localized single-layer ChebyNet with ac-
tivation function σ(·) and weight matrix Θ is equivalent
to filter graph signal X with a polynomial filter H =
− In. Tk(S)
represents Chebyshev polynomial of order k. Equation (2)
can be rewritten as:
k=0 Tk(S) with graph-shift filter S = 2 Lsym
(cid:80)K
λmax
X =
Tk(2
Lsym
λmax
− In)X, X(cid:48) = σ( XΘ).
tion function σ(·) is σ((cid:80)K
and linear and shift-invariant filter H =(cid:80)K
Proof. The K-localized single-layer ChebyNet with activa-
− In)X). Thus,
− In
we can directly write graph-shift filter as S = 2 Lsym
λmax
k=0 Tk(S).
kTk(2 Lsym
λmax
k=0 θ(cid:48)
K(cid:88)
k=0
j
GCN (Kipf and Welling 2017) constructed the layer-wise
model by simplifying the ChebyNet with K = 1 and the
re-normalization trick to avoid gradient exploding/vanishing:
(cid:16) D− 1
where A = A + In and Dii =(cid:80)
(7)
n }
1 , ..., θ(l)
is the parameters in the lth layer and σ(·) is an activation
function.
,
Aij. Θ = {θ(l)
2 X (l)Θ(l)(cid:17)
X (l+1) = σ
2 A D− 1
SGC (Wu et al. 2019) further utilized a single linear trans-
formation to achieve computationally efficient graph convo-
lution, i.e., σ(·) in SGC is a linear activation function. We
can formulate the multi-layer SGC as GF-Attack through its
theoretical connection to ChebyNet:
Corollary 2. The K-layer SGC is equivalent to the K-
localized single-layer ChebyNet with Kth order polynomials
of the graph-shift filter Ssym = 2In − Lsym. Equation (2)
can be rewritten as:
X = (2In − Lsym)KX, X(cid:48) = σ( XΘ).
Proof. We can write the K-layer SGC as (2In−Lsym)KXΘ.
Since Θ is the learned parameters by the neural net-
(cid:80)K
work, we can employ the reparameterization trick to use
k=0 Tk(2In − Lsym) with new (cid:101)Θ. Then we rewrite the
(2In − Lsym)K to approximate the same order polynomials
K-layer SGC by polynomial expansion as(cid:80)K
Lsym)X(cid:101)Θ. Therefore, we can directly write the graph-shift
k=0 Tk(2In −
filter Ssym = 2In − Lsym with the same linear and shift-
invariant filter H as K-localized single-layer ChebyNet.
Note that SGC and GCN are identical when K = 1. Even
though non-linearity disturbs the explicit expression of graph-
shift filter of multi-layer GCN, the spectral analysis from
(Wu et al. 2019) demonstrated that both GCN and SGC share
similar graph filtering behavior. Thus practically, we extend
the general attack loss from multi-layer SGC to multi-layer
GCN under non-linear activation functions scenario. Our
experiments also validate that the attack model for multi-
layer SGC also shows excellent performance on multi-layer
GCN.
2 AD− 1
GF-Attack loss for SGC/GCN. As stated in Corollary 2,
the graph-shift filter S of SGC/GCN is defined as Ssym =
2In − Lsym = D− 1
2 + In = A + In, where
A denotes the normalized adjacent matrix. Thus, for K-
layer SGC/GCN, we can decompose the graph filter H
as H sym = (Ssym)K = U A(Λ A + In)KU T
, where Λ A
A
and U A are eigen-pairs of A. The corresponding adversarial
attack loss for Kth order SGC/GCN can be rewritten as:
(λ(cid:48)
+ 1)2K ·
(cid:107)uT
A(cid:48),i
X(cid:107)2
2,
(8)
A(cid:48),i
arg max
A(cid:48)
where λ(cid:48)
turbed normalized adjacent matrix A(cid:48).
A(cid:48),i
i=T +1
refers to the ith largest eigenvalue of the per-
i=T +1
While each time directly calculating λ(cid:48)
from at-
tacked normalized adjacent matrix A(cid:48) will need an eigen-
decomposition operation, which is extremely time consum-
ing, eigenvalue perturbation theory is introduced to estimate
λ(cid:48)
A(cid:48),i
in a linear time:
A(cid:48),i
n(cid:88)
n(cid:88)
Theorem 3. Let A(cid:48) = A + ∆A be a perturbed version
of A by adding/removing edges and ∆D be the respective
change in the degree matrix. λ A,i and u A,i are the ith eigen-
pair of eigenvalue and eigenvector of A and also solve the
generalized eigen-problem Au A,i = λ A,iDu A,i. Then the
perturbed generalized eigenvalue λ
is approximately as:
(cid:48)
A,i
Theorem 5. LINE is equivalent to filter a graph signal X =
b In with a polynomial filter H and fixed parameters Θ =
1
vol(G)D−1. H = S is constructed by graph-shift filter
Srw = In − Lrw. Equation (2) can be rewritten as:
X =
1
b
(In − Lrw)D−1In, X(cid:48) = log(vol(G) X).
(cid:16)
V(cid:88)
V(cid:88)
i=1
j=1
λ(cid:48)
A(cid:48),i
≈ λ A,i +
uT
A,i
∆Au A,i − λ A,iuT
Du A,i
uT
A,i
A,i
∆Du A,i
.
(9)
Proof. Please kindly refer to (Zhu et al. 2018).
lation of λ(cid:48)
With Theorem 3, we can directly derive the explicit formu-
A(cid:48) perturbed by ∆A on adjacent matrix A.
GF-Attack on Sampling-based Graph Embedding
Sampling-based graph embedding learns vertex representa-
tions according to sampled vertices, vertex sequences, or
network motifs. For instance, LINE (Tang et al. 2015) with
second order proximity intends to learn two graph represen-
tation matrices X(cid:48), Y (cid:48) by maximizing the NEG loss of the
skip-gram model:
L =
Ai,j
log σ(x(cid:48)T
i y(cid:48)
j)+bEj(cid:48)∼PN [log σ(−x(cid:48)T
i y(cid:48)
j)]
i, y(cid:48)
(10)
where x(cid:48)
i are rows of X(cid:48), Y (cid:48) respectively; σ is the sig-
moid function; b is the negative sampling parameter; PN
denotes the noise distribution generating negative samples.
Meanwhile, DeepWalk (Perozzi, Al-Rfou, and Skiena 2014)
adopts the similar loss function except that Ai,j is replaced
with an indicator function indicating whether vertices vi and
vj are sampled in the same sequence within given context
window size K.
From the perspective of sampling-based graph embed-
ding models, the embedded matrix is obtained by gener-
ating training corpus for the skip-gram model from adja-
cent matrix or a set of random walks. (Yang and Liu 2015;
Qiu et al. 2018) show that Point-wise Mutual Information
(PMI) matrices are implicitly factorized in sampling-based
embedding approaches. It indicates that LINE/DeepWalk can
be rewritten into a matrix factorization form:
Lemma 4. (Qiu et al. 2018) Given context window size K
and number of negative sampling b in skip-gram, the result of
DeepWalk in matrix form is equivalent to factorize matrix:
(D−1A)k)D−1(cid:17)
,
(11)
(cid:16) vol(G)
K(cid:88)
j Aij =(cid:80)
(cid:80)
(
k=1
bK
i
M = log
where vol(G) =(cid:80)
i Dii denotes the volume
of graph G. And LINE can be viewed as the special case of
DeepWalk with K = 1.
For proof of Lemma 4, please kindly refer to (Qiu et al.
2018). Inspired by this insight, we prove that LINE can be
viewed from a GSP manner as well:
(cid:17)
,
Note that LINE is formulated from an optimized unsuper-
vised NEG loss of skip-gram model. Thus, the parameter Θ
and value of the NCG loss have been fixed at the optimal
point of the model with given graph signals.
We can extend Theorem 5 to DeepWalk since LINE is a
1-window special case of DeepWalk:
Corollary 6. The output of K-window DeepWalk with b
negative samples is equivalent to filtering a set of graph
b In with given parameters Θ = vol(G)D−1.
K(cid:88)
signals X = 1
Equation (2) can be rewritten as:
X =
((cid:80)K
(In − Lrw)kD−1In, X(cid:48) = log(vol(G) X).
Proof of Theorem 5 and Corollary 6. With
4,
we can explicitly write DeepWalk as exp (M ) =
K (In − Lrw)kD−1In). Therefore, we
vol(G)
can directly have the explicit expression of Equation (2) on
LINE/DeepWalk.
Lemma
1
bK
k=1
k=1
1
b
K
2 AD 1
k=1 Λk
A
GF-Attack loss for LINE/DeepWalk. As stated in Corol-
lary 6, the graph-shift filter S of DeepWalk is defined as
Srw = In − Lrw = D−1A = D− 1
2 . Therefore,
graph filter H of the K-window DeepWalk can be de-
composed as H rw = 1
k=1(Srw)k, which satisfies
K
H rwD−1 = D− 1
2 U A( 1
Since multiplying D− 1
2 in GF-Attack loss brings extra
complexity, (Qiu et al. 2018) provides us a way to well ap-
proximate the perturbed λ(cid:48)
(cid:80)K
(cid:80)K
H rwD−1 without this term.
Inspired by (Qiu et al. 2018), we can find that both
the magnitude of eigenvalues and smallest eigenvalue of
H rwD−1 are always well bounded. Thus we can approxi-
mate λ(cid:48)
. Therefore, the
corresponding adversarial attack loss of Kth order DeepWalk
can be rewritten as:
λ(cid:48)
U A( 1
D− 1
2 .
(cid:80)K
k=1 Λk
A
)U T
A
)U T
A
dmin
K
H rwD−1 ≈ 1
n(cid:88)
1
λ(cid:48)k
A(cid:48),i
)2 ·
(cid:107)uT
A(cid:48),i
X(cid:107)2
2.
arg max
A(cid:48)
i=T +1
(
dmin
1
K
n(cid:88)
i=T +1
K(cid:88)
k=1
(12)
When K = 1, Equation (12) becomes the adversarial attack
loss of LINE. Similarly, Theorem 3 is utilized to estimate
λ(cid:48)
A(cid:48) in the loss of LINE/DeepWalk.
The Attack Algorithm
Now the general attack loss is established, the goal of our
adversarial attack is to misclassify a target vertex t from an
attributed graph G(V,E) given a downstream node classifi-
cation task. We start by defining the candidate flips then the
general attack loss is responsible for scoring the candidates.
We first adopt the hierarchical strategy in (Dai et al. 2018)
to decompose the single edge selection into two ends of this
Algorithm 1 Graph Filter Attack (GF-Attack) adversarial
attack algorithm under RBA setting
Input:
Adjacent Matrix A; feature matrix X; target vertex t;
number of top-T smallest singular values/vectors selected T ;
order of graph filter K; fixed budget β.
Perturbed adjacent Matrix A(cid:48).
Output:
1: Initial the candidate flips set as C = {(v, t)v (cid:54)= t}, eigenvalue
2: for (v, t) ∈ C do
Approximate Λ(cid:48)
A resulting by removing/inserting edge (v, t)
3:
via Equation (9);
Update Score(v,t) from loss Equation (8) or Equation (12);
decomposition of A = U AΛ AU T
A ;
4:
5: end for
6: Csel ← edge flips with top-β Score;
7: A(cid:48) ← A ± Csel;
8: return A(cid:48)
edge in practice. Then we let the candidate set C for edge
selection contains all vertices (edges and non-edges) directly
accessary to the target vertex, i.e. C = {(v, t)v (cid:54)= t}, as (Dai
et al. 2018; Bojchevski and Gunnemann 2019). Intuitively,
further away the vertices from target t, less influence they im-
pose on t. Meanwhile, experiments in (Zugner, Akbarnejad,
and Gunnemann 2018; Bojchevski and Gunnemann 2019)
also showed that they can do significantly more damage com-
pared to candidate flips chosen from other parts of graph.
Thus, our experiments are restricted on such choices.
Overall, for a given target vertex t, we establish the tar-
get attack by sequentially calculating the corresponding GF-
Attack loss w.r.t graph-shift filter S for each flip in candidate
set as scores. Then with a fixed budget β, the adversarial
attack is accomplished by selecting flips with top-β scores
as perturbations on the adjacent matrix A of clean graph.
Details of the GF-Attack adversarial attack algorithm under
RBA setting is in Algorithm 1.
Experiments
Datasets. We evaluate our approach on three real-world
datasets: Cora (McCallum et al. 2000), Citeseer and Pubmed
(Sen et al. 2008). In all three citation network datasets, ver-
tices are documents with corresponding bag-of-words fea-
tures and edges are citation links. The data preprocessing
settings are closely followed the benchmark setup in (Kipf
and Welling 2017). Only the largest connected component
(LCC) is considered to be consistent with (Zugner, Ak-
barnejad, and Gunnemann 2018). For statistical overview
of datasets, please kindly refer to (Zugner, Akbarnejad,
and Gunnemann 2018). Code and datasets are available at
https://github.com/SwiftieH/GFAttack.
Baselines. In current literatures, few of studies strictly
follow the restricted black-box attack setting. They utilize
the additional information to help construct the attackers,
such as labels (Zugner, Akbarnejad, and Gunnemann 2018),
gradients (Dai et al. 2018), etc.
Hence, we compare four baselines with the proposed at-
tacker under RBA setting as follows:
• Random (Dai et al. 2018): for each perturbation, randomly
choosing insertion or removing of an edge in graph G.
We report averages over 10 different seeds to alleviate the
influence of randomness.
• Degree (Tong et al. 2012): for each perturbation, inserting
or removing an edge based on degree centrality, which is
equivalent to the sum of degrees in original graph G.
• RL-S2V (Dai et al. 2018): a reinforcement learning based
attack method, which learns the generalizable attack policy
for GCN under RBA scenario.
• Aclass (Bojchevski and Gunnemann 2019): a matrix per-
turbation theory based black-box attack method designed
for DeepWalk. Then Aclass evaluates the targeted attacks
on node classification by learning a logistic regression.
Target Models. To validate the generalization ability of
our proposed attacker, we choose four popular graph embed-
ding models: GCN (Kipf and Welling 2017), SGC (Wu et
al. 2019), DeepWalk (Perozzi, Al-Rfou, and Skiena 2014)
and LINE (Tang et al. 2015) for evaluation. First two of
them are Graph Convolutional Networks and the others are
sampling-based graph embedding methods. For DeepWalk,
the hyperparameters are set to commonly used values: win-
dow size as 5, number of negative sampling in skip-gram
as 5 and top-128 largest singular values/vectors. A logistic
regression classifier is connected to the output embeddings of
sampling-based methods for classification. Unless otherwise
stated, all Graph Convolutional Networks contain two layers.
Attack Configuration. A small budget β is applied to
regulate all the attackers. To make this attacking task more
challenging, β is set to 1. Specifically, the attacker is limited
to only add/delete a single edge given a target vertex t. For our
method, we set the parameter T in our general attack model as
n−T = 128, which means that we choose the top-T smallest
eigenvalues for T -rank approximation in embedding quality
measure. Unless otherwise indicated, the order of graph filter
in GF-Attack model is set to K = 2. Following the setting
in (Zugner, Akbarnejad, and Gunnemann 2018), we split
the graph into labeled (20%) and unlabeled vertices (80%).
Further, the labeled vertices are splitted into equal parts for
training and validation. The labels and classifier is invisible to
the attacker due to the RBA setting. The attack performance
is evaluated by the decrease of node classification accuracy
following (Dai et al. 2018).
Attack Performance Evaluation
In the section, we evaluate the overall attack performance of
different attackers.
Attack on Graph Convolutional Networks. Table 1 sum-
maries the attack results of different attackers on Graph Con-
volutional Networks. Our GF-Attack attacker outperforms
other attackers on all datasets and all models. Moreover, GF-
Attack performs quite well on 2 layers GCN with nonlinear
activation. This implies the generalization ability of our at-
tacker on Graph Convolutional Networks.
Attack on Sampling-based Graph Embedding. Table 1
also summaries the attack results of different attackers on
sampling-based graph embedding models. As expected, our
attacker achieves the best performance nearly on all target
Cora
Citeseer
Pubmed
Table 1: Summary of the change in classification accuracy (in percent) compared to the clean/original graph. Single edge
perturbation under RBA setting. Lower is better.
Dataset
Models
(unattacked)
Random
Degree
RL-S2V
Aclass
GF-Attack
LINE GCN SGC DeepWalk
76.75
-1.84
-12.40
-10.38
-7.55
-13.27
LINE GCN SGC DeepWalk
65.15
-1.78
-12.55
-20.10
-10.28
-22.11
LINE
72.12
-1.01
-13.05
-13.21
-6.75
-14.16
GCN SGC DeepWalk
80.20
-1.90
-2.21
-5.20
-3.62
-7.60
78.82
-1.22
-4.42
-5.62
-2.96
-9.73
77.23
-1.76
-3.08
-5.24
-6.29
-5.31
69.68
-6.62
-9.67
-12.13
-12.56
-12.50
72.50
-2.86
-4.68
-6.50
-3.48
-7.78
78.69
-1.25
-2.43
-6.10
-3.05
-7.43
80.40
-1.75
-3.86
-6.40
-4.21
-7.96
80.21
-1.77
-4.44
-6.11
-2.25
-7.20
69.68
-1.47
-5.21
-4.08
-2.83
-6.19
Figure 2: Comparison between order K of GF-Attack and number of layers in GCN/SGC on Citeseer.
Table 2: Running time (s) comparison over all baseline meth-
ods on Citeseer. We report the 10 times average running time
of processing single node for each model.
Models
Citeseer
Random Degree RL-S2V Aclass GF-Attack
0.19
146.58
222.80
42.21
12.78
models. It validates the effectiveness of our method on at-
tacking sampling-based models.
Another interesting observation is that the attack perfor-
mance on LINE is much better than that on DeepWalk. This
result may due to the deterministic structure of LINE, while
the random sampling procedure in DeepWalk may help raise
the resistance to adversarial attack. Moreover, GF-Attack on
all graph filters successfully drop the classification accuracy
on both Graph Convolutional Networks and sampling-based
models, which again indicates the transferability of our gen-
eral model in practice.
Evaluation of Multi-layer GCNs
To further inspect the transferability of our attacker, we con-
duct attack towards multi-layer Graph Convolutional Net-
works w.r.t the order of graph filter in GF-Attack model.
Figure 2 presents the attacking results on 2, 3, 4 and 5 layers
GCN and SGC with different orders, and the number fol-
lowed by GF-Attack indicates the graph-shift filter order K
in general attack loss. From Figure 2, we can observe that:
first, the transferability of our general model is demonstrated,
since all graph-shift filters in loss with different order K
can perform the effective attack on all models. Interestingly,
GF-Attack-5 achieves the best attacking performance in most
cases. It implies that the higher order filter contains higher
order information and has positive effects on attack to sim-
pler models. Second, the attacking performance on SGC is
always better than GCN under all settings. We conjecture
that the non-linearity between layers in GCN successively
adding robustness to GCN.
Evaluation under Multi-edge Perturbation Settings
In this section, we evaluate the performance of attackers with
multi-edge perturbation, i.e. β ≥ 1. The results of multi-
edge perturbations on Cora under RBA setting are reported
in Figure 3 for demonstration. Clearly, with increasing of
the number of perturbed edges, the attacking performance
gets better for each attacker. Our attacker outperforms other
baselines on all cases. It validates that our general attacker
can still perform well when fixed budget β becomes larger.
(a) GCN
(b) SGC
Figure 3: Multiple-edge attack results on Cora under RBA
setting. Lower is better.
Computational Efficiency Analysis
In this section, we empirically evaluate the computational ef-
ficiency of our GF-Attack. The running time (s) comparison
GCNSGC406080Classification Accuracy (%)2 LayersunattackGF-Attack-2GF-Attack-3GF-Attack-4GF-Attack-5GCNSGC406080Classification Accuracy (%)3 LayersunattackGF-Attack-2GF-Attack-3GF-Attack-4GF-Attack-5GCNSGC406080Classification Accuracy (%)4 LayersunattackGF-Attack-2GF-Attack-3GF-Attack-4GF-Attack-5GCNSGC406080Classification Accuracy (%)5 LayersunattackGF-Attack-2GF-Attack-3GF-Attack-4GF-Attack-50123Number of Perturbed Edges607080Accuracy (%)Rand-GCNDegree-GCNRL-S2V-GCNclass-GCNGF-Attack-GCN0123Number of Perturbed Edges607080Accuracy (%)Rand-SGCDegree-SGCRL-S2V-SGCclass-SGCGF-Attack-SGCof 10 times average on Citeseer is demonstrated in Table 2.
While being less efficient than two native baselines (Random
and Degree), our GF-Attack is much faster than the devel-
oped methods RL-S2V and Aclass. Joining the performance
in Table 1, it reads that GF-Attack is not only effective in
performance but also efficient computationally.
Conclusion
In this paper, we consider the adversarial attack on different
kinds of graph embedding models under restrict black-box
attack scenario. From graph signal processing of view, we
try to formulate the graph embeddding method as a general
graph signal process with corresponding graph filter and con-
struct a restricted adversarial attacker which aims to attack
the graph filter only by the adjacency matrix and feature ma-
trix. Thereby, a general optimization problem is constructed
by measuring embedding quality and an effective algorithm
is derived accordingly to solve it. Experiments show the vul-
nerability of different kinds of graph embedding models to
our attack framework.
Acknowledgements
This work is supported by National Natural Science Foun-
dation of China Major Project No. U1611461 and National
Program on Key Basic Research Project No. 2015CB352300.
We would like to thank the anonymous reviewers for the
helpful comments. We also thank Daniel Zugner from Tech-
nical University of Munich for the valuable suggestions and
discussions.
References
Akhtar, N., and Mian, A. S. 2018. Threat of adversarial
attacks on deep learning in computer vision: A survey. IEEE
Access 6:14410 -- 14430.
Bojchevski, A., and Gunnemann, S. 2019. Adversarial at-
tacks on node embeddings via graph poisoning. In Interna-
tional Conference on Machine Learning, 695 -- 704.
Cui, P.; Wang, X.; Pei, J.; and Zhu, W. 2018. A survey on
network embedding. IEEE Transactions on Knowledge and
Data Engineering 31(5):833 -- 852.
Dai, H.; Li, H.; Tian, T.; Huang, X.; Wang, L.; Zhu, J.; and
Song, L. 2018. Adversarial attack on graph structured data.
international conference on machine learning 1115 -- 1124.
Defferrard, M.; Bresson, X.; and Vandergheynst, P. 2016.
Convolutional neural networks on graphs with fast localized
spectral filtering. neural information processing systems
3844 -- 3852.
Duvenaud, D. K.; Maclaurin, D.; Aguilera-Iparraguirre, J.;
G´omez-Bombarelli, R.; Hirzel, T.; Aspuru-Guzik, A.; and
Adams, R. P. 2015. Convolutional networks on graphs for
learning molecular fingerprints. neural information process-
ing systems 2224 -- 2232.
Hamilton, W. L.; Ying, Z.; and Leskovec, J. 2017. Inductive
representation learning on large graphs. neural information
processing systems 1024 -- 1034.
Kipf, T. N., and Welling, M. 2017. Semi-supervised clas-
sification with graph convolutional networks. international
conference on learning representations.
McCallum, A. K.; Nigam, K.; Rennie, J.; and Seymore, K.
2000. Automating the construction of internet portals with
machine learning. Information Retrieval 3(2):127 -- 163.
Nar, K.; Ocal, O.; Sastry, S. S.; and Ramchandran, K. 2019.
Cross-entropy loss and low-rank features have responsibility
for adversarial examples. arXiv preprint arXiv:1901.08360.
Ortega, A.; Frossard, P.; Kovacevi´c, J.; Moura, J. M.; and
Vandergheynst, P. 2018. Graph signal processing: Overview,
challenges, and applications. Proceedings of the IEEE
106(5):808 -- 828.
Paranjape, A.; Benson, A. R.; and Leskovec, J. 2017. Motifs
In Proceedings of the Tenth ACM
in temporal networks.
International Conference on Web Search and Data Mining,
601 -- 610.
Perozzi, B.; Al-Rfou, R.; and Skiena, S. 2014. Deepwalk: On-
line learning of social representations. In Proceedings of the
20th ACM SIGKDD international conference on Knowledge
discovery and data mining, 701 -- 710. ACM.
Qiu, J.; Dong, Y.; Ma, H.; Li, J.; Wang, K.; and Tang, J.
2018. Network embedding as matrix factorization: Unifying
deepwalk, line, pte, and node2vec. In Proceedings of the
Eleventh ACM International Conference on Web Search and
Data Mining, 459 -- 467.
Scarselli, F.; Gori, M.; Tsoi, A. C.; Hagenbuchner, M.; and
Monfardini, G. 2009. The graph neural network model. IEEE
Transactions on Neural Networks 20(1):61 -- 80.
Sen, P.; Namata, G. M.; Bilgic, M.; Getoor, L.; Gallagher, B.;
and Eliassi-Rad, T. 2008. Collective classification in network
data. Ai Magazine 29(3):93 -- 106.
Shuman, D. I.; Narang, S. K.; Frossard, P.; Ortega, A.; and
Vandergheynst, P. 2013. The emerging field of signal pro-
cessing on graphs: Extending high-dimensional data analysis
to networks and other irregular domains. IEEE Signal Pro-
cessing Magazine 30(3):83 -- 98.
Sun, L.; Wang, J.; Yu, P. S.; and Li, B. 2018. Adversarial
attack and defense on graph data: A survey. arXiv preprint
arXiv:1812.10528.
Tang, J.; Qu, M.; Wang, M.; Zhang, M.; Yan, J.; and Mei, Q.
2015. Line: Large-scale information network embedding. In
Proceedings of the 24th International Conference on World
Wide Web, 1067 -- 1077.
Tong, H.; Prakash, B. A.; Eliassi-Rad, T.; Faloutsos, M.; and
Faloutsos, C. 2012. Gelling, and melting, large graphs by
edge manipulation. In Proceedings of the 21st ACM inter-
national conference on Information and knowledge manage-
ment, 245 -- 254.
Tu, K.; Cui, P.; Wang, X.; Yu, P. S.; and Zhu, W. 2018. Deep
recursive network embedding with regular equivalence. In
Proceedings of the 24th ACM SIGKDD International Confer-
ence on Knowledge Discovery & Data Mining, 2357 -- 2366.
ACM.
Wu, F.; Zhang, T.; Souza Jr., A. H.; Fifty, C.; Yu, T.; and
Weinberger, K. Q. 2019. Simplifying graph convolutional
networks. In Proceedings of the 36th International Confer-
ence on Machine Learning (ICML).
Xu, K.; Hu, W.; Leskovec, J.; and Jegelka, S.
2018.
How powerful are graph neural networks. arXiv preprint
arXiv:1810.00826.
Xu, K.; Chen, H.; Liu, S.; Chen, P.-Y.; Weng, T.-W.; Hong,
M.; and Lin, X. 2019. Topology attack and defense for graph
neural networks: An optimization perspective. arXiv preprint
arXiv:1906.04214.
Yang, C., and Liu, Z. 2015. Comprehend deepwalk as matrix
factorization. arXiv preprint arXiv:1501.00358.
Yang, C.; Liu, Z.; Zhao, D.; Sun, M.; and Chang, E. 2015.
Network representation learning with rich text information.
In Twenty-Fourth International Joint Conference on Artificial
Intelligence.
Zhu, D.; Cui, P.; Zhang, Z.; Pei, J.; and Zhu, W. 2018. High-
order proximity preserved embedding for dynamic networks.
IEEE Transactions on Knowledge and Data Engineering
30:2134 -- 2144.
Zugner, D.; Akbarnejad, A.; and Gunnemann, S. 2018. Ad-
versarial attacks on neural networks for graph data. In Pro-
ceedings of the 24th ACM SIGKDD International Conference
on Knowledge Discovery & Data Mining, 2847 -- 2856.
Zugner, D., and Gunnemann, S. 2019. Adversarial attacks
on graph neural networks via meta learning. international
conference on learning representations.
|
1909.00440 | 2 | 1909 | 2019-09-19T12:28:39 | Can A User Anticipate What Her Followers Want? | [
"cs.SI",
"cs.LG",
"stat.ML"
] | Whenever a social media user decides to share a story, she is typically pleased to receive likes, comments, shares, or, more generally, feedback from her followers. As a result, she may feel compelled to use the feedback she receives to (re-)estimate her followers' preferences and decides which stories to share next to receive more (positive) feedback. Under which conditions can she succeed? In this work, we first look into this problem from a theoretical perspective and then provide a set of practical algorithms to identify and characterize such behavior in social media. More specifically, we address the above problem from the viewpoint of sequential decision making and utility maximization. For a wide variety of utility functions, we first show that, to succeed, a user needs to actively trade off exploitation-- sharing stories which lead to more (positive) feedback--and exploration-- sharing stories to learn about her followers' preferences. However, exploration is not necessary if a user utilizes the feedback her followers provide to other users in addition to the feedback she receives. Then, we develop a utility estimation framework for observation data, which relies on statistical hypothesis testing to determine whether a user utilizes the feedback she receives from each of her followers to decide what to post next. Experiments on synthetic data illustrate our theoretical findings and show that our estimation framework is able to accurately recover users' underlying utility functions. Experiments on several real datasets gathered from Twitter and Reddit reveal that up to 82% (43%) of the Twitter (Reddit) users in our datasets do use the feedback they receive to decide what to post next. | cs.SI | cs |
Can A User Anticipate What Her Followers Want?
Abir De, Adish Singla, Utkarsh Upadhyay, and Manuel Gomez-Rodriguez
Max Planck Institute for Software Systems,
{ade,adishs,utkarshu,manuelgr}@mpi-sws.org
Abstract
Whenever a social media user decides to share a story, she is typically pleased to receive likes, comments, shares,
or, more generally, feedback from her followers. As a result, she may feel compelled to use the feedback she receives
to (re-)estimate her followers' preferences and decide which stories to share next to receive more (positive) feedback.
Under which conditions can she succeed? In this work, we first look into this problem from a theoretical perspective
and then provide a set of practical algorithms to identify and characterize such behavior in social media.
More specifically, we address the above problem from the perspective of sequential decision making and utility
maximization. For a wide variety of utility functions, we first show that, to succeed, a user requires to actively trade
off exploitation -- sharing stories which lead to more (positive) feedback -- and exploration -- sharing stories to learn
about her followers' preferences. However, exploration is not necessary if a user utilizes the feedback her followers
provide to other users in addition to the feedback she receives. Then, we develop a utility estimation framework
for observation data, which relies on statistical hypothesis testing to determine whether a user utilizes the feedback
she receives from each of her followers to decide what to post next. Experiments on synthetic data illustrate our
theoretical findings and show that our estimation framework is able to accurately recover users' underlying utility
functions. Experiments on several real datasets gathered from Twitter and Reddit reveal that up to 82% (43%) of the
Twitter (Reddit) users in our datasets do use the feedback they receive to decide what to post next.
1 Introduction
Political parties, corporations, celebrities as well as ordinary people use social media to build, reach, and share stories
with their own audience. For example, political leaders share details about their activities in hopes of tapping new
voters [1], corporations offer insights about their latest products and services with potential customers [16], celebrities
give a glimpse of their lavish lifestyle to strengthen their fan base [2], and ordinary people share personal stories with
their friends [3]. In all these cases, social media users -- politicians, corporations, celebrities, or ordinary people --
receive feedback from their followers -- their voters, customers, fans, or friends -- by means of likes, comments, or
shares. Moreover, this feedback provides hints about the preferences of their followers: it lets the users know what does
or does not work, and it influences what they share next, as shown by an increasing number of empirical studies [21,
22, 17, 24, 15, 13, 11, 12, 19, 20]. In this context, it is perhaps surprising that feedback models of posting behavior
are largely nonexistent to date. However, such models are of outstanding interest since they would allow us to answer
two fundamental questions:
(i) Can a user succeed at maximizing the (positive) feedback she receives if, a priori, does not know her followers'
preferences?
(ii) Can we determine whether a user utilizes the feedback she receives from each of her followers to decide what to
post next using observational data?
By answering the above questions, we will not only advance our understanding of how feedback may influence
a user's posting behavior but will also facilitate the design of more effective algorithms for viral marketing and user
personalization.
1
1.1 Overview of our Approach
In this paper, we introduce a utility maximization feedback model of posting behavior, which is specially well-fitted to
investigate the above questions. More specifically, we assume that each user has an underlying (linear) utility function,
which assigns different weights to the feedback the user receives from each of her followers. Moreover, every time the
user shares a story with her followers, they provide their feedback according to a set of preferences. If the user knows
perfectly her followers' preferences, we can then show that the optimal posting strategy, which maximizes the user's
utility function, is deterministic. If the user does not know their preferences, we have the following theoretical results:
I. If the user estimates her followers' preferences from the feedback she receives over time, she needs to re-
sort to posting strategies that effectively trade-off exploitation -- sharing stories to maximize her utility -- and
exploration -- sharing stories to learn about her followers' preferences. More formally, we can show that poste-
rior sampling based posting strategies achieve logarithmic regret (i.e., O(log T )) while strategies based on point
estimates suffer from linear regret (i.e., Θ(T )) where T denotes the total time steps.
II. If the user can, in addition to the feedback she receives, also use the feedback her followers give to other users
to estimate her followers' preferences, she is better off using it. More specifically, we can show that posterior
sampling based posting strategies achieve constant regret (i.e., O(1)) and, perhaps surprisingly, strategies based
on point estimates achieve sublinear regret (i.e., o(T )).
In addition to the above theoretical analysis, we also develop a utility estimation framework, which relies on statistical
hypothesis testing to determine whether a user utilizes the feedback she receives from each of her followers to decide
what to post next. Finally, we perform a variety of experiments using both synthetic and real Twitter and Reddit data.
Experiments on synthetic data illustrate our theoretical findings and show that our utility estimation framework is
able to accurately recover the users' underlying utility functions. Experiments on several real datasets gathered from
Twitter and Reddit reveal that up to 82% (43%) of the Twitter (Reddit) users in our datasets do use the feedback they
receive to decide what to post next.
1.2 Related Work
In addition to the empirical studies on how feedback influences user behavior, discussed previously, our work also
relates to revealed preference theory, smart broadcasting, and multi-armed bandits.
Revealed preference theory. Since the pioneering work by Samuelson [29], reveal preference theory has become
a well-established economic theory that analyzes choices made by individuals, particularly to understand consumer
behavior. It typically assumes that each consumer decides to buy a bundle of goods, among several alternatives, on the
basis of a (concave) nondecreasing utility function [26, 27, 4]. The works most closely related to ours [10, 32, 18, 9, 7]
aim to develop efficient algorithms to estimate utility functions from revealed preference data as well as analyze their
sample complexity. However, their problem setting is very different from ours: (i) the utility a consumer obtains from
buying a bundle of goods is deterministic, however, the feedback a social media user receives from her followers varies
randomly and, thus, the utility a user obtains from sharing a story is stochastic; (ii) a consumer can evaluate the utility
of a bundle of goods exactly, however, a social media user needs to guess the utility she will obtain from sharing a
story on the basis of an estimation of her followers' preferences from the feedback she received in the past; and, (iii)
each consumer's decision is independent, however, each social media user's decision is part of a sequential decision
making process.
Smart broadcasting. In recent years, there has been some work on smart broadcasting [30, 34, 25, 33], which aims
to find the times when a user should post to receive more views, likes, comments, or shares from her followers. In
smart broadcasting, there is also a user who aims to maximize the impact of the stories she shares, however, the focus
is on when to share while our focus is on what to share. In addition, algorithms for smart broadcasting are based
on temporal point processes and stochastic optimal control, while we resort to online learning techniques and convex
optimization.
Multi-armed bandits. The proof techniques used for deriving regret bounds in bandit problems [5, 8, 23, 6] are
related to the ones we use to derive the regret bounds in our work. However, there are several key differences: (i)
we allow a user to utilize the feedback her followers provide to other users to estimate her followers' preferences,
whereas, in a traditional bandit setting, a user could only utilize the feedback she receives on the stories she shares; (ii)
2
our proof techniques allow for users with several followers, in contrast, in a traditional bandit setting, it would only
allow for users with one follower.
2 Feedback model of posting behavior
In this section, we introduce our feedback model of posting behavior, starting from the problem setting it is designed
for.
2.1 Problem Setting
Let u be a social media user and N (u) be her set of followers. Then, at each time t ∈ {1, . . . , T}, the user shares a
story from a topic ct ∈ C, with C = K, and each of her followers decides whether to give (or not to give) feedback.1
Moreover, for each follower v ∈ N (u), we denote the feedback she gave (or did not give) to user u and, possibly, to
any other user in the social media platform2, up to time t − 1 by
Hv(t) = {(c, l(c)) the story was posted before t},
where c denotes the topic of the story, l(c) = 1 means that she gave feedback to the story and l(c) = 0 otherwise. We
denote the collection of feedback from followers N (u) as H(t) = (Hv(t))v∈N (u).
At time t ∈ {1, . . . , T}, we assume that the user u samples the topic c of the story she shares from a categorical
distribution ct ∼ p(cH(t)), which may depend on the history of her followers' feedback. Also, given a topic c, each
follower v gives feedback with conditional probability pv(l(c) = 1c) = qcv, where we can think of qcv as follower
v's preference for topic c. Here, we assume that, in general, followers may differ in their preferences, i.e., qcv (cid:54)= qcv(cid:48)
for v (cid:54)= v(cid:48). Moreover, we denote qc = (qcv)v∈N (u) and Q = (qcv)c∈C,v∈N (u).
2.2 Utility Maximization Feedback Model
We assume that user u aims to find (and utilize) the categorical distribution p∗(cH(t)) that maximizes a (linear) utility
function UTIL(T ), defined as
UTIL(T ) = E(cid:88)t∈[T ]
(cid:88)v∈N (u)
avlv(ct) + auxct
where the expectation is over the topics ct ∼ p∗(cH(t)) of the stories the user shares and the feedback lv(ct) ∼
Bernoulli(qctv). The weights av ≥ 0 model the importance that user u gives to the feedback she receives from
follower v, the parameters 0 ≤ xct ≤ 1 encode user u's preference for topic ct, the weight au ≥ 0 models the
importance she gives to her own preferences, and we assume that(cid:80)v∈N (u) av + au = 1. In the above utility function,
the greater the importance av user u gives to the feedback she receives from a specific follower v, the greater the utility
gain she will obtain from posting a story from a topic that follower v prefers. Similarly, the greater the importance
au she gives to her own preferences x = (xc)c∈C, the greater the utility gain she will obtain from just posting a story
from a topic she prefers.
Next, using the linearity of expectation and the law of iterated expectation, we can rewrite Eq. 1 as follows:
(1)
(2)
UTIL(T ) = (cid:88)t∈[T ] (cid:88)v∈N (u)
= (cid:88)t∈[T ] (cid:88)v∈N (u)
= (cid:88)t∈[T ](cid:88)c∈C
Ect∼p∗(cid:2)Elv(ct)ct [avlv(ct) + auxct](cid:3)
Ect∼p∗ [avqctv + auxct]
p∗(cH(t))(cid:0)a†qc + auxc(cid:1)
1For simplicity, we assume that receiving feedback is always positive, e.g., we assume that receiving a like is always positive. Our formulation
can be easily adapted to scenarios with positive and negative feedback, e.g., upvotes and downvotes.
2We will study two scenarios: (i) the user has access only to the feedback she has received; and (ii) the user has access to the feedback she has
received as well as the feedback her followers have given to other users.
3
Finally, we can formally state the utility maximization problem user u aims to solve as:
where a = (av)v∈N (u) and † denotes the transpose operator.
p(cH(t)) (cid:88)t∈[T ](cid:88)c∈C
subject to 0 ≤ p(cH(t)) ≤ 1 ∀c ∈ C,
p(cH(t))(cid:0)a†qc + auxc(cid:1)
maximize
(cid:88)c∈C
p(cH(t)) = 1,
(3)
where the followers' preferences Q = (qc)c∈C are generally unknown.
3 Solving the utility maximization problem
In this section, we develop an efficient algorithm to solve the utility maximization problem defined by Eq. 3 and study
its theoretical guarantees in a variety of settings.
3.1 Known Preferences
As a warm up, we first assume that the user u knows her followers' preferences Q. In this setting, it readily follows
that the optimal distribution p∗(cH(t)) that maximizes Eq. 3 does not depend on the feedback history and is given by
(4)
p∗(cH(t)) = p∗(c) = I(cid:20)c = argmax
c(cid:48)
(cid:0)a†qc(cid:48) + auxc(cid:48))(cid:1)(cid:21) ,
where I(·) denotes the indicator function. In this case, note that the optimal mechanism for maximizing utility is
deterministic (assuming ties over different topics are broken in a predetermined way).
3.2 Unknown Preferences: Exploration Exploitation Trade-off
In this section, we consider a more realistic setting where the user u does not know the preferences Q. For this setting,
we assume that the user can access historical feedback data to estimate these unknown preferences. When user u does
not know her followers' preferences, she needs to trade off exploitation, i.e., maximizing utility, and exploration, i.e.,
learning about her followers' preferences Q from historical feedback data.
To this aim, for every topic c ∈ C and follower v ∈ N (u), we assume a Beta prior over the preference parameter
qcv ∼ Beta(α, β). Under this assumption, at each time t, we can use Hv(t) to update the distribution of parameter
qcv(t) as:
(5)
p(qcv(t)Hv(t)) = Beta(α + ncv(t), β + ¯ncv(t)),
where
ncv(t) = {(c(cid:48), l(c(cid:48))) ∈ Hv(t) l(c(cid:48)) = 1, c(cid:48) = c},
¯ncv(t) = {(c(cid:48), l(c(cid:48))) ∈ Hv(t) l(c(cid:48)) = 0, c(cid:48) = c}.
Then, at the beginning of time t, we can estimate the value of each preference parameter qcv(t) in the following
two ways:
I. using point estimates, i.e.,
qcv(t) = argmax p(qcv(t)Hv(t)) =
α + ncv(t) − 1
α + β + ncv(t) + ¯ncv(t) − 2
,
II. via sampling from posterior, i.e.,
qcv(t) ∼ p(qcv(t)Hv(t)).
4
(6)
(7)
Algorithm 1: Utility maximization for unknown preferences
1: Input: Prior parameters α, β.
2: Output: Category {ct}t∈[T ].
3: for v ∈ N (u) do
4: Hv(t) ← ∅;
5: for t ∈ {1, . . . , T} do
6:
7:
8:
9:
10:
11:
12:
ct = argmaxc(cid:48)(cid:0)(cid:80)v∈N (u) av qc(cid:48)v(t) + auxc(cid:48)(cid:1);
SHARE(ct);
/* Gather feedback from u's followers */
for v ∈ N (u) do
Hv(t + 1) ← Hv(t) ∪ GATHERFEEDBACK(v);
for c ∈ C do
qcv(t + 1) = ESTIMATE(α, β, c,Hv(t + 1));
Given these estimates, we select what to share next using an empirical approximation to Eq. 4, i.e.,
p(cH(t)) = I(cid:20)c = argmax
c(cid:48)
(cid:0)a† qc(cid:48)(t) + auxc(cid:48))(cid:1)(cid:21) .
(8)
where qc(cid:48)(t) = (qc(cid:48)v(t))v∈N (u). Algorithm 1 summarizes the complete procedure. Within the algorithm, SHARE
shares a story from a given topic ct, GATHERFEEDBACK gathers the feedback from a follower v, and ESTIMATE
returns an estimate of the preferences parameters using either point estimates or posterior samples.
3.3 Unknown Preferences: Analysis
In this section, we analyze the theoretical guarantees of Algorithm 1 in terms of regret R(T ), which we define as
follows:
(9)
where UTIL(T ) is the utility achieved by Algorithm 1 and UTIL∗(T ) is the utility achieved by the optimal categorical
distribution p∗, given by Eq. 4, under the true preference parameters qcv. Note that an algorithm is called a no-regret
algorithm if the regret grows sublinearly (i.e., o(T )) which implies that the algorithm's average performance converges
to that of the optimal algorithm.
R(T ) = UTIL(T ) − UTIL∗(T ),
Note that the utility UTIL(T ) depends on the quality of the estimates qcv(t), which in turn depend on (i) the
estimation method (i.e., point estimates vs posterior samples) and (ii) whether each follower's feedback history Hv(t)
only contains the feedback the follower gives to user u or it also contains the feedback she gives to others. Next, we
study several cases separately.
3.3.1 Point estimates
If the user only has access to the feedback she receives from her followers, we have the following negative result
(proven in Appendix 8.1):
Theorem 1. Assume user u uses point estimates qcv(t) and she can only access the feedback she receives from her
followers. Then, Algorithm 1 suffers linear regret Θ(T ).
Perhaps surprisingly, Algorithm 1 with point estimates can actually achieve sublinear regret O(√T ) if the user
has access to both the feedback her followers give to her as well as to others, as formalized by the following theorem
(proven in Appendix 8.2):
Theorem 2. Assume user u uses point estimates for the followers' preferences qcv(t) and she can access both the
feedback her followers give to her as well as to others. Furthermore, the amount of feedback each of her followers v
5
give to others per topic c follows a Poisson distribution with rate µcv > 0, and let d = α + β. Then, for 2 ≤ d < 3,
Algorithm 1 achieves regret
and, for d ≥ 3, it achieves:
O (cid:88)c∈C,v∈N (u)
O (cid:88)c∈C,v∈N (u)
2(cid:112)(d − 2)µcv
√T − 1√1 − e−µcv(T−1)
,
2(cid:112)(T − 1)µcvt + d − 3 + √d − 3
T − 1
Here, note that, whenever her followers do not give feedback to others in at least one topic, i.e.,(cid:80)v∈N (u) µcv = 0
for some c ∈ C, Algorithm 1 will suffer linear regret, which is in agreement with Theorem 1.
3.3.2 Posterior samples
If the user uses posterior samples, she is better off. In this case, Algorithm 1 achieves sublinear regret independently
on whether Hv(t) contains only the feedback she receives or also the feedback her followers give to others. More
formally, we have the following Theorem and Corollary (proven in Appendix 8.2):
Theorem 3. Assume user u uses posterior samples to estimate the followers' preferences qcv(t), she can access both
the feedback her followers give to her as well as to others, and the amount of feedback each of her followers v give to
others per topic c follows a Poisson distribution with rate µcv > 0. Then, Algorithm 1 has regret
Olog1 + (cid:88)v∈N (u)
1 − exp(−µcvθmT )
µcvθm
,
where θm depends on the parameters Q in non-trivial way.
Corollary 4. Assume user u uses posterior samples to estimate the followers' preferences qcv(t) and she can only
access the feedback she receives from her followers. Then, Algorithm 1 has regret O(log T ).
In summary, if user u uses posterior samples instead of point estimates, she can effectively trade off exploitation --
sharing stories for maximizing her utility -- and exploration -- sharing stories to estimate her followers' preferences.
Moreover, if she has access to the feedback that her neighbors provide to others, she is better off using it. Such
additional information helps her to maximize her utility more effectively in both cases -- posterior samples and point
estimates.
4 Utility estimation framework
In this section, assume we observe both the stories user u shared at each time t ∈ {1, . . . , T} and the feedback she
received from her followers. Then, our goal is to determine whether the user utilizes the feedback she receives from
each of her followers to decide what to post next. To this aim, we first find the model parameters that best fit the
observed data and then determine its statistical significance using statistical hypothesis testing.
4.1 Parameter estimation
To find the weights (av)v∈N (u) and au and parameters (xc)c∈C in Eq. 3 that best fit the observed data, one could resort
to maximum likelihood estimation, i.e.,
maximize
log p∗(ctH(t))
a,au,x (cid:88)t∈[T ]
subject to au ≥ 0, av ≥ 0 ∀v ∈ N (u)
(cid:88)v∈N (u)
av + au = 1
0 ≤ xc ≤ 1,∀c ∈ C.
6
(10)
where p∗(cH(t)) implicitly depends on (av)v∈N (u) and au since it is the distribution that maximizes the utility
function.
However, the above maximum likelihood estimation problem faces two serious challenges. First, it is stated in
terms of either the optimal distribution p∗(cH(t)) or, in practice, p(cH(t)). However, both distributions concentrate
their entire probability mass in one topic. As a consequence, if there exists a time t ∈ {1, . . . , T} in which user u shares
a story from a topic that is not the optimal one to choose, the log-likelihood p∗(cH(t)) (or log p(cH(t))) becomes
unbounded. Fortunately, we can overcome this undesirable behavior by approximating the distribution p∗(cH(t)) (or
p(cH(t))) using a softmax distribution
pλ(cH(t)) =
(cid:80)c(cid:48)∈C
exp(λ(a†qc(t) + auxc))
exp(λ(a†qc(cid:48)(t) + auxc(cid:48)))
where λ is a given parameter and qc(t) = qc or qc(t) = qc(t). Second, if the number of feedback events is large, the
above maximum likelihood estimation problem is not scalable. To ameliorate this second challenge, in the following,
we present a highly efficient heuristic based on linear loss minimization.
Our starting point is the following intuition: at each time t ∈ {1, . . . , T}, if user u is sampling the topic of the
story she shares from a distribution that is close to p(cH(t)), then the difference between the optimal topic and the
observed topic, i.e.,
(12)
max
c(cid:48)∈C(cid:0)a†qc(cid:48)(t) + auxju(cid:1) − (a†qct(t) + auxct)
should be small. Therefore, our heuristic finds the weights a and au and the parameters x that minimizes this differ-
ence over time. In practice, the solution to the above problem depends on whether we assume that the user utilized
point estimates or posterior samples for the followers' preferences. Therefore, we proceed in turn.
4.1.1 Point estimates
If we assume that the user utilized point estimates qcv(t) for her followers' preferences, then we minimize:
(cid:88)t∈[T ]
max
c(cid:48)∈C(cid:0)a† qc(cid:48)(t) + auxju(cid:1) − (a† qct(t) + auxct)
However, the optimization problem is not convex due to the terms auxc and, in its current form, it is difficult to solve
efficiently. Fortunately, an invertible nonlinear transformation of the variables transforms it into a convex problem.
Let zc = auxc and z = (zc)c∈C. Then, we can rewrite the optimization problem as:
(11)
(13)
c(cid:48)∈C(cid:0)a† qc(cid:48)(t) + zc(cid:48)(cid:1) −(cid:0)a† qct(t) + zct(cid:1)(cid:21) ,
minimize
a,au,z (cid:88)t∈[T ](cid:20)max
(cid:88)v∈N (u)
subject to au ≥ 0, av ≥ 0 ∀v ∈ N (u)
av + au = 1
0 ≤ zc ≤ au,∀c ∈ C.
which is a convex problem jointly in a, au, and z using composition rules and the fact that the log-exp function is
convex. Once we solve this convex problem, we can recover xc as xc = zc/au.
4.1.2 Posterior samples
If we assume that the user utilized posterior samples qcv(t) for her followers' preferences, then, we need to take the
average of the objective function with respect to the posterior distributions of the followers' preferences for all topics,
since we do not know which sample the user actually took, i.e., the objective function becomes
(cid:88)t∈[T ]
E q(t),t∈[T ](cid:20)max
c(cid:48)∈C(cid:0)a† qc(cid:48)(t) + auxju(cid:1) − (a† qct(t) + auxct )(cid:21) ,
7
where qcv(t) ∼ p(qcv(t)Hv(t)) for all c ∈ C and v ∈ N (u). In practice, we just replace the above objective function
by the empirical average with respect to the followers' preferences, i.e.,
(cid:88)t∈[T ]
S(cid:88)s=1(cid:20)max
c(cid:48)∈C(cid:16)a† q(s)
c(cid:48) (t) + zc(cid:48)(cid:17) −(cid:16)a† q(s)
ct (t) + zct(cid:17)(cid:21) ,
where q(s)
cv (t) ∼ p(qcv(t)Hv(t)) for all c ∈ C and v ∈ N (u) and S is the number of samples.
4.2 Statistical Hypothesis Testing
Given an estimation of the model parameters, we determine their statistical significance using statistical hypothesis
testing. More specifically, we proceed as follows.
Under the null hypothesis H0, the user does not utilize the feedback she receives from her followers to decide what
to post next, i.e., av = 0 for all v ∈ N (u), and, under the alternative hypothesis, the user does utilize it, i.e., av ≥ 0 for
all v ∈ N (u). Then, for each user u, we use the log-likelihood ratio (LLR) as a test statistic to measure the statistical
power of the feedback data, i.e.,
LLR(u) = (cid:88)t∈[Tu]
log pλ,a≥0(ctH(t)) − (cid:88)t∈[Tu]
log pλ,a=0(ctH(t)),
where Tu is the total number of posts shared by user u. Finally, we assess the statistical significance of the LLR
values using the theoretical distribution of the LLR under the null hypothesis, i.e., χ2
1(N (v) − 1), given by Wilks'
theorem [31], where a high value of LLR allows us to reject the null hypothesis with high probability (low p-value).
5 Experiments on synthetic data
In this section, we experiment with synthetic data to: (i) illustrate the theoretical properties of Algorithm 1, discussed
in Section 3; and (ii) show that our utility estimation framework, discussed in Section 4, can be used to accurately
estimate a user's utility from historical data.
Experimental setup. We assume that the user u under study has N (u) = 10 followers. Then, we sample her weights
av ∼ Dir(γ) and au ∼ Dir(γ) with γ = 0.8, the preferences of her followers qcv ∼ Beta(0.4, 0.6), and her own
preferences xc ∼ Beta(0.4, 0.6). The number of topics C = K and rates µcv vary for different experiments and thus
are specified therein.
Regret analysis. First, we consider the case when u estimates her followers' preferences only on the basis of the
feedback her stories receive from her followers. To that aim, we fix µcv = 0 for all c ∈ C and v ∈ N (u), and simulate
data from our feedback model of posting behavior for different number of topics C = K. Then, we investigate the
variation of the regret over time. Figure 1 summarizes the results which show that: (i) point estimates suffer linear
regret whereas, posterior samples achieve logarithmic regret, thereby supporting our theoretical findings in Theorem 1
and Corollary 4; and, (ii) as the number of topics increases, the number of unknown preferences increases, and as a
result, the regret increases.
Next, we consider the case when u additionally utilizes the feedback her followers give to others. To that aim, we
set K = 10, sample µcv ∼ Unif[0, 2¯µ] and simulate our model on user u for different value of ¯µ. Figure 2 summarizes
the results which show that: (i) the additional information (i.e., the feedback to others) significantly reduces the
regret -- even point estimates achieve a regret of O(√T ), and moreover, posterior samples achieve a constant regret
(i.e., O(1)), thereby supporting Theorem 2 and Theorem 3; and, (ii) as ¯µ increases, u estimates their followers'
preferences on the basis of a larger amount of feedback and, as a result, the regret decreases.
Model estimation. To investigate the performance of our utility estimation framework, we first generate H(T ) by
simulating data from our model with K = 10 and sample µcv ∼ Unif[0, 2¯µ]. Then, we train our model using the
generated H(T ), for different T and ¯µ values using our two estimation methods from Section 4. Finally, we evaluate
the accuracy of model estimation procedures in terms of root mean square error (RMSE) between the estimated and
8
(a) qcv(t) are point estimates
(b) qcv(t) are posterior samples
Figure 1: Regret analysis when user u only leverages the feedback she receives, i.e., µcv = 0. Panel (a) shows that, if
she uses point estimates for her followers' preferences, Algorithm 1 suffers linear regret. Panel (b) shows that, if she
uses posterior sampling, it achieves logarithmic regret. In both panels, as the number of topics K increases, the regret
increases.
(a) qcv(t) are point estimates
(b) qcv(t) are posterior samples
Figure 2: Regret analysis when user u levegares the feedback she receives as well as the feedback her followers give to
others, i.e., µcv > 0. Panel (a) shows that, if she point estimates for her followers' preferences, Algorithm 1 achieves
sublinear regret O(√T ). Panel (b) shows that, if she uses posterior sampling, it achieves constant regret O(1). In both
panels, as the average rate of feedback to others µcv increases, the regret decreases.
true parameters, i.e.,
RM SE =(cid:112)E(a − a2) + E(au − au2) + E(xu −(cid:98)xu2).
Figure 3 summarizes the results the method based on linear loss minimization, which show that, (i) as T increases and
we feed more training samples into the estimation procedure, the accuracy increases; (ii) similarly, as ¯µ increases and
we feed more feedback into the estimation procedure, the accuracy increases; and, (iii) the estimation accuracy for
posterior samples is significantly better than for point estimates;
6 Experiments on real data
In this section, we apply our utility estimation algorithms to several real datasets gathered from Twitter and Reddit and
then, using the utility estimation framework described in Section 4, show that 53% − 82% of the users in the Twitter
datasets and 28%− 43% of the users in the Reddit datasets use the feedback they receive from their followers to decide
what to post next.
Data description and experimental setup. We collect Twitter and Reddit data for evaluating our utility estimation
methods.
-- Twitter: We used data gathered from Twitter as reported in previous work [14], which comprises the profiles
of 52 million users, 1.9 billion directed follow links among them, and 1.7 billion public tweets posted by these users,
where the underlying link information is based on a snapshot taken at the time of data collection, in September 2009.
Here, we focused on the tweets published during a two month period, from July 1, 2009 to September 26, 2009, which
allows us to consider the set of followers of a user to be approximately static.
In our experiments, a follower v provides feedback to a tweet published by a user u ∈ V if she retweets it3 and
each topic c ∈ C corresponds to the most common4 hashtag a tweet contains. Moreover, using manual inspection, we
3Since back in 2009, Twitter did not have a retweet button, we consider a Jaccard similarity > 80% between tokens contained in two tweets to decide if the latter is
a retweet of former.
4In case a tweet contains more than one hashtag, we consider the hashtag that is more common across our dataset.
9
EHT(R(T))T→T−→K=10K=15K=20K=250.10.20.30.40.510203040503.5EHT(R(T))logT→T−→K=10K=15K=20K=250.51.52.5232040608010001EHT(R(T))√T→T−→¯µ=1¯µ=2¯µ=3¯µ=40.10.20.30.40.50.6102030405003.5EHT(R(T))→T−→¯µ=1¯µ=2¯µ=3¯µ=40.51.52.523102030405001(a) qcv are point estimates
(b) qcv are posterior samples
Figure 3: Performance of our utility estimation method based on linear loss minimization in terms of RM SE =
(cid:112)E(a − a2) + E(au − au2) + E(xu −(cid:98)xu2) as T increase. The performance is significantly better when-
ever the user leverages posterior samples for her followers' preferences.
(a) Brazil
(b) TOT
(c) Iran
(d) Leisure
Figure 4: Log-likelihood ratio (LLR) values for all users in the three Twitter (first row) and Reddit (second) datasets.
The horizontal red line shows the minimum LLR value to achieve statistical significance at p = 10−8. The results
indicate that we can reject the hypothesis that users do not utilize the feedback they receive from their followers for
53%, 64% and 82% (28%, 42% and 43%) of the users, respectively for Twitter and Reddit datasets.
(e) Sports
(f) Learning
tracked down the hashtags used in three different themes to create three datasets:
-- Brazil: Brazil elections which took place in latter 2010, where C = 4, V = 88 and E[T ] = 166.
-- TOT: Top US conservatives and liberals on Twitter, where C = 11, V = 45 and E[T ] = 189.
-- Iran: Iran presidential elections in 2009, where C = 5, V = 45 and E[T ] = 395.
In each of the above datasets, we filtered out hashtags c that were used less than 500 times and users u who posted less
than four tweets with at least two of these hashtags or whose tweets were not retweeted more than four times by at least
2 followers. Moreover, for each of user u ∈ V, we tracked down the five followers who retweeted her tweets more
frequently and, for each these followers, we reconstructed the feedback they provided to her and others by collecting
all their retweets as well as the tweets posted by all the users they follow.
-- Reddit: We used publicly available data gathered from Reddit5, which comprises the profiles of 5 million users
and 226 million comments posted by these users in the month of May, 2015. In our experiments, a user v provides
feedback to a message published by a user u if she replied to it and each topic c ∈ C corresponds to the subreddit in
which a comment was written. Here, we tracked down the subreddits in three different themes to create three datasets:
-- Leisure: r/funny, r/pics and r/WTF, where C = 3, V = 3, 540 and E[T ] = 126.
-- Sports: r/CFB, r/nba and r/nfl, where C = 3, V = 989 and E[T ] = 309.
5https://archive.org/details/2015 reddit comments corpus
10
0.040.050.060.07RMSE(bababa,bxbxbxu)→T−→¯µ=1¯µ=2¯µ=31204060801000.040.050.060.07T−→¯µ=1¯µ=2¯µ=3120406080100LLR=24.53,p=10−8←−−−−−53%users−−−−−−−→User-ID→LLR→0102030405050607080100150200250300350LLR=35.36,p=10−8←−−−−−−−−64%users−−−−−−−−−→User-ID→LLR→051015202530354045100200300400500600700LLR=21.92,p=10−8←−−−82%users−−−−−−−−−−−−−−−−−−−−→User-ID→LLR→051015202530354045100200300400500600700LLR=21.52,p=10−8←−28%users−→User-ID→LLR→01002003004005005006007001000150020002500300035003538LLR=21.57,p=10−8←−−−42%users−−−→User-ID→LLR→010020030040050060070080090010001200LLR=21.54,p=10−8←−−−43%users−−−−→User-ID→LLR→0500500100010001500150020002000250025003000300035003538 -- Learning: r/AdviceAnimals, r/TodayILearned, r/AskReddit and
r/worldnews, where C = 4, V = 3, 505 and E[T ] = 218.
In each of the above datasets, we only considered users V who have made at least 20 top-level comments in at least
2 distinct categories c ∈ C. Moreover, for these users u ∈ V, we tracked down the five users who have replied to
their comments more frequently and consider them to be the neighbors of u. Finally, for each of these followers, we
reconstructed the feedback they provided to u and others by collecting all their replies as well as the comments posted
by all their neighbors.
Results. We determined whether each user in each of the six datasets utilizes the feedback she receives from each
of her followers to decide what to post next using the utility estimation framework described in Section 4. Figure 4
summarizes the results, which show that, at p-value p = 10−8, we can reject the hypothesis that users do not utilize
the feedback they receive from their followers for 53%, 64%, 82% of the users in the Twitter datasets and for 28%,
42%, 43% of the users in the Reddit datasets.
7 Conclusions
In this paper, we introduced a feedback model of posting behavior in social media. The model allowed us: (i) to
investigate under which conditions can a user succeed at maximizing the (positive) feedback she receives; and, (ii)
to determine whether a user utilizes the feedback she receives from each of her followers to decide what to post next
using observational data. Moreover, we performed experiments on synthetic and real data gathered from Twitter and
Reddit to illustrate our theoretical findings, show that our estimation methods are able to accurately recover users'
underlying utility functions, and provide empirical evidence that 53% − 82% of the users in the Twitter datasets and
28% − 43% of the users in the Reddit datasets use the feedback they receive from their followers to decide what to
post next.
There are many interesting venues for future work. For example, we have assumed that the followers' preferences
are not influenced by the users' posting behavior. It would be interesting to analyze a scenario in which both users and
the followers influence each other. We have considered a simple linear utility function, a natural next step would be
considering more complex utility functions with higher predictive power. Finally, it would be very interesting to apply
our utility estimation methods to real data from other social media platforms, e.g., Facebook.
References
[1] Efforts to attract the youth vote continue as election day approaches. https://dailyiowan.com/2018/10/09/efforts-to-attract-
the-youth-vote-continue-as-election-day-approaches/. Accessed: 2018-10-30.
[2] What celebrities can teach companies about social media. https://www.wsj.com/articles/what-celebrities-can-teach-
companies-about-social-media-1444788220. Accessed: 2018-10-30.
[3] Why do some of your friends get more likes than others? https://www.huffingtonpost.com/simone-collins/why-do-some-
of-your-friends-get-likes b 6800102.html.
[4] S. N. Afriat. The construction of utility functions from expenditure data. International economic review, 8(1):67 -- 77, 1967.
[5] S. Agrawal and N. Goyal. Further optimal regret bounds for thompson sampling. In Artificial Intelligence and Statistics,
pages 99 -- 107, 2013.
[6] S. Agrawal and N. Goyal. Thompson sampling for contextual bandits with linear payoffs. In International Conference on
Machine Learning, pages 127 -- 135, 2013.
[7] A. Aprem and V. Krishnamurthy. Utility change point detection in online social media: A revealed preference framework.
IEEE Transactions on Signal Processing., 65(7):1869 -- 1880, 2017.
[8] P. Auer and R. Ortner. Logarithmic online regret bounds for undiscounted reinforcement learning. In Advances in Neural
Information Processing Systems, pages 49 -- 56, 2007.
[9] M.-F. Balcan, A. Daniely, R. Mehta, R. Urner, and V. V. Vazirani. Learning economic parameters from revealed preferences.
In International Conference on Web and Internet Economics, pages 338 -- 353. Springer, 2014.
[10] E. Beigman and R. Vohra. Learning from revealed preference. In Proceedings of the 7th ACM Conference on Electronic
Commerce, pages 36 -- 42. ACM, 2006.
11
[11] M. Burke and R. Kraut. Using facebook after losing a job: Differential benefits of strong and weak ties. In Proceedings of
the 2013 conference on Computer supported cooperative work, pages 1419 -- 1430. ACM, 2013.
[12] M. Burke and R. E. Kraut. Growing closer on facebook: changes in tie strength through social network site use. In Proceedings
of the SIGCHI conference on human factors in computing systems, pages 4187 -- 4196. ACM, 2014.
[13] M. Burke, C. Marlow, and T. Lento. Social network activity and social well-being. In Proceedings of the SIGCHI conference
on human factors in computing systems, pages 1909 -- 1912. ACM, 2010.
[14] M. Cha, H. Haddadi, F. Benevenuto, P. K. Gummadi, et al. Measuring user influence in twitter: The million follower fallacy.
Icwsm, 10(10-17):30, 2010.
[15] J. Cheng, C. Danescu-Niculescu-Mizil, and J. Leskovec. How community feedback shapes user behavior. arXiv preprint
arXiv:1405.1429, 2014.
[16] L. De Vries, S. Gensler, and P. S. Leeflang. Popularity of brand posts on brand fan pages: An investigation of the effects of
social media marketing. Journal of interactive marketing, 26(2):83 -- 91, 2012.
[17] U. M. Dholakia, R. P. Bagozzi, and L. K. Pearo. A social influence model of consumer participation in network-and small-
group-based virtual communities. International journal of research in marketing, 21(3):241 -- 263, 2004.
[18] F. Echenique, D. Golovin, and A. Wierman. A revealed preference approach to computational complexity in economics. In
Proceedings of the 12th ACM conference on Electronic commerce, pages 101 -- 110. ACM, 2011.
[19] N. B. Ellison, J. Vitak, R. Gray, and C. Lampe. Cultivating social resources on social network sites: Facebook relationship
maintenance behaviors and their role in social capital processes. Journal of Computer-Mediated Communication, 19(4):855 --
870, 2014.
[20] R. Gray, N. B. Ellison, J. Vitak, and C. Lampe. Who wants to know?: question-asking and answering practices among
facebook users. In Proceedings of the 2013 conference on Computer supported cooperative work, pages 1213 -- 1224. ACM,
2013.
[21] N. Grinberg, P. A. Dow, L. A. Adamic, and M. Naaman. Changes in engagement before and after posting to facebook. In
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 564 -- 574. ACM, 2016.
[22] N. Grinberg, S. Kalyanaraman, L. A. Adamic, and M. Naaman. Understanding feedback expectations on facebook.
In
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pages 726 -- 739.
ACM, 2017.
[23] T. Jaksch, R. Ortner, and P. Auer. Near-optimal regret bounds for reinforcement learning. Journal of Machine Learning
Research, 11(Apr):1563 -- 1600, 2010.
[24] A. N. Joinson. Looking at, looking up or keeping up with people?: motives and use of facebook. In Proceedings of the
SIGCHI conference on Human Factors in Computing Systems, pages 1027 -- 1036. ACM, 2008.
[25] M. Karimi, E. Tavakoli, M. Farajtabar, L. Song, and M. Gomez-Rodriguez. Smart Broadcasting: Do you want to be seen? In
KDD '16: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, 2016.
[26] A. Y. Koo. An empirical test of revealed preference theory. Econometrica: Journal of the Econometric Society, pages
646 -- 664, 1963.
[27] A. Mas-Colell. The recoverability of consumers' preferences from market demand behavior. Econometrica: Journal of the
Econometric Society, pages 1409 -- 1430, 1977.
[28] A. Ostrowski. Integral inequalities. In Functional Equations and Inequalities, pages 387 -- 419. Springer, 2010.
[29] P. A. Samuelson. Consumption theory in terms of revealed preference. Economica, 15(60):243 -- 253, 1948.
[30] N. Spasojevic, Z. Li, A. Rao, and P. Bhattacharyya. When-to-post on social networks.
In Proceedings of the 21th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015.
[31] S. S. Wilks. The large-sample distribution of the likelihood ratio for testing composite hypotheses. The Annals of Mathemat-
ical Statistics, 9(1):60 -- 62, 1938.
[32] M. Zadimoghaddam and A. Roth. Efficiently learning from revealed preference. In International Workshop on Internet and
Network Economics, pages 114 -- 127. Springer, 2012.
[33] A. Zarezade, A. De, U. Upadhyay, H. R. Rabiee, and M. Gomez-Rodriguez. Steering social activity: A stochastic optimal
control point of view. Journal of Machine Learning Research, 18:205 -- 1, 2017.
[34] A. Zarezade, U. Upadhyay, H. Rabiee, and M. Gomez-Rodriguez. Redqueen: An online algorithm for smart broadcasting in
social networks. In WSDM '17: Proceedings of the 10th ACM International Conference on Web Search and Data Mining,
2017.
12
8 Appendix
8.1 Proof of Theorem 1
Consider a special case, where the number of topics is K = 2; u has only one follower v with q1v > q2v = 1
2; the
weights av = au = 1/2; the user preferences x1u = x2u = q ≥ 0; and the prior parameters α = β = 3. Then, the
regret R(T ) is
1
2 (cid:88)t∈[T ](cid:0) max{q1v + q, q2v + q} − (qctv + q)(cid:1)
Since, q1v > q2v, we have R(T ) = T2(q1v − q2v)/2, where T2 is the number of stories about topic 2. Now, α = β
makes the initial estimates q1v(1) = q2v(1) = 1
2, and therefore, a topic is chosen randomly. Let us assume that topic 2
(the wrong category with minimum utility) is selected and a story from that topic is shared. If v likes this story, which
can happen with probability q2v = 1/2, then q2v(2) = (1 + 3 − 1)/(1 + 6 − 2) = 3/5 > q1v(2) = 1/2 and topic
2 is again selected at next time t = 2. At t = 3, q2v(t) again increases (decreases) with probability 1/2 (1/2). Note
that, u keeps choosing topic 2 as long as q2v(t) > 1/2 i.e. n2v(t) > ¯n2v(t), and the possibility of selecting topic 1
only arises when n2v(t) = ¯n2v(t). Such a situation can be mapped to an instance of a simple one dimensional random
walk, where the walker starts from origin at t = 1, if a story from topic 2 is shared. The walker moves to right (left) if
user v does (not) like the story. Now, the expected time of the first return to origin in a simple random walk is infinite.
Therefore, once u starts posting the messages with category 2, the expected time that n1v(t) = n2v(t) for the first time
t = tfirst → ∞ [?]. Therefore, E(T2) = Θ(T ). More formally, we have:
E(T2) > E(T2c1 = 2, lv(1) = 1)P(c1 = 2, lv(1) = 1)
= E(T2c1 = 2, lv(1) = 1)P(lv(1) = 1c1 = 2)P(c1 = 2)
=
E(T2c1 = 2, lv(1) = 1)
1
4
(14)
Now, in the random walk setting, E(T2c1 = 2, lv(1) = 1) is the amount of time the walker stays on the positive
or right side of the line, and therefore, greater than the time of first return to origin, which is infinite. Therefore, the
walker stays on the right side for the entire T , given the first step is taken towards the right side is T . Hence, we have
E(T2c1 = 2, lv(1) = 1) = T . hence E(T2) > T /4.
8.2 Proofs of Theorems 2 and 3
Preliminaries. To prove these theorems, we first present few notations which will be used throughout both the proofs.
For the sake of brevity, we define (i) qcu := xc; (ii) qcu(t) = xc for all t; (iii) N ∗(u) = N (u) ∪ {u}; (iv) kc(t)
as the number of posts made by broadcaster u up to and including time t, that have category c; (iv) Mcv(t) :=
Ncv(t)− kc(t− 1); (v) Mcv(t) as the number of messages with category c, which u may observe as they are appearing
α,β (.) as the c.d.f of Beta distribution with parameters α and β; (vii)
the wall of v until and excluding time t; (vi) F Beta
n,p(.) as the c.d.f in Binomial distribution with parameters n, p; (viii) fn,p(.) as the probability mass function in
F B
Binomial distribution function; (ix) ηcv(t) := ncv(t)/Ncv(t); (x) ηi(t) := (cid:80)v∈N (u) av ηcv(t) + auxc; (xi) ηc :=
(cid:80)v∈N (u) avqcv + auxc; (xii) θc := (cid:80)v∈N (u) av qcv(t) + auxc; (xiii) pc,t := P(θ1(t) > ρc + auxcHt); and (xiv)
dKL(a, b) = a log(a/b) + (1 − a) log((1 − a)/(1 − b)), where a, b ∈ [0, 1].
Furthermore, we define
∆Ht(t) :=(cid:88)c∈C(cid:16)(cid:88)v∈N (u)
a=(cid:88)c∈C (cid:88)v∈N ∗(u)
avqcv + auxc(cid:17)(cid:0)p∗(ctHt) − p(ctHt)(cid:1)
avqcv(cid:0)p∗(ctHt) − p(ctHt)(cid:1)
(15)
13
Equality a is due to definitions (ii) qcu = xc and (iii) N ∗(u) = N (u) ∪ {u}.
So, EHT (∆Ht(t)) = EHtEHT \Ht(∆Ht(t)) = EHt(∆Ht(t))
Hence, EHT (R(T )) = (cid:88)t∈[T ]
EHt(∆Ht(t))
Proof of Theorem 2. We have,
∆Ht(t) = max
= max
+ max
avqctv
av qc(cid:48)v(t)
avqcv − max
avqcv − (cid:88)v∈N ∗(u)
c(cid:48)∈C (cid:88)v∈N ∗(u)
av qc(cid:48)v(t) − (cid:88)v∈N ∗(u)
c∈C (cid:88)v∈N ∗(u)
c∈C (cid:88)v∈N ∗(u)
c(cid:48)∈C (cid:88)v∈N ∗(u)
c∈C (cid:12)(cid:12)(cid:12) (cid:88)v∈N (u)(cid:0)avqcv − av qcv(t)(cid:1)(cid:12)(cid:12)(cid:12) +(cid:88)v∈N (u)(cid:0)av qctv(t) − avqctv(cid:1)
≤ 2(cid:88)c∈C (cid:88)v∈N (u)
qcv − qcv(t)
a
≤ max
avqctv
The inequality a is obtained using (i) the triangle inequality of max norm; (ii) the fact that ct = argmaxc(cid:48)∈C(cid:80)v av qc(cid:48)v(t);
and (iii) qcu(t) = qcu, where (iii) reduces the summation over N ∗(u) to N (u). Since, E(X) ≤(cid:112)E(X2), we have
EHt (∆Ht(t)) ≤ 2(cid:88)c∈C (cid:88)v∈N (u)(cid:112)EHt(qcv − qcv(t))2
(16)
(17)
(18)
(19)
= 2 (cid:88)c∈C,v∈N (u)(cid:113)ENcv(t)E((qcv − qcv(t))2Ncv(t))
+(cid:16) α + ncv(t) − 1
α + β + Ncv(t) − 2(cid:17)2
α + ncv(t) − 1
α + β + Ncv(t) − 2
(qcv − qcv(t))2 can be written as,
q2
cv − 2qcv
On expanding, we have E((qcv − qcv(t))2Ncv(t)) to be same as
((α − 1) − qcv(α + β − 2))2 + Ncv(t)qcv(1 − qcv)
(α + β + Ncv(t) − 2)2
κ1
κ2
=
(α + β + Ncv(t) − 2)2 +
α + β + Ncv(t) − 2
where κ1 = ((α − 1) − qcv(α + β − 2))2 − qcv(1 − qcv)(α + β − 2) and κ2 = qcv(1 − qcv). Finally we observe that,
(α + β + Ncv(t) − 2)2 ≥ (α + β − 2)(α + β + Ncv(t) − 2). Hence,
From Eq. 18, we now have,
E((qcv − qcv(t))2Ncv(t)) ≤
κ1/(α + β − 2) + κ2
α + β + Ncv(t) − 2
EHt(∆Ht(t)) ≤ 2(cid:88)c∈C (cid:88)v∈N (u)(cid:115)ENcv(t)
≤ 2(cid:88)c∈C (cid:88)v∈N (u)(cid:115)EMcv(t)
κ1/(α + β − 2) + κ2
α + β + Ncv(t) − 2
κ1/(α + β − 2) + κ2
α + β + Mcv(t) − 2
14
(20)
(21)
Then we apply Lemma 6 to obtain the required bound.
Proof of Theorem 3. To prove this theorem, we leverage the proof techniques of Agarwal et al in [5]. Without loss of
generality, we assume that the set of categories C = [K]; c = 1 is the optimum true category with maximum utility.
We also denote τm denotes the time step at which a message with optimal category (i.e., category 1) is posted for the
m-th time. In this context, we denote,
Lc(T ) :=
1
dm
log(cid:0)1 + (cid:88)v∈N (u)
1 − exp(−µcv(1 − e−dm)T )
µcv(1 − e−dm)
(cid:1)
Then, we define two numbers σc, ρc so that,
ηc < σc + auxc < ρc + auxc < η1 and, 1 − ρc
ρc − σc
/∈ Q+,
where Q+ is set of positive rational numbers. Note that for both σc, ρc, 0 < σc < ρc < 1. We define Eη
event that ηcv(t) ≤ σc, and Eθ
we have dKL((σcNcv(t) + nα)/(Ncv(t) + nα), ρc) > 0. Hence, we can define
cv(t) as the
c (t) as the event that θc(t) ≤ ρc + auxc. Note that, since (1 − ρc)/(ρc − σc) /∈ Q+, So,
dm = min
c,v
min
N∈N+
dKL((σcN + nα)/(N + nα), ρc) ≥ 0
(24)
To prove the theorem, in the first step, we show that the regret is proportional to the sum of number of times a
suboptimal category (kc(T ) for c (cid:54)= 1) is posted. Then we decompose this quantity into three suitable quantities and
provide individual bounds and then combine them. From, definition (xi), we note that η1 = maxc ηc. Therefore, the
expected regret is proportional to the number of times a suboptimal category c (cid:54)= 1 is posted.
where we recall that kc(T ) is the number of times a message with category c has been posted up to and including time
T . So, kc(T ) =(cid:80)t∈[T ] 1(ct = c). Therefore, we have,
EHT (kc(T )) =
EHT (R(T )) =(cid:88)c∈C(cid:0)η1 − ηc(cid:1)E(kc(T ))
(cid:92)
(cid:88)
(cid:88)
P(cid:0)ct = c,
(cid:91)
(cid:88)
(cid:92)
P(cid:0)ct = c,
c (t)(cid:1) +
P(ct = c) =
cv(t), Eθ
t∈[T ]
t∈[T ]
Eη
v
t∈[T ]
c (t)(cid:1)
Eη
cv(t), Eθ
cv(t)(cid:1)
Eη
v
(cid:88)
t∈[T ]
+
P(cid:0)ct = c,
v
Now, we are going to bound these three sums individually.
-- Bounding P(cid:0)ct = c,(cid:84)v Eη
cv(t), Eθ
a
Eη
c (t)(cid:1):
P(ct = c,(cid:92)v
EHt(cid:16) 1 − pc,t
E(cid:16) 1 − pc,t
(cid:88)t∈[T ]
≤ (cid:88)t∈[T ]
≤ (cid:88)t∈[T ]
pc,t
pc,t
b
cv(t), Eθ
c (t))
Eη
P(ct = 1,(cid:92)v
1(ct = 1)(cid:17) c
T(cid:88)m=1
≤
cv(t), Eθ
c (t))Ht)(cid:17)
E(cid:16) 1 − pc,τm
pc,τm (cid:17)
(22)
(23)
(25)
(26)
(27)
Inequality a comes from Lemma 7. Inequality b comes from the fact that P(ct = 1,•) ≤ P(ct = 1) and in the
corresponding expression, the expectation is taken over all sources of randomness. Since, τm denotes the time step
at which a message with optimal category (i.e. c = 1) is posted for the m-th time, at times other than t = τm, the
m=1 E(cid:16) 1−pc,τm
pc,τm (cid:17)
indicator term becomes zero, which explains the last inequality c. From Lemma 8, we note that(cid:80)T
is
T(cid:88)m=1 (cid:88)v∈N (u)
O(cid:16)e−∆2
cvm/2 +
1
cvm/4 − 1(cid:17)
e∆2
e−Dcvm
(m + 1)∆2
cv
+
15
which is Θ(1). Next we give bound of the second term in Eq. 26.
cv(t), Eθ
c (t)). We observe that,
-- Bounding(cid:80)t∈[T ] P(ct = c,(cid:84)v Eη
b
a
Eη
P(ct = c,(cid:92)v
≤ P(ct = c, Eθ
≤ P(cid:16) (cid:88)v∈N (u)
≤ P(cid:16) (cid:91)v∈N (u)
≤ (cid:88)v∈N (u)
≤ (cid:88)v∈N (u)
≤ (cid:88)v∈N (u)
≤ (cid:88)v∈N (u)
F B
d
e
c
cv(t), Eθ
c (t))
Eη
cv(t),Ht)
c (t)(cid:12)(cid:12)(cid:92)v
av qcv(t) > ρc (cid:92)v∈N (u)
{qcv(t) > ρc} (cid:92)v∈N (u)
P(qcv(t) > ρcηcv(t) ≤ σc)
{ηcv(t) ≤ σc},Ht(cid:17)
{ηcv(t) ≤ σc},Ht(cid:17)
(1 − F Beta
σcNcv(t)+nα+1,(1−σc)Ncv(t)(ρc))
Ncv(t)+nα,ρc (σcNcv(t) + nα)
exp(cid:18)−Ncv(t)dKL(cid:16) σcNcv(t) + nα
Ncv(t) + nα
, ρc(cid:17)(cid:19)
(28)
Inequality a is due to the following. If qcv(t) < ρc for all v ∈ N (u), then(cid:80)v∈N (u) av qcv(t) <(cid:80)v∈N (u) ρc < ρc.
Inequality c is due to the fact that cdf of Beta(α, β) is decreasing w.r.t. α and increasing w.r.t β [5]. Inequality d is due
to the relation between Beta distribution with integer parameters and Binomial distributions [5, Fact 3, Appendix A].
Inequality e is due to Chernoff-Holding bound [5, Fact 1, Appendix A]. Then, from Eq. 28, we obtain that,
P(ct = c, Eθ
c (t)(cid:12)(cid:12)(cid:92)v
Eη
cv(t),Ht) ≤ (cid:88)v∈N (u)
exp(−Ncv(t)dm)
(29)
Now, we split Ncv(t) = Mcv(t) + kc(t − 1). For time t such that kc(t − 1) ≥ Lc(T ), we use the definition of dm
from Eq. 24 to have,
P(ct = c, Eθ
exp(−dm(Mcv(t) + Lc(T )))
Now consider that ts is the largest time until kc(t − 1) ≤ Lc(T ). Then we have,
cv(t), Eθ
c (t))
cv(t),Ht) ≤ (cid:88)v∈N (u)
Eη
Eη
c (t)(cid:12)(cid:12)(cid:92)v
P(ct = c,(cid:92)v
(cid:88)t∈[T ]
EHt(cid:16)P(ct = c, Eθ
≤ (cid:88)t∈[T ]
≤ EHt(cid:16) (cid:88)t∈[ts]
+ EHt(cid:16) T(cid:88)t=ts+1
≤ E(cid:0) (cid:88)t∈[ts]
1(ct = c)(cid:1)
P(ct = c, Eθ
P(ct = c, Eθ
c (t)(cid:12)(cid:12)(cid:92)v
c (t)(cid:12)(cid:12)(cid:92)v
c (t)(cid:12)(cid:12)(cid:92)v
Eη
Eη
cv(t),Ht)(cid:17)
cv(t),Ht)(cid:17)
cv(t),Ht)(cid:17)
Eη
16
T(cid:88)t=ts+1
+ (cid:88)v∈N (u)
≤ Lc(T ) +(cid:88)v∈N (u)(cid:90) T
≤ Lc(T ) +(cid:88)v∈N (u)
Then we have,(cid:80)t∈[T ] P(ct = c,(cid:84)v Eη
0
EMcv(t) exp(−dmMcv(t)) exp(−dmLc(T ))
exp(−µcv(1 − e−dm )t)dt exp(−dmLc(T ))
1 − exp(−µcv(1 − e−dm )T )
exp(−dmLc(T )).
µcv(1 − e−dm)
c (t)) has order
cv(t), Eθ
Olog(cid:16)1 + (cid:88)v∈N (u)
1 − exp(−µcvθmT )
µcvθm
(cid:17)
(30)
cv(t)). We define tk is the time at which category c is posted kth time. Then, we
where, θm = 1 − e−dm.
-- Bounding(cid:80)t∈[T ] P(ct = c,(cid:83)v Eη
observe that
a
(cid:88)t∈[T ]
P(ct = c,(cid:91)v
≤ 1 + E(cid:2) (cid:88)m∈[T ]
≤ 1 +(cid:88)v (cid:88)m∈[T ]
c
Eη
cv(t)) ≤ E(cid:2) (cid:88)t∈[T ]
cv(tm))(cid:3) b
1(∪vEη
1(ct = c)1(∪vEη
≤ 1 +(cid:88)v
E(cid:2) (cid:88)m∈[T ]
cv(t))(cid:3)
cv(tm))(cid:3)
1(Eη
exp(−mdKL(σc, qcv)) = O(1)
(31)
(32)
(33)
(34)
Inequality a holds because the indicator 1(Eη
cv(tk)) is only activated when category c posted. Inequality b is due to an
union bound and inequality c is due to Chernoff-Hoeffding bounds [5, Fact 1, Appendix A]. Combining Eq. 27, 30,
31, we obtain the required bound.
8.3 Auxilliary lemmas
Lemma 5. If the rate of messages in v's feed are exposed to u with Poisson distribution having rate µcv for each
category c, and Mcv(t) are total number of such messages for category c, observed until timestep t, then we have
1
Mcv(t) + δ(cid:17) ≤(cid:40) 1−e−µcv (t−1)
(t−1)µcvδ
1−e−((t−1)µcv +δ−1)
(t−1)µcv+δ−1
E(cid:16)
if δ < 1
if δ ≥ 1
Proof: E(cid:16)
1
Mcv(t)+δ(cid:17) can be written as,
∞(cid:88)n=0
=(cid:90) 1
=(cid:90) 1
0
0
1
n + δ
((t − 1)µcv)ne−(t−1)µcv
n!
(µcv(t − 1)θ)ne−(t−1)µcv
n!
θδ−1dθ
∞(cid:88)n=0
e−µcv(t−1)(1−θ)θδ−1dθ
-- Case δ < 1. In this case, e−µcv(t−1)(1−θ) is increasing and θδ−1 is decreasing. So we apply Chebyschev inequal-
ity [28] to have
(cid:90) 1
0
e−µcv(t−1)(1−θ)θδ−1dθ ≤(cid:90) 1
0
e−µcv(t−1)(1−θ)dθ(cid:90) 1
0
θδ−1dθ
17
0.4 which provides the required expression.
-- Case δ ≥ 1. Since θ ≤ e−(1−θ), δ ≥ 1 implies θδ−1 ≤ e−(1−θ)(δ−1). Hence, the required integral is less than
Proof: For δ < 1, we have
which gives the required bound. For δ ≥ 1, we have
Lemma 6. If Mcv(t) and µcv have the similar meanings as the previous lemma, then we have
1 − e(t−1)µcv+δ−1
(t − 1)µcv + δ − 1
√T−1√1−e−(µcv (T −1))
2√(T−1)µcv+δ−1+√δ−1
2√µcv∆tδ
T−1
if δ < 1
if δ ≥ 1
1 (cid:115) 1 − e−µcv(T−1)
(t − 1)µcvδ
dt,
e−((t−1)µcv+δ−1)(1−θ)dθ =
0
1
(cid:90) 1
Mcv(t) + δ(cid:17) ≤
T(cid:88)t=2(cid:115)E(cid:16)
T(cid:88)t=2(cid:115)E(cid:16)
Mcv(t) + δ(cid:17) ≤(cid:90) T
Mcv(t) + δ(cid:17) ≤(cid:90) T
T(cid:88)t=2(cid:115)E(cid:16)
= (cid:112)(T − 1)µcv + δ − 1 − √δ − 1
2µcv
=
1
1
1
1
(cid:112)µcv(t − 1) + δ − 1
dt
T − 1
2(cid:112)(T − 1)µcv + δ − 1 + √δ − 1
P(ct = 1,(cid:92)v
c (t))Ht)
cv(t), Eθ
Eη
Lemma 7. [5] If we define pc,t = P(θ1(t) > ρc + auxcHt), then
P(ct = c,(cid:92)v
Eη
cv(t), Eθ
c (t))Ht) ≤
1 − pc,t
pc,t
(35)
(36)
Lemma 8. If τj denote the time step at which the optimal category 1 is selected for the j-th time. Then,
where, ∆cv = q1v − ycv, Dcv = ycv log(ycv/q1v) + (1 − ycv) log((1 − ycv)/(1 − q1v)), ∆c = minv∈N (u) ∆cv;
ycv = q1v(ρc+au(xc−x1))
w∈N (u) awq1w
(cid:80)
Proof. We leverage the proof of [5, Lemma 4] to prove this lemma Let sv = n1v(τj), Yvj = N1v(τj).
cvj/2 +
e−Dcvj
(j + 1)∆2
cv
O(cid:0)e−∆2
E(cid:16) 1
pc,τj(cid:17) = 1 +(cid:88)v∈N (u)
. Note that from Eq. 23, ∆cv > 0 ∀v ∈ N (u).
≥ P(cid:0) (cid:92)v∈N (u)
pc,τj =P(θ1(τj) > ρc + auxcHτ )
P(q1v(τj) > ycv)
a
= (cid:89)v∈N (u)
+
e∆2
1
cvj/4 − 1(cid:1),
{q1v(τj) > ycv}(cid:1)
Inequality a is because q1v(τj) > ycv for all v implies
av q1v(τj) > (cid:88)v∈N (u)
avycv = ρc + au(xc − x1),
av q1v(τj) + aux1
> ρc + auxc.
(cid:88)v∈N (u)
so, (cid:88)v∈N (u)
(cid:124)
θ1(τj )
(cid:123)(cid:122)
(cid:125)
18
Now, P(q1v(τj) > ycv) = 1 − F Beta
≥ 1 − F Beta
b= F B
a
sv+α,Yvj−sv+β(ycv)
sv+1,Yvj−sv+nβ (ycv),
Yvj +nβ ,ycv (sv)
Inequality a is due to the fact that F Beta
α,β (y) is increasing in β and decreasing in α, and we choose nβ > max(β, 8/∆cv).
Equality b holds due to for simple mapping from Beta distribution to Binomial distribution when the parameters for
Beta distribution are integers. Then, we have:
1
E(1/pc,τjYvj) =
fYvj ,q1v (sv) (cid:89)v∈N (u)
Yvj(cid:88)sv=0 (cid:89)v∈N (u)
Yvj(cid:88)sv=0
(cid:89)v∈N (u)
We denote Sum(0, Yvj) =(cid:80)Yvj
, and observe that Sum(0, Yvj) = Sum(0, Yvj + nβ − 1). This is
because, fYvj ,q1v (s) = 0 for s > Ncv. We express Sum(0, Yvj + nβ − 1) as the sum of two terms Sum(0,(cid:98)(Yvj +
nβ − 1)δ(cid:99)) + Sum((cid:100)(Yvj + nβ − 1)δ(cid:101), Yvj + nβ − 1), where δ = (q1v − ∆cv/2). We note that,
fYvj ,q1v (sv)
fYvj ,q1v (sv)
Yvj +nβ ,ycv
Yvj +nβ ,ycv
Yvj +nβ ,ycv
sv=0
F B
(37)
(sv)
(sv)
F B
F B
(sv)
Sum(0,(cid:98)(Yvj + nβ − 1)δ(cid:99)) =
(cid:98)(Yvj +nβ−1)δ(cid:99)(cid:88)sv=0
fYvj ,q1v (sv)
F B
Yvj +nβ ,ycv
(sv)
a
≤
1
(1 − q1v)nβ−1
(cid:98)(Yvj +nβ−1)δ(cid:99)(cid:88)sv=0
fYvj +nβ−1,q1v (sv)
F B
(sv)
Yvj +nβ ,ycv
b
≤ Θ(e−∆2
≤Θ(e−∆2
cvj +
cv(Yvj +nβ−1) +
e−Djvj
(j + 1)∆2
cv
)
e−Djv(Yvj +nβ−1)
((Yvj + nβ))∆2
cv
) (Since, Njv ≥ j)
(38)
Inequality a is due the fact that
fYvj +nβ−1,q1v (sv) =(cid:18)Yvj + nβ − 1
(cid:19)qsv
1v(1 − q1v)Yvj +nβ−1−sv
≥ (1 − q1v)nβ−1(cid:18)Yvj
sv(cid:19)qsv
1v(1 − q1v)Yvj−sv .
Inequality b is obtained by leveraging the proof of Lemma 4 in Agarwal et al in [5]. Now we bound Sum((cid:100)(Yvj +nβ−
1)δ(cid:101), Yvj). Using the proof of Lemma 4 in Agarwal et al in [5], we have, F B
cv(Yvj +nβ−1)/4
for sv ≥ (cid:100)(Yvj + nβ − 1)δ(cid:101). Then, we have
(sv) > 1 − e−∆2
Yvj +nβ ,ycv
sv
Sum((cid:100)(Yvj + nβ − 1)δ(cid:101), Yvj + nβ − 1)
fYvj ,q1v (sv)
F B
Yvj +nβ ,ycv
(sv)
=
Yvj +nβ−1(cid:88)sv=(cid:100)(Yvj +nβ−1)δ(cid:101)
≤ 1/(1 − e−∆2
1
= 1 +
e∆2
cvj/4 − 1
19
cv(Yvj +nβ−1)/4) ≤ 1/(1 − e−∆2
cvj/4)
(39)
Adding, Eq. 38 and 39, and then substituting back to Eq. 37, we observe that, E(1/pc,τj ) equals to
(cid:89)v∈N (u)(cid:18)1 + Θ(cid:0)e−∆2
≤ 1 +(cid:88)v∈N (u)
O(cid:0)e−∆2
cvj/2 +
cvj/2 +
e−Dcvj
(j + 1)∆2
cv
e−Dcvj
(j + 1)∆2
cv
+
+
1
cvj/4 − 1(cid:19)
cvj/4 − 1(cid:1),
1
e∆2
e∆2
The last inequality follows by taking only the dominating term.
20
|
1512.07831 | 2 | 1512 | 2016-02-20T14:46:39 | The Lifecycle and Cascade of WeChat Social Messaging Groups | [
"cs.SI"
] | Social instant messaging services are emerging as a transformative form with which people connect, communicate with friends in their daily life - they catalyze the formation of social groups, and they bring people stronger sense of community and connection. However, research community still knows little about the formation and evolution of groups in the context of social messaging - their lifecycles, the change in their underlying structures over time, and the diffusion processes by which they develop new members. In this paper, we analyze the daily usage logs from WeChat group messaging platform - the largest standalone messaging communication service in China - with the goal of understanding the processes by which social messaging groups come together, grow new members, and evolve over time. Specifically, we discover a strong dichotomy among groups in terms of their lifecycle, and develop a separability model by taking into account a broad range of group-level features, showing that long-term and short-term groups are inherently distinct. We also found that the lifecycle of messaging groups is largely dependent on their social roles and functions in users' daily social experiences and specific purposes. Given the strong separability between the long-term and short-term groups, we further address the problem concerning the early prediction of successful communities. In addition to modeling the growth and evolution from group-level perspective, we investigate the individual-level attributes of group members and study the diffusion process by which groups gain new members. By considering members' historical engagement behavior as well as the local social network structure that they embedded in, we develop a membership cascade model and demonstrate the effectiveness by achieving AUC of 95.31% in predicting inviter, and an AUC of 98.66% in predicting invitee. | cs.SI | cs |
The Lifecycle and Cascade of WeChat Social Messaging
Groups
Jiezhong Qiu†, Yixuan Li♯, Jie Tang†, Zheng Lu‡, Hao Ye‡, Bo Chen‡, Qiang Yang⋆,
and John E. Hopcroft♯
†Department of Computer Science and Technology, Tsinghua University
♯Department of Computer Science, Cornell University
‡Tencent Corporation, Shenzhen, China
⋆Department of Computer Science, Hong Kong University of Science and Technology
[email protected], {yli,jeh}@cs.cornell.edu, [email protected]
ABSTRACT
Social instant messaging services are emerging as a transformative
form with which people connect, communicate with friends in their
daily life - they catalyze the formation of social groups, and they
bring people stronger sense of community and connection. How-
ever, research community still knows little about the formation and
evolution of groups in the context of social messaging - their life-
cycles, the change in their underlying structures over time, and the
diffusion processes by which they develop new members.
In this paper, we analyze the daily usage logs from WeChat
group messaging platform - the largest standalone messaging
communication service in China - with the goal of understanding
the processes by which social messaging groups come together,
grow new members, and evolve over time. Specifically, we dis-
cover a strong dichotomy among groups in terms of their lifecycle,
and develop a separability model by taking into account a broad
range of group-level features, showing that long-term and short-
term groups are inherently distinct. We also found that the lifecycle
of messaging groups is largely dependent on their social roles and
functions in users' daily social experiences and specific purposes.
Given the strong separability between the long-term and short-term
groups, we further address the problem concerning the early pre-
diction of successful communities.
In addition to modeling the growth and evolution from group-
level perspective, we investigate the individual-level attributes of
group members and study the diffusion process by which groups
gain new members. By considering members' historical engage-
ment behavior as well as the local social network structure that
they embedded in, we develop a membership cascade model and
demonstrate the effectiveness by achieving AUC of 95.31% in pre-
dicting inviter, and an AUC of 98.66% in predicting invitee.
Keywords
social messaging; online community; group formation; information
diffusion
Copyright is held by the International World Wide Web Conference Com-
mittee (IW3C2). IW3C2 reserves the right to provide a hyperlink to the
author's site if the Material is used in electronic media.
WWW '16, April 11-15, 2016, Montréal, Québec, Canada.
ACM 978-1-4503-4143-1/16/04.
http://dx.doi.org/10.1145/2872427.2882979.
1.
INTRODUCTION
The advent and proliferation of social instant messaging services
have been shaping and transforming the way people connect, com-
municate with individuals or groups of friends, bringing users di-
verse and ubiquitous social experiences that traditional text-based
short message service (SMS) could not. For example, WhatsApp
is the most globally popular messaging service with more than 900
million monthly active users (MAUs), WeChat, the largest messag-
ing service in China, has more than 600 million MAUs. These tools
have enriched the way people interact by including images, video,
location information, audio and text messages. More importantly,
they have also catalyzed the formation of social groups, bringing
people a stronger sense of community and connection compared
with traditional text messaging [12].
While past work has extensively studied the dynamics of group
formation and evolution, much of the work is limited to the setting
of online communities embedded within the social networking sites
- which is inherently different from groups seen in the context of
social messaging. Previous study [12] has shown that, for most so-
cial messaging tools adopters, the creation and use of instant group
messaging occurs more frequently and habitually than other form
of group-level social engagement in their daily life. In terms of life-
cycle, social messaging groups have a relatively shorter life span -
ranging from several hours to months - as opposed to those on-
line groups seen in social networking sites such as Reddit [8] and
Facebook [29] that can sustain up to years. Furthermore, all the
chat groups are by default only visible to the group members and
grow in an invitation-only fashion, i.e., new members invited to the
group are guaranteed to be on the fringe of group networks (one-
hop neighbors of current group members) - thus the membership
cascade process is more locally dependent, with unidirectional con-
tagion dominated mostly by the existing group members. This is
very dissimilar from the diffusion and growing models in previous
literature on online communities (e.g., [6, 28]), in which users can
make their own decisions to join, even if they are not friends with
any of the current group members.
Researchers have recently begun interpreting the group messag-
ing behavior and processes from a social science perspective, yet
concrete empirical measurement and statements cannot be drawn
from existing literature. Much of the challenge has been the lack of
appropriate datasets - one needs a large collection of messaging
groups with sufficient time-resolution so that one can keep track of
their emergence, growth and demise over time. Another challenge
comes from devising an effective model to depict and quantify the
diversified, complex processes by which the groups develop over
time. As a result, the research community still knows very little
about the formation and evolution of chat groups in the context of
social messaging - their lifecycles, the change in their underly-
ing structures over time, and the cascade processes by which they
develop new members.
To address these issues, in this paper, we analyze the daily usage
logs from the WeChat 1 group messaging platform - the largest
standalone messaging communication service developed by Ten-
cent in China [2] - with the goal of understanding the processes
by which social messaging groups come together, grow new mem-
bers, and evolve over time. To our knowledge, this is so far the
first large-scale analysis on messaging group dynamics. WeChat
allows users to send and receive multimedia messages in real-time
via Internet. One important feature in WeChat is that any user can
create a new group and invite friends to join this group. Please
note that such group is invited only, which means that the other
users (friends) cannot apply to join if no invitation comes from the
group. Groups play a very important role in WeChat. Our statistics
show that roughly 25% of the messages in WeChat were generated
in group conversations. On the other hand, the groups are very dy-
namic. Every day, about 2,300,000 new groups were created and
about 40% of the newly created groups become silent within only
one week. We will describe detailed information about the WeChat
dataset along with its mechanics in Section 3.
The Present Work: Lifecycle Dichotomy in Social Messaging
Groups. In this paper, we contribute to research on group evolu-
tion in social messaging platforms by observing and making a con-
ceptual difference between two types of groups in terms of their
lifecycle: long-term and short-term groups. Our empirical analysis
shows that almost 40% of them stop interaction within one week.
On the other hand, we also observe 30% of the groups can survive
a much longer period of time (≥ 30 days). The strong lifecycle
dichotomy of chat groups leads us to a natural lifecycle modeling
and prediction questions - how separable are the long-term and
short-term groups by taking into account the structural and social
behavioral features? To address this issue, we develop a separabil-
ity model by studying snapshots of millions of groups, and show
the strong distinction between long-term and short-term groups -
measured with a broad range of features including the underlying
group network structure, the membership cascade tree properties
(e.g. tree size and depth), and the demographics entropy of group
members such as gender, age and region.
We also discuss the phenomena of lifecycle dichotomy from the
perspective of the roles and functions that social messaging plat-
forms have in users' daily social experiences. This leads to the
question of how does the lifecycle and growth pattern of social
messaging groups correlate with the social functions it is serving?
It turns out that messaging groups have been commonly adopted
as a convenient way of connecting with smaller communities all at
once, e.g., a family group, a colleague's group, a classmate's group,
as well as groups for social events [12]. And the lifecycle of mes-
saging groups is largely dependent on it social purpose for being
setup - for instance, one may expect that event-driven groups will
have a higher chance of dying out than friend groups for frequent
catching-up.
Furthermore, given the strong separability between the long-term
and short-term groups, a fundamental problem concerning the de-
sign of successful communities is: Can we predict whether a social
group will grow and persist in the long run by analyzing the struc-
tural and behavioral patterns exhibited by the group at its early
stage? We phrase it as a problem of early prediction in group
longevity. Through the lens of various features exhibited by a
1www.wechat.com/en/
group, we demonstrate that strong prediction results can be ob-
tained even with a group history of one day.
The Present Work: Group Membership Cascade and Pre-
diction. In addition to modeling the growth and evolution from a
group-level perspective, we take one step further and investigate the
individual-level attributes of group members and study the cascade
process by which groups gain new members. Specifically, given
the historical behavior of group users as well as the local social
structure, can we predict which users in the group are more likely
to be active and invite new users to the group chat and to whom will
he/she send invitations to? Making sense of such questions requires
fine-grained inspection into users' historical engagement behavior
as well as the local social network structure that users embedded
in. To this end, we develop a membership cascade process model
in which we consider features of both inviter - a group member
who sends invitation to friend(s), and invitee - the individual in
the inviter's ego networks who gets invited to the group chat. Our
inviter prediction model using all features generally achieves AUC
as high as 95.31%, and invitee prediction model reaches AUC of
98.66%.
Furthermore, we also attempt to analyze: how does the added
new members in return lead to the change of underlying social net-
work structure, as the group evolves over time? To address this
issue, we take snapshots and compare the same set of sample group
at the timestamp of setup and after a month, respectively. Inter-
estingly, we observe that although both long-term and short-term
groups have increment on features such as close triads, long-term
groups have shown to increase the close triads more significantly.
Organization. The remainder of the paper is organized as follows.
Section 2 describes related work on analyzing group formation and
evolution. In Section 3, we introduce the WeChat social messaging
group dataset. The discussion on group lifecycle dichotomy as well
as early prediction model is provided in Section 4. The membership
cascade process is investigated in Section 5. Finally we conclude
our work in Section 6.
2. RELATED WORK
The study of groups and communities is central to many research
problems on mining and analytics of sociological data. There have
been two major lines of research in this domain: one focuses on
the static snapshots of social graphs and seeks to infer and identify
tightly-connected group of members - also known as community
detection in literature [15, 19, 26, 27, 33]; another line of research
focusing on the group dynamics - the growth and evolution of so-
cial groups - is more related to our work here. Below we highlight
a few and exlpain how ours contribute to the existing research.
Group Dynamics. To understand the process of how social groups
form and evolve over time, previous work has extensively investi-
gated the growth and longevity of various forms of online commu-
nities such as Facebook apps [21], game communities [13], knowl-
edge sharing communities [37] and social networks communities
[6, 9, 20, 28, 33]. A more generalized work of Riberiro [30] inves-
tigates the group growth dynamics by encompassing a broad range
of 22 membership-based websites.
Our work focuses on studying the group dynamics of a rather
understudied realm - the social messaging services. Although re-
searchers have recently begun interpreting the group messaging be-
havior from a social science perspective (e.g., [12]), research com-
munity still knows little about the formation and evolution of social
messaging groups with concrete and empirical measurement. Fo-
cusing on the Yahoo!
instant messaging traffic data, Aral et al.
[5] considers the individual-level dynamics from the perspective of
peer influence and homophily, yet it is unclear how the groups as a
whole evolve over time - their lifecycles, their structural dynamics
etc. Our work contributes to the current research by discovering a
strong dichotomy among social messaging groups in terms of their
lifecycle. By taking into account a broad range of group-level struc-
tural and behavioral features, we develop a separability model that
distinguishes between long-term groups and short-terms groups, as
well as an early prediction model that forecasts the longevity of
groups.
Cascades. The second half our of work on group membership cas-
cade prediction builds on previous literature that studies diffusion
processes [17]. In recent years, scientiests have been able to ob-
serve and quantify large-scale diffusions from the richness of on-
line data, including blog space [3, 25], marketing [24], social sites
such as LinkedIn [4], Flickr [10], Twitter [16, 23, 31], Facebook
[7, 11, 21, 32], LiveJournal [6]. In work that aligns more closely
to our focus on social messaging, Aral et al. [5] have looked into
the effects of peer-influence and homophily during the diffusion
processes. Our work has a more comprehensive scope than [5] by
integrating both individual-level and group-level features into our
cascade prediction model.
The membership cascade process in the context of social mes-
saging groups differs from previous work in two folds. First, in
terms of cascade size, in contrast to previous findings on the struc-
tural virality in global-scale cascades [4, 16, 35], we observe a
relatively smaller scale of cascade in message groups and find a
siginificant fraction of short-term group memerbship cascades ter-
minate at the depth of 2 or 3. Such difference is caused by the
social messaging group nature of maintaining a compact commu-
nity size than going "viral" [36]. Second, due to mechanics spe-
cific to application, the cascade process we consider here is locally
dependent, with unidirectional contagion dominated mostly by the
existing group members. In WeChat, all the groups are by default
only visible to group members and grow in a invitation-only fash-
ion. Only the one-hop neighbors of current group members can be
invited to the group chat. And this is very dissimilar to the diffusion
models in previous work by Backstrom et al. [6] which assumes
that users can make their own decision to join based on the group
influence, even if they are not friends with any of the current group
members.
3. DATA
Preliminaries. Before describing the details of the dataset, we
first give a brief overview about WeChat's Group Chat feature that
is central to our study here. While WeChat supports many other
important features including Moments for photo sharing, Friend
Radar for searching nearby friends and Sticker Gallery, it is impor-
tant to note that those are beyond the scope of our research focus in
this paper.
On WeChat, each user keeps a brief profile, including demo-
graphical information (e.g., gender, age and region) and address
book which saves the contact list of user's friends. We use the tuple
(u, v, T ) to denote a friend relationship record if user u becomes
friend with user v at timestamp T .
A chat group on WeChat can be analogy to a community, where
one can chat with several friends all at once. There are two ways
in which a user can involve in a chat group: one can either initi-
ate a new chat group, or get invited by an existing member of the
group. Figure 1 illustrates an example of the WeChat user inter-
face of inviting friends to group chat. We consider (u, v, C, T ) as
(a) WeChat group membership
(b) Membership invitation
Figure 1: The WeChat user interaface (UI) of inviting friends
to group chat. (a) Group membership UI displays the current
users in the group, along with attributes and basic settings for
the group such as group name, group capacity etc. Group mem-
bers can tap the "+" button to invite friends into the group
chat. (b) The UI of inviting friends to the group chat. Users
can browse and select contacts to add, and click "OK" to send
invitations. When group size is under the capacity 40, invited
users will be automatically added into the current group chat
without requiring further confirmation. However, under the
circumstances that group size exceeds the capacity limit, in-
vited users will have to manually click through the invitation
message in order to join the group. The largest WeChat group
can have as many as 500 members by default. Sourced from
WeChat official feature site [1].
a successful invitation if user v joins group C invited by user u at
timestamp T .
After being a member of a chat group, one can send various
forms of messages (e.g., text, photo and voice) to the entire group.
We use the tuple (u, C, T ) to denote the a group chat record if user
u send a message to group C at timestamp T .
Data Collection and Cleaning.
The data for this study comes
from anonymized logs of complete WeChat group messaging ac-
tivities, collected between July 26th, 2015 to August 28, 2015. We
first collect all the 2.3 million groups generated on July 26th, 2015,
as our group set of interest. We preprocess the data by ignoring
groups with less then 5 chat logs- i.e., we only consider groups
that are not born to be dead; and also filtering groups with users
that are in list of monthly spam users (MSU) or monthly inactive
users (MIU). The list is maintained and updated by WeChat on a
monthly basis. All the initial groups in consideration consist of at
least three members.
Data Description. After preprocessing the initial group set, we
are left with 474,726 groups for further analysis. We then collect
four datasets of interest listed below. Tabel 1 summarizes statistics
of the dataset used for this study.
• Group Activity Records G: It consists of all the tempo-
ral group activity records (u, C, T ) for each of the sampled
group, with T running between July 26th, 2015 to August
28, 2015.
• User Set U: It consists of all the members belonging to the
sampled groups as well as their one-hop neighbors, as of Au-
gust 28, 2015. Note that we further remove users in the list
of MSU or MIU from the user set.
• Invitation Records I:
It consists of tuples (u, v, C, T )
where user u successfully invites v to join group C at times-
tamp T during our data collection period.
• Friendship Records F: It consists of all the tuples (u, v, T )
where u and v (u, v ∈ U) become friends with each other at
time T . The friend relationships in WeChat are undirected,
and we have both (u, v, T ) ∈ F and (v, u, T ) ∈ F.
Table 1: Summary of data set.
Category
Group
User
Invitation
Friendship
Type
Total
Min group size
Max group size
Total
Total
Total
Number
474,726
3
500
245,352,140
2,013,351
624,529,005
4. GROUP LIFECYCLE DICHOTOMY
One question that we brought up previously is how social mes-
saging groups grow and evolve over time - their lifecycles and
their structural dynamics. As a high-level characteristic, social
messaging groups can have a relatively shorter lifespan - rang-
ing from several hours to months - as opposed to those online
groups seen in social networking sites such as Reddit [8] and Face-
book [29] that can sustain up to years. In this section, we start with
discussing the phenomena of lifecycle dichotomy we observe from
the group activity temporal data. To do this, we define the lifespan
of a social messaging group below.
Definition 1. Group Lifespan. We define it by the duration
from the timestamp at which a group is initialized, to the times-
tamp at which no group member sends chat messages anymore.
100
10-1
n
o
i
t
c
a
r
F
10-2
0
5
15
10
25
Group Lifespan(day)
20
(a) Histogram
F
D
C
1.0
0.8
0.6
0.4
0.2
0.0
30
0
5
20
15
10
25
Group Lifespan(day)
(b) CDF
30
Figure 2: Group Lifecycle Dichotomy. Left: Histogram of
group lifespan (measured by day); Right: Cumulative distri-
bution function (CDF) of group lifespan.
We begin by analyzing the distribution of lifespan among all the
474,726 group samples. Since we stop our data collection on the
day of August 28, 2015, the longest lifespan a group can have is
34 days during the period of our observation. Figure 2(a) and Fig-
ure 2(b) display the distribution and Cumulative distribution func-
tion (CDF) of group lifespan respectively. A salient observation
drawn from the result is that the histogram of group lifespan is
dominated by two peaks: one appears on the leftest (near a few
hours) and another appears on the rightest side (near one month).
This implies a strong dichotomy exists among groups in terms of
their lifecycle, and we accordingly make a conceptual difference
between two types of groups:
• Short-term groups: this type of groups emerge and die very
quickly, and usually have lifespan ranging from hours to a
few days. For example, Figure 2(b) shows that almost 40%
of groups stop interaction within only a week.
• Long-term groups: this type of groups can survive a much
longer period of time than short-term groups. Figure 2(b)
shows that about 30% groups fall into this category and can
sustain longer than 30 days.
The phenomena of lifecycle dichotomy also leads us to the
question of how does the lifecycle and growth pattern of social
messaging groups correlate with the social functions it is serv-
ing? To address this, we manually examine 100 randomly selected
groups, among which 60 are long-term groups and 40 are short-
term groups, respectively. We categorize these groups according
to their social functions (the title of groups) by hand, and list the
details in Table 2. Quite interestingly, we find that most short-
term groups are event-driven (e.g., travel groups, meeting groups
and dining groups), while long-term groups are more relationship-
driven (e.g., family groups, colleague groups and friend groups).
Table 2: Case study by group displayed name.
Category
Travel
Meeting
Event
Entertain
Organization
Class
Friend
Family
Long
Short Example
0
1
4
5
9
12
13
16
8
2
13
13
0
4
0
0
Discuss on a short trip
Schedule an official meeting
Plan a wedding
Dine together
Departments of company
Course for GRE test
Childhood friend
A family of three
4.1 Group Structure Dynamics
In this subsection, we move on to study the underlying structural
change of messaging groups over time. We investigate several rep-
resentative structural features (e.g., open triad count, closed triad
count and edge density), and quantitatively analyze the how these
features evolve in a different pattern with respect to the long-term
and short-term groups, respectively.
Triad Count.
The studies about transitivity in social net-
works [18] suggest that the local structure in social networks can be
expressed by the triad count. In WeChat groups, we try to examine
whether long-term and short-term groups show different transitivity
patterns. We take into account both the open triad count and close
triad count, based on the friendship networks structure of sampled
WeChat groups. To illustrate this, Figure 3(a) shows an example
of a small WeChat group friendship networks, in which nodes A,
B and C form a closed triad; nodes A, C and D is considered an
open triad.
Edge Density. We also consider the feature of internal edge den-
sity of a group, which is defined by the fraction of edges (friend-
ships) within the group among all the possible edges when the
group is fully connected.
To see how these structural features change over time, we take
two snapshots for the groups: one at the time when the groups are
initialized (we choose ∼10 minutes in this study), another after
one month being setting up. We consider long-term and short-term
D
C
A
B
(a) Example
(b) Open triads
(c) Closed triads
(d) Edge density
Figure 3: Group Structure Pattern. (a): An example of group friendship networks. Group members and friend relationships are
represented as nodes and dot lines, respectively. For this example, we can see A, B and C are connected as a closed triad; A, C
and D are connected as an open triad. The edge density of this group is 0.476. (b) (c): Horizontal axis is the normalized number of
open/closed triads at the setting up of a WeChat group, and vertical axis is the normalized number of open/closed one month later.
(c): Horizontal axis is the edge density at the setting up of a WeChat group, and veritcal axis is the edge density one month later.
groups separately in order to see the different patterns of structural
patterns between these two. We also remark here that although
short-term groups may stop messaging interactions at some point,
members within the groups are still likely to build friendship as
long as they maintain the group membership, and thus affect the
underlying friendship network structure for potentially longer pe-
riod of time.
Figure 3(b), Figure 3(c) and Figure 3(d) show the results for fea-
ture dynamics of open triad count, close triad count and edge den-
sity, respectively. Note that if the structure of groups are not chang-
ing at all, we would expect to see a scatter plot centering around the
diagonal line of y = x (with normalization). From the visualiza-
tion results, it is interesting to first observe the different evolution
patterns exhibited between short-term groups and long-term groups
- the long-term ones show stronger dynamics in terms of the un-
derlying friendship structure features while most short-term groups
are less likely to develop friendship over time.
We infer such dichotomy in structure dynamics is related to the
social roles and functions for the social groups to be setup. For
example, a colleague's group served for long-term communications
is more likely to develop social connections between members, as
opposed to a group setup for some specific social event.
4.2 Cascade Tree Pattern
Beside studying the friendship structure, we also discuss the
group formation processes, namely by investigating the group
membership invitation cascading tree structure. We start with
defining the group cascade tree below.
Definition 2. Group Cascade Tree. A directed graph where
each group member is a node, and a directed edge from u to v
is constructed if u (inviter) successfully invites v (invitee) to the
group. The tree is rooted at the user who initiated the group. Cy-
cles are impossible since inviters always join the group earlier than
invitees.
To show how long-term and short-term groups differ in terms
of cascade tree structure, Figure 4(a) and Figure 4(b) show the ex-
amples for two types of WeChat group cascade tree. We find that
long-term groups tend to exhibit a deeper tree structre with more
branchings; whereas many short-term group cascade trees display
an approximate star graph structure with most members being the
leaves of the root node. In order to quantify such difference, we
consider here four representative features concerning the structure
of cascade trees.
Cascade Size. We start our analysis on cascade tree by examin-
ing the total number of nodes in the cascade tree, i.e., group size.
Figure 5(a) shows the normalized distribution of cascade tree size
(a) Example of long-term group
(b) Example of short-term group
Figure 4: Example of WeChat group cascade tree for long-term
group and short-term group, respectively.
for both types of groups. We find that long-term groups tend to
have larger size (up to 500 by default) while the size of short-term
groups diminishes around 100. This is not very surprising since
long-term groups can be advantageous in gaining more members
give a longer timespan for growth.
Invitation as a Function of Cascade Depth. A natural way to
measure the difference in cascade tree between long-term groups
and short-groups is to examine the distribution of cascade depth at
which the invitation occur. We measure the cascade depth for each
of the invitation happens during our observation period, which is
defined by the number of steps from the root to the group member
in the cascade tree. Figure 5(c) shows the normalized distribution
of cascade depth among all the invitations in our dataset. We ob-
serve that more invitations occurs far from the root in long-term
groups than that in short-term groups. For example, 10% of invita-
tions in long-term groups occur at depth 3 or greater; whereas for
short-term groups, only less than 1% of invitations occur at depth
3 or greater.
Invitation as a Function of Subtree Size. Finally, we measure the
difference of cascade tree structure between long-term groups and
short-term groups by measuring the size of subtree for each node in
the cascade tree. In Figure 5(b), we show the distribution of the cas-
cade subtree size for each node resides in the cascade tree, aggre-
gated among all the sampled groups. Again, we observe substantial
difference between long-term groups and short-term groups. For
example, 30% of nodes in the cascade tree of long-term groups
have subtree size greater than 10; whereas only 10% of nodes have
subtree size greater than 10 in short-term groups.
Structural Virality. We also quantify cascade trees by measur-
ing their structural virality as that used in [16]. Structural virality,
also know as Wiener index, is useful for disambiguating between
shallow, broadcast-like diffusion and the deep branching structures.
100
10-1
10-2
10-3
10-4
10-5
C
≥
s
p
u
o
r
g
f
o
n
o
i
t
c
a
r
F
e
z
i
s
h
t
i
w
100
10-1
10-2
10-3
10-4
10-5
x
≥
s
r
e
b
m
e
m
e
z
i
s
f
o
s
e
e
r
t
n
i
f
o
n
o
i
t
c
a
r
F
Long-term
Short-term
101
102
Size of group C
(a) Group size
Short-term
Long-term
101
Subtree size
(b) Subtree size
102
s
n
o
i
t
a
t
i
v
n
i
f
o
n
o
i
t
c
a
r
F
x
≥
h
t
p
e
d
t
a
100
10-1
10-2
10-3
10-4
10-5
10-6
10-7
Short-term
Long-term
x
≥
s
p
u
o
r
g
f
o
n
o
i
t
c
a
r
F
x
e
d
n
i
r
e
n
e
i
w
h
t
i
w
100
10-1
10-2
10-3
10-4
10-5
7
8
9
10
1
2
4
3
5
6
Depth
(c) Depth
Long-term
Short-term
1
2
3
4
5
6
7
8
Wiener Index
(d) Wiener index
Figure 5: Cascade tree related feature distributions. (a): Distribution over group size. Vertical axis is the fraction of groups with size
larger than C. (b): Distribution over subtree size. Vertical axis is the fraction of non-singleton members in trees of specific size. (c):
Distribution over cascade depth. (d): Distribution over Wiener index.
Wiener index is defined by the average distance between any two
nodes in the cascade tree. For example, the cascade trees in Fig-
ure 4(a) and Figure 4(b) have Wiener indexes of 3.99 and 1.83,
respectively. In Figure 5(d), we show the distribution of Wiener in-
dex of cascade trees for both long-term and short-term groups. We
observe that more than 99% of short-term groups have Wiener in-
dex smaller than 2, which implies that most membership cascades
happen in a broadcast fashion, settled mostly by the root node.
4.3 Group Lifecycle Prediction
The strong dichotomy of group lifecycle and structure dynamics
leads us to a natural modeling and prediction questions -– how
separable are the long-term and short-term groups by taking into
account the structural, behavioral as well as demographical fea-
tures? Can we predict whether a social group will grow and persist
in the long run by analyzing the structural and behavioral patterns
exhibited by the group at its early stage? In this section, we address
both issues through analyzing the snapshots of millions of groups,
combining a broad range of features.
4.3.1 Separability Model
In this model, we consider the task of predicting whether a group
is long-term or short-term, from features including the underlying
group network structure, the membership cascade tree properties,
and the demographics entropy of group members. The full list of
features can be found in Table 5, where we are only using group-
level ones for this task.
To train the separability model, we construct the training dataset
by labeling groups with less than 5 days of lifespan as negative ex-
amples, and groups with longer than 25 days of lifespan as positive
examples. We represent each group as a feature vector extracted
one month after groups are built, and further train the dataset using
support vector machine (SVM) [14] with 10-fold cross validation.
Table 3: Feature contribution analysis on the separability of
long-term and short-term groups.(%)
Features used
All Features
-Structure
-Cascade
-Demographics
Random Guess
+Structure
+Cascade
+Demographics
AUC Prec. Rec.
66.62
57.66
62.83
64.75
47.67
65.36
65.71
65.24
50.00
50.00
64.21
42.51
65.71
61.23
62.77
41.41
63.23
59.36
64.49
57.35
50.00
61.98
57.35
63.18
F1
60.32
61.04
54.82
61.25
50.00
50.43
61.25
50.03
mance by considering only one at a time. And we find that the set
of structural features by itself can yield high accuracy, which again
confirms that strong distinctions exist between short-term and long-
term group structures.
4.3.2 Early Prediction of Group Lifecycle
Given the strong separability between the long-term and short-
term groups, we pose a fundamental question of how well can we
predict if a group can grow and persist in the long run, from the
features exhibited in its early age?
Table 4: Group lifecycle early prediction performance re-
sults(%). We train the classifier using all the group-level fea-
tures.
Features used AUC Prec. Rec.
56.80
53.38
54.11
56.81
56.56
57.66
1 hour
1 day
5 days
10 days
20 days
1 month
54.16
61.92
62.52
62.48
62.78
63.23
57.95
65.08
65.46
65.57
65.76
66.62
F1
55.45
57.34
58.01
59.51
59.51
60.32
The way we implement the early prediction model is largely sim-
ilar to the separability model previously except for the subtle dif-
ference that group features (see group-level features in Table 5) are
extracted at earlier timestamps. Specifically, for each group in our
training set, we take multiple snapshots at the age of 1 hour, 1 day,
5 days, 10 days, 20 days and 1 month, and calculate the feature
vector accordingly. We repeat similar procedure to train the dataset
with respect to features extracted at various timestamp, and com-
pare the training performance. Table 4 shows the prediction per-
formance results at different stages. We find that features extracted
one day after the groups being set up can yield AUC accuracy as
high as 65.08%, which is almost as good as the prediction accuracy
of 66.62% when adopting features at timestamp of 1 month.
The results of early prediction model reassure that the likelihood
for social messaging group to grow in the future can be well in-
ferred from its very early age (e.g., 1 day). Such predictability is in
contrast to previous study on predicting the longevity of online so-
cial communities [20] which requires features at the age of months
for making short-term prediction and years for making long-term
prediction. And again this is partly due to the different nature of
social messaging groups and online communities in terms of the
lifecycle.
The prediction results are shown in Table 3. We find that highest
classification accuracy (66.62% AUC) can be obtained with full set
of features. We further investigated how each set of features (i.e.,
structure, cascade and demographics) affects the training perfor-
5. MEMBERSHIP CASCADE PROCESS
Now we have modeled the growth and evolution of social mes-
saging groups from a group-level perspective. In this section, we
approach the problem with a focus on the individual-level and study
the membership cascade process by which group gain new mem-
bers.
To start with, we introduce a group membership cascade model,
as illustrated in Figure 6. The model captures two important roles:
inviter - a group member who sends invitation to friend(s), and
invitee - the individual in the inviter's ego networks who gets in-
vited to the group chat2. For instance, the big dotted circle in Fig-
ure 6 encompasses all the current members within a group. There
are two essential steps behind each invitation: 1) a member in a
group become active (denoted by blue in Figure 6), and 2) the ac-
tive member selects his/her friends (denoted by red in Figure 6) into
the group chat.
regular
inviter
invitee
fringe
invite
friendship
Figure 6: Graphical example of WeChat groups' cascade pro-
cess model. At some timestamp T , some members in a group
become active (denoted by blue) and select their friends (de-
noted by red) to the group chat.
5.1 Membership Cascade Pattern
5.1.1 Behavioral Pattern
To have a better understanding of membership cascade pattern,
it is important to first study group members' behavioral pattern.
For example, an interesting question would be how often do people
invite their friends into the group chat once they become a group
member? This can also be phrased as how often do membership
cascade happen in social messaging groups? In this subsection, we
provide some empirical findings concerning members' invitation
behavior pattern measured by the concepts of invitation interval
and first invitation latency defined below.
Definition 3. Invitation Interval is defined as the time inter-
val between any two consecutive invitations from a group member.
Additionally, First Invitation Latency is defined as the interval be-
tween the timestamp at which a user joins a group (invited by some
existing member) and the timestamp when he/she, for the first time,
invites another friend to the same group.
Intuitively, investigating the action of a group member's first in-
vitation is useful since it signifies how well has he/she been adapt-
ing to the current group, and how strong the sense of relevance
he/she has with respect to the current group.
To address above questions, we obtain the distribution of invi-
tation interval and first invitation latency, aggregating over each
member in each group. Figure 7(a) and Figure 7(b) show the
CDF curve of first invitation latency and invitation interval, respec-
tively. We observe the invitations in WeChat groups are highly
time-sensitive. On the one hand, when one is invited to a group,
2On WeChat, instead of sending group invitation to any registered
user, one can only invite his/her current friends into the group chat.
F
D
C
1.0
0.8
0.6
0.4
0.2
0.0
0
5
10
15
20
Time interval between
membership and first invitation (day)
(a) First invitation latency
1.0
0.8
0.6
0.4
0.2
0.0
0
F
D
C
25
2
4
6
8
10
Time Interval between
two consecutive invitations(day)
(b) Invitation interval
Figure 7: Dynamic pattern of invitations. Left: Cumulative
distribution function (CDF) of first invitation latency (measured
by day); Right: Cumulative distribution function (CDF) of in-
vitation interval (measured by day). The invitations in WeChat
group display a highly time-sensitive pattern.
he/she tends to start invite other people soon. For example, about
80% of the first invitations happen within 5 days after the inviter
joining the group. On the other hand, we find that members suf-
fer from a longer latency in sending their first invitations than the
invitation interval in general. For example, more than 80% of con-
secutive invitations happen within 2 days of interval.
5.1.2 The Influence of Local Structure
In this subsection, we probe into the local structure of group and
investigate how the membership cascade process is influenced by
the structural features. Specifically, we study how the probability
for a user u being invited by his/her friend into a group is affected
by the structure of ego networks of u.
Backstrom et al. Revisit. In the context of online social networks,
Backstrom et al. [6] introduced the probability that an individual
adopts and joins a community with the number of friends already
in the group.
As noted earlier, a significant difference in our setting of social
messaging group is that new group members are "passively invited"
to the group rather than "actively adopt" the group. To this end, we
calculate P (k) - the fraction of user who is invited to a commu-
nity as a function of the number of k of their friends who are already
members, with slightly tweaking the definition in [6]. Specifically,
we first take two snapshots of group membership, with 10 days
apart. We find tuples (u, C, k) where u /∈ C at the time of the first
snapshot and u has k friends in C at that time. We then compute
P (k) by looking at the fraction of tuples (u, C, k) that u ∈ C at the
time of the second snapshot.
The results for WeChat group (see Figure 8(b)) exhibit an in-
teresting contrast to the curves of LiveJournal and DBLP groups
shown in Backstrom, Huttenlocher, Kleinberg and Lan [6]. Instead
of observing an increasing trend of the curve with respect to larger
values of k, we find a qualitatively different shape where the adop-
tion probability suffers from a slight decrease at moderate values of
k, and drastic fluctuations when k exceeds 40. We infer such dif-
ference is caused by the mechanism inherent to WeChat, that when
a group has more than 40 users, inviting friends to join the group
requires their confirmation. We leave the detailed inspection on this
for future investigation.
Furthermore, we also observe a strong evidence for the influence
of structural locality. In particular when k is small, the fraction of
invitee (invited to the group) with 10 friends already in the group
(k = 10) is twice as much as the fraction of invitee with 5 friends
in the group (k = 5).
2.0
1.5
1.0
0.5
D
B
A
V
C
f
o
y
t
i
l
i
b
a
b
o
r
P
)
%
(
p
u
o
r
g
e
h
t
o
t
d
e
t
i
v
n
i
g
n
i
e
b
f
o
y
t
i
l
i
b
a
b
o
r
P
)
%
(
p
u
o
r
g
e
h
t
o
t
d
e
t
i
v
n
i
g
n
i
e
b
1.4
1.2
1.0
0.8
0.6
0.4
0.2
0.0
0
2 friends
3 friends
4 friends
5 friends
6-10 friends
>10 friends
2
4
6
8
10
12
14
The number of connected components
0.0
0
The number of friends k already in the group
10
20
30
40
50
60
70
(a) Example of local structure
(b) #Friend in group
(c) Structure diversity
Figure 8: Local structure pattern of invitations. (a): Illustration of a potential invitee's ego networks. Give a group C, blue nodes
represent user v's friends who have been in the group, while the white nodes denote those users in v's ego networks who did not
join the group. (b): The probability p of being invited to a WeChat group as a function of the number of friends k already in the
group. Error bars represent 95% confidence interval. (c): The effect of structure diversity. Structural diversity is represented
by the number of connected components formed by the friends already in the group. Horizontal axis is the number of connected
components formed by friends already in the group and the vertical axis is the probability p of being invited to a WeChat group.
Table 5: List of features used in this study.
Group Level (for group C at time T )
Number of individuals with a friend in C (the fringe of C)
Number of edges with one end in the group and the other in the fringe.
Number of edges with both ends in the group.
The number of open triads at time T and at the setting up of group.
The number of closed triads at time T and at the setting up of group.
Clustering coefficient.
Number of Members (C).
Tenth quantile of members' depth in the cascade tree.
Tenth quantile of members' subtree size.
Number of members whose depth equal to k, k = 1, 2, . . . , 9.
The sum of the lengths of the shortest paths between all pairs of vertices, i.e., Wiener index.
Number, fraction of members from country X.
Number, fraction of members who stated their gender to be X.
Number, fraction of membes who stated their age to be X.
Entropy of member's region (country, province, city) distribution, e.g., − Px∈Countries P (x) log2 P (x).
Entropy of member's age: − Px∈Ages P (x) log2 P (x).
Entropy of member's gender: − Px∈Genders P (x) log2 P (x).
Inviter Level (for member u in group C at time T )
How long has it been since u joined C.
How long has it been since u invited others to C.
The number of users that u invited to C before time T .
The number of chat made by the individual.
The number of u's friends in the fringe with ≥ k friends in the group, 1 ≤ k ≤ 20, k = 30, 40, 50
The number and fraction of u's friends in the group: {vv ∈ ego(u) ∧ v ∈ C}.
The number and fraction of u's friends not in the group: {vv ∈ ego(u) ∧ v 6∈ C}.
The number of cross group edges in u's ego networks: {(v, w)v ∈ C ∧ w 6∈ C ∧ u, w ∈ ego(u)}.
The ratio of cross group edges to cross group edges that could possible exist in u's ego networks.
The depth of u in cascade tree.
Invitee Level (for user u in the fringe of group C at time T )
User u's stated gender.
User u's stated age.
User u's stated region (country, province and city).
The fration of group member who has the same gender as u.
The fration of group member who has the same age as u.
The fration of group member who has the same region (country, province, city) as u.
Number of friends already in the group.
Number of friend in group C who are classified as acitive inviters.
Number of connected components formed by friends already in the group.
Group Structre
Cascade Tree
Demographics
History Behavior
Local Structure
Demographics
Local Structure
Structural Diversity. The above analysis informs us that the num-
ber of friends in the group can affect whether a user gets invited.
Yet it is unclear how it is affected by the local network structure.
In this subsection, we study how structural diversity of user u's ego
networks [34] affects the probability for u to be invited by friends
into a group.
For a given user u with k friends already in a group, we mea-
sure structural diversity by counting the connected components in
the networks formed by these k friends. For example, as illustrated
in Figure 8(a), user v has four friends (A, B, C and D) already
in a group. A, B, C and D form 3 connected components, i.e.,
{A, B}, {C} and {D}. Figure 8(c) plots the curves of the proba-
bility of being invited to a group with respect to the number of con-
nected components formed by friends already in group. We choose
the parameter k (i.e., the number of friends already in group) to be
2, 3, 4, 5, 6-10 and > 10, respectively. Interestingly, we find that
given a fixed k, the more closely these k friends are connected, the
more likely u will be invited to the group.
5.2 Membership Cascade Prediction
Now we have seen how the membership cascade process can
be affected by both users' behavioral pattern as well as the local
structure surrounding a user. In this subsection, we propose a pre-
diction model by integrating a comprehensive set of behavioral and
structural features. This can be used in practice to make effective
inference on the membership cascade process. Specifically, given
the historical behavior of group members as well as the local social
structure, can we predict which members in the group are more
likely to be active and invite new users to the group chat and to
whom will he/she send invitations to?
To address the issue, we separately model the inviter prediction
and invitee prediction problems.
Inviter Prediction. At some timestamp T , for a given group C and
a specified user u ∈ C, our learning task here is to predict whether
u will become active and invite friends to C during the time interval
(T , T + ∆t].
Invitee Prediction. At some time T , for a given group C and a
user u ∈ f ringe(C), our learning task here is to predict whether u
(one-hop neighbor of current members) will be invited to C during
the time interval (T , T + ∆t].
For both prediction task, we construct each training example
by randomly selecting T from 10 minutes to 1 month, and fix-
ing ∆t = 1 day. We also notice that, on average, only 5.6% of
group members have invitation action and fewer than 1% among
users in the fringe of groups are invited, causing the number of
positive examples and negative examples quite unbalanced. We
thus down-sample [22] the size of negative examples and maintain
a positive/negative ratio of 1:2 in our training set.
Table 6:
inviter/invitee-level feature contribution analysis (%).
Performance of
inviter/invitee prediction and
Task
Features used
All
Inviter
-History Behavior
-Local Structure
Invitee
All
-Demographics
-Local Structure
AUC Prec. Rec.
88.39
95.31
84.31
91.52
93.22
87.04
93.47
98.66
94.68
98.05
89.29
76.53
85.95
82.07
84.50
54.55
45.76
11.85
F1
87.15
83.17
85.75
68.89
61.70
20.52
We incorporate both group-level and inviter-level features seen
in Table 5 for training the inviter model; and use instead the group-
level and invitee-level features for invitee model. We further train
the dataset using support vector machine (SVM) [14] with 10-fold
cross validation. The prediction performance results are shown in
Table 6. We see that our model is quite effective, with AUC of
95.31% in predicting inviter, and an AUC of 98.66% in predicting
invitee. We further investigated how each set of features affects the
training performance by considering only one at a time. Quite inter-
estingly, we find that historical behavioral features can be important
factors in the task of predicting inviter; while local structural fea-
tures are the dominant ones in predicting invitee. The information
of demographics exert little affect on the performance of predicting
invitee, which implies that our model can be generalizable without
requiring user-specific attributes.
6. CONCLUSION
Summary.
In this paper, we studied the formation and evolution
of chat groups in the context of social messaging - their lifecy-
cles, the change in their underlying structures over time, and the
diffusion processes by which they develop new members. We use
a large collection of anonymized data from WeChat group messag-
ing platform, providing analysis on dynamics of millions of groups
by keeping track of their emergence, growth and demise over time.
We discovered a strong dichotomy of groups existed in terms of
their lifecycle, and defined two types of groups accordingly: long-
term and short-term groups. First, we developed an effective sep-
arability model by taking into account a broad range of group-
level features, showing that long-term and short-term groups are
inherently distinct. We also found that the lifecycle of messaging
groups is largely dependent on their social roles and functionalities
in users' daily social experiences and specific purposes. Specifi-
cally, event-driven groups in general have a shorter lifespan as ap-
posed to those friendship groups serving for frequent catching-up
purpose. Given the strong separability between the long-term and
short-term groups, we further addressed the problem of early pre-
diction in group longevity, and demonstrated that strong prediction
results can be obtained even with a group's history up to one day.
In addition to modeling the growth and evolution from a group-
level perspective, we also investigated the individual-level at-
tributes of group members and study the diffusion process by which
groups gain new members. We developed a membership cascade
process model in which we consider users' historical engagement
behavior as well as the local social network structure that users em-
bedded in. We demonstrated the effectiveness by achieving AUC
of 95.31% in the inviter prediction model using all features, and an
AUC of 98.66% in the invitee prediction model.
Future Research. Ours findings raise many important open ques-
tions that would be interesting to take into account in future re-
search. First, our design of membership cascade model can be used
for group member recommendation, and may be potentially inte-
grated into current WeChat platform. This can motivate research
on conducting online experiments and investigating whether users
are likely to adopt the group member recommendations, and under
what circumstances. Such studies will also lead to design of better
group chat platforms and engage users more effectively.
Acknowledgements. We thank Chenhao Tan and Tracy Xiao
Liu for their comments.
Jiezhong Qiu and Jie Tang are sup-
ported by 863 (No. 2014AA015103), 973 (No. 2014CB340506,
No. 2012CB316006), NSFC (No. 61222212), and NSSFC (No.
13&ZD190). Yixuan Li and John E. Hopcroft are supported by
the US Army Research Office W911NF-14-1-0477. Qiang Yang is
supported by 973 (No. 2014CB340304). This work is also sup-
ported by research fund of Tsinghua-Tencent Joint Laboratory.
7. REFERENCES
[1] WeChat group chat features.
www.wechat.com/en/features.html#group.
[2] WeChat wiki. en.wikipedia.org/wiki/WeChat.
[3] E. Adar, L. Zhang, L. A. Adamic, and R. M. Lukose. Implicit
structure and the dynamics of blogspace. In Workshop on the
weblogging ecosystem, pages 16989–16995, 2004.
[4] A. Anderson, D. Huttenlocher, J. Kleinberg, J. Leskovec, and
M. Tiwari. Global diffusion via cascading invitations:
Structure, growth, and homophily. In WWW, pages 66–76,
2015.
[5] S. Aral, L. Muchnik, and A. Sundararajan. Distinguishing
influence-based contagion from homophily-driven diffusion
in dynamic networks. Proceedings of the National Academy
of Sciences, 106(51):21544–21549, 2009.
[6] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan.
Group formation in large social networks: membership,
growth, and evolution. In KDD, pages 44–54. ACM, 2006.
[7] E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The role of
social networks in information diffusion. In WWW, pages
519–528, 2012.
[8] C. Buntain and J. Golbeck. Identifying social roles in reddit
using network structure. In Proceedings of the companion
publication of the 23rd international conference on World
wide web companion, pages 615–620. ACM, 2014.
[9] B. S. Butler. Membership size, communication activity, and
sustainability: A resource-based model of online social
structures. Information systems research, 12(4):346–362,
2001.
[10] M. Cha, A. Mislove, B. Adams, and K. P. Gummadi.
Characterizing social cascades in flickr. In Proceedings of
the first workshop on Online social networks, pages 13–18,
2008.
[11] J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and
J. Leskovec. Can cascades be predicted? In WWW, pages
925–936. ACM, 2014.
[12] K. Church and R. de Oliveira. What's up with whatsapp?:
comparing mobile instant messaging behaviors with
traditional sms. In Mobile-CHI, pages 352–361. ACM, 2013.
[13] N. Ducheneaut, N. Yee, E. Nickell, and R. J. Moore. The life
and death of online gaming communities: a look at guilds in
world of warcraft. In Proceedings of the SIGCHI conference
on Human factors in computing systems, pages 839–848,
2007.
[14] R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J.
Lin. Liblinear: A library for large linear classification. The
Journal of Machine Learning Research, 9:1871–1874, 2008.
[15] M. Girvan and M. E. Newman. Community structure in
social and biological networks. Proceedings of the national
academy of sciences, 99(12):7821–7826, 2002.
[16] S. Goel, A. Anderson, J. Hofman, and D. Watts. The
structural virality of online diffusion. Preprint, 22:26, 2013.
[17] M. Gomez Rodriguez, J. Leskovec, and A. Krause. Inferring
networks of diffusion and influence. In Proceedings of the
16th ACM SIGKDD international conference on Knowledge
discovery and data mining, pages 1019–1028. ACM, 2010.
[18] P. W. Holland and S. Leinhardt. Transitivity in structural
models of small groups. Comparative Group Studies, 1971.
[19] J. Hopcroft, O. Khan, B. Kulis, and B. Selman. Natural
communities in large linked networks. In Proceedings of the
ninth ACM SIGKDD international conference on Knowledge
discovery and data mining, pages 541–546. ACM, 2003.
[20] S. R. Kairam, D. J. Wang, and J. Leskovec. The life and
death of online groups: Predicting group growth and
longevity. In WSDM, pages 673–682. ACM, 2012.
[21] I. Kloumann, L. Adamic, J. Kleinberg, and S. Wu. The
lifecycles of apps in a social ecosystem. In WWW, pages
581–591, 2015.
[22] M. Kubat, S. Matwin, et al. Addressing the curse of
imbalanced training sets: one-sided selection. In ICML,
volume 97, pages 179–186, 1997.
[23] H. Kwak, C. Lee, H. Park, and S. Moon. What is twitter, a
social network or a news media? In WWW, pages 591–600.
ACM, 2010.
[24] J. Leskovec, L. A. Adamic, and B. A. Huberman. The
dynamics of viral marketing. ACM Transactions on the Web
(TWEB), 1(1):5, 2007.
[25] J. Leskovec, M. McGlohon, C. Faloutsos, N. S. Glance, and
M. Hurst. Patterns of cascading behavior in large blog
graphs. In SDM, volume 7, pages 551–556. SIAM, 2007.
[26] Y. Li, K. He, D. Bindel, and J. E. Hopcroft. Uncovering the
small community structure in large networks: A local
spectral approach. In WWW, pages 658–668, 2015.
[27] M. E. Newman. Detecting community structure in networks.
The European Physical Journal B-Condensed Matter and
Complex Systems, 38(2):321–330, 2004.
[28] G. Palla, A.-L. Barabási, and T. Vicsek. Quantifying social
group evolution. Nature, 446(7136):664–667, 2007.
[29] N. Park, K. F. Kee, and S. Valenzuela. Being immersed in
social networking environment: Facebook groups, uses and
gratifications, and social outcomes. CyberPsychology &
Behavior, 12(6):729–733, 2009.
[30] B. Ribeiro. Modeling and predicting the growth and death of
membership-based websites. In WWW, pages 653–664.
ACM, 2014.
[31] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in
the mechanics of information diffusion across topics: idioms,
political hashtags, and complex contagion on twitter. In
WWW, pages 695–704. ACM, 2011.
[32] E. Sun, I. Rosenn, C. Marlow, and T. M. Lento. Gesundheit!
modeling contagion through facebook news feed. In ICWSM,
2009.
[33] Y. Sun, J. Tang, J. Han, C. Chen, and M. Gupta.
Co-evolution of multi-typed objects in dynamic star
networks. IEEE TKDE, 26(12):2942–2955, 2014.
[34] J. Ugander, L. Backstrom, C. Marlow, and J. Kleinberg.
Structural diversity in social contagion. Proceedings of the
National Academy of Sciences, 109(16):5962–5966, 2012.
[35] D. J. Watts. A simple model of global cascades on random
networks. Proceedings of the National Academy of Sciences,
99(9):5766–5771, 2002.
[36] L. Weng, F. Menczer, and Y.-Y. Ahn. Virality prediction and
community structure in social networks. Scientific reports, 3,
2013.
[37] J. Yang, X. Wei, M. S. Ackerman, and L. A. Adamic.
Activity lifespan: An analysis of user survival patterns in
online knowledge sharing communities. In ICWSM, 2010.
|
1807.03675 | 1 | 1807 | 2018-07-10T14:31:36 | Event Detection and Retrieval on Social Media | [
"cs.SI"
] | In the recent years, we have witnessed the rapid adoption of social media platforms, such as Twitter, Facebook and YouTube, and their use as part of the everyday life of billions of people worldwide. Given the habit of people to use these platforms to share thoughts, daily activities and experiences it is not surprising that the amount of user generated content has reached unprecedented levels, with a substantial part of that content being related to real-world events, i.e. actions or occurrences taking place at a certain time and location. Given the key role of events in our life, the task of annotating and organizing social media content around them is of crucial importance for ensuring real-time and future access to multimedia content about an event of interest. In this chapter, we present several research efforts from recent years that tackle two main problems: a) event detection and b) event-based media retrieval and summarization. Given archived collections or live streams of social media items, the purpose of event detection methods is to identify previously unknown events in the form of sets of items that describe them. In general, the events could be of any type, but there are also approaches aiming at events of specific type. Given a target event the goal of event summarization is first to identify relevant content and then to represent it in a concise way, selecting the most appealing and representative content. | cs.SI | cs |
Event Detection and Retrieval on Social Media
Manos Schinas1,2, Symeon Papadopoulos1, Yiannis Kompatsiaris1, and Pericles
Mitkas2
1 Centre for Research and Technology Hellas
{manosetro,papadop,ikom}@iti.gr
2 Aristotle University of Thessaloniki
[email protected], [email protected]
1
Introduction
In the recent years, we have witnessed the rapid adoption of social media plat-
forms, such as Twitter, Facebook and YouTube, and their use as part of the
everyday life of billions of people worldwide. Given the habit of people to use
these platforms to share thoughts, daily activities and experiences it is not sur-
prising that the amount of user generated content has reached unprecedented
levels, with a substantial part of that content being related to real-world events,
i.e. actions or occurrences taking place at a certain time and location. Figure
1 illustrates three main categories of events along with characteristic photos
from Flickr3 for each of them: a) news-related events, e.g. demonstrations, ri-
ots, public speeches, natural disasters, terrorist attacks, b) entertainment events,
e.g. sports, music, live shows, exhibitions, festivals, and c) personal events, e.g.
wedding, birthday, graduation ceremonies, vacations, and going out.
Depending on the event, different types of multimedia and social media plat-
form are more popular. For instance, news-related events are extensively pub-
lished in the form of text updates, images and videos on Twitter and YouTube,
entertainment and social events are often captured in the form of images and
videos and shared on Flickr and YouTube, while personal events are mostly
represented by images that are shared on Facebook and Instagram.
Given the key role of events in our life, the task of annotating and organizing
social media content around them is of crucial importance for ensuring real-time
and future access to multimedia content about an event of interest. However,
the vast amount of noisy and non-informative social media posts, in conjunc-
tion with their large scale, makes that task very challenging. For instance, in
the case of popular events that are covered live on Twitter, there are often mil-
lions of posts referring to a single event, as in the case of the World Cup Final
2014 between Brazil and Germany, which produced approximately 32.1 million
tweets with a rate of 618,725 tweets per minute4. Processing, aggregating and
selecting the most informative, entertaining and representative tweets among
such a large dataset is a very challenging multimedia retrieval problem. In other
3 https://www.flickr.com/
4 https://www.engadget.com/2014/07/14/brazil-world-cup-final-records/
2
M. Schinas et al.
Fig. 1. Examples of event categories and images. Figure originally appeared in [61].
cases, the challenge is to discover sets of multimedia items that refer to the
same event within a much larger dataset. That is, for instance, the case with the
Yahoo-Flickr Event Summarization Challenge5, which called for methods that
automatically discover events in the YFCC100M collection [83], which contains
approximately 99 million photos and 1 million videos. In addition to the large
scale of the problem, a challenge in trying to detect events in this collection
stems from the inconsistent quality of user provided metadata: for instance, sev-
eral images have no title or description, are erroneously tagged and are missing
geographical information.
In this chapter, we present several research efforts from recent years that
tackle the two main problems that were discussed above:
– Event detection. Given archived collections or live streams of social media
items, the purpose of these methods is to identify previously unknown events
in the form of sets of items that describe them. In general, the events could
be of any type, but there are also approaches aiming at events of specific
type.
– Event-based media retrieval and summarization. Given a target event
the goal is first to identify relevant content and then to represent it in a
concise way, selecting the most appealing and representative content.
In the following, we will always be referring to events E in relation to collections
C or streams S of multimedia items (images, videos). Individual multimedia
items will be denoted as c (standing for content), and they will refer to tuples of
metadata fields, e.g. a given content item will be denoted as c = {u, t, g, l, d, T, v},
5 http://www.acmmm.org/2015/call-for-contributions/
multimedia-grand-challenges/
Event Detection and Retrieval on Social Media
3
where u denotes the social media user who posted the particular content, t the
publication time, g its geographical location (latitude, longitude), if available,
l its title (label), d its description, T a set of associated tags, and v its visual
content (image, video). The particular fields have been defined based on Flickr,
since Flickr is among the most common multimedia sharing platforms, where
event detection research is performed. However, very similar representations are
applicable to other platforms, e.g. in the case of Twitter, we have a very similar
representation, with the difference that l refers to the tweet text, there is no
description d, T refers to the set of accompanying hashtags, and v refers to
the embedded media content. When necessary the above notation will be used
with subscripts to differentiate between different instances, e.g. event x will be
denoted as Ex and media item i as ci. For our discussion, an event corresponds
to a set of multimedia items that depict scenes from the event, i.e. E = {c}.
The remainder of this chapter is structured as follows: Section 2 reviews the
rich literature on the topic of event detection, organizing methods into feature-
pivot (subsection 2.1), document-pivot (subsection 2.2), and topic modeling ones
(subsection 2.3). Then, Section 3 discusses a number of methods that tackle the
problems of event-oriented retrieval (subsection 3.1) and summarization (sub-
section 3.2). Section 4 provides an overview of evaluation measures and datasets
that are used for evaluating event detection and retrieval methods, along with a
comparative view of reported results. Finally, the chapter concludes in Section
5.
2 Event Detection
Event detection is the problem of associating multimedia items (images, videos)
in a collection C or stream S to a real-world event E. Typically, the event is not
known in advance and is the result of the event detection process. There is a
large variety of methods for event detection, which we group into three categories
based on their principle:
– Feature-pivot: These are based on detecting abnormal patterns in the ap-
pearance of features, such as words. Once an event happens, the expected
frequency of a feature will be abnormal comparing to its historical behavior,
indicating a potential new event.
– Document-pivot: This category comprises methods that represent documents
as items to be clustered using some similarity measure.
– Topic modeling: This includes methods that utilize statistical models to iden-
tify events as latent variables in the documents.
A further attribute of methods pertains to their applicability on static collections
versus streams of documents (static vs stream). Based on this, the methods can
be divided into two main categories: Retrospective Event Detection (RED) and
First Story Detection (FSD). RED methods aim to detect unknown events from
an accumulated set of documents, e.g. a collection of Flickr images or news
articles. On the other hand, FSD methods, also known as new or online event
4
M. Schinas et al.
detection, focus on the real-time discovery of events from a live stream of social
media messages, e.g. tweets. There is also a third category of methods that we
call timeslot-based (TSB): those are positioned between RED and FSD methods
and detect events in a pseudo-incremental way.
An additional attribute for grouping methods is the use of modalities by
each method. Most methods are based on text analysis, but several methods
have been proposed that integrate other modalities available in social media
such as location, time, visual content, etc. Finally, the presented methods are
also categorized by their mode, namely discovery versus detection methods. Fig-
ure 2 illustrates a few important processing paradigms (partitioning, clustering,
filtering) in relation to whether all items in a collection C need to be assigned
to events, and whether all represented events are of interest (discovery mode)
or just a subset of them (detection mode). Table 2 presents an overview of the
methods to be discussed in this section along with their attributes (principle,
static vs stream, modalities, mode).
Fig. 2. Main event detection processing paradigms in relation to whether all items in
a collection are associated with events and whether all events are of interest.
2.1 Feature-pivot methods
This section discusses those event detection methods that rely on the detection
of text features, which are likely to refer to events. These feature-pivot tech-
niques, proposed originally for the analysis of timestamped document streams,
consider an event as a bursty activity that makes some of the text features more
prominent. The intuition behind these methods is that once an event emerges,
Event Detection and Retrieval on Social Media
5
Table 1. Categorization of event detection methods according to different attributes.
The following abbreviations have been used: FEAT/DOC/TOPIC stand for feature-
pivot, doc-pivot and topic modeling approaches, RED/FSD/TSB stand for Ret-
rospective Event Detection, First Story Detection and Timeslot-based approaches,
TXT/VIS/TM/US /SOC/LOC stand for Text, Visual, Time, User, Social links and
Location modalities, and DETECT/DISCOV stand for Detection and Discovery mode.
Principle Static/Stream Modalities
Method
FEAT
Fung et al., 2005 [29]
He et al., 2007 [33]
FEAT
Mathioudakis & Koudas, 2010 [45] FEAT
FEAT
Sakaki et al., 2010 [70]
FEAT
Weng & Lee, 2011 [90]
FEAT
Li et al., 2012 [38]
FEAT
Alvanaki et al., 2012 [4]
Cataldi et al., 2010 [18]
FEAT
FEAT
Parikh & Karlapalem, 2013 [56]
FEAT
Chen & Roy, 2009 [20]
FEAT
Sayyadi et al., 2009 [73]
FEAT
Guille & Favre, 2014 [31]
Zhang et al., 2015 [95]
FEAT
Sankaranarayanan et al., 2009 [72] DOC
DOC
Petrovi´c et al., 2010 [63]
DOC
Becker et al., 2011 [12]
DOC
Lee, 2012 [37]
DOC
Petrovi´c et al., 2012 [64]
Moran et al., 2016 [51]
DOC
DOC
Aggarwal & Subbian, 2012 [1]
DOC
Becker et al., 2009 [10]
DOC
Becker et al., 2010 [11]
DOC
Reuter & Cimiano, 2012 [66]
Petkos et al., 2012 [59]
DOC
DOC
Bao et al., 2013 [7]
DOC
Wang et al., 2012 [87]
DOC
Petkos et al., 2017 [62]
TOPIC
Benson et al., 2011 [13]
Ritter et al., 2012 [69]
TOPIC
TOPIC
You et al., 2013 [92]
TOPIC
Zhou & Chen, 2014 [98]
TOPIC
Zhou et al., 2015 [97]
TOPIC
Cai et al., 2015 [17]
Diao & Jiang, 2013 [25]
TOPIC
TOPIC
Wei et al., 2015 [89]
Hu et al., 2012[35]
TOPIC
Mode
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT
DETECT
TXT
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT, TM
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT, TM
DISCOV
TXT
DISCOV
TXT
DISCOV
TXT, SOC
DISCOV
TXT, TM, LOC
DISCOV
TXT, TM, US, LOC
TXT, TM, LOC
DISCOV
TXT, VIS, TM, US, LOC DISCOV
DISCOV
TXT, VIS, TM, LOC
TXT, TM, LOC
DISCOV
TXT, VIS, TM, US, LOC DISCOV
DETECT
TXT
TXT
DISCOV
DISCOV
TXT, TM, LOC
DISCOV
TXT, TM, LOC
DISCOV
TXT, TM, LOC
DISCOV
TXT, VIS, TM, LOC
TXT, US
DISCOV
DISCOV
TXT, TM, LOC
TXT
DISCOV
TSB
RED
TSB
TSB
TSB
TSB
TSB
TSB
RED
RED
TSB
TSB
TSB
FSD
FSD
FSD
RED
FSD
FSD
FSD
RED
RED, FSD
FSD
RED
RED
RED
RED
RED
RED
RED
RED
RED
RED
RED
RED
RED
6
M. Schinas et al.
certain features related to it will exhibit a similar abnormal rise in their fre-
quency. The type of feature can range from single keywords, named entities and
phrases to social interactions. Traditionally, the distributions of the extracted
features over time is analyzed, anomalies in these distributions are detected, and
finally, the discovery of events is conducted by grouping features that exhibit a
similar behavior. This process is depicted in Figure 3. According to this, an event
is represented as a number of features showing an abnormality in appearance
counts. The initial documents are assigned to the detected events, based mainly
on the appearance of the event-related features in them. As these methods rely
on the modeling of feature appearance in time, a large amount of documents
must be available. Despite being applicable to collections of timestamped doc-
uments, these techniques cannot work in a pure real-time fashion as there is a
need for knowledge of the behavior of feature frequencies over a certain period of
time. To overcome that limitation, an incremental approach is usually followed,
by detecting events on predefined timeslots. Another drawback of feature-pivot
approaches is that as they depend on the detection of a bursty activity, they
typically capture trends. Thus events that are not trendy and do no attract a
lot of attention are likely to be missed.
Fig. 3. Feature-pivot paradigm for event detection.
A seminal feature-pivot method was presented by Fung et al. [29]. This aimed
at detecting bursty events in text streams based on the temporal distributions
of features. Although the approach is related to plain document streams (not
social media), the underlying principle is similar to that of later approaches that
were designed for social media data. The main steps of the proposed method
include a) bursty features identification, b) bursty features grouping into bursty
events, and c) determination of hot periods of the bursty events. The detection of
bursty features is done using the probability of the number of the documents that
contain a feature in a time window. This probability is modeled as a binomial
distribution, of which the parameters are estimated from the whole corpus, i.e.
all the time windows. For a specific time window, a feature is considered bursty
if the number of documents containing it is on the right side of the distribution.
To group bursty features of a text stream into bursty events, a cost function
that depends on the probability of bursty features grouped together is proposed.
This cost function is used in a greedy fashion.
Event Detection and Retrieval on Social Media
7
The work of He et al. [33] is similar to the previous approach, as it constructs
a time-series signal for each term/feature. The signal is formed based on the
DF-IDF values of each term per timeslot, where DF stands for the number
of documents containing a specific word, while IDF for the inverse document
frequency up to the current time window. The Discrete Fourier Transform is then
applied on that signal and the dominant period and dominant power spectrum
are determined. Based on these two values, each feature is classified as high or
low power and high or low periodicity. Regarding periodicity, a signal with a
dominant period higher than T /2 is termed aperiodic, otherwise it is defined
as periodic. For the power spectrum, which expresses the overall activity of the
feature in the corpus and indicates bursty features, the threshold is more difficult
to set. In particular, a set of stop words is determined and the upper bound of
these words dominant power spectrum is used as the threshold. Once each term
is classified as periodic or aperiodic, the distribution of its appearance in time is
modeled. For aperiodic features it is modeled using a single Gaussian, whereas for
periodic events it is modeled using a mixture of Gaussian distributions. Then, in
order to cluster the features, a cost function that depends on the KL-divergence
between pairwise feature distributions and the number of documents in which
both features appear is proposed. A greedy algorithm is used to minimize this
cost function.
TwitterMonitor [45], one of the first feature-pivot approaches applied on
social media messages, finds bursty keywords using an algorithm called Queue-
Burst. This works with a single pass over the data. Once a set of bursty keywords
are determined, they are grouped into trends by an algorithm called GroupBurst
that is executed periodically. Not much detail is provided, however it is men-
tioned that it is based on the "assessment of co-occurrences in recent tweets" and
that a greedy algorithm is used to perform the clustering in a computationally
efficient manner. Subsequently, once such groups of terms are determined, Twit-
terMonitor uses context extraction algorithms like PCA and SVD over the recent
history of trends to identify additional words that are associated with the trend
but do not exhibit bursty behavior. Moreover, it detects the most frequently
used external sources (URLs) and attempts to find geographical hotspots. It
additionally uses Grapevines entity extractor to identify frequently mentioned
entities in trends.
The work of Sakaki et al. [70], in which the authors mine tweets to detect
events such as earthquakes and typhoons, is one of the pioneering works in
event detection from Twitter. An SVM classifier, trained on a manually labeled
Twitter dataset, is used to classify incoming tweets to the positive (earthquakes
and typhoons events) or negative class (anything else). Three types of feature
have been employed for this task: the number of words (statistical), the words
in a tweet message, and the words before and after query words (contextual).
Under the assumption that each Twitter user is regarded as a sensor, and each
positive tweet as a sensory value targeting a specific event, the authors model
event occurrences in time as an exponential distribution, while the location of
earthquakes and trajectory of typhoon is estimated using spatial models based
8
M. Schinas et al.
on Kalman and particle filters. Differently, to other feature-pivot methods, in this
work the positive tweets constitute the only feature whose evolution is monitored
for detection.
Weng and Lee (2011) [90] proposed the EDCoW method that uses the Dis-
crete Wavelet Transform (DWT) on signals built from terms extracted from
tweets. In contrast to the Fourier transform, which have been proposed in [33],
DWT is localized both in time and frequency. The signal for each individual term
extracted from tweets is built in two stages. In the first stage, the DF · IDF
score of a word is calculated for each time point. DF is the percentage of tweets
containing the word in a time point compared to the number of all the tweets
in the same period of time. IDF is the inverse document frequency of a word
from the first time-slot up the the current one. In the second stage, a sliding
window is applied to capture the change in the frequency of a word over suc-
cessive time windows. More specifically, the difference of the normalized wavelet
entropy between the two time-slots is used to construct the second-stage sig-
nal. As a large number of words are trivial, auto-correlation is used to discard
them on the basis of a dynamic threshold based on the median absolute de-
viation of all auto-correlations. The remaining words are then used to form a
graph where similarity between them is calculated as the cross-correlation be-
tween the corresponding signals. Then, words are clustered to form events with a
modularity-based graph partitioning technique, which splits the graph into sub-
graphs each corresponding to a single event. Finally, to differentiate significant
events from trivial ones, EDCoW also quantifies the events' significance using a
score based on the number of words in the event and the sum of cross-correlation
among them.
Twevent [38] extracts consecutive non-overlapping segments from tweets,
where a segment is defined either as a single word (unigram) or a phrase
(multi-gram). Statistical information from the Microsoft Web N-gram Service
and Wikipedia is used to detect non-trivial word segments by solving an opti-
mization problem defined in the paper. Next, the frequency of each segment in
a time-window is modeled as a binomial distribution, and bursty segments are
defined to be those with frequency exceeding the expected value of each distribu-
tion. The bursty segments of a time window are ranked by their user frequency,
which is the number of users who post tweets containing a segment during that
time period and filtered further by keeping only the top-k among them. A seg-
ment similarity that incorporates the content of the associated tweets and the
temporal pattern of segments within the specified time window is used to con-
struct a graph of segments. Then a variant of the Jarvis-Patrick graph clustering
algorithm is applied to group related segments. Finally, the detected events are
ranked and filtered based on a newsworthiness score calculated using Wikipedia.
EnBlogue [4] detects topics emerging in streams of news documents, blog
posts and tweets by detecting abnormal shifts in correlations of tag pairs within a
given window of time. In other words, the feature used for the detection of events
takes the form of pairs of tags. Initially, seed tags are identified by detecting
popular tags compared to a sliding window average, and only these are consider
Event Detection and Retrieval on Social Media
9
in the next steps. These seed tags are used to generate candidate topics, i.e.
pairs of tags that contain at least one seed tag. For each such pair the correlation
between the two tags is calculated over time, based on the amount of documents
that are annotated with both tags in each timeslot. For each candidate pair,
the previous correlation values are used to predict the correlation in the current
timeslot. If the actual correlation is larger than the predicted value then the
topic is considered to be an emerging topic and the relative prediction error is
used as a ranking criterion. For prediction, exponential smoothing is used, which
is a forecasting technique that uses a weighted moving average of past data as
the basis for the forecast.
The event detection method proposed by Cataldi et al. [18] models the life-
cycle of terms according to a novel aging theory based on user authority and
uses that lifecycle to select emerging terms. Initially, the method creates a rep-
resentative term vector for each tweet within a given time window. The term
weights are calculated using the augmented normalized term frequency weighting
scheme. In the next step, the authority of users is calculated by using a follower
graph, following a PageRank-like approach. The proposed content aging theory
is then used to detect the lifecycle of each of the keywords. Given a keyword
appearing in a specific time interval, a formula, termed as nutrition formula,
evaluates the usage of this keyword by considering its frequency in the tweets
that mention it and also the authority of each single user that reports it. Once
the nutrition of a keyword is obtained for the current timeslot, its energy in the
same timeslot is calculated based on the nutrition values of the current and the
previous timeslots. Next, the authors propose an approach for the selection of
emerging topics based on thresholding of their content energy, where a critical
drop value is calculated dynamically based on the average energy value of all
keywords. Every keyword with energy below that drop value is discarded, while
the remaining keywords form the set of emerging keywords in that timeslot.
Each emerging keyword is associated with a correlation vector formed by a set
of weighted terms that defines the relationships among that keyword and all
other emerging keywords in the considered time interval. Correlation vectors are
used then to generate a graph of keywords, and topics are identified by detecting
the strongly connected components of the graph.
Parikh and Karlapalem [56] proposed an event detection system targeting
Twitter, termed ET. The first step of ET aims at extracting event representative
features: those are features exhibiting a significant increase in their appearance
in a particular timeslot compared to the previous ones. Features correspond
to bi-grams after the removal of stop-words and a list of frequent timeslots
is associated with each of the features. Next, the set of event representative
keywords, is clustered in groups related to the same event by using a combination
of content similarity and appearance pattern similarity. The content similarity
between two features is calculated by finding the Jaccard similarity between the
sets of their associated tweets, but only for the timeslots that the features are
frequent. The appearance pattern similarity is the Jaccard similarity between
the frequent timeslots of the features. The overall similarity is the weighted
10
M. Schinas et al.
sum of the above two similarities, and an agglomerative hierarchical clustering
technique is used to group features into events.
The approach of Chen & Roy [20] is one of the first to detect events in mul-
timedia collections by using feature-pivot methods in the associated tags. Given
a set of Flickr photos associated with user provided tags and other metadata,
including time and location, the objective is to discover a set of photo groups,
where each group corresponds to an event. Associated with photos, each tag
occurrence can be modeled with temporal and spatial distributions. These dis-
tributions of tags occurrences are analyzed and events are identified as groups
of tags that exhibit a similar temporal and spatial behavior. In this work DWT
is employed to discover event-related tags with significant distribution in both
dimensions. Due to data sparsity, the authors propose the quantization of the
data in the original 3D space before the application of DWT. More specifically,
the 3D space is segmented into cells by dividing each dimension into intervals
of equal size. For the latitude and longitude dimensions, the interval size is set
to 1, while for the time dimension each interval represents one day. Next, DWT
is applied on each dimension and the cells with weak wavelet coefficients in the
transformed space are removed. Dense regions in the transformed wavelet space
are detected and propagated from the transformed space to the original spatio-
temporal space. Tags that do not belong to any significant region are removed
as they are unlikely to be related to events. Finally, to cluster event-related tags
a combination of semantic and spatial similarity is used in conjunction with
DBSCAN as the clustering method.
Sayyadi et al. [73] present a feature-pivot approach termed KeyGraph. For
each term extracted from documents, its DF, IDF and term frequency are cal-
culated for each timeslot. Then, a KeyGraph is generated by creating a node for
each term with DF above some threshold. Terms that co-appear in a number
of documents above a threshold are connected. If the conditional probability of
the one appearing given that the other appears in some document is below some
threshold, the corresponding edge is filtered. The nodes of the resulting Key-
Graph are clustered using a community detection algorithm. The algorithm uses
the betweenness centrality of edges. Betweenness centrality quantifies the num-
ber of shortest paths between any pair of nodes in the graph that pass through a
particular node/edge. Nodes/edges with high betweenness centrality values are
likely to connect different communities, parts of the graph that are more densely
connected inside them than to the rest of the graph. The algorithm progressively
removes edges with higher betweenness centrality and that results in the indi-
vidual communities of the graph to separate from each other. Additionally, since
a term may be relevant to more than one event, the adjacent nodes of a pruned
edge, are duplicated in the two sides of the pruned edge (if the conditional prob-
ability of the nodes is above some threshold). Finally, for each cluster, a key
document is formed by taking the set of terms that have been assigned to it.
The set of actual documents are assigned to the clusters by computing cosine
similarities. Regarding implementation, in order to more effectively compute be-
tweenness centrality, the authors propose to sample pairs of nodes in order to
Event Detection and Retrieval on Social Media
11
compute shortest paths. Also, to deal with streaming data, the authors propose
the periodic execution of the algorithm on overlapping windows. Topics that are
common on subsequent executions can be determined and merged by looking at
the documents that are common on both windows.
A different feature-pivot approach is that of Guille and Favre [31], in which
the role of features is played by terms contained in tweets with mentions between
Twitter users. As stated by the authors, in most existing feature-pivot methods,
the focus is on features extracted from the textual content of tweets, while the
social aspect of social media platforms is ignored. The system proposed in this
work consists of successive phases for the detection of events, the selection of
representative words describing the events, and finally their ranking based on
impact and significance. Regarding the event detection phase, the method con-
siders terms contained in tweets with user mentions, and detects whether a term
exhibits a burst at each time point by modeling its appearance as a binomial
distribution. To identify the interval of the burst for each term, a maximization
problem is solved permitting the identification of events of arbitrary length. The
identified burst terms are considered as candidate events, and are annotated
with additional terms that describe the event by selecting terms having similar
temporal dynamics with the main term.
Zhang et al. [95] proposed a system to detect burst novel events and predict
their future popularity. For event detection term bursts are detected, where a
term burst in a given time window is identified by examining the increase in
the term weight in that window. The weight of a term in a micro-blog post is
calculated as the combination of the augmented normalized term frequency and
authority of the user that posted it. User authority, estimated by the PageR-
ank algorithm, is incorporated into term weighting under the assumption that
the use of a term from influential users increases the significance of the term.
To detect bursts, the term usage in each time window is modeled as a Hidden
Markov state model (HMM) with two states, "low" and "high". From the de-
tected bursty terms in a time window, a directed graph is constructed, where
vertices correspond to the terms, and edges between them represent term co-
occurrences. The weight of an edge between two terms is estimated using the set
of micro-blogs containing both terms as positive evidence, and the set of micro-
blogs containing only one of them as a negative evidence against their relation.
As that relation is asymmetric, two directed edges are added for each pair, while
a normalization method is used to remove edges with small weights. Next, the
strongly connected components are detected to form event clusters.
2.2 Document-pivot methods
This section discusses methods that detect events by clustering documents on
the basis of their semantic similarity. Document-pivot approaches, originating
from the field of Topic Detection and Tracking task (TDT) [2] can be seen as
a clustering problem. Both RED and FSD approaches have been proposed. In
both cases, the underlying principle is quite similar: documents are modeled in
12
M. Schinas et al.
ways that capture their semantic content and then a clustering algorithm is ap-
plied to group them into events. What differs between approaches is mainly the
characteristics of the clustering approach, the way that documents are mapped
to feature vectors, and the similarity metric used to identify whether two doc-
uments are from the same event. For example, in retrospective event detection,
the whole dataset is available, thus an a priori knowledge of the documents'
characteristics is available. Compared to the traditional TDT task that assumes
that all documents are relevant to events, in social media data, event-related
data are mixed with noisy data. In addition, the amount of social media data is
much larger than the typical size of a dataset in traditional TDT. Thus, there is
a need for scalable and efficient methods. Also, in contrast to TDT where items
are text documents, social media items are multi-modal in nature, and often
contain visual content, as well as temporal and spatial information. So, their
representation is different from the traditional Bag-of-Words representation of
documents used in most TDT approaches.
Fig. 4. Document-pivot event detection
TwitterStand [72] was proposed as a news processing system based on Twit-
ter for capturing tweets corresponding to breaking news and for organizing them
around these news. The input to TwitterStand ranges from a set of seeders, which
are handpicked users that are known to publish news. As collected tweets are
noisy, the authors apply a Naive Bayes classifier to classify incoming tweets as
junk or news, where junk tweets have a high probability of not being related to
the news and hence, are discarded. Tweets are represented by a feature vector
using the TF-IDF weighting scheme and clustered into news topics by applying
an online clustering algorithm, called leader-follower clustering, which allows for
clustering in both content and time. Unsurprisingly, the proposed method has
low performance due to fragmentation of news topics, noisy content and the
limited power of Bag-of-Words in short texts as tweets. To this end, the authors
suggest additional improvements to ensure better clustering results.
The work of Petrovic et al. [63] focuses on the FSD problem, which is closely
related to the new event detection task. This is done by finding the closest
neighbor of an incoming document. If the similarity is below some predefined
threshold, meaning that no such neighbor exists, a new story is detected and
added to the collection of stories. The main contribution of this work is that the
authors propose the use of Locality Sensitive Hashing (LSH) to retrieve fast the
Event Detection and Retrieval on Social Media
13
nearest neighbor of the incoming tweets. Tweets are represented as term features
vectors and indexed using LSH. However, LSH, as an approximate method, finds
the nearest neighbor only if it is reasonably close to the query. The authors
propose to compare the distance of the nearest neighbor with some threshold
and if it is above some threshold to execute a linear search on the N most recently
arrived documents. Additionally, in order to overcome the problems that appear
when dealing with open ended data streams, only the most recent documents
are considered. Moreover, the authors discuss the problem of event detection: if
the best matching document/cluster has similarity above some threshold, then
the new item is added to the cluster, otherwise a new cluster is created. Finally,
different ways of ranking and filtering the detected clusters are introduced based
on the number of tweets or users as well as on the entropy of the number of
users.
Becker et al. [12] focus on clustering event-related tweets on the same cluster
and mainly on separating clusters of tweets as either representing a real-world
event or not. In order to group similar tweets, a simple incremental online clus-
tering algorithm is used. Each tweet is represented as a TF-IDF vector and each
cluster is represented as the average TF-IDF vector of the tweets that it con-
tains. When a new tweet arrives, its cosine similarity to all existing clusters is
computed. If the similarity to the best matching cluster is above some threshold,
then the tweet is inserted into the cluster, otherwise, a new cluster is created.
The main focus of that work is the classification of clusters in Event and Non-
Event classes. Compared to other works such as [72], this work attempts to
discard irrelevant information at the level of clusters instead of doing that at the
level of individual items. For each cluster the following features are computed:
1) Temporal features. Two temporal features are used. The first is the deviation
from the expected number of tweets containing some term given the frequency
of appearance of the term in the last N time units. The second examines how
well the number of term appearances fits an exponential growth pattern. These
features are computed for the n most frequent terms of each cluster. 2) Social
features. The number of social interactions that appear in the tweets (number of
mentions, re-tweets and replies). 3) Topical features. Three different features are
used, namely a) the average or median similarity of messages to the cluster cen-
troid, b) the percentage of tweets containing the first, second, etc. most frequent
term, and c) how many of the most frequent terms are contained in at least n%
of the the tweets. 4) Twitter centric features. Three features are used, namely
a) the percentage of tweets that contain tags, b) the percentage of tweets that
contain the most frequently used tag, c) a binary variable indicating whether
the most frequently used tag is a concatenation of multiple words or not.
Lee [37] proposed to apply a density-based online clustering method on micro-
blog text streams to obtain temporal and spatial features of real-world events.
Regarding the representation of incoming documents, a novel term weighting
method, called BursT, is used. This method is supposed to handle the concept
drift problem that occurs in evolving data streams. The similarity between two
documents is defined as the cosine similarity of the corresponding BursT vectors,
14
M. Schinas et al.
and a temporal penalty is introduced to adjust the similarity according to the
time distance between documents. To deal with the large volume of documents,
the authors propose the use of a sliding window model, i.e. only a subset of
the most recent documents is kept for analysis. Finally, the employed clustering
algorithm is the density-based incremental DBSCAN. Therefore, the shape of
clusters may change over time. When event clusters are detected, the next step is
to analyze their spatial distribution. A location feature vector, which records the
location distribution of the events at specific time points, is used to distinguish
whether the detected events are local or global.
A major challenge that the previous approaches face is the high degree of
lexical variation in documents that makes it difficult to detect stories about the
same event using different words. The problem becomes even worse in micro-blog
platforms such as Twitter given the brevity (limited text content) of posts. In
that scenario, a tweet could be flagged as a first story even if a related tweet,
which uses different but synonymous words, was already returned as a first story.
Petrovi´c et al. 2012 [64] extended their LSH-based method [63] by suggesting
the use of paraphrases to alleviate this problem. They proposed a novel way
of integrating paraphrases with LSH in order to obtain an efficient FSD system
that can scale to very large datasets. In a similar way, Moran et al. [51] proposed
a new way of automatically computing the lexical paraphrases using word em-
beddings. There has been an extensive amount of prior research that has shown
that the cosine similarity between word embeddings is correlated with the se-
mantic relatedness between the corresponding words. Moran et al. made use of
this property by considering two words to be lexical paraphrases if the cosine
similarity between their word embeddings is sufficiently high. After that step,
the same approach the one by Petrovi´c et al. [64] is followed.
Aggarwal and Subbian [1] propose an incremental online clustering approach
to detect events from social streams. Clusters are represented with cluster sum-
maries, which are used for comparisons with the incoming documents. Each
summary, corresponding to an event, contains a node-summary, which is the set
of users together with their frequencies and a content-summary, which is a set
of words and their corresponding TF-IDF values. To maintain and update these
summaries per cluster, a sketch-based technique is used. The similarity between
a new document and a cluster is the combination of nodes and content similar-
ity, controlled by a balancing parameter. By incorporating nodes similarity, the
authors propose a novel similarity that exploits the underlying social structure
of the network. According to them, this improves the content-based similarity
proposed by previous works [12,63,72]. Each incoming document is assigned to
its closest cluster, according to the aforementioned similarity, unless this simi-
larity is significantly lower than that of other documents assigned to the cluster.
A similarity score is considered significantly lower if it is lower than µ − 3σ,
where µ is the mean value of all previous similarities, and σ is the standard
deviation. In that case, the document creates a cluster of its own, and one of
the current clusters is removed on grounds of staleness. In that way, by keeping
Event Detection and Retrieval on Social Media
15
a fixed number of cluster summaries, the comparisons required is reduced to a
fixed number.
Becker et al. [10] address the problem of partitioning a set of documents
into clusters in a way that each cluster corresponds to the documents that are
associated with one event. They use multiple types of social media features,
including text, time and location. For each modality, an appropriate similarity
function is used. For example, cosine similarity for text and Haversine distance
for location. The paper proposes ensemble clustering in conjunction with online
clustering algorithm, as a method to cluster similar documents into events. En-
semble clustering is an approach that combines multiple clustering solutions for
a documents set. The first step of ensemble clustering is to select a set of clus-
terers that partition the data using the different modalities and the appropriate
similarity metrics. To cluster the document according to each modality, the au-
thors used a single-pass incremental algorithm, similarly to [10]. More precisely,
given a threshold µ, a similarity function according to some modality and a set
of documents, the algorithm assigns each document to the best matching cluster
if the similarity is above µ. Otherwise a new cluster is created. A training step is
necessary to select the most suitable threshold setting for each modality and to
assign a weight to each clusterer indicating the confidence in its predictions. The
second step combines individual partitions to a single partition. Each clusterer
is regarded as providing an expert vote on whether two documents belong to
the same cluster. For a pair of documents and a clusterer, a prediction function
is defined as equal to 1 if the two documents are in the same cluster, and 0
otherwise. Then, the consensus score for that pair of documents is computed as
the weighted sum across all clusterers. This is a late fusion strategy, where the
different modalities are combined at the last stage of the procedure.
There are many research efforts in the direction of early fusion, by integrating
different modalities in a single similarity metric. The work of Becker et al. [11]
extends their previous approach [10] by proposing alternative ways of combining
the results of ensemble clustering. Instead of combining individual partitions as
in traditional ensemble clustering setting, the learned weights and thresholds are
used as a model for similarity metric across multimodal social media items or
between items and cluster centroids. Hence, a single-pass incremental clustering
algorithm can be used in conjunction with the combined similarity metric. The
authors also propose the use of a classification model to learn document similarity
functions for social media. In other words, a classifier using as input features the
raw similarity scores corresponding to the document features is used to compute
whether a pair of documents belongs to the same event. Both SVM and Logistic
Regression have been used, with the latter experimentally shown to perform
better.
Reuter & Cimiano [66] attempt to solve the problem of grouping documents
related with the same event into the same cluster in a similar manner with [11].
The authors use a single-pass incremental clustering algorithm and define the
similarity between an incoming document and a given event cluster as the like-
lihood probability that the document belongs to the cluster. This probability
16
M. Schinas et al.
Fig. 5. Similarity learning approach by Petkos et al. [59]. An annotated dataset X is
used to obtain training examples consisting of distance vectors and the corresponding
labels. These are used to learn the classifier f that is applied on the distance vectors
of a new dataset Y to predict the corresponding indicator vectors that are used for
clustering.
is computed using an SVM classifier on the textual, geographical and temporal
dissimilarities between documents and clusters. Two contributions of [66] com-
pared to [11] is the introduction of a candidate retrieval step and the use of an
additional classifier that determines whether the incoming document belongs to
the top scoring candidate event or rather to a new event. The candidate retrieval
step aims to make the method scalable by decreasing the number of comparison
between incoming documents and events. Specifically, for each document the
nearest events are retrieved with respect to each modality. For the new event
detection problem, instead of using a simple threshold and assign a document to
an event if the similarity exceeds this threshold, the authors propose the use of
a classifier that predicts the probability that a document belongs to an existing
or to a new event.
Petkos et al. [59] present an approach for multimodal clustering designed
for Flickr images. First, a baseline approach is presented, in which a weighted
sum of the affinity matrices of the different modalities is computed and then,
similarly to a common spectral clustering algorithm, the corresponding graph is
pruned, the Laplacian matrix is computed and the minimum cut of the graph is
found. Given the difficulty to estimate the best values for the different parame-
ters of that approach, and the fact that the clustering output is sensitive to these
parameters, an approach that uses a known clustering is proposed to supervise
the multimodal fusion and clustering procedure. Pairwise distances per modal-
ity are first computed. Then, for each pair of items, the distances per modality
are compiled in a single vector. These dissimilarities vectors is used to learn the
typical "same cluster" relationship for multimodal items. Having learned such a
classifier, one can form an indicator vector for each of the new items to be clus-
tered. This indicator vector summarizes the "same cluster" relationship between
Event Detection and Retrieval on Social Media
17
each item and all other items to be clustered. Items that have similar indicator
vectors should belong to the same cluster. Therefore, a final clustering result
can be obtained by clustering the indicator vectors, for example by applying a
spectral clustering algorithm.
Bao et al. [7] proposed a method for the clustering of social multimedia into
events without the need for a single representation for each individual item.
Contrary to other methods that adopt early or late fusion for combining the
different modalities, the authors represent a collection of social media items as a
star-structured K-partite graph, where the items/documents are regarded as the
central vertices and different modalities are treated as the auxiliary vertices that
are pairwise independent with each other but correlated with the central vertices.
Four types of modalities are considered, publication time, location, visual content
and text, while different ways to calculate inter-relationships are used. Then, a
graph co-clustering approach, termed information theoretic co-clustering, is used
to partition the graph into events.
Wang et al. [87] proposed an event detection method that incorporates on-
line social interaction features. As stated by the authors, as real-world events
are intrinsically social, it is natural to expect that participation in the physical
event will motivate people attending them to interact online with shared media
associated with that event. Social interactions around photos, including actions
such as posting a comment, adding a tag, or liking the photo, are modeled using
an undirected graph with three conceptual layers: photos, users and tags. Each
unique user, photo and tag form the vertices of the graph, while edges, symmet-
ric or asymmetric, can have various semantics. The social affinity between two
photos is the random walk probability from one photo to the other, calculated
by a Random Walk with Restart algorithm. This affinity, combined with other
similarities from features like time, location and text, is used in an SVM classifier
to calculate a single value similarity measure, as in [11] and [66].
Petkos et al. [62] recently proposed a clustering approach for the multimodal
clustering problem. Similar to their previous work [59], relevant clustering ex-
amples are used to learn an SVM classifier of the "same cluster" relationship
between pairs of multimodal items. The used modalities include text, visual
content, the uploader's identity, creation time and location. An important com-
ponent of the proposed approach relies on the capability for fast retrieval of same
cluster candidates per item for each of the different modalities, so that the model
can be applied only on the candidate items. For that purpose a different index
was used per modality. Given two images, which are expressed through a set
of features, a vector that contains the per-modality distances is calculated. The
same cluster model then predicts if the two items belong to the same cluster.
The learned model is subsequently used to organize items in a graph, where the
nodes represent the items and links between pairs of nodes are inserted if the
model predicts that the corresponding items belong to the same cluster. Even-
tually, a graph clustering algorithm is applied to produce the final clustering.
The proposed approach uses two variants, a batch community detection algo-
18
M. Schinas et al.
rithm (SCAN) and an incremental algorithm, the Quick Community Adaptation
(QCA).
2.3 Topic modeling methods
This section describes approaches based on probabilistic models that detect
events in social media documents in a similar way that topic models identify
latent topics in text documents. Originally, topic models relied on word occur-
rences in text corpora to model latent topics as a mixture of words, and doc-
uments as a mixture of the identified set of topics. Latent Dirichlet Allocation
(LDA) [15], which is the most known probabilistic topic modeling technique, is
a hierarchical Bayesian model where a topic distribution is assumed to have a
sparse Dirichlet prior. The model is depicted in Figure a. α is the parameter of
the Dirichlet prior on the per-document topic distribution θ and φ is the word
distribution for a topic. K denotes the number of topics, M denotes the number
of documents while N is the number of words in a document. Given that words
W are the only observable variables, the learning of topics, word probabilities
per topic, and the topic mixture of each document is tackled as a problem of
Bayesian inference solved by Gibbs sampling.
Compared to traditional topic modeling, topic modeling in social media dif-
fers mainly because social media documents are multimodal items. Thus, it is
not only words in the text that are observable variables, but also other modal-
ities such as the user who posted the document, visual words extracted from
embedded images, publication time and quite often the location from where the
document originates. In addition, given the short length of documents in social
media, and mainly in micro-blogging platforms such as Twitter, the basic as-
sumption that a document is a mixture of topics is more likely to be violated.
For that reason many approaches have been proposed that extend traditional
models to be aligned with the characteristics of social media data. Some of the
most well-known extensions of LDA include TOT [86], TwitterLDA [96], and
MMLDA [14].
In TOT, depicted in Figure c, topic discovery is influenced not only by word
co-occurrences, but also by the temporal information contained in document
timestamps. TwitterLDA, which is depicted in Figure b, extends standard LDA
to model tweets. Each tweet is assumed to be related to a single topic Z, which
subsequently is influenced by the topic distribution of user u who posted the
tweet. In TwitterLDA words in a tweet can be chosen either from a topic-word
distribution φ or from a background distribution φB. Given the fact that social
media messages may contain multimedia content, there are topic models that
take into account not only text but also visual content. A notable method in
that direction is MultiModal LDA (MMLDA) that uses visual words alongside
text words to identify topics. MMLDA is basically an extension of TwitterLDA
as shown by Figure e. The same assumptions of a single topic per document,
and two word distributions, a topic-specific φW G and a background distribution
φW G, are also made. In addition, MMLDA incorporates visual words for each
document that is modeled similarly to textual words. To generated visual words,
Event Detection and Retrieval on Social Media
19
SIFT features are extracted from the images, and a bag-of-visual-words model
is applied on them.
When the target is the detection of events, in contrast to topics, the spatial
and temporal dimensions provide important clues. For that reason, approaches
aiming at event detection usually employ models built upon the assumptions
made by models like TOT, TwitterLDA, and MMLDA. In general, there are
two approaches in the use of probabilistic models. The first approach uses these
models to represent documents and detect event in a same way as the document-
pivot approaches. The second approach includes methods that consider events
as latent variables to be learned alongside other variables such as time, location
words, and topics. In this section we present methods from both approaches, but
we focus mainly on the latter.
Zhou and Chen [98] propose a graphical model called Location-Time Con-
strained Topic (LTT) that extends TOT by incorporating latitude and longitude
of social media messages as additional variables la and lo respectively. In other
words, the posterior distribution of topics depends not only on words but on
three more attributes, time, latitude and longitude, drawn from three Beta dis-
tributions ψ, δ and γ. The plate notation of LTT model is depicted in Figure d.
Given the LTT model, messages are represented as a distribution over the topics
and the similarity between two messages is measured by a distance metric be-
tween these distributions based on the Kullback-Leibler (KL) divergence. As the
LTT fuses content, time and location attributes, the calculated distance captures
an overall content dissimilarity between two messages over these three modal-
ities. The next steps follow the document-pivot paradigm presented in section
2.2. A complementary measure is proposed that embeds the previous content
similarity with a link similarity, based on conversational signals between users.
Finally, events are detected using efficient similarity joins over the social media
stream of messages.
You et al. [92] propose an approach for event detection on Twitter that uses
a hierarchical Bayesian model named General and Event-related Aspects Model
(GEAM). This assumes that in the whole corpus of tweets there are E events
and K topics, while each event has A event-related aspects. Figure h depicts the
plate notation of GEAM. Attribute e is a latent variable assigned to each tweet
specifying to which event that tweet is related. GEAM also introduces a switch
variable x, drawn from a binomial distribution that indicates whether a word
W in a tweet comes from a general topic word distribution or an event-related
aspect word distribution. φ is a multinomial distribution over words specific to
topic z or event e, which is drawn from a Dirichlet distribution parameterized by
β. In other words, each word in a given tweet can be associated with a general
topic Z or an event aspect a (i.e. time, locations, entities, keywords). Each tweet
is modeled not only as a multinomial distribution over topics, as in LDA, but
also assigned a latent variable e specifying which event the tweet is describing.
The collapsed Gibbs sampling method is used in a similar manner as LDA to
estimate the unknown parameters of GEAM.
20
M. Schinas et al.
To extract events in tweets and assign events to categories, an unsupervised
latent variable model, called Latent Event and Category Model (LECM) was
proposed by Zhou et al. [97] and depicted in Figure j. To discard noisy tweets, the
proposed system trains a lexicon-based binary classifier. Each of the remaining
tweets is assigned to a single event e, drawn from an event Dirichlet distribution
π, while each event is modeled as a joint distribution over the named entities y,
date d, location l and event-related keywords k. The basic assumption in LECM
is that tweets containing the same named entities, occurring at the same time
and in the same location and having the same keywords are likely to be assigned
to the same event. The model also assumes that each event e is assigned to
one specific event type t, from a set of C event types. That type is modeled as a
joint distribution over multinomial distributions y(cid:48) and k(cid:48) of semantic classes and
event-related keywords respectively. Semantic classes are mapped from named
entities using the Freebase API. For example, as described in the paper, a named
entity corresponding to a singer could be mapped to the "music" class. Compared
to GEAM, tweets in LECM are assigned only to an event instance and general
topics are missing.
Cai et al. [17] proposed a framework for event detection, tracking and vi-
sualization from a collection of Twitter data. For the event detection step, the
method uses a model termed Spatio-Temporal Multimodal TwitterLDA (STM-
TwitterLDA), and TwitterLDA with MMLDA. The plate notation of STM-
TwitterLDA is depicted in Figure g. Words in tweets are divided into two cat-
egories general and topic-specific words as in TwitterLDA and MMLDA. The
same holds for the images contained in tweets. However, instead of sampling
visual words using Dirichlet multinomial distributions as in MMLDA, STM-
TwitterLDA uses CNN features to represent images and model the normalized
CNN features by two Dirichlet distributions, a topic-specific and a general one.
Two latent random variables x and y act as the general/specific indicators for
words and images in a given tweet. In contrast to TwitterLDA that defines a topic
distribution per user, in STM-TwitterLDA a topic distribution θ is shared across
tweets collected from the same location. In addition, each topic is a mixture of
four distributions: a multinomial distribution over hashtags φ, a multinomial
distribution over topic-specific words φW S, a Beta distribution over timestamps
ψ, and a Dirichlet distribution over specific images βV S. There are also two dis-
tributions not conditioned on topics: a Dirichlet multinomial distribution over
general words φW G and a Dirichlet distribution over general images βV G.
Hu et al. propose ET-LDA [35], a joint model used to align events transcripts
from an event with associated Twitter messages. The model is depicted in Figure
i. It consists of two components, an event and a tweets part, with each having
an LDA-like structure and being influenced by a shared topic-word distribution
φ. In the event part, the model assumes that an event is formed by sequential
segments, each of which discusses a set of topics. A segment consists of one or
more paragraphs available from the transcript of the event, with each paragraph
s ∈ S to be associated with a particular distribution of topics θ(s). The evolution
of topics in the event is modeled by associating a binary variable c(s) with each
Event Detection and Retrieval on Social Media
21
paragraph. Based on the value of this variable, the distribution of topics θ(s) in a
paragraph s is either chosen from a Dirichlet distribution or considered the same
as the previous paragraph s − 1. In the later case, these subsequent paragraphs
are merged to form a coherent segment. In the tweets part, the words in a given
tweet can be sampled from two distinct topic mixtures depending on a binary
variable c(t). Based on the value of c(t) for each word w, the word can be drawn
either from a distribution of specific topics θ(s), related to the segments of the
event, or from a distribution of general topics ψ(t) over K global topics. In the
first case, θ(s) is associated with a segment s of the event, which is selected
according to a categorical distribution s(t).
Wei et al. [89] propose a Bayesian graphical model depicted in Figure f to
discover latent events, identify the spatial and temporal region they occur and
associate them with tweets. An event is considered as an extension of topics,
having a topical focus but also including a spatial and temporal region in which
it occurs. Thus, an event instance e, drawn from a multinomial distribution with
a prior γ, is defined as a joint distribution over time, location and words. Given
a set of E possible events a tweet is associated with a single event instance e.
The location of a tweet associated with event e is assumed to be drawn from
a two-dimensional Gaussian distribution l ∼ N (θ(L)
is the
geographical center of the event e and σ(L)
its variance. In the same way, the
time of a tweet is also modeled as a Gaussian distribution t, with mean θ(T )
and
a variance of σ(T )
. The words appearing in a tweet are modeled by a category
variable z, which is controlled by a multinomial distribution. This variable de-
termines the topic category, therefore the Dirichlet distribution φ∗ from which
a word w is drawn. φ0 represents global topics that occur across all tweets. φL
defines a set of region-specific topics. φT represents a set of temporally aligned
topics that contain words occurring within different temporal factions of the
data. φT corresponds to topics that are representative of a particular event e.
Thus, each word w in a tweet is chosen from one of the above topic distributions
according to category variable z and the corresponding spatial, temporal and
event variables, l, t and e.
), where θ(L)
e
e
e
, σ(L)
e
e
e
Diao and Jiang [25] proposed a model that combines an LDA-like topic model
with the Recurrent Chinese Restaurant Process to capture topics and events from
a stream of tweets. As in many topic models, topics are modeled as a multino-
mial distribution over words. Each event is also a multinomial distribution over
words. As topics are long-standing and stable, their number is fixed, while for
events a non-parametric model, called the Recurrent Chinese Restaurant Pro-
cess (RCRP), is used to model the birth and death of events. Each user has a
multinomial distribution over topics. A latent variable drawn from a user-specific
Bernoulli distribution indicates whether a tweet is topic- or event-related. For
topic tweets, the topic is sampled from the corresponding users topic distribu-
tion. For event tweets, the event is sampled according to the Recurrent Chinese
Restaurant Process.
Apart from LDA-inspired approaches, several works were proposed that are
based on other probabilistic and statistical models. The paper of Benson et al.
22
M. Schinas et al.
(a) Latent Dirich-
let
Allocation
(LDA) [15]
(b) Twitter LDA [96]
(c) Topic over Time
model (TOT) [86]
(d)
Location
Time Constrained
Topic (LTT) [98]
(e) MultiModal LDA
(MMLDA) [14]
(f) Bayesian Graphical
Model
for Latent Events
discovery [89]
(g) Spatio Temporal Multi-
Modal TwitterLDA (STM-
TwitterLDA) [17]
(h) General
Event
Aspects
(GEAM) [92]
and
related
Model
(i) Joint Event and Tweets
LDA (ETLDA) [35]
(j) Latent Event and Category Model
(LECM) [97]
Fig. 6. Probabilistic models for event detection, compared to Latent Dirichlet Alloca-
tion [15]. The parts depicted with dotted lines refer to the original LDA model.
Event Detection and Retrieval on Social Media
23
[13] proposes a probabilistic graphical model for the discovery of event records in
social media feeds. The approach simultaneously analyzes individual messages
(tweets), clusters them according to events, and induces a canonical value for
each event property. The graphical model addresses the event detection problem
by learning a latent set of records and a record-to-message alignment simulta-
neously. Records are tuples < R1, R2 > which represent records values for the
schema < ART IST, V EN U E >. Each message has a sequence labeling, where
the labels consist of the record fields and each token in the message has an as-
sociated label. Messages, labels and records represented as a probabilistic factor
graph and message to record alignment is performed using a variant of the con-
ditional random fields method (CRFs). Although the authors aim at detecting
a specific type of event records, the method can be generalized to different and
more complex event cases.
Similarly to the work of Benson et al. [13], TwiCal [69] provides a struc-
tured representation of significant events by extracting a 4-tuple representation
of events from Twitter items, which includes a named entity, event phrase, calen-
dar date, and event type. Given a raw stream of tweets, TwiCal extracts named
entities, event phrases, and resolved temporal expressions to detect events, which
are then categorized to specific types. For named entity recognition an optimized
named entity tagger trained on in-domain Twitter data was used. Extraction of
event phrases is formulated as a sequence labeling task, solved with Conditional
Random Fields for learning and inference. As there are many different ways
users can refer to the same calendar date, depending on the publishing date of
the tweet, a resolution of temporal expressions is performed to identify when
the events described by the event phrases occur. To categorize the extracted
events into types an unsupervised approach is proposed based on latent variable
models that infers an appropriate set of event types to match the data, and
also classifies events into types by leveraging large amounts of unlabeled data.
Each event phrase in the data is modeled as a mixture of event types, and each
event type corresponds to a distribution over named entities. Inference of that
generative model is similar to an LDA variant, termed LinkLDA [28]. Finally,
extracted events are ranked by measuring the strength of the association be-
tween an entity and a specific date in the event. The strength is estimated by
the G2 log-likelihood ratio statistic between the occurrences of the entity and
the date in the tweets of the dataset.
3 Event-based Retrieval and Summarization
Given real-world events, which are detected automatically or can be introduced
in the form of user queries, there is a need for methods that identify and orga-
nize additional social media content associated with these events. When events
take the form of user provided queries, there is no content available. In case
of automatically detected events, the content used for the detection is usually
associated with the events, but additional content that augments the event, can
be discovered. In both cases, the discovery of relevant content can be seen an
24
M. Schinas et al.
information retrieval problem. This task is different from the traditional docu-
ment search problem, where a user's information need is fulfilled by one or more
relevant documents. In social media applications, information needs cannot be
satisfied by a limited set of social media posts due to the limited content and
context provided by individual messages. To add substantial value for users,
more structured and diverse lists must be returned. Furthermore, due to the
increasing popularity of micro-blogging platforms, the amount of event-related
posts has reached impressive levels. Also, event-related streams or collections are
highly diverse, with different associated topics and conversations among users,
and a high degree of redundancy. In addition, as relevance and significance of
the messages may vary, there is a profound need for event-based summarization
mechanisms that can produce concise summaries, covering the main aspects of
the event.
3.1 Event-based retrieval
An information need is usually expressed as a simple and short query, consist-
ing of few terms. That makes the finding of relevant messages a challenging
task, since social media messages may not contain any of the terms even if they
are related to the query. Furthermore, when it comes to event-related queries,
the events have a temporal and very often a spatial dimension that should be
considered in the retrieval process. To this end several methods have been pro-
posed to support information retrieval on social media messages and mainly on
micro-blog collections [21,22,50,77]. For the evaluation of retrieval approaches in
micro-blogs a special track6 took place as part of the Text REtrieval Conference
(TREC) from 2011 to 2015. Given a set of topics of interest, expressed by title,
description and time, the scope of the track was the retrieval of relevant con-
tent from collections of tweets. Although, not limited to event-based retrieval,
these micro-blog retrieval approaches are the basis for event-oriented retrieval.
Additionally, efficient and accurate retrieval is an important step of the event
summarization process, as relevance calculation is a core part of summarization.
Fig. 7. A general processing pipeline for event summarization.
Becker et al. [8] proposed a two-step system to obtain Twitter messages
related to planned events. Given an event, the first step is to build a query
6 http://trec.nist.gov/data/microblog.html
Event Detection and Retrieval on Social Media
25
derived from the event, aiming at high precision results. Queries are formed
based on the structured description of an event, and its other aspects, such as
the venue the event takes place. Intuitively, these highly restrictive queries return
only messages that relate to the planned event, but at the expense of recall. To
improve recall, term-frequency analysis is performed on the high-precision tweets
to identify descriptive terms and phrases, which are used, in turn, to define new
queries. A rule-based classifier is then used to select among this new candidate
queries, and then use them to retrieve additional event messages.
Becker et al. [9] extended their previous work [8] to support identification of
content for planned events across multiple social media sites. To this end, the
authors developed a set of query formulation strategies used to retrieve content
associated with an event. The main motivation is that some platforms like Twit-
ter can be useful as a mean for timely event detection, while others like Flickr
or YouTube can be used to augment the events with additional multimedia con-
tent. Similar to [8], a two step query-generation approach is proposed for the
retrieval of content given an event. First a precision-driven set of queries is con-
structed based on event attributes such as title, description, date and location.
These queries are directed to each target platform to retrieve a limited but highly
relevant set of social media documents. Two approaches are then proposed to
formulate new recall-driven queries based on these documents. The first is to
extract the most frequently used n-grams, while weighing down terms that are
naturally common in the English language. To normalize n-grams frequency, a
language model built from web documents was used. The second approach aims
to identify meaningful event-related concepts in the ground-truth data using an
external reference corpus. A web-based term extractor was used that leverages
a large collection of web documents and query logs to construct an entity dic-
tionary, and uses it along with statistical and linguistic analysis methodologies
to find a list of significant terms. In addition, the use of event content from one
social media site to help retrieve event documents from another social media site
is investigated. This is useful when the precision-oriented strategies do not re-
trieve results from all sites. For example, if the precision-oriented queries fail to
retrieve any documents for one site, and hence the method cannot generate any
recall-oriented query for that site, documents retrieved from another platform
can be used as input to the query construction step.
Liu et al. [41] presented a method that combines semantic inferencing and
visual analysis aiming at finding media (photos and videos) illustrating events
in an automatic way. As a first step in the procedure, given some event de-
scriptions, event directories such as Last.fm, Eventful and Upcoming are used to
obtain structured information about the events, which are then converted into
the LODE ontology [78]. Explicit relationships between scheduled events and
photos hosted on Flickr can be looked up using special machine tags. However,
the set of images available on the web that can be explicitly associated to events
using machine tags is generally a tiny subset of all media that are actually rele-
vant to the event. To this end, the authors investigate several approaches to find
26
M. Schinas et al.
these images, querying by title, geo-location and time and pruning irrelevant
media.
Metzler et al. [49] tackled the problem of structured retrieval of historical
event information over micro-blog archives, by proposing a novel temporal query
expansion technique. Given a user query, the approach first retrieves a set of
timespans for which the query keywords were most heavily discussed. Timespans
are subsequently ranked according to the proportion of messages posted during
them. Considering these timespans as related to the event is a kind of pseudo-
relevance feedback mechanism. For each pseudo-relevant timespan, a burstiness
score is computed for all terms that occur in the messages posted during it.
The idea is that during a timespan in which a query is being heavily discussed
another term that is trending might also be related to the event. The final step
of the query expansion process is to aggregate the burstiness scores across all
pseudo-relevant timespans to generate an overall score for each term. The k
highest weighted terms are then used for expansion. The expanded query is then
used to retrieve additional content and identify the highest scoring timespans
in the same way as in the first step. The final step of the retrieval process is
to produce a short summary for each retrieved timespan. This not only returns
ranked individual messages, but also a ranked list of historical event summaries,
with respect to the original query. Given a timespan, the summary is produced by
a simple IR language model that selects messages that are found to be the most
relevant to the expanded representation of the original query in that timespan.
3.2 Event-based summarization
Given a set of event-related messages, for example by using an approach such as
the previous ones, there is often a need to select only a representative subset of
these. A substantial body of research efforts attempt to solve this text summa-
rization problem, which is a special case of the Multi-Document Summarization
(MDS) problem. One of the first MDS approaches relies on the generation of a
content-based centroid. Then, the summary of a set of documents, represented
by TF-IDF vectors, consists of those documents that are closest to the centroid.
Graph based approaches have also been proposed to detect salient sentences
from multiple documents, with LexRank [27] being the most notable among
them. This first constructs a graph of sentences (nodes), with the textual sim-
ilarity between two sentences serving as the connection (edge) between them.
Then, it computes the saliency of each sentence using some centrality measure,
such as the Eigenvector Centrality or its well known variant, PageRank. These
approaches are based on the observation that the most central messages in a
cluster are more likely to reflect key aspects of the event than other, less cen-
tral messages. One of the first works that use centrality-based methods to select
subsets of messages is that of Becker et al. [9], which propose a centrality-based
approaches to extract high-quality and relevant tweets with respect to a specific
event.
However, the text brevity, informal writing and non-grammatical character of
many micro-blogging posts, as well as the diversity of the underlying topics make
Event Detection and Retrieval on Social Media
27
the summarization problem much more challenging in the context of social media
compared to the traditional MDS setting, where the input collection consists of
long well-formed documents. In addition, the temporal dimension, which is a
crucial element of micro-blogging posts, and the social interaction between users
in social media platforms, are disregarded by previous MDS methods. To this
end, numerous methods were proposed that incorporate not only the textual
information of documents, but also their temporal and social aspects. The core
idea of the majority of previous works is the clustering of documents set into
coherent topics or sub-events and the selection of the most "representative"
documents in each segment. Although there are works that investigate the use
of social dimension to the problem of event detection [31], to our knowledge, this
dimension is usually disregarded, compared to the number of methods that are
based on content and temporal information.
Nichols et al. [53] describe a sports event summarization algorithm. Given a
collection of tweets related to a specific event, the method uses a peak detec-
tion algorithm to detect important moments in the timeline of tweets. Then, it
applies a graph-based technique to extract important sentences from the tweets
around these moments. In [23], the authors propose a probabilistic model for
topic detection in Twitter that handles the short length of tweets and considers
time as well. Instead of relying only on the co-occurrences of words (as the ma-
jority of traditional probabilistic text models do), the proposed model uses the
temporal proximity of posts to reduce the sparsity of the term co-occurrence ma-
trix. Then, for each detected topic, the method considers the set of tweets with
the highest similarity to the topic word distribution as the most representative.
Shen et al. [79] present a participant-based approach for event summarization,
which first detects the participants of the event, then applies a mixture model
to detect sub-events at participant level, and finally selects a tweet for each
detected sub-event based on the TF-IDF centroid approach. In a similar work,
Chakrabarti and Punera [19] propose the use of a Hidden Markov Model to
obtain a time-based segmentation of the stream that captures the underlying
sub-events.
Recent works have focused on the creation of visual event summaries based
on messages and content shared on social media. TwitInfo [44] is a system for
summarizing events on Twitter through a timeline display that highlights peaks
of high activity. Alonso and Shiells [3] create football match timelines annotated
with the key match aspects in the form of popular tags and keywords. Dork et
al. [26] propose an interface for large events employing several visualizations,
e.g., image and tag clouds. However, the aforementioned methods only make use
of textual and social features for creating visualizations, and ignore the visual
content of the embedded multimedia items.
The increasing use of multimedia content in micro-blog platforms has mo-
tivated numerous studies to consider visual information alongside text. Bian et
al. [14] proposed the use of MMLDA (cf. section 2.3) for detecting topics si-
multaneously taking into account the textual and visual content of posts with
embedded images. The topics identified by MMLDA are used to calculate cov-
28
M. Schinas et al.
erage and diversity for each image in the dataset. Finally, the output of this
method is a set of representative images for the underlying event that maximize
these measures. A slightly different problem was tackled by Lin et al. [39]. Unlike
other methods that generate summaries as sets of posts or images, this method
aims to create a storyline from a set of event-related multimedia objects. To this
end, it constructs a multi-view graph of objects, with two types of edges, visual
and textual, capturing the content similarity along with the temporal proximity
among objects. Then, it extracts a time-ordered sequence of important objects
based on Steiner trees [85].
Meladianos et al. [48] proposed a system that, given an event-related set
of tweets, identifies the key moments (sub-events) of the event, and select a
tweet to best describe each sub-event using a simple yet effective heuristic. The
input set of tweets is represented as a graph-of-words, where nodes correspond
to words extracted from the whole set, while edges indicate that the two terms
co-occur in any tweet of the input set. Then, using the graph degeneracy concept,
term weights are extracted. To detect sub-events, the stream is divided in time
intervals for which a graph-of-words is generated. Then, using the weights of the
terms as determined by the degeneracy-based weighting mechanism, a sub-event
is reported if there is a sharp increase in the terms, regardless of the number of
tweets in that time-interval. If a sub-event has been detected, then the tweets
in that time interval are scored, by the the sum of their term weights, and the
highest-scored tweet is selected.
Gao et al. [30] propose a joint topic modeling method to summarize events
across news and social media streams. The method leverages a topic model-
ing approach, termed cross-collection Topic-Aspect Model (ccTAM), that com-
bines cross-collection LDA (ccLDA) [57] with a Topic-Aspect Model (TAM) [58].
ccLDA is an extension of LDA, in which each topic is associated with two classes
of word distributions: a shared distribution among all collections, and one that
is specific to the collection from which the document comes. TAM decomposes
each document not only into a mixture of topics, but uses a second mixture that
represents the underlying aspects in the collection of documents such as different
perspectives and viewpoints. The novelty in the work of Gao et al. is that the
proposed ccTAM uses two complementary types of information as input, news
and tweets, which are represented in a joint fashion as mixtures of topics and as-
pects. To produce a summary of the event, a bipartite-graph ranking algorithm
is used, where the nodes at one side correspond to sentences extracted from the
news and those at the other side correspond to tweets. As a transition probabil-
ity is necessary for the edge weights between tweets and sentences, the output
ccTAM is used to calculate a complementary measure between these two parts.
Finally, the top ranked sentences and tweets at both sides are used to generate
a news summary and a tweet summary in such a way that the predefined length
of the summaries are met.
MacParlane et al. [47] proposed a method to select and rank a diverse set of
images with a high degree of relevance to a given event. A unique characteristic
of this work is the use of external sources of multimedia content, such as websites,
Event Detection and Retrieval on Social Media
29
in cases where the amount of images in the posts of an event is insufficient for the
creation of meaningful visual summaries. To detect and remove near-duplicates
among the images, and thus to increase visual diversity, the Perceptual Hash
(pHash) method 7 is used to cluster images into sets of near-duplicates, such as
as brightness or contrast adjusted images, resized or slightly rotated, or images
with embedded watermark. Then, they use visual features in conjunction with
an SVM classifier to discard irrelevant images and images of low quality, such
as memes and images with heavy text. Finally, they evaluate numerous rank-
ing methods based on clustering, for selecting a small number of representative
images for the event.
Schinas et al. [75] proposed a framework that uses an event-related set of so-
cial media items, to create a visual summary that describes the main moments of
the event. To overcome the problem of spam and noisy messages, the framework
first discards irrelevant and low quality messages, using a set of filters based
on textual and visual clues. Then a multi-graph is generated, in which vertices
correspond to messages, while four types of edge represent different types of as-
sociation between the messages. More specifically, two types of undirected edges
are used to represent textual and visual similarity, and two types of directed
edges represent temporal proximity and social interactions (e.g. shares, replies,
etc). Since there is a high degree of redundancy in social media collections, a vi-
sual de-duplication step follows. Using the subgraph corresponding to messages
with embedded multimedia, the Clique Percolation Method is used to find and
merge sets of messages that are visual duplicates. Then, to detect topics and
sub-events on a main event, the Structural Clustering Algorithm for Networks
(SCAN) is used. To create a visual summary, the messages are ranked accord-
ing to a score that integrates social attention topic coverage. Finally, messages
having images are re-ranked using the DivRank iterative scheme, a variant of
PageRank, designed for improving content diversity in the ranking process.
4 Datasets and Evaluation
To evaluate the performance of event detection methods several metrics have
been proposed and used in the related literature, with precision and recall being
the most common among them. Given a set of candidate events reported by
a method, precision measures the percentage that correspond to actual events.
Recall on the other hand, indicates the percentage of events that the methods
managed to detect out of the whole set of reference events in the dataset. How-
ever,these metrics alone are not sufficient, as they cannot capture the quality
of the detected events. This is more evident in the case of document-pivot and
topic modeling approaches, where an event is reported as a set of documents
related to the event. Thus, there is a need for metrics that compare detected
and actual events at the level of their documents.
Given a set of events and a dataset of related documents combined with
non-event documents, the performance of a method that returns documents
7 http://www.phash.org/
30
M. Schinas et al.
for each of the events can be measured by calculating precision and recall at
the level of documents. Precision is the fraction of returned documents that
truly belong to an event, while recall measures the fraction of all event-related
documents returned by an approach. Macro F-score is the harmonic mean of
precision and recall. Thus, it measures the goodness of the retrieved photos,
but not the number of retrieved events, or how accurate the correspondence
between retrieved images and events is. This is done by the Normalized Mutual
Information (NMI) [80], which compares two sets of clusters, where each cluster
comprises the documents of a single event), jointly considering the goodness of
the retrieved documents and their assignment to different events.Another metric
is B-Cubed [6] that estimates the precision Pb and recall Rb associated with each
document in the dataset individually, and then uses the average precision and
recall values for the dataset to compute their harmonic mean:
Cluster(d) ∩ GroundTruth(d)
1
D
(cid:88)
(cid:88)
d∈D
d∈D
Pb =
Rb =
Cluster(d)
Cluster(d) ∩ GroundTruth(d)
GroundTruth(d)
1
D
B-Cubed = 2 · Pb · Rb
Pb + Rb
To evaluate event-based retrieval and summarization methods, different evalu-
ation metrics have been proposed. Regarding the retrieval of content, the well
known Precision and Recall are used. However, in the context of event sum-
marization, more sophisticated metrics are needed that take into account the
coverage of different aspects of the event, the redundancy in the retrieved set
of items, the diversity in text and visual content, etc. Thus in the works pre-
sented in section 3, a wide set of metrics have been proposed and used. Typically,
to evaluate summarization results, a golden standard is used that represents an
ideal summary. In social media data, this golden standard usually takes the form
of a set of items that summarize the dataset. Given these items, Precision, Re-
call and F-measure can be calculated between the produced summary and the
golden standard. However, this may be misleading as the produced summary
may contain not the exact set of items, but similar items that convey the same
information. For that reason the so-called ROUGE [40] metrics are used, a fam-
ily of metrics that measure the similarity between an automated summary and
a set of manual summaries, using n-gram co-occurrence statistics between the
sets. The simplest among them is the ROUGEN metric:
(cid:80)
(cid:80)
(cid:80)
(cid:80)
ROU GEN =
s∈M S
s∈M S
ng∈S Match(ng)
ng∈S Count(ng)
where Count(ng) is the number of n-grams in the manual summary, and
Match(ng) is the number of co-occurring n-grams between the manual and au-
tomated summaries.
Event Detection and Retrieval on Social Media
31
McParlane et al, whose work [47] was presented in section 3 proposed the
use of three precision-based and two diversity-oriented metrics to evaluate visual
summaries produces by their approach:
– Precision (P @N ): The percentage of relevant images among the top N
images in the summary.
– Success (S@N ): Given summaries for multiple events, the percentage of
events, for which there exists at least one relevant image among the top N
returned by the method.
– Mean Reciprocal Rank (MRR): Computed as 1/r, where r is the rank
of the first relevant image returned, averaged over all summaries.
– α-Normalised Discounted Cumulative Gain (α-nDCG@N ): This met-
ric computes the usefulness, or gain, of an image based on its position in the
ranked list. Parameter α balances the importance of relevance and diversity.
– Intent-aware Expected Reciprocal Rank (ERR-IA@N ): For this met-
ric, the contribution of each image is based on the relevance of images ranked
above it, by computing the ERR for each sub-event, with a weighted average
computed over sub-events.
Despite the proliferation of research methods for event detection and retrieval,
the available public datasets for their evaluation are limited. For that reason,
most of the works presented in section 2 are evaluated on different datasets col-
lected and annotated by their authors. Given the lack of a commonly accepted
ground truth dataset, containing annotations on the actual events, most of the
works follow a qualitative analysis of the detected events. Also, they may report
the precision of the detected events by examining which of them correspond to
actual events. However, it is difficult to calculate the recall as the total set of ac-
tual events that are present in a collection are unknown. In addition, judgments
about the association of documents to events are also missing, so it is difficult
to evaluate the obtained results, especially those produced by document-pivot
methods that provide events as sets of documents. As a result, an explicit com-
parison between these approaches is difficult or even impossible to perform.
Table 2 presents the reported results for selected event detection methods.
The listed papers have conducted experiments on proprietary datasets for which
there is no ground truth regarding the association of social media posts to events,
but rather only a list of known events. For that reason, the papers report the
number of candidate events detected by the methods and the precision achieved
at the event level (i.e. x% of the detected events are correct). This is the case
for instance for methods such as the ones presented in [12,31,63] that report
precision only for the highest ranked clusters (events). However, the highest
ranked clusters are indeed more likley to be related to real-world events. For
that reason, a fixed number of clusters K is considered during evaluation and
Precision@K (P @K) is calculated. Still, this kind of evaluation does not take
into account the quality of clusterings, i.e. how accurately the social media items
are assigned to clusters. An additional set of reported results are presented in
Table 3 with an emphasis on event detection from multimodal items (Flickr
32
M. Schinas et al.
images). It is interesting that despite the different datasets that are used by
different researchers the reported NMI scores lie in the same range (∼ 0.95).
Table 2. Reported results for selected event detection methods in Twitter. In the cases
that the number of reported events is marked with *, the number is selected by the
authors to report performance in terms of P @K.
Work
Weng & Lee, 2011 [90]
Tweets
4,331,937
Li et al., 2012 [38]
Same as [90]
Parikh & Karlapalem, 2013 [56] 1,023,077
Guille & Favre, 2014 [31]
Becker et al., 2011 [12]
Petrovi´c et al., 2010 [63]
1,437,126
2,086,136
2.6M
163.5M
Results
Method Events Precision
EDCoW 21
EDCoW 21
101
Twevent
23
40*
40*
40*
40*
76.2%
76.2%
86.1%
91%
57.5%
77.5%
70%
82.5%
MABED
RW-Event 5*, 10* 85%, 70%
MABED
ET
ET
ET
LSH
1000*
34.0%
Table 3. Evaluation of multimodal event detection from Flickr images.
Work
Becker et al., 2009 [10]
Images Events
Results
NMI B-Cubed
Becker et al., 2010 [11]
Reuter & Cimiano, 2012 [66] ∼1M 36,782
Petkos et al., 2012 [59]
36
-
270,425 9,515 0.933
270,425 9,515 0.951
594,946 24,958 0.944
0.915
73,645
306,159 14,852 0.975
362,578 17,834 0.981
167,332
0.708
149
-
0.826
0.816
0.744
-
-
-
-
Petkos et al., 2017 [62]
Bao et al., 2013 [7]
One of the few publicly available benchmarks is the Social Event Detection
(SED) task, an open challenge that ran within the MediaEval Initiative8 for
four successive years (2011-2014). The main objective of the task was the dis-
covery of social events in collections of multimedia content posted in social media
platforms. The SED 2011 task [55] had two challenges. In both challenges par-
ticipants were provided with a set of Flickr images and were asked to retrieve
events of a particular type at particular locations. The first challenge sought
for all soccer events in Barcelona (Spain) and Rome (Italy), while the second
challenge required from the participants to find all events that took place in May
8 http://www.multimediaeval.org/
Event Detection and Retrieval on Social Media
33
2009 in the venue named Paradiso in Amsterdam and in the Parc del Forum in
Barcelona. Note that the actual events were unknown to participants, who had
to provide the events as sets of images related to them. The dataset for the 2011
task consisted of 73,645 Flickr photos.
The SED 2012 task [54] included three challenges, quite similar to those
of the previous year. Each challenge required the identification of events that
met some predefined criteria: the first challenge required participants to find
images associated with technical community events taking place in Germany;
the second asked participants to find all soccer events taking place in Hamburg
(Germany) and Madrid (Spain); finally, in the third challenge, the target was
demonstrations and protest events of the "Indignados movement" occurring in
public places in Madrid. A much wider collection of 167,332 photos by 4,422
unique Flickr users was created9, and the collected photos were all licensed
under a Creative Commons licence, and were captured between the beginning
of 2009 and the end of 2011.
The 2013 SED task [67] had a significant difference to the two previous years
tasks. Whereas in the previous years, a single dataset that includes both event
and non-event photos was provided and the challenges asked for the retrieval
of content about specific events, in 2013 two datasets were provided, and two
new distinct challenges were defined. The first challenge required participants
to provide a complete clustering of images in the dataset according to events.
That is, the first challenge asked for a clustering of all images in the relevant
dataset, according to the events that they depict. This comes in contrast to
the challenges in the first two years, where a) not all images in the collection
were related to some event and b) specific criteria were defined for the events of
interest. The second challenge required the classification of images into specific
event types. The dataset10 for the first challenge consists of 427,370 pictures from
Flickr and 1,327 videos from YouTube together with their associated metadata.
The pictures, uploaded between January 2006 and December 2012, correspond
to 21,169 events. The dataset for Challenge 2 was collected from Instagram.
The training set was collected between 27th and 29th of April 2013, based on
event-related keywords, and consisted of 27,754 pictures, while the test set was
collected between the 7th and 13th of May 2013 and consisted of 29,411 pictures.
The 2014 SED task [60] consisted again of two challenges/subtasks. For the
first challenge similar to 2013, participants were asked to produce a full clustering
of the images, so that each cluster corresponds to a social event. In the second
subtask, a collection of events was provided; each event was represented by a
set of images with their metadata, and participants were asked to retrieve those
events, i.e. other images, that met some criteria. The test dataset11 contains
362,578 images and together with it, the grouping of these images into 17,834
social events. The training dataset, for which grouping of images into clusters is
provided, contained 110,541 images.
9 http://mklab.iti.gr/project/sed2012
10 http://mklab.iti.gr/project/sed2013
11 http://mklab.iti.gr/project/sed2014
34
M. Schinas et al.
As there was a difference across the challenges from year to year, for their
evaluation different approaches were tested. For the challenges in the first two
years, 2011 and 2012, two metrics were used, Macro F-measure and NMI. For the
first challenge in years 2013 and 2014, which can be seen as a full clustering prob-
lem, NMI was also used, in conjunction with the micro F-measure (B-Cubed).
Tables 4 and 5 present an overview of the reported results of SED approaches in
the task editions for 2013 and 2014 respectively. Regarding the first challenge in
both years, most of the participants achieved a decent performance and in many
cases the results were surprisingly good. The second challenge of 2013, targeting
event type classification, led to results that were lower than expected. Participa-
tion in the 2014 second challenge was limited, and the mediocre reported results
indicate that there is space for improvements in the event-based retrieval task.
Table 4. SED 2013 results
Challenge 1 Challenge 2
F-score NMI Fcat FE/NE
0.570 0.873
0.946 0.985
0.704 0.910 0.334 0.716
-
-
-
-
Rafailidis et al., 2013 [65]
Samangooei et al, 2013 [71]
Schinas et al., 2013 [74]
Manchon-Vizuete & Gir´o Nieto, 2013 [42] 0.883 0.973
Nguyen et al., 2013 [52]
Zeppelzauer et al., 2013 [94]
Sutanto & Nayak, 2013 [81]
Wistuba & Schmidt-Thieme, 2013 [91]
Tserpes et al., 2013 [84]
Gautam et al., 2013 [36]
Brenner & Izquierdo, 2013 [16]
0.932 0.984 0.449 0.854
0.780 0.940
0.812 0.954 0.131 0.537
0.878 0.965
0.236 0.664
0.142 0.180
0.780 0.940 0.332 0.721
-
-
-
-
-
-
-
-
-
-
Table 5. SED 2014 results
Zaharieva et al., 2014 [93]
Guinaudeau et al., 2014 [32]
Riga et al., 2014 [68]
Manchon-Vizuete et al., 2014 [43] 0.924 0.982
Sutanto & Nayak, 2014 [82]
0.753 0.902
0.753 0.902
Denman et al., 2014 [24]
-
Challenge 2
Challenge 1
F-score NMI P
0.948 0.989 0.420 0.406 0.288
0.821 0.955
0.916 0.982 0.708 0.392 0.460
F1
R
-
-
-
-
-
-
-
-
-
-
-
Furthermore, McMinn et al. [46] proposed a methodology for building a cor-
pus of tweets, to be used for event detection methods. To create a candidate list
of events, McMin et al. used a number of existing event detection approaches and
Event Detection and Retrieval on Social Media
35
the Wikipedia Current Events Portal12. The two methods used to detect events
were the ones by Petrovi´c et al. [63] and Aggarwal & Subbian [1], both presented
in section 2.1. The authors ran the first method [63] over a random sample of
tweets using parameters similar to those reported in the original paper. However,
rather than ranking clusters every 100,000 tweets, authors opted for a ranking
at an hourly basis. For each hour, clusters were ranked by the number of unique
users, and clusters with low entropy were removed. This yielded a list 1,340 can-
didate events. Using the cluster summarization method of Aggarwal & Subbian
[1], McMinn et al. were able to produce 1,097 candidate events. Wikipedia events
were used within an information retrieval framework to obtain tweets related to
the events. Each Wikipedia event was represented as a short description, a cate-
gory, and a link to a relevant news article. The event description was then used
as an initial query to retrieve tweets that potentially discuss the event. Query
expansion was also performed using some of the best performing approaches in
the TREC13 Microblog track [5,34]. For each of the 468 events on the Wikipedia
Current Events Portal listed between the dates covered by the corpus, the top
2,000 tweets were retrieved from a window of 72 hours, centered around the date
of the event. A by-product of this work is a corpus of about 500 news events
sampled over a four-week period, including relevance judgments for thousands
of tweets referring to them.
For evaluation of event summarization, McParlane et al.
[47] created a
dataset, built upon the one by McMinn et al. [46]. This dataset is available
on demand. Another public dataset, used for the evaluation of the approach
proposed in [75] and [76] is also available14. This dataset consists of an exten-
sion of McParlane's dataset[47], alongside two more datasets related to the 2015
Baltimore protests15 and the 2012 US Presidential Elections16.
The TREC Real-Time Summarization Track17 is the successor of the Mi-
croblog Track since 2016. The task focuses on the problem of topic-oriented
summarization of a Twitter stream. Given a set of topics of interest, the partici-
pants should identify relevant tweets in the stream per topic, and update a sum-
mary for each topic when new pieces of information are presented. There are two
scenarios for the summaries: a) a real-time scenario where relevant/important
messages are pushed to evaluators shortly after their identification and b) an
offline schenario, where summaries are produced and sent in batches as email
digests. Although the topics of the track are not restricted only to real world
events, the task is closely related to the event-based summarization problem,
and the approaches presented in section 3 can be used and evaluated in that
setting. The evaluation of participants is based on the methodology presented
in [88].
12 https://en.wikipedia.org/wiki/Portal:Current_events
13 http://trec.nist.gov/
14 https://github.com/MKLab-ITI/mgraph-summarization
15 https://en.wikipedia.org/wiki/2015_Baltimore_protests
16 https://en.wikipedia.org/wiki/United_States_presidential_election,_2012
17 http://trecrts.github.io/TREC2017-RTS-guidelines.html
36
M. Schinas et al.
5 Conclusions
The chapter presented an overview of numerous methods for detecting events
in large collections and streams of social media content and of methods for
retrieving and summarizing content relevant to given events. The proliferation
of research on the topic demonstrates the challenging nature of the problem
and its potential for creating attractive and useful retrieval applications for end
users.
Throughout the chapter, a number of key important methodological ele-
ments were identified that may be considered as components of the presented
approaches:
– Feature representation: Text is the primary modality used for representing
social media posts, typically using established representations such as Bag-
of-Words, which are often enriched by additional more semantically promi-
nent elements such as named entities, tags, and topics. Visual content, when
used, has extensively relied on Bag-of-Visual-Words representation, Vector
of Locally Aggregated Descriptors, while the recently proposed Deep Convo-
lutional Neural Network features have become increasingly important. Ad-
ditional modalities such as time, location and social interactions are another
important component of social media content in relation to event detection
and retrieval, with very simple and ad hoc features being used.
– Semantic similarity: Another important component of event detection meth-
ods is the way that the similarity between content items is computed. Stan-
dard measures based on cosine and Jaccard similarity are employed by the
majority of methods, especially in relation to Bag-of-Words representations,
while more sophisticated methods rely on learned similarity models, i.e. mod-
els that are trained with indicative pairs of examples to produce a similarity
score. In such cases, the training process is crucial in ending up with an
accurate and robust similarity function.
– Classification models: These constitute an essential component in several
cases, either as a means of filtering non-event or low-quality content or for
classifying media items or clusters of items into distinct categories of events.
Most approaches rely on standard models, including Naive Bayes, Logis-
tic Regression, Random Forests and Support Vector Machines, all of which
constitute well-tested and easily deployable solutions.
– Clustering algorithms: A crucial component of event detection methods is
the clustering algorithm that is used for assigning social media items to
clusters corresponding to distinct events. Depending on the input represen-
tation, conventional data clustering algorithms (k-means, DBSCAN, etc.) or
graph-based ones (Spectral, SCAN, QCA, etc.) can be used. Additionally,
an important decision is whether the algorithm should lead to a partition of
the collection (i.e. all items assigned to clusters) or a selective clustering (as
in the case of DBSCAN and SCAN).
– Content ranking: This is a key element of event retrieval and summarization
methods and entails a variety of approaches for predicting a score that ex-
presses how suitable a given social media item is as a result to an event query.
Event Detection and Retrieval on Social Media
37
Important desiderata in this context are the capturing of both relevance and
diversity in a selected set of items. Relatively under-explored areas include
the personalization of summaries and the consideration of additional criteria
such as credibility (especially in the context of news), aesthetics/quality and
viewpoint.
For researchers and practitioners in the area, who use existing methods or de-
velop new ones, it is always useful to think of the aforementioned elements as
design choices that could affect the performance of the resulting system.
An additional finding of our research is the relative scarcity of public re-
sources for evaluating the performance of event detection, retrieval and summa-
rization methods. This is primarily due to the fact that considerable amounts
of manual effort are needed to create ground truth annotations for large-scale
datasets. Another complication in generating persistent datasets is the highly
volatile nature of social media content, sizable portions of which tend to disap-
pear in the long run. Finally, there is a need for cross-platform datasets referring
to the same real-world events. In that way, it will be possible to study interest-
ing research questions, such as whether different social media platforms tend to
be used in relation to different aspects of an event. To sum up, enriching ex-
isting data resources, generating additional ones and conducting comprehensive
comparative studies among the multitude of methods that have been proposed
would all be valuable contributions towards achieving progress in the field.
References
1. Charu C Aggarwal and Karthik Subbian. Event detection in social streams. In
Proceedings of the 2012 SIAM international conference on data mining, pages 624–
635. SIAM, 2012.
2. James Allan. Introduction to topic detection and tracking. Topic detection and
tracking, pages 1–16, 2002.
3. Omar Alonso and Kyle Shiells. Timelines as summaries of popular scheduled
events. In Proceedings of the 22nd International Conference on World Wide Web,
pages 1037–1044. ACM, 2013.
4. Foteini Alvanaki, Sebastian Michel, Krithi Ramamritham, and Gerhard Weikum.
See what's enblogue: real-time emergent topic identification in social media. In
Proceedings of the 15th International Conference on Extending Database Technol-
ogy, pages 336–347. ACM, 2012.
5. Gianni Amati, Giuseppe Amodeo, Marco Bianchi, Giuseppe Marcone, Fon-
dazione Ugo Bordoni, Carlo Gaibisso, Giorgio Gambosi, Alessandro Celi, Cesidio
Di Nicola, and Michele Flammini. Fub, iasi-cnr, univaq at trec 2011 microblog
track. In TREC, 2011.
6. Enrique Amig´o, Julio Gonzalo, Javier Artiles, and Felisa Verdejo. A comparison
of extrinsic clustering evaluation metrics based on formal constraints. Information
retrieval, 12(4):461–486, 2009.
7. Bing-Kun Bao, Weiqing Min, Ke Lu, and Changsheng Xu. Social event detection
with robust high-order co-clustering. In Proceedings of the 3rd ACM conference on
International conference on multimedia retrieval, pages 135–142. ACM, 2013.
38
M. Schinas et al.
8. Hila Becker, Feiyang Chen, Dan Iter, Mor Naaman, and Luis Gravano. Automatic
identification and presentation of twitter content for planned events. In ICWSM,
2011.
9. Hila Becker, Dan Iter, Mor Naaman, and Luis Gravano. Identifying content for
planned events across social media sites. In Proceedings of the fifth ACM interna-
tional conference on Web search and data mining, pages 533–542. ACM, 2012.
10. Hila Becker, Mor Naaman, and Luis Gravano. Event identification in social media.
In WebDB, 2009.
11. Hila Becker, Mor Naaman, and Luis Gravano. Learning similarity metrics for
event identification in social media. In Proceedings of the third ACM international
conference on Web search and data mining, pages 291–300. ACM, 2010.
12. Hila Becker, Mor Naaman, and Luis Gravano. Beyond trending topics: Real-world
event identification on twitter. ICWSM, 11(2011):438–441, 2011.
13. Edward Benson, Aria Haghighi, and Regina Barzilay. Event discovery in social
media feeds.
In Proceedings of the 49th Annual Meeting of the Association for
Computational Linguistics: Human Language Technologies-Volume 1, pages 389–
398. Association for Computational Linguistics, 2011.
14. Jingwen Bian, Yang Yang, and Tat-Seng Chua. Multimedia summarization for
trending topics in microblogs. In Proceedings of the 22nd ACM international con-
ference on Conference on information & knowledge management, pages 1807–1812.
ACM, 2013.
15. David M Blei, Andrew Y Ng, and Michael I Jordan. Latent dirichlet allocation.
In Advances in neural information processing systems, pages 601–608, 2002.
16. Markus Brenner and Ebroul Izquierdo. Mediaeval 2013: Social event detection,
retrieval and classification in collaborative photo collections. MediaEval, 1043,
2013.
17. Hongyun Cai, Yang Yang, Xuefei Li, and Zi Huang. What are popular: exploring
twitter features for event detection, tracking and visualization. In Proceedings of
the 23rd ACM international conference on Multimedia, pages 89–98. ACM, 2015.
18. Mario Cataldi, Luigi Di Caro, and Claudio Schifanella. Emerging topic detection
on twitter based on temporal and social terms evaluation. In Proceedings of the
tenth international workshop on multimedia data mining, page 4. ACM, 2010.
19. Deepayan Chakrabarti and Kunal Punera. Event summarization using tweets.
ICWSM, 11:66–73, 2011.
20. Ling Chen and Abhishek Roy. Event detection from flickr data through wavelet-
based spatial analysis. In Proceedings of the 18th ACM conference on Information
and knowledge management, pages 523–532. ACM, 2009.
21. Jaeho Choi and W Bruce Croft. Temporal models for microblogs. In Proceedings
of the 21st ACM international conference on Information and knowledge manage-
ment, pages 2491–2494. ACM, 2012.
22. Jaeho Choi, W Bruce Croft, and Jin Young Kim. Quality models for microblog
retrieval. In Proceedings of the 21st ACM international conference on Information
and knowledge management, pages 1834–1838. ACM, 2012.
23. Freddy Chong Tat Chua and Sitaram Asur. Automatic summarization of events
from social media. In ICWSM, 2013.
24. Simon Denman, David Dean, Clinton Fookes, and Sridha Sridharan. Saivt-admrg@
mediaeval 2014 social event detection. In Working Notes Proceedings of the Me-
diaEval 2014 Multimedia Benchmark Workshop, volume 1263, pages 1–2. CEUR
Workshop Proceedings, 2014.
25. Qiming Diao and Jing Jiang. A unified model for topics, events and users on
twitter. ACL, 2013.
Event Detection and Retrieval on Social Media
39
26. Marian Dork, Daniel Gruen, Carey Williamson, and Sheelagh Carpendale. A vi-
sual backchannel for large-scale events. IEEE transactions on visualization and
computer graphics, 16(6):1129–1138, 2010.
27. Gunes Erkan and Dragomir R Radev. Lexrank: Graph-based lexical centrality as
salience in text summarization. Journal of Artificial Intelligence Research, 22:457–
479, 2004.
28. Elena Erosheva, Stephen Fienberg, and John Lafferty. Mixed-membership mod-
els of scientific publications. Proceedings of the National Academy of Sciences,
101(suppl 1):5220–5227, 2004.
29. Gabriel Pui Cheong Fung, Jeffrey Xu Yu, Philip S Yu, and Hongjun Lu. Parameter
free bursty events detection in text streams. In Proceedings of the 31st international
conference on Very large data bases, pages 181–192. VLDB Endowment, 2005.
30. Wei Gao, Peng Li, and Kareem Darwish. Joint topic modeling for event summa-
rization across news and social media streams. In Proceedings of the 21st ACM
international conference on Information and knowledge management, pages 1173–
1182. ACM, 2012.
31. Adrien Guille and C´ecile Favre. Mention-anomaly-based event detection and track-
ing in twitter. In Advances in Social Networks Analysis and Mining (ASONAM),
2014 IEEE/ACM International Conference on, pages 375–382. IEEE, 2014.
32. Camille Guinaudeau, Antoine Laurent, and Herv´e Bredin. Limsi@ mediaeval sed
2014.
33. Qi He, Kuiyu Chang, and Ee-Peng Lim. Analyzing feature trajectories for event
detection. In Proceedings of the 30th annual international ACM SIGIR conference
on Research and development in information retrieval, pages 207–214. ACM, 2007.
34. Thong Hoang Van Duc, Thomas Demeester, Johannes Deleu, Piet Demeester, and
Chris Develder. Ugent participation in the microblog track 2012. In Text Retrieval
Conference (TREC-2012), pages 1–5, 2012.
35. Yuheng Hu, Ajita John, Fei Wang, and Subbarao Kambhampati. Et-lda: Joint
topic modeling for aligning events and their twitter feedback. In AAAI, volume 12,
pages 59–65, 2012.
36. Kshitij Gautam Itika Gupta and Krishna Chandramouli. Vit@ mediaeval 2013
social event detection task: Semantic structuring of complementary information
for clustering events. 2013.
37. Chung-Hong Lee. Mining spatio-temporal information on microblogging streams
using a density-based online clustering method. Expert Systems with Applications,
39(10):9623–9641, 2012.
38. Chenliang Li, Aixin Sun, and Anwitaman Datta. Twevent: segment-based event
detection from tweets. In Proceedings of the 21st ACM international conference
on Information and knowledge management, pages 155–164. ACM, 2012.
39. Chen Lin, Chun Lin, Jingxuan Li, Dingding Wang, Yang Chen, and Tao Li. Gen-
erating event storylines from microblogs. In Proceedings of the 21st ACM inter-
national conference on Information and knowledge management, pages 175–184.
ACM, 2012.
40. Chin-Yew Lin and Eduard Hovy. Automatic evaluation of summaries using n-
gram co-occurrence statistics. In Proceedings of the 2003 Conference of the North
American Chapter of the Association for Computational Linguistics on Human
Language Technology-Volume 1, pages 71–78. Association for Computational Lin-
guistics, 2003.
41. Xueliang Liu, Raphael Troncy, and Benoit Huet. Finding media illustrating events.
In Proceedings of the 1st ACM International Conference on Multimedia Retrieval,
page 58. ACM, 2011.
40
M. Schinas et al.
42. Daniel Manchon Vizuete and Xavier Gir´o Nieto. Upc at mediaeval 2013 social
event detection task. In Proceedings of the MediaEval 2013 Multimedia Benchmark
Workshop. CEUR Workshop Proceedings, 2013.
43. Daniel Manchon-Vizuete, Irene Gris-Sarabia, and Xavier Gir´o Nieto. Upc at me-
diaeval 2014 social event detection task. In MediaEval, 2014.
44. Adam Marcus, Michael S Bernstein, Osama Badar, David R Karger, Samuel Mad-
den, and Robert C Miller. Twitinfo: aggregating and visualizing microblogs for
event exploration. In Proceedings of the SIGCHI conference on Human factors in
computing systems, pages 227–236. ACM, 2011.
45. Michael Mathioudakis and Nick Koudas. Twittermonitor: trend detection over the
twitter stream. In Proceedings of the 2010 ACM SIGMOD International Confer-
ence on Management of data, pages 1155–1158. ACM, 2010.
46. Andrew J McMinn, Yashar Moshfeghi, and Joemon M Jose. Building a large-
scale corpus for evaluating event detection on twitter. In Proceedings of the 22nd
ACM international conference on Information & Knowledge Management, pages
409–418. ACM, 2013.
47. Philip J McParlane, Andrew James McMinn, and Joemon M Jose. Picture the
scene...;: Visually summarising social media events. In Proceedings of the 23rd ACM
International Conference on Conference on Information and Knowledge Manage-
ment, pages 1459–1468. ACM, 2014.
48. Polykarpos Meladianos, Giannis Nikolentzos, Fran¸cois Rousseau, Yannis Stavrakas,
and Michalis Vazirgiannis. Degeneracy-based real-time sub-event detection in twit-
ter stream. In ICWSM, pages 248–257, 2015.
49. Donald Metzler, Congxing Cai, and Eduard Hovy. Structured event retrieval over
microblog archives. In Proceedings of the 2012 Conference of the North Ameri-
can Chapter of the Association for Computational Linguistics: Human Language
Technologies, pages 646–655. Association for Computational Linguistics, 2012.
50. Taiki Miyanishi, Kazuhiro Seki, and Kuniaki Uehara. Improving pseudo-relevance
feedback via tweet selection. In Proceedings of the 22nd ACM international con-
ference on Information & Knowledge Management, pages 439–448. ACM, 2013.
51. Sean Moran, Richard McCreadie, Craig Macdonald, and Iadh Ounis. Enhancing
first story detection using word embeddings.
In Proceedings of the 39th Inter-
national ACM SIGIR conference on Research and Development in Information
Retrieval, pages 821–824. ACM, 2016.
52. Truc-Vien Nguyen, Minh-Son Dao, Riccardo Mattivi, Emanuele Sansone,
Francesco GB De Natale, and Giulia Boato. Event clustering and classification
from social media: Watershed-based and kernel methods. In MediaEval, 2013.
53. Jeffrey Nichols, Jalal Mahmud, and Clemens Drews. Summarizing sporting events
using twitter. In Proceedings of the 2012 ACM international conference on Intel-
ligent User Interfaces, pages 189–198. ACM, 2012.
54. Symeon Papadopoulos, Emmanouil Schinas, Vasileios Mezaris, Raphal Troncy,
and Yiannis Kompatsiaris. Social event detection at mediaeval 2012: Challenges,
dataset and evaluation. In MediaEval, 2012.
55. Symeon Papadopoulos, Raphael Troncy, Vasileios Mezaris, Benoit Huet, and Ioan-
nis Kompatsiaris. Social event detection at mediaeval 2011: Challenges, dataset
and evaluation. In MediaEval, 2011.
56. Ruchi Parikh and Kamalakar Karlapalem. Et: events from tweets. In Proceedings of
the 22nd international conference on world wide web, pages 613–620. ACM, 2013.
57. Michael Paul and Roxana Girju. Cross-cultural analysis of blogs and forums with
mixed-collection topic models. In Proceedings of the 2009 Conference on Empirical
Event Detection and Retrieval on Social Media
41
Methods in Natural Language Processing: Volume 3-Volume 3, pages 1408–1417.
Association for Computational Linguistics, 2009.
58. Michael Paul and Roxana Girju. A two-dimensional topic-aspect model for discov-
ering multi-faceted topics. Urbana, 51(61801):36, 2010.
59. Georgios Petkos, Symeon Papadopoulos, and Yiannis Kompatsiaris. Social event
In
detection using multimodal clustering and integrating supervisory signals.
Proceedings of the 2nd ACM International Conference on Multimedia Retrieval,
page 23. ACM, 2012.
60. Georgios Petkos, Symeon Papadopoulos, Vasileios Mezaris, and Yiannis Kompat-
siaris. Social event detection at mediaeval 2014: Challenges, datasets, and evalua-
tion. In MediaEval, 2014.
61. Georgios Petkos, Symeon Papadopoulos, Vasileios Mezaris, Raphael Troncy,
Philipp Cimiano, Timo Reuter, and Yiannis Kompatsiaris. Social event detec-
tion at mediaeval: a three-year retrospect of tasks and results.
In Proceedings
of International Workshop on Social Events in Web Multimedia (co-located with
ICMR 2014), pages 27–34, 2014.
62. Georgios Petkos, Manos Schinas, Symeon Papadopoulos, and Yiannis Kompat-
siaris. Graph-based multimodal clustering for social multimedia. Multimedia Tools
and Applications, 76(6):7897–7919, 2017.
63. Sasa Petrovi´c, Miles Osborne, and Victor Lavrenko. Streaming first story detection
with application to twitter. In Human Language Technologies: The 2010 Annual
Conference of the North American Chapter of the Association for Computational
Linguistics, pages 181–189. Association for Computational Linguistics, 2010.
64. Sasa Petrovi´c, Miles Osborne, and Victor Lavrenko. Using paraphrases for improv-
ing first story detection in news and twitter. In Proceedings of the 2012 Conference
of the North American Chapter of the Association for Computational Linguistics:
Human Language Technologies, pages 338–346. Association for Computational Lin-
guistics, 2012.
65. Dimitrios Rafailidis, Theodoros Semertzidis, Michalis Lazaridis, Michael G
Strintzis, and Petros Daras. A data-driven approach for social event detection.
In MediaEval, 2013.
66. Timo Reuter and Philipp Cimiano. Event-based classification of social media
streams. In Proceedings of the 2nd ACM International Conference on Multime-
dia Retrieval, page 22. ACM, 2012.
67. Timo Reuter, Symeon Papadopoulos, Giorgos Petkos, Vasileios Mezaris, Yiannis
Kompatsiaris, Philipp Cimiano, Christopher de Vries, and Shlomo Geva. So-
cial event detection at mediaeval 2013: Challenges, datasets, and evaluation. In
Proceedings of the MediaEval 2013 Multimedia Benchmark Workshop Barcelona,
Spain, October 18-19, 2013, 2013.
68. Marina Riga, Georgios Petkos, Symeon Papadopoulos, Manos Schinas, and Yiannis
Kompatsiaris. Certh@ mediaeval 2014 social event detection task. In MediaEval,
2014.
69. Alan Ritter, Oren Etzioni, Sam Clark, et al. Open domain event extraction from
In Proceedings of the 18th ACM SIGKDD international conference on
twitter.
Knowledge discovery and data mining, pages 1104–1112. ACM, 2012.
70. Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. Earthquake shakes twit-
ter users: real-time event detection by social sensors. In Proceedings of the 19th
international conference on World wide web, pages 851–860. ACM, 2010.
71. Sina Samangooei, Jonathon Hare, David Dupplaw, Mahesan Niranjan, Nicholas
Gibbins, Paul H Lewis, Jamie Davies, Neha Jain, and John Preston. Social event
42
M. Schinas et al.
detection via sparse multi-modal feature selection and incremental density based
clustering. 2013.
72. Jagan Sankaranarayanan, Hanan Samet, Benjamin E Teitler, Michael D Lieber-
man, and Jon Sperling. Twitterstand: news in tweets. In Proceedings of the 17th
acm sigspatial international conference on advances in geographic information sys-
tems, pages 42–51. ACM, 2009.
73. Hassan Sayyadi, Matthew Hurst, and Alexey Maykov. Event detection and tracking
in social streams. In Icwsm, 2009.
74. Emmanouil Schinas, Eleni Mantziou, Symeon Papadopoulos, Georgios Petkos, and
Yiannis Kompatsiaris. Certh @ mediaeval 2013 social event detection task. Medi-
aEval, 1043, 2013.
75. Manos Schinas, Symeon Papadopoulos, Yiannis Kompatsiaris, and Pericles A.
Mitkas. Visual event summarization on social media using topic modelling and
graph-based ranking algorithms. In Proceedings of the 5th ACM on International
Conference on Multimedia Retrieval, ICMR '15, pages 203–210, New York, NY,
USA, 2015. ACM.
76. Manos Schinas, Symeon Papadopoulos, Yiannis Kompatsiaris, and Pericles A
Mitkas. Mgraph: multimodal event summarization in social media using topic
models and graph-based ranking. International Journal of Multimedia Informa-
tion Retrieval, 5(1):51–69, 2016.
77. Aliaksei Severyn and Alessandro Moschitti. Learning to rank short text pairs with
convolutional deep neural networks. In Proceedings of the 38th International ACM
SIGIR Conference on Research and Development in Information Retrieval, pages
373–382. ACM, 2015.
78. Ryan Shaw, Raphael Troncy, and Lynda Hardman. Lode: Linking open descrip-
tions of events. ASWC, 9:153–167, 2009.
79. Chao Shen, Fei Liu, Fuliang Weng, and Tao Li. A participant-based approach for
In HLT-NAACL, pages 1152–1162,
event summarization using twitter streams.
2013.
80. Alexander Strehl and Joydeep Ghosh. Cluster ensembles-a knowledge reuse frame-
work for combining partitionings. In Aaai/iaai, pages 93–99, 2002.
81. Taufik Sutanto and Richi Nayak. Admrg@ mediaeval 2013 social event detection.
In Proceedings of the MediaEval 2013 Multimedia Benchmark Workshop, volume
1043. CEUR-WS. org, 2013.
82. Taufik Sutanto and Richi Nayak. Ranking based clustering for social event detec-
tion. In MediaEval, 2014.
83. Bart Thomee, David A Shamma, Gerald Friedland, Benjamin Elizalde, Karl Ni,
Douglas Poland, Damian Borth, and Li-Jia Li. Yfcc100m: The new data in multi-
media research. Communications of the ACM, 59(2):64–73, 2016.
84. Konstantinos Tserpes, Magdalini Kardara, and Theodora Varvarigou. A similarity-
based chinese restaurant process for social event detection.
85. Dingding Wang, Tao Li, and Mitsunori Ogihara. Generating pictorial storylines via
minimum-weight connected dominating set approximation in multi-view graphs. In
AAAI, 2012.
86. Xuerui Wang and Andrew McCallum. Topics over time: a non-markov continuous-
time model of topical trends. In Proceedings of the 12th ACM SIGKDD interna-
tional conference on Knowledge discovery and data mining, pages 424–433. ACM,
2006.
87. Yanxiang Wang, Hari Sundaram, and Lexing Xie. Social event detection with in-
teraction graph modeling. In Proceedings of the 20th ACM international conference
on Multimedia, pages 865–868. ACM, 2012.
Event Detection and Retrieval on Social Media
43
88. Yulu Wang, Garrick Sherman, Jimmy Lin, and Miles Efron. Assessor differences
and user preferences in tweet timeline generation. In Proceedings of the 38th In-
ternational ACM SIGIR Conference on Research and Development in Information
Retrieval, pages 615–624. ACM, 2015.
89. Wei Wei, Kenneth Joseph, Wei Lo, and Kathleen M Carley. A bayesian graphical
model to discover latent events from twitter. In ICWSM, pages 503–512, 2015.
90. Jianshu Weng and Bu-Sung Lee. Event detection in twitter. ICWSM, 11:401–408,
2011.
91. Martin Wistuba and Lars Schmidt-Thieme. Supervised clustering of social media
streams. In MediaEval, 2013.
92. Yue You, Guangyan Huang, Jian Cao, Enhong Chen, Jing He, Yanchun Zhang,
and Liang Hu. Geam: A general and event-related aspects model for twitter event
detection. In International Conference on Web Information Systems Engineering,
pages 319–332. Springer, Berlin, Heidelberg, 2013.
93. Maia Zaharieva, Daniel Schopfhauser, Manfred Del Fabro, and Matthias Zeppelza-
uer. Clustering and retrieval of social events in flickr. In MediaEval, 2014.
94. Matthias Zeppelzauer, Maia Zaharieva, and Manfred Del Fabro. Unsupervised
clustering of social events. In MediaEval, 2013.
95. Xiaoming Zhang, Xiaoming Chen, Yan Chen, Senzhang Wang, Zhoujun Li, and
Jiali Xia. Event detection and popularity prediction in microblogging. Neurocom-
puting, 149:1469–1480, 2015.
96. Wayne Xin Zhao, Jing Jiang, Jianshu Weng, Jing He, Ee-Peng Lim, Hongfei Yan,
and Xiaoming Li. Comparing twitter and traditional media using topic models. In
European Conference on Information Retrieval, pages 338–349. Springer, 2011.
97. Deyu Zhou, Liangyu Chen, and Yulan He. An unsupervised framework of exploring
events on twitter: Filtering, extraction and categorization. In AAAI, pages 2468–
2475, 2015.
98. Xiangmin Zhou and Lei Chen. Event detection over twitter social media streams.
The VLDB journal, 23(3):381–400, 2014.
|
1902.02954 | 2 | 1902 | 2019-04-19T19:33:01 | Synergistic Effects in Networked Epidemic Spreading Dynamics | [
"cs.SI",
"q-bio.PE"
] | In this brief, we study epidemic spreading dynamics taking place in complex networks. We specifically investigate the effect of synergy, where multiple interactions between nodes result in a combined effect larger than the simple sum of their separate effects. Although synergistic effects play key roles in various biological and social phenomena, their analyses have been often performed by means of approximation techniques and for limited types of networks. In order to address this limitation, this paper proposes a rigorous approach to quantitatively understand the effect of synergy in the Susceptible-Infected-Susceptible model taking place in an arbitrary complex network. We derive an upper bound on the growth rate of the synergistic Susceptible-Infected-Susceptible model in terms of the eigenvalues of a matrix whose size grows quadratically with the number of the nodes in the network. We confirm the effectiveness of our result by numerical simulations on empirically observed human and animal social networks. | cs.SI | cs | JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
1
Synergistic Effects in Networked Epidemic
Spreading Dynamics
Masaki Ogura, Member, IEEE, Wenjie Mei, and Kenji Sugimoto, Member, IEEE
9
1
0
2
r
p
A
9
1
]
I
S
.
s
c
[
2
v
4
5
9
2
0
.
2
0
9
1
:
v
i
X
r
a
Abstract -- In this brief, we study epidemic spreading dynamics
taking place in complex networks. We specifically investigate
the effect of synergy, where multiple interactions between nodes
result in a combined effect larger than the simple sum of their
separate effects. Although synergistic effects play key roles in
various biological and social phenomena, their analyses have been
often performed by means of approximation techniques and for
limited types of networks. In order to address this limitation, this
paper proposes a rigorous approach to quantitatively understand
the effect of synergy in the Susceptible-Infected-Susceptible
model taking place in an arbitrary complex network. We derive
an upper bound on the growth rate of the synergistic Susceptible-
Infected-Susceptible model
in terms of the eigenvalues of a
matrix whose size grows quadratically with the number of the
nodes in the network. We confirm the effectiveness of our result
by numerical simulations on empirically observed human and
animal social networks.
Index Terms -- Complex networks, spreading processes, syner-
gistic interactions.
I. INTRODUCTION
U NDERSTANDING epidemic spreading dynamics taking
place in complex networks is of utmost importance with
applications in epidemiology [1], opinion formation, rumor
propagation, and cyber security [2], [3]. During the last two
decades, several important advances have been made toward
the analysis, modeling, and control of networked spreading
processes [4]. For example, fundamental connections between
the eigenvalues of a network and epidemic thresholds were
identified in [5]. A unified framework for the analysis of
spreading processes evolving on multilayer networks was
presented in [6]. The dynamical change of network structures
dependent on the evolution of spreading processes has been
actively investigated in the context of adaptive networks [7].
Recently, control and optimization tools have been proven to
be effective for containing spreading processes in static [8],
multi-layer [9], and temporal [10] networks. A prominent
example of the achievements of network epidemiology can be
found in, for example, effective predictions of the pandemic
of H1N1 influenza on 2009 [11], [12].
All the aforementioned results assume nearest-neighbor in-
teractions, in which individual nodes are directly influenced by
only their neighbors. However, in realistic epidemic spreading
processes, we frequently observe multi-node interactions, in
which a node can affect not only its neighbors but also
other nodes such as the neighbors of its neighbors. A typical
M. Ogura, W. Mei, and K. Sugimoto are with the Division of Information
Science, Nara Institute of Science and Technology, Ikoma, Nara 630-0192,
Japan. e-mail: {oguram, mei.wenjie.mu2, kenji}@is.naist.jp.
This work was supported by JSPS KAKENHI Grant Number JP18K13777.
example of such phenomena can be found in the colonization
by fungal and bacterial pathogens [13] and tumor growth [14].
In the context of human social networks, it has been exper-
imentally confirmed that the spreads of opinions [15] and
behaviors [16] are effectively accelerated by synergistic effects,
which make the combined effect from multiple interactions
greater than the simple sum of the effect of individual inter-
actions.
We find in the literature several works providing theoretical
insight for understanding the effect of synergistic interactions
on spreading processes. The authors in [17] considered an
extended Susceptible-Infected-Recovered (SIR) model with
synergistic effects, and numerically confirmed on lattices that
synergy can significantly alter asymptotic behaviors of the
spread. Similar models were further investigated analytically
on lattices [18] and small-world networks [19], respectively.
The authors in [20] studied the effect of synergy in the
Susceptible-Infected-Susceptible (SIS) model under the as-
sumption that the nodes having the same degree behave in
the same manner. The effect of synergy on deterministic
spreading processes was investigated in [21] with a mean-field
approximation technique.
This brief proposes a rigorous but tractable approach to
quantitatively analyze the effect of synergy in the SIS model
taking place in arbitrary networks, without resorting to mean-
field approximations. A primary challenge in this context is
to obtain computationally tractable results, because the state
space of the spreading model grows exponentially with the
number of nodes in the network. To overcome this difficulty,
in this brief we show that the growth rate of the size of
the infected population in the network can be bounded from
above by the maximum real part of the eigenvalues of a
matrix whose size grows only quadratically with the number
of the nodes. In the derivation of the upper bound, we use
Poisson-type stochastic differential equations describing the
spreading model. The effectiveness of our theoretical results
is numerically illustrated by simulations on empirical human
and animal social networks.
This brief is organized as follows. After preparing mathe-
matical notations, in Section II we introduce the synergistic
SIS model over arbitrary complex networks. In Section III,
we derive our upper-bound on the growth rate of the model.
Numerical simulations are presented in Section IV.
Notations: The maximum real part of the eigenvalues of a
square matrix A is denoted by λmax(A). An undirected graph
is defined as the pair G = (V, E), where V = {1, . . . , N} is
a set of nodes and E is a set of edges, i.e., unordered pairs of
nodes. We say that nodes i and j are adjacent if {i, j} ∈ E. The
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
2
neighborhood of node i, denoted by Ni, is defined as the set of
nodes adjacent to node i. The adjacency matrix A = [aij]i,j
of G is defined as the N × N matrix such that aij = 1 if
nodes i and j are adjacent, and aij = 0 otherwise.
II. SYNERGISTIC SIS MODEL
We introduce the synergistic SIS model over complex
networks in this section. Let us start by reviewing the standard
SIS model without synergy (see, e.g., [22]). Let G be an undi-
rected graph having N nodes labeled as i = 1, . . . , N, with
edges representing interactions between nodes. At time t ≥ 0,
each node can be either susceptible or infected. When a node i
is infected, the node transitions into the susceptible state with
an instantaneous rate δi. Also, if node i is susceptible and
has an infected neighbor, then the neighbor can infect node i
with an instantaneous rate βi. The rates δi and βi are called
the recovery and transmission rate of node i, respectively. We
suppose that the above model evolves in the continuous-time;
therefore, the rates represent probabilities per unit time [1]
and, therefore, can be greater than one.
The SIS model uses a pair-wise description for infection
events and, therefore, does not allow synergistic effects. In
order to study the effect of synergy, we study the synergistic
SIS model [23], which we describe below. In the model, while
an infected node recovers with the rate δi as in the SIS model,
the rate at which a susceptible node i is infected by its infected
neighbor, say, node j, is equal to
βi + γjmj(t),
(1)
where γj denotes the strength of synergy and is dependent
on individual nodes, and mj(t) denotes the number of the
infected neighbors of node j at time t. The second term in (1)
is introduced to describe synergistic effects: a susceptible node
is directly affected not only by its infected neighbors but also
their neighbors (see Fig. 1 for a schematic picture). We remark
that, according to the classification in [17], the synergistic SIS
model incorporates only the d-synergies, which are caused by
adjacent pairs of infected nodes. Due to the limitations of
the space, this brief does not deal with the other category of
synergies called r-synergies arising in the interactions between
a susceptible node and its infected neighbors.
In this brief, we are interested in quantifying the rate at
which the spreading process described by the synergistic SIS
model grows. Therefore, we introduce the following definition:
Definition 1. For all node i and time t ≥ 0,
let pi(t)
denote the probability that node i is infected at
time t.
Define the growth rate of the synergistic SIS model by
ρ = supV0⊂{1,...,n} lim supt→∞ t−1log(cid:80)N
i=1 pi(t), where V0
sion lim supt→∞ t−1 log(cid:80)N
i=1 pi(t) represents the ex-
the expres-
i=1 pi(t) measures the asymptotic
growth of the expected number of infected nodes. Hence, the
growth rate in Definition 1 quantifies the worst-case growth
of the average size of the infected population.
pected number of infected nodes. Therefore,
the sum (cid:80)N
denotes the set of initially infected nodes.
In Definition 1,
The growth rate is closely related to fundamental notions in
the network epidemiology such as mean-time-to-absorption [5]
Fig. 1. Synergistic SIS model. Node j infects node i with an instantaneous
rate βi + γj because node j has one infected neighbor, while node k infects
node i with an instantaneous rate βi as in the SIS model.
and epidemic thresholds [22]. However, it is hard in practice
to exactly compute the growth rate. Since the synergistic SIS
model, as a Markov process, has a total of 2N states, the
computation of the growth rate requires finding the eigenvalues
of a 2N × 2N matrix representing the infinitesimal generator
of the Markov process [22]. Therefore,
the computational
complexity of exactly calculating the growth rate increases
exponentially with the number of the nodes [24]. To overcome
this difficulty, in the next section we introduce an upper-bound
on the growth rate in terms of the eigenvalues of a matrix
whose size grows only quadratically with N.
III. GROWTH RATE
In this section, we derive an upper bound on the growth
rate of the synergistic SIS model. For each node i and
let us define the variable xi(t) as xi(t) = 1 if
time t,
node i is infected at
time t, and xi(t) = 0 otherwise.
Then, since mj(t) = (cid:80)k∈Nj\{i}
xk(t), the synergistic rate
of infection (1) shows that the transition probability of the
variable xi
is described as Pr(xi(t + h) = 1 xi(t) =
0) = (cid:80)j∈Ni xj(t)(βi + γj(cid:80)k∈Nj\{i}
xk(t))h + o(h) and
Pr(xi(t + h) = 0 xi(t) = 1) = δih + o(h) for h > 0.
This implies that the variable xi obeys the following stochastic
differential equation with Poisson jumps (see, e.g., [25]):
dxi = −xidΠδi + (1 − xi)(cid:88)j∈Ni
xjdΠβi
(2)
+ (1 − xi)(cid:88)j∈Ni (cid:88)k∈Nj\{i}
xjxkdΠγj ,
where Πδi, Πβi, and Πγj are independent Poisson counters
with rates δi, βi, and γj, respectively. In the stochastic
differential equation (2), the first, second, and third terms
represent the recovery, direct infection from neighbors, and
synergy effects.
By (2), the expectation E[xi] satisfies
d
dt
E[xi] = −δiE[xi] + (cid:88)j∈Ni
+ (cid:88)j∈Ni (cid:88)k∈Nj\{i}
βiE[(1 − xi)xj]
γjE[(1 − xi)xjxk].
Notice that we have pi(t) = E[xi(t)]. Also,
introduce
the notations pij(t) = E[xi(t)xj(t)]
(3)
let us
and
𝛽𝑖+𝛾𝑗𝛽𝑖𝑘𝑗𝑖SusceptibleInfectedJOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
aijpj +
N(cid:88)j=1
dpi
dt ≤ −δipi + βi
N(cid:88)j=1(cid:88)k<j
dt ≤ −δ(cid:96)pi(cid:96) + βi(cid:96)(pi − pi(cid:96)) +(cid:88)m<i
k(cid:54)=i
dpi(cid:96)
aijakjγjpkj +
N(cid:88)j=1(cid:88)k>j
k(cid:54)=i
am(cid:96)β(cid:96)pmi +(cid:88)m>i
am(cid:96)β(cid:96)pim +
− δipi(cid:96) + βiai(cid:96)(p(cid:96) − pi(cid:96)) +(cid:88)j<(cid:96)
ajiβipj(cid:96) +(cid:88)j>(cid:96)
ajiβip(cid:96)j +
aijakjγjpjk,
3
(9)
N(cid:88)m=1(cid:32)(cid:88)n<m
N(cid:88)j=1(cid:32)(cid:88)k<j
n(cid:54)=(cid:96)
k(cid:54)=i
am(cid:96)anmγmpnm + (cid:88)n>m
ajiakjγjpkj +(cid:88)k>j
n(cid:54)=(cid:96)
am(cid:96)anmγmpmn(cid:33)
ajiakjγjpjk(cid:33).
k(cid:54)=i
(10)
pijk(t) = E[xi(t)xj(t)xk(t)] for all i, j, k ∈ {1, . . . , N} and
t ≥ 0. Then, the differential equation (3) is rewritten as
dpi
dt
= −δipi + (cid:88)j∈Ni
βi(pj − pij)
+ (cid:88)j∈Ni (cid:88)k∈Nj\{i}
(4)
γj(pjk − pijk).
This differential equation rigorously describes the evolution of
the infection probabilities pi, which we require to compute the
growth rate ρ. However, the differential equation contains the
higher-order terms pij and pijk and, therefore, is not closed
in the first-order term pi. For this reason, we cannot readily
use the differential equation for calculating the growth rate.
We avoid this difficulty by ignoring the third order
terms pijk and deriving a set of differential inequalities for
upper-bounding the growth rate of the synergistic SIS model.
Intuitively, we can expect that ignoring the higher-order terms
brings relatively small errors in the regime of extinction (i.e.,
when the epidemics dies out), in which lower-order terms
become dominant. From differential equation (4), we obtain
dpi
dt ≤ −δipi + βi
N(cid:88)j=1
N(cid:88)j=1(cid:88)k(cid:54)=i
aijpj +
aijakjγjpjk.
(5)
It should be emphasized that, in deriving inequality (5), we
chose to ignore the negative second order terms −βipij for
j ∈ Ni as well as the third-order terms. We discuss the reason
for and consequence from this manipulation later in Remark 2.
Then, let us derive differential equations for the evolution
of the second-order terms. If we apply Ito's formula [25] to
the mapping (xi, x(cid:96)) (cid:55)→ xix(cid:96) and, then, take mathematical
expectations in the resulting stochastic differential equation,
we obtain
d
dt
E[xix(cid:96)] =−δ(cid:96)E[xix(cid:96)] +
am(cid:96)β(cid:96)E[xi(1 − x(cid:96))xm]
N(cid:88)m=1
am(cid:96)anmγmE[xi(1 − x(cid:96))xmxn]
ajiβiE[(1 − xi)xjx(cid:96)]
+
N(cid:88)m=1(cid:88)n(cid:54)=(cid:96)
− δiE[xix(cid:96)] +
N(cid:88)j=1
N(cid:88)j=1(cid:88)k(cid:54)=i
+
ajiakjγjE[(1 − xi)xjxkx(cid:96)].
(6)
is {0, 1}-valued,
Since xi
the second term on the right-
hand side of the differential equation (6) is bounded from
above as (cid:80)N
m=1 am(cid:96)β(cid:96)E[xi(1 − x(cid:96))xm] ≤ ai(cid:96)β(cid:96)(pi − pi(cid:96)) +
(cid:80)m(cid:54)=i am(cid:96)β(cid:96)pim. Likewise, the fifth term on the right-hand
side of (6) can be bounded as(cid:80)N
j=1 ajiβiE[(1 − xi)xjx(cid:96)] ≤
a(cid:96)iβi(p(cid:96) − pi(cid:96)) +(cid:80)j(cid:54)=(cid:96) ajiβipj(cid:96). Furthermore, we have
E[xi(1 − x(cid:96))xmxn] ≤ pmn, E[(1 − xi)xjxkx(cid:96)] ≤ pjk.
These observations yield that
(7)
dpi(cid:96)
dt ≤ −δ(cid:96)pi(cid:96) + ai(cid:96)β(cid:96)(pi − pi(cid:96))
+(cid:88)m(cid:54)=i
N(cid:88)m=1(cid:88)n(cid:54)=(cid:96)
am(cid:96)β(cid:96)pim +
am(cid:96)anmγmpmn
− δipi(cid:96) + a(cid:96)iβi(p(cid:96) − pi(cid:96))
+(cid:88)j(cid:54)=(cid:96)
ajiβipj(cid:96) +
N(cid:88)j=1(cid:88)k(cid:54)=i
(8)
ajiakjγjpkj.
is not
Remark 1. One can derive different bounds on the derivative
dpi(cid:96)/dt by replacing the reductions in (7) with others such as
E[xi(1 − x(cid:96))xmxn] ≤ pim and E[(1 − xi)xjxkx(cid:96)] ≤ pj(cid:96).
It
theoretically easy to identify the best reduction
giving the tightest bound on the derivative. However, we
have numerically observed that using different reductions does
not significantly alter the results of numerical simulations
performed in Section IV.
By replacing second-order moments pij having in-
dices i > j with their equivalent counterparts pji = E[xjxj] =
E[xixj] = pij, we rewrite the differential inequality (5) as (9)
for all i. In the same manner, we rewrite the differential in-
equality (8) as (10), which contains only the variables belong-
ing to the set P = {pi, pjk : i, j, k ∈ {1, . . . , N} and j < k}.
Now, let p denote the N 2+N
-dimensional vectorial variable
that can be obtained by stacking the variables in the set P.
Then, we rewrite the system of differential inequalities (9)
and (10) as
2
dp
dt ≤ Mp
(11)
for a uniquely determined N 2+N
Remark 2. Since we ignored second order terms −βipij for
deriving (5), one should expect a certain conservativeness in
the bound (11) and, therefore, the bound of the decay rate
2 matrix M.
2 × N 2+N
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
4
Fig. 2. Meta-stable number y(cid:63) of infected nodes in the synergistic SIS model for various values of δ and β. Colored region: the numerically obtained
extinction region E. Dashed black line: the boundary ∂E of E. White (black) solid line: the boundary ∂E (∂E SIS, respectively) of the extinction region
estimated from Theorem 1 (by the conventional method, respectively). Since the boundary ∂E SISlies in the region of epidemic outbreak, the conventional
method overestimates the extinction region, while our estimate E is contained in E for all networks.
Fig. 3. A sample path of the number of infected nodes, denoted by I(t), versus time t in the Facebook network. The transmission rate is fixed to be β = 0.02,
while the recovery rates are changed as δ = 0.1, 0.4, 1, and 3. The corresponding points (δ, β) are plotted in Fig. 2.3.
Inequality (11) shows that, for all t ≥ 0,
to be later derived in Theorem 1. However, it is necessary to
ignore the negative second order terms because, if not ignored,
we cannot use the fact that the matrix M is Metzler for the
proof of the theorem.
there exists
a nonnegative vector (t) such that dp/dt = Mp − .
From differential inequalities (9) and (10), we see that the
off-diagonals of M are nonnegative, i.e., M is a Metzler
matrix. This implies that the exponential exp(Mt) has only
nonnegative entries for all t ≥ 0 (see, e.g., [26]). Furthermore,
by definition, each entry of the vector (t) is nonnegative
for all t ≥ 0. Therefore, we obtain p(t) = exp(Mt)p(0) −
(cid:82) t
0 exp(M(t − τ ))(τ ) dτ ≤ exp(Mt)p(0). This inequality
bounds the vector p, which contains the infection probabilities
p1, . . . , pN , by the matrix exponential exp(Mt). We have thus
proved the following theorem, which is the main theoretical
result of this brief:
Theorem 1. The growth rate ρ of the synergistic SIS model
satisfies ρ ≤ λmax(M).
IV. NUMERICAL SIMULATIONS
In this section, we illustrate the effectiveness of Theorem 1
by numerical simulations. From Theorem 1, we can obtain a
sufficient condition for the spreading process to become extinct
(i.e., the spread is not invasive) as
λmax(M) < 0.
(12)
This section is devoted to numerically validating the suffi-
ciency of the extinction condition (12). To determine if the
spreading process becomes extinct, we use the notion of
the meta-stable number of infected nodes that is commonly
used in the Network Science. To identify the meta-stable
number of infected nodes, we begin by computing the fol-
lowing long-time average of the number of infected nodes
i=1 xi(τ ) dτ for a sufficiently large t. In
simulations, the spreading process can die out due to random
fluctuations. To prevent this from happening, we use the re-
infection procedure [27] in which a randomly chosen node
is infected immediately after the spreading process dies. After
we finish the simulation, we determine the meta-stable number
of infected nodes, denoted by y(cid:63), by
y(t) = t−1(cid:82) t
0(cid:80)N
y∗ = y(t) − 1,
where we subtract one to compensate for the effect of the re-
infection procedure. Finally, when y(cid:63) < 1, it is determined
that the spreading process becomes extinct.
In our numerical simulations, we use the following three
empirical human and animal social networks: (1) a social
network of Zachary's Karate club [28] (Karate, N = 34),
(2) a social network of bottlenose dolphins [29] (Dolphin,
N = 62), and (3) a friendship network in Facebook (Facebook,
N = 247). For simplicity of illustration, we assume that
the network consists of homogeneous nodes; i.e., we assume
βi = β, δi = δ, and γj = γ for constants β, δ, and γ. In this
numerical simulation, we fix γ = 10−2. For the above three
networks and various values of the transmission rate β and
the recovery rate δ, we compute the meta-stable number y(cid:63) of
infected nodes using the procedure described above, as well
as our upper-bound λmax(M) on the growth rate. We then
JOURNALOFLATEXCLASSFILES,VOL.14,NO.8,AUGUST2015400.51ExtinctionEpidemicoutbreak(1)Karate00.51(2)Dolphin00.51(a)(b)(c)(d)(3)FacebookFig.2.Meta-stablenumbery?ofinfectednodesinthesynergisticSISmodelforvariousvaluesofδandβ.Coloredregion:thenumericallyobtainedextinctionregionE.Dashedblackline:the'boundary∂EofE.White(black)solidline:theboundary∂E(∂ESIS,respectively)oftheextinctionregionestimatedfromTheorem1(bytheconventionalmethod,respectively).Sincetheboundary∂ESISliesintheregionofepidemicoutbreak,theconventionalmethodoverestimatestheextinctionregion,whileourestimateEiscontainedinEforallnetworks.(a)δ=0.1(b)δ=0.4(c)δ=1(d)δ=3Fig.3.Asamplepathofthenumberofinfectednodes,denotedbyI(t),versustimetintheFacebooknetwork.Thetransmissionrateisfixedtobeβ=0.02,whiletherecoveryratesarechangedasδ=0.1,0.4,1,and3.Thecorrespondingpoints(δ,β)areplottedinFig.2c.tobelaterderivedinTheorem1.However,itisnecessarytoignorethenegativesecondordertermsbecause,ifnotignored,wecannotusethefactthatthematrixMisMetzlerfortheproofofthetheorem.Inequality(11)showsthat,forallt≥0,thereexistsanonnegativevector(t)suchthatdp/dt=Mp−.Fromdifferentialinequalities(9)and(10),weseethattheoff-diagonalsofMarenonnegative,i.e.,MisaMetzlermatrix.Thisimpliesthattheexponentialexp(Mt)hasonlynonnegativeentriesforallt≥0(see,e.g.,[26]).Furthermore,bydefinition,eachentryofthevector(t)isnonnegativeforallt≥0.Therefore,weobtainp(t)=exp(Mt)p(0)−Rt0exp(M(t−τ))(τ)dτ≤exp(Mt)p(0).Thisinequalityboundsthevectorp,whichcontainstheinfectionprobabilitiesp1,...,pN,bythematrixexponentialexp(Mt).Wehavethusprovedthefollowingtheorem,whichisthemaintheoreticalresultofthisbrief:Theorem1.ThegrowthrateρofthesynergisticSISmodelsatisfiesρ≤λmax(M).IV.NUMERICALSIMULATIONSInthissection,weillustratetheeffectivenessofTheorem1bynumericalsimulations.FromTheorem1,wecanobtainasufficientconditionforthespreadingprocesstobecomeextinct(i.e.,thespreadisnotinvasive)asλmax(M)<0.(12)Thissectionisdevotedtonumericallyvalidatingthesuffi-ciencyoftheextinctioncondition(12).Todetermineifthespreadingprocessbecomesextinct,weusethenotionofthemeta-stablenumberofinfectednodesthatiscommonlyusedintheNetworkScience.Toidentifythemeta-stablenumberofinfectednodes,webeginbycomputingthefol-lowinglong-timeaverageofthenumberofinfectednodesy(t)=t−1Rt0PNi=1xi(τ)dτforasufficientlylarget.Insimulations,thespreadingprocesscandieoutduetorandomfluctuations.Topreventthisfromhappening,weusethere-infectionprocedure[27]inwhicharandomlychosennodeisinfectedimmediatelyafterthespreadingprocessdies.Afterwefinishthesimulation,wedeterminethemeta-stablenumberofinfectednodes,denotedbyy?,byy∗=y(t)−1,wherewesubtractonetocompensatefortheeffectofthere-infectionprocedure.Finally,wheny?<1,itisdeterminedthatthespreadingprocessbecomesextinct.Inournumericalsimulations,weusethefollowingthreeempiricalhumanandanimalsocialnetworks:(a)asocialnetworkofZachary'sKarateclub[28](Karate,N=34),(b)asocialnetworkofbottlenosedolphins[29](Dolphin,N=62),and(c)afriendshipnetworkinFacebook(Facebook,N=247).Forsimplicityofillustration,weassumethatthenetworkconsistsofhomogeneousnodes;i.e.,weassumeβi=β,δi=δ,andγj=γforconstantsβ,δ,andγ.Inthisnumericalsimulation,wefixγ=10−2.Fortheabovethreenetworksandvariousvaluesofthetransmissionrateβandtherecoveryrateδ,wecomputethemeta-stablenumbery?ofinfectednodesusingtheproceduredescribedabove,aswellasourupper-boundλmax(M)onthegrowthrate.WethenJOURNALOFLATEXCLASSFILES,VOL.14,NO.8,AUGUST20154JOURNALOFLATEXCLASSFILES,VOL.14,NO.8,AUGUST2015400.51ExtinctionEpidemicoutbreak(1)Karate00.51(2)Dolphin00.51(a)(b)(c)(d)(3)FacebookFig.2.Meta-stablenumbery?ofinfectednodesinthesynergisticSISmodelforvariousvaluesofδandβ.Coloredregion:thenumericallyobtainedextinctionregionE.Dashedblackline:the'boundary∂EofE.White(black)solidline:theboundary∂E(∂ESIS,respectively)oftheextinctionregionestimatedfromTheorem1(bytheconventionalmethod,respectively).Sincetheboundary∂ESISliesintheregionofepidemicoutbreak,theconventionalmethodoverestimatestheextinctionregion,whileourestimateEiscontainedinEforallnetworks.(a)δ=0.1(b)δ=0.4(c)δ=1(d)δ=3Fig.3.Asamplepathofthenumberofinfectednodes,denotedbyI(t),versustimetintheFacebooknetwork.Thetransmissionrateisfixedtobeβ=0.02,whiletherecoveryratesarechangedasδ=0.1,0.4,1,and3.Thecorrespondingpoints(δ,β)areplottedinFig.2c.tobelaterderivedinTheorem1.However,itisnecessarytoignorethenegativesecondordertermsbecause,ifnotignored,wecannotusethefactthatthematrixMisMetzlerfortheproofofthetheorem.Inequality(11)showsthat,forallt≥0,thereexistsanonnegativevector(t)suchthatdp/dt=Mp−.Fromdifferentialinequalities(9)and(10),weseethattheoff-diagonalsofMarenonnegative,i.e.,MisaMetzlermatrix.Thisimpliesthattheexponentialexp(Mt)hasonlynonnegativeentriesforallt≥0(see,e.g.,[26]).Furthermore,bydefinition,eachentryofthevector(t)isnonnegativeforallt≥0.Therefore,weobtainp(t)=exp(Mt)p(0)−Rt0exp(M(t−τ))(τ)dτ≤exp(Mt)p(0).Thisinequalityboundsthevectorp,whichcontainstheinfectionprobabilitiesp1,...,pN,bythematrixexponentialexp(Mt).Wehavethusprovedthefollowingtheorem,whichisthemaintheoreticalresultofthisbrief:Theorem1.ThegrowthrateρofthesynergisticSISmodelsatisfiesρ≤λmax(M).IV.NUMERICALSIMULATIONSInthissection,weillustratetheeffectivenessofTheorem1bynumericalsimulations.FromTheorem1,wecanobtainasufficientconditionforthespreadingprocesstobecomeextinct(i.e.,thespreadisnotinvasive)asλmax(M)<0.(12)Thissectionisdevotedtonumericallyvalidatingthesuffi-ciencyoftheextinctioncondition(12).Todetermineifthespreadingprocessbecomesextinct,weusethenotionofthemeta-stablenumberofinfectednodesthatiscommonlyusedintheNetworkScience.Toidentifythemeta-stablenumberofinfectednodes,webeginbycomputingthefol-lowinglong-timeaverageofthenumberofinfectednodesy(t)=t−1Rt0PNi=1xi(τ)dτforasufficientlylarget.Insimulations,thespreadingprocesscandieoutduetorandomfluctuations.Topreventthisfromhappening,weusethere-infectionprocedure[27]inwhicharandomlychosennodeisinfectedimmediatelyafterthespreadingprocessdies.Afterwefinishthesimulation,wedeterminethemeta-stablenumberofinfectednodes,denotedbyy?,byy∗=y(t)−1,wherewesubtractonetocompensatefortheeffectofthere-infectionprocedure.Finally,wheny?<1,itisdeterminedthatthespreadingprocessbecomesextinct.Inournumericalsimulations,weusethefollowingthreeempiricalhumanandanimalsocialnetworks:(a)asocialnetworkofZachary'sKarateclub[28](Karate,N=34),(b)asocialnetworkofbottlenosedolphins[29](Dolphin,N=62),and(c)afriendshipnetworkinFacebook(Facebook,N=247).Forsimplicityofillustration,weassumethatthenetworkconsistsofhomogeneousnodes;i.e.,weassumeβi=β,δi=δ,andγj=γforconstantsβ,δ,andγ.Inthisnumericalsimulation,wefixγ=10−2.Fortheabovethreenetworksandvariousvaluesofthetransmissionrateβandtherecoveryrateδ,wecomputethemeta-stablenumbery?ofinfectednodesusingtheproceduredescribedabove,aswellasourupper-boundλmax(M)onthegrowthrate.WethenFig.2.Meta-stablenumbery?ofinfectednodesinthesynergisticSISmodelforvariousvaluesofδandβ.Coloredregion:thenumericallyobtainedextinctionregionE.Dashedblackline:the'boundary∂EofE.White(black)solidline:theboundary∂E(∂ESIS,respectively)oftheextinctionregionestimatedfromTheorem1(bytheconventionalmethod,respectively).Sincetheboundary∂ESISliesintheregionofepidemicoutbreak,theconventionalmethodoverestimatestheextinctionregion,whileourestimateEiscontainedinEforallnetworks.(a)δ=0.1(b)δ=0.4(c)δ=1(d)δ=3Fig.3.Asamplepathofthenumberofinfectednodes,denotedbyI(t),versustimetintheFacebooknetwork.Thetransmissionrateisfixedtobeβ=0.02,whiletherecoveryratesarechangedasδ=0.1,0.4,1,and3.Thecorrespondingpoints(δ,β)areplottedinFig.2.3.tobelaterderivedinTheorem1.However,itisnecessarytoignorethenegativesecondordertermsbecause,ifnotignored,wecannotusethefactthatthematrixMisMetzlerfortheproofofthetheorem.Inequality(11)showsthat,forallt≥0,thereexistsanonnegativevector(t)suchthatdp/dt=Mp−.Fromdifferentialinequalities(9)and(10),weseethattheoff-diagonalsofMarenonnegative,i.e.,MisaMetzlermatrix.Thisimpliesthattheexponentialexp(Mt)hasonlynonnegativeentriesforallt≥0(see,e.g.,[26]).Furthermore,bydefinition,eachentryofthevector(t)isnonnegativeforallt≥0.Therefore,weobtainp(t)=exp(Mt)p(0)−Rt0exp(M(t−τ))(τ)dτ≤exp(Mt)p(0).Thisinequalityboundsthevectorp,whichcontainstheinfectionprobabilitiesp1,...,pN,bythematrixexponentialexp(Mt).Wehavethusprovedthefollowingtheorem,whichisthemaintheoreticalresultofthisbrief:Theorem1.ThegrowthrateρofthesynergisticSISmodelsatisfiesρ≤λmax(M).IV.NUMERICALSIMULATIONSInthissection,weillustratetheeffectivenessofTheorem1bynumericalsimulations.FromTheorem1,wecanobtainasufficientconditionforthespreadingprocesstobecomeextinct(i.e.,thespreadisnotinvasive)asλmax(M)<0.(12)Thissectionisdevotedtonumericallyvalidatingthesuffi-ciencyoftheextinctioncondition(12).Todetermineifthespreadingprocessbecomesextinct,weusethenotionofthemeta-stablenumberofinfectednodesthatiscommonlyusedintheNetworkScience.Toidentifythemeta-stablenumberofinfectednodes,webeginbycomputingthefol-lowinglong-timeaverageofthenumberofinfectednodesy(t)=t−1Rt0PNi=1xi(τ)dτforasufficientlylarget.Insimulations,thespreadingprocesscandieoutduetorandomfluctuations.Topreventthisfromhappening,weusethere-infectionprocedure[27]inwhicharandomlychosennodeisinfectedimmediatelyafterthespreadingprocessdies.Afterwefinishthesimulation,wedeterminethemeta-stablenumberofinfectednodes,denotedbyy?,byy∗=y(t)−1,wherewesubtractonetocompensatefortheeffectofthere-infectionprocedure.Finally,wheny?<1,itisdeterminedthatthespreadingprocessbecomesextinct.Inournumericalsimulations,weusethefollowingthreeempiricalhumanandanimalsocialnetworks:(1)asocialnetworkofZachary'sKarateclub[28](Karate,N=34),(2)asocialnetworkofbottlenosedolphins[29](Dolphin,N=62),and(3)afriendshipnetworkinFacebook(Facebook,N=247).Forsimplicityofillustration,weassumethatthenetworkconsistsofhomogeneousnodes;i.e.,weassumeβi=β,δi=δ,andγj=γforconstantsβ,δ,andγ.Inthisnumericalsimulation,wefixγ=10−2.Fortheabovethreenetworksandvariousvaluesofthetransmissionrateβandtherecoveryrateδ,wecomputethemeta-stablenumbery?ofinfectednodesusingtheproceduredescribedabove,aswellasourupper-boundλmax(M)onthegrowthrate.WethenobtainthetrueextinctionregionE={(δ,β):y?<1}JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
5
obtain the true extinction region
E = {(δ, β) : y(cid:63) < 1}
and its inner estimate from the sufficient condition (12):
¯E = {(δ, β) : λmax(M) < 0}.
In Fig. 2, we illustrate the regions E and
¯E for the three
empirical networks. We confirm that, for any of the networks,
¯E is contained in the true extinction re-
our inner-estimate
¯E indicated by the white line passes
gion E (i.e., the boundary ∂
through the colored region). For comparison, in Fig. 2, we also
illustrate the estimate
¯ESIS = {(δ, β) : ¯ρSIS < 0}
of the extinction region based on the conventional upper-
bound ¯ρSIS = βλmax(A) − δ on the growth rate of the SIS
model without synergy [22]. Since the boundary ∂
¯ESIS passes
outside the true extinction region for any of the three graphs,
we observe that the use of the conventional method, which
does not take into account synergistic effects, can lead to the
overestimate of the extinction regions. In Fig. 3, we show
sample paths of the time-evolution of the number of infected
nodes for β = 0.02 and δ = 0.1, 0.3, 1, and 3. From Fig. 3.b,
we confirm that the conventional method does overestimate
the region of extinction.
V. CONCLUSION
In this brief, we have studied the synergistic SIS model
over arbitrary complex networks. Since the state space of the
model grows exponentially fast with the number of nodes, it is
almost impossible to directly analyze the model except when
the network size is very small. To overcome this difficulty,
we have derived an upper-bound on the growth rate the
spreading model in terms of the eigenvalues of a matrix whose
size grows quadratically with the number of the nodes. We
have illustrated the effectiveness of our theoretical results
by numerical simulations on empirical human and animal
social networks. A possible direction for future research is
eliminating the computational complexity for calculating our
upper-bound. Since the size of M grows quadratically, it
is still not easy to apply the current bound for large-scale
networks. It is of theoretical interest to examine if we can
exploit the sparsity structure of M to efficiently calculate the
upper bound.
REFERENCES
[1] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespignani,
"Epidemic processes in complex networks," Reviews of Modern Physics,
vol. 87, pp. 925 -- 979, 2015.
[2] Y. Xia and D. J. Hill, "Attack vulnerability of complex communication
networks," IEEE Transactions on Circuits and Systems II: Express
Briefs, vol. 55, pp. 65 -- 69, 2008.
[3] M. Babaei, H. Ghassemieh, and M. Jalili, "Cascading failure tolerance
of modular small-world networks," IEEE Transactions on Circuits and
Systems II: Express Briefs, vol. 58, pp. 527 -- 531, 2011.
[4] C. Nowzari, V. M. Preciado, and G. J. Pappas, "Analysis and control
of epidemics: A survey of spreading processes on complex networks,"
IEEE Control Systems, vol. 36, pp. 26 -- 46, 2016.
[5] A. Ganesh, L. Massouli´e, and D. Towsley, "The effect of network
topology on the spread of epidemics," in 24th Annual Joint Conference
of the IEEE Computer and Communications Societies, 2005, pp. 1455 --
1466.
[6] F. Darabi Sahneh, C. Scoglio, and P. Van Mieghem, "Generalized
epidemic mean-field model for spreading processes over multilayer
complex networks," IEEE/ACM Transactions on Networking, vol. 21,
pp. 1609 -- 1620, 2013.
[7] P. Zhu, Q. Zhi, Y. Guo, and Z. Wang, "Analysis of epidemic spread-
ing process in adaptive networks," IEEE Transactions on Circuits
and Systems II: Express Briefs (Early Access). doi: 10.1109/TC-
SII.2018.2877406
[8] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. J.
Pappas, "Optimal resource allocation for network protection against
spreading processes," IEEE Transactions on Control of Network Systems,
vol. 1, pp. 99 -- 108, 2014.
[9] D. Zhao, B. Gao, Y. Wang, L. Wang, and Z. Wang, "Optimal dismantling
of interdependent networks based on inverse explosive percolation,"
IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 65,
pp. 953 -- 957, 2018.
[10] M. Ogura and V. M. Preciado, "Stability of spreading processes over
time-varying large-scale networks," IEEE Transactions on Network
Science and Engineering, vol. 3, pp. 44 -- 57, 2016.
[11] D. Balcan et al., "Seasonal transmission potential and activity peaks of
the new influenza A(H1N1): a Monte Carlo likelihood analysis based
on human mobility." BMC Medicine, vol. 7:45, 2009.
[12] S. Merler, M. Ajelli, A. Pugliese, and N. M. Ferguson, "Determinants
of the spatiotemporal dynamics of the 2009 h1n1 pandemic in europe:
Implications for real-time modelling," PLoS Computational Biology,
vol. 7, 2011.
[13] E. Ben-Jacob, O. Schochet, A. Tenenbaum, I. Cohen, A. Czir´ok, and
T. Vicsek, "Generic modelling of cooperative growth patterns in bacterial
colonies," Nature, vol. 368, pp. 46 -- 49, 1994.
[14] L. A. Liotta and E. C. Kohn, "The microenvironment of the tumourhost
interface," Nature, vol. 411, pp. 375 -- 379, 2001.
[15] C. Castellano, S. Fortunato, and V. Loreto, "Statistical physics of social
dynamics," Reviews of Modern Physics, vol. 81, pp. 591 -- 646, 2009.
[16] D. Centola, "The spread of behavior in an online social network
experiment," Science, vol. 329, pp. 1194 -- 1197, 2010.
[17] F. J. P´erez-Reche, J. J. Ludlam, S. N. Taraskin, and C. A. Gilligan,
"Synergy in spreading processes: from exploitative to explorative forag-
ing strategies," Physical Review Letters, vol. 106, p. 218701, 2011.
[18] S. N. Taraskin and F. J. P´erez-Reche, "Effects of variable-state neighbor-
hoods for spreading synergystic processes on lattices," Physical Review
E, vol. 88, p. 062815, 2013.
[19] D. Broder-Rodgers, F. J. P´erez-Reche, and S. N. Taraskin, "Effects
of local and global network connectivity on synergistic epidemics,"
Physical Review E, vol. 92, p. 062814, 2015.
[20] Q.-H. Liu, W. Wang, M. Tang, T. Zhou, and Y.-C. Lai, "Explosive
spreading on complex networks: The role of synergy," Physical Review
E, vol. 95, p. 042320, 2017.
[21] J. S. Juul and M. A. Porter, "Synergistic effects in threshold models on
networks," Chaos: An Interdisciplinary Journal of Nonlinear Science,
vol. 28, p. 013115, 2018.
[22] P. Van Mieghem, J. Omic, and R. Kooij, "Virus spread in networks,"
IEEE/ACM Transactions on Networking, vol. 17, pp. 1 -- 14, 2009.
[23] J. J. Ludlam, G. J. Gibson, W. Otten, and C. A. Gilligan, "Applications
of percolation theory to fungal spread with synergy," Journal of The
Royal Society Interface, vol. 9, pp. 949 -- 956, 2012.
[24] V. Y. Pan and Z. Q. Chen, "The complexity of the matrix eigenproblem,"
in 31st Annual ACM Symposium on Theory of Computing. New York,
New York, USA: ACM Press, 1999, pp. 507 -- 516.
[25] F. B. Hanson, Applied Stochastic Processes and Control for Jump-
Diffusions: Modeling, Analysis and Computation. Society for Industrial
and Applied Mathematics, 2007.
[26] M. Ogura and V. M. Preciado, "Epidemic processes over adaptive state-
dependent networks," Physical Review E, vol. 93, p. 062316, 2016.
[27] E. Cator, R. van de Bovenkamp, and P. Van Mieghem, "Susceptible-
infected-susceptible epidemics on networks with general infection and
cure times," Physical Review E, vol. 87, p. 062816, 2013.
[28] W. W. Zachary, "An information flow model for conflict and fission in
small groups," Journal of Anthropological Research, vol. 33, pp. 452 --
473, 1977.
[29] J. Kunegis, "KONECT -- the Koblenz network collection," in Proceed-
ings of the 22nd International Conference on World Wide Web, 2013,
pp. 1343 -- 1350.
|
1506.01513 | 2 | 1506 | 2015-09-24T10:41:41 | Social signals and algorithmic trading of Bitcoin | [
"cs.SI",
"q-fin.TR"
] | The availability of data on digital traces is growing to unprecedented sizes, but inferring actionable knowledge from large-scale data is far from being trivial. This is especially important for computational finance, where digital traces of human behavior offer a great potential to drive trading strategies. We contribute to this by providing a consistent approach that integrates various datasources in the design of algorithmic traders. This allows us to derive insights into the principles behind the profitability of our trading strategies. We illustrate our approach through the analysis of Bitcoin, a cryptocurrency known for its large price fluctuations. In our analysis, we include economic signals of volume and price of exchange for USD, adoption of the Bitcoin technology, and transaction volume of Bitcoin. We add social signals related to information search, word of mouth volume, emotional valence, and opinion polarization as expressed in tweets related to Bitcoin for more than 3 years. Our analysis reveals that increases in opinion polarization and exchange volume precede rising Bitcoin prices, and that emotional valence precedes opinion polarization and rising exchange volumes. We apply these insights to design algorithmic trading strategies for Bitcoin, reaching very high profits in less than a year. We verify this high profitability with robust statistical methods that take into account risk and trading costs, confirming the long-standing hypothesis that trading based social media sentiment has the potential to yield positive returns on investment. | cs.SI | cs |
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
Social signals and algorithmic trading of Bitcoin
David Garcia, Frank Schweitzer
Chair of Systems Design, ETH Zurich
Weinbergstrasse 56/58, 8092 Zurich, Switzerland
September 25, 2015
Published in Royal Society Open Science 2:150288 (2015)
http://rsos.royalsocietypublishing.org/content/2/9/150288
Abstract
The availability of data on digital traces is growing to unprecedented sizes, but inferring ac-
tionable knowledge from large-scale data is far from being trivial. This is especially important for
computational finance, where digital traces of human behavior offer a great potential to drive trading
strategies. We contribute to this by providing a consistent approach that integrates various data-
sources in the design of algorithmic traders. This allows us to derive insights into the principles
behind the profitability of our trading strategies. We illustrate our approach through the analysis of
Bitcoin, a cryptocurrency known for its large price fluctuations. In our analysis, we include economic
signals of volume and price of exchange for USD, adoption of the Bitcoin technology, and transac-
tion volume of Bitcoin. We add social signals related to information search, word of mouth volume,
emotional valence, and opinion polarization as expressed in tweets related to Bitcoin for more than
3 years. Our analysis reveals that increases in opinion polarization and exchange volume precede
rising Bitcoin prices, and that emotional valence precedes opinion polarization and rising exchange
volumes. We apply these insights to design algorithmic trading strategies for Bitcoin, reaching very
high profits in less than a year. We verify this high profitability with robust statistical methods that
take into account risk and trading costs, confirming the long-standing hypothesis that trading based
social media sentiment has the potential to yield positive returns on investment.
1
Introduction
Our online society generates data on the digital traces of human behavior at unprecedented scales and
resolutions. This produces a data deluge, in which researchers are confronted with a vast amount of obser-
vational data that is not the product of carefully designed experiments [1]. One of the main challenges of
the scientific community is to develop methods to extract meaningful knowledge from that data beyond
mere descriptive analyses [2]. This is particularly important in financial trading: Data can be available
to all financial agents, but it is the analysis and its applications what makes a difference. Within com-
putational finance, the field of algorithmic trading [3] deals with the implementation and evaluation of
automatic trading strategies, which are often kept in private companies and away from publicly accessible
research. The most common kind of algorithmic trading is based on the principles of technical analysis
[4], using the time series of prices to formulate predictions about returns. Technical analysis is often
insufficient to derive satisfactory returns [5], motivating the inclusion of large-scale social signals and the
evaluation through data-driven simulations on historical data, called backtesting [6, 7]. In this article,
we present a set of methods to derive stylized facts from the analysis of multidimensional economic and
1/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
social signals, and to apply that knowledge in the design and evaluation of algorithmic trading strategies.
We illustrate an application of our approach to algorithmic trading of the Bitcoin cryptocurrency, using
a wide variety of digital traces about economic and social aspects of the Bitcoin ecosystem.
Bitcoin (BTC) is a digital currency designed to operate in a distributed system without any central
authority, based on a cryptographic protocol that does not require a trusted third party [8]. Introduced
in a 2008 paper written under the pseudonym of Satoshi Nakamoto [9], Bitcoin serves as a technology to
transfer money quickly for negligible fees [10]. One of the first markets to adopt Bitcoin was the Silk Road,
a website where illegal commerce became possible thanks to the relative anonymity of Bitcoin [11], in line
with the evidence in search trends that relates Bitcoin usage to computer expertise and illegal activities
[12]. Since then, the use of Bitcoin has widely expanded beyond criminal activities: At the time of writing,
Bitcoin is accepted by many legal merchants and charities [13], including large businesses like Dell [14].
Bitcoin-accepting businesses, exchange markets, and wallet services compose the Bitcoin ecosystem [8],
where different kinds of agents interact, trade, and communicate through digital channels. The increasing
adoption of Bitcoin and its online nature allow us to simultaneously monitor its social and economic
aspects. Every purchase of goods or services in Bitcoin leaves a trace in a public ledger called the Block
Chain, creating a publicly accessible economic network [15]. Bitcoin’s delocalized technology aligns with
the online interaction of its users through social networks and forums, motivating its adoption by new
users through word-of-mouth [16]. Previous research has shown how search trends and Wikipedia views
are related to price changes [17] and to the speculative and monetary aspects of Bitcoin [18], leading to
dynamics that combine search interest, user adoption, word-of-mouth, and prices [16].
Contributions of this article. Based on established principles of time series analysis and financial
trading, we present a framework to derive general knowledge from multidimensional data on social and
economic aspects of a market. We apply a general statistical model to detect temporal patterns in the
co-movement of price and other signals. Those patterns are tested through a method robust to the em-
pirical properties of the analyzed data, formulating concise principles on which signals precede market
movements. We combine those principles to produce tractable trading strategies, which we evaluate over
a leave-out sample of the data, quantifying their profitability. Our approach, rather than focusing on
improving a particular method, takes a multidisciplinary stance in which we combine principles from
social psychology and economics with methods from information retrieval, time series analysis, and com-
putational finance.
We apply our framework to the Bitcoin ecosystem, monitoring the digital traces of Bitcoin users with daily
resolution. We combine economic signals related to market growth, trading volume, and use of Bitcoin as
means of exchange, with social signals including search volumes, word-of-mouth levels, emotional valence,
and opinion polarization about Bitcoin. Our results reveal which signals precede changes of Bitcoin prices,
a knowledge that we use to design algorithmic trading strategies. We evaluate the power of our strategies
through backtesting data-driven simulations, comparing returns with technical analysis strategies. As a
consequence, we test the hypothesis that social media sentiment predicts financial returns in the Bitcoin
ecosystem.
Social signals in finance. Understanding the role of social signals in finance not only has the potential
to generate significant profits, but also has scientific relevance as a research question [19]. Two different
2/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
research approaches give insights to this question: One is the statistical analysis of social and financial
signals in order to test the existence of temporal correlations that lead financial markets. The second one
applies these signals in prediction scenarios, measuring their accuracy as a validation of the underlying
behavior of the system, but not necessarily of their profitability. The statistical analysis of search engine
data reveals that search trends can predict trading volumes of individual stocks [20]. In addition, stock
prices in S&P 500 are correlated with tweet volumes [21], but the applicability of these patterns into
trading strategies is yet to be evaluated.
Sentiment in social media is closely related to socio-economic phenomena, including public opinion [22].
This motivates the application of sentiment indicators in the statistical analysis of financial data. Early
works on the sentiment in specialized forums gave negative results about their impact on returns [23].
Further research showed that emotions in private instant messaging between workers of a trading company
precede stages of market volatility [24]. The expression of anxiety in publicly accessible data from general
blogs precedes trading peaks and price drops in the S&P 500 [25], and sentiment in Twitter can be used
to predict movements in large-scale stock indices [26]. It is important to note that, to date, there is no
evidence that such sentiment-based predictions produce significant returns on investment [19].
Online Polarization. While most of previous works on sentiment in financial markets focus on di-
mensions of valence or mood, the collective phenomenon of polarization of opinions is often overlooked.
The emergence of polarization in a society gives early warnings on political and economic phenomena:
Polarization in social networks of Swiss politicians precedes controversial elections [27], and polarization
patterns in the Eurovision Song Contest appear before states of distrust in the European economy [28].
With respect to financial markets, speculation theories point to the role of diverse beliefs in financial
transactions [29], leading to the hypothesis that polarization and disagreement influence trading volumes
and prices [30]. In this line, the empirical analysis of polarization in stock message boards shows that
states of disagreement lead to increased volatility [31].
The missing link. To date, there is a significant knowledge gap between the analysis and application
of social signals to trading scenarios. Findings from statistical analyses alone are not guaranteed to lead to
profitable strategies at all [25]. For example, movements of the Dow Jones Industrial Average (DJIA) can
be predicted with mass media sentiment [32] and Twitter mood [26], but to date no research has shown
that such prediction methods can be profitable in trading scenarios. Similarly, the analysis of discussion
patterns in specialized blogs predict returns of some technology companies [33], but it is still open to
evaluate the potential returns of such a predictor. The application of methods that process arbitrarily
large datasets lead to results difficult to apply, for example the predicting power of search volumes of the
query "moon patrol" [34] in backtesting over the DJIA [6]. Furthermore, analyses of Twitter discussions
about companies can be applied in a portfolio strategy, yet its evaluation through backtesting leads
to very moderate returns and their statistical significance is not assessed [35]. In addition, no previous
research has proposed a prediction technique that derives significant returns on investment from online
sentiment data [19]. Our research aims at closing the gap between these lines of research. To do so,
we unify the statistical analysis and its application to design and evaluate trading strategies, based on
tractable principles with potential impact in the finance community.
3/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
2 Trading strategy framework
To design and evaluate trading strategies, we present a framework that uses a set of economic and social
signals related to the agents of the market under scrutiny. Among those signals, the only required one
is an economic signal of prices of an asset, namely a stock, currency, or tradable index. To understand
profitability, we convert the price time series P (t) into a return time series:
Ret(t) =
P (t) − P (t − 1)
P (t − 1)
(1)
which quantifies proportional changes in the price at every time step. The data on these signals is divided
in an analysis period and a leave-out period, as depicted in Figure 1. The division in these periods needs
to allocate enough data in the leave-out sample to provide the testing power to assess the statistical
significance of strategy profits. For daily trading, a leave-out period of about one year is usually sufficient,
but this ultimately depends on the expected profitability and variance of the trading strategies.
Figure 1: Framework for analysis of social and economic signals and trading strategy de-
sign and evaluation.
Multidimensional analysis. The first step in our framework focuses on the analysis period, applying
a multidimensional model of Vector Auto-Regression (VAR) [36], which is commonly used in the analysis
of multidimensional time series in finance [23, 37, 16]. A VAR models multidimensional linear relations
with given lags, which in our analysis we set to one day. Thus, given the vector of signals V (t) we fit the
equation
V (t) = φV (t − 1) + r ∗ t + c +
(2)
where φ is a matrix of weights of the linear relations between variables, r is a deterministic trend vector, c
is the vector of constant intercepts, and is a vector of uncorrelated errors. While more advanced models
can be considered, including longer lags and non-linear terms, we choose the VAR model of lag 1 for its
general character and its proved power to reveal patterns in finance [23, 16]. More complex models might
have higher power to reveal nuance patterns, but at the expense of a loss of generality due to the focus
on particular systems.
We include all the time series in a single model to avoid the false positives associated with pairwise
Granger tests. To ensure the correct application of the VAR model, we need to verify that our analysis is
consistent with its fundamental assumptions: i) that the elements of V (t) do not have a unit root, and ii)
4/19
Economic SignalsPrice, Volume, TradeSocial SignalsSearch, WoM, EmotionsAnalysis periodLeave-out periodMultidimensional ModelImpulse AnalysisTrading strategydesignBacktesting evaluationV(t)=φV(t−1) + rt + c + ϵRoyal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
that the error term has no temporal nor structural correlations. We verify the first set of assumptions
on the properties of V (t) by applying a set of tests and transformations prior to the application of the
VAR model. We ensure that our conclusions are robust to the second set of assumptions by correcting
for correlations in the noise term, as explained in the Materials and methods section.
Impulse analysis. The VAR weights φ are only informative when there are no correlations in the
error term of equation 2, which is usually not the case in practice. To extract stylized facts that can be
used in the design of trading strategies, we perform an impulse analysis by measuring Impulse Response
Functions (IRF) [38] while correcting for correlations in the empirical error. This method simulates the
system dynamics when it receives a shock in one of the variables, applying the VAR dynamics of Equation
2 to reproduce the changes in the rest of the variables through time. By recording the changes in each
variable, we can estimate the total size and the timespan of the perturbation produced by the shock.
In essence, the IRF method creates a computational equivalent of the system under scrutiny, to test its
reaction to exogenous impulses in each of its elements.
Trading strategy design and evaluation. The output of the impulse analysis step, shown in Figure
1, is a set of patterns of Granger-type "causation", i.e. it tests the null hypothesis of the absence of
temporal correlations among the variables. We use these patterns as stylized facts that indicate which
variables precede changes in price returns. For example, if variable Y (t) has a significant impact on Ret(t)
in the impulse analysis, we will include Y (t) in our trading strategy design with sign sY , which takes the
value 1 if the response of Ret(t) to Y (t) was positive, and −1 otherwise. Thus, a predictor based on Y (t)
would be
sign(Ret(t + 1)) = sign(sY ∗ (Y (t) − Y (t − 1)))
(3)
This way, we predict increases (decreases) in price between time t and t + 1 if signals with positive
responses increase (decrease) between time t− 1 and t, and vice versa for signals with negative responses.
Since our multidimensional analysis is robust to confounds between multiple time series, the findings of
impulse analysis can be integrated in a Combined strategy based on a voting mechanism. The Combined
strategy applies the other predictors and formulates a prediction corresponding to the sign of the sum of
their outputs, i.e. the majority vote.
We evaluate the profitability of the designed strategies in comparison to the benchmark of standard
strategies, based on the backtesting over the leave-out sample as indicated in Figure 1. For each strategy,
we make a data-driven simulation of a trader following that strategy, and we record the profits of that
trader on a daily basis. Details on the computational simulation of financial traders can be found in the
Materials and methods section.
Bitcoin social economic and signals We apply our approach to the case of trading Bitcoin based
on social and economic signals of the Bitcoin ecosystem. We set up a system that monitors different data
sources, retrieving data in real time in combination with historical time series. The data volumes recorded
during our study period of almost four years is shown in Figure 2, and can be interactively browsed in
our online visualization1. The signals we measure, explained more in detail in the Materials and methods
1www.sg.ethz.ch/btc
5/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
section include economic signals of price P (t) and returns Ret(t), trading volume in a wide range of
Bitcoin exchange markets F XV ol(t). Furthermore, we measure the economic signal of transaction volume
in the Block Chain BCT ra(t), which measures the volume of usage of Bitcoin as a currency, and the
amount of downloads of the most important Bitcoin client Dwn(t) as a measure of growth in adoption of
the Bitcoin technology. The social signals we measure are the level of search volume in Google for the term
"bitcoin" S(t), the word-of-mouth level as measured by the amount of tweets containing Bitcoin-related
terms TN (t), and the emotional valence TV al(t) and opinion polarization TP ol(t) expressed in those tweets
using lexicon-based approaches from psycholinguistics [39, 40] (more details in Materials and methods).
All these signals are shown in Figure 2, illustrating the large oscillations of price and other signals related
to Bitcoin.
Figure 2: Time series of data volumes in the Bitcoin ecosystem. Interactive version:
www.sg.ethz.ch/btc
3 Results
3.1 Data-driven Bitcoin trading strategy design
For our statistical analysis, we include all the data up to January 1st, 2014, covering almost 3 years.
After applying stationarity tests, we conclude that the time series of price returns Ret(t) can be assumed
to be stationary, as well as the first differences of the other seven signals (details on the stationarity test
results can be browsed in www.sg.ethz.ch/btc and in the SI). As a consequence, we define our variable
6/19
04008001200FX Volume [BTCx1000]02550Downloads [x1000]020406080100BC Transactions [x1000]02505007501000Price [USD/BTC]02/201107/201101/201207/201201/201307/201301/201407/201412/2014leave−outperiodPrice (BPI)Exchange VolumeSourceForge DownloadsBlock Chain Transactions04080120Tweets Number [x1000]00.51Google search volume5.45.65.86.0Valence0.10.20.30.40.5Polarization02/201107/201101/201207/201201/201307/201301/201407/201412/2014DateNumber of TweetsSearch VolumeValence (weekly)Polarization (weekly)Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
Figure 3: Results of Impulse Response Function analysis. (A) Impulse Response Functions of
return to shocks in Twitter polarization and exchange volume, (B) of Twitter polarization to shocks in
return and Twitter valence, and (C) of exchange volume to shocks in Twitter valence and polarization
(right). Solid lines show responses, dashed lines show 95% confidence intervals. (D) Cumulative Impulse
Response Functions of price return to changes in the other signals. Dashed lines indicate responses below
the 0.1% level.
vector as:
V (t) = [Ret(t), ∆F XV ol(t), ∆BCT ra(t), ∆Dwn(t),
∆S(t), ∆TN (t), ∆TV al(t), ∆TP ol(t)]
composing the input to the multivariate analysis of our framework. We fit a VAR as explained in Materials
and methods over the analysis period. We compute IRF for all pairs of variables, all results including
VAR estimates and IRF values can be browsed in www.sg.ethz.ch/btc and in the SI. Here, we comment
on the most relevant results, which serve as input for our trading strategy design.
Figure 3 A shows the IRF of returns to shocks in polarization and volume in exchange markets, where
the response is measured in return percentages. Both polarization and exchange volume have significantly
positive influences in price returns one day after the shock, decreasing rapidly afterwards. The increase of
returns with polarization is consistent with the hypothesis that disagreement fuels trading in speculative
scenarios [30, 31], where information asymmetries fuel price bubbles. Exchange volume also increases with
polarization, as shown in Figure 3 C, but the the relationship is instantaneous rather than lagged as in
the case of returns.
7/19
01234567−0.20.20.6Response of Return [%]Return to PolarizationReturn to FX Volume01234567−0.150.000.10Response [sd]Polarization to ValencePolarization to Return01234567−0.050.05t [days]Response [sd]FX Volume to ValenceFX Volume to Polarizationt [days]01234567−0.20.20.40.6Cumulative response of Return [%]DownloadsSearchBC TransactionsFX VolumeTweets NumberValencePolarizationABCDRoyal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
Figure 3 B shows the response of polarization in Twitter to shocks in returns and valence. The negative
effect of polarization shows that price drops lead to increases in polarization, signaling the disagreement
in the Bitcoin community due to price crashes. The pattern linking valence to polarization is relevant,
revealing that periods with increasing positivity in expression precede stages of higher polarization. The
role of valence can further be observed in the IRF of exchange volumes in Figure 3 C, in which valence has
a significant effect. The combination of patterns of increasing polarization and exchange volume following
stages of increasing valence show the relevance of valence in price returns, in addition to the effects of
polarization and exchange volume.
We further validated these results in two ways. First, we fit a VAR with lags longer than a day, selecting
the optimal lag that optimizes the Bayesian Information Criterion. We found that a lag of 2 is optimal,
but the results of the fits and IRF analysis did not qualitatively change (see SI). Second, we performed a
Monte Carlo test, computing the impulse response functions for time series with randomized permutations
of the values. The results of these permutation tests show are consistent with the above results, as reported
in the SI, showing the robustness of our approach.
Turning analysis into strategy We summarize the above findings as stylized facts that can drive the
decisions of an algorithmic trader. We focus closer on the role of each signal into returns, by computing
the cumulative changes given by the IRF analysis. This way, we can identify which signals show a sizable
pattern that precedes changes in returns, and filter out those that are not significant or can be explained
as confounds of the others. Figure 3 D shows the results, measuring the cumulative change in return
percentage when each one of the other signals receives a shock of size one standard deviation. The
three signals with effects above the 0.1% level are polarization, valence, and exchange volume, reaching
effects up to 0.5% in one day that prevail through time. Note that this is a relatively large value, because
trading results in multiplicative returns. Such effect sizes have strong potential impact on the profitability
of trading strategies over long time periods. This allows us to discard the rest of the signals, feeding
into our trading strategy design by producing four strategies: three strategies of positive sign, Valence,
Polarization, and FXVolume, and a fourth Combined strategy determined by a voting mechanism as
explained in the Trading strategy framework section.
3.2 Bitcoin strategy evaluation
To evaluate the profitability of our four strategies, we set up a benchmark against random strategies
and technical strategies, using the actual exchange rate of BTC for USD in bitfinex.com as well as the
Bitcoin Price Index (see www.sg.ethz.ch/btc for results with BPI). Random strategies sample a random
number with 0 mean at every time t, and formulate a prediction based on the sign of the random number.
Among technical strategies, the simplest is Buy and Hold, which simply buys BTC with the initial capital
at time t = 1, selling it only once at the time when profits are evaluated. The technical strategies we use
are a benchmark of simple standard predictions [5]: i) the Momentum strategy, which predicts that price
changes at time t + 1 will be the same as at time t, ii) the Up and Down Persistency strategy UPD, which
predicts that price increases at time t are followed by decreases at time t + 1, and vice versa, and iii) the
Relative Strength Index strategy RSI, which computes an additional time series of ratios of return sign
8/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
Figure 4: Profits of trading strategies. Left: Time series of profit for our strategies (top), and technical
strategies (bottom). Shaded areas show one standard deviation of the random strategy. Interactive version:
www.sg.ethz.ch/btc Right: Kernel density plots of the profit of each strategy (bandwidth=15%).
frequencies over a rolling window of five days, and predicts price changes based on reversals of this time
series (more details in [5]).
The simulation of each strategy produces a time series of profits
Profit(t) =
C(t) − C(0)
C(0)
∗ 100
(4)
where C(t) is the capital of the trader at time t and C(0) is the initial investment capital. Figure 4 shows
the time series of profits for our four strategies and the technical strategies. In addition, we compute
the profit of Buy and Hold, and the results of the simulation of 10000 random traders. The Valence,
Polarization and Combined strategies clearly perform better than a random trader, while the FXVolume
is not very far from the result of random traders. Among the technical strategies, only RSI and Momentum
are able to eventually reach beyond the outcome of random traders, but are still clearly outperformed by
the Polarization and Combined strategies.
The stopping time of the simulation of a trading strategy is given by our data, but a variety of factors
might trigger a trader to stop trading earlier in a real scenario [3]. For that reason, we explore the
distribution of profits of each strategy, assuming that the trading stops at any arbitrary point of our
backtesting period. Thus, for each strategy we have a set of profit values, one for each possible trading
end date. The right panel of Figure 4 shows the Kernel Density Plots of the distributions of profits for each
strategy. It can be appreciated that the most profitable strategy is Combined, followed by Polarization
and then Valence and RSI. We quantitatively assessed this result, through Wilcoxon tests [41] over the
distributions of profits (more details in SI), confirming the observation that the most profitable strategies
are Combined, and Polarization. More precisely, the Combined strategy gives profits beyond 100% for
most of the time during the trading period.
9/19
−100−50050100Profit [%]2014−01−012014−03−012014−05−012014−07−012014−09−012014−11−012015−01−01DateMomentumBuy and HoldRSIUPD−50100200Profit [%]2014−01−012014−03−012014−05−012014−07−012014−09−012014−11−012015−01−01CombinedValencePolarizationFXVolumeRandom0.0000.0050.0100.0150.020−100−500501000.0000.0050.0100.0150.020−100050150250P(Profit)Profit [%]Profit [%]Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
While surveying cumulative returns is illustrative of the performance of the strategies, the multiplicative
nature of cumulative returns overweights early positions and is biased towards the beginning of the
evaluation period. To properly evaluate trading strategies, we calculated the Sharpe Ratio [42], measuring
risk-corrected profits as: SR = µR−Rf
, where µR and σR are the mean and standard deviation of the
daily rate of return of a strategy R(t) = (C(t) − C(t − 1))/C(t − 1). Rf is the "risk- free" return rate of
a theoretical investment that would give certain profit under no risk at all, which is often estimated as
the interest rate of high-quality sovereign bonds. At the time of writing, some European sovereign bonds
are giving interest rates close to zero or even negative [43], which motivates our conservative choice of
Rf = 0. The value of SR is calculated in annualized units, taking into account that Bitcoin can be traded
365 days a year.
σR
Combined Polarization Valence FXVolume Buy and hold
-0.7741
-0.1635
Random
-1.6590
-0.0963
1.7653
0.3229
Momentum
0.9146
0.1625
0.5738
0.1082
DJIA
0.7995
0.0345
1.0120
0.1779
UPD
-0.8990
-0.1736
0.6410
0.1183
RSI
-0.1772
-0.0346
SR
µR
SR
µR
Table 1: Sharpe Ratios and mean daily returns of strategies.
Table 1 reports the Sharpe Ratio SR and the mean daily return µR for all strategies, as well as for the
DJIA and the average of 10000 random traders. The Sharpe Ratio analysis is consistent with the results
of the cumulative returns analysis, showing that the Combined strategy provides the highest returns,
with the best SR value above 1.75 and with daily returns above 0.3 % per day. The profitability of these
strategies illustrate how social media sentiment can produce positive returns on investment, especially
when including polarization measures beyond the trivial quantification of valence or mood.
3.3 Costs and risks of the Combined strategy
To understand better the possible weaknesses of the Combined strategy, we run a series of tests to evaluate
the role of trading costs and additional risks. Trading Bitcoin in an online market usually comes at a cost,
which often depends on the activity and the traded capital. These trading costs should not be confused
with the transaction fees in the Block Chain [9], which do not depend on the transacted cost and are
not associated to any market of exchange to other currencies. Trading costs can potentially erode the
profitability of trading strategies, especially if they require many movements. We simulated the same
backtests for costs increasing from 0 to 0.3% of the exchanged capital, a value well above the maximum
costs of major trading platforms [44]. As a simplification, we assume that buying, selling, and borrowing
costs are the same, yet their values might depend on the trading volume of a strategy [44]. Figure 5 shows
the final profits of the Combined strategy, which decrease monotonically with trading costs. The strategy
is still highly profitable for low costs, but for costs above 0.25%, the strategy is not profitable any more.
Furthermore, we repeat this analysis assuming the limitation that daily positions need to be forcefully
closed at the end of each trading period (shown in SI), finding a decrease in returns but that the strategy
is still profitable for trading costs of 0.1%, a typically high cost of current exchange platforms [45].
10/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
Figure 5: Final profit of the Combined strategy versus trading cost.
In this application, the leave-out period is characterized by decreasing BTC prices. Thus, it is important
to evaluate the role of each possible trading action: longing when BTC are bought to be sold later,
and shorting when they are borrowed and traded as explained above. We repeat the backtesting of the
Combined strategy allowing only short and only long positions, following the methodology of [6]. As
reported more in detail in the SI, the only short strategy yields higher cumulative returns than the only
long strategy, as expected from a period in which prices decrease steadily.
We test further properties of the behavior of the Combined strategy in the leave-out period. The distribu-
tion of daily returns of the Combined strategy during the leave-out period follows a lognormal distribution,
as tested through maximum likelihood fits and Kolmogorov-Smirnov tests (see SI). The time series of
returns of this strategy is also not autocorrelated and can be considered stationary (see SI for stationarity
tests of daily returns). This additional analysis shows that the high profitability of the Combined strategy
is not due to risky correlations in the behavior of the trading strategy.
4 Concluding remarks
Our work applies established methods of time series analysis and computational finance to integrate the
analysis, design, and evaluation of trading strategies and social and economic signals. We have shown
that our approach successfully reveals temporal patterns in the Bitcoin ecosystem, in particular the
relation between price returns and the signals of exchange volume and Twitter valence and polarization.
Our statistical analysis is robust to noise correlations and the finite nature of time series, providing
a consistent set of results that we can apply to strategy design. We evaluated the profitability of our
strategies through data-driven simulations of a computational model of a trader, showing that a strategy
that combines valence, polarization, and exchange volume can reach very high profits in less than a year.
The added value of including polarization in our analysis constitutes evidence that collective factors
of emotions and opinions have the potential to predict financial returns, beyond trivial macroscopic
aggregates like average valence.
11/19
0.000.050.100.150.200.250.30050100150Trading cost [%]Profit [%]Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
Our framework can be applied to other trading scenarios in which social signals are available, like in the
case of company stock trading driven by sales data, news information, and social media sentiment towards
a company. The general nature of our methods are of special relevance for real trading scenarios, as the
stylized facts we use to design strategies provide a tractable explanation for their mechanisms. This allows
traders to understand and evaluate the principles of the algorithmic trading strategies designed in our
framework. Such tractability is an advantage in comparison to more complex, non-linear, or subsymbolic
models that do not have straightforward interpretations. Nevertheless, improvements can be expected
from the addition of longer time lags, higher frequency trading, and real-time optimization approaches.
Furthermore, the rules that drive our trading strategies do not require retraining or calibration during
trading, and the social and economic signals we employ can be quantified during a day in order to have
an instant trading decision ready at the beginning of the next day. Our application to Bitcoin trading
is thus realistic, making use of shorting options and performing well under the typical trading costs of
Bitcoin markets [44].
The application of our results should be taken with caution. Historical profit through backtesting do
not necessarily predict future ones, and the information sources analyzed here could be adopted by
Bitcoin traders. Our evaluation goes as far as the representativity of the leave-out sample, and future
research should evaluate the performance of our approach when prices rise and when traders are aware
of the existence of our trading strategies. Financial markets are known to quickly absorb knowledge, as
it happened with the inclusion of search trends data in stock trading [7]. It is also difficult to estimate
the scalability of automatic trading strategies, as financial markets are complex adaptive systems that
react to trades of large volume. Furthermore, systemic risk emerges from algorithmic trading, creating
flash crashes due to algorithmic resonance [8]. In addition, structural changes and additional risks in
borrowing and lending Bitcoin for shorting can emerge when exchange markets close or governments
regulate Bitcoin, changing the rules of the game in a way such that our trading strategies might not work
any more.
With our study, we have shown that it is possible to turn social signals into profit. This extends the range
of typical business applications for social media data like viral marketing or user engagement. Specifically,
our combination of statistical analysis and backtesting serves as a framework for future applications of
social media data in algorithmic trading. It allows a robust validation of strategy profits and a clear
understanding of the system dynamics behind these profits. The application of our framework to Bitcoin
trading illustrates that (asymmetric) information and profit are two manifestations of the same thing,
and how traders can apply these macroscopic information sources to derive large profits. We foresee that
the applications of social signals to finance will reach far beyond Bitcoin, not only to make private profit
but also to understand the dynamics of individual and collective decisions and emotions.
5 Materials and methods
Stationarity tests. Before fitting the VAR model, we test the stationarity of each time series through
two alternative tests: i) the Augmented Dickey Fuller (ADF) test [46], which has the null hypothesis that
the tested time series is non-stationary, and ii) the Kwiatkowski-Phillips-Schmidt-Shin (KPSS) test [47],
with the null hypothesis that the time series is stationary. Under these two tests, it can be considered
12/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
safe that a time series is stationary if it passes the ADF test with a p-value below 0.05 and does not
pass the KPSS test, giving a p-value above 0.1 [38, 16]. We first analyze the time series of levels of each
signal X(t), applying the differentiation operator ∆X(t) = X(t) − X(t − 1) until each time series is
stationary. This step is inspired in the Box-Jenkins method of ARIMA time series analysis [48], and it
is usual to reach stationarity after first differences [38, 16]. The stationary properties of these time series
imply that their means and standard deviations are bound, allowing us to renormalize them through the
Z-transformation Z(t) = (X(t) − µX )/σX, where µX and σX are the mean and standard deviation of
each time series. This way, all time series have the same scale and variance, and their effects in statistical
analysis can be compared.
In the impulse analysis, we correct for the correlations in in
Impulse response function analysis.
two ways. First, we apply orthogonalized impulses of unit covariance, creating a shock of one standard
deviation in a variable under the error correlations of the VAR [49]. Second, we apply bootstrapping on
the resulting responses by producing surrogate time series from resampling the residuals [38]. This way,
we numerically compute confidence intervals of the responses in a very strict way, avoiding false positives
and taking into account the finite size of the analysis period. In our case, we create 10, 000 bootstrap
samples to estimate 95% confidence intervals of the responses. As a result, we simultaneously measure
the dynamics of the system and test their statistical significance.
Trading based on predictions. During each timestep, the prediction function makes a forecast either
based on Equation 3, or based on the price time series for technical strategies. Positive predictions
translate into buy decisions when the trader does not own the asset, and hold if it does. When the
predictor takes value 0, no change is done and the previous position is imitated. Negative predictions
translate into sell positions when the trader owns the asset or short when it does not own it. Shorting
works as follows: Traders can make profit from correct predictions of price drops even if they do not
own the asset predicted to drop in price. This is implemented by borrowing the asset, selling it first and
buying it later for a lower price. The limitation for borrowing is usually imposed on the amount of capital
already held by the trader, and often incurs in additional trading costs and legal regulations [50]. The
simulation of each strategy produces a time series of profits, allowing us to measure their profitability
based on historical data.
Buy and sell orders have respective costs cb and cs, which are proportional to the total traded capital.
In our case we assume all costs are equal c = cb = cs, leaving particular realizations of the costs as open
for future research. We compute daily cumulative returns when trading stops at t+1, holding USD or
selling BTC at the price of t+1. Our trading simulations have a limit on short selling set by the amount of
capital held by the trader and assume that short selling needs to be instantly executed, i.e. short positions
are limited to one iteration. In summary, the strategy we execute is a single-asset backtesting scenario in
which 100% of the capital is invested at each time step and shorting is limited. The pseudocode of this
simulation is shown in Algorithm 1.
Economic signals from financial data The establishment and bankruptcy of various Bitcoin ex-
change markets motivated the creation of the Bitcoin Price Index (BPI) [51]. The BPI combines a set of
price indices from well-performing exchange marketplaces to provide a reference for BTC/USD exchange
13/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
nUSD = 1; CR[1]=1;
for each t from 1 to T-1 do
if prediction(X,t) == 1 and nBTC == 0 then
nBTC = nUSD * (1-cb) / P[t] ;
nUSD = 0
else if prediction(X,t) == -1 and nBTC > 0 then
nUSD= nBTC * (1-cs) * P[t] ;
nBTC = 0
else if prediction(X,t) == -1 and nBTC == 0 then
nBTCb = nUSD / P[t] ;
nUSD = nUSD + nBTCb * (1-cs) * P[t] - nBTCb * P[t+1] / (1-cb)
CR[t+1] = nUSD + nBTC * P[t+1] *(1-cs);
end
Algorithm 1: Algorithm of trading simulation.
rates, and is accepted as a standard measure of Bitcoin price in economics [52, 53, 18]. We use the daily
closing prices of each day t at 23:59 GMT from coindesk.com, composing the time series of price P (t)
from February 1st, 2011 to December 31th, 2014, shown in the top panel of Figure 2. The BPI is not nec-
essarily tradeable, and for that reason we evaluate our trading strategies with the actual exchange rate of
BTC for USD in bitfinex.com, one of the largest markets reported in coindesk.com. We also retrieved
the daily volume of BTC exchanged in 80 online markets for other currencies from bitcoincharts.com.
Aggregating all these data sources, we compose an Internet-wide measurement of Foreign eXchange (FX)
volume of BTC traded every day F XV ol(t), including more than 152 Million BTC in exchange trades as
we recorded in early 2015.
Every purchase of products and services in BTC leaves a trace in the Block Chain, the distributed ledger
that records all transactions in the Bitcoin network. We construct a time series with the daily amount
of Block Chain transactions BCT ra(t), as measured by blockchain.info every day at 18:15:05 UTC,
which we approximate to 00:00 GMT of the next day. While some data is lost in this additional delay of
few hours, further research can provide more precise measurements up to the minute level using the raw
information in the Block Chain itself as in [16]. This way, we include more than 55 million transactions
in the studied period, measuring the overall activity of the system when using Bitcoin as means of
exchange. In addition, we measure the growth of the Bitcoin market through its amount of adopters,
using the operationalization of measuring the amount of downloads of the most popular Bitcoin client2
[16], daily binned in line with other time series. The resulting time series of downloads Dwn(t) is shown
in the top panel of Figure 2.
Social signals We record the overall interest towards Bitcoin through information search, as quantified
by the Google trends volume for the term "bitcoin", S(t), as recorded in early 2015 and shown in the
bottom panel of Figure 2. We choose the search term "bitcoin" instead of the "Bitcon - Currency"
topic, which was introduced as a functionality of Google Trends during our analysis period. While the
topic approach can be more precise for demographics and motive analysis [12], we follow a homogeneous
2http://sourceforge.net/projects/bitcoin
14/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
approach including only the term trend data that was available during the whole study period. It is
important to note that Google Trends data is provided with an additional lag of one day and on the basis
of Pacific Standard Time instead of GMT, adding almost another day of lag. While this is not an issue
for the historical analysis, the evaluation of any trading strategy using S(t) needs to take into account
this additional delay.
We track the attention of social media about Bitcoin in Twitter via the Topsy data service3 . From the
full track of data accessible by Topsy [54], we focus on tweets that contain Bitcoin terms as in previous
research [16], finding a total of 19, 578, 671 Bitcoin-related tweets. The first social signal we extract from
Twitter is the daily amount of unique tweets about Bitcoin TN (t) binned in 24 hour windows starting at
00:00 GMT, measuring the level of word-of-mouth and attention towards Bitcoin and shown in the bottom
panel of Figure 2. We continue by measuring the collective emotional valence with respect to Bitcoin, as
expressed through the text of Bitcoin-related tweets. Valence is considered the most important dimension
of affect, quantifying the degree of pleasure or displeasure of an emotional experience [55]. The expression
of valence through text is a common practice in psychological research, in which lexicon techniques are
used to empirically measure emotions [56, 57]. We measure the average daily valence of Bitcoin-related
tweets through a state-of-the-art lexicon technique [40], which improves the previous ANEW lexicon
method [56] with more than 13000 valence-coded words. We compute the daily average Twitter valence
about Bitcoin during day t in two steps: First we measure the frequency of each term in the lexicon
during that day, and second we compute the average valence weighting each word by its frequency. This
measurement matches more than 50 million valence-carrying tokens, and produces the time series of
Twitter valence TV al(t).
Our last social signal is opinion polarization, which builds up on measuring the semantic orientation of
words into positive and negative evaluation terms [58]. We apply the LIWC psycholinguistics lexicon-
based method [39], and expand its lexicon of stems into words by matching them against the most
frequent English words of the Google Books dataset [59]. As a result, we consider 3463 positive and 4061
negative terms that appear as more than 8 million Twitter tokens. We compute the daily polarization of
opinions in Twitter around the Bitcoin topic TP ol(t), calculating the geometric mean of the daily ratios of
positive and negative words per Bitcoin-related tweet. Note that, instead of repeating a measurement of
valence through two different lexica, we quantify polarization as a complementary dimension to emotional
valence. This way, opinion polarization measures the simultaneous coexistence of positive and negative
subjective content, rather than its overall orientation [58, 23].
References
[1] Lazer, D., Pentland, A. S., Adamic, L., Aral, S., Barabasi, A. L., Brewer, D., Christakis, N., Contrac-
tor, N., Fowler, J., Gutmann, M. et al., 2009 Life in the network: the coming age of computational
social science. Science (New York, NY) 323, 721.
[2] Schweitzer, F. & Vespignani, A., 2012 Editorial. EPJ Data Science 1, 1. ISSN 2193-1127. (doi:
10.1140/epjds1).
3http://topsy.com/
15/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
[3] Treleaven, P., Galas, M. & Lalchand, V., 2013 Algorithmic trading review. Communications of the
ACM 56, 76–85.
[4] Park, C.-H. & Irwin, S. H., 2004 The profitability of technical analysis: A review. Technical report,
University of Illinois at Urbana-Champaign, Department of Agricultural and Consumer Economics.
[5] Biondo, A. E., Pluchino, A., Rapisarda, A. & Helbing, D., 2013 Are random trading strategies more
successful than technical ones? PloS one 8, e68344.
[6] Preis, T., Moat, H. S. & Stanley, H. E., 2013 Quantifying trading behavior in financial markets using
google trends. Scientific reports 3.
[7] Curme, C., Preis, T., Stanley, H. E. & Moat, H. S., 2014 Quantifying the semantics of search behavior
before stock market moves. Proceedings of the National Academy of Sciences 111, 11600–11605.
[8] Cusumano, M. A., 2014 The bitcoin ecosystem. Communications of the ACM 57, 22–24.
[9] Nakamoto, S., 2008 Bitcoin: A peer-to-peer electronic cash system. Technical report, Bitcoin Foun-
dation.
[10] Van Alstyne, M., 2014 Why bitcoin has value. Communications of the ACM 57, 30–32.
[11] Christin, N., 2013 Traveling the silk road: A measurement analysis of a large anonymous online
marketplace. In Proceedings of the 22nd international conference on World Wide Web, pp. 213–224.
[12] Yelowitz, A. & Wilson, M., 2015 Characteristics of bitcoin users: an analysis of google search data.
Applied Economics Letters 22, 1030–1036.
[13] Bitpay.
Over
44,000
businesses
and
charities
accept
bitcoin with
bitpay.
(https://bitpay.com/directory#).
[14] Dell. Dell now accepts bitcoin. (http://dell.to/1uk8ocZ).
[15] Schweitzer, F., Fagiolo, G., Sornette, D., Redondo, F. V., Vespignani, A. & White, D. R., 2009
Economic networks: The new challenges. Science 325, 422– 425. ISSN 1095-9203. (doi:10.1126/
science.1173644).
[16] Garcia, D., Tessone, C. J., Mavrodiev, P. & Perony, N., 2014 The digital traces of bubbles: Feedback
cycles between socio-economic signals in the bitcoin economy. Journal of the Royal Society Interface
11, 20140623. (doi:10.1098/rsif.2014.0623).
[17] Kristoufek, L., 2013 Bitcoin meets google trends and wikipedia: Quantifying the relationship between
phenomena of the internet era. Scientific reports 3.
[18] Kristoufek, L., 2015 What are the main drivers of the bitcoin price? evidence from wavelet coherence
analysis. PLoS ONE 10(4): e0123923 .
[19] Schoen, H., Gayo-Avello, D., Metaxas, P. T., Mustafaraj, E., Strohmaier, M. & Gloor, P., 2013 The
power of prediction with social media. Internet Research 23, 528–543.
16/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
[20] Bordino, I., Battiston, S., Caldarelli, G., Cristelli, M., Ukkonen, A. & Weber, I., 2012 Web search
queries can predict stock market volumes. PloS one 7, e40014.
[21] Mao, Y., Wei, W., Wang, B. & Liu, B., 2012 Correlating s&p 500 stocks with twitter data.
In
Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social
Networks Research, pp. 69–72. ACM.
[22] Gonzalez-Bailon, S., Banchs, R. E. & Kaltenbrunner, A., 2010 Emotional reactions and the pulse
of public opinion: Measuring the impact of political events on the sentiment of online discussions.
arXiv preprint arXiv:1009.4019 .
[23] Tumarkin, R. & Whitelaw, R. F., 2001 News or noise? internet postings and stock prices. Financial
Analysts Journal pp. 41–51.
[24] Saavedra, S., Duch, J. & Uzzi, B., 2011 Tracking traders’ understanding of the market using e-
communication data. PloS one 6, e26705.
[25] Gilbert, E. & Karahalios, K., 2010 Widespread worry and the stock market. In ICWSM, pp. 59–65.
[26] Bollen, J., Mao, H. & Zeng, X., 2011 Twitter mood predicts the stock market. Journal of Compu-
tational Science 2, 1–8.
[27] Garcia, D., Abisheva, A., Schweighofer, S., Serdult, U. & Schweitzer, F., 2015 Network polarization
in online politics participatory media. To appear in Policy and Internet (http://bit.ly/1zGCPOv).
[28] Garcia, D. & Tanase, D., 2013 Measuring cultural dynamics through the eurovision song contest.
Advances in Complex Systems 16, 33.
[29] Hirshleifer, J., 1977 The theory of speculation under alternative regimes of markets. The Journal of
Finance 32, 975–999.
[30] Harris, M. & Raviv, A., 1993 Differences of opinion make a horse race. Review of Financial studies
6, 473–506.
[31] Antweiler, W. & Frank, M. Z., 2004 Is all that talk just noise? the information content of internet
stock message boards. The Journal of Finance 59, 1259–1294.
[32] Tetlock, P. C., 2007 Giving content to investor sentiment: The role of media in the stock market.
The Journal of Finance 62, 1139–1168.
[33] De Choudhury, M., Sundaram, H., John, A. & Seligmann, D. D., 2008 Can blog communication
dynamics be correlated with stock market activity? In Proceedings of the Nineteenth ACM Conference
on Hypertext and Hypermedia, HT ’08, pp. 55–60. ISBN 978-1-59593-985-2.
[34] Challet, D. & Bel Hadj Ayed, A., 2013 Predicting financial markets with google trends and not so
random keywords. Predicting Financial Markets with Google Trends and Not so Random Keywords
(August 14, 2013) .
17/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
[35] Ruiz, E. J., Hristidis, V., Castillo, C., Gionis, A. & Jaimes, A., 2012 Correlating financial time series
with micro-blogging activity.
In Proceedings of the Fifth ACM International Conference on Web
Search and Data Mining, WSDM ’12, pp. 513–522. ISBN 978-1-4503-0747-5. (doi:10.1145/2124295.
2124358).
[36] Whittle, P., 1953 The analysis of multiple stationary time series. Journal of the Royal Statistical
Society. Series B (Methodological) 15, pp. 125–139.
[37] Adamic, L., Brunetti, C., Harris, J. & Kirilenko, A., 2009 On the informational properties of trading
networks. SSRN eLibrary .
[38] Lütkepohl, H., 2007 New introduction to multiple time series analysis. Springer.
[39] Pennebaker, J. W., Chung, C. K., Ireland, M., Gonzales, A. & Booth, R. J., 2007 The development
and psychometric properties of liwc2007. LIWC.net .
[40] Warriner, A. B., Kuperman, V. & Brysbaert, M., 2013 Norms of valence, arousal, and dominance
for 13,915 english lemmas. Behavior research methods 45, 1191–1207.
[41] Wilcoxon, F., 1945 Individual comparisons by ranking methods. Biometrics bulletin pp. 80–83.
[42] Sharpe, W. F. & Sharpe, W., 1970 Portfolio theory and capital markets, volume 217. McGraw-Hill
New York.
[43] Edwards, B., 2014 European bond yields go negative. The Wall Street Journal .
[44] Bitfinex. Features - short. (https://www.bitfinex.com/pages/features).
[45] Bitfinex. Fees schedule. (https://www.bitfinex.com/pages/fees).
[46] Fuller, W. A., 2009 Introduction to statistical time series, volume 428. John Wiley & Sons.
[47] Kwiatkowski, D., Phillips, P. C., Schmidt, P. & Shin, Y., 1992 Testing the null hypothesis of station-
arity against the alternative of a unit root: How sure are we that economic time series have a unit
root? Journal of econometrics 54, 159–178.
[48] Anderson, O. D., 1976 Time series analysis and forecasting: the Box-Jenkins approach. Butterworths
London.
[49] Zeileis, A., 2004 Econometric computing with hc and hac covariance matrix estimators. Journal of
Statistical Software 11, 1–17.
[50] Chance, D. & Brooks, R., 2015 Introduction to derivatives and risk management. Cengage Learning.
[51] Coindesk. Coindesk launches proprietary bitcoin price index. (http://bit.ly/11dDAAK).
[52] Brito, J., Shadab, H. B. & Castillo, A., 2014 Bitcoin financial regulation: Securities, derivatives,
prediction markets, & gambling. Derivatives, Prediction Markets, & Gambling (April 10, 2014) .
[53] Shadab, H. B., 2014 Regulating bitcoin and block chain derivatives. SSRN Preprint 2508707 .
18/19
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288
David Garcia, Frank Schweitzer:
[54] Aitken, T., 2013 Topsy: The social search engine allows you to scan every public tweet ever published
on twitter. CEO World Magazine .
[55] Russell, J. A., 2003 Core affect and the psychological construction of emotion. Psychological review
110, 145.
[56] Bradley, M. M. & Lang, P. J., 1999 Affective norms for english words (anew): Instruction manual
and affective ratings. Technical report, The Center for Research in Psychophysiology, University of
Florida.
[57] Garcia, D. & Schweitzer, F., 2012 Modeling online collective emotions. In Proceedings of the 2012
Workshop on Data-driven User Behavioral Modelling and Mining from Social Media, DUBMMSM
’12, pp. 37–38. (doi:10.1145/2390131.2390147).
[58] Osgood, C. E., 1964 Semantic differential technique in the comparative study of cultures. American
Anthropologist 66, 171–200.
[59] Lin, Y., Michel, J.-B., Aiden, E. L., Orwant, J., Brockman, W. & Petrov, S., 2012 Syntactic annota-
tions for the google books ngram corpus. In Proceedings of the ACL 2012 System Demonstrations,
pp. 169–174.
Acknowledgements: We thank Emre Sarigol for his technical assistance.
Funding: This work was funded by the Swiss National Science Foundation (CR21I1_146499).
Authors’ contributions: DG conceived the research, retrieved data, and performed the analyses. DG
and FS wrote the manuscript.
Competing interests: The authors declare that they have no competing financial interests.
Ethics statement: This research is based on observational data shared publicly. No personal or indi-
vidual information was retrieved, stored, or analyzed.
Data and materials availability: All data used for this article is publicly available through the corre-
sponding Application Programming Interfaces. Processed data and scripts to reproduce these results are
available at https://www.sg.ethz.ch/btc
19/19
|
1801.05802 | 2 | 1801 | 2018-03-15T11:11:05 | Measuring, Understanding, and Classifying News Media Sympathy on Twitter after Crisis Events | [
"cs.SI",
"cs.CY"
] | This paper investigates bias in coverage between Western and Arab media on Twitter after the November 2015 Beirut and Paris terror attacks. Using two Twitter datasets covering each attack, we investigate how Western and Arab media differed in coverage bias, sympathy bias, and resulting information propagation. We crowdsourced sympathy and sentiment labels for 2,390 tweets across four languages (English, Arabic, French, German), built a regression model to characterize sympathy, and thereafter trained a deep convolutional neural network to predict sympathy. Key findings show: (a) both events were disproportionately covered (b) Western media exhibited less sympathy, where each media coverage was more sympathetic towards the country affected in their respective region (c) Sympathy predictions supported ground truth analysis that Western media was less sympathetic than Arab media (d) Sympathetic tweets do not spread any further. We discuss our results in light of global news flow, Twitter affordances, and public perception impact. | cs.SI | cs | Measuring, Understanding, and Classifying News Media
Sympathy on Twitter after Crisis Events
Abdallah El Ali 1,2, Tim C Stratmann 2, Souneil Park 3,
Johannes Schöning 4, Wilko Heuten 5, Susanne CJ Boll 2
1 Centrum Wiskunde & Informatica (The Netherlands), 2 University of Oldenburg (Germany),
3 Telefonica Research (Spain), 4 University of Bremen (Germany), 5 OFFIS - Institute for IT (Germany)
[email protected], [email protected], [email protected],
[email protected], [email protected], [email protected]
8
1
0
2
r
a
M
5
1
]
I
S
.
s
c
[
2
v
2
0
8
5
0
.
1
0
8
1
:
v
i
X
r
a
ABSTRACT
This paper investigates bias in coverage between Western and
Arab media on Twitter after the November 2015 Beirut and
Paris terror attacks. Using two Twitter datasets covering each
attack, we investigate how Western and Arab media differed
in coverage bias, sympathy bias, and resulting information
propagation. We crowdsourced sympathy and sentiment la-
bels for 2,390 tweets across four languages (English, Arabic,
French, German), built a regression model to characterize
sympathy, and thereafter trained a deep convolutional neural
network to predict sympathy. Key findings show: (a) both
events were disproportionately covered (b) Western media ex-
hibited less sympathy, where each media coverage was more
sympathetic towards the country affected in their respective
region (c) Sympathy predictions supported ground truth analy-
sis that Western media was less sympathetic than Arab media
(d) Sympathetic tweets do not spread any further. We discuss
our results in light of global news flow, Twitter affordances,
and public perception impact.
ACM Classification Keywords
H.5.3. Group and Organization Interfaces: Web-based interac-
tion
Author Keywords
Twitter; sympathy; sentiment analysis; news media bias; crisis
informatics; cross-cultural; crowdsourcing; NLP
INTRODUCTION
On 12 November, 2015, the city of Beirut (Lebanon) wit-
nessed two bombings1 at approximately 18:00 Eastern Euro-
pean Time (EET) (UTC+02:00), coordinated by two suicide
bombers that detonated explosives in Bourj el-Barajneh, a
southern suburb of Beirut. This suburb is largely inhabited by
1https://en.wikipedia.org/wiki/2015_Beirut_bombings; last retrieved:
24.12.2017
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
CHI 2018, April 21–26, 2018, Montreal, QC, Canada
© 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM.
ISBN 978-1-4503-5620-6/18/04. . . $15.00
DOI: https://doi.org/10.1145/3173574.3174130
Shia Muslims, and reports estimate the number of deaths to
be anywhere between 37 to 43, with over 200 injured. These
bombings constituted the worst attack in Beirut since the end
of the 1990 Lebanese Civil War. Shortly after the attacks, the
Islamic State (IS)2 claimed responsibility for the attacks.
A day later, on 13 November, 2015 beginning at 21:20 Central
European Time (CET) / UTC+01:00, three suicide bombers
carried out a series of coordinated terrorist attacks in Paris3 on
its northern suburb, Saint-Denis. They struck near the Stade
de France in Saint-Denis, followed by suicide bombings and
mass shootings at cafés, restaurants and a music venue in
central Paris. The attacks resulted in the deaths of 130 people,
and injury of 368 people. These attacks were purported to be
the deadliest on France since World War II. Shortly after the
attacks, IS also claimed responsibility for the attacks.
The days after the November attacks in Paris, people took so-
cial media by storm in response to the events. From outcries of
sympathy and solidarity with Paris, to outcries against or sup-
port for Islam [38], to proclamations that mainstream coverage
of the Beirut attacks have been sparse and uncaring. In such
press reports, we find allegations suggesting reports about at-
tacks, bombings and other crisis events that Western media do
not sympathize with attacks in the Arab world as much as they
do for attacks in the Western world. Even though many studies
have already shown that news providers are inherently biased
(such as in what to cover) [3, 25] where attention asymmetries
exist [1], the question arises why differential coverage across
crisis events may occur in social media content.
According to Kwak and An [32], how a piece of news is re-
ported (specifically how sympathetic it is to those affected)
has the capacity to evoke compassion, which can facilitate
monetary support and launch collective public action. This
has far reaching implications given the media's power (even
on microblog platforms like Twitter) in shaping public dis-
course and perception of global events [48], which raises the
following questions: To what extent cultural, religious, or
geo-political factors account for news media bias in coverage
of global terror attacks? And what makes a country news-
worthy of sympathy under such events? We believe this has
2In Arabic also known as Da'ish.
3https://en.wikipedia.org/wiki/November_2015_Paris_attacks; last
retrieved: 24.12.2017
implications for how news organizations can better manage
public opinion using social media sites during the immediate
and long-term aftermath of a political and/or religious crisis
event (e.g., terror attack). Importantly, exposure to biases has
been shown to have the capability to foster intolerance and
create ideological segregation in major political and social is-
sues [19], and this may be amplified across Western and Arab
cultures. Considering the time-critical nature of Twitter news
reporting, it becomes key to develop approaches for under-
standing sympathy, and as we show later, our work contributes
a first step towards such an approach for viewing Twitter as a
journalism tool that can help in detecting sympathy.
During November 2015, examples of online news headlines
included: "Beirut, Also the Site of Deadly Attacks, Feels For-
gotten"4 by The New York Times, "Paris, Beirut, and the
Language Used to Describe Terrorism"5 by The Atlantic, or
"Did the media ignore the Beirut bombings? Or did readers?"6
by Vox. While coverage of the attacks may have been dispro-
portionate, discussion as to why this was so was polarized. On
one end, public and journalistic response attributed blame to-
wards the media and its volume and style of coverage (cf., The
Atlantic), and on the other end (cf., Vox) there were claims
that the media did its part in adequate news reporting, but
since Western readers did not care, coverage was drastically
reduced. Given such statements, this paper tries to quantify the
differences across this observed differential news coverage.
We believe these events provide an interesting use-case to
study, because: (a) it allows us to examine in detail whether
Western and Arab media exhibit differences in reporting global
crisis events, and if so, how such differences manifest (b) the
unique context of our study, marked by the rare successive oc-
currences of two crisis events at places within the Western and
Arab world, allows exploring the relative differences specific
to those two worlds (c) it allows us to examine such biases us-
ing publicly available social media data (in our case, Twitter),
and in turn how this can aid journalistic social media practice
in ensuring transparency and quality in produced content.
In this paper, we adopt research on media bias to study news
on Twitter (cf., [20, 59]). Our focus here is not on whether
media biases exist within Twitter as a social media platform
specifically, but rather we use Twitter as a journalism tool to
study time-critical news reporting and provide first steps to
develop an approach for classifying sympathetic tweets. Here,
the affordances of Twitter as a platform can be redesigned
to aid news reporters by automatically detecting (sympathy)
biases. Twitter data was deemed suitable because: (a) Twitter
has become a popular channel for news reporting by main-
stream media [30, 42] (b) the large quantity of tweets allows
us to gain insight into the temporal aspect of news coverage at
a finer grained level than with news articles (c) the uncensored
nature of tweets that are collected with the Twitter Streaming
4http://www.nytimes.com/2015/11/16/world/middleeast/beirut-
lebanon-attacks-paris.html; last retrieved: 24.12.2017
5http://www.theatlantic.com/international/archive/2015/11/paris-
beirut-media-coverage/416457/; last retrieved: 24.12.2017
6http://www.vox.com/2015/11/16/9744640/paris-beirut-media; last
retrieved: 24.12.2017
API (d) the costs involved in labeling tweets for sympathy are
lower than lengthier pieces of news coverage.
RESEARCH QUESTIONS & CONTRIBUTIONS
Given the foregoing motivation, we aim to better understand
media coverage differences on Twitter through computation-
ally capturing news sympathy during such unexpected, human-
induced crisis events. Bias can be viewed as a partial perspec-
tive on facts [53], which can be further broken down into three
aspects [9]: selection bias (gatekeeping), or which stories are
selected; coverage bias, or how much attention is given to a
story; and statement bias, or how a story is reported. Here, we
used these concepts and zoomed in on the Beirut and Paris
attacks, to examine in detail whether their coverage on Twitter
differed. Here, we focus on coverage bias, statement bias
(specifically on characterizing news sympathy), and whether
sympathetic messages propagate further on Twitter. Since we
are only concerned with the differences in reporting of these
two events, we do not consider selection bias. The underlying
assumption we make here is that it is important to minimize
such bias, even if only on social networks like Twitter. We
posit the following questions:
• RQ1 - Coverage bias: Was there a difference (in terms
of normalized tweet volume) between Western and Arab
media coverage of the Beirut and Paris attacks?
• RQ2 - News media sympathy bias: Was there a difference
between Western and Arab media in how sympathetic the
tweets were towards affected individuals across each event?
• RQ3 - Information propagation: Do sympathetic and pos-
itive sentiment tweets propagate further throughout the Twit-
ter network (i.e., receive more retweets)?
For coverage bias, we hypothesized that the Beirut attacks
would receive less coverage from Western media, but not from
Arab news media accounts on Twitter, with the inverse for
coverage of Paris. This is in line with the news flow theory
[51], which states that the prominence of a foreign country
in the news is attributed to three groups of variables: (a) na-
tional traits (e.g. size and power of the foreign country), (b)
relatedness (e.g., proximity to a foreign country in terms of ge-
ography, demography, etc.) and (c) events (e.g., wars, disasters,
protests) [51, 60]. In this case, Paris is both geographically and
culturally closer to Western countries, and given the timeline
of both attacks, Paris would likely attract more coverage.
Given news statements (e.g., NYTimes's article7) on differen-
tial coverage and Diakopoulos's [14] work on Twitter news-
worthiness, we expected that tweets from Western media cov-
ering the Beirut attacks would overall exhibit less sympathy
than coverage of the Paris attacks, while the inverse is true for
Arab Twitter news media, which would exhibit more sympathy
towards the Beirut attacks. In this paper, our objective is to ex-
plore these questions using a combination of NLP techniques
and crowdsourcing on Twitter datasets. Finally, we look at
information diffusion [56], where previous research has found
that negative news sentiment on Twitter enhances virality [24],
7http://www.nytimes.com/2015/11/16/world/middleeast/beirut-
lebanon-attacks-paris.html; last retrieved: 24.12.2017
while other work found that emotionality and positivity in
online news content increases virality [4]. Despite mixed find-
ings, we expected that tweets which are sympathetic (as well
as ones with positive sentiment) to be more likely to spread
throughout the Twitter network, by resulting in more retweets.
In this paper, we make the following contributions to human-
computer interacton and social computing research:
1. We provide a deeper, data-driven understanding of how the
Western and Arab news coverage of the Paris and Beirut at-
tacks differed with respect to coverage bias, news sympathy,
and information propagation.
2. We provide a public annotated multi-language (English,
Arabic, French, German) dataset that can be used to train
learning algorithms to predict news sympathy on Twitter
during terror events (see Supplementary Material A8).
RELATED WORK
Media Bias in Communication and Social Media
Trumper et al. [49] examined biases in online news sources
and social media communities around them, and by analyzing
80 international news sources during a two-week period, they
showed that biases are subtle but observable, and follow geo-
graphical boundaries more closely than political ones. Sert et
al. [61] proposed to leverage user comments along with the
content of the online news articles to automatically identify
the latent aspects of a given news topic, to be used as a first
step in detecting the news resources that are biased towards
certain subsets of these latent aspects. Park et al. [46] took a
different approach towards media bias with NewsCube, where
they automatically provide readers with multiple classified
viewpoints on a news event of interest. Dallmann et al. [10]
investigated a dataset covering all political and economical
news from four leading online German newspapers over four
years, and showed that statistically significant differences in
the reporting about specific parties can be detected between
the analyzed online newspapers.
More generally, social media content biases have been ob-
served across datasets.
In a study of Twitter, Flickr, and
Swarm, it was shown that volunteered geographic information
is "local" (geotags correspond closely with the home loca-
tions of its contributors) in only about 75% of cases [27], and
compounded by how localness is defined [28]. This effect in-
fluences the design of geolocation inference algorithms, which
have been shown to exhibit significantly worse performance
for underrepresented populations (i.e. rural users), even when
overcorrecting for populations biases [26].
Twitter for Crisis and Controversy Understanding
Twitter has shown to be a rich resource to study media bias and
controversy, especially after major events, whether political,
religious, or natural (e.g., [2, 6, 52]). Morgan et al. [43] found
that Twitter users share news in similar ways regardless of
outlet or perceived outlet ideology, and that as users share
more news content, they tend to quickly include outlets with
opposing views. Younes et al. [62] looked at how traditional
8https://github.com/abdoelali/CrisisNewsSympathy
media outlets and social media differ in coverage of an event,
and focused on coverage patterns of NYTimes articles and
tweets during the Egyptian uprising in 2011. To discover such
patterns, they proposed a simple media bias measurement
model for day-to-day news items built on top of topic models.
They found that traditional news sources have a wider disparity
in the ranks and hence a strong presence of media bias.
Wei et al.
[59] proposed an empirical measure to quan-
tify mainstream media bias based on sentiment analysis and
showed that it correlates better with the actual political bias
in the UK media than pure quantitative measures based on
media coverage of various political parties. They then studied
media behavior on Twitter during the 2010 UK General Elec-
tion, and showed that while most information flow originated
from the media, they seem to lose their dominant position in
shaping public opinion during this general election. Olteanu
et al. [44] investigated several crises using public Twitter data
– including natural hazards and human-induced disasters – in a
systematic manner and found that tweets expressing sympa-
thy and emotional support constituted on average 20% of the
crisis-related datasets. The four crises in which the messages
in this category were most prevalent (>40%) all pertained to
instantaneous disasters (which included terror attacks).
News Sentiment and Polarity Analysis
Typically, assessing news articles for polarity involves classi-
fying text for three-valued sentiment: positive, neutral, and
negative (e.g., [16]). However, recently researchers have taken
more fine grained approaches towards modeling complex emo-
tions, such as Lin and Margolin's [35] work on quantifying the
diffusion of fear, sympathy, and solidarity during the Boston
bombings, and Schulz et al.'s [50] work on multi-valued senti-
ment classification. Moreover, Vargas et al. [57] showed that
there are marked differences between the overall tweet senti-
ment and the sentiment expressed towards subjects mentioned
in the tweets. Mejova et al. [40] took a data-driven approach
to understand how controversy interplays with emotional ex-
pression and biased language in news using crowdsourcing,
and found negative affect and biased language prevalent in
controversial issues, while using strong emotions is tempered.
METHODOLOGY
Defining News Sympathy and Sentiment
To quantify sympathy, we needed firstly to define sympathy.
We use Decety & Chaminade's [11] definition where ?sympa-
thy is an affective response that?consists of feelings of concern
for the distressed or needy other person?. While attempts have
been to capture sentiment through tokenization [45], both
sentiment and sympathy are hard to capture computationally.
However, sympathy [35] and sentiment [15] can be detected
from text. Therefore, we consider sympathy (is the tweet
sympathetic or not towards the affected individuals?) and
sentiment (is the tweet negative, neutral, or positive?) as rele-
vant variables to study in higher resolution whether Arab and
Western media covered the two attacks differently.
Approach Overview
To build a dataset of tweets from news media accounts for
later analysis to answer our research questions, we employ
Region
Middle East (6)
Western (5)
Country (population per million)
Egypt (89.6), Iraq (34.8), Saudi Arabia (30.9), United
Arab Emirates (9.1), Jordan (6.6), Lebanon (4.5)
USA (318.9), Germany (80.9), France (66.2), United
Kingdom (64.5), Spain (46.4)
Table 2: Regions and countries of interest for our analysis. Population esti-
mates drawn from the World Bank (http://www.worldbank.org/; last retrieved:
24.12.2017)
Paris Ruest dataset: In addition to our collection, we use a
larger dataset created by Nick Ruest9, who collected tweets
shortly after the attacks occurred (approx. 23:00 UTC on
November 13) with the following hashtags: #paris, #parisat-
tacks, #prayforparis, and #porteouverte. We hydrated (col-
lected metadata for tweets based on tweet IDs) the dataset on
2015-11-19 using the Twitter public API, and collected a total
of 12,788,201 tweets. Tweet volume was less (attrition rate:
14.4%) than the original collection (N=14,939,154), which is
common given that some tweets are removed (either by Twitter
or by users). This collection spanned 33.96 days, from 2015-
11-04 21:14:39 UTC till 2015-12-08 20:54:03 UTC. NH's
Paris dataset had a total of 9,742,241 (76.18%) retweets and
4,127,762 unique users.
Paris Combined dataset: For later analysis, we combined
both datasets. We expanded the Paris dataset (by merging with
the Paris Ruest dataset) because it spanned only 1.17 days
after the Paris attacks, while the Beirut dataset spanned 3.31
days. This step is important for temporally aligning the Paris
dataset with the Beirut dataset. Additionally, the imbalanced
dataset size notwithstanding, we later downsample all datasets
to ensure the datasets are balanced and any effects seen are not
an artifact of a large sample size. Merging datasets resulted in
a total of 16,868,318 tweets. Our dataset consisted of 75.6%
retweets, resulting in a total of 4,110,291 unique tweets with
4,013,489 unique users. This combined Paris dataset (with
retweets and duplicates removed) is used for all subsequent
analyses, and will be referred to simply as the Paris dataset.
Crawling & Extracting News Media Tweets
To answer our questions about media coverage bias (specifi-
cally differences in news sympathy), we apply multiple pro-
cessing steps. We first crawl Twitter news (and blog) accounts,
extract the news tweets from our datasets, identify the lan-
guage of the tweets, slice our data by time to ensure that
the two event timelines match in duration, and finally draw
samples to ensure our data is sizeable and ready for human
computation. Details of each step is described below.
Crawling Twitter news accounts
Our first step was to identify and collect influential Western
and Arab news accounts on Twitter. The list of countries cho-
sen across the Middle East and the Western world are shown in
Table 2. With respect to the Middle East, we chose countries
that were geographically near Lebanon, and that did not have
explicit and/or visible political nor religious conflicts with
Lebanon at the time of collection (e.g., Syria was excluded
9http://ruebot.net/post/look-14939154-paris-bataclan-parisattacks-
porteouverte-tweets; last retrieved: 24.12.2017
Figure 1: Overview of methodological pipeline.
the following methodology (pipeline shown in Fig. 1): (1)
Twitter Data Collection & Preprocessing (2) Crowdsourcing
Annotation (3) Analysis and Prediction. The first two steps are
described in detail below, the third in the following section.
Twitter Data Collection & Preprocessing
We have collected and used four different datasets (described
below): Beirut, Paris, Paris Ruest, and Paris Combined.
Beirut dataset: We collected 906,538 tweets on the Beirut
bombings on November 12, 2015 shortly after news break-
out (approx. 21:00 CET), using the Twitter Streaming API
and with these hashtags: #lebanon, #beirut, #beirut2paris,
#beirutattacks, #beirutbombing. The dataset was pruned for
duplicates. Collection spanned 3.31 days, from 2015-11-12
18:51:07 UTC till 2015-11-16 02:17:04 UTC. Our dataset con-
sisted of 667,073 (73.58%) retweets and 610,879 unique users.
After removing retweets, our dataset had 239,093 unique
tweets. The top five hashtags for this dataset are shown in
Table 1. What is immediately striking here are the high oc-
currences of the hashtags #paris and #parisattacks, where we
attribute this due to the overlap between people's attention to
the Paris attacks after having heard about the Beirut attacks.
Beirut
Count
95,280
66,898
56,021
41,245
21,546
Hashtag
#beirut
#paris
#lebanon
#parisattacks
#isis
Paris (merged)
Count
Hashtag
6,777,117
5,765,292
1,672,152
778,132
760,320
#parisattacks
#paris
#prayforparis
#bataclan
#porteouverte
Table 1: Top five most frequent hashtags for each dataset.
Paris dataset: We collected a total of 5,339,452 tweets dur-
ing the two days (13th and 14th) after the November 2015
Paris attacks using the Twitter Streaming API and with the
following hashtags: #paris, #france, #parisattacks, #prayfor-
paris, and #porteouverte. Some of these JSON records (0.03%)
were poorly structured and others were duplicates, and thus
removed. This resulted in a total of 5,337,840 tweets. Collec-
tion spanned 1.17 days, from 2015-11-14 13:30:49 UTC till
2015-11-15 18:06:54 UTC. Our Paris dataset had a total of
4,045,046 (75.78%) retweets and 2,538,348 unique users.
Paris DatasetBeirut Attacks Twitter DatasetParis Attacks Twitter DatasetsWestern Twitter News AccountsArab Twitter News AccountsWestern Media Covering Beirut AttacksArab Media Covering Beirut AttacksWestern Media Covering Paris AttacksArab Media Covering Paris AttacksAR tweetsDE tweetsEN tweetsFR tweetsProcessingExtracting News Media TweetsProcessed DatasetsCrowdsourcingCrawling &Preprocessing(1)(2)Analysis & Prediction(3)Tweet Filtering by AccountsNear-duplicates RemovalTerm FilteringTemporal Slicing and SamplingLanguage IdentificationCoverage BiasTweet PropagationSympathy Bias AnalysisNews Sympathy ClassificationUnderstanding Sympathy and Sentimentdue to the ongoing conflict at the time of data collection). For
Western countries, we based our decision on population size,
language (English being most prominent), and proximity to
France. Despite that Twitter is dominated by English language
users10, we wanted to ensure that we were collecting news
media tweets from both English as well as the native language
of the countries of interest. To find news media11 accounts on
Twitter from these countries, we followed a two-step approach:
We found a seed set of accounts automatically (using Twit-
ter's relevance-based Search API) by crawling user accounts
(see Supplementary Material B) with news related queries
(e.g., 'France news' for English queries; 'Nouvelles France'
for native language queries). This first step deliberately takes
a crude computational approach as curating news organiza-
tions by experts may be subject to bias, and could exclude
unfamiliar news accounts that possibly became highly active
during the time of crisis (e.g., bloggers new to the scene). We
included bloggers because (a) Bloggers play an important role
in disseminating news, cf., during the Arab spring in Tunisia
and Egypt [36]) (b) They are typically uncensored, since they
do not 'officially' provide public service [54].
To ensure a measure of influence, we only retrieve user ac-
counts with at least 5k followers. Despite earlier research that
showed a high number of followers does not always mean an
influential user [8], we used follower count as a simple heuris-
tic to gather prominent news accounts. While our collection
could also have include state-sponsored news (which is diffi-
cult to identify), our intention was to capture tweet samples
that users would likely see. We also checked for romanized
Arabic queries (e.g., Akhbar Masr), but did not find additional
accounts matching the >5k follower requirement. Our queries
returned six results (which we kept) with a follower count
<5k (Max=4,935, Min=4,473), with the rest >5k (Max=31.4M,
"CNN Breaking News"). We did not set a limit on account
creation date nor on Twitter verification, as our experiments
showed: (a) new bloggers and news agencies with accounts
created only a year earlier (2014) appeared to be quite active
in reporting events (b) even major news accounts were some-
times not Twitter verified, wherein we could potentially miss
important news accounts if we enabled this filter.
Returned accounts were manually inspected to ensure they
comprise news media outlets and blogger accounts. As a
sanity check, we also cross-checked whether account names
occur in public lists (e.g., Wikipedia pages 'News media in
{Country}'12) and for blogger accounts, whether they cross-
link to a webpage. It is important to mention here that there is
no such benchmark list of news media accounts on Twitter. We
had a total of unique 208 news media accounts, where 93.3%
(194/208) of our dataset consists of news outlet accounts, and
the remainder 8 journalist and 6 blog accounts. Furthermore,
there was some overlap in accounts for Western media (38/117)
10http://www.beevolve.com/twitter-statistics/#a3;
24.12.2017
11We use Wikipedia's definition of news media, which includes blog
accounts: https://en.wikipedia.org/wiki/News_media ; last retrieved:
24.12.2017
12E.g., https://en.wikipedia.org/wiki/News_media_in_the_United_States;
last retrieved: 24.12.2017
retrieved:
last
coverage and for Arab media (38/91) coverage of Paris and
Beirut. The final list of unique crawled news organizations
(N=208) is provided as a supplementary dataset to this paper
(see Supplementary Material C)13.
Tweet Filtering by Accounts
After gathering a set of news accounts across countries using
both English and native language queries, we then matched
these user IDs with all IDs in our Beirut and Paris datasets.
The full set of queries used, the total number of Twitter news
accounts found, and the amount and percentage extracted from
both datasets are shown in Supplementary Material B. This
process resulted in four datasets: (1) Arab media covering
the Beirut attacks (N=2,766) (2) Arab media covering the
Paris attacks (N=2,728) (3) Western media covering the Beirut
attacks (N=245) (4) Western media covering the Paris attacks
(N=9,245). The datasets combined resulted in 14,984 tweets.
Term Filtering
As an additional step, we made sure that within each dataset,
there was no mention of the other set of attacks (e.g., we
removed all mentions of Paris from the Beirut dataset), and
that all tweets pertained to the events in question. Even though
the two attacks happened a day apart, where we would expect
cross-pollination across messages, we deliberately chose not to
include tweets that reference both the Paris and Beirut attacks,
as this may influence our attempts at investigating media bias
within each tweet dataset separately. For the Beirut dataset,
we filtered out tweets that included these terms: paris, parís
france, parisattacks, bataclan, parisattacks, porteouverte. For
the Paris dataset, we filtered out the following terms: beirut,
lebanon, beirutattacks, ) (cid:203) [Lebanon],
Near-duplicates Removal
Finally, to ensure that our dataset contains only unique tweets
without any near duplicates (as this would cause redundancy
later in the annotation task), we removed all partial duplicates
from our resulting datasets. This was done by applying the
Levenshtein distance [34] string similarity metric on the tweet
texts of each dataset, with a threshold set to 0.1. This reduced
the size of our dataset to 12,814 tweets.
Language Identification
To prepare our Beirut and Paris datasets for analysis of sympa-
thy, we need to be able to identify the language of the tweets
so crowdworkers can annotate them. To do so, we used the
langid.py [37] language identification Python package, and
computed the (percentage) distribution of languages. We used
langid.py as it provided us with classification probabilities
while Twitter's 'lang' value does not provide such a metric, so
we could manually adjust the 'lang' of low confidence tweets.
To deal with any misclassifications from langid.py, we disqual-
ified any tweets with a normalized classification probability
of < 0.95, reducing our dataset to 10,460 unique tweets. For
the remainder of the tweets, we manually inspected and re-
classified all tweets with a normalized probability of > 0.95.
0 3 [Beirut].
13We show the name, user name, user description, the country / query
used to retrieve the account, and follower count at the time of crawling
– all of which are publicly available data. Additionally, we include
tweet count and mean scores and standard deviations across all labels.
We found that across all datasets combined, the languages of
tweets were either English (67%), German (13.9%), Arabic
(10.1%), French (8.3%), or Spanish (0.7%). Given the low
percentage of Spanish in our dataset, we decided to exclude
any Spanish tweets from all subsequent analyses.
Temporal event slicing and sampling
Given that our Beirut and Paris datasets differed temporally
in coverage of the attacks, we need to normalize coverage
duration as tweets posted 5 days after the attacks may differ
for example than tweets posted two weeks after the attacks.
Since we were constrained by the size and coverage duration
of our Beirut dataset, we used the coverage length of that
dataset as a seed to slice the Paris dataset. For our processed
Beirut dataset, our earliest coverage started on 2015-11-12
18:52:30 UTC (approx. 4 hours after the Beirut attacks that
took place around 18:00 EET) and went until 2015-11-16
02:00:10 UTC. This amounts to exactly 3.3 days. Thereafter,
we applied the same time slice for the processed Paris dataset,
where earliest coverage started from 2015-11-13 21:15:20
UTC (approximately one hour after the Paris attacks, which
started at 20:20 UTC) until 2015-11-17 02:30:23 UTC, giving
exactly 3.22 days. This time slicing further reduced the total
size of our combined datasets to 7,768 unique tweets: Western
media coverage of Beirut (N=131), Western media coverage
of Paris (N=5,298), Arab media coverage of Beirut (N=287),
and Arab media coverage of Paris (N=1,566).
Finally, to send our tweets for annotation by crowdworkers,
we only needed a sufficient sample from each of our four re-
sulting datasets to avoid lengthy crowdwork time and costs.
Even though this annotated data is limited, we later train and
classify our unlabeled data automatically which handles the
limitations of crowdsourcing. Therefore, we drew a random
sample of 1,000 tweets from the Paris datasets. However, ran-
dom sampling may miss important tweets that occurred on
specific days within our 3.3 days. Therefore, we split each
dataset into separate buckets of approximately 24 hours, and
drew normalized random samples from each bucket to elimi-
nate bias in drawing more samples from a day that happens to
have more records. The normalization constant was calculated
by dividing the size of the desired sample draw (1,000) by the
total number of rows in each dataset. For each bucket, the
sample drawn was the number of records in that bucket mul-
tiplied by the normalization constant, and rounded to ensure
all day buckets cap at 1,000 records. This process reduced
the size of the Paris attacks datasets (Western and Arab media
coverage) each to N=1,000. The final language distribution of
our language-specific datasets ready for annotation is shown
in Fig. 2.
Crowdsourced Overall Sympathy Annotation
To annotate our datasets, we employed crowdworkers through
the CrowdFlower14 platform. We had four language-specific
datasets with corresponding annotation instructions. A
language-specific dataset covered both the Beirut and Paris
attacks, which meant there was an assumption that a worker
had to be familiar with both events to accurately label tweets.
For each language-specific annotation task, we provided task
14http://crowdflower.com/; last retrieved: 24.12.2017
Figure 2: Language distribution of tweets to be annotated across datasets.
instructions and examples in that target language (translated
from English by native speakers). For each tweet (and any
accompanying media), a worker had to label it for sympathy
(sympathetic15, unsympathetic) and sentiment (positive, neu-
tral, negative), and optionally 'NA' for non-applicable tweets.
For worker selection, we ensured workers spoke the target
language. We did not set a restriction on worker location, as a
worker could speak a target language (e.g., Arabic) yet reside
in a non-Arabic speaking country. While we set target lan-
guage requirements, we did not make our tweets into images
(cf., [5]), which can be a limitation. Following standard guide-
lines from CrowdFlower, 10-15 tweets per language-specific
task were classified by the paper authors. We did not trust
assessments of any worker who differed significantly from
our own (cut-off point of < 70% agreement). Workers were
presented with the original tweet, and included media items
(image or video), and were asked to label it. While we are
aware of the potential ethical concerns on behalf of Twitter
users in displaying their name (cf., [44]), in our case we were
only displaying tweets from news organizations, who are pre-
sumably aware and even encourage publicizing their content.
Importantly, omitting the username of our tweets would risk
misrepresenting the original tweet and its overall sympathy.
Trusted workers took on average (across all languages) 57
seconds (interquartile mean) to label each tweet. We collected
labels from at least 3 different trusted workers per tweet and
task16, where the final label of the tweet was determined by
majority vote. We followed the guidelines of CrowdFlower,
and set a limit of no worker labeling more than 300 items in
our rating task. Workers were paid 10 cents per page, where
each page contained 5 tweets. This amounted to approximately
$10 per 100 tweets. In the end, we had a total of 2,390 x 2 x 3
= 14,340 labels (excluding the 'not applicable' checkbox).
Annotation Quality
Despite that labeling sentiment can be subjective (cf., [45]),
we provided detailed instructions and examples of Positive,
Negative, and Neutral tweets (see Supplementary Material
D) to ensure workers correctly label the data. Moreover, our
inter-rater agreement scores drawn from CrowdFlower (Table
3) are promising, with the lowest being 69.1% for sentiment
classification of Arabic tweets, which is in line with previous
work, and highlights the reliability of crowdsourced social
15E.g., thoughts, prayers, sadness, solidarity with affected individuals.
16Note that if a tweet has different labels from all 3 workers, the
CrowdFlower platform brings in additional workers.
Paris attacks Arab mediaParis attacks Western mediaBeirut attacks Arab mediaBeirut attacks Western media0%25%50%75%100%Language Distribution (%)Media CoverageLanguage:ArabicGermanEnglishFrenchLang.
EN
# Tweets
1732
AR
FR
DE
354
147
185
Label
Sentiment
Sympathy
Sentiment
Sympathy
Sentiment
Sympathy
Sentiment
Sympathy
a=3 (%)
Fleiss' Kappa
69.3
83.4
69.1
82.7
73.1
82.4
73.1
85.5
0.27
0.42
0.32
0.29
0.22
0.32
0.28
0.38
Table 3: Trusted worker agreement (a=3) scores across languages (from
CrowdFlower) and our own computed Fleiss' Kappa scores.
media annotation [44, 13]. As a further measure, we also
computed Fleiss' Kappa for the labeled tweets, and found rea-
sonable agreement scores (Table 3), with sentiment expectedly
exhibiting lowest agreement across languages17. Furthermore,
we followed Olteanu et al.'s [44] approach and independently
(N=2) rated a random sample of 15 tweets from each lan-
guage dataset18 (total N=60) and computed unweighted Co-
hen's Kappa for each factor except sentiment (which was
weighted). Our ratings reached substantial agreement on sen-
timent (κ=0.70, CI: [0.52,0.88]) and sympathy (κ=0.71, CI:
[0.50,0.91]) labels. Thereafter, we took our agreement ratings
and compared their joint label with those provided by workers,
and we reached reasonable agreement for sentiment (κ=0.64,
CI: [0.42,0.87]) and sympathy (κ=0.59, CI: [0.37,0.82]).
Access to our anonymized data set is available (see Supple-
mentary Material A) and on GitHub: https://github.com/
abdoelali/CrisisNewsSympathy.
RESULTS
Coverage Bias
We looked at normalized tweet volume from Western and Arab
media across both attacks (N=7,768), and visualize this daily
and hourly in Fig. 3. Attention bursts reflect day-night cycles.
From the graphs, we can see that for the Beirut attacks, there
was more coverage from Arab media, with the inverse for
the Paris attacks, which shows more Western media coverage.
We ran a Chi-square test with Yates' continuity correction
across all days to compare the difference between Arab and
Western media coverage. In line with our hypothesis, our test
revealed a statistically significant difference in tweet activity
volume between how much Western (M=0.909) and Arab
media (M=5.37) covered the Beirut attacks and by how much
Western (M=36.79) and Arab media (M=10.87) covered the
Paris attacks (χ2(1, N=7,768) = 1489, p<0.001, φ=0.44, odds
ratio=0.05). From this, we accept the alternative hypothesis
that there was indeed coverage bias across both attacks.
Furthermore, did Western and Arab media follow a similar
pattern of tweeting? We ran correlation analyses between
hourly tweet volume for both attacks across media coverage,
and found that for the Beirut attacks, Western and Arab me-
dia exhibited a medium-sized correlation (Spearman (ρ) =
0.608, p<0.001; φc=0.698) and for the Paris attacks exhibited
a significant and strong correlation (Spearman (ρ) = 0.943,
17Since sentiment is 3-valued instead of binary, it could more likely
result in higher rating variance.
18We ensured that the tweets were translated by native speakers.
Figure 3: Hour by hour normalized tweet activity volume across the days after
the Beirut attacks (left) and Paris attacks (right). Best seen in color.
p<0.001; φc=0.918). We see that for tweet activity volume,
Western and Arab media are engaged at approximately similar
time points, which supports the fairness of our collected data
on Western and Arab media across these two attacks.
News Media Sympathy Bias
Understanding Sympathy and Sentiment
The percentage level distributions for sympathy and sentiment
are shown in Fig. 4. As previous work showed sentiment alone
may not be enough to capture subtleties, especially in crisis
data [44, 50, 57], we needed to build on this prior work and
explore whether sentiment may be a useful construct in our
analysis. To understand the relationship between sentiment
and sympathy, we developed a binomial logistic regression
model, since the categorical variable sympathy to predict is
binary. We report our results in Table 4. We did this to delve
deeper into the relationship between these two variables. No
multicollinearity effects were found. Our regression model
(Eq. 1) is as follows:
(cid:19)
(cid:18) pSymp
1− pSymp
logit(pSymp) = log
= β0 + β1Si
(1)
where: pSymp is the probability that a tweet is sympathetic,
given the predictor sentiment (Si). pSymp ranges between 0
and 1, so pSymp ∈ {0, . . . ,1}. β0 is the intercept from the
linear regression equation (the value of the criterion when the
predictor is equal to zero). β1Si is the regression coefficient
multiplied by our sentiment predictor.
We first present the goodness of fit of our model and how it
fares against the (intercept) null model (Table 4). Compared to
the null model, our model provides considerable explanatory
power with significant reduction in deviance. However, while
the difference may be statistically significant, the difference
between model deviances do not differ much, as is evident
by the goodness of fit McFadden R2, which is 0.2. Testing
our sentiment19 model against the null model yields signif-
icant results (χ2(1, N=2,390) = 2425.7, p<0.001). To test
out the performance of our model, we used 80% of our data
for training purposes and parameter tuning and the remaining
20% were held out for testing. For training, we used k-fold
(k=10) cross-validation given the small dataset size (N=2,390).
Next we report our results on the 20% held-out test dataset.
19Sentiment is split between neutral and positive in our models due to
dummy variable coding for non-binary categorical variables.
01234512th00:0013th00:0014th00:0015th00:0016th00:00TimeNews Tweet Activity (%)Coverage of Beirut attacks:WesternArabρ = 0.6080123413th00:0014th00:0015th00:0016th00:0017th00:00TimeNews Tweet Activity (%)Coverage of Paris attacks:WesternArabρ = 0.943Characterizing Sympathy
Model
Coefficient (Standard error)
-1.0*** (0.07)
2.38*** (0.15)
-0.79*** (0.07)
0.2
2453.6
2453.6
Variable
SentimentNEUT
SentimentPOS
Intercept
McFadden's R2
Deviance
AIC
*p<.05, **p<.01, ***p<.001
Table 4: Logistic regression model examining sentiment factor associated
with tweet sympathy.
of a sentence to corresponding word2vec embeddings; con-
volutional layer that applies filters over sliding windows of
words and extracts a feature through max-pooling; final layer
performs dropout regularization [55] and classifies the result
using softmax (see [29] for more details of the model).
Since we pre-trained embeddings on our entire corpus, it
makes binary classification easier to fit on smaller data. Also,
complexity of conventional models (logit regression, SVM)
is not low for NLP tasks: n-grams easily make the feature
space very large. They often require language specific pre-
processing and feature selection techniques, which increases
complexity since we deal with multiple languages. Instead,
such problems (e.g., capturing local context [21]) are dealt
with by the CNN model itself, increasing clarity and method
replicability. The word2vec embeddings were pre-trained for
each language [41]. Given a text corpus, word2vec learns a
lower-dimensional vector (100 dimensions in our experiment)
representation of words that preserves the semantic distance
between them. As we deal with tweets for a particular topic,
we used the entire set of collected tweets for training the em-
beddings instead of using an available general corpus. Since
we pre-train on our entire corpus, it makes binary classification
easier to fit on smaller data. Also, complexity of conventional
models (e.g., SVMs) is not low for NLP tasks: n-grams easily
make the feature space very large. Especially since we deal
with multiple languages. Instead, such problems (e.g., captur-
ing local context [21]) are dealt with by the CNN model itself,
increasing clarity and method replicability.
We briefly describe the configuration of the model (the details
can be found in the TensorFlow implementation we used [7]).
The model is trained through stochastic gradient descent with
the Adadelta update rule [63]. It trains for 100 epochs using
shuffled mini-batches of 64 instances. Three different filter
sizes (3, 4, and 5 words) were used for convolution, and 128
filters were made for each size. Dropout rate was set to .5. For
evaluation of the approach, we ran 10-fold cross validation
(Table 5). We chose balanced accuracy21 to account for class
imbalances in our data, and report the precision and recall
for each class. Overall, the weighted average of the balanced
accuracies across languages was 72.5% (shown in Table 5).
(a) Sympathy
(b) Sentiment
Figure 4: Factor level distributions for Arab media coverage of Paris attacks
(AFR), Western media coverage of Paris attacks (WFR), Arab media coverage
of Beirut attacks (ALB), Western media coverage of Beirut attacks (WLB).
Accuracy of our model is 79% (Precision = 0.79, Recall =
0.41, F-1 = 0.54), which highlights that sentiment appears to
have sufficient power for predicting sympathy. Nevertheless,
while sentiment is important, from our data it is also clear that
is different from sympathy.
To better understand the relationship between sympathy and
sentiment, we further tested correlations20 between them.
There was a strong positive correlation between sentiment
and sympathy (Spearman (ρ) = 0.19, p<.001; Cramer's V (φc)
= 0.49), indicating we are likely measuring closely related con-
cepts. These results support our regression model coefficients.
Given the results of of both our regression modeling and corre-
lation analyses, we find that sympathy as a concept is related to
sentiment. Since our crowd sourcing results analysis revealed
that they are more or less capture similar signals, we chose to
focus on sympathy. Below, we present our approach to predict
sympathy from the tweet text, where we investigate sympathy
classification performance on unseen (i.e., unlabeled) data.
Classifying News Media Sympathy
The crowdsourced annotation task was not able to cover the
entire corpus due to practical constraints (e.g., the cost and
availability of workers). To generalize the analysis to unla-
beled data, we also developed machine learning models that
recognize the sympathy of tweets. The learning task was de-
signed as a binary classification problem where a model aims
to classify if a given tweet is sympathetic or unsympathetic.
A classification model was built for each language, and each
model was trained using the data annotated through crowd-
sourcing and applied to the rest. For the classification model,
we adopted a convolutional neural network (CNN) combined
with word2vec embeddings (cf., [29]). This work extended the
recent successful applications of deep learning models in NLP
tasks to sentence classification and showed the model achieves
high performance even with a very simple architecture (i.e.,
one convolutional layer) and little tuning, which keeps pa-
rameter count low and reduces needed training samples. This
CNN architecture has a single channel (word2vec embeddings)
and three layers: the embedding layer which translates words
20We use Spearman's rho in addition to Cramer's V (since our data is
not normally distributed) by making an assumption that our dichoto-
mous variables exhibit a monotonic relationship, and therefore can be
treated as ordinal variables. Moreover, Cramer's V is symmetric, and
does not show negative relationships (i.e., no correlation direction).
News Media Sympathy Analysis
Since our sympathy labels are not normally distributed, we ran
Mann-Whitney U tests to compare the difference in sympathy
21Arithmetic mean of class-specific accuracies.
0%25%50%75%100%AFRWFRALBWLBMedia CoverageSympathy Factor Level Distribution (%)UnsympatheticSympathetic0%25%50%75%100%AFRWFRALBWLBMedia CoverageSentiment Factor Level Distribution (%)NegativeNeutralPositiveOverall balanced accuracy: 0.725
EN balanced accuracy: 0.762
Unsympathetic
Sympathetic
0.643
0.568
AR balanced accuracy: 0.699
Unsympathetic
0.8882
0.911
Sympathetic
0.65
0.381
FR balanced accuracy: 0.812
Unsympathetic
0.748
0.846
Sympathetic
DE balanced accuracy: 0.501
Unsympathetic
Sympathetic
0.783
0.32
0.867
0.811
0.841
0.964
0.135
0.208
Precision
Recall
Precision
Recall
Precision
Recall
Precision
Recall
Table 5: Balanced accuracies (Sympathetic, Unsympathetic) for unlabeled
news media tweets (N=5,378) across each language.
between Arab and Western media for each of the datasets on
the Paris and Beirut attacks. We found a statistically signifi-
cant difference in sympathy scores between Western and Arab
media in coverage of the Beirut attacks (Z=5.146, p<0.001,
r=0.22), as well as between Western and Arab media in cover-
age of the Paris attacks (Z=4.151 p<0.01, r=0.09). To ensure
that the effects we observe are not due to imbalances in the
size of the compared datasets, we down-sampled all datasets
to the minimum dataset size, namely Western media reporting
of Beirut (N=112). We used random downsampling with-
out replacement to align each pair of datasets, and to ensure
any downsampling biases are removed, we tested differences
(Mann-Whitney U tests) in sympathy scores across 1000 sam-
pling runs (seeds)22 To combine probabilities, we used Fisher's
method23 [17, 31] shown in Eq. 2 below:
− 2
k
∑
i=1
log(pi) ∼ x2
2k
(2)
where pi is the p-value for the ith hypothesis test and k is
number of sampling runs. When the p-values tend to be small,
the test statistic X 2 will be large, which suggests that the null
hypotheses are not true for every test. Here again, we found a
statistically significant differences in sympathy scores between
Western and Arab media coverage of the Beirut attacks (χ2(1,
N=2,000) = 22467.62, p<0.001) as well as coverage of the
Paris attacks (χ2(1, N=2,000) = 19458.9, p<0.001).
Table 6 presents CNN-based classification results of the un-
labeled data, showing the ratio of sympathetic tweets. For
Western media coverage of the Beirut attacks, we had very few
unlabeled tweets (N=1). Thus we instead report the ratio from
the labeled (ground truth) data. The findings described above
were consistently observed in the results. Western media had
less sympathetic tweets than Arab media in coverage of the
Beirut attacks, and the difference in the amount of sympathetic
tweets is larger than that for the Paris attacks. Another way
22Since p-value combination under Fisher's method follows a X 2-
square distribution, we needed a minimum of 220 runs to achieve
0,95 power and 0.3 effect size under α=0.05.
23This is a common method used for aggregating probabilities, how-
ever we tested other methods (e.g., voting) and results did not differ.
Arab
Western
Paris
0.609 (N=708)
0.215 (N=4270)
Beirut
0.976 (N=338)
0.152† (N=112)
†Value drawn from labeled (ground truth) data.
Table 6: Ratio of sympathetic tweets.
to view this is that each media coverage (Arab, Western) was
overall more sympathetic towards the country affected in their
respective region. Western media was more sympathetic to-
wards Paris, while Arab media was more sympathetic towards
Beirut. This aligns with prior work showing strong region-
alism in news geography [33] and with producer-consumer
attention asymmetries across countries [1].
Sympathy and Sentiment in Tweet Propagation
Finally, we tested whether news sympathy has network effects,
specifically whether sympathetic tweets result in higher infor-
mation propagation. Given prior work on what makes online
content go viral (cf., emotionality and positivity in Berger
et al.'s work [4]), we expected sympathy and positive senti-
ment to be good indicators. Therefore, we tested sympathy
as well as sentiment. Combining all (crowdsourced labeled)
data together, we tested whether sympathy labels were cor-
related with retweet count. We found a weak yet significant
negative correlation (Spearman (ρ) =-0.06, p<0.05). Given
the low correlation, we cannot state that such sympathetic
tweets would result in higher information propagation. We
further tested whether sentiment correlates with tweet spread,
however we did not find a significant effect (Spearman (ρ)
=0.011, p=5.78). While these findings may be in contrast to
what Hanson et al. [24] and to what Berger et al. [4] found,
where neither sympathy nor sentiment increased virality, this
could be due to hidden factors such as the timeliness and
informativeness of the crisis news tweets in our dataset.
What is interesting to observe here is that while retweeting
behavior appears to be impartial as to whether a tweet is sym-
pathetic or not, it does appear (within our dataset) that this
similarly applies to sentiment labels, which is in contrast to
Berger et al.'s findings that emotionality enhances virality.
This is likely attributed to changing user information needs in
the days following an attack (e.g., retweeting cries for help).
DISCUSSION
Foreign News Coverage Differences
Examining differences in foreign news coverage is important
as the media has the power to shape the public perception about
foreign countries [58]. Not just selection, but how a piece of
news is reported has the capacity to evoke compassion, which
could lead to various charitable acts, such as fund-raising to
provide monetary support [32]. When an unexpected crisis
such as a terror attack on Beirut or Paris strikes, with quality
coverage, it has the power to instigate collective worldwide
public action. The unique context of our study, marked by
the rare successive occurrences of two crisis events at places
within the Western and Arab world, allows exploring the rel-
ative differences specific to those two worlds. We believe
looking into this closely is especially important in this era as
tensions between those two worlds intensify in various regions
and the need to deepen mutual understanding increases.
As mentioned earlier, the issue of differential coverage was
picked up by media and speculations were made that the Beirut
attacks received less attention than Paris. Our analysis sup-
ports the speculation that at least on Twitter, indeed there were
less coverage of Beirut (RQ1). It may be obvious that the
Paris attacks were more newsworthy than the Beirut attacks;
this is what news flow theory would predict [51, 60], since
Paris fulfills the criteria of a familiar, powerful foreign coun-
try, close geographically to other European states, and had an
unexpected, human-induced crisis occur. This is also what the
newsworthiness theory by Galtung and Holmboe [18] would
predict, as newsworthiness depends on factors such as fre-
quency, intensity, unambiguity, and unexpectedness. Although
such theories offer explanations about coverage bias, one can
draw different opinions about the news value considering the
contemporary context of the two worlds (e.g., perhaps Arab
states have heightened empathy towards other Arab states),
and we believe our study provides one possible way of framing
the discussion; how the media of two worlds allocated atten-
tion to the event abroad in relation to the domestic event. This
framing can be further extended to coverage of other events
and other countries, opening a space for future work.
While our main finding was that the media of both worlds
produced less amount of sympathetic coverage for a crisis
abroad (RQ2), an additional observation was that Arab media
coverage was more sympathetic, even though we expected
that Western media would be more sympathetic when cover-
ing Paris. We interpret this result interesting as it could be
capturing cultural differences in journalism practice [12, 23].
We believe it is important to understand and consider cultural
differences as it can enable more sophisticated analyses of bi-
ases in the media of different cultural regions. This result also
suggests the possibility of approaching cultural differences in
journalism practice using advanced computational methods.
As we applied a deep learning technique to detect sympathetic
tweets, we provide an initial step towards further large-scale
quantitative analysis techniques that can shed light on captur-
ing such cultural differences. As an example, while we did not
observe differences in how sympathetic news tweets spread
by Twitter users (RQ3), we found that the best predictor of
retweeting activity is the number of followers (Spearman (ρ) =
0.76, p<0.001). While this fits our intuitions and understand-
ing of how Twitter works [8], it invites further thought on how
network effects manifest across content and global events.
Relatedly, as platforms such as Twitter are widely used for
journalism at a global scale, our work also invites the devel-
opment of tools or design features to support reflections on
the newsworthiness of international events. For example, a
dynamic dashboard to track foreign news topics covered in
the media of different countries. From an end-user perspec-
tive, our work furthermore contributes a first step towards an
approach that can be implemented as a Twitter feature that
automatically detects not just sentiment, but also sympathy.
By accounting for time-criticality in news reporting during
crisis situations, this can can aid journalistic practice in situ,
by automatically detecting sympathy in Twitter text as news re-
porters rush to formulate event-specific content. Finally, while
we did not test this, it is relevant to investigate whether/how
English and non-English language media differ in reporting.
Limitations
We have analyzed a snapshot of Twitter data after the Beirut
and Paris attacks, where we made several decisions in how
we treated the data. Also, it was not viable to test whether
news sympathy differed across all countries in the Western
world, and compare with news coverage of all Arab countries.
Instead, we focused on geographic regions that made sense to
test in the context of these attacks, and in this regard, our work
provides an approximation of the differences in news coverage
across Western and Arab media. Furthermore, our hashtags
for the Beirut dataset were written in Latin alphabet. However,
we were able to collect a sufficient number of tweets to run
our analyses, where 62.1% of Arab media tweets in our final
Beirut dataset consisted of Arabic tweets.
A potential limiting factor is the 'hostile media effect' [47],
a perceptual theory of mass communication that refers to the
tendency for individuals with strong preexisting attitudes on an
issue to perceive neutral media coverage as biased against their
perspective, and instead adopt the antagonists' point of view.
This phenomenon could have surfaced in crowdworkers, where
workers from one country could have held biases when rating
tweets. This may be amplified since we did not conceal names
of news accounts (which we did to ensure tweets were close
to real-world conditions). However, since each tweet received
at least three trusted judgments, we have confidence that our
annotations are likely to be untainted by such a bias. One way
to address this is to survey crowdworkers for demographics
and political orientation (cf., [39]). Finally, we looked only
at Twitter, which is shown to contain network biases [22].
Nevertheless, the large quantity of tweets and prevalence of
reactions on this divided issue of Arab versus Western news
coverage provided an initial step to test our approach.
CONCLUSION AND FUTURE WORK
We presented a data-driven approach to tease out differences
between Western and Arab Twitter news reporting of the 2015
Paris and Beirut attacks, where we found evidence for differen-
tial coverage across the attacks. For sympathy bias, we found
that Western media tweets were less sympathetic when cover-
ing the Beirut attacks, however Western media was overall less
sympathetic than Arab media, even for Paris. Finally, based on
our labeled data, we trained a deep CNN to predict sympathy
from unlabeled data, and results further supported our ground
truth analysis that Western media had less sympathetic tweets
than the Arab media, across both attacks. As a more general
framework, our work contributes to an understanding of media
bias on Twitter, and factors that may influence it, which are
not necessarily limited to the studied attacks. We believe the
methods we adopted are more widely applicable to other areas
of computational journalism, and can serve as useful tools to
better understand, expose, and design around media bias.
ACKNOWLEDGMENTS
This research was supported in part by the Volkswagen Foun-
dation through a Lichtenberg Professorship.
REFERENCES
1. Sofiane Abbar, Jisun An, Haewoon Kwak, Yacine
Messaoui, and Javier Borge-Holthoefer. 2015.
Consumers and Suppliers: Attention asymmetries. A
Case Study of Aljazeera's News Coverage and
Comments. In Computation+Journalism Symposium
2015. http://cj2015.brown.columbia.edu/papers/
consumers-and-suppliers.pdf
2. Jisun An, Haewoon Kwak, Yelena Mejova, Sonia Alonso
Saenz De Oger, and Braulio Gomez Fortes. 2016. Are
You Charlie or Ahmed? Cultural Pluralism in Charlie
Hebdo Response on Twitter. In Proc. ICWSM '16. 2–11.
http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/
view/12997
3. David P. Baron. 2006. Persistent media bias. Journal of
Public Economics 90, 1-2 (January 2006), 1–36. https:
//ideas.repec.org/a/eee/pubeco/v90y2006i1-2p1-36.html
4. Jonah Berger and Katherine L. Milkman. 2012. What
Makes Online Content Viral? Journal of Marketing
Research 49, 2 (2012), 192–205. DOI:
http://dx.doi.org/10.1509/jmr.10.0353
5. Shane Bergsma, Paul McNamee, Mossaab Bagdouri,
Clayton Fink, and Theresa Wilson. 2012. Language
identification for creating language-specific twitter
collections. In Proc. LSM '12. ACL, 65–74.
6. Javier Borge-Holthoefer, Walid Magdy, Kareem Darwish,
and Ingmar Weber. 2015. Content and Network
Dynamics Behind Egyptian Political Polarization on
Twitter. In Proc. CSCW '15. ACM Press, 700–711. DOI:
http://dx.doi.org/10.1145/2675133.2675163
7. D. Britz. 2015. Implementing a CNN for Text
Classification in Tensorflow. (2015). https:
//github.com/dennybritz/cnn-text-classification-tf
8. Meeyoung Cha, Hamed Haddadi, Fabrício Benevenuto,
and Krishna P. Gummadi. 2010. Measuring user influence
in Twitter: The million follower fallacy. In Proc. ICWSM
'10. http://twitter.mpi-sws.org/icwsm2010_fallacy.pdf
9. D D'Alessio and M Allen. 2000. Media bias in
presidential elections: a meta-analysis. Journal of Comm.
50, 4 (2000), 133–156.
http://dx.doi.org/10.1111/j.1460-2466.2000.tb02866.x
10. Alexander Dallmann, Florian Lemmerich, Daniel Zoller,
and Andreas Hotho. 2015. Media Bias in German Online
Newspapers. In Proc. HT '15. ACM, New York, NY,
USA, 133–137. DOI:
http://dx.doi.org/10.1145/2700171.2791057
11. Jean Decety and Thierry Chaminade. 2003. Neural
correlates of feeling sympathy. Neuropsychologia 41, 2
(2003), 127 – 138. DOI:http://dx.doi.org/https:
//doi.org/10.1016/S0028-3932(02)00143-4 The cognitive
neuroscience of social behavior.
12. Mark Deuze. 2002. National news cultures: A
comparison of Dutch, German, British, Australian, and
US journalists. Journalism & Mass Communication
Quarterly 79, 1 (2002), 134–149.
13. Nicholas Diakopoulos, Munmun De Choudhury, and Mor
Naaman. 2012. Finding and Assessing Social Media
Information Sources in the Context of Journalism. In
Proc. CHI '12. ACM, 2451–2460. DOI:
http://dx.doi.org/10.1145/2207676.2208409
14. Nicholas Diakopoulos and Arkaitz Zubiaga. 2014.
Newsworthiness and Network Gatekeeping on Twitter:
The Role of Social Deviance.. In ICWSM '14. AAAI.
http://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/
view/8065
15. Nicholas A. Diakopoulos and David A. Shamma. 2010.
Characterizing Debate Performance via Aggregated
Twitter Sentiment. In Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems
(CHI '10). ACM, New York, NY, USA, 1195–1198. DOI:
http://dx.doi.org/10.1145/1753326.1753504
16. Júlio Cesar dos Reis, Fabrício Benevenuto, Pedro Olmo
S. Vaz de Melo, Raquel O. Prates, Haewoon Kwak, and
Jisun An. 2015. Breaking the News: First Impressions
Matter on Online News., In Proc. ICWSM '15. CoRR
(2015). http://arxiv.org/abs/1503.07921
17. R.A. Fisher. 1925. Statistical methods for research
workers. Edinburgh Oliver & Boyd.
18. Johan Galtung and Mari Holmboe Ruge. 1965. The
Structure of Foreign News: The Presentation of the
Congo, Cuba and Cyprus Crises in Four Norwegian
Newspapers. Journal of Peace Research 2, 1 (1965),
64–90. DOI:
http://dx.doi.org/10.1177/002234336500200104
19. C.J. Glynn, S. Herbst, G.J. O'Keefe, and R.Y. Shapiro.
2004. Public Opinion. Westview Press.
https://books.google.de/books?id=b3OqBAAAQBAJ
20. Jennifer Golbeck and Derek Hansen. 2011. Computing
Political Preference Among Twitter Followers. In Proc.
CHI '11. ACM, 1105–1108. DOI:
http://dx.doi.org/10.1145/1978942.1979106
21. Yoav Goldberg. 2015. A Primer on Neural Network
Models for Natural Language Processing. CoRR
abs/1510.00726 (2015). http://arxiv.org/abs/1510.00726
22. Sandra González-Bailón, Ning Wang, Alejandro Rivero,
Javier Borge-Holthoefer, and Yamir Moreno. 2014.
Assessing the bias in samples of large online networks.
Soc. Net. 38 (2014), 16–27.
23. Thomas Hanitzsch, Folker Hanusch, Claudia Mellado,
Maria Anikina, Rosa Berganza, Incilay Cangoz, Mihai
Coman, Basyouni Hamada, María Elena Hernández,
Christopher D Karadjov, and others. 2011. Mapping
journalism cultures across nations: A comparative study
of 18 countries. Journalism Studies 12, 3 (2011),
273–293.
24. Lars Kai Hansen, Adam Arvidsson, Finn Aarup Nielsen,
Elanor Colleoni, and Michael Etter. 2011. Good Friends,
Bad News - Affect and Virality in Twitter. Springer Berlin
Heidelberg, 34–43. DOI:
http://dx.doi.org/10.1007/978-3-642-22309-9_5
25. E.S. Herman and N. Chomsky. 1988. Manufacturing
consent: the political economy of the mass media.
Pantheon Books.
https://books.google.de/books?id=Up5sAAAAIAAJ
26. Isaac Johnson, Connor McMahon, Johannes Schöning,
and Brent Hecht. 2017. The Effect of Population and
"Structural" Biases on Social Media-based Algorithms: A
Case Study in Geolocation Inference Across the
Urban-Rural Spectrum. In Proc. CHI '17. ACM,
1167–1178. DOI:
http://dx.doi.org/10.1145/3025453.3026015
27. Isaac L. Johnson, Subhasree Sengupta, Johannes
Schöning, and Brent Hecht. 2016. The Geography and
Importance of Localness in Geotagged Social Media. In
Proc. CHI '16. ACM, 515–526. DOI:
http://dx.doi.org/10.1145/2858036.2858122
28. Ankit Kariryaa, Isaac Johnson, Brent Hecht, and
Johannes Schöning. 2018. Defining and Predicting the
Localness of Volunteered Geographic Information using
Ground Truth Data. In Proc. CHI '18. ACM.
http://doi.acm.org/10.1145/3173574.3173839
29. Yoon Kim. 2014. Convolutional Neural Networks for
Sentence Classification. In Proc. EMNLP '14, Alessandro
Moschitti, Bo Pang, and Walter Daelemans (Eds.). ACL,
1746–1751.
http://aclweb.org/anthology/D/D14/D14-1181.pdf
30. Yonghwan Kim, Youngju Kim, Joong Suk Lee, Jeyoung
Oh, and Na Yeon Lee. 2015. Tweeting the public:
journalists' Twitter use, attitudes toward the public's
tweets, and the relationship with the public. Information,
Communication & Society 18, 4 (2015), 443–458. DOI:
http://dx.doi.org/10.1080/1369118X.2014.967267
31. James T Kost and Michael P McDermott. 2002.
Combining dependent P-values. Statistics & Probability
Letters 60, 2 (2002), 183 – 190.
32. Haewoon Kwak and Jisun An. 2014a. SocInfo. Springer,
Chapter A First Look at Global News Coverage of
Disasters by Using the GDELT Dataset, 300–308. DOI:
http://dx.doi.org/10.1007/978-3-319-13734-6_22
33. Haewoon Kwak and Jisun An. 2014b. Understanding
News Geography and Major Determinants of Global
News Coverage of Disasters. CoRR abs/1410.3710
(2014). http://arxiv.org/abs/1410.3710
34. V. I. Levenshtein. 1966. Binary codes capable of
correcting deletions, insertions and reversals. Soviet Phys.
Doklady. 10, 8 (Feb. 1966), 707–710.
35. Lin, Yu-Ru and Margolin, Drew. 2014. The ripple of fear,
sympathy and solidarity during the Boston bombings.
EPJ Data Sci. 3, 1 (2014), 31. DOI:
http://dx.doi.org/10.1140/epjds/s13688-014-0031-z
36. Gilad Lotan, Erhardt Graeff, Mike Ananny, Devin
Gaffney, Ian Pearce, and danah boyd. 2011. The Arab
Spring The Revolutions Were Tweeted: Information
Flows during the 2011 Tunisian and Egyptian
Revolutions. International Journal of Communication 5,
0 (2011).
http://ijoc.org/index.php/ijoc/article/view/1246
37. Marco Lui and Timothy Baldwin. 2012. Langid.Py: An
Off-the-shelf Language Identification Tool. In Proc. ACL
'12 System Demonstrations. ACL, Stroudsburg, PA, USA,
25–30.
http://dl.acm.org/citation.cfm?id=2390470.2390475
38. Walid Magdy, Kareem Darwish, Norah Abokhodair,
Afshin Rahimi, and Timothy Baldwin. 2016.
#ISISisNotIslam or #DeportAllMuslims?: Predicting
Unspoken Views. In Proc. WebSci '16. ACM, New York,
NY, USA, 95–106. DOI:
http://dx.doi.org/10.1145/2908131.2908150
39. Winter Mason and Siddharth Suri. 2012. Conducting
behavioral research on Amazon's Mechanical Turk.
Behavior Research Methods 44, 1 (2012), 1–23. DOI:
http://dx.doi.org/10.3758/s13428-011-0124-6
40. Yelena Mejova, Amy X. Zhang, Nicholas Diakopoulos,
and Carlos Castillo. 2014. Controversy and sentiment in
online news. Symposium on Computation and Journalism
(2014). https://arxiv.org/abs/1409.8152
41. Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey
Dean. 2013. Efficient Estimation of Word
Representations in Vector Space. ICLR (2013).
https://arxiv.org/abs/1301.3781
42. Soo Jung Moon and Patrick Hadley. 2014. Routinizing a
New Technology in the Newsroom: Twitter as a News
Source in Mainstream Media. Journal of Broadcasting &
Electronic Media 58, 2 (2014), 289–305. DOI:
http://dx.doi.org/10.1080/08838151.2014.906435
43. Jonathan Scott Morgan, Cliff Lampe, and
Muhammad Zubair Shafiq. 2013. Is News Sharing on
Twitter Ideologically Biased?. In Proc. CSCW '13. ACM,
New York, NY, USA, 887–896. DOI:
http://dx.doi.org/10.1145/2441776.2441877
44. Alexandra Olteanu, Sarah Vieweg, and Carlos Castillo.
2015. What to Expect When the Unexpected Happens:
Social Media Communications Across Crises. In Proc.
CSCW '15. ACM, New York, NY, USA, 994–1009. DOI:
http://dx.doi.org/10.1145/2675133.2675242
45. Bo Pang and Lillian Lee. 2008. Opinion Mining and
Sentiment Analysis. Found. Trends Inf. Retr. 2, 1-2 (Jan.
2008), 1–135. DOI:
http://dx.doi.org/10.1561/1500000011
46. Souneil Park, Seungwoo Kang, Sangyoung Chung, and
Junehwa Song. 2009. NewsCube: Delivering Multiple
Aspects of News to Mitigate Media Bias. In Proc. CHI
'09. ACM, New York, NY, USA, 443–452. DOI:
http://dx.doi.org/10.1145/1518701.1518772
47. Richard M. Perloff. 2015. A Three-Decade Retrospective
on the Hostile Media Effect. Mass Communication and
Society 18, 6 (2015), 701–729.
http://dx.doi.org/10.1080/15205436.2015.1051234
48. Vincent Price and David Tewksbury. 1997. News values
and public opinion: A theoretical account of media
priming and framing. Progress in communication
sciences (1997), 173–212.
49. Diego Saez-Trumper, Carlos Castillo, and Mounia
Lalmas. 2013. Social media news communities:
gatekeeping, coverage, and statement bias. In Proc.
CIKM '13. ACM, 1679–1684. DOI:
http://dx.doi.org/10.1145/2505515.2505623
50. Axel Schulz, T Thanh, H Paulheim, and Immanuel
Schweizer. 2013. A fine-grained sentiment analysis
approach for detecting crisis related microposts. ISCRAM
2013 (2013). http://idl.iscram.org/files/schulz/2013/
927_Schulz_etal2013.pdf
51. Elad Segev. 2015. Visible and invisible countries: News
flow theory revised. Journalism 16, 3 (2015), 412–428.
DOI:http://dx.doi.org/10.1177/1464884914521579
52. David A. Shamma, Lyndon Kennedy, and Elizabeth F.
Churchill. 2009. Tweet the Debates: Understanding
Community Annotation of Uncollected Sources. In Proc.
WSM '09. ACM, New York, NY, USA, 3–10. DOI:
http://dx.doi.org/10.1145/1631144.1631148
53. P.J. Shoemaker and S.D. Reese. 1996. Mediating the
Message: Theories of Influences on Mass Media Content.
Longman.
https://books.google.de/books?id=E_HtAAAAMAAJ
54. J. Singer. 2006. Journalists and News Bloggers:
Complements, Contradictions and Challenges. In Uses of
Blogs, A. Bruns and J. Jacobs (Eds.). Peter Lang, New
York, 23 – 32. http://openaccess.city.ac.uk/4024/
55. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya
Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A
Simple Way to Prevent Neural Networks from Overfitting.
Journal of Machine Learning Research 15 (2014),
1929–1958.
http://jmlr.org/papers/v15/srivastava14a.html
56. Kate Starbird and Leysia Palen. 2012. (How) will the
revolution be retweeted?: information diffusion and the
2011 Egyptian uprising. In Proc. CSCW '12. ACM, 7–16.
http://dl.acm.org/citation.cfm?id=2145212
57. Saúl Vargas, Richard Mccreadie, Craig Macdonald, and
Iadh Ounis. 2016. Comparing Overall and Targeted
Sentiments in Social Media during Crises. In Proc.
ICWSM '16. https://www.aaai.org/ocs/index.php/ICWSM/
ICWSM16/paper/view/13066
58. Wayne Wanta, Guy Golan, and Cheolhan Lee. 2004.
Agenda Setting and International News: Media Influence
on Public Perceptions of Foreign Nations. Journalism &
Mass Communication Quarterly 81, 2 (2004), 364–377.
DOI:http://dx.doi.org/10.1177/107769900408100209
59. Zhongyu Wei, Yulan He, Wei Gao, Binyang Li, Lanjun
Zhou, and Kam-fai Wong. 2013. Mainstream Media
Behavior Analysis on Twitter: A Case Study on UK
General Election. In Proc. HT '13. ACM, 174–178. DOI:
http://dx.doi.org/10.1145/2481492.2481512
60. HD Wu. 2000. Systemic determinants of international
news coverage: a comparison of 38 countries. Journal of
Comm. 50, 2 (2000), 110–130.
http://dx.doi.org/10.1111/j.1460-2466.2000.tb02844.x
61. Sevgi Yigit-Sert, Ismail Sengor Altingovde, and Özgür
Ulusoy. 2016. Towards Detecting Media Bias by
Utilizing User Comments. In Proc. WebSci '16. ACM,
New York, NY, USA, 374–375. DOI:
http://dx.doi.org/10.1145/2908131.2908186
62. Arjumand Younus, Muhammad Atif Qureshi,
Suneel Kumar Kingrani, Muhammad Saeed, Nasir
Touheed, Colm O'Riordan, and Pasi Gabriella. 2012.
Investigating Bias in Traditional Media Through Social
Media. In Proc. WWW '12 Companion. ACM, New York,
NY, USA, 643–644. DOI:
http://dx.doi.org/10.1145/2187980.2188168
63. Matthew D. Zeiler. 2012. ADADELTA: An Adaptive
Learning Rate Method. CoRR abs/1212.5701 (2012).
http://arxiv.org/abs/1212.5701
|
1612.08644 | 1 | 1612 | 2016-12-27T14:39:23 | Finding Influential Institutions in Bibliographic Information Networks | [
"cs.SI",
"cs.IR"
] | Ranking in bibliographic information networks is a widely studied problem due to its many applications such as advertisement industry, funding, search engines, etc. Most of the existing works on ranking in bibliographic information network are based on ranking of research papers and their authors. But the bibliographic information network can be used for solving other important problems as well. The KDD Cup $2016$ competition considers one such problem, which is to measure the impact of research institutions, i.e. to perform ranking of research institutions. The competition took place in three phases. In this paper, we discuss our solutions for ranking institutions in each phase. We participated under team name "anu@TASL" and our solutions achieved the average NDCG@$20$ score of $0.7483$, ranking in eleventh place in the contest. | cs.SI | cs |
Finding Influential Institutions in Bibliographic Information
Networks
Anubhav Gupta
Department of Computer Science
and Automation
Indian Institute of Science
Bangalore, India
[email protected]
M. Narasimha Murty
Department of Computer Science
and Automation
Indian Institute of Science
Bangalore, India
[email protected]
ABSTRACT
Ranking in bibliographic information networks is a widely
studied problem due to its many applications such as ad-
vertisement industry, funding, search engines, etc. Most of
the existing works on ranking in bibliographic information
network are based on ranking of research papers and their
authors. But the bibliographic information network can be
used for solving other important problems as well. The KDD
Cup 2016 competition considers one such problem, which is
to measure the impact of research institutions, i.e. to per-
form ranking of research institutions. The competition took
place in three phases. In this paper, we discuss our solutions
for ranking institutions in each phase. We participated un-
der team name "anu@TASL" and our solutions achieved the
average NDCG@20 score of 0.7483, ranking in eleventh place
in the contest.
Keywords
Ranking, Heterogeneous networks, Time-series
1.
INTRODUCTION
In recent years, ranking in information network has at-
tracted a lot of attention due to its wide applications in
search engines, advertisements, etc. Most of the work on
ranking in information networks is focused on analyzing ho-
mogeneous network [11, 8], which covers only a small part
of the large information network. This information net-
work forms very large heterogeneous networks, that are com-
posed of multiple types of objects connected by links be-
tween them. Some of the recent work [16, 13, 10] also takes
into consideration, the heterogeneous structure to perform
ranking.
Because of the importance associated with the problem
of ranking, KDD Cup 2016 is also based on this exciting
problem. The task of KDD Cup Data Mining Contest 2016
hosted by Microsoft Azure is finding influential institutions
ACM ISBN 978-1-4503-2138-9.
DOI: 10.1145/1235
in the academic network. To be exact, given any upcoming
conference such as KDD, the task is to perform ranking of
institutions based on predicting how many of their research
papers will be accepted in KDD in 2016. The contestants
were given the choice to use any publicly available dataset,
for predicting next year's top institutions. We have used Mi-
crosoft Academic Graph dataset for this purpose. We have
considered this problem as a supervised learning problem
and also used temporal information in our ranking model.
The competition took place in three phases. In each phase,
the contestants were evaluated on one conference which was
chosen from some given conferences in that phase. In this
paper, we present our solution towards solving this problem.
After each phase, we modified our model and used a differ-
ent algorithm for performing the ranking. In this paper, we
describe the algorithms used in each phase individually and
demonstrate their performance in all the three phases.
To evaluate the rankings produced by our model, the
metric NDCG (Normalized Discounted Cumulative Gain) is
used. In information retrieval, Normalized Discounted Cu-
mulative Gain [7] is a standard metric for evaluating rank-
ings. The Discounted Cumulative Gain (DCG) at position
n is calculated using the following formula:
DCG@n =
n
X
i=1
reli
log2(i + 1)
Then, NDCG at position n is defined as:
NDCG@n =
DCG@n
IDCG@n
where i is the predicted rank of an institution and reli is
its true relevance score. For a perfect ranking algorithm,
IDCG is equal to DCG producing an NDCG of 1.0. For the
calculation of true relevance scores, the number of accepted
full research papers from every institution is used.
The rest of the papers is organized as follows. Section 2
describes relevant notation and assumptions made by our
approach. Our ranking frameworks are proposed in detail
in section 3. In section 4, we perform some experiments and
discuss the results of our methods. Finally, we conclude our
work in section 5.
2. NOTATION AND ASSUMPTIONS
The competition took place in three phases. In each phase,
contestants were asked to predict ranking of institutions for
a different set of conferences. Let the number of institutions
for which we predict rankings be m.
In the competition,
Phase
Conferences
Algorithm 1: RankIns1
SIGIR, SIGMOD, SIGCOMM
Input: Bibliographic Information Network G and
conference Cb to predict rankings for
Result: Rankings of institutions corresponding to the
conference Cb
1: Initialize all w ← (cid:2) 1
20 , 2
2: Initialize max score ← 0
3: Initialize w opt ← 1
4: for k = 1 to m do
5:
20 , ..., 1(cid:3)
ry
b,k ← ranking score (fraction of papers) of institute
Ik in year y with respect to conference Cb
6: end for
for k = 1 to m do
// Use ranking scores of institutions in year
2015 to learn β's
7: for w in all w do
8:
9:
10:
11:
end for
score ← NDCG@20 score of ranking s2015
true ranking given by r2015
if score ≥ max score then
b,k + w2 · r2012
b,k + w · r2013
s2015
b,k ← r2014
b
b,k + w3 · r2011
b,k
b
, with the
max score ← score
w opt ← w
12:
13:
14:
15:
end if
16: end for
17: for k = 1 to m do
b,k ← r2015
s2016
18:
19: end for
20: Normalize s2016
b,k
21: Output s2016
b,k + w · r2014
b,k + w2 · r2013
b,k + w3 · r2012
b,k
scores so that they sum to 1
b,k as relevance scores of institutions
In our case, let Yi's denote the ranking scores of an institu-
tion in different years. We also assume that ranking score of
an institution in any year depends only on its ranking scores
in previous four years. So, ranking score of an institution in
year 2016 is given by
Y2016 = α[Y2015 +(1−α)Y2014 +(1−α)2Y2013 +(1−α)3Y2012]
Now, since α is same for all institutions given a confer-
ence, for the purpose of ranking, we only need to learn the
parameter β such that
Y2016 = Y2015 + β Y2014 + β2 Y2013 + β3 Y2012
To learn β for a conference Cb, we use the data upto year
2014 for training and find the parameter β that optimizes the
NDCG@20 score for ranking of institutions for conference Cb
in year 2015. Then, this β is used to predict the ranking of
institutions for year 2016.
The algorithm for ranking institutions is summarized in
Algorithm 1
3.2 Solution for Phase-2
In phase-2, contestants were asked to predict rankings for
the conferences KDD and ICML. The algorithms used for
ranking institutions in this phase is same as the one used in
phase-1, which is given by Algorithm 1.
3.3 Solution for Phase-3
In the third phase, contestants were asked to predict rank-
ing of institutions for the conferences FSE, MobiCom and
MM. In this section, we discuss the algorithm used in the
1
2
3
KDD, ICML
FSE, MobiCom, MM
Table 1: List of different conferences for different
phases of KDD Cup 2016
m = 741. Let us call these institutions I1, I2, ..., Im. The
list of conferences for each of these phases is given in table
1.
Following assumptions were imposed by the KDD Cup
organizers for finding the relevance of institutions:
• For any conference, all the accepted papers are equally
important. i.e. each accepted paper has equal vote.
• Whenever a research paper is authored by multiple
authors, each author is assumed to have made equal
contribution to the paper.
• If an author is affiliated with multiple institutions, each
institution has equal contribution to the paper.
3. PROPOSED METHODS
In this section, we discuss our approaches in each phase
of the competition.
3.1 Solution for Phase-1
In phase-1, contestants were asked to predict institution
rankings for SIGIR, SIGMOD and SIGCOMM. In this phase,
we tried a simple approach where we predict the rankings
score of institution for a conference based on their ranking
scores in the same conference in previous years. But here,
the ranking scores for previous years are weighted differently
for different years. Our intuition is that rank of an institu-
tion in a conference in 2016 will depend on its rank in the
same conference in year 2015 more than it depends on its
rank in year 2014 and so on.
3.1.1 Learning weights of past ranking scores
As discussed above, ranking score (fraction of research
papers) of an institution in the conference Cb in year 2016
is obtained by taking the weighted average of ranking scores
of this institution in conference Cb in years 2015, 2014, etc.
The weights for rankings scores of years 2015, 2014, etc. are
learned using Brown's simple exponential smoothing.
Brown's Simple Exponential Smoothing: Brown's sim-
ple exponential smoothing (exponentially weighted moving
average) [1, 2] is a popular technique for smoothing time
series data. This technique has the property that it doesn't
treat all the past observations equally and assigns them dif-
ferent weights, such that the most recent observation gets
more weight than 2nd most recent and 2nd most recent gets
more weight than 3rd most recent, and so on. In the simple
exponential smoothing method, forecast for a variable Y at
time t + 1 is given by
Yt+1 = α[Yt + (1 − α)Yt−1 + (1 − α)2Yt−2 + ...]
where α is called the smoothing constant and takes value in
the range [0, 1].
phase-3 of the competition -- RankIns3. This algorithm is
different from the algorithm used in previous two phases.
We are given the name of a conference, say Cb, as a query,
and our task is to predict the ranking of institutions based
on predicting how many of their research papers will be ac-
cepted in this conference in year 2016. For this purpose, we
have used the information provided by heterogeneous bib-
liographic network upto year 2015 for training the ranking
model.
3.3.1 Intuition Behind our Approach
Our ranking model is based on the intuition that rank of
the institution Ik for a conference Cb depends on ranks of
other similar institutions in conference Cb as well as on its
rank in conferences similar to Cb. Also, rank of Ik in confer-
ence Cb depends on rank of Ik in the past instances of Cb,
i.e. rank of Ik in conference Cb in 2015, 2014, etc. Therefore,
conferences and institutions are represented as feature vec-
tors as such a representation allows the similarity between
institutions and conferences, and between the institutions to
be measured in terms of cosine of their feature vectors.
The RankIns2 algorithm works as follows. The existing
problem is first transformed into a learning-to-rank problem
[9] and then learning-to-rank techniques such as RankSVM
[5], RankBoost [4], AdaRank [14] can directly be used to
solve the learning problem. To rank institutions, RankIns2
first constructs the data matrix for year 2016 and the data
matrices upto year 2015 are used to train the learning-to-
rank model. Then this learned model is used to predict
ranks of institutions for data matrix of year 2016.
3.3.2 Construction of Features Vectors
RankIns2 uses the following method in order to construct
feature vectors of institutions:
• Authors and keywords associated with papers are used
to identify the institutions.
• Instead of using individual authors, clusters of authors
are used as features. To perform the clustering of au-
thors, methods such as BAGC [15] and SI-Cluster [17]
can be used. Let the number of clusters be K. Let
these K clusters be represented by their respective cen-
ters a1, a2, ..., aK.
• For the datasets in which topic information is not avail-
able, methods such as Latent Dirichlet Allocation [3]
and Probabilistic Latent Semantic Indexing [6] can be
used to find topics of research papers.
Feature vectors for all the conferences are constructed in
the same way. Let us say, feature vector of institution Ik is
given by:
Ik =
Author Clusters
z
(cid:2)αi1 αi2
}
.
. αiK
{
T opics
z
βi1 βi2
}
.
{
. βis(cid:3)
and feature vector of conference Cb is given by:
Cb =
Author Clusters
z
(cid:2)αc1 αc2
}
.
. αcK
{
T opics
z
βc1 βc2
}
.
{
. βcs(cid:3)
Here, s is the number of distinct topics in the dataset.
Now, the feature vector of institution Ik corresponding to
conference Cb is obtained by taking the element-wise multi-
plication of their feature vectors, and is given by
Ik
Ik
(b) = Ik ⊙ Cb
(b) = (cid:2)αi1 αc1
.
. αiK αcK βi1 βc1
.
. βis βcs(cid:3)
Let these feature vectors corresponding to conference Cb
be together denoted by matrix Mb, which is defined as fol-
lows:
Mb =
(b) −−−−−→
←−−−−− I1
(b) −−−−−→
←−−−−− I2
.
.
.
(b) −−−−−→
←−−−−− Ik
k×(K+s)
So, the matrix Mb is a k × d matrix, where d = K + s.
3.3.3 Constructing Data Matrix for Year 2016
Here, we describe the procedure to find data matrix for
year 2016 corresponding to conference Cb. Since, the institu-
tions in data matrices are represented in the form of clusters
of authors and topics, the data matrix for year 2016 can be
obtained by using data matrices of past years because any
new research paper will belong to either some of the exist-
ing topics or some mixture of them, and will be written by
an author belonging to one of the ranked categories. Let us
assume that data matrix of any year depends only on the
data matrices of previous three years. So, the data matrix
of 2016 depends only on data matrices of years 2015, 2014
and 2013. Let us denote by M (y)
, data matrix for year y
corresponding to conference Cb.
b
To learn the data matrix for year 2016, we make the as-
sumption that data matrix of any year y is a linear combi-
nation of data matrices of years y − 1, y − 2 and y − 3. i.e.
data matrix of year 2016
M (2016)
b
= w1 · M 2015
b
+ w2 · M 2014
b
+ w3 · M 2013
b
(1)
where w1, w2 and w3 are the weights of data matrices for
years 2015, 2014 and 2013 respectively. Let us represent
these weights by a 3-dimensional vector w = [w1 w2 w3]T .
To learn these weights, we first learn the initial weight vector
w(0) by solving the following optimization problem using the
data upto year 2015 for training:
w(0) = arg min
w (cid:13)(cid:13)(cid:13)M 2015
b
− M 2015
b
2
F
(cid:13)(cid:13)(cid:13)
(2)
where
M 2015
b
= w1 · M 2014
b
+ w2 · M 2013
b
+ w3 · M 2012
b
To find the solution of the above equation, we introduce
some additional notation. Let n be the number of authors
in the dataset. Let us denote by R, a (n × d × 3) matrix
tensor, such that
Rij: = (cid:2)(M 2014
b
)ij (M 2013
b
)ij (M 2012
b
)ij(cid:3)
Let us define a matrix X ∈ R(md)×3 whose rows are the
tube fibers of the tensor R, as follows:
X = [R11: R12:
.
.
. Rmd:]T
Also, let
z = (cid:2)(M 2015
b
)11 (M 2015
b
)12 .
.
. (M 2015
b
)md(cid:3)T
Then, one can easily see following relationship:
(cid:13)(cid:13)(cid:13)M 2015
b
2
F
(cid:13)(cid:13)(cid:13)
Using this equality, the problem given in equation (2) re-
duces to
w(0) = arg min
w
kz − Xwk2
The above equation has a closed form solution, which is
obtained by equating the gradient of the above equation to
zero. The solution is given by:
w(0) = (X T X)−1X T z
(3)
After learning the initial weight vector w(0), the algorithm
iteratively updates this weight vector by using the data of
previous years. We use data upto years 2014, 2013, ... at
each iteration of the algorithm. At lth iteration, the fol-
lowing optimization problem is solved to update the weight
vector w = [w1 w2 w3]T :
w(l) = arg min
b
w (cid:13)(cid:13)(cid:13)M (2015−l)
+ λl (cid:13)(cid:13)(cid:13)w(l−1) − w(cid:13)(cid:13)(cid:13)
2
− M (2015−l)
b
2
F
(cid:13)(cid:13)(cid:13)
(4)
Here,
M (2015−l)
b
= w1 · M (2014−l)
b
+ w2 · M (2013−l)
b
+ w3 · M (2012−l)
b
The λl's above are the hyper-parameters, used to make
sure that recent links in the network are given more impor-
tance than past links. The second term in the above equa-
tion is a regularizer and it ensures that the updated weight
vector is not too far away from its previous value.
Again, for easy calculation, we introduce some notation.
Let us denote by S(l), a (n × d × 3) matrix tensor, such that
ij: = h(M (2014−l)
S(l)
b
)ij (M (2013−l)
b
)ij (M (2012−l)
b
)iji
Let us define the matrix Xl ∈ R(md)×3 whose rows are the
tube fibers of matrix tensor S(l), as follows:
md:iT
Xl = hS(l)
11: S(l)
. S(l)
12:
.
.
Also, let us define the vector zl as follows:
zl = h(M (2015−l)
b
)11 (M (2015−l)
b
)12 .
.
. (M (2015−l)
b
)mdiT
Then, one can observe following relationship:
(cid:13)(cid:13)(cid:13)M (2015−l)
b
2
F
(cid:13)(cid:13)(cid:13)
− M (2015−l)
b
= kzl − Xlwk2
Using the above equality, the problem given by equation
(4) reduces to
w(l) = arg min
w
kzl − Xlwk2 + λl (cid:13)(cid:13)(cid:13)w(l−1) − w(cid:13)(cid:13)(cid:13)
2
By taking the gradient of above equation and equating it
to zero, we get:
2X T (Xlw − zl) − 2λl(w(l−1) − w) = 0
− M 2015
b
= kz − Xwk2
1: Construct feature vectors for all the institutions and
Algorithm 2: RankIns2
Input: Bibliographic Information Network G and
conference Cb to predict rankings for
Result: Rankings of institutions corresponding to
conference Cb
all the conferences
2: Construct feature vectors corresponding to every
institution and conference pair
3: Create matrices M (i)
b
conference Cb
for i = 2011, 2012, ..., 2015 for
4: Create matrix X and vector z as discussed in Section
3.3.3
5: Initialize
w(0) ← (X T X)−1X T z
6: for l = 1 to u do
7:
Create matrix Xl and vector zl as discussed in
Section 3.3.3
Update the weight vector w as follows:
8:
w(l) ← (X T
l Xl + λlI)−1(X T
l zl + λlw(0))
9: end for
10: Final weight vector w∗ ← w(u)
11: Construct data matrix for year y as
M 2016
b
= w∗
1 · M 2015
b
+ w∗
2 · M 2014
b
+ w∗
3 · M 2013
b
12: Train the learning model with data upto year 2015
13: Use this model to make predictions for all the
institutions in M 2016
b
By, solving the above equation, we obtain the following
solution for w(l)
w(l) = (X T
l Xl + λlI)−1(X T
l zl + λlw(l−1))
(5)
3.3.4 Solving the learning problem
Using the weights learned above, we create the data ma-
trix of all institutions for year 2016 corresponding to con-
ference Cb as given in equation (1). Then, using the data
matrices upto year 2015 for all the conferences for training,
we treat the problem as a regression problem and predict
the scores for institutions using random forest regression
method. These scores are the predicted relevance scores of
institutions.
Algorithm 2 summarizes the working of our method. The
input to RankIns2 is a bibliographic information network G
and a conference Cb to predict rankings for. RankIns2 then
predicts the rankings of institutions corresponding to this
given conference.
4. EXPERIMENTS AND RESULTS
4.1 Dataset Description
For performing the ranking of institutions, we have used
the Microsoft Academic Graph (MAG) dataset which is a
huge dataset containing information about scientific docu-
ments from different research domains. Figure 2 shows the
schema of MAG.
Figure 1: Performance of RankIns1 and RankIns2 on validation dataset
Phase Conference NDCG@20 Algorithm
1
2
3
SIGIR
KDD
MM
0.7364464224 RankIns1
0.7815387475 RankIns1
0.7210261755 RankIns2
Table 2: Performance of RankIns1 and RankIns2 on
test dataset
where i is the predicted rank of an institution and reli is its
true relevance score. For a perfect ranking algorithm, IDCG
is equal to DCG producing an NDCG of 1.0.
4.3 Results and Discussion
To evaluate the proposed methods, one conference out of
all the given conferences was selected in each phase, to form
the test dataset. Name of the conference selected and the
results of our methods for these conferences are given in
Table 2. We also create a validation set, where we predicted
the ranks of institutions for all the conferences appearing in
the three phases in year 2015. The performance of RankIns1
and RankIns2 for each of these conferences is given in figure
1. To compare our methods, we also take one more ranking
of institutions. This ranking, called PreviousYear, ranks
an institution corresponding to a conference in year y, same
as its rank in y − 1 for this conference.
In our implementation of RankIns2, we have used u = 2
and λl = 200. The number of clusters of authors used to
create feature vectors is 500.
The results on validation set show that proposed meth-
ods RankIns1 and RankIns2 outperforms PreviousYear for
7 our of 8 conferences. From results, however, it is not clear
whether RankIns1 should be preferred over RankIns2 or not.
But RankIns1 has a clear drawback compared to RankIns2.
For the conferences where there is a sudden change in the
rankings of institutions in the current year, but rankings are
similar in previous years, rankings predicted by RankIns1
will be heavily affected by current year rankings (which
seems to be an outlier).
Data preprocessing was performed on an Intel Xeon E5-
Figure 2: Schema of Microsoft academic graph
dataset, adapted from [12]
Along with the MAG dataset, organizers of KDD Cup ad-
ditionally provided two separate files for the purpose of this
competition. These two files contain the names of institu-
tions for which we have to predict the rankings and details of
full research papers accepted in the asked conferences during
the time period 2011 - 2015.
We merged MAG dataset with the given two files and
then divided the dataset on a yearwise basis.
i.e. we cre-
ated several small heterogeneous bibliographic networks by
considering the research papers of year 2011, 2012, ..., 2015
respectively.
4.2 Evaluation
To evaluate the proposed ranking algorithms, the metric
Normalized Discounted Cumulative Gain is used:
Normalized Discounted Cumulative Gain: In infor-
mation retrieval, Normalized Discounted Cumulative Gain
(NDCG) [7] is a standard metric for evaluating rankings.
The Discounted Cumulative Gain (DCG) at position n is
calculated using the following formula:
DCG@n =
n
X
i=1
reli
log2(i + 1)
Then, NDCG at position n is defined as:
NDCG@n =
DCG@n
IDCG@n
Stanford InfoLab, 1999.
[12] A. Sinha, Z. Shen, Y. Song, H. Ma, D. Eide, B.-j. P.
Hsu, and K. Wang. An overview of microsoft academic
service (mas) and applications. In Proceedings of the
24th International Conference on World Wide Web
Companion, pages 243 -- 246. International World Wide
Web Conferences Steering Committee, 2015.
[13] Y. Sun, J. Han, P. Zhao, Z. Yin, H. Cheng, and
T. Wu. Rankclus: integrating clustering with ranking
for heterogeneous information network analysis. In
Proceedings of the 12th International Conference on
Extending Database Technology: Advances in Database
Technology, pages 565 -- 576. ACM, 2009.
[14] J. Xu and H. Li. Adarank: a boosting algorithm for
information retrieval. In SIGIR '07: Proceedings of the
30th annual international ACM SIGIR conference on
Research and development in information retrieval,
pages 391 -- 398, New York, NY, USA, 2007. ACM.
[15] Z. Xu, Y. Ke, Y. Wang, H. Cheng, and J. Cheng. A
model-based approach to attributed graph clustering.
In Proceedings of the 2012 ACM SIGMOD
international conference on management of data,
pages 505 -- 516. ACM, 2012.
[16] D. Zhou, S. A. Orshanskiy, H. Zha, and C. L. Giles.
Co-ranking authors and documents in a heterogeneous
network. In Data Mining, 2007. ICDM 2007. Seventh
IEEE International Conference on, pages 739 -- 744.
IEEE, 2007.
[17] Y. Zhou and L. Liu. Social influence based clustering
of heterogeneous information networks. In Proceedings
of the 19th ACM SIGKDD international conference on
Knowledge discovery and data mining, pages 338 -- 346.
ACM, 2013.
2640 v3 2.60 GHz (Haswell-based) machine with 128 GB
of memory. All the experiments were performed on an Intel
Core I5 4200U machine with 4GB of memory. Our codes are
written in Python 2.7.11. Our codes are all single-threaded.
5. CONCLUSION
In this paper, we have discussed the problem of rank-
ing institutions and proposed our methods RankIns1 and
RankIns2. Both RankIns1 and RankIns2 consider the rank-
ing problem as a supervised learning problem and both the
approaches consider the bibliographic data in the form of
time-series. RankIns1 predicts the ranking scores of insti-
tutions by giving weights to their ranking scores in previ-
ous years. Whereas, RankIns2 works by transforming the
problem into a learning-to-rank problem and then uses the
learning-to-rank framework to predict the rankings of insti-
tutions.
6. ACKNOWLEDGMENTS
We would like to acknowledge SIGKDD for organizing
such a challenging and inspiring competition. We also thank
Microsoft for providing the dataset and the user friendly
platform for the competition. Finally, we would like to ac-
knowledge Sharad Nandanwar of IISc for the fruitful discus-
sions we had with him.
7. REFERENCES
[1] http://people.duke.edu/ rnau/411avg.htm.
[2] https://en.wikipedia.org/wiki/exponential smoothing.
[3] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent
dirichlet allocation. the Journal of machine Learning
research, 3:993 -- 1022, 2003.
[4] Y. Freund, R. Iyer, R. E. Schapire, and Y. Singer. An
efficient boosting algorithm for combining preferences.
J. Mach. Learn. Res., 4:933 -- 969, 2003.
[5] R. Herbrich, T. Graepel, and K. Obermayer. Large
margin rank boundaries for ordinal regression. MIT
Press, Cambridge, MA, 2000.
[6] T. Hofmann. Probabilistic latent semantic indexing. In
Proceedings of the 22nd annual international ACM
SIGIR conference on Research and development in
information retrieval, pages 50 -- 57. ACM, 1999.
[7] K. Jarvelin and J. Kekalainen. Ir evaluation methods
for retrieving highly relevant documents. In
Proceedings of the 23rd annual international ACM
SIGIR conference on Research and development in
information retrieval, pages 41 -- 48. ACM, 2000.
[8] J. M. Kleinberg. Authoritative sources in a
hyperlinked environment. Journal of the ACM
(JACM), 46(5):604 -- 632, 1999.
[9] T.-Y. Liu. Learning to rank for information retrieval.
Foundations and Trends in Information Retrieval,
3(3):225 -- 331, 2009.
[10] Q. Meng and P. J. Kennedy. Discovering influential
authors in heterogeneous academic networks by a
co-ranking method. In Proceedings of the 22nd ACM
international conference on Conference on
information & knowledge management, pages
1029 -- 1036. ACM, 2013.
[11] L. Page, S. Brin, R. Motwani, and T. Winograd. The
pagerank citation ranking: bringing order to the web.
|
1309.5762 | 3 | 1309 | 2016-02-24T06:10:55 | A new hierarchical clustering algorithm to identify non-overlapping like-minded communities | [
"cs.SI",
"physics.soc-ph"
] | A network has a non-overlapping community structure if the nodes of the network can be partitioned into disjoint sets such that each node in a set is densely connected to other nodes inside the set and sparsely connected to the nodes out- side it. There are many metrics to validate the efficacy of such a structure, such as clustering coefficient, betweenness, centrality, modularity and like-mindedness. Many methods have been proposed to optimize some of these metrics, but none of these works well on the recently introduced metric like-mindedness. To solve this problem, we propose a be- havioral property based algorithm to identify communities that optimize the like-mindedness metric and compare its performance on this metric with other behavioral data based methodologies as well as community detection methods that rely only on structural data. We execute these algorithms on real-life datasets of Filmtipset and Twitter and show that our algorithm performs better than the existing algorithms with respect to the like-mindedness metric. | cs.SI | cs | A new hierarchical clustering algorithm to identify
non-overlapping like-minded communities
Talasila Sai Deepak
Indian Institute of Technology,
Guwahati
Hindol Adhya
Shyamal Kejriwal
Indian Institute of Technology,
Indian Institute of Technology,
[email protected]
[email protected]
[email protected]
Guwahati
Guwahati
6
1
0
2
b
e
F
4
2
]
I
S
.
s
c
[
3
v
2
6
7
5
.
9
0
3
1
:
v
i
X
r
a
Bhanuteja Gullapalli
Indian Institute of Technology,
Saswata Shannigrahi
Indian Institute of Technology,
Guwahati
Guwahati
[email protected]
[email protected]
ABSTRACT
A network has a non-overlapping community structure if the
nodes of the network can be partitioned into disjoint sets
such that each node in a set is densely connected to other
nodes inside the set and sparsely connected to the nodes out-
side it. There are many metrics to validate the efficacy of
such a structure, such as clustering coefficient, betweenness,
centrality, modularity and like-mindedness. Many methods
have been proposed to optimize some of these metrics, but
none of these works well on the recently introduced metric
like-mindedness. To solve this problem, we propose a be-
havioral property based algorithm to identify communities
that optimize the like-mindedness metric and compare its
performance on this metric with other behavioral data based
methodologies as well as community detection methods that
rely only on structural data. We execute these algorithms
on real-life datasets of Filmtipset and Twitter and show that
our algorithm performs better than the existing algorithms
with respect to the like-mindedness metric.
Keywords
Community detection; Social networks; Modularity; Like-
mindedness
1.
INTRODUCTION
Networks present a natural way of representing complex
systems having many components and inter-component re-
lationships. A network may represent a social, biological or
a technological system. Networks in real life display certain
properties such as the power law of degree distribution and
small world phenomenon. Another such property is the com-
munity structure, i.e., the presence of either overlapping or
non-overlapping groups of nodes having dense connections
internally. There are many algorithms in the literature for
ACM ISBN X-XXXXX-XX-X/XX/XX.
DOI: http://dx.doi.org/10.1145/0000000.0000000
finding non-overlapping communities, e.g., the hierarchical
clustering algorithms [3, 4, 17, 15], Girvan-Newman algo-
rithm [14] and Louvain method [1] for modularity maxi-
mization. Most of these algorithms exploit the structural
properties of a network, such as the existence of an edge be-
tween two particular vertices. However, there can be many
behavioral properties associated with each node in a net-
work, such as purchasing habits in transactional data, and
in the context of our experiments, movie ratings or celebrity
following by the users in an online social network. Modani
et al. [12] recently presented a method to identify an over-
lapping community structure having high like-mindedness.
Even though this method works well in practice, it does not
give a theoretical upper bound on its worst-case running
time. Moreover, the efficacy of this method has not been
evaluated with respect to structural metrics like modularity.
In this paper, we present a new algorithm Like-mindedness
Maximization which achieves a high value of the goodness
metric like-mindedness in the non-overlapping community
structure it finds. We compare this algorithm with other ex-
isting behavioral and structural data based non-overlapping
community finding algorithms and show that it outperforms
all of these on this metric on Filmtipset and Twitter data
sets. Moreover, we modify an existing structural based al-
gorithm Louvain method and supplement it with behav-
ioral data in its input to compare its performance with our
algorithm on both metrics like-mindedness and modular-
ity. We observe that our algorithm achieves higher like-
mindedness than what is obtained after this modification of
Louvain method as well. We also observe that the modular-
ity achieved by our algorithm is not significantly lower than
what is obtained by the algorithms that only use structural
properties of a graph with the objective of modularity max-
imization. The worst-case running time of our algorithm is
O(V 2 log V ), which is slower than the best-known hierar-
chical clustering algorithms only by a factor of O(log V ).
Definitions and Notations: At this point, let us intro-
duce the definitions and notations that we use in this paper.
A network is denoted by an undirected and unweighted (i.e.,
each edge having weight 1) graph G = (V, E) with vertex set
V = {1, 2, . . . , V }. Since the graph represents a social net-
work, we assume that the graph is sparse, i.e., E = O(V ).
Each vertex v ∈ V is associated with a behavioral vector Xv
of dimension d. The behavioral vector and its dimension de-
pend on the particular dataset being used. For example, the
ratings given by a user on a movie rating website (with some
default rating being given to those movies he has not rated)
can be his behavioral vector, the dimension of which is the
number of movies available for rating. A similarity met-
ric sim(u, v) is a distance measure between the vectors Xu
and Xv representing the behavior of the vertices u, v ∈ V ,
respectively. Examples of such distance measures are co-
sine similarity, Manhattan distance, Euclidean distance and
squared Euclidean distance. Throughout this paper, we use
cosine similarity Xu·Xv
kXukkXv k as the distance measure.
Let C = {C1, C2, . . . , Ck} be a partition of V , each repre-
senting a set of vertices (community) in a community struc-
ture having k non-overlapping communities.
Modularity [14] is a well-known measure to capture the
notion that a good community structure should have denser
connections inside the communities, compared to the con-
nections in-between communities. The modularity Q(C) of
the set of communities C is defined as Q(C) = Pk
i=1 (cid:0)ai − b2
i (cid:1),
where ai is the fraction of E edges with both its vertices in
the same community Ci and bi is the fraction of E edges
with at least one vertex in community Ci.
Like-mindedness [12] is a recent measure to capture the
notion that members of a good community should share
similar type of interests. The like-mindedness L(C) of the
set of communities C is defined as the average of all intra-
community vertex pair similarities. In other words,
L(C) =
1
P
u,v∈V :u≤v
δ(u, v) X
u,v∈V :u≤v
sim(u, v) · δ(u, v)
, where the boolean function δ(u, v) is 1 if and only if there
exists a community Ci ∈ C such that u, v ∈ Ci.
2. STRUCTURE BASED CLUSTERING AL-
GORITHMS
In this section,
let us briefly review the known struc-
tural property based clustering algorithms to detect non-
overlapping communities. These methods only take the struc-
tural data into account, while deciding the optimal commu-
nity structure for a given network. We evaluate these algo-
rithms against our proposed algorithm with respect to both
the metrics like-mindedness and modularity.
Algorithm 1: Girvan Newman Algorithm
Calculate edge betweenness for all edges in the
network.
while no edges remain do
Remove the edge with highest edge betweenness.
Recalculate edge betweenness for all edges affected
by the removal.
2.1 Girvan-Newman Algorithm
Girvan and Newman [8] proposed a top-down algorithm
in which they focused on edges that are the least central,
i.e., the edges belonging to E that are most "between" com-
munities. The edge betweenness of an edge e ∈ E is defined
as the sum of the weighted number (defined below) of short-
est paths passing through e. If there are k distinct shortest
paths between u and v for a pair of vertices u, v ∈ V , each
of the shortest paths connecting them is counted as 1/k. By
Algorithm 2: Louvain Method
Initialization: Assign each node to its own community.
while modularity is improved do
for each i ∈ V do
for each j ∈ neighbors(i) do
Calculate modularity gain by shifting i to
j's community.
Place i in community for which gain is maximum.
progressively removing the edge e ∈ E having the highest
edge-betweenness among all edges at the time of its removal,
one is left with the communities as connected components of
the graph. The running time of this method is O(V E2),
i.e., O(V 3) on a sparse graph.
2.2 Modularity Maximization
Given a graph, finding a partition that maximizes the
modularity is known to be an NP-hard problem [2]. As
a result, all practical algorithms for modularity maximiza-
tion employ some approximate optimization methods such
as greedy algorithm, simulated annealing or spectral opti-
mization. One such example is the Louvain method [1],
which is the most popular and fastest method for modu-
larity maximization. It is a greedy algorithm in which we
start with a community structure such that each node is its
own community. In each step, we identify if shifting a vertex
i to any of its neighbor's community leads to an increase in
modularity. If there is such an increase, we place i in the
community for which the increase is maximum. The steps
are executed till there is no further improvement possible
by shifting any vertex to any of its neighbor's communi-
ties. The running time of this method is estimated to be
O(V log V ) on sparse graphs.
The method of using modularity maximization to identify
a community structure has a few drawbacks. First, it suffers
from resolution limit [6], i.e., as the network size increases,
the ability to identify smaller communities by this method
decreases. Secondly, there may be a huge number of parti-
tions, each very different from the others, having high but
similar modularity values, all close to the absolute maximum
[9].
2.3 Modified Louvain method
As mentioned before, both Girvan-Newman algorithm and
Louvain Method only use structural properties of a graph
while detecting communities. As a result, these algorithms
may not perform well with respect to the like-mindedness
metric. Motivated by this, we present a slightly modified
version of Louvain method in which behavioral data is used
in addition to structural data to identify communities.
We start with an identical copy G′ = (V, E′) of the graph
G = (V, E). In each iteration of the Louvain method, the
idea is to shift a node from its own community to another
community to gain modularity. After the shift of a node, the
community structure changes along with its like-mindedness.
At this point, there might be pairs of nodes /∈ E′ having
equal or higher similarity than the current like-mindedness
of the community structure. In the modified Louvain Method
that we propose, we add each such pair to E′ as additional
edges. The intuition behind such addition of pairs to E′ is to
increase the like-mindedness of the community structure in
Algorithm 3: Modified Louvain method
Initialization: Assign each node to its own community.
while modularity w.r.t. G′ is improved do
for each i ∈ V ′ do
for each j ∈ neighbors(i) in G′ do
Calculate modularity gain w.r.t. G′ by
shifting i to j's community.
Place i in community for which gain is maximum.
Identify pairs of vertices /∈ E′ having similarity
greater than or equal to the like-mindedness of the
current set of communities; add such pairs to E′.
Table 1: Summary of linkage criteria commonly
used by hierarchical clustering algorithms to decide
whether to merge two communities X and Y
Linkage criteria
Formula
min{sim(u, v) : u ∈ X, v ∈ Y }
Single linkage
XY Pu∈X Pv∈Y sim(u, v)
Average linkage
Complete linkage max{sim(u, v) : u ∈ X, v ∈ Y }
1
the future iterations since such additional edges are likely to
help the placement of a node to a community having similar
nodes. However, it can be noted that the inclusion of such
additional edges might lead to a drop in modularity of the
set of communities with respect to the given network G.
3. OUR ALGORITHM: LIKE-MINDEDNESS
MAXIMIZATION
In this section, we present our algorithm to optimize like-
mindedness. Our algorithm is a bottom-up hierarchical clus-
tering approach in which one starts with having each vertex
belonging to V as its own community. In each subsequent
step, pairs of communities are merged till there is only one
cluster left. The pair of communities that gives the mini-
mum value of a pre-defined linkage criterion (defined below)
is selected for being merged in each step. In this agglom-
erative approach, we get a hierarchy of communities, often
visualized as a dendrogram.
There are a variety of hierarchical clustering algorithms
[15], [4], [3], [17] depending on two parameters: a similarity
metric between each pair of vertices and a linkage criterion.
As mentioned before, we use cosine similarity as the simi-
larity metric in this paper. The linkage-criterion defines the
similarity between a pair of communities A and B as a func-
tion of the pair-wise similarities of the members of the com-
munities. In Table 1, the three linkage criteria commonly
used by hierarchical clustering algorithms are summarized.
Note that each of these requires O(V 2) time to produce the
complete hierarchy of communities. In the following para-
graph, we give a new linkage criterion to determine the pair
of communities to be merged at any step.
Algorithm 4: Like-mindedness Maximization (LMM)
Initialization: Assign each node to its own community.
while there is more than one community do
Merge the pair of communities {Ci, Cj} having the
highest score S(Ci, Cj).
We observe from the dendograms (not shown here due
to space constraints) of hierarchical clustering algorithms
that an algorithm produces higher like-mindedness if small
clusters are merged in the early iterations in order to avoid
the creation of large heterogeneous communities. Motivated
by this fact, we design an algorithm in which we discour-
age the merging of two large communities at every itera-
tion. At every iteration, we identify the pair of communities
{Ci, Cj} with the highest score S(Ci, Cj ) =
max{Ci,Cj } +
CiCj Pu∈Ci,v∈Cj
sim(u, v). The left term is used to dis-
courage the merging of two large communities, and the right
term accounts for the average like-mindedness of the inter-
community pairs from {Ci, Cj}. A high value of the right
term ensures that the like-mindedness of the set of communi-
ties after merging is high, since Pu∈Ci,v∈Cj
sim(u, v) is the
sum of the similarities of CiCj pairs of inter-community
vertices belonging to Ci and Cj .
1
1
To implement the algorithm, we index each community by
its smallest numbered node and maintain a V × V matrix
M that stores the pointers to the scores S(Ci, Cj) of the
respective pairs of communities {Ci, Cj}. To begin with, a
max-heap H with O(V 2) nodes is created in O(V 2) time
to store the scores. When the pair of communities {Ci, Cj}
with the highest score has been identified from the heap
and merged into Ck, we need to update the heap entries
corresponding to {Ci, Ck} for all i 6= k and {Cj, Ck} for
all j 6= k. The update operation in a node requires the
respective score to be recalculated, which takes a total of
O(V 2) time over all iterations due to the fact that the
similarity of a pair of vertices is used for the score calculation
only when they belong to two different communities being
merged. Since pairs of communities are merged in O(V )
iterations, each of which requires O(V ) update operations
in a max-heap requiring O(log V ) time per operation, the
running time of the algorithm is O(V 2 log V + V 2) =
O(V 2 log V ).
4. DATASET & EXPERIMENTAL SETUP
4.1 Filmtipset
Filmtipset is Sweden's largest movie rating website,
in
which a user has the option to rate a movie on a scale of
1 to 5. Apart from this, there is a social network element of
the website where a user can follow another user in the net-
work. We have 86, 725 such following relationships between
the users. We designate two users u, v ∈ V as friends if u is
following v, and vice-versa.
To use the dataset in our experiments, we apply a couple
of filters. The first filter is applied on the number of times a
movie has been rated. Some movies are popular since they
are rated by many. We focus on the unpopular movies as
an indication of the behavior of a user in this network, since
a user is likely to know about an unpopular movie from the
activities of his friends on filmtipset. We also observe that
removing the most popular movies from being considered re-
sults in a higher ratio of the average similarity (w.r.t. rating
vectors defined below) of the pairs of friends to the average
similarity of the non-friend pairs. We denote this ratio for a
graph G as its homophily ratio H(G).
Table 3: Properties of Filmtipset dataset
Parameter
Unfiltered
Network
Filtered
Network 1 Network 2
Filtered
Number of nodes
Number of isolated nodes
Edge count (friendships)
Avg. clustering coefficient
Avg. degree
Diameter
Avg. path length
Size of giant component
91530
61211
56387
0.467
1.232
20
7.508
29.54%
Homophily ratio
Not calculated
4305
168
10940
0.434
5.082
18
5.796
90.77%
26.44
983
152
1807
0.338
3.676
16
4.817
72.94%
62.07
Table 4: Properties of Twitter dataset
Parameter
Unfiltered Network Filtered Network 1
Number of Nodes
Zero degree Nodes
Edge count
Avg. degree
40096646
17522652
232157703
11.5799
Avg. Clustering coefficient
Not Calculated
Diameter
Avg. path length
18 [10]
4.12 [10]
Size of giant component
Homophily ratio
Not Calculated
Not Calculated
5013
1
1636971
653.09
0.2063612
4
1.874073
5012
1.18
H(G) =
P
sim(u,v)
u,v∈V :(u,v)∈E
E
P
sim(u,v)
u,v∈V :(u,v) /∈E
(V
2 )−E
It can be noted that aiming for too high a homophily ratio
reduces the number of movies a lot. Since the number of
movies left is used for filtering out inactive users (see below),
a high homophily ratio implies a reduction in the number
of active users as well. Therefore, we remove movies that
are rated at least 50 times in filter 1 since it ensures a large
number of movies left after filtering. To see the results of
our experiments on networks having high homophily ratio,
we remove movies that are rated at least 5 times in filter 2.
For each of the movie filters 1 and 2, we define a user fil-
tering criterion as follows. For movie filter 1 (filter 2), we
say a user to be active if he rates at least 5 movies among
the movies left after removing all movies rated more than
50 (5, respectively) times. A user is called social if he has
at least 5 friends in the network. For each of movie filter 1
and 2, we create an induced subgraph such that each user in
this subgraph is active and social. Here, it is worth remind-
ing that movie filtering is always done before user filtering.
In Table 3, we summarize the properties of these datasets,
which we would denote by Filmtipset Filtered Networks 1
and 2 from now onwards. We also note that the Unfiltered
Network as well as the Filtered Networks follow a power law
degree distribution.
For either of Filmtipset Filtered Network 1 and 2, we con-
sider the movies in an order and each user u is assigned
a rating vector Ru, each entry of which is either the rating
given by him to that particular movie or 0 if he has not rated
it. We also create another (un)interested vector Su for each
user u, each entry of which is 1 or 0 depending on whether
a user has rated that movie or not, respectively. In order to
implement the behavioral property based community find-
ing algorithms, either Ru or Su is used as the behavioral
vector Xu of u ∈ V .
4.2 Twitter
Fimltipset
Filtered Network 1
Filtered Network 2
Filmtipset
Filtered Network 1
Filtered Network 2
LMMS LMMR
0.118
0.107
0.154
0.111
AR
SR
0.162
0.082
0.141
0.204
GN
0.738
0.627
CR
0.099
0.1
S
SS
0.101
0.143
LS
0.762
0.676
LMM
0.078
CS
AS
0.111
0.176
0.196
0.115
MLS MLR
0.593
0.582
0.611
0.614
ML
0.147
0.182
L
Table 5: Highest Modularity achieved by an algo-
rithm
Twitter
A
C
Filtered Network
0.095
0.107
0.004
Table 6: Symbols used in Figure 1, and Tables 5 and
2
Symbol
Full form
LMM/LMMS
LMM Algorithm using (un)interested vector
LMMR
L
LMM Algorithm using rating vector
Louvain method
ML/MLS
Modified Louvain method using (un)interested vector
MLR
GN
S/SS
A/AS
C/CS
SR
AR
CR
Modified Louvain method using rating vector
Girvan-Newman algorithm
Single-linkage Clustering using (un)interested vector
Average-linkage Clustering using (un)interested vector
Complete-linkage Clustering using (un)interested vector
Single-linkage Clustering using rating vector
Average-linkage Clustering using rating vector
Complete-linkage Clustering using rating vector
Twitter is one of world's largest micro-blogging website,
in which a user has an option to follow another user. We
use the publicly available dataset [10] which has the data
of about 40 million users. All the people having more than
10, 000 followers are designated as celebrities.
For our experiments, we create a friendship graph called
Twitter Filtered Network of the non-celebrity users who
have at least 5000 non-celebrity friends. In Table 4, we sum-
marize the dataset. We also note that the Twitter Filtered
Network follows a power law degree distribution.
As before, two users u and v are said to be friends if u
is following v, and vice-versa. We create a 0/1 vector Fu
(the i-th entry of which corresponds to the i-th celebrity)
for each user u ∈ V and use it as his behavioral vector Xv.
The entry in i-th position of Fu for u is 1 or 0 depending on
whether u is following the i-th celebrity or not, respectively.
5. RESULTS AND CONCLUSIONS
We execute the Girvan-Newman algorithm, Louvain method,
the single-linkage, average-linkage and complete linkage based
hierarchical clustering algorithms, LMM and Modified Lou-
vain methods on Filmtipset Filtered Networks 1 and 2. Among
these, the Girvan-Newman algorithm and the Louvain method
use only the edges of the networks. The remaining algo-
rithms are executed using the rating and the (un)interested
vectors separately. On Twitter Filtered Network, we execute
all the algorithms mentioned above, except Girvan-Newman
since the running time of this algorithm is too high on such
a large graph. Note that the Louvain and the Modified Lou-
vain methods terminate when a certain number of communi-
ties corresponding to the approximately highest modularity
score is identified. All other algorithms used in this paper
produce an hierarchy of communities, starting with V com-
munities and ending when there is only one community left,
or vice-versa.
In Figure 1, the like-mindedness and modularity scores
achieved by different algorithms are compared by plotting
their values against C, the number of communities iden-
Table 2: Comparison of running time on sparse graphs (graphs in which E = O(V ))
LMM
L (estimated) ML (estimated)
O(V 2 log V ) O(V 2) O(V 2) O(V 2) O(V 3) O(V log V ) O(V 2 log V )
A [13]
S [15]
C [4]
GN
Modularity vs. C
Modularity vs. C
Modularity vs. C
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
-0.1
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
l
y
t
i
r
a
u
d
o
M
s
s
e
n
d
e
d
n
m
-
e
k
L
i
i
LMMS
LMMR
L
MLS
MLR
GN
SS
SR
AS
AR
CS
CR
l
y
t
i
r
a
u
d
o
M
0
500
1000
1500
2000
2500
3000
3500
4000
4500
Number of communities (C)
Like-mindedness vs. C
LMMS
LMMR
L
MLS
MLR
GN
SS
SR
AS
AR
CS
CR
s
s
e
n
d
e
d
n
m
-
e
k
L
i
i
0.2
0
500
1000
1500
2000
2500
3000
3500
4000
4500
Number of communities (C)
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
-0.1
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
LMMS
LMMR
L
MLS
MLR
GN
SS
SR
AS
AR
CS
CR
0
200
400
600
800
1000
Number of communities (C)
Like-mindedness vs. C
l
y
t
i
r
a
u
d
o
M
0.2
0.18
0.16
0.14
0.12
0.1
0.08
0.06
0.04
0.02
0
-0.02
LMM
L
ML
S
A
C
0
1000
2000
3000
4000
5000
6000
Number of communities (C)
Like-mindedness vs. C
LMMS
LMMR
L
MLS
MLR
GN
SS
SR
AS
AR
CS
CR
0
200
400
600
Number of communities (C)
800
1000
s
s
e
n
d
e
d
n
m
-
e
k
L
i
i
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
LMM
L
ML
S
A
C
0
1000
2000
3000
4000
5000
6000
Number of communities (C)
Figure 1: Comparison of modularity (top row) and like-mindedness (bottom row) scores on Filmtipset Filtered
Networks 1 (left) and 2 (middle), and Twitter Filtered Network (right)
tified.
In Table 5, we tabulate the maximum modularity
achieved by the algorithms on all 3 datasets. In Table 2, we
summarize the running time of the algorithms considered in
this paper. The notations we have used in these Figures and
Tables are explained in Table 6.
The key observation from these figures and tables is that
our algorithm Like-mindedness Maximization outperforms
all other algorithms (even Modified Louvain method) on
Like-mindedness metric. We also observe from Table 5 that
it does not perform that well to obtain a community struc-
ture with high modularity. However, when the number of
identified communities is large, we observe from Figure 1
that our algorithm obtains a community structure with com-
parable (to other algorithms) modularity. The running time
of our algorithm is O(V 2 log V ), which is much faster than
the Girvan-Newman algorithm but slightly slower than other
hierarchical clustering algorithms. We also note that the
actual ratings (not just the data about whether a user has
rated a movie or not) given by Filmtipset users does not give
any significant advantage to the performance of the commu-
nity detection algorithms. This is due to the fact that the
similarity matrices of rating and (un)interested vectors of
the user pairs are quite similar, e.g., having a cosine similar-
ity of 0.9420 and 0.9062 for Filmtipset Filtered Network 1
and 2, respectively. Another interesting observation is that
all the algorithms obtain higher like-mindedness and modu-
larity scores in Filmtipset Filtered Network 2 compared to
Network 1, due to it having higher homophily ratio.
Let us conclude the paper with a few remarks on the po-
tential applications of this work. Leskovek et al. [5] showed
that community finding is important in the context of vi-
ral marketing, in which a small group of users are targeted
to promote a product in a community. Since the com-
munity structure identified by our algorithm has high like-
mindedness, it is likely that viral marketing would be more
successful among such like-minded groups of people. Also,
the non-overlapping communities identified by our algorithm
can be used as the core community structure in a network to
create overlapping communities by adding additional nodes
to each community. One drawback of our algorithm is its
running time that is not suitable for very large networks.
However, it can be used to identify the like-minded commu-
nity structure among the most active and social users of a
network, the size of which may not be very large. Finally, it
is an interesting open problem to design an algorithm that
optimizes both the metrics modularity and like-mindedness
of the identified community structure.
Acknowledgment
This work has been supported by Ramanujan Fellowship,
Department of Science and Technology, Government of In-
dia, grant number SR/S2/RJN-87/2011.
6. REFERENCES
[1] V. D. Blondel, J. L. Guillaume, R. Lambiotte and
E. Lefebvre. Fast unfolding of communities in large
networks. Journal of Statistical Mechanics: Theory
and Experiment, 10:P10008, 2008.
[2] U. Brandes, D. Delling, M. Gaertler, R. Goerke, M.
Hoefer, Z. Nikoloski and D. Wagner. Maximizing
Modularity is hard. e-print arXiv:physics/0608255,
2006.
[3] W. H. Day and H. Edelsbrunner. Efficient
Algorithms for Agglomerative Hierarchical
Clustering Methods. Journal of Classification,
Volume 1, pp. 1-24, 1984
[4] D. Defays. An Efficient Algorithm for a Complete
Linkage Method. The Computer Journal (British
Computer Society), 20 (4): 364-366, 1977.
[5] J. Leskovek, L. A. Adamic and B. A. Huberman
The Dynamics of Viral Marketing ACM
Transactions on the Web, Vol. 1, No. 1, Article 5,
2007.
[6] S. Fortunato and M. Barthelemy. Resolution Limit
in Community Detection. Proceedings of the
National Academy of Sciences 104 (1), 36-41, 2007.
[7] L. C. Freeman. A Set of Measures of Centrality
Based on Betweenness. Sociometry, 35-41, 1977.
[8] M. Girvan and M.E.J. Newman. Community
Structure in Social and Biological Networks. Proc.
National Academy of Sciences, 99(12): 7821-7826,
2002.
[9] B. H. Good, Y.-A. de Montjoye and A. Aaron.
Performance of Modularity Maximization in
Practical Contexts. Physical Review E, 046106,
2010.
[10] H. Kwak, C. Lee, H. Park and S. Moon. What is
Twitter, a Social Network or a News Media? Proc.
19th international conference on World Wide Web,
591-600, 2010.
[11] J. Leskovec, K. J. Lang and M. Mahoney.
Empirical Comparison of Algorithms for Network
Community Detection. Proc. 19th international
conference on World Wide Web, 631-640, 2010.
[12] N. Modani, R. Gupta, S. Nagar, S. Shannigrahi, S.
Goyal and K. Dey. Like-minded Communities:
Bringing the Familiarity and Similarity Together.
World Wide Web, 17 (5), 899-919, 2014.
[13] F. Murtagh. Complexities of Hierarchic Clustering
Algorithms: the State of the Art. Computational
Statistics Quarterly 1: 101-113, 1984.
[14] M.E.J. Newman and M. Girvan. Finding and
Evaluating Community Structure in Networks.
Physical review E, 69(2): 026113, 2004.
[15] R. Sibson. SLINK: an Optimally Efficient
Algorithm for the Single-link Cluster Method. The
Computer Journal (British Computer Society) 16
(1): 30-34, 1972.
[16] J. Yang and J. Leskovec. Defining and Evaluating
Network Communities Based on Ground-truth.
Proc. of the ACM SIGKDD Workshop on Mining
Data Semantics, 2012.
[17] W. Zhang, X. Wang, D. Zhao and X. Tang. Graph
Degree Linkage: Agglomerative Clustering on a
Directed Graph. Proceedings of the 12th European
Conference on Computer Vision, Florence, Italy,
428-441, 2012.
|
1810.08498 | 3 | 1810 | 2018-10-25T09:31:55 | Data-driven Analysis of Complex Networks and their Model-generated Counterparts | [
"cs.SI",
"cs.DM",
"cs.LG",
"physics.data-an",
"physics.soc-ph"
] | Data-driven analysis of complex networks has been in the focus of research for decades. An important question is to discover the relation between various network characteristics in real-world networks and how these relationships vary across network domains. A related research question is to study how well the network models can capture the observed relations between the graph metrics. In this paper, we apply statistical and machine learning techniques to answer the aforementioned questions. We study 400 real-world networks along with 2400 networks generated by five frequently used network models with previously fitted parameters to make the generated graphs as similar to the real network as possible. We find that the correlation profiles of the structural measures significantly differ across network domains and the domain can be efficiently determined using a small selection of graph metrics. The goodness-of-fit of the network models and the best performing models themselves highly depend on the domains. Using machine learning techniques, it turned out to be relatively easy to decide if a network is real or model-generated. We also investigate what structural properties make it possible to achieve a good accuracy, i.e. what features the network models cannot capture. | cs.SI | cs |
Data-driven Analysis of Complex Networks
and their Model-generated Counterparts
Marcell Nagy∗ and Roland Molontay†
MTA-BME Stochastics Research Group, Budapest, Hungary
Department of Stochastics, Budapest University of Technology and Economics, Hungary
(Dated: October 26, 2018)
Data-driven analysis of complex networks has been in the focus of research for decades. An
important question is to discover the relation between various network characteristics in real-world
networks and how these relationships vary across network domains. A related research question is
to study how well the network models can capture the observed relations between the graph metrics.
In this paper, we apply statistical and machine learning techniques to answer the aforementioned
questions. We study 400 real-world networks along with 2400 networks generated by five frequently
used network models with previously fitted parameters to make the generated graphs as similar to
the real network as possible.
We find that the correlation profiles of the structural measures significantly differ across network
domains and the domain can be efficiently determined using a small selection of graph metrics. The
goodness-of-fit of the network models and the best performing models themselves highly depend on
the domains. Using machine learning techniques, it turned out to be relatively easy to decide if a
network is real or model-generated. We also investigate what structural properties make it possible
to achieve a good accuracy, i.e. what features the network models cannot capture.
I.
INTRODUCTION
Data-based analysis of complex networks has attracted
a lot of research interest since the millennium when the
prompt evolution of information technology made the
comprehensive exploration of real networks possible. The
study of networks pervades all of science, such as Biol-
ogy (e.g. neuroscience networks), Chemistry (e.g. pro-
tein interaction networks), Physics, Information Technol-
ogy (e.g. WWW, Internet), Economics (e.g.
interbank
payments) and Social Sciences (e.g. collaboration and
acquaintance networks) [1]. Despite the fact that net-
works can originate from different domains, most of them
share a few common characteristics such as scale-free and
small-world property [2, 3], high clustering [4] and sparse-
ness [5].
Modelling real-networks is of great interest, since it
may help to understand the underlying mechanisms and
principles governing the evolution of networks, more-
over such models are mathematically tractable and al-
low for rigorous analysis. Furthermore, an appropriate
model preserves the key characteristics, yet ensures the
anonymity of the original real network [6].
Throughout the years several network models have
been proposed to gain better understanding of real-world
networks, for an extensive overview see [7], however with-
out attempting to be comprehensive the most influential
models are for example the scale-free Barab´asi-Albert
model [2], small-world Watts-Strogatz model [3], New-
man's highly clustered community structure model [4],
each of them was motivated by some of the aforemen-
tioned characteristics of real-networks.
∗ [email protected]
† [email protected]
In order to characterize the topology and capture the
structure of networks, numerous graph metrics have been
introduced such as node-level features e.g.
centrality
measures and local clustering coefficient, and global fea-
tures such assortativity coefficient and density [1]. Nat-
urally, there is significant redundancy among these mea-
sures and there is a great deal of effort in studying the
correlation between the metrics in accordance with iden-
tifying a non-redundant selection of measurements that
describes every aspect of networks [8 -- 11]. In this work,
we rely on the results of the aforecited works by using a
minimal set of graph metrics that well-describes the net-
works. Our selection of metrics is detailed in Section II 1.
The main purpose of this work is to use data-driven
techniques to analyze complex networks. The study relies
on our large dataset: we calculated a few non-redundant
metrics of 400 real networks and their 2400 modelled
counterparts generated by five network models. The real
networks are collected from different domains such as
brain, food, social, and protein interaction networks and
the source of these graphs are online network databases
[12 -- 16] (see Section II A).
For each real network, we generated an additional six
graphs by five different models with previously fitted pa-
rameters to fit the data as well as possible (see Section
II B). The five models are: clustering modification of the
Barab´asi -- Albert model [17], Watts -- Strogatz model [3],
Community Structure model [18, 19], Divergence Dupli-
cation model [20] that was aimed at modelling protein
networks and the 2K-Simple model [21], which captures
the joint-degree distribution of a graph.
In Section III we study the correlation profiles of the
structural characteristics across network domains and
identify the domain of the networks by a small number
of graph metrics. We also investigate what models gen-
erate networks that are most similar to the real ones.
Using machine learning techniques we examine if it can
be determined whether a network is real or artificially
generated and what structural properties make it possi-
ble to achieve a good accuracy.
Our paper relates to recent studies that reflect the
growing interest in the identification of network domains
and structures based on graph measurements. The most
closely related work is that of Kansuke and Clauset [22]
who utilized machine learning techniques to study the
structural diversity of 986 real networks from different
domains along with 575 graphs generated by four network
models. Canning et al. [23] used Random Forest to pre-
dict the origin (network domains and names of models)
of 402 real and 383 generated graphs, however, they used
arguably unnormalized metrics such as the total num-
ber of triangles, which is clearly correlated with the size
of the network that is a very strong distinguishing fea-
ture for classification of networks as Figure 1 illustrates.
Bonner et al.
[24] generated numerous graphs with five
well-known network models and then used Deep Learning
to classify the graphs according to their measurements.
Middendorf et al.
trained alternating decision tree to
identify the generation mechanism of protein interaction
networks [25].
In related works, the parameters of the network mod-
els are rather heuristically chosen [23, 24] or often not
detailed at all [22]. Our main contribution to the field is
that we have fitted the parameters of the models to each
real network to ensure that the generated graphs are as
similar to the original networks as possible according to
reasonably chosen metrics, detailed in Section II B. Us-
ing fitted parameters instead of arbitrarily selected ones
makes it a more reasonable research objective to study
whether the model-generated graphs are distinguishable
from real networks.
II. DATA AND METHODS
This study relies on our dataset containing graph mea-
surements of 2800 graphs. We have collected 100-100
real networks from four domains, and then for each net-
work, we generated 6 additional graphs with fitted net-
work models. In this section, we detail the composition
of our dataset and describe our method of model fitting.
1. Metrics and notations
As we have already mentioned, we aimed to describe
the networks as fully as possible using only a small num-
ber of graph metrics. Generally, we can say that there
are a few groups of metrics that measure the same as-
pects of the networks e.g. there are distance, clustering,
centrality, and density related metrics. Hence, based on
the literature [8, 11], we selected from each group of mea-
sures a few numbers of graph measurements detailed in
Table I.
TABLE I. The attributes of the dataset
2
Name
size
density
assort
avg clust
avg deg
max eigenv c Maximum of the eigenvector centralities
avg path length Average of the distances in the components,
Description
The number of nodes
The density of the graph
The assortativity coefficient
The average local clusterig coefficient
The average degree
skew deg dist
domain
category
subcategory
normalized by V − 1
Skewness of the degree distribution
The domain of the real networks:
social, food, brain, cheminformatics (chems)
Indicates whether the network is real
or generated: real or model
In case of generated graphs indicates the
type of the model as well: Real (original),
2K, CBA (Clustering Barab´asi -- Albert),
WS (Watts -- Strogatz),
DD (Duplication Divergence),
Com (Community Structure model)
Note that for the domain classification problem and
the principal component analysis we excluded the size
(i.e. number of nodes) of the networks since this vari-
able has significant predictive power itself due to the
difference between the typical network sizes of different
domains and we are more interested in the topological
properties. The average and the range of the sizes of the
collected networks are listed in Table II. Many real net-
works have heavy-tailed degree distribution, for example,
the well-known scale-free networks However, there are
also some real-world graphs with non-heavy-tailed degree
distribution e.g.
infrastructure networks [26], hence we
calculated the skewness of the degree distributions of the
graphs, to describe and quantify the tail of the degree
distributions.
While the density and the average degree both measure
the relative number of edges in the graph, it is not obvi-
ous which one should be used. Considering density, the
number of edges is normalized by the square of the size,
while in the average degree it is normalized only by the
size. The reason why we selected the average degree is
that due to the sparseness of the real networks, the num-
ber of edges rather grows linearly than quadratically with
the number of nodes, hence the density contains more
information on the size of the graph, which is a strong
distinguishing factor of the domains, and we are more in-
terested in finding distinctive topological properties. The
definitions of the metrics are detailed in Appendix A.
A. Real networks
Networks from four different domains are studied in
this paper, namely food, social, cheminformatics and
brain networks. The gathered dataset is balanced, mean-
ing that there is the same number of graphs from each
3
The fitting algorithm of the WS and the WS STD meth-
ods are as follows:
1. Naturally n is chosen to agree the size of the net-
work.
2. K is simply the average degree, i.e.:
K = 2k =
2 · E(G)
V (G)
.
3. The p rewiring parameter was chosen such that it
minimizes the difference of the average clustering
coefficient ¯C or the σdeg standard deviation of the
degree distribution of the original and the fitted
graph. Formally:
• in the first case (WS):
p = arg min
q∈[0.001,1]
¯C(G) − ¯C(WSn,K,q)
• in the second case (WS STD):
p = arg min
q∈[0.001,1]
σdeg(G) − σdeg(WSn,K,q)
Note that in the minimization we search for q > 0.001, to
avoid the degenerate case of the Watts -- Strogatz model.
2. Clustering Barab´asi -- Albert model
The Clustering Barab´asi -- Albert model [17] has three
input parameters: n number of nodes, m new edges of
a newcomer vertex and p probability of triad formation.
Obviously, the scaling of the degree distribution cannot
be tuned, but the clustering of the model depends on the
p parameter, furthermore for fixed n and m there is a
linear relationship between p and the average clustering
coefficient of the model [17], however there is no explicit
formula describing this relation. Thus, in order to find
the optimal value of p we follow an analogous approach
to the fitting of WS model.
1. Parameter n is the size of the network.
2. Parameter m is simply the number of edges divided
by the number of nodes.
3. The p triad formation parameter is chosen to min-
imize the difference of the average clustering coef-
ficient of the original and the modelled graph:
p = arg min
q∈[0,1]
¯C(G) − ¯C(CBAn,m,q)
FIG. 1. The number of nodes and edges of the real networks.
Figure was created in Tableau.
domains (4 × 100 networks).
The graphs were gathered one by one from online
databases, namely Network Repository [16], Index of
Complex Networks [12], NeuroData's Graph Database
[14], The Koblenz Network Collection [15] and Interac-
tion Web Database [13]. After importing the graphs, we
removed self-loops and treated them as undirected, un-
weighted graphs. Figure 1 shows the distribution of the
number of nodes and edges of the networks and Table II
briefly describes the network domains.
B. Model fitting
One of our goals is to study whether real-world net-
works can be distinguished from generated graphs, i.e.
to study the descriptive ability of the models.
In con-
trast to related works [22 -- 24], we fit the models to the
real networks one by one in order to obtain as similar
synthetic graphs as possible. In this section, we describe
how we fit the models to real networks. The model de-
scriptions are detailed in the Appendix B.
1. Watts -- Strogatz model
The Watts-Strogatz model [3] has two input parame-
ters: n number of nodes, K even number of neighbours
of the initial vertices, which determines the density of
the model and p rewiring probability which affects for
example the clustering coefficient and the diameter of
the graph. For each real network we set the parameters
according to two different approaches:
1. (WS) Fitting according to the average clustering
coefficient
2. (WS STD) Fitting according to the standard de-
viation of the degree distribution, motivated by a
recent work [27].
101001 00010 000Number of nodes1001 00010 000100 000Number of edgesTwitter networksFacebook networksDomainBrainChemsFoodSocialTABLE II. Network domains
Domain
Social
Food
Brain
Cheminformatics Protein-protein (enzyme) interaction networks
Description
Facebook, Twitter and collaboration networks
What-eats-what, consumer-resource networks
Human and animal connectomes
Range of network sizes
16-56K (avg: 5,824)
19-1,500 (avg: 118)
50-2,995 (avg: 946)
44-125 (avg: 55)
4
3. Duplication-Divergence model
The Duplication-Divergence model [20] has two input
parameters: n is the size of the graph and p is the proba-
bility of edge activation. It is easy to see that parameter
p affects the density of the model, hence the authors fit-
ted their models to real networks according to the density
[20]. Here we follow a similar approach as before:
1. Parameter n is the size of the network,
2. The probability parameter p is chosen to minimize
the difference between the densities of the original
and the fitted networks.
Domain
Name
Size
Social
Brain
Food
Cheminformatics Enzymes-g292[16]
Astro Physics
Jung2015[31]
Srep[32]
17,903
2,995
237
60
Number of
edges
196,972
31,551
1,744
100
TABLE III. Chosen graphs for stability analysis
the
community
For
the
community multilevel function of the igraph Python
package [29].
detection we
used
4. Community Structure model
5. 2K model
The Community Structure model [18] has the follow-
ing input parameters: L = (l1, . . . , lk) list of the sizes of
the communities and the pin, pout probabilities. We es-
timated these parameters with the help of a multi-level
modularity optimization community detection algorithm,
introduced in [28], as follows:
1. From the output of the community detection algo-
rithm we defined the subgraphs corresponding to
the communities.
2. The input list L simply contains the size of the
subgraphs.
3. Parameter pin is calculated from the density of the
subgraphs as follows:
(cid:80)
iV (Gi)(cid:0)V (Gi) − 1(cid:1) ,
(cid:80)
iE(Gi)
pin =
1
2
where Gi denotes the ith subgraph, and V (Gi) and
E(Gi) is its vertex and edge set respectively.
In
other words, pin is the total number of edges in-
side the subgraphs divided by the total number of
possible edges inside the subgraphs.
4. Parameter pout is obtained by dividing the number
of edges between different groups by the maximum
number of possible edges between different groups
of sizes L = (l1, . . . , lk). Formally:
(cid:0)V (Gi)
(cid:1)
iE(Gi)
E(G) −(cid:80)
(cid:0)V (G)
(cid:1) −(cid:80)
pout =
2
i
2
To fit the 2K model [21], we only have to calculate
the joint degree matrix of the network. We used the
joint degree graph function of the NetworkX [30] mod-
ule to generate the simple random graphs with the given
joint degree matrices.
C. Stability of the models
Since the network models generate random graphs, the
question naturally comes up: How stable are the graph
metrics of the fitted models with fixed parameters?
We have analyzed the sensitivity of the models on four
graphs of significantly different sizes, the chosen networks
are detailed in Table III. For each real network, we gen-
erated 30-30 graph instances with each model using the
previously fitted parameters. For the sensitivity analysis,
we studied the distribution of the graph measurements of
the graph instances.
As Figures 2, 7, 8 and 9 show as the size of the net-
works increases, the graph measurements of the fitted
models converge, however the variance of the metrics is
relatively small even on the small graphs. Compared to
other models, the Duplication Divergence model has sig-
nificantly larger scattering especially regarding density,
however the standard deviations are still of smaller mag-
nitude than the means.
We can conclude, that the characteristics of the fitted
models are stable enough, making it reasonable to an-
alyze the goodness-of-fit of the network models and to
perform machine learning tasks.
5
FIG. 2. Boxplots of the metrics across different models. The modelled graph is a social network with 17903 nodes. Since
the 2K model captures all the information about the joint degree distribution, it is capable of exactly fitting the assortativity,
density and the skewness of the degree distribution. Overall the models could not estimate the average clustering coefficient
well, except for the WS model that was fitted according to this metric. Clearly, the density of the models can be directly
adjusted, except for the Duplication Divergence model. The skewness of the degree distribution of the CBA and WS models is
around zero since these models are not scale-free. Generally, the DD and CBA models are the least stable.
III. RESULTS
In this section, we present a data-driven analysis of
real networks and their model-generated counterparts.
A. Correlation profiles and results of model fitting
First, we study how the relationship of the metrics
vary across different domains by looking at correlation
heatmaps, the results are shown in Figure 3.
To measure how well the network models fit the data,
relying on [33], we calculate the mean Canberra distance
between the feature vectors of graph measures (see Table
I) regarding the graphs generated by the models and the
original ones. Figure 4 shows a heatmap of the pairwise
average Canberra distances. As we expected, the graphs
generated by the 2K model turned out to be the most
similar to the real networks.
Figure 4 also shows that the Watts -- Strogatz model can
be more efficiently fitted according to the average cluster-
ing coefficient than the deviation of the degree distribu-
tion, which is slightly in contrast with [27]. Hence later
in this work, we only used the graphs that were fitted by
the clustering coefficient.
Figure 4 is also consistent with Figure 5 since it clearly
shows on a scatter plot that graphs generated by the 2K
model are the most similar to the original ones and that
the food webs are relatively easy to model.
B. Classification problems
We solve three different classification problems to gain
a better understanding of the identifiability of domains
from structural properties and about the distinguishabil-
ity of model-generated graphs from real networks. We
also aim to find the graph properties that make the dis-
tinctions possible. The problems are as follows:
1. Domain prediction: a multi-class classification of
the domains of 400 real networks based on the
graph metrics
2. Category prediction: a binary classification of the
networks to decide whether it is a real network or
a realization of a network model in each domain
2KCBAComDDWSWS_..0,00080,00100,00120,00140,00160,00180,00200,0022DensityOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,40,50,60,7Average clustering coefficientOriginal value2KCBAComDDWSWS_S..-0,2-0,10,00,10,20,3AssortativityOriginal value2KCBAComDDWSWS_..0,000200,000250,000300,000350,00040Average path lengthOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,40,5Max eigenvector centralityOriginal value2KCBAComDDWSWS_S..010203040Skewness of degree distributionOriginal value6
FIG. 3. Correlations between graph metrics across different domains. Although there are a few universal relations e.g. the
high correlation between the maximum eigenvector centrality and the skewness of degree distribution, most of the relationships
are rather domain-specific. The reason behind the aforementioned universal correlation is that both metrics depend on the
occurrence of hubs. The domain-specific correlations are well-illustrated e.g.
the unique block diagonal structure in the
Cheminformatics networks, however, the study of these relationships require a deeper understanding of the underlying domains
and is beyond the scope of this paper.
separately (600 networks in each domain) based on
the graph metrics
3. Subcategory prediction: a multi-class classification
problem where we also aim to predict the model
that generated the graph (600 networks in each do-
main, 100-100 in each class) based on the graph
metrics
For explanatory variables, we use the graph metrics
from Table I, namely assortativity, average clustering co-
eff., average degree, max. eigenvector centrality, average
path length, and the skewness of the degree distribution.
In this work, we assume that the reader is familiar
with the basic concepts of machine learning, otherwise,
we recommend [34] and some important notions can
be also found in Appendix A. In our experiments, we
trained different machine learning models such as Naive
Bayes, kNN, Generalized Linear Model, Decision Tree,
and Random Forest that we evaluated using 5-fold cross-
validation with stratified sampling. The two best per-
forming models were the Random Forest and Decision
Tree algorithms, hence we only detail the performance
of these models in Table IV. As a performance metric
we use accuracy in the case of the multi-class classifica-
tions and for the binary classification, we calculate the
AUC (Area Under the ROC Curve) score since multi-
class predictions are built on balanced data, while the
binary classification uses unbalanced data, for which the
accuracy is less meaningful.
First of all, the Domain Prediction column of Table
IV suggests that the domain of a network is efficiently
identifiable, which is consistent with prior works [22, 23],
however, the category and subcategory identification of
assortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_degassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_deg1.00-0.77-0.76-0.01-0.070.100.340.53-0.771.000.74-0.040.06-0.13-0.44-0.77-0.760.741.000.20-0.18-0.23-0.32-0.51-0.01-0.040.201.00-0.25-0.230.06-0.15-0.070.06-0.18-0.251.000.810.25-0.230.10-0.13-0.23-0.230.811.000.270.040.34-0.44-0.320.060.250.271.000.140.53-0.77-0.51-0.15-0.230.040.141.00Socialassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_degassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_deg1.000.130.010.240.17-0.22-0.23-0.240.131.000.500.280.05-0.36-0.21-0.390.010.501.000.60-0.01-0.53-0.35-0.530.240.280.601.00-0.18-0.87-0.61-0.740.170.05-0.01-0.181.000.130.130.01-0.22-0.36-0.53-0.870.131.000.710.93-0.23-0.21-0.35-0.610.130.711.000.65-0.24-0.39-0.53-0.740.010.930.651.00Cheminformaticsassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_degassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_deg1.00-0.35-0.240.13-0.41-0.43-0.05-0.24-0.351.000.65-0.060.33-0.16-0.21-0.39-0.240.651.000.29-0.16-0.20-0.25-0.190.13-0.060.291.00-0.54-0.49-0.80-0.40-0.410.33-0.16-0.541.000.330.31-0.05-0.43-0.16-0.20-0.490.331.000.550.76-0.05-0.21-0.25-0.800.310.551.000.62-0.24-0.39-0.19-0.40-0.050.760.621.00Brainassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_degassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_deg1.00-0.51-0.280.36-0.590.110.190.56-0.511.000.77-0.220.51-0.32-0.23-0.62-0.280.771.000.20-0.06-0.43-0.28-0.400.36-0.220.201.00-0.49-0.26-0.130.24-0.590.51-0.06-0.491.000.09-0.01-0.500.11-0.32-0.43-0.260.091.000.900.630.19-0.23-0.28-0.13-0.010.901.000.590.56-0.62-0.400.24-0.500.630.591.00Food1.000.750.500.250.000.250.500.751.00Correlation1.000.750.500.250.000.250.500.751.00Correlation1.000.750.500.250.000.250.500.751.00Correlation1.000.750.500.250.000.250.500.751.00Correlation7
FIG. 4. The average Canberra distance between the original and the model-generated graphs. In every domain, the 2K model
efficiently captured the features of the original networks, the second-best performing models are varying across domains though.
While the Duplication Divergence was designed to model protein networks, it performed on this domain the worst but mimicked
the food webs quite well. The graphs generated by the clustering Barab´asi -- Albert and the Duplication Divergence models, and
similarly the ones generated by the Watts -- Strogatz and the Community structure models are relatively similar to each other.
On the other hand, the graphs generated by these two pairs of models are quite dissimilar, which suggests that they capture
different aspects of real networks. The figure also shows that food webs are the easiest to model: 2K, CBA and DD algorithms
generated graphs are very similar to the real ones.
TABLE IV. The performance of the Random Forest and Decision Tree classifiers.
Subcategory
Domain
Classification Problems
Models
Measures
Random Forest
Decision Tree
Prediction
Accuracy
94%
93%
Category
Prediction
AUC
Prediction
Accuracy
Social Food Chems Brain Social Food Chems Brain
88% 71% 83% 92%
0.94
0.60
84% 68% 76% 89%
0.93
0.97
0.81
0.64
0.92
0.79
the graphs turned out to be more difficult, especially on
the Food domain. The reason behind the weaker accu-
racy in this classification problem is that in contrast to
[22 -- 24] we fitted the models to each graph, hence the
model-generated graphs are as similar to the real ones,
and thus to each other, as possible.
The results of the Category and Subcategory Predic-
tion problem show that the food webs are easy to model
since the small values of AUC and accuracy scores mean
that it is more difficult to distinguish the modelled food
networks from the original ones. This observation agrees
with the results that we can deduct from Figures 4, 5 and
6.
The most important attribute according to the ma-
chine learning algorithms, i.e. that significantly differs in
real networks and generated graphs is the average path
length, followed by assortativity and the average clus-
tering coefficient. This means that the applied models
are unable to capture the exact diameter and clustering
of real networks. Although protein interaction networks
original2KCBADDWSWS_STDcomoriginal2KCBADDWSWS_STDcom0.000.651.902.452.853.233.030.650.002.222.503.192.982.711.902.220.001.862.582.913.432.452.501.860.003.293.193.612.853.192.583.290.001.592.983.232.982.913.191.590.002.573.032.713.433.612.982.570.00Socialoriginal2KCBADDWSWS_STDcomoriginal2KCBADDWSWS_STDcom0.001.002.213.022.162.201.631.000.002.492.852.422.172.062.212.490.001.722.091.992.253.022.851.720.002.632.513.022.162.422.092.630.001.632.112.202.171.992.511.630.002.151.632.062.253.022.112.150.00Chemsoriginal2KCBADDWSWS_STDcomoriginal2KCBADDWSWS_STDcom0.000.932.372.282.753.082.310.930.002.082.642.742.571.592.372.080.002.252.502.552.752.282.642.250.003.253.113.382.752.742.503.250.001.422.553.082.572.553.111.420.002.342.311.592.753.382.552.340.00Brainoriginal2KCBADDWSWS_STDcomoriginal2KCBADDWSWS_STDcom0.000.771.321.152.332.292.680.770.000.981.842.232.112.211.320.980.001.792.071.962.361.151.841.790.002.712.562.972.332.232.072.710.001.482.052.292.111.962.561.480.001.832.682.212.362.972.051.830.00Food0.00.51.01.52.02.53.03.5Mean Canberra distance0.00.51.01.52.02.53.03.5Mean Canberra distance0.00.51.01.52.02.53.03.5Mean Canberra distance0.00.51.01.52.02.53.03.5Mean Canberra distanceare clustered and have relatively large average distances,
none of the models were able to capture these properties
at the same time as it is depicted in Figure 6.
IV. CONCLUSION
In this paper, we used machine learning techniques
in order to study the relationship of the graph metrics
across different domains, furthermore, to identify the
structural properties that discriminate either the network
domains or the model-generated graphs from real net-
works. We gathered 400 real-world networks and gen-
erated an additional 2400 networks by five frequently
used network models using previously fitted parameters
to mimic original networks as closely as possible.
We showed that the characteristics of the fitted models
are quite stable, making it possible to perform statisti-
cal learning tasks such as goodnes-of-fit tests and do-
main prediction. We found that the correlation profiles
vary across network domains and the domain can be ef-
ficiently determined by a small number of metrics. The
goodness-of-fit of the network models also depends on the
domains. We observe that using machine learning tech-
niques it is not difficult to decide if a network is real or
model-generated and identify the properties that network
models cannot capture.
There are several possible future directions, such as co-
operating with domain experts to gain a better under-
standing of the different correlation profiles across net-
work domains. Other hidden relationships may be also
discovered if more domains and instances were appended
to our dataset.
FIG. 5. On the left: The scatter plot of the networks from
the food web domain with respect to the maximum eigenvec-
tor centrality and the assortativity features. Both the orig-
inal (real) and the model-generated networks are illustrated
(see the colours). On the right: The projection of the real
networks to the first two principal components show a clear
distinction of the different domains.
8
FIG. 6. Scatter plot of real and modelled graphs along the
most important variables with respect to the category predic-
tion problem determined by the machine learning algorithms
in each domain.
ACKNOWLEDGMENT
The research reported in this paper was supported by
the Higher Education Excellence Program of the Ministry
of Human Capacities in the frame of Artificial Intelligence
research area of Budapest University of Technology an
Economics (BME FIKP-MI/SC). The publication is also
supported by the EFOP-3.6.2-16-2017-00015 project en-
titled "Deepening the activities of HU-MATHS-IN, the
Hungarian Service Network for Mathematics in Industry
and Innovations" through University of Debrecen. The
project has been supported by the European Union, co-
financed by the European Social Fund. The research of
R. Molontay is supported by NKFIH K123782 research
grant.
APPENDIX A: GLOSSARY
Here we detail some important concepts of network
theory and machine learning that we use throughout the
paper.
Graph Theory
Definition 1 (Graph density). Graph density D is the
ratio of the number of edges of the graph divided by
the number of edges of a complete graph with the same
number of vertices, i.e:
D =
.
E
1
2V (V − 1)
Definition 2 (Average path length). A path is a se-
quence of edges which connect a sequence of vertices.
Principal component 1Principal component 2Real Networks0,10,20,30,40,50,6Max Eigenvector Centrality-1,0-0,8-0,6-0,4-0,20,00,20,4AssortativityFood websDomainBrainChemsFoodSocialSubcategoryOriginal2KBAWSDDCom0,20,40,6Max. Eigenvector Centrality0,00,20,40,60,8Average ClusteringBrain0,050,100,15Average Path Length0,00,20,4Average ClusteringCheminformatics-0,50,00,5Assortativity0,00,20,40,60,8Average ClusteringSocial0,20,40,6Max. Eigenvector Centrality0,00,20,40,6Average ClusteringFoodCategoryRealModelThe distance d(u, v) between the vertices u and v is the
length (number of edges) of the shortest path connecting
them. The lG average path length of a graph G of size n
is defined as:
(cid:88)
i(cid:54)=j
lG =
1
n(n − 1)
d(vi, vj)
Remark (Small-world property). A network is said to be
small-world if the l average shortest path length grows
proportionally to the logarithm of the size of the network
i.e. l ∝ log V .
Definition 3 (Degree distribution). The degree deg(v)
of a vertex v in a simple, undirected graph is its number
of incident edges. The degree distribution P is the proba-
bility distribution of the degrees over the whole network,
i.e. P (k) is the probability that the degree of a randomly
chosen vertex is equal to k.
Remark (Scale-free network). In a scale-free network
the P (k) degree distribution scales as a power-law i.e.
P (k) ∝ k−γ, where γ > 1.
Definition 4 (Assortativity coefficient). The assortativ-
ity coefficient is the Pearson correlation coefficient of de-
gree between pairs of linked nodes. The assortativity
coefficient is given by
(cid:80)
j,k j · k(ej,k − qjqk)
,
σ2
q
r =
where the term qk is the mass function of the distribu-
tion of the remaining degrees (degree of the nodes minus
one) and j and k indicates the remaining degrees. Fur-
thermore, ej,k refers to the mass function of the joint
probability distribution of the remaining degrees of the
two vertices. Finally, σ2
q denotes the variance of the re-
maining degree distribution with mass function qk i.e.
σ2
k k2qk − ((cid:80)
q =(cid:80)
k kqk)2
Definition 5 (Local clustering coefficient). The local
clustering coefficient of vertex v is the fraction of pairs
of neighbors of v that are connected over all pairs of
neighbors of v. Formally:
Cloc(v) =
{(s, t) edges : s, t ∈ Nv and (s, t) ∈ E}
deg(v)(deg(v) − 1)
,
where Nv is the neighbourhood of the node v i.e. the
vertices adjacent to v.
The average (local) clustering coefficient of a G graph
is defined as:
¯C(G) =
1
n
(cid:88)
v∈V (G)
Cloc(v),
where n is the size of the graph.
9
Definition 6 (Eigenvector centrality). For a graph, the
vector of eigenvector centralities c satisfies the eigenvec-
tor equation A · c = λ1c , where λ1 is the largest eigen-
value of the graph's adjacency matrix A. In other words,
for a connected undirected graph, the vector of eigen-
vector centralities is given by the (suitably normalized)
eigenvector of corresponding to the largest eigenvalue of
the adjacency matrix.
Statistical Learning
Definition 7 (Classification Problem). Classification
is a supervised learning task where based on training
dataset we attempt to predict the categorial target vari-
able of a new observation.
Definition 8 (Stratified k-fold cross validation). In
stratified k-fold cross-validation, the original sample is
randomly partitioned into k equal sized subsamples such
that the class distribution in the subsets is the same as
in the whole dataset, i.e. stratified sampling ensures that
each fold is a good representative of the whole dataset.
Then one of the k subsamples is retained for testing the
model (validation) and the remaining k − 1 subsamples
are used as training data. The cross-validation process is
repeated k times with each subsample used once as the
validation data. Finally, to produce a single estimation,
the k results can be averaged.
Definition 9 (Confusion Matrix). The performance of
a classifier is calculated associated with the confusion
matrix. The confusion matrix itself is not a perfor-
mance metric, however, almost every performance met-
ric is based on the values of the matrix. Let us say that
we have k different classes, then the confusion matrix
M = (mij) is a k × k matrix, where the rows correspond
to the predicted values and the columns correspond to
the real category of the observations, i.e. mij denotes
the number of cases when the actual class is the jth cat-
egory and the classifier predicted the ith category.
Definition 10 (Accuracy). Let M = (mij) denote the
k × k confusion matrix of a k-class problem. Then the
accuracy of the classifier is defined as
(cid:80)k
(cid:80)k
i=1 mii
j,l=1 mjl
,
Accuracy =
i.e. the accuracy is the total number of the number of
hits (total of the diagonal) divided by the size of the test
set.
Definition 11 (ROC curve and AUC score). A ROC
curve is an easily interpretable visual representation of
the diagnostic ability of a binary classifier, and most fre-
quently it is used to compare the performance of different
models. In binary classification problems, we usually re-
fer to the classes as positive and negative. The ROC
Clustering Barab´asi -- Albert model
10
The original Barab´asi -- Albert (BA) model
lacks
high clustering coefficient so a modification was proposed
by Holme and Kim [17], that can better capture the high
clustering of real networks. Recall the growth of the orig-
inal1 BA model:
[2]
0. Input: n number of nodes, m number of new edges
of a newcomer vertex and p probability of triad
formation at each iteration.
1. Initial condition: The model starts with a small
network of m0 nodes.
2. Growth: At each iteration step, a newcomer node
v is connected to u1, . . . , um, m ≤ m0 existing
nodes, with probability that is proportional to the
degree of the ui nodes, i.e. according to the mech-
anism, which means that the probability pi, that v
is connected to the node ui is
(cid:80)
deg(ui)
j deg(vj)
,
curve is created by plotting the true positive rate (TPR)
against the false positive rate (FPR) at various threshold
setting. The TPR is the number of correctly classified ob-
servations of the positive class divided by the size of the
positive class. The FPR measures the proportion of the
Type I error i.e. it is the number of false alarms i.e. false
positives (misclassified negative observations) divided by
the size of the negative class. The greater the area under
the ROC curve (AUC) is the more accurate the model is.
Definition 12 (Canberra distance). Let p and q be two
n-dimensional vectors. The Canberra distance between
the vectors p and q is defined as follows:
pi − qi
pi + qi
n(cid:88)
d(p, q) =
(1)
i
APPENDIX B: NETWORK MODELS
In this section we describe the network models that we
used to model real-world networks.
pi =
Watts -- Strogatz model
Tha Watts -- Strogatz model (WS), proposed by Duncan
J. Watts and Steven Strogatz [3], was motivated by the
small-world and highly clustered property of real-world
networks. The description of the model generating pro-
cedure is as follows:
0. Input: n number of nodes, initial K = 2·k number
of neighbours of each vertex and p edge rewiring
probability.
1. Initialization: We start with a regular lattice ring
(also called as circulant graph) of N nodes, i.e. a
cycle, where every node is connected with its 2k
nearest neighbours. Formally, if the nodes are la-
belled v1, v2, . . . , vN , then the there is a link be-
tween vi and vj if and only if
i − j mod (N − k) ≤ k.
2. Rewiring the edges: Each edge is rewired iden-
tically with probability p by changing one of the
endpoints of the edge, making sure that no self-
loop or multiple edge is created. Formally for ev-
ery 1 ≤ i ≤ N , every (vi, vj) edge is replaced by
(vi, vk), with probability p, such that k (cid:54)= i and
k (cid:54)= j, and k is chosen uniformly from the set of
allowed values.
where the sum is made over all already existing vj
nodes, which is eventually twice the current number
of edges of the network.
The difference between the original and the Clustering
BA model, is that each newly connected edge is com-
pleted to a triad with a given probability, i.e. as an extra
step: after drawing a (v, ui) edge in the preferential at-
tachment step, with a given probability p a new edge is
drawn between v and one of the neighbours of ui to form
a new triangle. Formally, the steps 1 and 2 are supple-
mented with the following step:
3. Triad
formation:
=
If
the
set W
{w : ∃i (w, ui) ∈ E and w (cid:54)= v and (v, w) /∈ E}
is non-empty, then with probability p we connect
v with a randomly chosen w ∈ W , else we connect
v to a random node according to the preferential
attachment mechanism. Note that p is a previously
defined parameter, and in the definition of the set
W , the vertices ui are from the previous (Growth)
step.
Notation: CBAn,m,p denotes a random graph generated
by the Clustering BA model with n, m, p parameters.
Duplication-Divergence model
The following analytically tractable model was intro-
duced in [20] in order to describe the evolution of protein
Notation: WSn,k,p denotes a random graph generated by
the WS model with n, k, p parameters.
1Note that this definition of the Barab´asi -- Albert model is mathe-
matically non-rigorous, but Bollob´as et al. [35] introduced a precise
version of the model.
interaction networks. The growth of the model consists
of a and a step as follows:
0. Input: n number of nodes, p > 0 probability of
the activation of a duplicated edge.
1. Initialization: The model starts with two nodes
connected via a link.
2. Growth: At each iteration step a randomly se-
lected target v node is duplicated:
(a) Duplication: The v(cid:48) replica of v is added
to the network and v(cid:48) is connected to each
neighbour of v.
(b) Divergence: Each newly generated link of v(cid:48)
is with probability p, i.e. independently with
probability 1 − p we delete each newly con-
nected edge. If at least one link is remained,
then the v(cid:48) replica is preserved, otherwise the
attempt is considered as a failure and the net-
work does not change.
Community Structure model
The following model is a generalization of the "planted
l-partition" model introduced in [18] or it can be viewed
as a special case of the Stochastic Block model [19]. It is
more general then the "planted l-partition" model since
the size of each community can be adjusted arbitrarily.
On the other hand, it is less general then the Stochastic
Block model since here the probabilities of edge forma-
tions within and between communities are constant for
each partition. The algorithm of the model is as follows:
0. Input: L = (n1, . . . , nk) list of sizes of communi-
ties, pin and pout probabilities of edge formations
within and between communities respectively.
1. Initialization: The model partitions n = n1+n2+
. . .+nk vertices in k different groups with n1, . . . , nk
nodes. Vertices of the same group are connected
independently with a probability pin, i.e. each sub-
graph corresponding to a group is an Erdos -- R´enyi
random graph, with connection probability pin.
2. Connecting communities: Vertices of different
groups are linked independently with a probability
pout.
2K-Simple model
11
performance of the property-specific models to a univer-
sal one, furthermore, this model is more computationally
efficient than the Stochastic Kronecker graph model that
can also capture several well-known properties of real-
world networks [36].
The 2K-Simple algorithm constructs a simple graph
with a target joint degree matrix (JDM) i.e. its input is
a JDM and the output is a simple graph with the given
JDM. The JDM's entry in the kth row and lth column
is the number of edges between nodes of degree k and
nodes of degree l. Note that the joint degree distribution
contains significant information of the network for exam-
ple density, degree distribution, and degree correlation,
but it cannot capture information about the clustering
of the network since in that case, the distribution of the
triplets would be also necessary. However, in [21] there
is an extension of the 2K-Simple algorithm which can
approximate the average clustering coefficient, without
knowing the distribution of the triplets.
There are several methods to generate a graph with
given joint degree distribution [37] and this algorithm
builds on a prior attempt: the joint configuration model
(also known as pseudograph) [37], but it is more sophis-
ticated, since it is always possible to connect two discon-
nected v and w nodes without exceeding their desired
degree, even if they do not have free stubs and still main-
tain the simplicity of the generated graph, which is where
the configuration model fails. The operation that allows
us to ensure the simplicity of the graph is referred to as
. The algorithm can be summed up as follows:
0. Input: A valid (graphical) joint degree matrix
1. Initialization: Create n = V nodes, each v ∈ V
has deg(v) free stubs.
2. Wire edges: Pick two disconnected nodes v and
w, of degree k and l respectively.
i If the current degree of v and w has not
reached its target yet, i.e. they have free stubs,
then connect v and w
ii Otherwise apply the Neighbour Switch opera-
tion to v or w to get free stubs.
The goal of the Neighbour Switch (NS) operation is to
free a stub such that the joint degree distribution remains
unchanged. The algorithm of NS is as follows:
0. Input: node v
1. Find v(cid:48) node such that deg(v(cid:48)) = deg(v)
2. Find t node such that t is neighbour of v but not
connected to v(cid:48)
3. Replace the edge (v, t) with (v(cid:48), t)
The 2K-Simple algorithm is a general modeling frame-
work introduced in [21] that can capture the degree cor-
relation profile of an arbitrary network. The reason why
we applied this model is that we aspired to compare the
APPENDIX C: AUXILIARY FIGURES
In this section we present a few auxiliary figures.
12
FIG. 7. Boxplots of the metrics across different models. The modelled graph is a brain network with 2995 nodes.
FIG. 8. Boxplots of the metrics across different models. The modelled graph is a food web with 237 nodes.
2KCBAComDDWSWS_S..0,0040,0060,0080,0100,0120,0140,016DensityOriginal value2KCBAComDDWSWS_S..-1,0-0,8-0,6-0,4-0,20,00,20,40,6AssortativityOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,40,50,6Average clustering coefficientOriginal value2KCBAComDDWSWS_..0,00080,00100,00120,00140,00160,00180,0020Avgerage path lengthOriginal value2KCBAComDDWSWS_S..02468101214Skewness of degree distributionOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,4Max eigenvector centralityOriginal value2KCBAComDDWSWS_S..0246810Skewness of degree distributionOriginal value2KCBAComDDWSWS_S..-1,0-0,8-0,6-0,4-0,20,0AssortativityOriginal value2KCBAComDDWSWS_S..0,000,050,100,150,200,250,30Average clustering coefficientOriginal value2KCBAComDDWSWS_S..0,10,20,30,40,5Max eigenvector centralityOriginal value2KCBAComDDWSWS_..0,0080,0090,0100,0110,0120,013Average path lengthOriginal value2KCBAComDDWSWS_S..0,000,020,040,060,080,100,120,140,16DensityOriginal value13
FIG. 9. Boxplots of the metrics across different models. The modelled graph is a protein interaction network with 60 nodes.
[1] A.-L. Barab´asi, Network science (Cambridge University
[16] R. A. Rossi and N. K. Ahmed, in Proceedings of the 29th
Press, 2016).
[2] A.-L. Barab´asi and R. Albert, Science 286, 509 (1999).
[3] D. J. Watts and S. H. Strogatz, Nature 393, 440 (1998).
[4] M. E. J. Newman, Physical Rev. E 68, 026121 (2003).
[5] C. I. Del Genio, T. Gross, and K. E. Bassler, Physical
AAAI Conference on Artificial Intelligence (2015).
[17] P. Holme and B. J. Kim, Physical Review E 65, 026107
(2002).
[18] A. Condon and R. M. Karp, Random Structures & Al-
gorithms 18, 116 (2001).
Review Letters 107, 178701 (2011).
[19] P. W. Holland, K. B. Laskey, and S. Leinhardt, Social
[6] P. W. Fong, M. Anwar, and Z. Zhao, in Europ. Symp.
on Res. in Comp. Security (Springer, 2009) pp. 303 -- 320.
[7] A. Goldenberg, A. X. Zheng, S. E. Fienberg, et al., Foun-
dations and Trends in Machine Learning 2, 129 (2010).
[8] G. Bounova and O. de Weck, Physical Review E 85,
016117 (2012).
[9] A. Garcia-Robledo, A. Diaz-Perez,
and G. Morales-
Luna, in Emerging Technologies for a Smarter World
(CEWIT), 2013 10th International Conference and Expo
on (IEEE, 2013) pp. 1 -- 6.
[10] A. Jamakovic and S. Uhlig, Networks and Heterogeneous
Media 3, 345 (2008).
[11] M. Nagy, Data-driven Analysis of Fractality and Other
Characteristics of Complex Networks, Master's the-
sis, Budapest University of Technology and Economics
(2018).
[12] E. T. Aaron Clauset and M. Sainz (2016).
[13] J. G. Diego Vzquez and R. Naik (2003).
[14] N. Kasthuri and J. Lichtman (2008).
[15] J. Kunegis, in Proc. Int. Conf. on World Wide Web Com-
panion (2013) pp. 1343 -- 1350.
Networks 5, 109 (1983).
[20] I. Ispolatov, P. L. Krapivsky, and A. Yuryev, Physical
Review E 71, 061911 (2005).
[21] M. Gjoka, B. Tillman, and A. Markopoulou, in Com-
puter Communications (INFOCOM), 2015 IEEE Con-
ference on (Citeseer, 2015) pp. 1553 -- 1561.
[22] K.
Ikehara
and A. Clauset,
arXiv
preprint
arXiv:1710.11304 (2017).
[23] J. P. Canning, E. E. Ingram, S. Nowak-Wolff, A. M. Or-
tiz, N. K. Ahmed, R. A. Rossi, K. R. Schmitt,
and
S. Soundarajan, arXiv preprint arXiv:1805.02682 (2018).
[24] S. Bonner, J. Brennan, G. Theodoropoulos, I. Kureshi,
and A. S. McGough, in 2016 IEEE International Con-
ference on Big Data (Big Data) (IEEE, 2016) pp. 3290 --
3297.
[25] M. Middendorf, E. Ziv, and C. H. Wiggins, Proceedings
of the National Academy of Sciences 102, 3192 (2005).
[26] M. Barth´elemy, Physics Reports 499, 1 (2011).
[27] M. B. Menezes, S. Kim, and R. Huang, PloS one 12,
e0179120 (2017).
2KCBAComDDWSWS_S..-0,6-0,4-0,20,00,20,40,6AssortativityOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,4Average clustering coefficientOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,40,50,6Max eigenvetor centralityOriginal value2KCBAComDDWSWS_S..0,000,050,100,150,200,25Average path lengthOriginal value2KCBAComDDWSWS_S..0,030,040,050,060,070,080,090,10DensityOriginal value2KCBAComDDWSWS_S..01234Skewness of degree distributionOriginal value14
[28] V. D. Blondel, J.-L. Guillaume, R. Lambiotte,
and
E. Lefebvre, J. of Stat. Mech.: Theory and Experiment
2008, P10008 (2008).
[29] G. Csardi and T. Nepusz, InterJournal, Complex Systems
1695, 1 (2006).
[30] A. Hagberg, P. Swart, and D. S Chult, Exploring net-
work structure, dynamics, and function using NetworkX,
Tech. Rep. (Los Alamos National Lab.(LANL), NM,
USA, 2008).
[31] G. Kiar, GREMLIN: Graph Estimation From MR Images
Leading to Inference in Neuroscience, Ph.D. thesis, Johns
Hopkins University (2016).
[32] J. A. Dunne, H. Maschner, M. W. Betts, N. Huntly,
R. Russell, R. J. Williams, and S. A. Wood, Scientific
reports 6, 21179 (2016).
[33] S. Bonner, J. Brennan, G. Theodoropoulos, I. Kureshi,
and A. McGough, (2016).
[34] J. Friedman, T. Hastie, and R. Tibshirani, The elements
of statistical learning, Vol. 1 (Springer series in statistics
New York, NY, USA:, 2001).
[35] B. Bollob´as, O. Riordan, J. Spencer, G. Tusn´ady, et al.,
Random Structures & Algorithms 18, 279 (2001).
[36] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos,
and Z. Ghahramani, J. Mach. Learn. Res. 11, 985 (2010).
[37] P. Mahadevan, D. Krioukov, K. Fall, and A. Vahdat,
in ACM SIGCOMM Computer Communication Review,
Vol. 36 (ACM, 2006) pp. 135 -- 146.
|
1512.07258 | 3 | 1512 | 2018-02-27T16:40:59 | Improving Website Hyperlink Structure Using Server Logs | [
"cs.SI"
] | Good websites should be easy to navigate via hyperlinks, yet maintaining a high-quality link structure is difficult. Identifying pairs of pages that should be linked may be hard for human editors, especially if the site is large and changes frequently. Further, given a set of useful link candidates, the task of incorporating them into the site can be expensive, since it typically involves humans editing pages. In the light of these challenges, it is desirable to develop data-driven methods for automating the link placement task. Here we develop an approach for automatically finding useful hyperlinks to add to a website. We show that passively collected server logs, beyond telling us which existing links are useful, also contain implicit signals indicating which nonexistent links would be useful if they were to be introduced. We leverage these signals to model the future usefulness of yet nonexistent links. Based on our model, we define the problem of link placement under budget constraints and propose an efficient algorithm for solving it. We demonstrate the effectiveness of our approach by evaluating it on Wikipedia, a large website for which we have access to both server logs (used for finding useful new links) and the complete revision history (containing a ground truth of new links). As our method is based exclusively on standard server logs, it may also be applied to any other website, as we show with the example of the biomedical research site Simtk. | cs.SI | cs | Improving Website Hyperlink Structure Using Server Logs
Ashwin Paranjape∗
Stanford University
[email protected]
Robert West∗
Stanford University
[email protected]
Leila Zia
Wikimedia Foundation
[email protected]
Jure Leskovec
Stanford University
[email protected]
8
1
0
2
b
e
F
7
2
]
I
S
.
s
c
[
3
v
8
5
2
7
0
.
2
1
5
1
:
v
i
X
r
a
ABSTRACT
Good websites should be easy to navigate via hyperlinks, yet main-
taining a high-quality link structure is difficult. Identifying pairs
of pages that should be linked may be hard for human editors, es-
pecially if the site is large and changes frequently. Further, given
a set of useful link candidates, the task of incorporating them into
the site can be expensive, since it typically involves humans editing
pages. In the light of these challenges, it is desirable to develop
data-driven methods for automating the link placement task. Here
we develop an approach for automatically finding useful hyperlinks
to add to a website. We show that passively collected server logs,
beyond telling us which existing links are useful, also contain im-
plicit signals indicating which nonexistent links would be useful if
they were to be introduced. We leverage these signals to model the
future usefulness of yet nonexistent links. Based on our model, we
define the problem of link placement under budget constraints and
propose an efficient algorithm for solving it. We demonstrate the
effectiveness of our approach by evaluating it on Wikipedia, a large
website for which we have access to both server logs (used for find-
ing useful new links) and the complete revision history (containing
a ground truth of new links). As our method is based exclusively on
standard server logs, it may also be applied to any other website, as
we show with the example of the biomedical research site Simtk.
INTRODUCTION
1.
Websites are networks of interlinked pages, and a good website
makes it easy and intuitive for users to navigate its content. One
way of making navigation intuitive and content discoverable is to
provide carefully placed hyperlinks. Consider for instance Wiki-
pedia, the free encyclopedia that anyone can edit. The links that
connect articles are essential for presenting concepts in their appro-
priate context, for letting users find the information they are looking
for, and for providing an element of serendipity by giving users the
chance to explore new topics they happen to come across without
intentionally searching for them.
Unfortunately, maintaining website navigability can be difficult
and cumbersome, especially if the site is large and changes fre-
*AP and RW contributed equally, RW as a Wikimedia Research Fellow.
Permission to make digital or hard copies of part or all of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for third-party components of this work must be honored.
For all other uses, contact the owner/author(s).
WSDM'16, February 22–25, 2016, San Francisco, CA, USA.
© 2016 Copyright held by the owner/author(s).
ACM ISBN 978-1-4503-3716-8/16/02. . . $15.00
DOI: http://dx.doi.org/10.1145/2835776.2835832
quently [7, 21]. For example, about 7,000 new pages are created
on Wikipedia every day [35]. As a result, there is an urgent need
to keep the site's link structure up to date, which in return requires
much manual effort and does not scale as the website grows, even
with thousands of volunteer editors as in the case of Wikipedia.
Neither is the problem limited to Wikipedia; on the contrary, it may
be even more pressing on other sites, which are often maintained
by a single webmaster. Thus, it is important to provide automatic
methods to help maintain and improve website hyperlink structure.
Considering the importance of links, it is not surprising that the
problems of finding missing links and predicting which links will
form in the future have been studied previously [17, 19, 22, 32].
Prior methods typically cast improving website hyperlink structure
simply as an instance of a link prediction problem in a given net-
work; i.e., they extrapolate information from existing links in order
to predict the missing ones. These approaches are often based on
the intuition that two pages should be connected if they have many
neighbors in common, a notion that may be quantified by the plain
number of common neighbors, the Jaccard coefficient of sets of
neighbors, and other variations [1, 17].
However, simply considering the existence of a link on a website
is not all that matters. Networks in general, and hyperlink graphs
in particular, often have traffic flowing over their links, and a link
is of little use if it is never traversed. For example, in the English
Wikipedia, of all the 800,000 links added to the site in February
2015, the majority (66%) were not clicked even a single time in
March 2015, and among the rest, most links were clicked only very
rarely. For instance, only 1% of links added in February were used
more than 100 times in all of March (Fig. 1). Consequently, even
if we could perfectly mimic Wikipedia editors (who would a priori
seem to provide a reasonable gold standard for links to add), the
suggested links would likely have little impact on website naviga-
tion.
Furthermore, missing-link prediction systems can suggest a large
number of links to be inserted into a website. But before links can
be incorporated, they typically need to be examined by a human,
for several reasons. First, not all sites provide an interface that lets
content be changed programmatically. Second, even when such
an interface is available, determining where in the source page to
place a suggested link may be hard, since it requires finding, or
introducing, a phrase that may serve as anchor text [19]. And third,
even when identifying anchor text automatically is possible, human
verification and approval might still be required in order to ensure
that the recommended link is indeed correct and appropriate. Since
the addition of links by humans is a slow and expensive process,
presenting the complete ranking of all suggested links to editors is
unlikely to be useful. Instead, a practical system should choose a
well composed subset of candidate links of manageable size.
and demonstrate that our models of human browsing behavior are
accurate and lead to the discovery of highly relevant and useful hy-
perlinks. Having full access to the logs of Wikipedia, one of the
highest-traffic websites in the world, is particularly beneficial, as
it allows us to perform a unique analysis of human web-browsing
behavior. Our results on Simtk show that our method is general and
applies well beyond Wikipedia.
The following are the main contributions of this paper:
• We introduce the link placement problem under budget con-
straints, and design objective functions anchored in empir-
ically observed human behavior and exposing an intuitive
diminishing-returns property. We also provide an efficient
algorithm for optimizing these objectives (Sec. 2).
• We identify signals in the logs that can indicate the usage
of a future link before it is introduced, and we operational-
ize these signals in simple but effective methods for finding
promising new links and estimating their future clickthrough
rates (Sec. 3).
• We characterize the usage and impact of newly added links
by analyzing human navigation traces mined from Wikipe-
dia's server logs (Sec. 5).
2. THE LINK PLACEMENT PROBLEM
First we introduce the link placement problem under budget con-
straints. In this context, the budget refers to a maximum allow-
able number of links that may be suggested by an algorithm. As
mentioned in the introduction, realistic systems frequently require
a human in the loop for verifying that the links proposed by the al-
gorithm are indeed of value and for inserting them. As we need to
avoid overwhelming the human editors with more suggestions than
they can respond to, we need to carefully select our suggestions.
Formally, the task is to select a set A of suggested links of a
given maximum size K, where the quality of the chosen set A is
determined by an objective function f :
f (A)
A ≤ K.
maximize
subject to
(1)
(2)
In principle, any set function f : 2V×V → R may be plugged in
(where V is the set of pages on the site, and 2V×V is the set of
all sets of page pairs), but the practical usefulness of our system
relies vitally on a sensible definition of f . In particular, f should
be based on a reasonable model of human browsing behavior and
should score link sets for which the model predicts many clicks
above link sets for which it predicts fewer clicks.
In the following we introduce two simplified models of human
browsing behavior and propose three objective functions f based
on these models. Then, we show that two of these objectives have
the useful property of diminishing returns and discuss the impli-
cations thereof. Finally, we show that all three objectives can be
maximized exactly by a simple and efficient greedy algorithm.
2.1 Browsing models and objective functions
We first define notation, then formulate two web-browsing models,
and finally design three objective functions based on the models.
Notation. We model hyperlink networks as directed graphs G =
(V,E), with pages as nodes and hyperlinks as edges. We refer to
the endpoints of a link (s,t) as source and target, respectively. Un-
linked pairs of nodes are considered potential link candidates. We
denote the overall number of views of a page s by Ns. When users
are in s, they have a choice to either stop or follow out-links of s.
To simplify notation, we model stopping as a link click to a special
Figure 1: Complementary cumulative distribution function of
the number of clicks received in March 2015 by links intro-
duced in the English Wikipedia in February 2015.
Thus, what is needed is an automatic approach to improving
website hyperlink structure that accounts for website navigation
patterns and suggests a limited number of highly relevant links
based on the way they will impact the website's navigability.
Present work. Here we develop an automatic approach for sug-
gesting missing but potentially highly used hyperlinks for a given
website. Our approach is language- and website-independent and
is based on using access logs as collected by practically all web
servers. Such logs record users' natural browsing behavior, and we
show that server logs contain strong signals not only about which
existing links are presently used, but also about how heavily cur-
rently nonexistent links would be used if they were to be added to
the site. We build models of human browsing behavior, anchored in
empirical evidence from log data, that allow us to predict the usage
of any potentially introduced hyperlink (s,t) in terms of its click-
through rate, i.e., the probability of being chosen by users visiting
page s. The models are based on the following intuition: Consider
a page s not linked to another page t. A large fraction of users
visiting s and later on, via an indirect path, t, suggests that they
might have taken a direct shortcut from s to t had the shortcut ex-
isted. Even though one could hope to detect such events by parsing
the logs, our approach is even more general. One of our models is
able to estimate the fraction of people who would take a shortcut
(s,t) only based on the pairwise page transition matrix. That is, we
are able to estimate navigation probabilities over longer paths by
combining information about individual link transitions.
The second important aspect of our solution is that we only sug-
gest a small number of the top K most useful links, where K is a
'link budget' constraint. Consider a naïve approach that first ranks
all candidate links by their probability of being used and then sim-
ply returns the top K. An extreme outcome would be for all K links
to be placed in a single page s. This is problematic because it seems
a priori more desirable to connect a large number of pages reason-
ably well with other pages than to connect a single page extremely
well. This intuition is confirmed by the empirical observation that
the expected number of clicks users take from a given page s is
limited and not very sensitive to the addition of new links out of s.
Thus we conclude that inserting yet another out-link to s after some
good ones have already been added to it achieves less benefit than
adding an out-link to some other page s(cid:48) first. This diminishing-re-
turns property, besides accurately mirroring human behavior, leads
to an optimization procedure that does not over-optimize on single
source pages but instead spreads good links across many pages.
We demonstrate and evaluate our approach on two very differ-
ent websites: the full English Wikipedia and Simtk, a small com-
munity of biomedical researchers. For both websites we utilize
complete web server logs collected over a period of several months
1101001000100001e−061e−041e−021e+00Mininum number of clicksFraction of new linksNo clicks: 66%At least one click: 34%sink page ∅ /∈ E that is taken to be linked from every other page.
Further, Nst counts the transitions from s to t via direct clicks of the
link (s,t). Finally, a central quantity in this research is the click-
through rate pst of a link (s,t). It measures the fraction of times
users click to page t, given that they are currently on page s:
pst = Nst /Ns.
(3)
The stopping probability is given by ps∅. Note that, since in reality
users may click several links from the same source page, pst is
generally not a distribution over t given s.
Next we define two models of human web-browsing behavior.
Multi-tab browsing model. This model captures a scenario where
the user may follow several links from the same page s, e.g., by
opening them in multiple browser tabs. We make the simplifying
assumption that, given s, the user decides for each link (s,t) inde-
pendently (with probability pst) if he wants to follow it.
Single-tab browsing model. This is a Markov chain model where
the user is assumed to follow exactly one link from each visited
page s. This corresponds to a user who never opens more than a
single tab, as might be common on mobile devices such as phones.
The probability of choosing the link (s,t) is proportional to pst.
Based on these browsing models, we now define objective func-
tions that model the value provided by the newly inserted links A.
Note that the objectives reason about the clickthrough rates pst of
links A that do not exist yet, so in practice pst is not directly avail-
able but must be estimated from data. We address this task in Sec. 3.
Link-centric multi-tab objective. To capture the value of the
newly inserted links A, this first objective assumes the multi-tab
browsing model. The objective computes the expected number of
t:(s,t)∈A pst and aggregates this
new-link clicks from page s as(cid:80)
(cid:88)
quantity across all pages s:
(cid:88)
f1(A) =
ws
pst .
(4)
s
t:(s,t)∈A
If we choose ws = Ns then f1(A) measures the expected number
of clicks received by all new links A jointly when s is weighted
according to its empirical page-view count. In practice, however,
page-view counts tend to follow heavy-tailed distributions such as
power laws [2], so a few top pages would attract a disproportional
amount of weight. We mitigate this problem by using ws = logNs,
i.e., by weighting s by the order of magnitude of its raw count.
Page-centric multi-tab objective. Our second objective also as-
sumes the multi-tab browsing model. However, instead of mea-
suring the total expected number of clicks on all new links A (as
done by f1), this objective measures the expected number of source
pages on which at least one new link is clicked (hence, we term this
objective page-centric, whereas f1 is link-centric):
(cid:88)
s
1− (cid:89)
t:(s,t)∈A
.
1− pst
f2(A) =
ws
(5)
Here, the product specifies the probability of no new link being
clicked from s, and one minus that quantity yields the probability of
clicking at least one new link from s. As before, we use ws = logNs.
Single-tab objective. Unlike f1 and f2, our third objective is based
on the single-tab browsing model. It captures the number of page
views upon which the one chosen link is one of the new links A:
(cid:88)
s
(cid:80)
(cid:80)
t:(s,t)∈A pst +(cid:80)
t:(s,t)∈A pst
f3(A) =
ws
.
(6)
t:(s,t)∈E pst
The purpose of the denominator is to renormalize the independent
probabilities of all links-old and new-to sum to 1, so pst be-
comes a distribution over t given s. Again, we use ws = logNs.
2.2 Diminishing returns
Next, we note that all of the above objective functions are mono-
tone, and that f2 and f3 have a useful diminishing-returns property.
Monotonicity means that adding one more new link to the solu-
tion A will never decrease the objective value. It holds for all three
objectives (we omit the proof for brevity):
f (A∪{(s,t)})− f (A) ≥ 0.
(7)
The difference f (A∪{(s,t)})− f (A) is called the marginal gain of
(s,t) with respect to A.
The next observation is that, under the link-centric multi-tab ob-
jective f1, marginal gains never change: regardless of which links
are already present in the network, we will always have
f1(A∪{(s,t)})− f1(A) = ws pst .
(8)
This means that f1 assumes that the solution quality can be in-
creased indefinitely by adding more and more links to the same
source page s. However, we will see later (Sec. 5.2) that this may
not be the case in practice: adding a large number of links to the
same source page s does not automatically have a large effect on
the total number of clicks made from s.
This discrepancy with reality is mitigated by the more complex
objectives f2 and f3.
In the page-centric multi-tab objective f2,
further increasing the probability of at least one new link being
taken becomes ever more difficult as more links are added. This
way, f2 discourages adding too many links to the same source page.
The same is true for the single-tab objective f3: since the click
probabilities of all links from s-old and new-are required to sum
to 1 here, it becomes ever harder for a link to obtain a fixed portion
of the total probability mass of 1 as the page is becoming increas-
ingly crowded with strong competitors.
More precisely, all three objective functions f have the submod-
ularity property (proof omitted for brevity):
f (B∪{(s,t)})− f (B) ≤ f (A∪{(s,t)})− f (A),
for A ⊆ B,
(9)
but while it holds with equality for f1 (Eq. 8), this is not true for
f2 and f3. When marginal gains decrease as the solution grows, we
speak of diminishing returns.
To see the practical benefits of diminishing returns, consider two
source pages s and u, with s being vastly more popular than u, i.e.,
ws (cid:29) wu. Without diminishing returns (under objective f1), the
marginal gains of candidates from s will nearly always dominate
those of candidates from u (i.e., ws pst (cid:29) wu puv for most (s,t) and
(u,v)), so u would not even be considered before s has been fully
saturated with links. With diminishing returns, on the contrary, s
would gradually become a less preferred source for new links. In
other words, there is a trade-off between the popularity of s on the
one hand (if s is frequently visited then links that are added to it
get more exposure and are therefore more frequently used), and its
'crowdedness' with good links, on the other.
As a side note we observe that, when measuring 'crowdedness',
f2 only considers the newly added links A, whereas f3 also takes the
pre-existing links E into account. In our evaluation (Sec. 6.1.3), we
will see that the latter amplifies the effect of diminishing returns.
2.3 Algorithm for maximizing the objectives
We now show how to efficiently maximize the three objective func-
tions. We first state two key observations that hold for all three
ΣE ←(cid:80)
clickthrough rates pst; budget K; objective f
Algorithm 1 Greedy marginal-gain link placement
Input: Hyperlink graph G = (V,E); source-page weights ws;
Output: Set A of links that maximizes f (A) subject to A ≤ K
1: Q ← new priority queue
2: for s ∈ V do
// sum of pst values of old links from s
(s,t)∈E pst
3:
Σ ← 0
// sum of new pst values seen so far for s
4:
5: Π ← 1
// product of new (1− pst ) values seen so far for s
C ← 0
// current objective value for s
6:
for t ∈ V in decreasing order of pst do
7:
8:
9:
10:
11:
12:
13:
14:
15:
16: end for
17: A ← top K elements of Q
Σ ← Σ + pst
Π ← Π· (1− pst )
if f = f1 then C(cid:48) ← ws · Σ
else if f = f2 then C(cid:48) ← ws · (1− Π)
else if f = f3 then C(cid:48) ← ws · Σ/(Σ + ΣE )
Insert (s,t) into Q with the marginal gain C(cid:48) −C as value
C ← C(cid:48)
end for
objectives and then describe an algorithm that builds on these ob-
servations to find a globally optimal solution:
1. For a single source page s, the optimal solution is given by
the top K pairs (s,t) with respect to pst.
2. Sources are 'independent': the contribution of links from s to
the objective does not change when adding links to sources
other than s. This follows from Eq. 4–6, by noting that only
links from s appear in the expressions inside the outer sums.
These observations imply that the following simple, greedy algo-
rithm always produces an optimal solution1 (pseudocode is listed in
Algorithm 1). The algorithm processes the data source by source.
For a given source s, we first obtain the optimal solution for s alone
by sorting all (s,t) with respect to pst (line 7; cf. observation 1).
Next, we iterate over the sorted list and compute the marginal gains
of all candidates (s,t) from s (lines 7–15). As marginal gains are
computed, they are stored in a global priority queue (line 13); once
computed, they need not be updated any more (cf. observation 2).
Finally, we return the top K from the priority queue (line 17).
3. ESTIMATING CLICKTHROUGH RATES
In our above exposition of the link placement problem, we assumed
we are given a clickthrough rate pst for each link candidate (s,t).
However, in practice these values are undefined before the link is
introduced. Therefore, we need to estimate what the clickthrough
rate for each nonexistent link would be in the hypothetical case that
the link were to be inserted into the site.
Here we propose four ways in which historical web server logs
can be used for estimating pst for a nonexistent link (s,t). Later
(Sec. 6.1.1) we evaluate the resulting predictors empirically.
Method 1: Search proportion. What we require are indicators
of users' need to transition from s to t before the direct link (s,t)
1For maximizing general submodular functions (Eq. 9), a greedy
algorithm gives a (1− 1/e)-approximation [20]. But in our case,
observation 2 makes greedy optimal: our problem is equivalent to
finding a maximum-weight basis of a uniform matroid of rank K
with marginal gains as weights; the greedy algorithm is guaranteed
to find an optimal solution in this setting [10].
pages when the target page is t
Algorithm 2 Power iteration for estimating path proportions from
pairwise transitions probabilities
Input: Target node t, pairwise transition matrix P with Pst = pst
Output: Vector Qt of estimated path proportions for all source
1: Qt ← (0, . . . ,0)T
2: Qtt ← 1
3: Q(cid:48)
t ← (0, . . . ,0)T
4: while (cid:107)Qt − Q(cid:48)
Q(cid:48)
t ← Qt
5:
Qt ← PQt
6:
Qtt ← 1
7:
8: end while
// recursive case of Eq. 10
// base case of Eq. 10
// used for storing the previous value of Qt
t(cid:107) > ε do
st /Ns, where N∗
exists. Many websites provide a search box on every page, and
thus one way of reaching t from s without taking a direct click is to
'teleport' into t by using the search box. Therefore, if many users
search for t from s we may interpret this as signaling the need to go
from s to t, a need that would also be met by a direct link. Based
on this intuition, we estimate pst as the search proportion of (s,t),
defined as the number of times t was reached from s via search,
divided by the total number Ns of visits to s.
Method 2: Path proportion. Besides search, another way of
reaching t from s without a direct link is by navigating on an in-
direct path. Thus, we may estimate pst as the path proportion of
(s,t), defined as N∗
st is the observed number of navi-
gation paths from s to t. In other words, path proportion measures
the average number of paths to t, conditioned on first seeing s.
Method 3: Path-and-search proportion. Last, we may also com-
bine the above two metrics. We may interpret search queries as a
special type of page view, and the paths from s to t via search may
then be considered indirect paths, too. Summing search proportion
and path proportion, then, gives rise to yet another predictor of pst.
We refer to this joint measure as the path-and-search proportion.
Method 4: Random-walk model. The measures introduced above
require access to rather granular data: in order to mine keyword
searches and indirect navigation paths, one needs access to com-
plete server logs. Processing large log datasets may, however, be
computationally difficult. Further, complete logs often contain per-
sonally identifiable information, and privacy concerns may thus
make it difficult for researchers and analysts to obtain unrestricted
log access. For these reasons, it is desirable to develop clickthrough
rate estimation methods that manage to make reasonable predic-
tions based on more restricted data. For instance, although the
Wikipedia log data used in this paper is not publicly available, a
powerful dataset derived from it, the matrix of pairwise transition
counts between all English Wikipedia articles, was recently pub-
lished by the Wikimedia Foundation [34]. We now describe an
algorithm for estimating path proportions solely based on the pair-
wise transition counts for those links that already exist.
As defined above, the path proportion measures the expected
number of paths to t on a navigation trace starting from s; we de-
note this quantity as Qst here. For a random walker navigating the
network according to the empirically measured transitions proba-
bilities, the following recursive equation holds:
if s = t,
otherwise.
(10)
The base case states that the expected number of paths to t from t
itself is 1 (i.e., the random walker is assumed to terminate a path
(cid:40)
(cid:80)
1
Qst =
u psuQut
as soon as t is reached). The recursive case defines that, if the
random walker has not reached t yet, he might do so later on, when
continuing the walk according to the empirical clickthrough rates.
Solving the random-walk equation. The random-walk equation
(Eq. 10) can be solved by power iteration. Pseudocode is listed as
Algorithm 2. Let Qt be the vector containing as its elements the
estimates Qst for all pages s and the fixed target t. Initially, Qt has
entries of zero for all pages with the exception of Qtt = 1, as per the
base case of Eq. 10 (lines 1–2). We then keep multiplying Qt with
the matrix of pairwise transition probabilities, as per the recursive
case of Eq. 10 (line 6), resetting Qtt to 1 after every step (line 7).
Since this reset step depends on the target t, the algorithm needs to
be run separately for each t we are interested in.
The algorithm is guaranteed to converge to a fixed point under
s pst < 1 for all t (proof omitted for concise-
the condition that(cid:80)
ness), which is empirically the case in our data.
4. DATASETS AND LOG PROCESSING
In this section we describe the structure and processing of web
server logs. We also discuss the properties of the two websites
we work with, Wikipedia and Simtk.
4.1 From logs to trees
Log format. Web server log files contain one entry per HTTP
request, specifying inter alia: timestamp, requested URL, referer
URL, HTTP response status, user agent information, client IP ad-
dress, and proxy server information via the HTTP X-Forwarded-
For header. Since users are not uniquely identifiable by IP ad-
dresses (e.g., several clients might reside behind the same proxy
server, whose IP address would then be logged), we create an ap-
proximate user ID by computing an MD5 digest of the concate-
nation of IP address, proxy information, and user agent. Common
bots and crawlers are discarded on the basis of the user agent string.
From logs to trees. Our goal is to analyze the traces users take
on the hyperlink network of a given website. However, the logs do
not represent these traces explicitly, so we first need to reconstruct
them from the raw sequence of page requests.
We start by grouping requests by user ID and sorting them by
time. If a page t was requested by clicking a link on another page s,
the URL of s is recorded in the referer field of the request for t. The
idea, then, is to reassemble the original traces from the sequence
of page requests by joining requests on the URL and referer fields
while preserving the temporal order. Since several clicks can be
made from the same page, e.g., by opening multiple browser tabs,
the navigation traces thus extracted are generally trees.
While straightforward in principle, this method is unfortunately
unable to reconstruct the original trees perfectly. Ambiguities arise
when the page listed in the referer field of t was visited several
times previously by the same user. In this situation, linking t to all
its potential predecessors results in a directed acyclic graph (DAG)
rather than a tree. Transforming such a DAG into a tree requires
a heuristic approach. We proceed by attaching a request for t with
referer s to the most recent request for s by the same user. If the
referer field is empty or contains a URL from an external website,
the request for t becomes the root of a new tree.
Not only is this greedy strategy intuitive, since it seems more
likely that the user continued from the most recent event, rather
than resumed an older one; it also comes with a global optimality
guarantee. More precisely, we observe that in a DAG G with edge
weights w, attaching each internal node v to its minimum-weight
parent argminu wuv yields a minimum spanning tree of G. We fol-
(a) Tree properties
(b) New-link usage
Figure 2: Wikipedia dataset statistics. (a) CCDF of size and
average degree of navigation trees. (b) CCDF of clickthrough
rate for various source-page out-degrees. (Log–log scales.)
low this approach with time differences as edge weights. Hence,
the trees produced by our heuristic are the best possible trees under
the objective of minimizing the sum (or mean) of all time differ-
ences spanned by the referer edges.
Mining search events. When counting keyword searches, we con-
sider both site-internal search (e.g., from the Wikipedia search box)
and site-external search from general engines such as Google, Ya-
hoo, and Bing. Mining internal search is straightforward, since all
search actions are usually fully represented in the logs. An external
search from s for t is defined to have occurred if t has a search en-
gine as referer, if s was the temporally closest previous page view
by the user, and if s occurred at most 5 minutes before t.
4.2 Wikipedia data
Link graph. The Wikipedia link graph is defined by nodes repre-
senting articles in the main namespace, and edges representing the
hyperlinks used in the bodies of articles. Furthermore, we use the
English Wikipedia's publicly available full revision history (span-
ning all undeleted revisions from 2001 through April 3, 2015) to
determine when links were added or removed.
Server logs. We have access to Wikimedia's full server logs, con-
taining all HTTP requests to Wikimedia projects. We consider only
requests made to the desktop version of the English Wikipedia.
The log files we analyze comprise 3 months of data, from January
through March 2015. For each month we extracted around 3 billion
navigation trees. Fig. 2(a) summarizes structural characteristics of
trees by plotting the complementary cumulative distribution func-
tions (CCDF) of the tree size (number of page views) and of the
average degree (number of children) of non-leaf page views per
tree. We observe that trees tend to be small: 77% of trees consist of
a single page view; 13%, of two page views; and 10%, of three or
more page views. Average degrees also follow a heavy-tailed dis-
tribution. Most trees are linear chains of all degree-one nodes, but
page views with larger numbers of children are still quite frequent;
e.g., 6% (44 million per month) of all trees with at least two page
views have an average degree of 3 or more.
4.3 Simtk data
Our second log dataset stems from Simtk.org, a website where
biomedical researchers share code and information about their proj-
ects. We analyze logs from June 2013 through February 2015.
Contrasting Simtk and Wikipedia, we note that the Simtk dataset
is orders of magnitude smaller than the Wikipedia dataset, in terms
of both pages and page views, at hundreds, rather than millions,
of pages, and tens of millions, rather than tens of billions, of page
12510502001e−051e−031e−01nPr(X‡n)X = tree sizeX = average degree (num. children)0.0010.0100.1001.0001e−061e−041e−021e+00Mininum pstFraction of new linksOut−deg. [1, 30)Out−deg. [30, 61)Out−deg. [61, 140)Out−deg. [140, 5601)In the multi-tab browsing model with its independence assump-
tion (Sec. 2.1), we would see no competition between links; the
larger the out-degree of s, the larger the expected number of clicks
from s for fixed pst. In its pure form, this model seems unlikely to
be true, since it would imply a reader scanning the entire page, eval-
uating every link option separately, and choosing to click it with its
probability pst. In a less extreme form, however, it is well conceiv-
able that adding many good links to a page s might significantly
increase the number of links a given user chooses to follow from s.
In Sec. 5.1 we already saw that links from pages of higher out-
degree tend to have lower individual clickthrough rates, which may
serve as a first sign of competition, or interaction, between links.
As our link placement method is allowed to propose only a limited
number of links, the question of interaction between links is of cru-
cial importance. Next we investigate this question more carefully.
First we define the navigational degree ds of s to be the total
number of transitions out of s, divided by the total number of times
s was seen as an internal node of a tree, i.e., without stopping there:
(cid:80)
ds =
t(cid:54)=∅ Nst
Ns − Ns∅
.
(11)
In other words, the navigational degree of s is simply the average
number of transitions users make out of s, given that they do not
stop in s. We also define the structural degree, or out-degree, of s
to be the number of pages s links to.
Next, we examine the relation of the structural degree of s with
(1) the probability of stopping at s and (2) the navigational degree
of s, across a large and diverse set of pages s.
Fig. 4(a), which has been computed from the transition counts
for 300,000 articles in January 2015, shows that stopping is less
likely on pages of larger structural degree, with a median stopping
probability of 89% for pages with less than 10 out-links, and 76%
for pages with at least 288 out-links. Additionally, given that users
do not stop in s, they make more clicks on average when s offers
more links to follow (median 1.00 for less than 10 out-links vs. 1.38
for 288 or more out-links; Fig. 4(b)).
These effects could be explained by two hypotheses. It is possi-
ble that (i) simply adding more links to a page also makes it more
likely that more links are taken; or (ii) structural degree may be
correlated with latent factors such as 'interestingness' or 'topical
complexity': a more complex topic s will have more connections
(i.e., links) to other topics that might be relevant for understanding
s; this would lead to more clicks from s to those topics, but not sim-
ply because more link options are present but because of inherent
properties of the topic of s.
To decide which hypothesis is true, we need to control for these
inherent properties of s. We do so by tracking the same s through
time and observing whether changes in structural degree are cor-
related with changes in navigational degree for fixed s as well. In
particular, we consider two snapshots of Wikipedia, one from Jan-
uary 1, 2015, and the other from March 1, 2015. We take these
snapshots as the approximate states of Wikipedia in the months of
January and March, respectively. Then, we compute structural and
navigational degrees, as well as stopping probabilities, based exclu-
sively on the links present in these snapshots, obtaining two sepa-
rate values for each quantity, one for January and one for March.
For a fixed page s, the difference between the March and January
values now captures the effect of adding or removing links from s
on the stopping probability and the navigational degree of s.
Fig. 4(c) and 4(d) show that this effect is minuscule, thus lending
support to hypothesis ii from above: as structural degree grows
or shrinks, both stopping probability (Fig. 4(c)) and navigational
degree (Fig. 4(d)) vary only slightly, even for drastic changes in
(a)
(b)
Figure 3: Clickthrough rate as function of (a) source-page out-
degree and (b) relative position of link in wiki markup of source
page (0 is top; 1 is bottom). Lower bin boundaries on x-axis.
views. Simtk's hyperlink structure is also significantly less dense
than Wikipedia's. On the one hand, this means that there is much
improvement to be made by a method such as ours; on the other
hand, it also means that the navigation traces mined from the logs
are less rich than for Wikipedia. Therefore, instead of extracting
trees, we extract sessions, defined here as sequences of page views
with idle times of no more than one hour [13] between consecu-
tive events. Further, to be consistent, we compute path proportions
(Sec. 3) by tallying up how often s occurred before t in the same
session, rather than on a path in the same tree.
5. EVALUATION: EFFECTS OF NEW LINKS
The goal of this section is to investigate the effects of adding new
links and assess some of the assumptions we made when formulat-
ing the link placement problem (Sec. 2). In particular, we answer
the following questions: First, how much click volume do new links
receive? Second, are several new links placed in the same source
page independent of each other, or do they compete for clicks?
To answer these questions, we consider the around 800,000 links
(s,t) added to the English Wikipedia in February 2015 and study
all traces involving s in the months of January and March 2015.
5.1 Usage of new links
In the introduction we have already alluded to the fact that new
links tend to be rarely used, to the extent that 66% of the links
added in February were not used even a single time in March, and
only 1% were used more than 100 times (Fig. 1).
While Fig. 1 plots absolute numbers, Fig. 2(b) shows the com-
plementary cumulative distribution function (CCDF) of the click-
through rate pst, stratified by the out-degree of the source page s.
We observe that, depending on source-page out-degree, between
3% and 13% of new links achieve over 1% clickthrough, with higher
values for lower-degree source pages. This finding is confirmed by
Fig. 3(a), which plots the clickthrough rate pst against source-page
out-degree and shows a strong negative trend.
Finally, Fig. 3(b) confirms the fact that the popularity of a link is
also correlated with its position in the source page [16], with links
appearing close to the top of the page achieving a clickthrough rate
about 1.6 times as high as that of links appearing in the center, and
about 3.7 times as high as that of links appearing at the bottom.
5.2 Competition between links
Traces are generally trees, not chains (Sec. 4.1). While in chains,
t pst = 1, this
is not necessary in trees, where several next pages may be opened
from the same page s, such that, in the most extreme case (when all
pst would form a distribution over t given s, i.e.,(cid:80)
pst = 1),(cid:80)
t pst may equal the out-degree of s.
0.0010.0040.0071172635466183114175310Source−page out−degreepst0.0020.00400.1090.2270.3540.4790.5960.70.7980.8870.954Relative link positionpstPath prop.
Search prop.
P&S prop.
Rand. walks
Mean baseln.
Mean absolute err.
0.0057 (±0.0003)
0.0070 (±0.0004)
0.0057 (±0.0003)
0.0060 (±0.0004)
0.0072 (±0.0004)
Pearson corr.
0.58 (±0.12)
0.49 (±0.22)
0.61 (±0.13)
0.53 (±0.13)
0.20 (±0.06)
Spearman corr.
0.64 (±0.01)
0.17 (±0.02)
0.64 (±0.01)
0.59 (±0.02)
0.34 (±0.02)
Table 1: Comparison of clickthrough rate estimation methods
on Wikipedia, with bootstrapped 95% confidence intervals.
whether a large predicted pst value indeed also means that the link
is worthy of addition. Last, we investigate the behavior of our al-
gorithm for link placement under budget constraints.
We also developed a graphical user interface that makes it easy
to add missing links to Wikipedia: users are shown our suggestions
and accept or decline them with the simple click of a button [24].
6.1.1 Estimating clickthrough rates
As described in Sec. 5, we have identified 800,000 links that were
added to the English Wikipedia in February 2015. Here we evaluate
how well we can predict the clickthrough rates pst of these links in
March 2015 from log data of January 2015, i.e., before the link was
added. In particular, we compare five different methods (Sec. 3):
1. search proportion,
2. path proportion,
3. the combined path-and-search proportion,
4. random walks, and
5. a mean baseline.
The mean baseline makes the same prediction for all candidates
originating in the same source page s, namely the average click-
through rate of all out-links of s that already exist.
Table 1 evaluates the results using three different metrics: mean
absolute error, Pearson correlation, and Spearman rank correlation.
The table shows that across all metrics path proportion and path-
and-search proportion perform best. Further, it is encouraging to
see that the random-walk–based predictor, which only requires the
pairwise transition matrix, is not lagging behind by much. Also,
recall from Fig. 3(a) that pst is to a large part determined by source-
page out-degree. This is why the mean baseline performs quite well
(mean absolute error of 0.72%, vs. 0.57% achieved by the best-
performing method) even though it predicts the same value for all
links from the same page (but see the next section for when the
baseline fails). For a graphical perspective on the relation between
predicted and ground-truth values, we refer to Fig. 5(a) and 5(b).
6.1.2 Predicting link addition
Our models for clickthrough prediction reason about the hypothet-
ical scenario that a link (s,t) is added to the site. In the previous
subsection we showed that the models manage to predict the future
usage of a link fairly well for the subset of links that were actu-
ally added. But, as stated above, this set is not known when the
predictors are deployed in practice.
Intuitively, a large predicted clickthrough rate pst should also
imply that (s,t) is a useful link and should thus be added. Here
we test whether this is actually the case by evaluating whether our
high-ranking predictions using the January data correspond to links
that were added to Wikipedia in February.
For this task, we need a ground-truth set of positive and negative
examples. We require a non-negligible number of positive exam-
ples for which our methods can potentially predict a high pst value.
Since our methods are based mainly on path and search counts, we
therefore consider all links added in February with at least 10 in-
direct paths or searches in January; call this set L. Since in reality
(a)
(c)
(b)
(d)
Figure 4: Across different source pages, structural degree is (a)
negatively correlated with stopping probability, and (b) pos-
itively correlated with navigational degree. When fixing the
source page, however, structural degree has only a small effect
on (c) stopping probability and (d) navigational degree. The y-
axes in (c) and (d) are relative with respect to the values from
January. Lower bin boundaries on x-axes. Boxes show quar-
tiles; whiskers show the full range without outliers.
link structure; e.g., when 100 links or more are added, the median
relative increase in navigational degree is still only 0.3%, and when
100 links are deleted, the median relative decrease is only 0.1%.
This is not to say that adding links has no effect at all, but this
effect stems from extreme, rather than typical, values, as indicated
by the upward (downward) shift of interquartile ranges (Fig. 4(d))
as links are added (removed).
In a nutshell, simply adding more links does not increase the
overall number of clicks taken from a page. Instead, links compete
with each other for user attention. This observation has important
implications for user modeling and hence for budget-constrained
link placement algorithms: one should avoid spending too much
of one's budget on the same source page, since this will not in-
crease click volume indefinitely; rather, one should spread high-
clickthrough links across many different source pages.
These findings justify, post hoc, the diminishing-returns proper-
ties of the objective functions f2 and f3 (Sec. 2.2).
6. EVALUATION: LINK PLACEMENT
Next we demonstrate the universality of our approach by evaluating
it on two very different websites, Wikipedia and Simtk.
6.1 Wikipedia
The analysis of results for Wikipedia is divided into three parts.
First, we show that the estimation methods from Sec. 3 are suited
for predicting the clickthrough rates of new links. Since the eval-
uation set of added links is known only after the fact, a practically
useful system must have the additional ability to identify such links
on its own before they are introduced. Therefore, we then check
11017263854791151752880.40.50.60.70.80.91.0Structural degreeStopping probability11017263854791151752881.01.21.41.61.82.02.2Structural degreeNavigational degree−Inf−100−10−10110100−0.2−0.10.00.10.2Structural−degree differenceStopping−probability difference−Inf−100−10−10110100−0.2−0.10.00.10.2Structural−degree differenceNavigational−degree difference(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
Figure 5: Wikipedia results. (a) Path proportion vs. clickthrough rate. (b) Search proportion vs. clickthrough rate (log–log; black
lines correspond to gray dots kernel-smoothed on linear scales). (c) Precision at k on link prediction task (Sec. 6.1.2; logarithmic
x-axis); path-and-search proportion nearly identical to path proportion and thus not shown. (d–h) Results of budget-constrained
link placement for objectives of Eq. 4–6 (Sec. 6.1.3); 'prior cumulative clickthrough' refers to second term in denominator of Eq. 6.
most page pairs are never linked, we also need to add a large num-
ber of negative examples to the test set. We do so by including all
out-links of the sources, and in-links of the targets, appearing in L.
Using this approach, we obtain a set of about 38 million link can-
didates, of which 9,000 are positive examples. The aforementioned
threshold criterion is met by 7,000 positive, and 104,000 negative,
examples. Therefore, while there is a fair number of positive exam-
ples with many indirect paths and searches, they are vastly outnum-
bered by negative examples with that same property; this ensures
that retrieving the positive examples remains challenging for our
methods (e.g., returning all links meeting the threshold criterion in
random order yields a precision of only 6%).
Given this labeled dataset, we evaluate the precision at k of the
candidate ranking induced by the predicted pst values. The results,
plotted in Fig. 5(c), indicate that our methods are well suited for
predicting link addition. Precision stays high for a large set of top
predictions: of the top 10,000 predictions induced by the path-pro-
portion and random-walk measures, about 25% are positive exam-
ples; among the top 2,000 predictions, as many as 50% are positive.
As before, random walks perform nearly as well as the more data-
intensive path proportion, and better than search proportion.
Note that the mean baseline, which performed surprisingly well
on the clickthrough rate prediction task (Sec. 6.1.1), does not ap-
pear in the plot. The reason is that it fails entirely on this task, pro-
ducing only two relevant links among its top 10,000 predictions.
We conclude that it is easy to give a good pst estimate when it is
known which links will be added. However, predicting whether a
link should be added in the first place is much harder.
6.1.3 Link placement under budget constraints
The above evaluations concerned the quality of predicted pst val-
ues. Now we rely on those values being accurate and combine them
in our budget-constrained link placement algorithm (Sec. 2.3). We
use the pst values from the path-proportion method.
First, we consider how similar the solutions produced by the dif-
ferent objective functions are. For this purpose, Fig. 5(d)) plots the
Jaccard coefficients between the solutions of f1 and f2 (orange) and
between the solutions of f1 and f3 (blue) as functions of the solu-
tion size K. We observe that f1 and f2 produce nearly identical so-
lutions. The reason is that clickthrough rates pst are generally very
small, which entails that Eq. 4 and 5 become very similar (formally,
this can be shown by a Taylor expansion around 0). Objective f3,
on the contrary, yields rather different solutions; it tends to favor
source pages with fewer pre-existing high-clickthrough links (due
to the second term in the denominator of Eq. 6; Fig. 5(e)) and at-
tempts to spread links more evenly over all source pages (Fig. 5(f)).
In other words, f3 offers a stronger diminishing-returns effect: the
marginal value of more links decays faster when some good links
have already been added to the same source page.
Next, we aim to assess the impact of our suggestions on real Wi-
kipedia users. Recall that we suggest links based on server logs
from January 2015. We quantify the impact of our suggestions in
terms of the total number of clicks they received in March 2015
(contributed by links added by editors after January). Fig. 5(g),
which plots the total March click volume as a function of the so-
lution size K, shows that (according to f3) the top 1,000 links re-
ceived 95,000 clicks in total in March 2015, and the top 10,000 re-
ceived 336,000 clicks. Recalling that two-thirds of all links added
by humans receive no click at all (Fig. 1), this clearly demonstrates
the importance of the links we suggest. Fig. 5(h) displays the av-
erage number of clicks per suggested link as a function of K. The
decreasing shape of the curves implies that higher-ranked sugges-
tions received more clicks, as desired. Finally, comparing the three
objectives, we observe that f3 fares best on the Wikipedia dataset:
its suggestions attract most clicks (Fig. 5(g) and 5(h)), while also
being spread more evenly across source pages (Fig. 5(f)).
These results show that the links we suggest fill a real user need.
Our system recommends useful links before they would normally
1e−051e−031e−011e−051e−031e−01Path proportionGround−truth clickthrough rate pst1e−051e−031e−011e−051e−031e−01Search proportionGround−truth clickthrough rate pst1101001000100000.00.20.40.60.81.0Rank kPrecision@kPath proportionSearch proportionRandom walks020006000100000.00.20.40.60.81.0Solution overlapSize K of solution AJaccard coefficientf1 vs. f2f1 vs. f3020006000100000.40.50.60.70.8Prior cumulative clickthroughSize K of solution AMean prior cumulative clickthroughf1f2f3020006000100001.01.52.02.53.0Solution concentrationSize K of solution ATargets per source page in Af1f2f3020006000100000100000250000Total click volumeSize K of solution ATotal number of clicksf1f2f302000600010000406080100Average click volumeSize K of solution AAverage number of clicksf1f2f3Spearman corr.
Mean absolute err.
0.020 (±0.003)
0.50 (±0.09)
Path prop.
0.013 (±0.003) −0.01 (±0.11) −0.27 (±0.10)
Mean baseln.
Table 2: Performance of path-proportion clickthrough estima-
tion on Simtk, with bootstrapped 95% confidence intervals.
Pearson corr.
0.41 (±0.10)
term and the numerator; with the first link added to s, the ratio in
Eq. 6 becomes close to 1, and the contribution of s to f3 close to
its possible maximum ws. Thereafter, the objective experiences ex-
treme diminishing returns for s. Fig. 6(b) confirms that f3 starts by
inserting one link into each of the around 750 pages.
We conclude that with few pre-existing links, the page-centric
multi-tab objective f2 might be better suited than the single-tab ob-
jective f3, as it provides a more balanced trade-off between the
number of links per source page and predicted clickthrough rates.
(a)
(b)
Figure 6: Simtk results. (a) Path proportion vs. clickthrough
rate (black line corresponds to gray dots kernel-smoothed on
linear scales). (b) Solution concentration of budget-constrained
link placement; dotted vertical line: number of distinct pages.
be added by editors, and it recommends additional links that we
may assume would also be clicked frequently if they were added.
Table 3 illustrates our results by listing the top link suggestions.
6.2 Simtk
It is important to show that our method is general, as it relies on no
features specific to Wikipedia. Therefore, we conclude our evalu-
ation with a brief discussion of the results obtained on the second,
smaller dataset from Simtk.
For evaluating our approach, we need to have a ground-truth set
of new links alongside their addition dates. Unlike for Wikipe-
dia, no complete revision history is available for Simtk, but we can
nonetheless assemble a ground truth by exploiting a specific event
in the site's history: after 6 months of log data, a sidebar with links
to related pages was added to all pages. These links were deter-
mined by a recommender system once and did not change for 6
months. Our task is to predict these links' clickthrough rates pst
for the 6 months after, based on log data from the 6 months before.
The results on the pst prediction task are summarized in Table 2;
we compare path proportion to the mean baseline (cf. Sec. 6.1.1).
At first glance, when considering only mean absolute error, it might
seem as though the former were outperformed by the latter. But
upon closer inspection, we realize that this is simply because the
baseline predicts very small values throughout, which tend to be
close to the ground-truth values, but cannot discriminate between
good and bad candidates, as signified by the negative correlation
coefficients. Path proportion, on the contrary, does reasonably well,
at Pearson (Spearman) correlation coefficients of 0.41 (0.50). This
correlation can be observed graphically in Fig. 6(a).
Last, we analyze the solutions of our budget-constrained link
placement algorithm. Our first observation is that the two multi-tab
objectives f1 and f2 differ much more on Simtk than on Wikipe-
dia (with Jaccard coefficients between 40% and 60%, compared to
over 90%), which shows that the page-centric multi-tab objective
f2 is not redundant but adds a distinct option to the repertoire.
We also observe that the value of the single-tab objective f3 sat-
urates after inserting around as many links as there are pages (750).
The reason is that only very few links were available and clicked
before the related-link sidebar was added, so the second term in
the denominator of Eq. 6 is typically much smaller than the first
7. DISCUSSION AND RELATED WORK
There is a rich literature on the task of link prediction and rec-
ommendation, so rather than trying to be exhaustive, we refer the
reader to the excellent survey by Liben-Nowell and Kleinberg [17]
and to some prior methods for the specific case of Wikipedia [11,
19, 22, 32], as it is also our main evaluation dataset. The important
point to make is that most prior methods base their predictions on
the static structure of the network, whereas we focus on how users
interact with this static structure by browsing and searching on it.
Among the few link recommendation methods that take usage
data into account are those by Grecu [12] and West et al. [31].
They leverage data collected through a human-computation game
in which users navigate from a given start to a given target page
on Wikipedia, thereby producing traces that may be used to recom-
mend new 'shortcut' links from pages along the path to the target
page. Although these approaches are simple and work well, they
are limited by the requirement that the user's navigation target be
explicitly known. Eliciting this information is practically difficult
and, worse, may even be fundamentally impossible: often users do
not have any target in mind, e.g., during exploratory search [18] or
when browsing the Web for fun or distraction. Our approach allevi-
ates this problem, as it does not rely on a known navigation target,
but rather works on passively collected server logs.
Further literature on human navigation includes information for-
aging [4, 23, 25, 30], decentralized network search [14, 15, 29],
and the analysis of click trails from search result pages [3, 9, 33].
In the present work we assume that frequent indirect paths be-
tween two pages indicate that a direct link would be useful. While
this is confirmed by the data (Fig. 5(a)), research has shown that
users sometimes deliberately choose indirect routes [28], which
may offer additional value [33]. Detecting automatically in the logs
when this is the case would be an interesting research problem.
Our method is universal in the sense that it uses only data logged
by any commodity web server software, without requiring access
to other data, such as the content of pages in the network. We
demonstrate this generality by applying our method on two rather
different websites without modification. While this is a strength of
our approach, it would nonetheless be interesting to explore if the
accuracy of our link clickthrough model could be improved by us-
ing machine learning to combine our current estimators, based on
path counts, search counts, and random walks, with domain-spe-
cific elements such as the textual or hypertextual content of pages.
Web server logs capture user needs and behavior in real time, so
another clear advantage of our log-based approach is the timeliness
of the results it produces. This is illustrated by Table 3, where most
suggestions refer to current events, films, music, and books.
Our random-walk model (Sec. 3) builds on a long tradition of
Markovian web navigation models [6, 8, 27]. Among other things,
Markov chains have been used to predict users' next clicks [6, 26]
as well as their ultimate navigation targets [30]. Our model might
be improved by using a higher-order Markov model, based on work
by Chierichetti et al. [5], who found that human browsing is around
10% more predictable when considering longer contexts.
2e−042e−032e−022e−012e−042e−032e−022e−01Path proportionGround−truth clickthrough rate pst050010001500200012345Solution concentrationSize K of solution ATargets per source page in Af1f2f3(a) Page-centric multi-tab objective f2
Source
ITunes Originals – Red Hot
Target
Road Trippin' Through Time
(b) Single-tab objective f3
Source
ITunes Originals – Red Hot
Target
Road Trippin' Through Time
*
*
*
*
Chili Peppers
* Gran Hotel
*
* Nordend
*
Tithe: A Modern Faerie Tale
Jacob Aaron Estes
Blame It on the Night
Internat. Handball Federation
The Choice (novel)
Payback (2014)
Just Dave Van Ronk
Grand Hotel (TV series)
Ironside: A Modern Faery's Tale
Category:Mountains of the Alps
The Details (film)
Blame (Calvin Harris song)
2015 World Men's Handball Champ.
Benjamin Walker (actor)
Royal Rumble (2015)
No Dirty Names
*
*
Chili Peppers
Internat. Handball Federation
Baby, It's OK!
Payback (2014)
* Nordend
* Gran Hotel
*
*
Edmund Ironside
Jacob Aaron Estes
Confed. of African Football
Live Rare Remix Box
2015 World Men's Handball Champ.
Olivia (singer)
Royal Rumble (2015)
Category:Mountains of the Alps
Grand Hotel (TV series)
Edward the Elder
The Details (film)
2015 Africa Cup of Nations
Road Trippin' Through Time
Table 3: Top 10 link suggestions of Algorithm 1 using objectives f2 and f3. Clickthrough rates pst estimated via path proportion
(Sec. 3). Objective f1 (not shown) yields same result as f2 but includes an additional link for source page Baby, It's OK!, demonstrating
effect of diminishing returns on f2. Asterisks mark links added by editors after prediction time, independently of our predictions.
A further route forward would be to extend our method to other
types of networks that people navigate. For instance, citation net-
works, knowledge graphs, and some online social networks could
all be amenable to our approach. Finally, it would be worthwhile
to explore how our methods could be extended to not only identify
links inside a given website but to also links between different sites.
In summary, our paper makes contributions to the rich line of
work on improving the connectivity of the Web. We hope that
future work will draw on our insights to increase the usability of
websites as well as the Web as a whole.
Acknowledgments. This research has been supported in part by NSF IIS-
1016909, IIS-1149837, IIS-1159679, CNS-1010921, NIH R01GM107340,
Boeing, Facebook, Volkswagen, Yahoo, SDSI, and Wikimedia Foundation.
Robert West acknowledges support by a Stanford Graduate Fellowship.
8. REFERENCES
[1] L. Adamic and E. Adar. Friends and neighbors on the Web. Social
Networks, 25(3):211–230, 2003.
[2] E. Adar, J. Teevan, and S. T. Dumais. Large scale analysis of Web
revisitation patterns. In CHI, 2008.
[3] M. Bilenko and R. White. Mining the search trails of surfing crowds:
Identifying relevant websites from user activity. In WWW, 2008.
[4] E. H. Chi, P. Pirolli, K. Chen, and J. Pitkow. Using information scent
to model user information needs and actions and the Web. In CHI,
2001.
[5] F. Chierichetti, R. Kumar, P. Raghavan, and T. Sarlos. Are Web users
really Markovian? In WWW, 2012.
[6] B. D. Davison. Learning Web request patterns. In Web Dynamics.
Springer, 2004.
[7] P. Devanbu, Y.-F. Chen, E. Gansner, H. Müller, and J. Martin. Chime:
Customizable hyperlink insertion and maintenance engine for
software engineering environments. In ICSE, 1999.
[8] D. Downey, S. Dumais, and E. Horvitz. Models of searching and
browsing: Languages, studies, and application. In IJCAI, 2007.
[9] D. Downey, S. Dumais, D. Liebling, and E. Horvitz. Understanding
the relationship between searchers' queries and information goals. In
CIKM, 2008.
[10] J. Edmonds. Matroids and the greedy algorithm. Mathematical
Programming, 1(1):127–136, 1971.
[11] S. Fissaha Adafre and M. de Rijke. Discovering missing links in
Wikipedia. In LinkKDD, 2005.
[12] M. Grecu. Navigability in information networks. Master's thesis,
ETH Zürich, 2014.
[13] A. Halfaker, O. Keyes, D. Kluver, J. Thebault-Spieker, T. Nguyen,
K. Shores, A. Uduwage, and M. Warncke-Wang. User session
identification based on strong regularities in inter-activity time. In
WWW, 2015.
[14] D. Helic, M. Strohmaier, M. Granitzer, and R. Scherer. Models of
human navigation in information networks based on decentralized
search. In HT, 2013.
[15] J. Kleinberg. The small-world phenomenon: An algorithmic
perspective. In STOC, 2000.
[16] D. Lamprecht, D. Helic, and M. Strohmaier. Quo vadis? On the
effects of Wikipedia's policies on navigation. In Wiki-ICWSM, 2015.
[17] D. Liben-Nowell and J. Kleinberg. The link-prediction problem for
social networks. JASIST, 58(7):1019–1031, 2007.
[18] G. Marchionini. Exploratory search: From finding to understanding.
Communications of the ACM, 49(4):41–46, 2006.
[19] D. Milne and I. H. Witten. Learning to link with Wikipedia. In
CIKM, 2008.
[20] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of
approximations for maximizing submodular set functions – I.
Mathematical Programming, 14(1):265–294, 1978.
[21] C. Nentwich, L. Capra, W. Emmerich, and A. Finkelstein. Xlinkit: A
consistency checking and smart link generation service. TOIT,
2(2):151–185, 2002.
[22] T. Noraset, C. Bhagavatula, and D. Downey. Adding high-precision
links to Wikipedia. In EMNLP, 2014.
[23] C. Olston and E. H. Chi. ScentTrails: Integrating browsing and
searching on the Web. TCHI, 10(3):177–197, 2003.
[24] A. Paranjape, R. West, and L. Zia. Project website, 2015.
https://meta.wikimedia.org/wiki/Research:
Improving_link_coverage (accessed Dec. 10, 2015).
[25] P. Pirolli. Information foraging theory: Adaptive interaction with
information. Oxford University Press, 2007.
[26] R. R. Sarukkai. Link prediction and path analysis using Markov
chains. Computer Networks, 33(1):377–386, 2000.
[27] P. Singer, D. Helic, A. Hotho, and M. Strohmaier. HypTrails: A
Bayesian approach for comparing hypotheses about human trails on
the Web. In WWW, 2015.
[28] J. Teevan, C. Alvarado, M. S. Ackerman, and D. R. Karger. The
perfect search engine is not enough: A study of orienteering behavior
in directed search. In CHI, 2004.
[29] C. Trattner, D. Helic, P. Singer, and M. Strohmaier. Exploring the
differences and similarities between hierarchical decentralized search
and human navigation in information networks. In i-KNOW, 2012.
[30] R. West and J. Leskovec. Human wayfinding in information
networks. In WWW, 2012.
[31] R. West, A. Paranjape, and J. Leskovec. Mining missing hyperlinks
from human navigation traces: A case study of Wikipedia. In WWW,
2015.
[32] R. West, D. Precup, and J. Pineau. Completing Wikipedia's hyperlink
structure through dimensionality reduction. In CIKM, 2009.
[33] R. White and J. Huang. Assessing the scenic route: Measuring the
value of search trails in Web logs. In SIGIR, 2010.
[34] E. Wulczyn and D. Taraborelli. Wikipedia Clickstream. Website,
2015. http://dx.doi.org/10.6084/m9.figshare.1305770
(accessed July 16, 2015).
[35] E. Zachte. Wikipedia statistics. Website, 2015.
https://stats.wikimedia.org/EN/TablesWikipediaZZ.htm
(accessed July 16, 2015).
|
1711.11499 | 1 | 1711 | 2017-11-30T16:35:43 | Google matrix of Bitcoin network | [
"cs.SI",
"physics.soc-ph"
] | We construct and study the Google matrix of Bitcoin transactions during the time period from the very beginning in 2009 till April 2013. The Bitcoin network has up to a few millions of bitcoin users and we present its main characteristics including the PageRank and CheiRank probability distributions, the spectrum of eigenvalues of Google matrix and related eigenvectors. We find that the spectrum has an unusual circle-type structure which we attribute to existing hidden communities of nodes linked between their members. We show that the Gini coefficient of the transactions for the whole period is close to unity showing that the main part of wealth of the network is captured by a small fraction of users. | cs.SI | cs | EPJ manuscript No.
(will be inserted by the editor)
Google matrix of Bitcoin network
Leonardo Ermann1, Klaus M. Frahm2 and Dima L. Shepelyansky2
1 Departamento de Física Teórica, GIyA, Comisión Nacional de Energía Atómica, Buenos Aires, Argentina
2 Laboratoire de Physique Théorique du CNRS, IRSAMC, Université de Toulouse, CNRS, UPS, 31062 Toulouse, France
December 1, 2017
Abstract. We construct and study the Google matrix of Bitcoin transactions during the time period from
the very beginning in 2009 till April 2013. The Bitcoin network has up to a few millions of bitcoin users
and we present its main characteristics including the PageRank and CheiRank probability distributions,
the spectrum of eigenvalues of Google matrix and related eigenvectors. We find that the spectrum has an
unusual circle-type structure which we attribute to existing hidden communities of nodes linked between
their members. We show that the Gini coefficient of the transactions for the whole period is close to unity
showing that the main part of wealth of the network is captured by a small fraction of users.
PACS. 89.75.Fb Structures and organization in complex systems – 89.75.Hc Networks and genealogical
trees – 89.20.Hh World Wide Web, Internet
1 Introduction
The bitcoin crypto currency was introduced by Satoshi
Nakamoto in 2009 [1] and became at present an impor-
tant source of direct financial exchange between private
users [2]. At present this new cryptographic manner of fi-
nancial exchange attracts a significant interest of society,
computer scientists, economists and politicians (see e.g.
[3,4,5,6,7]). The amazing feature of bitcoin transactions
is that all of them are open to public at [8] that is drasti-
cally different from usual bank transactions deeply hidden
from the public eye.
Since the data of bitcoin transaction network are open
to public it is rather interesting to analyze the statistical
properties of this Bitcoin network (BCN). Among the first
studies of BTN we quote [9] and [10,11] where the statis-
tical properties of BCN have been studied including the
distribution of ingoing and outgoing transactions (links).
Thus it was shown that a distribution of links is character-
ized by a power law [10,11] which is typical for complex
scale-free networks [12]. Due to this it is clear that the
methods of complex networks, such as the World Wide
Web (WWW) and Wikipedia, should find useful applica-
tions for the BCN analysis. In particular, one can men-
tion in this context the important PageRank algorithm
[13] which is at the foundation of the Google search en-
gine [14]. Applications of this and related algorithms to
various directed networks and related Google matrix are
discussed in [15]. Previous studies of the world trade net-
work [16,17] showed that for financial transactions or re-
lated trade of commodities it is useful to consider also the
CheiRank probabilities for a network with inverted links
[18] and we will use this approach also here. In addition we
analyze the spectrum of the Google matrix of BCN using
the powerful numerical approach of the Arnoldi algorithm
as described in [19,20,21]. We note that a possibility to
use the PageRank probabilities for BCN was briefly noted
in [22].
In our studies we use the bitcoin transaction data col-
lected by Ivan Brugere from the public block chain site
[8] with all bitcoin transactions from the bitcoin birth in
January 11th 2009 till April 2013 [23].
The paper is composed as follows: In Section 2 we
describe the main properties of BCN, the Google ma-
trix is constructed in Section 3, the numerical methods
of its analysis are described in Section 4, the spectrum
and eigenvectors of G matrix are analyzed in Sections 5
and 6, the Gini coefficient of BCN is determined in Section
7 and the discussion is given in Section 8.
2 Global BCN properties
From the bitcoin transaction data [23] of the period from
the very beginning in January 11th 2009 to April 10th
2013, we construct the BCN and related Google matrix.
This weighted and directed network takes into account
the sum of all transactions, measured in units of bitcoin,
from one user to another during a given period of time.
The total number of transactions in this period is Nt =
28.140.756. The minimum transaction value is 10−8 (was
10−3) bitcoin for the period after (before) march 2010.
The global statistical characteristics of transactions
are shown in Figs. 1, 2, 3. Thus Fig.1 shows the fre-
quency histogram Nf (Na), Nf (Nb) of BCN in this pe-
riod, given the dependencies for outgoing links (or sell-
7
1
0
2
v
o
N
0
3
]
I
S
.
s
c
[
1
v
9
9
4
1
1
.
1
1
7
1
:
v
i
X
r
a
2
Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
Fig. 1. (color online) Frequency histograms of BCN Nf in
the period from January 11th 2009 to April 10th 2013. Left
panel shows the frequency distribution Nf of number of sellers
(and buyers) transactions Na (and Nb). Right panel shows the
frequency of transactions with the same given partners Na,b.
ers Na), ingoing links (or buyers Nb), and transactions
of the same partners from a to b (Na,b). The fit of the
data is in a satisfactory agreement with an algebraic de-
cay Nf ∝ 1/Na
β with
β = 2.1 ± 0.1, β = 1.8 ± 0.1, β = 2.2 ± 0.1 respectively.
β, Nf ∝ 1/Na.b
β, Nf ∝ 1/Nb
Top panel of Fig.2 shows the histogram of bitcoin trans-
action volume vm for the whole period (2009-2013) mea-
sured in bitcoin. It is visible that it has peaks in values of
10−8, 10−4 and 1. At the same time there are also transac-
tions with many bitcoins and vm as large as 834352.9. The
balance of each user Bu can be defined as the sum of all
ingoing transactions minus the outgoing ones measured in
bitcoins. This balance Bu is shown in the bottom panel
of Fig.2. For a majority of users the balance is close to
zero but in a few cases Bu is strongly negative or positive.
There are also visible peaks at values Bu = 30, 25, 20, 10.
In order to study BCN time evolution we divide the
whole period of time in year quarters from 2009 to 2013
(we take only half of years in 2009 since the number of
transactions is very small). Some characteristic numbers of
BCN are shown in Fig.3. There is a significant growth with
time for the number of transactions Nt, and the integrated
number of transactions Nit (from the beginning till given
quarter) and the number of nodes N (partners) for the
same period of time.
At the next step we describe the construction of the
Google matrix from the bitcoin transactions described above.
3 Construction of Google matrix of BCN
In this work we use the notation "BCYearQuarter" (e.g.
BC2010Q2) for the different bitcoin networks, eventually
with an additional "*" for the CheiRank case
(e.g.
BC2010Q2*). We consider 16 (or 32 including the
CheiRank cases) networks BC2009Q2, BC2009Q4 to
BC2013Q2 with network sizes N and link numbers N(cid:96)
ranging from N = 142 and N(cid:96) = 117 (BC2009Q2) to N =
6297009 and N(cid:96) = 16056427 (BC2013Q2) with typical
Fig. 2. (color online) Frequency histogram Nf of bitcoin trans-
action volume vm measured in bitcoins on top panel (histogram
is equidistant in log10 vm with a distance of 0.2). Bottom panel
shows the frequency histogram Nf of user balance Bu defined
as the difference between ingoing and outgoing transactions in
bitcoin units. Left and right insets show zoom in vicinity of
zero balance for negative (left) and positive (right) values.
ratios N/N(cid:96) between 1 for the smallest networks and 2.5−
3 for the largest networks. For the whole period of all
quarters we have the total G matrix size N = 6297539
with N(cid:96) = 16056427 links. The values of N, N(cid:96) and total
volume for all quarters are given in Table 1.
As usual we write the matrix associated to such a net-
work as [15,21]:
S = S0 +
1
N
e dT
(1)
where eT = (1, . . . , N ) is the (transpose of the) uniform
vector with unit entries, d is the dangling vector with unit
entries dl = 1 if l corresponds to an empty column of S0
and dl = 0 for the other columns. The elements (S0)lk of
the matrix S0 correspond to the value of the bitcoin trans-
action from a node k to another node l normalized by the
total value of transactions from the node k to all nodes.
A similar construction of S0 is used for the world trade
network [16]. For the CheiRank case [18] the direction of
the transaction is inverted in this scheme, i.e. (S∗
0 )lk cor-
responds to the value of the bitcoin transaction from the
node l to k normalized by the total value of transactions
from all nodes to the node k. According to our raw data
the bitcoin transactions up to 2010Q2 were done in units
of 10−3 bitcoins and afterwards in units of 10−8 bitcoins.
Therefore the raw transaction values and also the resulting
Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
3
Fig. 3. (color online) Characteristic evolution of BCN with
year quarters (halves in 2009) from 2009 to April 2013. Time
evolution is shown for number of transactions Nt in a given
quarter (black circles); number links Nit of integrated trans-
actions from the beginning till given quarter (red squares);
number of nodes given by partners N (green diamonds); and
total volume of bitcoins (blue triangles).
Network
N
N(cid:96)
BC2009Q2
BC2009Q4
BC2010Q1
BC2010Q2
BC2010Q3
BC2010Q4
BC2011Q1
BC2011Q2
BC2011Q3
BC2011Q4
BC2012Q1
BC2012Q2
BC2012Q3
BC2012Q4
BC2013Q1
BC2013Q2
142
220
645
7706
37818
70987
204398
697401
1547349
1885400
2186598
2645532
3742691
4672122
5998239
6297009
117
188
632
11275
57437
111015
333268
1328505
2857232
3635927
4395611
5655802
8381654
11258315
15205087
16056427
total volume
(in bitcoins)
51499
269526
681867
2.33662 × 106
9.0931 × 106
1.86444 × 107
3.44654 × 107
1.30747 × 108
2.0177 × 108
2.87714 × 108
3.2546 × 108
5.04581 × 108
1.02381 × 109
1.17078 × 109
1.29944 × 109
1.31479 × 109
Table 1. Size (N), number of links (N(cid:96)) and total volume of
used networks.
(column sum normalized) entries of the matrix S0 are ra-
tional numbers. For computations using normal precision
numbers (i.e. standard double precision with a mantissa
of 52 bits) these rational numbers can simply be replaced
by the closest floating point number. However, for high
precision computations using the library GMP [24], the
precise rational values were kept as long as possible and,
only when necessary, rounded to high precision floating
point values with their maximal precision.
For the purpose of PageRank computations we also
consider the Google matrix with damping factor α given
by:
G = αS + (1 − α)
1
N
e eT
(2)
Fig. 4. (color online) PageRank and CheiRank distributions
ordered by indices K and K∗ on top and bottom panel re-
spectively. The bitcoin networks are taken by quarters of years
(halves in the case of 2009) for 2009 (yellow), 2010 (red), 2011
(black), 2012 (blue) and 2013 (orange) with lines correspond-
ing to Q1 (solid line), Q2 (dotted line), Q3 (dashed line) and
Q4 (dot-dashed line).
where we use α = 0.85 corresponding to its typical choice
[13,14,15]. For the network with inverted direction of trans-
actions, corresponding to the CheiRank case, we have G∗ =
αS∗ + (1 − α) 1
N e eT .
equation (cid:80)
P (j) ((cid:80)
The right eigenvectors ψm of G are determined by the
j(cid:48) Gjj(cid:48)ψi(j(cid:48)) = λiψi(j) with eigenvalues λi.
At α < 1 the largest eigenvalue is λ = 1 and the corre-
sponding eigenvector has only positive component which
have (for WWW networks) the meaning of probabilities
j P (j) = 1) to find a random surfer on a node
j [14]. We can order all nodes in the order of monotonic
decrease of probability P (K) with maximal probability
at the PageRank index K = 1 and then at K = 2, 3....
In a similar way for the CheiRank case of G∗ we obtain
the CheiRank vector at λ = 1 with CheiRank probability
P ∗(K∗) being maximal at the CheiRank index K∗ = 1
and then at K∗ = 2, 3.... The PageRank vector is effi-
ciently determined by the power iteration algorithm [13,
14].
The dependencies of the PageRank P (K) and CheiRank
P ∗(K∗) probabilities on their indices K, K∗ are shown in
Fig. 4 for various quarters of BCN. We see that the distri-
butions become stabilized at last quarters when the net-
work size becomes larger reaching its steady-state regime.
Thus for BC2013Q1 we find that the probability approx-
imately decays in a power law with P ∝ 1/K ν, P ∗ ∝
1/K∗ν with ν = 0.86 ± 0.06, ν = 0.73 ± 0.04 respectively
(the fit is done for the range 10 < K, K∗ < 105). The value
of ν is similar to the values found for other directed net-
4
Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
works (see e.g. [15,16,17]) but we note that this is only an
approximate description of the numerically found behav-
ior (see detailed discussion of algebraic decay for WWW
networks in [28]).
4 Numerical methods for BCN Google
matrix diagonalization
We describe here the various skillful numerical methods
used for diagonalization of G and G∗. Their use had been
required due to heavy numerical problems for accurate
computation of the eigenvalues of these matrices and re-
lated eigenvectors.
First we introduce the concept of invariant isolated
subsets (for more details we refer to [25]). These subsets
are invariant with respect to applications of S. The re-
maining nodes not belonging to an invariant subset (be-
low a certain maximum size, e.g. 10% of the network size)
form the wholly connected core space. The practical com-
putation of these subsets can be efficiently implemented
in a computer program [25], eventually merging subspaces
with common members, which provides a sequence of dis-
joint subspaces invariant by applications of S. Therefore
we obtain a subdivision of the network nodes in Nc core
space nodes and Ns subspace nodes (belonging to at least
one of the invariant subsets) corresponding to the block
triangular structure of the matrix S:
(cid:18) Sss Ssc
(cid:19)
S =
0 Scc
.
(3)
Here Sss is composed of many small diagonal blocks for
each invariant subspace and whose eigenvalues can be ef-
ficiently obtained by direct ("exact") numerical diagonal-
ization.
We have computed for the networks up to BC2011Q4
(with N = 1884918 and N(cid:96) = 3635927) (a part of) the
complex eigenvalue spectrum of the matrix S (i.e. G(α)
for α = 1) with eigenvalues closest to the unit circle. For
this we employed basically the method of Refs. [25,26]
based on (3) to compute exactly the eigenvalues associ-
ated to the invariant subsets, typically a very modest num-
ber. For each invariant subspace there is at least one unit
eigenvalue λ = 1 which is therefore possibly degenerate (in
case of several invariant subspaces). The remaining eigen-
values associated to the main core space (with λ < 1)
are obtained by the Arnoldi method [27,19] with Arnoldi
dimensions up to nA = 16000. This requires for the net-
work BC2011Q4 a machine with 256 GB (using standard
double precision numbers).
For the larger networks (BC2012Q1 and later) it would
be necessary to increase the available memory or to reduce
the value of nA. However, it turns out that the density
of eigenvalues close to the unit circle is so high that a
significant reduction of nA does not allow to obtain (even
a small number) of reliable core space eigenvalues. This
situation is quite different from other networks such as
certain university networks [25] or Wikipedia [26] where
it was easier to access numerically a reasonable number of
the top core space spectrum of the matrix S. Furthermore
for the cases up to BC2011Q4 we also computed at least 20
eigenvectors of 20 selected (core space) eigenvalues close
to the unit circle such that roughly λj ≈ λj exp(i2πj/19)
for j = 0, . . . , 19 and λj ≈ 1.
BC2009Q4 and BC2010Q1 with N ≤ 645 the core space
eigenvalue spectrum is actually easily accessible by direct
diagonalization or full Arnoldi diagonalization (with some
subtle effects for the small eigenvalues requiring high pre-
cision computations).
For the smallest bitcoin networks BC2009Q2,
The four networks BC2010Q2 and BC2010Q2*
(BC2010Q3 and BC2010Q3*) play a somewhat special
role in our studies since on one hand they are sufficiently
small with N = 7706 (or N = 37818) to allow (at least in
theory) to compute all (or nearly all) non-zero eigenvalues
and on the other hand they are still sufficiently large to
have an interesting spectrum, comparable to the spectra
of the larger networks, especially with a strong concentra-
tion of the majority of (non-vanishing) eigenvalues close
to the unit circle.
However, it turns out that the two cases of BC2010Q2
and BC2010Q2* suffer from a serious numerical problem
similar to the citation network of Physical Review [21].
Using both direct diagonalization (i.e. using Householder
transformations to transform the initial matrix to Hessen-
berg form and final diagonalization of the latter by the QR
algorithm with implicit double shift) and full Arnoldi di-
agonalization (choosing a sufficiently large value of nA and
QR algorithm to diagonalize the Arnoldi matrix which is
also of Hessenberg form) with normal precision floating
point numbers we find that there are several "rings" of
eigenvalues close to the unit circle. The outer two rings
seem to contain reliable and correct eigenvalues but al-
ready the third ring with λ ≈ 0.94 and all rings be-
low are numerically completely unreliable since the corre-
sponding eigenvalues change completely between the two
methods and also different implementations of them (i.e.
applying a permutation in the network nodes but keeping
the same network structure, choosing different ordering in
the summation when computing the scalar products for
the Arnoldi method, using slightly different but mathe-
matical equivalent implementations of the QR algorithm,
using different runs with parallelization which amounts to
different rounding errors for the sums in the scalar prod-
ucts etc.). Therefore we conclude that eigenvalues with
λ < 0.95 are numerically incorrect as long as we use
methods based on normal precision numbers.
This situation is quite similar to the (nearly) triangu-
lar citation network of Physical review [21] where eigen-
values with λ < 0.4 − 0.5 are numerically wrong. The
reason of this behavior is due to large Jordan blocks for
the highly degenerate zero eigenvalue producing numeri-
cally artificial rings of incorrect eigenvalues in the complex
plane with radius r ∼ ε1/d [20,21] with ε being the ma-
chine precision (i.e. ε = 10−16 for simple double precision
numbers or ε = 2−p for high precision numbers with p bi-
nary digits) and d (cid:29) 1 being the dimension of the Jordan
block. The bitcoin networks do not have the (near) trian-
Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
5
gular structure, responsible for this problem in [21], but
the low ratio of N(cid:96)/N ≈ 1.5, reducing considerably the
number of non-zero matrix elements in S0, also creates
large Jordan subspaces and here the effect is even worse
as compared to Ref. [21].
To solve this problem and obtain final reliable eigen-
values with precision 10−15, we implemented all steps of
the numerical diagonalization methods: the computation
of the Arnoldi decomposition, reduction of an arbitrary
matrix to Hessenberg form using Householder transforma-
tions, final diagonalization of Hessenberg matrices by the
QR algorithm, with high precision floating point numbers
using the GMP library [24]. (In Ref. [21] only the com-
putation of the Arnoldi decomposition was implemented
with the GMP library.).
For the two networks BC2010Q2 and BC2010Q2* we
have been able to push the direct high precision diagonal-
ization (Householder transformation to Hessenberg form
and QR algorithm) with different precision up to p = 4096
binary digits confirming the scaling r ≈ 2−p/d for the
radius of incorrect eigenvalues induced by large Jordan
blocks. For p = 4096 we find a maximal radius r ≈ 0.01
corresponding to a value of d ≈ 616 for the dimension of
the corresponding Jordan block. In normal precision (with
p = 52) the same value of d corresponds to a radius ≈ 0.94
confirming exactly the observations of the initial normal
precision results.
The direct diagonalization in high precision is however
quite expensive in both computation time and memory
requirement. In this context the (high precision) Arnoldi
method is more efficient since it automatically breaks off
when it has explored an S-invariant subspace which is
detected by a vanishing or very small coupling matrix el-
ement in the Arnoldi matrix at some value of nA (see
Refs. [19,21] for more details on this point). If we assume
that the initial vector (which we chose either uniform or
random with two different realizations) contains contri-
butions from all eigenvectors associated to non-vanishing
core space eigenvalues the method will, at least in theory,
produce the complete spectrum of these eigenvalues us-
ing a considerably reduced subspace for the final (QR-)
diagonalization. Here we have chosen a break off limit of
= 2−p/2 (with p being the precision number of binary
digits) for the final coupling matrix element which scales
to zero with increasing precision but is still much larger
than the computation precision (2−p) allowing to take into
account the subtle effects due to the Jordan blocks cre-
ating numerical errors on a scale much larger than the
computation precision. In this case we obtain a reduced
dimension of about 2000-3000 (depending on the choice
of random or uniform initial vectors and on both cases
of BC2010Q2 or BC2010Q2*) instead of 7706. Here the
Arnoldi method with a precision of p = 8192 binary digits
(which is considerably less expensive than the direct diag-
onalization with p = 4096) or even only p = 3072 (for the
case of BC2010Q2* with uniform initial vector) allows to
obtain the complete spectra of non-vanishing eigenvalues
for these two networks. The remaining small rings of nu-
merical incorrect Jordan block induced eigenvalues can be
easily removed from the correct eigenvalues by comparing
the spectra obtained by different initial vectors.
We also employed (with some suitable technical mod-
ifications which we omit here) the rational interpolation
method which we developed in Ref. [21]. This method is
also based on high precision computations to determine
the zeros of a certain rational function which are the core
space eigenvalues satisfying the condition dT ψ (cid:54)= 0 for
the corresponding eigenvector ψ and the above introduced
dangling vector d. It turns out that for the two networks
BC2010Q2 and BC2010Q2* all non-vanishing core space
eigenvalues satisfy this condition but for the other two net-
works BC2010Q3 and BC2010Q3* there a few core space
eigenvalues with dT ψ = 0 which we determined separately
by a method described in Ref. [21] exploiting that they are
degenerate subspace eigenvalues of the matrix S0 (which
are different from the subspace eigenvalues of S which we
also computed).
The rational interpolation method is highly effective
with very modest memory requirements and the possi-
bility to use partial low-precision spectra to accelerate
the computation of the zeros to obtain recursively higher
precision spectra. Here we obtained for BC2010Q2 and
BC2010Q2* precise and complete spectra for p = 6144
but we also performed confirmation runs up to p = 12288.
The results of this method confirm exactly the numerical
values (with accuracy of 10−15 for all of the final eigenval-
ues) and the precise number of non-vanishing core space
eigenvalues already obtained by the high precision Arnoldi
method. We mention that the eigenvalues of the direct di-
agonalization correspond numerically with the same accu-
racy to these results (after removal of the numerically in-
correct Jordan induced eigenvalues) but for p = 4096 this
method misses a small number (about 3−4) of the smallest
non-vanishing core space eigenvalues (with λ ∼ 5×10−3).
5 Spectrum of BCN Google matrix
We present here the main results obtained for the spec-
trum and some eigenvectors of G and G∗ by the numerical
methods described above.
For the two networks BC2010Q2 and BC2010Q2*, with
a full network size of N = 7706, we find that there are ex-
actly Nc = 1967 (Nc = 1984) non-vanishing core space
eigenvalues and Ns = 15 (Ns = 2) non-vanishing sub-
space eigenvalues (of S) for BC2010Q2 (or BC2010Q2*)
with the complete and numerically accurate spectra shown
in Fig. 5. The main two outer rings close to the unit circle
(with λ > 0.97) contain 1626 (1621) core space eigen-
values which is more than 80% of the spectrum (of non-
vanishing eigenvalues). The non-vanishing subspace eigen-
values λ, also shown in the same figure, and their multi-
plicities m are m = 7 (λ = 1), m = 6 (λ = −1), m = 1
(λ = −0.723606797749979 and λ = −0.276393202250021)
for BC2010Q2 and m = 1 (λ = ±1) for BC2010Q2*. All
other eigenvalues (about ∼ 5700) are zero and correspond
to Jordan subspaces with potentially rather large dimen-
sions being responsible for the numerical problems when
6
Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
limiting the computations to normal floating point preci-
sion.
close to the boundary circle. However, the rational inter-
polation method still works very well due to its high effi-
ciency. It turns that at a binary precision of p = 30720
using about 18400 support points (for the rational in-
terpolation scheme) this method produces Nc = 9192
(Nc = 9145) non-vanishing core space eigenvalues (includ-
ing 4 pairs of doubly degenerate eigenvalues in both cases).
However, without going into technical details, our results
indicate that these numbers may still increase very slightly
when increasing the precision and also the number of sup-
port points but we are confident that for both networks
BC2010Q3 and BC2010Q3* there are about Nc ≈ 9200
non-vanishing core space eigenvalues which is about 25%
of the full network size (a similar ratio we already found for
BC2010Q2 and BC2010Q2*). The additional 1300-1400
eigenvalues with respect to the spectra obtained by the
normal precision Arnoldi method fill out rather uniformly
the inner part of the complex unit circle as can be seen in
Fig. 6.
Fig. 5.
(Color online) Complex eigenvalue spectrum of
the Google matrix associated to the network BC2010Q2
(BC2010Q2*) in left (right) panels. Shown are the full spec-
trum in top panels or a zoomed representation for the re-
gion λ ≈ 1 in bottom panels. The red dots (crosses) are core
space eigenvalues obtained by high precision Arnoldi computa-
tions and also the rational interpolation method and the blue
thick dots (square boxes) are invariant subspace eigenvalues
obtained by the normal/high precision Arnoldi method or di-
rect diagonalization. The green line (if visible and not hidden
by the red dots) is the unit circle. In top panels the apparent
"red circle" corresponds in reality to a high density of indi-
vidual red dots for the complex core space eigenvalues whose
structure is better visible in the zoomed representation in bot-
tom panels. The top core space eigenvalues (red crosses) which
are very close to the top sub space eigenvalue at λ = 1 (blue
square box) are 0.99990029706715 and 0.999678494064214 (or
0.999998157039589) for BC2010Q2 (BC2010Q2*). The 3rd top
core space eigenvalue 0.995663863983884 for BC2010Q2 is al-
ready clearly outside the blue square box. More details for the
computation method and the subspace eigenvalues are given
in the main text.
For the two networks BC2010Q3 and BC2010Q3*, with
a full network size of N = 37818, the numerical prob-
lems due to Jordan blocks for the zero eigenvalue are
less severe but still present. Here the normal precision
Arnoldi method allows to compute about 7800-7900 re-
liable eigenvalues within an error of 10−6 and which are
rather strongly localized close to the boundary circle (if
one tries larger values of nA one obtains only numeri-
cal incorrect eigenvalues). Here the high precision Arnoldi
method is strongly limited due to memory requirements
and it is not possible to go beyond a precision of p = 512
which produces about 500-700 additional reliable eigenval-
ues and the resulting spectra are still quite concentrated
√
Furthermore for BC2010Q3 (BC2010Q3*) there also
Ns = 56 (Ns = 2) subspace eigenvalues for S (blue
dots/squares in Fig. 6). Here some eigenvalues are on the
unit circle with λ = 1 and degeneracy m = 23 (m = 1)
for λ = 1, m = 17 (m = 1) for λ = −1 and m = 2 (m = 0)
for λ = (−1 ± i
3)/2. In both cases there also a few core
space eigenvalues (given as degenerate subspace eigenval-
ues of S0, green dots) which were determined by another
method [21] since they are not necessarily found by the
rational interpolation method. About 8000 reliable eigen-
values are found by the normal precision Arnoldi method
correspond to the 4-5 rings of eigenvalues close to the unit
circle and visible in the center panels of Fig. 6.
We mention that the high precision variants of the
three methods are also useful to compute the full spec-
tra for the three smaller networks (up to BC2010Q1 with
N = 645) and also for the invariant subspace spectra (for
nearly all bitcoin networks) since they allow to remove
in a reliable way a certain number of numerical incorrect
eigenvalues below 10−3 obtained by the normal precision
computations. For these cases the computation times are
negligible and the required precision is rather modest (typ-
ically between p = 256 and p = 1024). Here the number
of non-vanishing core space eigenvalues Nc and subspace
eigenvalues Ns are given by Nc = 4 (6) and Ns = 2 (0)
for BC2009Q2 (or BC2009Q2*) with N = 142, Nc = 13
(15) and Ns = 4 (2) for BC2009Q4 (or BC2009Q4*) with
N = 220 and Nc = 26 (30) and Ns = 6 (2) for BC2010Q1
(or BC2010Q1*) with N = 645. The subspace eigenvalues
are always ±1 (except for BC2009Q2* where Ns = 0 and
there are no subspace eigenvalues) eventually with dou-
ble (or triple) degeneracy if Ns = 4 (or Ns = 6). Clearly
in all these cases the number of the non-vanishing core
space and subspace eigenvalues constitutes only a small
fraction of the spectrum with all other eigenvalues being
zero corresponding to certain Jordan subspaces.
For the larger networks (between BC2010Q4 with N =
70987 and BC2011Q4 with N = 1884918) we applied
the normal precision Arnoldi method with nA = 16000.
However, in view of the numerical problems visible for
-1-0.500.51-1-0.500.51λBC2010Q2-1-0.500.51-1-0.500.51λBC2010Q2*-0.100.10.950.9751λBC2010Q2-0.100.10.950.9751λBC2010Q2*Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
7
Fig. 7.
(Color online) Complex eigenvalue spectrum of
the Google matrix associated to the network BC2011Q4
(BC2011Q4*) in left (right) panels. Shown are about 12000
"reliable" top eigenvalues obtained by the Arnoldi method in
normal precision with nA = 16000 in top panels (red dots/red
circle) or a zoomed representation (red crosses) for the region
λ ≈ 1 in bottom panels. The blue thick dots (square boxes) are
invariant subspace eigenvalues obtained by the normal/high
precision Arnoldi method or direct diagonalization. The green
line (if visible and not hidden by the red dots) is the unit circle.
In top panels the apparent "red circle" corresponds in reality to
a high density of individual red dots for the complex core space
eigenvalues whose structure is better visible in the zoomed rep-
resentation. There are 8 (is 1) top core space eigenvalue(s) (red
cross(es)) very close to the top sub space eigenvalue at λ = 1
i.e. nearly or completely inside the blue square box and the 1st
top core space eigenvalue is 0.99999999417 (0.99999996048) for
BC2011Q4 (BC2011Q4*).
√
ues with Ns = 332 (2) for BC2011Q4 (BC2011Q4*). The
subspace spectrum of BC2011Q4 contains 242 eigenvalues
on the unit circle with λ = 1 which are λ = 1 (degeneracy
m = 127), λ = ±i (both with m = 1), λ = (−1 ± i
3)/2
(both with m = 3) and λ = −1 (m = 107). The remaining
90 subspace eigenvalues with 0 < λ < 1 are also visible in
Fig. 7. Here only one eigenvalue at λ = −1/2 has a double
degeneracy. The subspace spectrum of BC2011Q4* con-
tains only the two (non-vanishing) eigenvalues λ = ±1
(both with m = 1).
The convergence with the increase of the Arnoldi di-
mension nA is illustrated in the top panels of Fig. 8 for
BC2011Q4 showing the dependence j(γj) where
γj =
−2 lnλj with λj being the core space eigenvalue. For S
and S∗ the comparison between the two maximal val-
ues nA = 16000 and nA = 12000 indicates that about
j ≈ 5000 − 6000 eigenvalues up to γ ≈ 0.01 are reliable.
However, we remind that the comparison of different com-
putations for nA = 16000 shows that the number of reli-
able eigenvalues is actually higher ≈ 12000 corresponding
Fig. 6.
(Color online) Complex eigenvalue spectrum of
the Google matrix associated to the network BC2010Q3
(BC2010Q3*) in left (right) panels. Shown are the full spectra
in top panels and two zoomed representations for the region
λ ≈ 1 in center and bottom panels. The red dots (crosses)
are core space eigenvalues obtained by the rational interpo-
lation method in high precision, the blue thick dots (square
boxes) are invariant subspace eigenvalues obtained by the nor-
mal/high precision Arnoldi method or direct diagonalization
and the thick green dots in top panels correspond to degenerate
subspace eigenvalues of S0 which are also core space eigenval-
ues of S and not necessarily found by the rational interpolation
method (see Ref. [21] for explanations). There are 2 (is 1) top
core space eigenvalue(s) (red cross(es)) very close to the top
sub space eigenvalue at λ = 1 i.e. nearly or completely inside
the blue square box (in bottom panels) and the 1st top core
space eigenvalue is 0.999968720409915 (0.99999983940032) for
BC2010Q3 (BC2010Q3*).
BC2010Q2/3, we performed different runs with slightly
different implementations (e.g. different summation or-
der for the scalar product in the Arnoldi method) lead-
ing to different rounding errors and verified how many
eigenvalues were numerically identical with an error be-
low 10−6. For the two cases BC2011Q4 and BC2011Q4*
with N = 1884918 and nA = 16000 we obtain about
12000 numerically reliable core space eigenvalues shown
in Fig. 7 and which are all very close to the unit circle
with λ > 0.99. Fig. 7 also shows the subspace eigenval-
-1-0.5 0 0.5 1-1-0.5 0 0.5 1λBC2010Q3-1-0.5 0 0.5 1-1-0.5 0 0.5 1λBC2010Q3*-0.1 0 0.1 0.95 0.975 1λBC2010Q3-0.1 0 0.1 0.95 0.975 1λBC2010Q3*-0.02 0 0.02 0.99 0.995 1λBC2010Q3-0.02 0 0.02 0.99 0.995 1λBC2010Q3*-1-0.500.51-1-0.500.51λBC2011Q4-1-0.500.51-1-0.500.51λBC2011Q4*-0.0200.020.990.9951λBC2011Q4-0.0200.020.990.9951λBC2011Q4*8
Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
Fig. 8. (Color online) Level number j versus the decay width
γj = −2 ln(λj) with λj being the j-th core space eigen-
value computed by the normal precision Arnoldi method with
uniform initial vector and Arnoldi dimension nA. The top
left (right) panel corresponds to the network BC2011Q4 (or
BC2011Q4*) for different values of nA with 2000 ≤ nA ≤
16000. The bottom left (right) panel corresponds to the four
networks BC2011Qk, (or BC2011Qk*) for k = 1, 2, 3, 4 and
nA = 16000.
to γ ≈ 0.015. The circle structure well visible in Fig. 7
is responsible for appearance of large steps in the depen-
dence j(γ) well seen in Fig. 8. A similar dependence γj
is also present for other quarters BC2011Q1, BC2011Q2,
BC2011Q3 shown in bottom panels of Fig. 8.
6 Eigenstates of BCN Google matrix
The decay of PageRank and CheiRank probabilities at dif-
ferent quarters is presented in Fig. 4. Here we describe the
properties of several eigenstates. As soon as the eigenval-
ues are determined the eigenstates corresponding to the
selected eigenvalues can be efficiently computed numeri-
cally as described in [15,19,26].
The results for 6 eigenvectors of BC2010Q2 are shown
in Fig. 9 and for BC2011Q4 in Fig. 10. The selected eigen-
vectors ψ0, ψ1, ψ6, ψ10, ψ19 (additional to PageRank and
CheiRank vectors) are marked by an index j correspond-
ing to 20 core eigenvalues closest to the unit circle with
uniformly distributed eigenphases between 0 and π. In the
top panels of Fig. 9 we order all amplitudes ψj in mono-
tonically descending order with their own local-Rank in-
dex Kj with maximum at Kj = 1 (Kj is different from
PageRank index K). The interesting feature ofs these eigen-
states is the presence of large plateaus where for hundreds
of nodes the amplitude ψj remains practically indepen-
dent of Kj. This indicates a presence of relatively large
communities of users coupled by certain links. The bot-
tom panels of Fig. 9 show the amplitudes ψj as a func-
tion of the global PageRank index K. For the BC2010Q2
network the nodes with largest amplitudes ψj are located
at relatively large K values with K < 100. It is possible
Fig. 9. (Color online) Top panels: PageRank P (or CheiRank
P ∗) at damping factor α = 0.85 and modulus ψj of 5
selected eigenvectors of S for the network BC2010Q2 (or
BC2010Q2*) versus the index K for PageRank P (K∗ for
CheiRank P ∗) or the individual ordering index Kj for each
eigenvector ψj. Bottom panels: The same as top panels but
only using the PageRank (CheiRank) index K (K∗) on the
x-axis for all shown vectors. Note that the given vector index
values 0, 1, 6, 10, 19 do not correspond to the level number of
Fig. 8 but they correspond to an index of a selected set of
20 core space eigenvalues closest to the unit circle and with
uniformly distributed eigenphases between 0 and π, i.e. the
selected eigenvalues are roughly λj ≈ λj exp(−i2πj/19) for
j = 0, . . . , 19 and with λj ≈ 1. In particular: λ0 = 0.99990030
(0.99999816), λ1 = 0.99967849 (0.99612525 + i0.00704040),
λ6 = 0.63708435 + i0.75027164 (0.63887779 + i0.75813987),
λ10 = 0.00130422 + i0.98315766 (−0.00043259 + i0.99066741),
and λ19 = −0.99053491 (−0.99014386) for BC2010Q2 (or
BC2010Q2*).
that these nodes correspond to bitcoin miners. However,
a significant number of nodes with relatively large am-
plitudes are located at very high values K ∼ 2000. For
the Google matrix G∗ all large amplitudes are located at
large values of the CheiRank index K∗ > 500. For the
larger BC2011Q4 network, shown in Fig. 10 we find the
presence of similar plateau structure for eigenstate ampli-
tudes.
Similarly to Wikipedia and other networks [15] it is
convenient to present the distribution of network nodes on
the CheiRank-PageRank plane (K, K∗) shown in Fig. 11
for the cases of BC2010Q2 of Fig. 9 and BC2011Q4 of
Fig. 10. We see that for BC2010Q2 the density distribu-
tion of N nodes on (K, K∗)-plane is still strongly fluctuat-
ing, but for BC2011Q4 it starts to stabilize and becomes
close to the density of our largest network of BC2013Q2
shown in Fig. 12. The important feature of the stabilized
density distributions of BC2011Q4 and BC2013Q2 is the
fact that the maximum of distribution is located at the
diagonal K = K∗. This is similar to the situation of the
world trade network [16,17] where each country (node) or
user for BCN tries to keep trade balance between outgoing
(export) and ingoing (import) flows.
040008000120001600000.010.02jγj = -2ln(λj)BC2011Q4nA=2000nA=4000nA=6000nA=8000nA=12000nA=16000040008000120001600000.010.02jγj = -2ln(λj)BC2011Q4*nA=2000nA=4000nA=6000nA=8000nA=12000nA=16000040008000120001600000.010.02jγj = -2ln(λj)nA=16000BC2011Q1BC2011Q2BC2011Q3BC2011Q4040008000120001600000.010.02jγj = -2ln(λj)nA=16000BC2011Q1*BC2011Q2*BC2011Q3*BC2011Q4*10-1510-1010-5100100101102103104P,ψj K, KjBC2010Q2Pψ0ψ1ψ6ψ10ψ1910-1510-1010-5100100101102103104P,ψj KBC2010Q210-1010-5100100101102103104P*,ψj K*, KjBC2010Q2*P*ψ0ψ1ψ6ψ10ψ1910-1010-5100100101102103104P*,ψj K*BC2010Q2*Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
9
Fig. 10. (Color online) PageRank P (or CheiRank P ∗)
at damping factor α = 0.85 and modulus ψj of 5 se-
lected eigenvectors of S for the network BC2011Q4 (or
BC2011Q4*) versus the index K for PageRank P (K∗
for CheiRank P ∗) or the individual ordering index Kj for
each eigenvector ψj. The given vector index is similar to
Fig. 9. The eigenvalues of the shown eigenvectors are: λ0 =
0.99999999 (0.99999996), λ1 = 0.99999322 (0.99907654),
λ6 = 0.64270357 + i0.76431760 (0.64271106 + i0.76429326),
λ10 = −0.00116375+i0.99865094 (−0.00117162+i0.99862722),
and λ19 = −0.99999317 (−0.99934321) for BC2011Q4 (or
BC2010Q4*).
relator [15,18,26] κ = N(cid:80)N
In Fig. 11 we show by red crosses the location of top
largest amplitudes ψj at j = 10 for Google matrices G
(left column) and G∗ (right column). We see that only
a few large amplitudes are located at leading (smallest)
values of K and K∗. This shows that the vector ψ10 cor-
responds to a certain rather isolated community.
The proximity of the density distribution to the di-
agonal K = K∗ leads to a significant correlation between
PageRank and CheiRank vectors P (K(i)) and P ∗(K∗(i)).
This correlation is convenient to characterized by the cor-
i=1 P (K(i))P ∗(K∗(i))−1. The
large values of κ corresponds to a strong correlation of
PageRank and CheiRank probabilities, while κ close to
zero or even slightly negative appears to uncorrelated vec-
tors P and P ∗. The dependence of κ on the network size
N is shown in Fig. 13 (right panel) where the correlator
is becoming very large up to κ ≈ 104 for the last quarters
of BCN. The frequency distribution of correlator compo-
nents κi = N P (K(i))P ∗(K∗(i)) for three cases at differ-
ent quarters is shown in the left panel of Fig. 13. These
distribution show the presence of very active users with
large κi values corresponding to their expected high ac-
tivity of bitcoin outgoing and ingoing transactions. It may
be rather interesting to determine the hidden identity of
users with largest κi values.
7 Gini coefficient of BCN
In economy the distribution of wealth of a certain pop-
ulation is often characterized by the Gini coefficient pro-
posed in 1912 (see e.g. [29,30,31]). The Gini coefficient is
typically defined using the Lorenz curve which plots the
fraction y of the total income of a fraction x of the popu-
lation with the lowest income versus x. The line at y = x
thus represents perfect equality of incomes. The Gini coef-
ficient is the ratio of the area that lies between the line of
equality and the Lorenz curve normalized by the total area
the normalization condition is (cid:80)
(Color online) Density of nodes W (K, K∗) on
Fig. 11.
PageRank-CheiRank plane (K, K∗) averaged over 100 × 100
logarithmically equidistant grids for 0 ≤ ln K, ln K∗ ≤ ln N,
the density is averaged over all nodes inside each cell of the grid,
K,K∗ W (K, K∗) = 1. Color
varies from blue at zero value to red at maximal density value.
In order to increase the visibility large density values have been
reduced to (saturated at) 1/16 of the actual maximum density.
At each panel the x-axis corresponds to ln K and the y-axis to
ln K∗. Both top panels correspond to BC2010Q2 for K and
to BC2010Q2* for K∗ and both bottom panels to BC2011Q4
for K and to BC2011Q4* for K∗. The red crosses show the
top 1000 nodes of the eigenvector ψ10 used in Figs. 9 and 10
of BC2010Q2 (top left), BC2010Q2* (top right), BC2011Q4
(bottom left) and BC2011Q4* (bottom right).
under the line of equality. Therefore the Gini coefficient is
0 for perfect equality and 1 for complete inequality.
We can generalize this definition to PageRank and
CheiRank distributions. For this let P (K) be the usual
PageRank vector with K = 1 for the maximum value cor-
responding to the top PageRank node. Then we define
the inverted PageRank as Pinv(K(cid:48)) = P (N − K(cid:48) − 1) such
that for Pinv the maximum value corresponds to K(cid:48) = N.
In this way Pinv(K(cid:48)) represents in a certain way the "in-
come" and its argument K(cid:48) corresponds to the network
nodes ordered in increasing order by their income (with
lowest "income" for K(cid:48) = 1 and maximum "income" for
K(cid:48) = N). Then the cumulative income up to node K(cid:48) is
given by :
K(cid:48)(cid:88)
N(cid:88)
σ(P )K(cid:48) =
Pinv( K) =
P ( K).
(4)
K=1
K=N−K(cid:48)+1
The notation σ(P ) reminds that σ is defined with respect
to a given PageRank vector (or CheiRank vector P ∗ by
10-2010-1510-1010-5100100101102103104105106107P,ψj K, KjBC2011Q4Pψ0ψ1ψ6ψ10ψ1910-1010-5100100101102103104105106107P*,ψj K*, KjBC2011Q4*P*ψ0ψ1ψ6ψ10ψ1910
Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
κ = N(cid:80)N
Fig. 13. (Color online) Left panel: Histogram of frequency ap-
pearance of correlator components κi = N P (K(i))P ∗(K∗(i))
for the three networks BC2013Q2 (red), BC2011Q4 (green)
and BC2010Q2 (blue). For the histogram the whole interval
10−9 ≤ κi ≤ 104 is divided in 260 cells of equal size in log-
arithmic scale. Right panel: The dependence of the correlator
i=1 P (K(i))P ∗(K∗(i)) − 1 on the network size N for
all bitcoin networks between BC2009Q4 and BC2013Q2. The
three data points surrounded by a colored square box corre-
spond to the three networks of the left panel with the same
colors.
Fig. 14. (Color online) Top panel: Gini coefficient g time evolu-
tion for ingoing and outgoing bitcoin volume transfer for quar-
ter of years (halves for 2009). Bottom panel: Gini coefficient g
time evolution for PageRank and CheiRank of BCN for quarter
of years (halves for 2009).
corresponds to an enormously unequal wealth distribu-
tion between users [30,31]: a small group of users controls
almost all wealth.
We obtain smaller values of g ≈ 0.5 for PageRank and
CheiRank probabilities. We see that after 2010 the values
of g from PageRank and CheiRank probabilities become
comparable. This corresponds to the stabilization of the
node distribution in the PageRank - CheiRank plane (see
Fig. 11, Fig. 12 discussed in the previous Section). After
2010 we find g ≈ 0.5 corresponding to a rather usual value
of g with an exponential wealth distribution in a society
(see e.g. [31]). Also the Lorenz curve in 2013 (see Fig. 15)
becomes similar to USA income distribution (see e.g. Fig.8
in [31]).
However, the above values are obtained with the PageR-
ank and CheiRank probabilities which are smoothing the
row bitcoin flows due to the damping factor α in (2). For
the row bitcoin flows for the whole available period 2009-
(Color online) Density of nodes W (K, K∗) on
Fig. 12.
PageRank-CheiRank plane (K, K∗) for BC2013Q2 averaged
over 200 × 200 logarithmically equidistant grids for 0 ≤
ln K, ln K∗ ≤ ln N, the density is averaged over all nodes
(cid:80)
inside each cell of the grid, the normalization condition is
K,K∗ W (K, K∗) = 1. Color varies from blue at zero value
to red at maximal density value. In order to increase the visi-
bility large density values have been reduced to (saturated at)
1/16 of the actual maximum density. At each panel the x-axis
corresponds to ln K and the y-axis to ln K∗.
replacing P → P ∗ in (4)). The quantity σ(x) = σ(P )K(cid:48)
with x = K(cid:48)/N corresponds to the standard Lorenz curve
[30,31]. Therefore the Gini coefficient, defined as the area
between σ(P ) and the line of equality normalized by the
area below the line of equality [30], is given by:
N(cid:88)
K(cid:48)=1
g = 1 − 2
σ(P )K(cid:48)/N = 1 − 2
N(cid:88)
K=1
KP (K)/N. (5)
The Gini coefficient for the CheiRank P ∗ is obtained in a
similar way by using σ(P ∗) and replacing P → P ∗ in (5).
The above definition of g is done via the PageRank and
CheiRank probabilities, i.e. where "income" corresponds
to the PageRank or CheiRank values. We will compare
the corresponding g values also with the standard defi-
nition considering ingoing and outgoing amount of bit-
coins (volume transfer) for BCN nodes (users) during a
given quarter. The dependence of the different Gini coef-
ficients, defined via bitcoin volume transfer or PageRank
and CheiRank probabilities, on time is shown in Fig. 14.
For the BCN the evolution of Gini coefficient g, de-
fined by (5), is shown in the bottom panel of Fig. 14. We
find that the Gini coefficient defined via volume (top panel
of Fig. 14) is stabilized from 2010 and takes a very high
value g ≈ 0.9. Such a large value of g for bitcoin flows
100102104106-8-6-4-2024countslog10(NP(i)P*(i))BC2013Q2BC2011Q4BC2010Q210-1100101102103104102103104105106107κNLeonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
11
We also characterized the wealth distribution for BCN
users using the Gini coefficient g. The definition of g via
PageRank and CheiRank probabilities leads to usual value
g ≈ 0.5 for the time period after 2010 when the BCN is
well stabilized. However, the analysis of row bitcoin flows
gives g ≈ 0.92 corresponding to the situation when almost
all wealth is concentrated in hands of small group of users.
We argue that the damping factor of the Google matrix is
responsible to a significant reduction of g value.
Finally we note that the public access to all bitcoin
transactions makes this system rather attractive for anal-
ysis of statistical features of financial flows. However, there
is also a hidden problem of this network. In fact it often
happens that a user performing a transaction to another
user changes him/her bitcoin code after the transaction
thus effectively creating a new user even if the person be-
hind the code remains the same. This feature is responsible
to the fact that the BCN is characterized by a rather low
ratio of number of links to number of nodes being about 2-
3 while in other networks like WWW and Wikipedia this
ratio is about 10-20. This low ratio value is at the origin
of the strong sensitivity of eigenvalues of G to numerical
computational errors as we discussed in the paper. Thus
even if the bitcoin transactions are open to public it re-
mains rather difficult to establish the transactions between
real persons. In this sense the situation becomes similar to
the transactions between bank units: in this case the data
are not public and are hard to be accessed for scientific
analysis.
We note that all data used in our statistical analysis
of BCN are available at [33].
We thank A. D. Chepelianskii and S. Bayliss for stim-
ulating discussions. This research is supported in part by
the MASTODONS-2017 CNRS project APLIGOOGLE
(see http://www.quantware.ups-tlse.fr/APLIGOOGLE/).
This work was granted access to the HPC resources of
CALMIP (Toulouse) under the allocation 2017-P0110.
References
1. Satochi Nakamoto, Bitcoin: A Peer-to-Peer Electronic
Cash System, https://bitcoin.org/bitcoin.pdf (2008)
(accessed 25 Oct 2017)
2. Wikipedia contributors, Bitcoin, https://en.wikipedia.
org/wiki/Bitcoin_network, Wikipedia (accessed 25 Oct
2017)
3. J. Bohannon, The Bitcoin busts, Science 351, 1144 (2016)
4. A. Biryukov, D. Khovratovich
I. Pustoga-
and
rov, Deanonymisation of
in Bitcoin P2P
clients
network, Proc. 2014 ACM SIGSAC Conf. Comp.
Comm. Security (CCS'14) ACM N.Y., p.15 (2014);
arXiv:1405.7418v3[cs.CR] (2014)
5. F.R. Velde, Bitcoin: A primer, Chicago Fed Letter N.317,
The Fderal Reserve Bank of Chicago, Dec. (2013).
6. S. Bayliss and L. Harriss, Financial Technology (Fin-
Tech), Houses of Parliament, Parliamentary Office of
Science & Technology, Postnote Number 525, May (2016);
http://researchbriefings.files.parliament.uk/
documents/POST-PN-0525/POST-PN-0525.pdf
25 Oct 2017)
(accessed
Fig. 15. (Color online) The Lorenz curve of the bitcoin users
(nodes) showing σ(P )K(cid:48) (and σ(P ∗)K∗(cid:48)) vs. K(cid:48)/N (K∗(cid:48)/N)
for PageRank and CheiRank of Q1 of 2010 and Q1 of 2013
(solid and dashed lines respectively). The Lorenz curves for
cumulative volume transfer are also shown for the full period
2009-2013 for out-going and in-going flow, taking into account
users with a minimum amount of 0 and 1 bitcoins (dotted
and dot-dashed lines respectively). The Gini coefficient values
for volume transfer are g = 0.948 (in-going larger than 0),
g = 0.939 (out-going larger than 0), g = 0.927 (in-going larger
than 1), g = 0.925 (out-going larger than 1). The blue solid
line represents the curve of perfect equality.
2013 we find g ≈ 0.92 (ingoing and outgoing g values are
rather close). Such high g values correspond to very un-
balanced wealth distribution in the bitcoin community.
8 Discussion
We presented the results of Google matrix analysis of bit-
coin transaction network from the initial start in 2009 till
April 2013. From the period after 2010 the PageRank and
CheiRank probability distributions are stabilized show-
ing an approximate algebraic decay with the exponent
β ≈ 0.9. We find that the spectrum of complex eigenvalues
of matrix G has a very unusual form of circles being rather
close to the unitary circle. Such a structure has never ap-
peared for other real networks reported previously [15].
The only example with a similar spectral structure ap-
pears for the Ulam networks generated by intermittency
maps [32]. Such a circular structure corresponds to certain
hidden communities coupled by a long series of transac-
tions. A manifestation of such communities with about
hundreds of users is also visible as a plateau structure in
the eigenvectors of the Google matrix whose eigenvalues
are close to the unit circle. The distribution of users in the
PageRank-CheiRank plain is maximal along the diagonal
corresponding to the the fact that each user tries to keep
financial balance of his/her transactions. A similar situa-
tion was also observed for the world trade networks [16,
17].
12
Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network
29. C. Gini, Variabilita e mutabilita (1912), Reprinted in
E. Pizetti, T. Salvemini (Eds.), Memorie di metodologica
statistica, Libreria Eredi Virgilio Veschi, Rome (1955).
30. Wikipedia
contributors, Gini
coefficient,
//en.wikipedia.org/wiki/Gini_coefficient#
CITEREFGini1912, Wikipedia (accessed 25 Oct 2017).
https:
31. V. M. Yakovenko and J. B. Rosser Jr., Statistical mechan-
ics of money, wealth, and income, Rev. Mod. Phys. 81,
1703 (2009).
32. L. Ermann and D.L. Shepelyansky, Google matrix of Ulam
networks of intermittency maps, Phys. Rev. E 81, 036221
(2010).
33. http://www.quantware.ups-tlse.fr/QWLIB/
bitcoinnet/ (accessed 3 Nov. 2017).
7. Wikipedia contributors, Cryptocurrency, https://en.
wikipedia.org/wiki/Cryptocurrency, Wikipedia (ac-
cessed 25 Oct 2017)
8. https://blockchain.info/ (accessed 25 Oct 2017)
9. D. Ron and A. Shamir, Quantitative analysis of the full
bitcoin transaction graph, in Sadeghi AR. (eds) Financial
Cryptography and Data Security, FC 2013. Lecture Notes
in Computer Science, 7859, 6 (2013), Springer, Berlin
10. M. Ober, S. Katzenbeisser and K. Hamacher, Structure
and anonymity of the Bitcoin transaction graph, Future
Internet 5, 237 (2013)
11. S.I. Marcin, Bitcoin Live:
scalable system for de-
time, http:
tecting bitcoin network behaviors in real
//snap.stanford.edu/class/cs224w-2015/projects_
2015/Bitcoin_Live-_Scalable_system_for_detecting_
bitcoin_network_behaviors_in_real_time.pdf,
Stan-
ford (2015) (accessed 25 Oct 2017)
12. S. Dorogovtsev, Lectures on complex networks, Oxford
University Press, Oxford (2010).
13. S. Brin and L. Page, Computer Networks and ISDN Sys-
tems 30, 107 (1998).
14. A.M. Langville and C.D. Meyer, Google's PageRank and
beyond: the science of search engine rankings, Princeton
University Press, Princeton (2006).
15. L. Ermann, K.M. Frahm and D.L. Shepelyansky, Google
matrix analysis of directed networks, Rev. Mod. Phys. 87,
1261 (2015).
16. L. Ermann and D. L. Shepelyansky, Google matrix of the
world trade network, Acta Physica Polonica A 120(6A),
A158 (2011).
17. L. Ermann and D. L. Shepelyansky, Google matrix analysis
of the multiproduct world trade network, Eur. Phys. J. B
88, 84 (2015).
18. A.D. Chepelianskii, Towards physical laws for software ar-
chitecture, arXiv:1003.5455 [cs.SE] (2010).
19. K. M. Frahm, and D. L. Shepelyansky, Ulam method for
the Chirikov standard map, Eur. Phys. J. B 76, 57 (2010).
20. K. M. Frahm, A. D. Chepelianskii, and D. L. Shepelyan-
sky, PageRank of integers, J. Phys. A: Math. Theor. 45,
405101(2012).
21. K. M. Frahm, Y.-H. Eom and D. L. Shepelyansky Google
matrix of the citation network of Physical Review Phys.
Rev. E 89, 052814 (2014).
22. M. Fleder, M.S. Kester and S. Pillai, Bitcoin transaction
graph analysis, arXiv:1502.01657[cs/CR] (2015).
networks
23. I. Brugere, Bitcoin
transaction
tion,
Bitcoin-Transaction-Network-Extraction
Oct 2017).
extrac-
https://github.com/ivan-brugere/
(accessed
(2013)
24. T. Granlund and the GMP development team, GNU
MP: The GNU Multiple Precision Arithmetic Library,
http://gmplib.org/ (accessed Oct 2017).
25. K.M. Frahm, B. Georgeot and D.L. Shepelyansky, Univer-
sal emergence of PageRank, J. Phys. A: Math. Theor. 44,
465101 (2011).
26. L. Ermann, K.M. Frahm and D.L. Shepelyansky, Spectral
properties of Google matrix of Wikipedia and other net-
works, Eur. Phys. J. B 86, 193 (2013).
27. G. W. Stewart, Matrix Algorithms, Volume II: Eigensys-
tems, SIAM, (2001).
28. R. Meusel, S. Vigna, O. Lehmberg and C. Bizer, The graph
structure in the web - analyzed on different aggregation
levels, J. Web Sci. 1, 33 (2015)
|
1906.02420 | 2 | 1906 | 2019-06-14T13:25:27 | Zorro: A Model Agnostic System to Price Consumer Data | [
"cs.SI"
] | Personal data is essential in showing users targeted ads - the economic backbone of the web. Still, there are major inefficiencies in how data is transacted online: (1) users don't decide what information is released nor get paid for this privacy loss; (2) algorithmic advertisers are stuck in inefficient long-term contracts where they purchase user data without knowing the value it provides. This paper proposes a system, Zorro, which aims to rectify aforementioned two problems.
As the main contribution, we provide a natural, 'absolute' definition of 'Value of Data' (VoD) - for any quantity of interest, it is the delta between an individual's value and population mean. The challenge remains how to operationalize this definition, independently of a buyer's model for VoD. We propose a model-agnostic solution, relying on matrix estimation, and use it to estimate click-through-rate (CTR), as an example.
Regarding (2), Zorro empowers advertisers to measure value of user data on a query-by-query basis and based only on the increase in accuracy it provides in estimating CTR. In contrast advertisers currently engage in inefficient long-term data contracts with third party data sellers. We highlight two results on a large ad-click dataset: (i) our system has R^2=0.58, in line with best-in-class results for related problems (e.g. content recommendation). Crucially, our system is model-agnostic - we estimate CTR without accessing an advertiser's proprietary models, a required property of any such pricing system;(ii) our experiments show selling user data has incremental value ranging from 30%-69% depending on ad category. Roughly, this translates to at least USD 16 Billion loss in value for advertisers if user data is not provided.
Regarding (1), in addition to allowing users to get paid for data sharing, we extend our mathematical framework to when users provide explicit intent. | cs.SI | cs | Zorro: A Model Agnostic System to Price Consumer Data
Munther Dahleh
Devavrat Shah
Dylan Sleeper
MIT
Andrew Tsai
MIT
Anish Agarwal
MIT
MIT
MIT
Madeline Wong
MIT
9
1
0
2
n
u
J
4
1
]
I
S
.
s
c
[
2
v
0
2
4
2
0
.
6
0
9
1
:
v
i
X
r
a
Abstract
Personal data is a key ingredient in showing web users tar-
geted ads - the economic backbone of the web. Still, there are
two major inefficiencies in how such data is bought and sold
online: (1) users do not decide what information is released
nor do they get paid for this privacy loss; (2) algorithmic ad-
vertisers are stuck in inefficient long-term contracts where
they purchase user data without knowing how much value it
provides. This paper proposes a system, Zorro, which aims to
rectify the aforementioned two problems.
As the main contribution, we provide a natural, "absolute"
definition of the "Value of Data" (VoD) -- for any quantity
of interest, it is the delta between an individual's value and
the population mean. The challenge remains how to opera-
tionalize this definition such that it is independent of a buyer's
model for the VoD. We propose a model agnostic solution by
relying on matrix estimation, a rapidly growing field within
machine learning, and show how it can be used to estimate
click-through-rate (CTR), for example.
Regarding (2), Zorro (and this VoD definition) empowers
advertisers to measure value of user data: (i) on a query-by-
query basis; (ii) based only on increase in accuracy it provides
in estimating CTR. This is in contrast with inefficient long-
term contracts advertisers are engaged in now with third-party
data sellers. We highlight two experimental results on a large
real-world ad click dataset. (i) Our CTR estimation system
has a R2 of 0.58, in line with state-of-the-art results for compa-
rable problems (e.g. content recommendation). Crucially, our
system is model agnostic, i.e., we estimate CTR for a given
user and advertiser without accessing an advertiser's propri-
etary models, a necessary property of any such pricing system.
(ii) With respect to our definition of VoD, experiments show
selling user data has incremental value in estimating CTR
ranging from 30% to 69% depending on advertiser category.
Roughly, this translates to at least a USD 16 Billion loss in
value for advertisers if user data is not provided.
Regarding (1), in addition to allowing users to get paid for
data they share, we extend our system design for when users
provide explicit intent for types of ads they want to see.
1
Introduction
"Personal data is the new oil of the internet and
the new currency of the digital world "
- Meglena Kuneva, European Consumer Commissioner
Over the past two decades, online advertising has become
the economic backbone of the web. According to a study by
PriceWaterhouseCoopers and the Internet Advertising Bureau
(IAB), non-search 1 online advertising revenue has grown
from USD 50 million in 1996 to USD 54 Billion in 2018,
with a 23% year-on-year growth from 2017 to 2018 (cf. [25]).
Furthermore, personal data has been one of the key resources
advertisers use to show users targeted, relevant display ads.
Inefficiencies in Current System. There still exist two major
inefficiencies in the way such data is both bought and sold:
(1) from a user's perspective, they do not get to decide what
information about themselves is released nor do they get paid
for this loss of privacy; (2) from an advertiser's perspective,
they have to purchase user data without knowing how much
value it is going to provide to them.
These inefficiencies have led to a swath of societal issues in-
cluding: (i) increasing ad fraud, where 20% to 30% of online
ad data sold has been deemed to be fraudulent (cf. [21]); (ii) an
increasing consumer backlash for loss of privacy from unsanc-
tioned data sharing such as in the Facebook-Cambridge Ana-
lytica case (cf. [7]); (iii) an inability to litigate against compa-
nies with massive data breaches such as Equifax (cf. [5]).
To have a meaningful dialogue about such issues, an im-
portant and necessary first step is defining what the "Value of
Data" (VoD) is. However, there does not exist a precise defini-
tion of the VoD, which is independent of a buyer's model for
VoD. This is why firms are engaged in inflexible long-term
data contracts, instead of paying on a query-by-query basis
based on the incremental value the data provides.
1Non-search includes display ads, audio & video ads, classifieds and lead
generation. For simplicity, we collectively call them display ads (see [25] for
details).
1
(a)
(b)
Figure 1: Figure 1(a) - we depict how user data flows between the various entities in the current ecosystem. Figure 1(b) - we
depict the change to user data flow with Zorro in place. All entities receive (anonymized) user data and the estimated VoD.
Why Data is a Unique Commodity. The challenge in de-
signing data pricing systems stems from the nature of data
as an asset: (i) user data is freely replicable once sold; (ii)
advertisers vary widely and correspondingly, so do their mod-
els for the VoD; (iii) the usefulness of user data is difficult
to verify a priori before running it through a buyer's model,
something buyers are not willing to do before purchasing the
data. See [2] for a more complete overview.
Our Focus: Click-Through-Rate Estimation. We focus our
efforts on the sale of online user cookie data (e.g. a user's de-
mographic data and browsing history) for display advertising
and the prediction task of estimating user click-through-rate
(CTR) for a given ad and user, the key quantity of interest
in online display advertising. We do so because the sale of
online cookie data for this setting is one of the large sources of
data exchanged (and revenue generated) in modern web-scale
systems and the associated network engineering infrastruc-
ture is extremely performant; transactions between display
advertisers and third-party data sellers normally occur in less
than 100 milliseconds, the time required for a user to load a
webpage and for an ad to be served (cf. [30]).
Thus if one can design a feasible solution for this setting,
there are many further applications. An important business-
to-business example is the sale of potential consumer leads
in insurance and mortgage markets using the increasingly
adopted Ping-Post Architecture (cf. [19]).
1.1 Our Contribution
We propose a system, Zorro (see Figure 1(a)-1(b)), which
aims to address the following aforementioned problems. Our
contributions are summarized below.
VoD Definition. In Section 3, we give a natural definition of
the VoD -- for any quantity of interest (in our case, CTR) it
is the delta between an individual's value and the population
mean. The key challenge we try to solve through our sys-
tem design is how to operationalize such a definition in an
"absolute" sense, independent of a buyer's models for the VoD.
System Design. In Section 3 we give an overview of the key
functionalities/modules of Zorro. (1) An inference system to
operationalize our definition of the VoD. This is a challenging
inference problem as we only get access to sparse, noisy click
data from users. We propose to solve it by reducing CTR
estimation to an instance of matrix estimation, where the rows
of the induced matrix are users, columns are advertisers and
entries are historical click data. Thus we can exploit the rich
matrix estimation literature, and utilize data-driven, model
agnostic matrix estimation algorithms that have become a
workhorse in large-scale content recommendation systems.
(2) A module to identify and categorize online ads in an
automated fashion. (3) An interface between users, Zorro and
advertisers that ensures user data is not inadvertently "leaked"
to advertisers without user permission and ensures advertisers
only pay for user data based on the increased in accuracy it
provides to them (in particular, to estimate CTR).
Experiments. In Section 4, we perform four set of experi-
ments to verify the implementation of the modules described
above. (1) On a large real-world advertising click dataset,
we show we accurately estimate the CTR for a given user
and advertiser (R2 of 0.58) independently of an advertiser's
model, the crucial property we require to operationalize our
definition of the VoD. (2) On the same dataset, we show that
with respect to our definition of the VoD, there is large vari-
ation in the value of user data depending on the advertiser's
category (30% to 69% depending on category). (3) We show
we can accurately classify (83% True Positive and 98% True
Negative) and categorize ads (53% correct classification out
of 341 categories) by testing our implementation on popular
websites. (4) We show we can indeed prevent user data from
being "leaked" to advertisers by counting the number of re-
peats ads a user sees depending on whether Zorro is turned
"on" or "off" (number of repeats drops three-fold when "on") .
Forward Looking Intent. In Section 5, we show how one
can generalize our model to capture forward-looking intent of
users. We do so by extending the fundamental data structure
of interest, the matrix of (users × advertisers), to an order-3
tensor of (user × advertisers × user-intent) and furnishing an
algorithm that exploits the additional structure when estimat-
ing CTR. We verify experimentally that our proposed algo-
rithm does effectively exploit the additional latent structure
in the (user × advertisers × user-intent) tensor by comparing
against an appropriate baseline (R2 of 0.53 vs. 0.17).
2
1.2 Related Work
We divide related work into the three major buckets: (1) real-
time online systems to sell user data; (2) data mining to esti-
mate value of user data; (3) theoretical market mechanisms
to sell information.
Real-Time Systems to Sell User Data. We compare with
two proposed systems (cf. [24, 26]) that aim to design real-
time pricing mechanisms of online user data in the context
of advertising. The key difference is in Zorro, we propose
a precise definition of the VoD. Without such a definition,
which is agreed upon by both buyer and seller, price setting
remains a challenge.
In [24], they propose selling historical user data by post-
ing a price each time a user loads a webpage and running an
"infinite supply" auction, i.e., if an advertiser bids above the
posted price, then acquire user data for that webpage load.
This posted price is then constantly updated for each subse-
quent webpage load by that user. Such a mechanism poten-
tially has limitations. (i) Optimal online price setting for data
in such systems can be infeasible using standard methods (e.g.
a no-regret update mechanism). For example, no-regret up-
date schemes are feasible only if user data is relatively static.
However, user's browsing patterns are constantly changing
and so it is not immediately clear how to adapt a no-regret
update scheme to maximize revenue for such a case. (ii) Ad-
vertisers either get all of the data and pay the posted price or
receive none of it. This could potentially lead to a large loss
in revenue. Zorro aims to circumvent these two problems by
dividing the transaction into two segments: (i) an offline seg-
ment, where each advertiser negotiates a contract with Zorro
on how much they value a marginal increase in accuracy;
(ii) an online segment, where Zorro estimates the marginal
increase in accuracy without access to the advertisers mod-
els. Advertisers then pay based on the real-time estimated
increase in accuracy and the offline contract (see Section 3.4
for details of the implementation). Importantly, both the of-
fline and online segments of the contract in Zorro are entirely
auditable by a third-party leading to a more robust system.
n [26], they propose a blockchain based system and advo-
cate for a new cryptocurrency named Basic Attention Token
(BAT), which allows user to get paid in BAT for viewing ads
online. For their system to be widely adopted, it would require
an overhaul of the entire, very well-established online adver-
tising ecosystem (see Section 2), and need users, advertisers
and publishers to all buy into this new cryptocurrency. In
contrast, Zorro can be plugged into the current ad ecosystem
in a straightforward manner agnostic to a buyer's model. It
essentially functions as a novel third-party data seller (i.e.
Data Management Platform - see Section 2), where users get
paid for providing their data and for advertisers pay based on
the estimated increase in accuracy they experience. Further
in [26], they do not provide details on how pricing of user
data is done, a crucial part of any such system.
Data Mining to Estimate Value of User Data. Given how
important the problem of understanding the role of user data
in ad targeting, there has been a lot of empirical work in this
field. We highlight a few representative works, [3, 12, 28, 31].
The focus of such work has been to mine large historical
datasets to estimate the average value of user data. They do
indeed find that user data can increase value ranging from
20-60%, depending on the user and advertiser type, which is
line with our findings. However, these works propose highly
specific approaches that require intimate knowledge of how a
buyer will extract information/value from the data. In contrast,
by applying matrix estimation to estimate CTR, we propose a
general-purpose model agnostic method that allows advertis-
ers to estimate VoD on a query-by-query basis.
Theoretical Market Mechanisms to Sell Information.
Some works that propose theoretical market designs to sell
information include [2, 4]. We consider our work to be com-
plimentary to theirs as a fundamental quantity that needs to be
estimated in such works is the VoD. Zorro proposes a natural,
data-driven definition of VoD that can potentially be used to
operationalize such systems. Further the works listed have
a single buyer and multiple data sellers (e.g. a supply-chain
company buying data streams for demand forecasting). This
is in contrast with Zorro which is meant for direct, repeated
sales of data between multiple buyers and a single seller.
1.3 Organization of Paper
The rest of the paper is organized as follows: (1) In Section 2,
we give an overview of the online advertising ecosystem that
matches advertisers to users and the role of third-party data
sellers within it. (2) In Section 3, we precisely define the VoD
and justify it. We also give a detailed conceptual overview
of all of the key components of the Zorro architecture. (3) In
Section 4, we rigorously test the various components of our
architecture on large real-world datasets. (4) In Section 5, we
show how to extend Zorro to include forward-looking intent
and corroborate our proposal with experiments. (5) Lastly,
in Section 6, we discuss the role of Zorro in designing a
general-purpose data recommendation system.
2 Overview of Real-Time Bidding Ecosystem
The Real-Time Bidding (RTB) ecosystem refers to the entire
engineering infrastructure associated with buying and selling
ads in real-time as users load webpages. We give a brief
summary of the key players in the RTB ecosystem below.
Refer to [30] for a detailed description of RTB. See Figure
1(a) for an overview of the current ecosystem.
Advertisers and Demand Side Platforms (DSPs). Adver-
tisers are companies that want to market their product online.
Due to the engineering complexity of the RTB ecosystem,
advertisers normally go through a DSP to make bids into the
3
RTB system on their behalf. Thus DSPs essentially serve as
algorithmic online advertising agencies.
For our purposes it is not necessary to differentiate between
advertisers and DSPs, and we call the collective entity "adver-
tisers" for simplicity.
Publishers and Supply Side Platforms (SSPs). Websites
that users visit (e.g. Nytimes, ESPN) are called publishers.
When a user loads a publisher webpage, the publisher sends a
request out into the RTB system to serve the user ads. Anal-
ogous to advertisers, publishers go through SSPs to make
requests in the RTB system on their behalf.
Ad Exchanges (ADX). ADX serve as the interface between
DSPs and SSPs by matching ad requests from SSPs to bids
made by DSPs. They do so by using a combination of first-
price and second-price auctions.
Data Exchanges a.k.a Data Management Platforms
(DMPs). DMPs serve DSPs, SSPs and ADXs historical user
data (usually in real-time) to feed into their models to allow
for better, more targeted matchings between users and ads.
Our Focus is Advertiser-DMP Interface. The majority of
demand (and source of revenue) for historical user data is
from advertisers. User data is crucial to them as their models
require such data to make more accurate bids by evaluating
CTR. That is why we focus the discussion of this paper to
solve inefficiencies between how Users -- DMPs -- Advertis-
ers interface (see Section 1 for an overview of the current
market inefficiencies) . However none of our system design is
specific to the transaction between DSPs and DMPs, and can
be extended to include SSPs and ADXs as well (see Section
3). See Figure 1(b) for an overview of the proposed change
to ecosystem with Zorro.
3 Zorro System Overview
As mentioned in Section 1.1, we focus our system design on
the following functionalities that are required for Zorro to be
feasible in practice:
1. VoD Definition. We provide a natural, "absolute" def-
inition of the VoD that captures the incremental value
that data provides in estimating CTR. Importantly, our
definition is independent of the models of the buyer.
2. VoD Computation. To operationalize our definition of
the VoD, the key requirement is that for a given adver-
tiser, we need to estimate the value of a user's data inde-
pendently of an advertiser's models. We show how one
can achieve this using matrix estimation to accurately
estimate the CTR in a model agnostic manner.
3. Ad Identification & Categorization. A necessary step
to do CTR estimation, is to accurately identify when
users have clicked on an ad. Further to effectively group
advertisers, we need to categorize advertisers in a mean-
ingful and automated way. We show how to do both
ad identification and categorization by tying together
existing open source software packages.
4. User -- Zorro -- Advertiser Interface. We propose an
interface/dynamic that ensures advertisers pay for user
data based only on the increase in accuracy it brings. And
correspondingly, ensures user data is not inadvertently
"leaked" to advertisers without them paying for it.
In Sections 3.1 - 3.4, we explain how Zorro performs the
above four functions respectively. Our focus will be on "VoD
Definition", "VoD Computation" and the "User - Zorro - DSP
Interface" as that is where the most significant conceptual
contributions are. "Ad Identification & Categorization" is a
necessary component to make Zorro work and so we will
describe how to implement it briefly. Our proposed system
design will be corroborated with experiments in Section 4.
3.1 Defining the Value of Data
3.1.1 Problem Setup - CTR Estimation
We consider the case where there are m users and n adver-
tisers2. For a given User i and Advertiser j, we define the
probability of an ad click as CTRi j. We represent these m× n
CTR quantities for each user, advertiser pair through the (un-
observed) matrix M ∈ [0,1]m×n where M(i, j) = CTRi j.
The challenge is that we do not observe the matrix M.
Rather, we observe a sparse, noisy observations of its entries.
This is because in reality, most users only see a small percent-
age of all advertisers; further, for advertisers they do see, they
get exposed to their ads only a few times, most likely once.
We denote our observation matrix as X ∈ {[0,1]∪{?}}m×n.
If X i j =?, then user i has not been exposed to advertiser j. If
X i j ∈ [0,1], then X i j indicates the empirical average of the
number of times a user has clicked a particular ad.
The aim is to infer the CTR for any User i and Advertiser j
(i.e., M(i, j)), given only sparse, noisy observations (i.e., X).
3.1.2 Latent Variable Model
For any model to effectively learn the underlying CTR given
sparse, noisy data, some structure on the matrix M must be
assumed. A general, flexible way of capturing the underlying
structure in social data (e.g. Netflix challenge, product rec-
ommendation) is assuming a latent variable model (LVM),
arguably the canonical modeling choice from the lens of non-
parametric statistics (see cf. [18] and references therein).
Specifically for our case, we assume that the CTR for a
given user and advertiser is described by the following latent
variable model, M(i, j) = f (θi,ω j) where f : Rd1 × Rd2 →
2A "user" can also refer to a group of users. Similarly, an "advertiser"
can refer to a category of advertisers.
4
[0,1], θi ∈ Rd1 and ω j ∈ Rd2. Here θi,ω j refer to multi-
dimensional variables that denote latent factors associated
with user i and advertiser j. f is a latent function that maps
θi and ω j to a value between 0 and 1 denoting the underlying
CTR for that user, advertiser pair.
Note that f ,θi,ω j are all unobserved (i.e., latent). Instead,
recalling Section 3.1.1, we observe X where we model X(i, j)
as a (independent) random variable such that E[X(i, j)] =
M(i, j). From this sparse, noisy X, we need to estimate M,
which we explain how to do in Section 3.2.
3.1.3 Definition of Value of Data
Given the LVM described above, we can now provide a defi-
nition of the VoD.
Definition 3.1 (Value of Data) For i ∈ [m] and j ∈ [n], the
value of User i's data to Advertiser j is given by,
VoD(User i, Advertiser j) = f (θi,ω j)− Eθ[ f (θ,ω j)]
where Eθ[ f (θ,ω j)] = 1
k=1 f (θk,ω j)
m ∑m
(1)
In words, this definition states that the value of User i's
data to an Advertiser j is the absolute difference between
the average CTR for the advertiser across all users (given
by Eθ[ f (θ,ω j)]) and the CTR for user i (given by f (θi,ω j)).
Though seemingly natural, we consider the definition above
as arguably the most important conceptual contribution of
this paper and we now make a few remarks regarding it.
Model Agnostic VoD Definition. Note that our definition
of VoD is not dependent on any advertiser specific model,
but rather just on the prediction task itself (in this case
CTR estimation), which is what renders it model agnostic.
Further, it is worth noting that we can easily replace CTR
with any other quantity of interest in a two-sided market
(e.g. likelihood of lead conversion in an auto-insurance
marketplace, estimated average spend in a retail marketplace).
Translation of VoD to a Dollar Amount. To convert
this quantity to a dollar amount, we need to multiply
VoD(User i, Advertiser j) by how much Advertiser j values a
marginal increase in accuracy in estimating CTR. For exam-
ple, it could be be the case that an online healthcare advertiser
selling medical drugs values a unit increase in accuracy sig-
nificantly more than an advertiser selling sports equipment.
Hence, the quantity VoD(User i, Advertiser j) will need to be
scaled to capture this heterogeneity. In Section 3.4, we show in
detail how such advertiser specific adjustments can be made.
3.2 Computing the Value of Data
3.2.1 CTR Estimation via Matrix Estimation
To make our definition of VoD operational in practice, we
need an inference method to estimate CTR without relying
5
on the models of the advertisers, but instead using only ob-
servations in terms of historical clicks. Specifically, given X,
estimate M. This is why we choose matrix estimation, the de
facto, non-parametric method to learn the underlying mean of
a matrix from sparse, noisy observations. Moreover, it comes
with strong theoretical guarantees when a LVM structure is as-
sumed on the underlying mean matrix (cf. [18]). Importantly,
matrix estimation remains an actively researched area within
machine learning with a variety of scalable, production-grade
implementations (some standard libraries include [1, 23]).
Matrix Estimation Overview. Matrix estimation is the prob-
lem of recovering a data matrix from an incomplete and noisy
sampling of its entries. Specifically, there exists an under-
lying m× n matrix, M, of interest. We denote the observa-
tion matrix as X, whose entries are noisy versions of M, i.e.,
M(i, j) = E[X(i, j)]. In addition to the observations being
noisy, it is further assumed that we only observe a small sub-
set of the entries, i.e., each entry X(i, j) is observed with
probability ρ ∈ [0,1].
This setup has become of great interest due to its connec-
tion to recommendation systems, social network analysis, and
graph learning (graphon estimation). The key realization of
this rich literature is that one can estimate the true underlying
matrix from noisy, partial observations by simply taking a
low-rank approximation of the observed data. We refer an
interested reader to [10] for a broad overview and references
therein.
Definition 3.2 (Matrix Estimation) A matrix estimation al-
gorithm, denoted as ME : [0,1]m×n → Rm×n, takes as input a
noisy matrix X and outputs an estimator (cid:98)M.
CTR estimation via Matrix Estimation. CTR estimation
can be viewed as a special case of matrix estimation. Specif-
ically, X i j can be modeled as the empirical average of a
Bernoulli random variable with parameter f (θi,ω j). Thus
E[X i j] = f (θi,ω j) = Mi j (recall ρ is the frac-
we have that 1
ρ
tion of entries observed). This is exactly the setting in which
matrix estimation applies. Thus by applying a standard matrix
estimation algorithm, such as Singular Value Thresholding
(SVT)or Alternating Least Squares (ALS) (cf. [8, 14]), we
can reliably infer the underlying CTRi j, simply from sparse,
noisy observations (i.e., the small number of click or no click
data we have). Recall again that to carry out this procedure,
we do not need access to the advertiser's ML model, simply
the click data of any user using the Zorro system.
In Section 4.1 we show on a large real-world online adver-
tising datasets, matrix estimation (using ALS) does reliably
infer the underlying CTR from partial, noisy click data (after
appropriate aggregation of user and advertiser data). We
have out-of-sample performance of R2 = 0.58, which is
in line with state-of-the-art performance for matrix estimation.
Estimated Value of Data Definition. Analogous to Defini-
tion 3.1, we define a notion of VoD that can be empirically
measured. We recall certain quantities. Let X denote the
set of sparse noisy observations of user, advertiser data. Let
(cid:98)M = ME(X) be the estimated underlying CTR after applying
denote (cid:98)f (θi,ω j) := (cid:98)Mi j.
matrix estimation on the sparse, noisy observations X. We
Definition 3.3 (Estimated Value of Data) For i ∈ [m] and
j ∈ [n], the estimated value of User i's data to Advertiser
(2)
j is given by,(cid:100)VoD(User i, Advertiser j) = (cid:98)f (θi,ω j)− Eθ[(cid:98)f (θ,ω j)]
where Eθ[(cid:98)f (θ,ω j)] = 1
k=1(cid:98)f (θk,ω j)
m ∑m
In Section 4.2, we show on a large real-world online ad
click dataset, user's personal data has value (with respect
to Definition 3.3) ranging from 30% to 69% depending on
advertiser category. Importantly, Zorro allows advertiser's to
estimate the VoD for each user and hence purchase data on
a query-by-query basis, rather than through inefficient long-
term contracts as is done now (details in Section 3.4).
It is also worth highlighting that Definition 3.3 can be op-
erationalized using matrix estimation simply using historical
user ad clicks. Thus any DMP (or more generally third party
data seller) can perform this function if they collect such data.
3.3 Ad Identification & Categorization
3.3.1 Ad Identification
Recall that the focus of this work is display ads rather than
search ads (see Section 1).
Definition of Ad. Below we describe a straightforward two-
level filter system to identify display ads when a user clicks
on a link on a website.
1. Filter Level 1. We filter for hyperlinks on a website that
redirect to a url external to the website itself.
2. Filter Level 2. We parse the redirect url to check for
substrings that are almost always present when the ex-
ternal link redirects to ads hosted by third-party servers
(e.g. AdChoices, Outbrain). We do this by filtering the
redirect url using the industry standard Easylist filter list,
which is a set of rules designed by AdBlock (cf. [13]) to
identify ads.
In Section 4.3, we show that this simple system effectively
identifies whether an external hyperlink is an ad (True Positive
and True Negative rate of 83% and 97% respectively).
Generalization to Non-Traditional Ads. It is worth men-
tioning that companies not traditionally considered advertisers
do purchase user data to personalize their website experience
for each user (cf. [11]). For example, an online marketplace
company might purchase user browsing data to decide what
6
products to recommend to that user if he or she comes to their
homepage. Again users do not get to choose whether this per-
sonal data about them is allowed to be sold nor do they derive
income from it. We leave it as future work to generalize our
definition of ads (with the necessary adjustments made to the
entire Zorro system) to just Filter Level 1.
3.3.2 Ad Categorization
Interactive Advertising Bureau (IAB) Overview. Ad cate-
gorization is an important pre-processing step in grouping
advertisers together before performing matrix estimation to
compute the VoD. Otherwise, the matrix of users and adver-
tisers (i.e., X) is too sparse and we cannot effectively infer
the underlying CTR for a user, advertiser pair. We rely on a
widely adopted online advertising taxonomy 3 published by
the IAB (cf. [6]), which advertisers use to serve more rele-
vant content to users. This context taxonomy has four tiers
of classification (e.g. "Style & Fashion" → Women's Fash-
ion → Women's Clothing → Women's Business Wear). We
focus our categorization system on the top two tiers of IAB
categories of where there are 28 and 341 respectively.
Implementing IAB's Categorization. Given a website, clas-
sifying which category it belongs is a challenging task due to
the large number of Tier 1 and 2 categories. To automate the
process of classifying websites into IAB categories, we input
the text within the body of a webpage into a natural language
processing software, called uClassify (cf. [16]), to classify it
to an IAB category.
In Section 4.3, we show this natural language processing
system effectively classifies Wikipedia webpages into the cor-
rect IAB category, with an average Tier 1 and Tier 2 accuracy
of 67% and 53% respectively. Note that a random guess Tier
1 and Tier 2 guess would have an accuracy of approximately
3.6% and 0.3% respectively.
3.4 User -- Zorro -- Advertiser Interface
In this section, we explain from the advertisers' perspective,
how precisely they will interface with Zorro and gain value
from it. Recall this part of the system serves two purposes: (1)
ensure advertisers pay for user data based only on the increase
in accuracy it brings; (2) ensure user data is not inadvertently
"leaked" to advertisers without them paying for it. Our ap-
proach consists of two steps: (1) an offline step where adver-
tisers negotiate a contract of how much a marginal increase in
accuracy is worth; (2) an online step where advertisers query
Zorro for user data, and pay for it based on the estimated
increase in accuracy they will receive from purchasing it.
Offline Contract. Recall from Section 3.1.3 that each adver-
tiser can have a very different value for an increase in accuracy
(consider an online advertiser selling medical drugs vs. sports
3"IAB Tech Lab Content Taxonomy Version 2.0"
equipment - how much each values an unit increase CTR can
by vastly varying). Thus the estimated VoD (given by Defini-
tion 3.3) needs to be scaled accordingly. Doing this scaling is
precisely the purpose of the offline contract between a DSP
and Zorro. We describe the contract below.
Recall from Section 3.3.2 that before doing matrix esti-
mation, we group advertisers together by IAB category (e.g.
"Disease and Conditions", "Sports Equipment"). Since we es-
timate the VoD per advertising category, it follows that this
offline contract must be defined per IAB category as well. Let
there be C such categories. Then for advertiser j ∈ [M] and
category c ∈ [C], we define a function pc
j : [0,1] → R+. This
function, pc
j summarizes how much advertiser j values an
increase in accuracy for estimating CTR for category c.
j : for c ∈ [C]}
For example, a sports equipment advertiser might value a
10% increase in accuracy in the category "Sports Equipment"
to be worth $0.1 while may value a 20% increase in the
category "Disease and Conditions" to only be worth $0.001.
The functions pc
j capture this heterogeneity. Thus a negotiated
contract between Zorro and an advertiser j will be the set
Pj := {pc
Real-Time Interface. In the example below, let there be K
advertisers denoted {AD1, . . . ,ADK} that have negotiated an
offline contract with Zorro. We describe the proposed se-
quence of interactions that will occur between advertisers and
Zorro, each time a user on Zorro loads a publisher's webpage.
Whenever a user sends a webpage request, it is routed
through a Zorro proxy server and is anonymized by replacing
the User ID (i.e. user cookies) by a random ID (i.e. random
cookie). Advertiser's that have signed a contract with Zorro
can query the system to ask for user data before deciding what
bid to make. They then pay for this data based on the estimated
VoD and the offline contract. A key point to highlight is that a
new random ID is generated each time a user loads a webpage,
which is what anonymizes the user request.
Below is the pseudocode for this procedure. Refer to Figure
2 for a step-by-step overview of how RTB would work with
and without Zorro (adapted from [32]).
1. A random Zorro ID cookie is generated and linked with
User i's actual ID cookie.
6. If User i's ID cookie belongs to Zorro, then following
two actions occur
(a) Zorro applies matrix estimation and sends
{AD1, . . . ,ADK} following two signals: (i) for
each ADk, the estimated VoD of User i's data; (ii)
User i's actual personal data (e.g. demographic,
interest segments, browsing history).
(b) {AD1, . . . ,ADK} pays Zorro based on offline con-
tract defined above. Specifically AD j pays,
(cid:18)
(cid:17)(cid:19)
(cid:16)(cid:100)VoD(User i, Advertiser j)
.
max
c∈[C]
pc
j
7. A new random Zorro ID cookie is generated and linked
with User i's actual ID cookie.
Why User Data is Not "Leaked"? By refreshing a new ran-
dom Zorro ID cookie every time a user loads a webpage, we
ensure that to an advertiser who has not negotiated a contract
with Zorro, it seems like a random user is loading the web-
page. A crucial benefit of this architecture is that user data is
never permanently "leaked" as the random Zorro ID cookie is
constantly refreshed. Thus if a user who has installed Zorro
decides to go incognito at some point and no longer receive
money for providing their personal data, they easily can.
3.4.1 Model Agnostic Data Contracts
The problem of companies not wanting to share their models
or their data before a transaction has happened clearly extends
far beyond online advertising. This is why so many firms are
stuck in inefficient data contracts, where they purchase data
based on a long-term agreement or a coarse metric such as
the number of API calls they make to a data seller.
That is why we believe our proposed approach to designing
data contracts can serve as a general-purpose, empirically
auditable system for companies to reason about the VoD when
sourcing from external vendors. In essence, Zorro can serve as
a base to allow data buyers to pay based only on the estimated
increase in accuracy for a clearly defined prediction task,
when purchasing a new dataset from third-parties.
2. User i's with Zorro extension has their webpage request
routed through a Zorro proxy server.
4 Experiments
3. User i's loads a webpage.
The experiments are organized to answer four set of questions:
4. The publisher pings a RTB exchange for ad requests and
the RTB forwards the requests to advertisers.
5. {AD1, . . . ,ADK} query Zorro to check if User i's ID
cookie belongs to Zorro 4
4The random Zorro ID cookie could contain a Zorro specific numeric
signature to signify that user has the Zorro extension installed
1. Matrix Estimation. How accurately matrix estimation
is able to estimate the underlying CTR?
2. VoD. How much variation in VoD for user data is there
depending on an advertiser's category?
3. Ad Data Collection. How accurately can we identify
and categorize ads?
7
Figure 2: Figure 2(a) - how RTB works with current DMPs. Figure 2(b) - how we propose RTB work with Zorro.
(a)
(b)
4. User Data Protection. Can we reliably prevent user
data from being "leaked" to advertisers?
4.1 Matrix Estimation Experiments
Matrix Estimation Algorithms Applied. We focus on two
well-studied matrix estimation algorithms, Alternating Least
Squares (ALS) and Singular Value Thresholding (SVT). See
[8, 14] for a detailed description of these algorithms and the-
oretical guarantees of convergence and quality of the final
estimate. For ALS, we rely on a standard PySpark implemen-
tation (cf. [23]) and for SVT, we use the NumPy package
(cf. [29]) to perform the singular value decomposition. Lastly,
we implement a hybrid two-step algorithm that first does SVT
on the observation matrix and uses the outputted matrix as a
"warm start" for ALS.
Metric Used to Measure Accuracy. We measure quality of
performance using R2 5.
4.1.1 Avito Dataset
Description of Dataset Used. We test our system on the
Avito Context Ad Clicks dataset. To the best of our knowledge,
it is the largest and most comprehensive publicly available
ad click dataset. It can be found on Kaggle (cf. [15]). Avito
is the largest online marketplace in Russia with 70 million
unique monthly visitors. Another reason we use this dataset
is that its focus is contextual ads (i.e. banner ads), which is
also the focus of our work.
There are 190,157,735 context ad views in the dataset, out
of which 1,146,289 led to clicks. For each view, the dataset
includes metadata about the user (e.g. geographic location,
parameters of the search) and the ad itself (e.g. category of
the ad, historical CTR), along with whether the view led to a
click or not.
Grouping Users & Advertisers. We group users by their
geographical location (there are 3431 unique location IDs)
and ads by their category (there are 31 unique category IDs).
We choose location as it is a standard feature used in CTR
5For a set of values {y1, . . . ,yn} and estimates { y1, . . . , yn}, R2 = 1 −
, where SSVar = ∑n
i=1(yi − ¯y)2, SSRes = ∑n
SSVar
SSRes
i=1( yi − ¯y)2, and ¯y = 1
n yi
estimation, and related tasks. However, many other user fea-
tures can and should be incorporated in practice. Indeed, our
experiments are meant to showcase accurate CTR estimation
is possible by simple groupings of users. Similarly, in practice
advertisers are commonly grouped by category (see Section
3.3.2) and hence we do so as well.
Data Preprocessing. In Figure 3(a), we plot a histogram of
empirical CTR for each user in the Avito dataset (on a log
scale). We see a large number of user CTRs that are unreason-
ably high (e.g. there is a spike at 1.0). Indeed, a known issue in
such datasets is "click-bots" which are programs that automat-
ically click on ads to increase revenue in a fraudulent manner.
That is why we filter out all users beyond a certain threshold,
specifically 0.02. We do so because according to historical
Google AdWords data, "human" CTR for different advertiser
categories ranges between 0.0035 and 0.02. (cf. [20]).
This choice of threshold is justified empirically through Fig-
ure 3(b). We create a matrix of users and advertisers (grouped
according to location and category respectively), take its sin-
gular value decomposition, and then plot the singular values
of this matrix for different thresholds. If we don't threshold
(i.e. keep the threshold at 1.0), then the spectrum decays very
gradually. However, as we decrease the threshold, the spec-
trum decays progressively quicker, and the low-rank structure
we expect to see emerges (see Section 3.2). The optimal
threshold is approximately at 0.02, and at this threshold, we
still retain 81% of the original data.
Figure 3(b) is encouraging as it gives credence to the theo-
retical model laid out in Section 3.1.2. A LVM suggests that
the underlying matrix, M ought to be approximately low-rank.
And indeed, Figure 3(b) shows that the underlying data is
approximately rank 2! This justifies the LVM and provides a
structural reason for the success of the matrix estimation.
4.1.2 Matrix Estimation Results
Hyper-parameter Selection. For both ALS and SVT, there is
one major hyper-parameter to choose, the number of singular
values to keep. From Figure 3(b), we see that the top two
singular values contain most of the "signal" and hence we
choose to keep two singular values. This is further justified
through cross-validation. In PySpark's implementation of
8
(a)
(b)
Figure 3: In Figure 3(a), we plot the histogram of CTR for different users. In Figure 3(b), we plot singular values at different
CTR thresholds and percentage of data retained.
(a)
(b)
(c)
Figure 4: R2 vs. % Matrix Filled for SVT, ALS and SVT + ALS. In-Sample and Out-of-Sample performance plotted.
(a)
(b)
(c)
Figure 5: R2 vs. # Data Points used for SVT, ALS and SVT + ALS. In-Sample and Out-of-Sample performance plotted.
Figure 6: Figures 6(a)-6(b) - Plot of difference in empirical mean and variance per category pre- and post-ME respectively.
(c)
(a)
Figure 6(c) - % Difference in µ and (cid:99)var per category plotted on log scale.
(b)
9
ALS, a regularization parameter must also be chosen, which
we set to be 0.01, again using cross-validation.
CTR Estimation via Matrix Estimation Experiments. Fig-
ures 4(a)-5(c) show how the quality of matrix estimation
changes as we vary: (1) the percentage of entries observed;
(2) the number of data points used.
For Figures 4(a)-5(c), we keep the percentage of data with-
held for out-of-sample testing to be fixed at 20%. We see that
R2 performance of the various algorithms improves steadily
as the fraction of data observed and the number of data points
increases (with ALS outperforming SVT). However, this im-
provement levels off after approximately 40% of the data is
observed and 50 million data points are used. This indicates
two takeaways with regards to accurate CTR estimation: (1)
some amount of grouping of users and advertisers is an im-
portant pre-processing to ensure the resulting matrix is not
too sparse; (2) our system needs to collect approximately
on the order of tens of millions of user data to apply matrix
estimation effectively.
Signal vs. Noise Thresholding via Matrix Estimation.
From Section 3.2, we know that matrix estimation should help
uncover the underlying mean of the CTR matrix, M, while re-
ducing the noise as long as the underlying matrix is low-rank
(which we verified through Figure 3(b)). In particular for the
Avito dataset, we expect that the average CTR per advertiser
category should remain approximately the same both before
and after applying matrix estimation 6. However, the variance
in CTR per advertiser category should drop significantly.
We recall the notation used in Section 3.2. Let
µ j
pre :=
1
# observed
m
∑
i=1
X i j 1(X i j (cid:54)=?),
µ j
post :=
1
m
(cid:98)Mi j.
m
∑
i=1
pre, µ j
In words, µ j
post are the pre-ME and post-ME empirical
average CTRs for each advertiser category j in the Avito
dataset. Let,
(X i j 1(X i j (cid:54)=?)− µ j
pre)2,
m
1
∑
((cid:98)Mi j − µ j
# observed
1
m
i=1
m
pre :=
(cid:99)var j
(cid:99)var j
In words, (cid:99)var j
post :=
i=1
∑
pre,(cid:99)var j
post)2.
post are the pre-ME and post-ME empir-
ical variance in CTR for each advertiser category j in the
Avito dataset.
In Figures 6(a)-6(c), we plot the normalized differences in
6There are a large number of user location id's (3434 of them). Thus the
pre-ME estimate of CTR per advertiser category should be relatively stable.
10
µdiff :=
1
µ j
pre
mean and variance per advertiser category 7,
µ j
pre− µ j
1
(µ j
pre)2
post, (cid:99)vardiff :=
(cid:99)var j
pre−(cid:99)var j
post.
while (cid:99)vardiff is of the order 200%− 1550%. Thus as desired,
smaller than (cid:99)vardiff, indicating that matrix estimation does
We see from Figure 6(c) that µdiff is of the order 0.2%− 73%,
µdiff is on average approximately three orders of magnitude
indeed effectively retain signal and threshold out noise.
Summary. In summary, ALS outperforms SVT (the two-step
procedure of applying SVT and then ALS gives comparable
performance). The best R2 achieved is 0.58; This is in-line
with or better than state-of-the-art R2 performance for well-
studied datasets such as Movielens, which have performance
in the range of 0.3− 0.4 (cf. [17]). Further, our experiments
show that matrix estimation does effectively retain signal and
threshold out noise.
Thus matrix estimation (specifically, ALS) can be used as
an accurate, model-agnostic method to do CTR estimation
as long as Zorro has access to sufficient amount of user data,
and careful grouping of users and advertiser is done.
4.2 Value of Data Experiments
An important question to ask is if with respect to Definition
3.3 of VoD, whether an advertiser finds value in a user's per-
sonal data? Intuitively, if the CTR distribution for a particular
advertiser category is tightly concentrated around its mean,
then acquiring user data is not as important for that adver-
tiser (as there is not much variation in CTR across users). In
contrast, if the CTR distribution for an advertiser category
is diffuse, then advertisers are incentivized to acquire per-
sonal user data as it helps them identify which segment of the
distribution a user lies in.
Large Variation in VoD Across Advertiser Categories. We
plot the distribution of CTR per category using a Box-and-
Whisker's plot in Figure 7(a), and see instances of both cases
above. For example, advertisers in Category 18 have relatively
lower VoD as the CTR distribution is tightly concentrated,
while advertisers in Category 4 have quite a large VoD as the
CTR distribution is quite diffuse. Thus we can visually tell
that advertiser's do indeed have a different VoD depending
on their category, giving credence to Definition 3.3.
We can summarize these visual findings through the fol-
lowing quantity,
(cid:100)VoDnorm
j
:=
1
µ j
pre
(cid:18) 1
m
m
∑
i=1
(cid:19)
(cid:100)VoD(User i, Advertiser j)
.
7We normalize by µ j
pre to ensure µdiff can be appropriately compared
between categories. For example, a 0.1 difference is significant if the un-
derlying average CTR is 0.01, but not as much if it is 0.5. Same reasoning
applies for (cid:99)vardiff.
j
j
In words, (cid:100)VoDnorm
riences per user 8. In Figure 7(b), we plot (cid:100)VoDnorm
various Avito categories. We see that (cid:100)VoDnorm
is the average VoD Advertiser j expe-
for the
j
ranges from
30% to 69% depending on advertiser category, indicating that
there is large variation in VoD depending on which category
an advertiser belongs to.
Query-by-Query Estimation of VoD. It is important to high-
light that in our proposed system, Advertiser j can com-
pute the VoD on a query-by-query basis. In other words,
each time User i loads a webpage, Advertiser j can compute
(cid:100)VoD(User i, Advertiser j). This is contrast with how adver-
tiser's and third-party data providers engage currently, where
advertisers pay based on long-term contracts or a coarse met-
ric such as number of API calls made.
Estimating Dollar Value of VoD. Ideally we would like to
translate the estimated VoD to a dollar amount per advertiser
category. Unfortunately, the Avito advertiser categories are
anonymized and so instead, we give a conservative estimate.
From Section 1, the size of the (rapidly growing) display
advertising market is USD 54 Billion. Since the minimum
is estimated to be 30% (in line with previous work,
see Section 1.2), it follows that if Zorro prevents advertisers
from getting user data without paying for it, the minimum
loss of value for advertisers is on the order of USD 16 Billion.
(cid:100)VoDnorm
j
4.3 Online Ad Experiments
In this section, we test how well we identify and categorize
online ads by tying together open source software packages.
4.3.1 Online Ad Identification
Overview of Ad Identification Module. Recall from Sec-
tion 3.3.1 that the main filter we use on the redirect url is
EasyList, the same filter set used by AdBlock. In addition, we
manually add keywords such as "doubleclick" and "criteo"
that commonly occur when a user has clicked on an ad.
Overview of Ad Identification Experiment. To evaluate
this simple system, we conducted a crowdsourced experiment.
The experiment consisted of iterating through Alexa's top 500
global sites (cf. [27]) and clicking ten unique ads on the first
30 valid sites (websites that were not in English or had no
ads were skipped). If there were not ten unique ads on the
websites landing page, then ads on different webpages under
the some domain were searched for. Additionally, hyperlinks
that were not ads were also clicked to test whether our system
could also identify non-ads accurately.
Result of Ad Identification Experiment. The result of the
above crowdsourced experiment are shown below.
8Again, like in Section 4.1.2, we normalize by µ j
pre to ensure we can
appropriately compare between categories.
(a)
(b)
Figure 7: Figure 7(a) - Box and Whisker's plot of CTR distri-
bution per category. Figure 7(b) - Plot of normalized average
(cid:100)VoD per category.
Classified Ad
Classified Not Ad
True Ad
239 (83%)
2 (97%)
Not Ad
49 (17%)
68 (3%)
We have a True Positive rate of 83% and a True Negative
Rate of 97%, indicating that our system can reliably identify
whether a hyperlink on a webpage is an ad or not. Additionally,
a large portion of the ads we could not identify were because
they did not go through an ad exchange (i.e. have a redirect
url that spawned a tab in a browser). If we do not include such
ads, then our True Positive rates goes up to 88%. Such ads
are the result of direct negotiations between a website and
advertisers. Thus they are not of relevance to our system as
they do not go through the RTB ecosystem, and third-party
data is not purchased by advertisers in such instances.
4.3.2 Online Ad Categorization
Overview of Ad Categorization Module. Recall from Sec-
tion 3.3.2 (and verified in Section 4.1.2) that ad categorization
is an important pre-processing step to group advertiser's to-
gether to get good out-of-sample performance in CTR estima-
tion. As detailed in Section 3.3.2, we use the industry standard
IAB taxonomy to categorize advertisers. To do so, we use the
11
open-source natural language processing software uClassify
to predict a webpage's IAB category based on the text in the
webpage's body. We focus on the top two Tiers of the IAB
taxonomy as the categorization is sufficiently detailed. It is
straightforward to extend to the bottom two tiers if required.
Overview of Ad Categorization Experiment. Unfortu-
nately, there do not exist good online datasets with IAB cate-
gorizations of websites that we can use to test the accuracy
of our system. Thus we designed a proxy experiment using
Wikipedia webpages as follows. Wikipedia provides a de-
tailed hierarchal categorization of its own webpages. Thus for
each IAB Tier 1 category (28 in total), we randomly sample
two Tier 2 categories within it and then define a mapping
from these IAB Tier 2 category to a near identical Wikipedia
category. For example, the IAB category "Travel Type" was
mapped to the Wikipedia category "Types of Travel". If a
close Wikipedia category was not found, we resample an IAB
Tier 2 category such that a matching Wikipedia is found.
Considering these relatively benign sources of error, and
the large number of Tier 1 and Tier 2 categories, our system
reliably categorizes an advertiser to a relevant IAB category,
based on the advertiser's webpage.
4.4 User Data Protection Experiments
Recall from Section 3.4 that for our system, it is essential that
personally identifiable information (PII) of a user on the Zorro
For each Wikipedia category selected, we chose up to 100
articles under that category. If there were not 100 articles for a
given category (for many there were not), we iterated through
the subcategories of that category, and randomly sampled
articles from subcategories until we reached a 100. We then
ran our classifier on the text from those articles.
Result of Ad Categorization Experiment. The results of
the above experiment are shown in Figures 8(a) and 8(b). For
Tier 1 categories, the classification accuracy was 67.36% and
for Tier 2 categories, the classification accuracy was 52.75%.
This is consistent as correctly classifying a Tier 1 category is a
necessary requirement to correctly classify a Tier 2 category.
It is worth noting that these results are far better than if we
random selected a category. Recall that there are 28 IAB Tier
1categories and 341 Tier 2 categories and so a random classi-
fication would give 3.6% and 0.3% accuracy respectively.
Furthermore, it is likely that our system performs better
than our tests indicate for the following two reasons. (1) It
was often that case that articles from subcategories of the
selected Wikipedia category were somewhat unrelated the
further down in the Wikipedia hierarchy the subcategory was.
For example, the category "Environment" was mapped to a
Wikipedia subcategory "Underground Laboratories". In such
mappings, correct classification is not possible. (2) If an out-
putted IAB category was incorrect, it was still often strongly
related to the correct one. For example, articles on children's
films would be classified as family or fantasy films.
(a)
(b)
Figure 8: Average uClassify classifier accuracy on IAB Tier 1
and Tier 2 categories is 67.36% and 52.75% respectively.
system, is not inadvertently "leaked" to advertisers. We begin
by giving a brief overview of how advertisers track users
across the web and then describe an experiment to verify that
user data is indeed not leaked to an advertiser.
Tracking Techniques. As users surf the web, advertisers
track users through three main methods (cf. [22]).
(1) Third Party Cookies: Primary method of tracking. Cook-
ies on a user's browser not placed there by the primary website
he/she is visiting 9. Meant solely for tracking users across
web. Hence we identify and remove such cookies by checking
that they are unrelated to the primary website.
(2) Cache: Images and other website-specific information
are stored on the browser as cookies. Meant for more efficient
page loads as website information need not be retrieved from
the server. However, websites can encode information in such
cookies to identify and track users. Easily easily solved by
clearing the cache periodically. However from the experimen-
tal results, this is not currently necessary as websites do not
tend to forward this information on to advertisers.
(3) Flash Cookies: Cookies stored in flash player plug-
ins (e.g. Adobe Flash Player). Flash cookies are harder to
clear without leading to a significantly poorer user experience;
9First-party cookies are placed on a user's browser by the primary website.
Used to store site specific settings such as login information.
12
specifically, clearing flash cookies would require clearing data
from every plugin a user has installed. Again as with (2), from
experimental results, this is not currently necessary as a mini-
mal number of advertisers go through such a mechanism.
Overview of User Data Protection Experiment. We design
a simple test to verify whether our system prevents inadvertent
"leakage" of user data to advertisers. We do so by clicking
on an ad on an initial website, and counting the number of
times that ad is repeated on subsequent websites. We do this
experiment with: (1) clearing no cookies; (2) blocking only
third-party cookie blocking; (3) blocking all types of cookies
listed above. We automate this experiment by using software
packages Selenium and Pyautogui to automatically click on
ads on the top 500 websites listed by Alexa (cf. [27]). On
each website, our software clicks every "iframe" element and
uses our ad identification module to classify if is is an ad or
not.
Result of User Data Protection Experiment. See Table 4.4
for results of the above experiment. As desired, we see that
when we simply block third-party cookies, we reduce the per-
centage of repeat ads show from 29% to 9% as compared to if
there was no blocking. By blocking all cookies listed above, it
does not affect the number of repeat ads seen, indicating that
blocking Cache and Flash cookies is currently less important.
Total Ads Clicks
# Repeat Ads
Zorro Off
3rd Party
103
30 (29%)
107
10 (9%)
All
107
10 (9%)
5 Forward Looking Intent
Explicit User Intent in Display Advertising. A large loss
of value in the current ecosystem is that user intent is not
captured. For example, it is common in online advertising that
once a user has made a retail purchase, ads for the purchased
item are repeatedly shown to the user after the fact. This is
clearly a source of large loss of revenue for advertisers and a
great irritant to users.
In a future iteration of Zorro, we intend to provide an API
to users that let them indicate forward-looking intent for the
category of ads they would like to see. Below we extend the
LVM described in Section 3.1.2 to incorporate user intent.
Further, we describe an algorithm to estimate CTR that ex-
ploits the additional structure when users provide intent. We
then verify that our proposed algorithm does indeed exploit
the additional structure when estimating CTR
CTR Estimation with Intent. Let the set of categories a user
can provide intent for be indexed by [k] :={1, . . . ,k}. Then we
can model user intent by generalizing M to an order-3 tensor,
T ∈ [0,1]m×n×k. Here the l-th, m×n "slice" of T is a matrix of
users and advertisers (appropriately grouped) conditioned on
user intent being l ∈ [k]. As before, we get noisy, sparse obser-
vations from T , which we denote as W ∈ {[0,1]∪{?}}m×n×k.
Analogous to the matrix case, if W (i, j,l) =?, then User i has
not been exposed to Advertiser j, while providing intent l.
And if W (i, j,l) ∈ [0,1], then W i j indicates the empirical av-
erage of the number of times a user has clicked a particular
ad while providing a specific intent. The aim is estimating T
from sparse, noisy observations in W .
LVM for CTR estimation with Intent. Recall from Section
3.1.2 that we impose a LVM on the underlying mean matrix
M ∈ [0,1]m×n, where M(i, j) = f (θi,ω j). We extend the LVM
by assuming that W (i, j,l) = f (θi,ω j,ψl), where f : Rd1 ×
Rd2 × Rd3 → [0,1], θi ∈ Rd1, ω j ∈ Rd2 and ψl ∈ Rd3. f , θ
and ω are defined identically to that in Section 3.1.2. The
extension we make to the model now is that ψ is a latent factor
that captures the effect of user intent in CTR estimation.
Algorithm for Tensor Based CTR Estimation. We know
from an extension of the arguments made in [9] that if T
follows a LVM, then it is "approximately" low-rank. Thus
we postulate that the flattened tensor, i.e. T flat ∈ [0,1]m×(n×k)
is also "approximately low-rank". Here T flat is the matrix
constructed by appending together the l different "slices" of
T . Thus we propose the following simple algorithm:
(1) Construct W flat ∈ [0,1]m×(n×k) from W identically to
how T flat is defined; (2) Let T flat = ME(W flat); (3) Declare
T (i, j,l) = T flat(i, (l − 1)m + j)
Experimental Verification of Algorithm. In the Avito
dataset, fortunately for our purposes, there is user intent data
provided (called "SearchCategoryID"). There are 40 user
search category IDs present in the dataset. Analogous to
Section 4.1.1, where we create a 3434× 31 matrix of user
locations and ad category, we create an order-3 tensor of di-
mension 3434 × 31 × 40, by incorporating user intent. We
now present two experimental results.
In Figure 9(a), the rank of the flattened user-advertiser-
intent matrix (i.e. W flat) induced from the tensor (i.e. W ) is
approximately 3! This justifies the generalized LVM above.
In Figure 9(b), we compare our proposed algorithm against
a natural baseline; in the baseline, we run matrix estimation
(using ALS) for each of the 40 "slices" separately. By doing
so, we do not exploit any of the additional (latent) structure
across the user intent dimension. We plot the R2 for the al-
gorithms as a function of the percentage of the tensor that is
filled. As desired, we see that the out-of-sample R2 for our
algorithm (0.53) is significantly improved over the baseline
(0.17), indicating that our algorithm does effectively exploit
the latent structure across all three dimensions.
6 Conclusion
In conclusion, we provide an "absolute" definition of the
VoD, which is independent of a buyer's model for VoD. We
operationalize our proposed definition by relying on matrix
estimation, and our experiments show that it faithfully (us-
ing out-of-sample performance) recovers the VoD. As future
work, we intend to open-source and release a Zorro Chrome
13
[4] Dirk Bergemann, Alessandro Bonatti, and Alex Smolin.
The design and price of information. American Eco-
nomic Review, 108(1):1 -- 48, January 2018.
[5] Hal Berghel. Equifax and the latest round of identity
theft roulette. Computer, 50(12):72 -- 76, 2017.
[6] Internet Advertising Bureau. Iab tech lab content tax-
https://www.iab.com/guidelines/iab-quality-
onomy.
assurance-guidelines-qag-taxonomy/, 2018.
[7] Carole Cadwalladr and Emma Graham-Harrison. Re-
vealed: 50 million facebook profiles harvested for cam-
bridge analytica in major data breach. The Guardian,
17, 2018.
[8] Jian-Feng Cai, Emmanuel J Candès, and Zuowei Shen.
A singular value thresholding algorithm for matrix com-
pletion. SIAM Journal on Optimization, 20(4):1956 --
1982, 2010.
[9] Sourav Chatterjee et al. Matrix estimation by universal
singular value thresholding. The Annals of Statistics,
43(1):177 -- 214, 2015.
[10] Mark A Davenport and Justin Romberg. An overview of
low-rank matrix recovery from incomplete observations.
IEEE Journal of Selected Topics in Signal Processing,
10(4):608 -- 622, 2016.
[11] Magdalini Eirinaki and Michalis Vazirgiannis. Web
mining for web personalization. ACM Trans. Internet
Technol., 3(1):1 -- 27, February 2003.
[12] Phillipa Gill, Vijay Erramilli, Augustin Chaintreau, Bal-
achander Krishnamurthy, Konstantina Papagiannaki,
and Pablo Rodriguez. Follow the money: understanding
economics of online aggregation and advertising. In
Proceedings of the 2013 conference on Internet mea-
surement conference, pages 141 -- 148. ACM, 2013.
[13] Umar Iqbal, Zubair Shafiq, and Zhiyun Qian. The ad
wars: Retrospective measurement and analysis of anti-
adblock filter lists. In Proceedings of the 2017 Inter-
net Measurement Conference, IMC '17, pages 171 -- 183,
New York, NY, USA, 2017. ACM.
[14] Prateek Jain, Praneeth Netrapalli, and Sujay Sanghavi.
Low-rank matrix completion using alternating minimiza-
tion. In Proceedings of the forty-fifth annual ACM sym-
posium on Theory of computing, pages 665 -- 674. ACM,
2013.
[15] Kaggle.
context
ad clicks.
Kaggle
avito
https://www.kaggle.com/c/avito-context-ad-clicks/,
2015.
(a)
(b)
Figure 9: Figure 9(a) - singular values of flattened tensor for
different CTR thresholds & % of data retained. Figure 9(b) -
R2 vs. % entries filled for our proposed algorithm vs. baseline.
extension for public use. Lastly, we note that our proposed
architecture, where we estimate the VoD in a model agnostic
manner, can serve as base to build a general-purpose data rec-
ommendation system, i.e., instead of buyers querying Zorro,
Zorro recommends data to buyers if estimated VoD is high.
References
[1] Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng
Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, San-
jay Ghemawat, Geoffrey Irving, Michael Isard, et al.
Tensorflow: A system for large-scale machine learning.
In 12th {USENIX} Symposium on Operating Systems
Design and Implementation ({OSDI} 16), pages 265 --
283, 2016.
[2] Anish Agarwal, Munther A. Dahleh, and Tuhin Sarkar.
A marketplace for data: An algorithmic solution. CoRR,
abs/1805.08125, 2018.
[3] Howard Beales. The value of behavioral targeting. Net-
work Advertising Initiative, 1, 2010.
[16] J Kågström, R Karlsson, and E Kågström. uclassify web
service. 2013.
14
[17] Yashodhan Karandikar. Cse 255 assignment 1: Movie
rating prediction using the movielens dataset.
[25] David Silverman. Iab internet advertising revenue report.
Interactive Advertising Bureau. New York, 2018.
[26] Brave Software.
Basic attention token (bat)
white paper- blockchain based digital advertising.
https://basicattentiontoken.org, 2018.
[27] Alexa Top. 500 global sites, 2018.
[28] Janice Y Tsai, Serge Egelman, Lorrie Cranor, and
Alessandro Acquisti. The effect of online privacy infor-
mation on purchasing behavior: An experimental study.
Information Systems Research, 22(2):254 -- 268, 2011.
[29] Stefan Van Der Walt, S Chris Colbert, and Gael Varo-
quaux. The numpy array: a structure for efficient numer-
ical computation. Computing in Science & Engineering,
13(2):22, 2011.
[30] Jun Wang, Weinan Zhang, Shuai Yuan, et al. Display
advertising with real-time bidding (rtb) and behavioural
targeting. Foundations and Trends R(cid:13) in Information
Retrieval, 11(4-5):297 -- 435, 2017.
[31] Jun Yan, Ning Liu, Gang Wang, Wen Zhang, Yun Jiang,
and Zheng Chen. How much can behavioral targeting
help online advertising? In Proceedings of the 18th
international conference on World wide web, pages 261 --
270. ACM, 2009.
[32] Weinan Zhang, Shuai Yuan, Jun Wang, and Xuehua
Shen. Real-time bidding benchmarking with ipinyou
dataset. arXiv preprint arXiv:1407.7073, 2014.
[18] Christina Lee, Yihua Li, Devavrat Shah, and Dogyoon
Song. Blind regression: Nonparametric regression for
latent variable models via collaborative filtering.
In
Advances in Neural Information Processing Systems,
pages 2155 -- 2163, 2016.
[19] Boberdoo LLC.
Ping post software -- the basics.
https://www.boberdoo.com/ping-post-ping-tree, 2019.
LLC.
[20] Wordstream
ads
benchmarks
industry.
https://www.wordstream.com/blog/ws/2016/02/29/google-
adwords-industry-benchmarks, 2016.
Google
for
your
[21] Charles Mann. How click fraud could swallow the inter-
net. Wired Magazine, 14(1), 2006.
[22] Jonathan R Mayer and John C Mitchell. Third-party
In 2012 IEEE
web tracking: Policy and technology.
Symposium on Security and Privacy, pages 413 -- 427.
IEEE, 2012.
[23] Xiangrui Meng, Joseph Bradley, Burak Yavuz, Evan
Sparks, Shivaram Venkataraman, Davies Liu, Jeremy
Freeman, DB Tsai, Manish Amde, Sean Owen, et al.
Mllib: Machine learning in apache spark. The Journal
of Machine Learning Research, 17(1):1235 -- 1241, 2016.
[24] Christopher Riederer, Vijay Erramilli, Augustin Chain-
treau, Balachander Krishnamurthy, and Pablo Rodriguez.
For sale: your data: by: you. In Proceedings of the 10th
ACM WORKSHOP on Hot Topics in Networks, page 13.
ACM, 2011.
15
|
1506.00572 | 2 | 1506 | 2015-06-13T14:37:25 | How much is said in a microblog? A multilingual inquiry based on Weibo and Twitter | [
"cs.SI",
"cs.CL",
"cs.CY"
] | This paper presents a multilingual study on, per single post of microblog text, (a) how much can be said, (b) how much is written in terms of characters and bytes, and (c) how much is said in terms of information content in posts by different organizations in different languages. Focusing on three different languages (English, Chinese, and Japanese), this research analyses Weibo and Twitter accounts of major embassies and news agencies. We first establish our criterion for quantifying "how much can be said" in a digital text based on the openly available Universal Declaration of Human Rights and the translated subtitles from TED talks. These parallel corpora allow us to determine the number of characters and bits needed to represent the same content in different languages and character encodings. We then derive the amount of information that is actually contained in microblog posts authored by selected accounts on Weibo and Twitter. Our results confirm that languages with larger character sets such as Chinese and Japanese contain more information per character than English, but the actual information content contained within a microblog text varies depending on both the type of organization and the language of the post. We conclude with a discussion on the design implications of microblog text limits for different languages. | cs.SI | cs | How much is said in a microblog?
A multilingual inquiry based on Weibo and Twitter
Han-Teng Liao
Oxford Internet Institute
University of Oxford
[email protected]
King-wa Fu
Journalism and Media Studies Centre
University of Hong Kong
[email protected]
Scott A. Hale
Oxford Internet Institute
University of Oxford
[email protected]
5
1
0
2
n
u
J
3
1
]
I
S
.
s
c
[
2
v
2
7
5
0
0
.
6
0
5
1
:
v
i
X
r
a
ABSTRACT
This paper presents a multilingual study on, per single post
of microblog text, (a) how much can be said, (b) how much
is written in terms of characters and bytes, and (c) how
much is said in terms of information content in posts by
different organizations in different languages. Focusing on
three different languages (English, Chinese, and Japanese),
this research analyses Weibo and Twitter accounts of major
embassies and news agencies. We first establish our crite-
rion for quantifying “how much can be said” in a digital text
based on the openly available Universal Declaration of Hu-
man Rights and the translated subtitles from TED talks.
These parallel corpora allow us to determine the number of
characters and bits needed to represent the same content in
different languages and character encodings. We then de-
rive the amount of information that is actually contained
in microblog posts authored by selected accounts on Weibo
and Twitter. Our results confirm that languages with larger
character sets such as Chinese and Japanese contain more
information per character than English, but the actual in-
formation content contained within a microblog text varies
depending on both the type of organization and the language
of the post. We conclude with a discussion on the design im-
plications of microblog text limits for different languages.
Categories and Subject Descriptors
H.5.3 [Information Interfaces and Presentation (e.g.,
HCI)]: Group and Organization Interfaces—Web-based in-
teraction; H.5.4 [Information Interfaces and Presenta-
tion (e.g., HCI)]: Hypertext/Hypermedia
General Terms
Human Factors; Measurement
Keywords
Microblogs; Language; Design; Social Networking
c(cid:13) Liao, H.T., Fu, K.W., Hale, S.A. 2015. This is the authors’ ver-
It is posted here for your personal use. Not for
sion of the work.
redistribution.
The definitive version was published in WebSci ’15,
http://dx.doi.org/10.1145/2786451.2786486.
1. ARBITRARY CHARACTER LIMITS?
Microblogging platforms are distinguished from traditional
blogging platforms by having a limit on the length of posts.
Such length limitations are reported to lower the time and
thought required to create new content and allow for faster
and more timely exchange of information [6, 16]. Most
studies considering the effects of length limitations on the
user experience of microblogging have examined English-
language content, but there is ample reason to believe that
universal length limitation have different effects on people
writing content in different languages. It has been reported
by major media such as BBC [13] and the Atlantic [29] that
one can express much more content in languages other than
English within a given character limit, most notably the 140-
character limit of Twitter and the 140-byte limit of Short
Message Service (SMS, or text messages). Chinese [2] and
Japanese [33] are often cited as examples of “more expres-
sive” languages within such space limits.
However, a definitive answer using systematic and quan-
tifiable methods is yet to be provided to the question of how
much more expressive a given language is within such length
limitations. Neubig and Duh [26] provide the only academic
work on this subject and use an information-theoretic ap-
proach. They find that Chinese and Japanese are the most
expressive languages per character, but do not use parallel
corpora (i.e., the same information in multiple languages)
in their work. Apart from academic scholarship, the issue
of language expressiveness has received much attention in
the popular press with the BBC reporting that 140 Chinese
characters amounts to 70 to 80 English words [13]. Blog-
gers have also weighed in on the debate with one blogger
writing that 140 Chinese characters could contain five times
more content than the same number of English characters
[30] and another blogger claiming that “140 Chinese char-
acters is more like 500 characters on Twitter.com” [5]. By
machine translating foreign-language content from Twitter
from “a few users,” IT Consultant Ben Summers reported
on his blog that Japanese tweets could contain information
that would take up to 260 English characters to express [33].
These differing estimates and the lack of academic scholar-
ship on this topic motivate our paper.
The imposition of length constraints has profound effects
on how platforms are used and hence the user experience of
these platforms. The effects of length constraints on users
are not new or unique to microblogging platforms. The
user experience of SMS has received much attention, and
scholars have found that the limitations resulted in specific
language practices including specific abbreviations (e.g., b4,
2day) as well as more contractions in comparison to instant
messaging [21]. It is difficult to disentangle length and in-
put device limitations when comparing instant messaging
and SMS [21], but one study found SMS messages sent via
Internet-connected PCs were longer than those sent directly
from mobile (feature) phones [10]. Finally, Grinter et al. [10]
found that the length limitations of SMS allowed teenagers
to forego conversational conventions and reduce the overall
time spent on interactions.
In this paper, we attempt to answer the general questions
of how space/length restrictions affect (a) how much can
be said, (b) how much space is used, and therefore (c) how
much is actually said within imposed space limitations and
how these factors differ across languages. These basic ques-
tions are central to any cross-lingual assessment of the im-
pact of length limitations on microblog posts and hence the
user experience of people on such services and have impor-
tant ramifications for designers of microblogging platforms
as well as people using such platforms.
1.1 Reasons for length limitations
Early character limits were often imposed as a result of
technical limitations. For example, the character limit of
text messages (SMS) was the result of an engineering choice
to send SMS messages via the existing signaling channels
of the GSM system (but with a lower priority than other
signaling messages) [14]. After including header informa-
tion, the existing channel left 140 octets (bytes) available
for the text of an SMS message. Using 7-bit character en-
coding, 160 Latin characters were made to fit in this space
[1]. Hillebrand, an early pioneer of SMS, reasoned that 160
characters would be sufficient through an examination of
the number of characters (including spaces and punctuation
marks) for random short paragraphs [9, 34]. Although we
cannot be certain which language he used for this exercise,
it is likely to have been English or German. If another lan-
guage (particularly a language with a non-Roman alphabet
such as Japanese or Chinese) had been used, Hillebrand may
have reached a different conclusion about the feasibility of
using the existing signaling channels of the GSM system and
ultimately developed SMS in a different manner with a dif-
ferent character limit.
The continuation of character limits on modern microblog-
ging platforms is less a case of technical limitations and more
often a design choice aiming to cultivate a certain user ex-
perience. Best practices published by Twitter in 2013 men-
tioned the 140-character limit and stated that “creativity
loves constraints and simplicity is at our core.” [36]. Char-
acter limitations may have very different effects in differ-
ent languages as cross-platform and cross-lingual analysis
of microblogs suggests language is an important factor for
researchers to consider [e.g., 7, 11, 12, 15, 19].
When Twitter launched, it set a limit of 140 characters for
posts so that a Twitter post would fit within a single SMS
message and leave 20 characters for usernames and other
commands [9, 23]. It should be noted, however, that only
for 140 English characters would this have ever been the case
as SMS itself has a hard limit of 140-bytes within a single
message as previously stated. Thus, a single SMS message
can only accommodate 70 Chinese or Japanese characters.
The limits imposed on Twitter, however, are character limits
and not byte limits [37], and thus, it is possible to send a
tweet with 140 Chinese characters even though such a tweet
would never have fit within one SMS message. Now that
most Twitter traffic comes from native apps on smartphones,
which have no technical limitation on the length of messages,
the continued imposition of the 140-character limit is due
less to technical reasons and more to user-experience design
choices.
When Sina Weibo launched in mainland China it also im-
posed a limit on the length of posts. This limit is often
reported to also be 140 characters [e.g., 5], but the data
we collected in this study revealed several posts with more
than 140 characters. Our experimentation with the Sina
Weibo interface indicates that Sina Weibo likely imposes a
byte limit and not a character limit. We found that posts
on Sina Weibo can be up 140 Chinese characters or 280
English/Latin characters.1 In other words, Sina Weibo im-
poses a varying limit on the number characters a message
may contain depending on the number of bytes required to
store each character. In practice, this means that messages
in English on the platform could be twice as long as mes-
sages in Chinese, with most other languages having maxi-
mum lengths somewhere between these endpoints depending
on the frequency of accented and other special characters in
the language.
Apart from the question of the actual limits imposed on
different communication platforms, marketers and other users
of microblogging platforms have asked what the “ideal” mes-
sage length is for driving strong engagement, with different
numbers reported for different platforms including Twitter,
Facebook and Google Plus [17]. For example, it is reported
and recommended by various industry research organiza-
tions that the ideal length of a tweet is either 100 or 71–100
characters [17, 35]. It is also reported that the ideal Face-
book post be around 40 characters while the Google Plus
posts should be around 60 characters [35], despite these plat-
forms allowing much longer posts in practice [3]. However,
despite the marketing and industry interest in the factor of
microblog post length for engagement optimization, there
is little research on length across different languages and/or
different platforms. In other words, we need to fill the gap in
both research and design with cross-cultural considerations
[34] regarding both the limits and actual practices regarding
the length of posts.
1.2 A parallel corpora approach
Corpus linguists have partially addressed the question on
how much can be said in different languages using parallel
corpora. Before Twitter came into existence, the Director
of Linguistic Data Consortium (a major linguistic research
data keeper) conducted a well-designed comparison of Chi-
nese and English using the LDC parallel Chinese/English
corpora, producing ratio results ranging from 1.96 to 2.27
for texts and 1.19 to 1.24 for compressed (gzipped) files [20].
The underlying idea behind Liberman’s research design was
straightforward. By comparing the actual storage space of
texts of the same content in different languages, one can
see how much “space” is required to store/convey the same
content. This idea is expressed by the equation below:
SlangA × IClangA = SlangB × IClangB
(1)
1This suggests Sina Weibo imposes a byte limit with a char-
acter encoding such as GBK that uses one byte to store
most English/Latin characters and two bytes to store other
characters including most Chinese characters.
Slang denotes the “space” units required to store the con-
tent in language lang. IClang denotes the amount of “in-
formation content” per space unit in language lang. The
equation holds only for parallel corpora, which by definition
contain the same content in each language (i.e., where langA
and langB contain the same information written in different
languages).
While Liberman’s research is systematic and addresses the
computational questions of information storage, it is of lim-
ited application to modern social media data for two rea-
sons. First, the amount of storage space required to store
information in different languages depends on the character
encoding used. Liberman’s work used the Chinese national
standard GB-2312 and not the international Unicode en-
codings, which have become more common for multilingual
websites and applications. Second, the data Liberman used
was formal and legalistic in nature. The ratios between such
formal text may not apply to the more conversational and
informal text commonly found on modern social media plat-
forms.
2. METHODS AND DATA SELECTION
We propose a systematic step-wise approach that can be
extended to cover more platforms, languages, and types of
microblogs, with the aim to answer our three main research
questions. We choose to focus on news and diplomacy orga-
nization accounts because we expect the length of messages
would be integral to the overall communication strategies,
including in potential cross-lingual or cross-cultural scenar-
ios. The data selection in this paper is limited to two plat-
forms, three languages, and the most recent posts of 54
microblogs. However, as the first multiplatform and mul-
tilingual study its contributions are important and lay the
foundation for future work with additional account types,
languages, and platforms.
The following sections describe the three steps of the re-
search process, each of which answers one of our research
questions concerning (a) how much can be said, (b) how
much is typed and posted, and (c) how much is said in differ-
ent languages by different organizations. First, we calculate
the cross-lingual ratios of information content.
2.1 Calculating the cross-lingual ratios of in-
formation content based on UDHR and TED
talks
Following the approach of Liberman’s corpus linguistic
study [20], we propose a generic research design to measure
the ratios of “information content” in different languages.
The ratio of information content per space for language B
to language A can be derived from Equation 1 to produce
the ratio given in Equation 2. This is the inverse ratio of
“space” required to store the same content when a parallel
corpus is used. In other words, if more space is required to
store the same content for language B than language A, the
ratio value will be less than one, indicating the information
content per space unit of language B is smaller than that of
language A.
ratio(langB, langA) =
IClangB
IClangA
=
SlangA
SlangB
(2)
The potential of using Web content as a parallel corpus
for research has been proposed [28] and executed [18]. We
use a parallel corpus formed from human-translated user-
generated content for several reasons. First, the content is
open and freely available providing for easier replication in
comparison to conventional parallel linguistic corpora, which
often require license fees to use. Second, the human transla-
tion of the content usually provides better quality text than
corpora formed with machine translation of open content.
Third, most user-generated content is generally more up-to-
date and contemporary than that of conventional corpora
and is closer in style to the text used on microblogging plat-
forms and thereby provides a more suitable basis for the
research on microblogging.
We analyze two corpora to understand how corpus se-
lection influences our results. The first corpus we use is
the UDHR in Unicode Project, which provides translations
of the Universal Declaration of Human Rights (UDHR) to
demonstrate the use of Unicode for multilingual environ-
ments. Because of the normative, universal and semile-
gal status of UDHR, the Unicode translation project is the
“most translated text” [38]. Thus, the project can provide
parallel corpora that cover the most languages in the world
for comparison.
Our second parallel corpus is formed from the TED Open
Translation Project. This project is led by a well-known,
Internet-friendly organization and uses professional human
translation service to kick-start the crowd-sourced transla-
tion of video subtitles. The translated video subtitles form
a multilingual corpora that is comparatively closer in style
to informal, online communication. Of course speeches on
TED.com are still different from online expressions such as
microblog posts, but they are closer to online expressions
when compared to legal or governmental data that is com-
monly used in corpus linguistics because of its institutional
availability.
To calculate the ratios of information content across lan-
guages, we downloaded the texts from the UDHR in Unicode
Project and subtitles for all of the 1,847 TED talks available
from TED.com (a complete sample of all videos available as
of March 16, 2015). We have downloaded the available tran-
scripts of four language versions: English, Japanese, simpli-
fied Chinese, and traditional Chinese. Our full analysis of
the TED talks include 1,522 videos from all the videos avail-
able because 209 videos did not have transcripts available in
all four languages and a further 116 videos had extremely
short lengths (these were mostly performance videos).
The texts were parsed and the number of characters in
each video in each language was determined. For the UDHR
datasets, we use each paragraph as a unit to calculate the
respective ratios across languages and then produce basic
descriptive statistics. For the TED datasets, we use each
speech (i.e., all the subtitles for one video) as a unit.
2.2 Measuring the text lengths of posts from
selected accounts from Twitter and Weibo
To measure the text lengths of microblog posts, we exam-
ine the posts by 54 news and embassy organizations.
For Twitter, we selected 36 accounts that post either in
English, Japanese, or Chinese. The most recent 200 tweets
for each account were collected through the Twitter REST
API on 22 January 2015. For Weibo, we collected sam-
ples from a data intermediary called Weiboscope [7, 8] that
provided uncensored and randomly sampled datasets from
Weibo. The data was first collected by making SQL requests
to the database for messages posted between 1 January and
22 January 2015. To ensure the number of posts per ac-
count was large enough, we only considered accounts having
more than 50 posts. Two Weibo accounts that are owned by
the World Bank and the Economist (with respective screen
names “世界银行” and “经济学人集团”) were thus excluded,
leaving us with 18 accounts for analysis. The first column
of Table 1 lists the screen names of the Twitter and Weibo
accounts analyzed.
With the help of human readers and our own language
identification algorithms, we found that almost all accounts
used one language. We coded each account accordingly with
their respective language codes. We found that two Twitter
accounts posted content in both English and Japanese (“UK-
inJapan” and “usembassytokyo”). We collected 100 posts in
each language for each of these accounts, and analyze the
content in each language separately. Each of these accounts
is marked with an asterisk (*) in Table 1.
We coded each organization account as either embassy or
news (the type column of Table 1). A small amount of gray
area exists between these two categories. For example, news
organizations such as China’s People’s Daily (“people cn”)
may also be media organs of state governments. Other orga-
nizations, such as the UN and World Bank, are not strictly
embassies. Nevertheless, these international organizations
have their political significance in diplomacy and in some
ways their use of microblogs will be similar to the use of
microblogs by embassies. At the very least, these embassy
and embassy-like organizations provide a contrast in type
to news organizations. The selected accounts in Table 1
thus contain a mixture of microblogs written in different
languages and belonging to different types of organizations.
Although the selection of accounts and posts is not ran-
dom, the selected accounts cover major news and embassy
organizations across three major languages on two major
microblogging platforms.
To measure the text lengths, we first remove all hyperlinks
in the microblog posts and calculate the number of Unicode
characters per post.2 Based on this measurement we derive
the average length in characters (i.e., the mean value of char-
acters per post) for each account (we ignore the differences
between single-byte and multi-byte characters as Twitter
does in enforcing its character limit [37]). With the aver-
age length values across different platforms, languages, and
types of organizations, we should find out whether and how
such character lengths vary, thereby answering the question
of how much is typed and posted.
2.3 Estimating the relative information con-
tent in a microblog post for cross-lingual
comparison
2We remove URLs from posts before making our length com-
parison. Hong et al. [15] found that tweets in different lan-
guages included URLs at different frequencies, but within
our restricted set of embassies and news organizations, we
find that URLs are included within tweets at a similar rate
between the three languages we analyze. The majority of
tweets we analyze in each language contained exactly one
URL (67% of the Chinese tweets, 69% of the English tweets,
and 72% of the Japanese tweets that we analyze had exactly
one URL). The analysis presented here strips URLs from all
tweets and compares the results, but repeating the analy-
sis with only tweets that contained exactly one URL yields
nearly identical findings.
Twitter
Screen name
ft
ftchina
KyodoNewsENG
wsj
xinhuanetnews
47news
asahi
bbcjapan
mainichiJapaneseews
nikkei
peopledailyjp
sankei news
WSJJapan
asahi shinsen
bbcchinese
china kyodonews
chinesewsj
djy cn
dw chinese
people cn
voachina
UKinJapan*
UN
usembassytokyo*
worldbank
ChnEmbassy jp
Embassy ItalyJP
IcelandEmbTokyo
IsraelinJapan
koreanemb japan
NLinJapan
UKinJapan*
UKRinJPN
usembassytokyo*
worldbanktokyo
france in china
UNRadioChinese
usa china talk
Weibo
Language
English
English
English
English
English
Japanese
Japanese
Japanese
Japanese
Japanese
Japanese
Japanese
Japanese
Simplified Chinese
Simplified Chinese
Simplified Chinese
Simplified Chinese
Simplified Chinese
Simplified Chinese
Simplified Chinese
Simplified Chinese
English
English
English
English
Japanese
Japanese
Japanese
Japanese
Japanese
Japanese
Japanese
Japanese
Japanese
Japanese
Simplified Chinese
Simplified Chinese
Simplified Chinese
Language
Screen name
人民网
Simplified Chinese
日本共同社
Simplified Chinese
韩国中央日报
Simplified Chinese
半岛电视台AlJazeera
Simplified Chinese
ETtoday新聞雲
Simplified Chinese
FT中文网
Simplified Chinese
华尔街日报中文网
Simplified Chinese
福布斯中文网
Simplified Chinese
路透中文网Reuters
Simplified Chinese
联合国
Simplified Chinese
美国驻华大使馆
Simplified Chinese
加拿大大使馆官方微博 Simplified Chinese
韩国驻华大使馆
Simplified Chinese
以色列驻华使馆
Simplified Chinese
俄罗斯驻华大使馆
Simplified Chinese
韩国驻华大使馆
Simplified Chinese
以色列驻华使馆
Simplified Chinese
俄罗斯驻华大使馆
Simplified Chinese
Type
news
news
news
news
news
news
news
news
news
news
news
news
news
news
news
news
news
news
news
news
news
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
Type
news
news
news
news
news
news
news
news
news
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
embassy
Table 1: Twitter and Weibo accounts analyzed in
this study
characters. Using Chinese written with traditional charac-
ters as the baseline, the set of box plots to the left shows
for the same paragraph content of UDHR that it takes on
average nearly four times as many characters in English to
express the same content (the mean value of 3.95 is shown
by the red rectangular box in the eng column). Similarly,
it takes only about 1.6 as many characters to express the
same content in Japanese. There is no significant difference
in the number of traditional or simplified characters needed
to write the same content in Chinese. If the type of language
used in the UDHR was typical of the language used in mi-
croblog posts, these findings would indicate that a tweet (or
a Sina Weibo post) of 140 Chinese characters could convey
nearly four times as much information as an English mes-
sage of the same character length and 1.6 times as much
information as a Japanese message of the same character
length.
In order to understand the impact of the specific parallel
corpus used on these calculations, we repeat the same anal-
ysis using the speech content of TED talks and show the
results in the right set of box plots in the same figure (Fig-
ure 1). This analysis yields slightly lower numbers, showing
that it takes on average about 3.2 times the number the
characters to express the same content in English in com-
parison to Chinese. Similarly, it takes about 1.3 times as
many characters to express the same content in Japanese in
comparison to Chinese. Once again, there is no significant
difference between the number of simplified or traditional
characters needed to express the same content in Chinese.
Relating these findings to microblogs, we can calculate the
equivalent number of characters in each of our languages
compared to 140 characters in English. These results are
shown by the scale on the right y-axis for each set of box
plots where the mean for English is set to 140 characters.
Based on the UDHR outcomes, we find that 140-character
worth of English content can be expressed in 35.53 Chinese
characters or 55.71 Japanese characters. Similarly 140 char-
acters worth of English content of a TED talk can be ex-
pressed in 43.61 Chinese characters or 56.70 Japanese char-
acters. The differences between our two corpora are likely
due to the nature of the content of each corpus, as the lan-
guage used in the UDHR is much more formal and legalistic
in comparison to the transcripts of TED talks.3
Beyond character measurements, we can also measure space
more traditionally using the number of binary digits (or bits,
eight of which form a byte) needed to store the same infor-
mation content in different languages. The number of bits
needed to store a character depends on the encoding scheme
used. The most popular multilingual encoding scheme in
use today is UTF-8, which uses a variable number of bytes
to store a character. Almost all the characters used in En-
glish along with common punctuation marks require 8-bits
(one byte) to store, while most characters used in Japanese
and Chinese require 24-bits (three bytes) to store. Results
from both our corpora (Figure 2) show that information in
3One limitation of using TED talks is that the vast majority
of talks are given in English and other language transcripts
are translations of this English source. There may be dif-
ferences in how closely transcripts in each language follow
the spoken dialogue, but we find that filler words (e.g., uh,
er, and um) are rarely transcribed in any language, includ-
ing English. Future work may consider developing a more
balanced corpus by using movie subtitles with a variety of
source languages.
Figure 1: Relative ratio of characters in English
(eng), Japanese (jpn), and Chinese using simplified
characters (cmn hans) required to express the same
content compared to Chinese using traditional char-
acters (cmn hant) as the baseline.
After we calculate the ratios of information content and
the lengths, we can then derive an estimation of relative
information content (RIC) as given in Equation 3.
RIClangA =
SlangB
ratio(langB, langA)
= S
(cid:48)
langA
(3)
The main purpose of the Equation 3 is to allow for cross-
lingual comparisons on an equal basis. Using language A as
the baseline, the relative information content can be derived
by dividing the value of the number of space units (SlangB )
used when the content is expressed in language B with the
ratio of information content (ratio(langB, langA)). The for-
mula produces the equivalent space that would be required
to expressed the same content in language A (S(cid:48)
langA ). We
present results where space is measured either as characters
or as UTF-8 bytes.
3. FINDINGS
The findings are presented in three subsections, each an-
swering one of our three main research questions. The find-
ings of the first subsection confirm that Chinese and Japanese
contain more information per character. The findings of the
second subsection show a mixed picture on the length of
microblog posts by different organizations in different lan-
guages. Combining the results from the first two subsec-
tions, the third and final subsection presents the derived
measurement of the relative information content expressed
in microblog posts by different organizations in different lan-
guages.
3.1 How much can be said: UDHR and TED
talks
Figure 1 shows the outcomes of the research on the UDHR
texts and the TED talks respectively using box plots. Both
sets of box plots show that indeed, per Unicode character,
the Chinese language can express the same idea with fewer
engjpncmn_hantcmn_hans0123456UDHRengjpncmn_hantcmn_hans0.00.51.01.52.02.53.03.54.0TED Talks0.035.470.9106.3141.8177.2212.7021.843.665.487.2109.0130.8152.6174.4Figure 2: Relative ratio of bits (when the UTF-8
encoding scheme is used) required to express the
same content when compared to Traditional Chinese
(cmn hant).
Figure 3: Length of microblog posts in characters
(excluding URLs) in English (eng), Japanese (jpn)
and Simplified Chinese (cmn hans).
all our languages can be stored in similar amounts of space
using UTF-8 encoding. While text in English requires more
characters, the number of bits in UTF-8 required to store
those characters is similar to the number of bits needed to
store the same content in Chinese or Japanese.
We next turn to the questions of how much is typed and
how much is said in microblog posts of different languages
by different types of organizations. In answering these ques-
tions, we use the character calculations from the TED talk
corpus. The number of characters used in a more univer-
sal measure that is directly apparent to the user with a
larger effect upon the user experience.4 Character limits
are also the type of limits most users of microblogging plat-
forms are familiar with since Twitter’s limit is set this way.
We use the measures calculated from the TED talk corpus
rather than the UDHR corpus as a more conservative es-
timate of the differences between languages. Furthermore,
the type of language used in microblog posts is likely closer
to the language used in the TED talks than to the language
used in the UDHR. Using Chinese with simplified characters
(cmn hans) as the baseline, we have the following ratios:
ratio(eng, cmn hans) = 3.21
(4)
ratio(jpn, cmn hans) = 1.30
(5)
3.2 How much is typed and posted: Organi-
zations in action
We find that different organizations on Weibo and Twit-
ter platforms post messages of slightly different character
lengths in different languages.
4In contrast, the number of bits needed to store text depends
on the character encoding used. Even within UTF-8, there
are multiple ways to store accented characters and other
characters such that two pieces of text that appear identical
to the user could actually require a different number of bytes
to be stored in UTF-8.
Figure 3 summarizes the overall outcomes of the microblog
post length (in characters) with box plots. The left subplots
show the results for Twitter, and the right subplots show
the results for Weibo. The top subplots show the results
for embassies, and the bottom subplots show the results for
news organizations.
The average lengths of posts by English-language Twit-
ter accounts (105 characters with URLs; 81 without URLs)
are close to the “ideal length” of a tweet reported by mar-
keting/engagement companies of 100 or 71–100 characters
[17, 35]. For English, the embassy-type accounts on average
have longer posts than the news-type accounts.
The average lengths of Japanese-language Twitter accounts
show a large variance, particularly within embassy-type or-
ganizations. Although this observation should not be taken
as conclusive because of the limited number of Japanese-
language embassy accounts (N = 18), it is nonetheless in-
dicative to see the relatively wide variation among the embassy-
type accounts. In addition, within the news-type accounts,
some Japanese-language tweets are shorter than both En-
glish and Chinese.
The average lengths of posts by Chinese-language Twitter
accounts tend to be shorter than English-language posts for
embassy-type organizations, whereas they tend to be longer
than both English and Japanese posts for news-type orga-
nizations. The shortest average length of all the accounts in
our dataset belongs to a Chinese-language Twitter account
used by Falun Gong (screen name “djy cn”) to broadcast
news in mainland China. Comparing Twitter and Weibo
in Chinese, we find that the average lengths of posts by
Chinese-language Weibo accounts tend to be longer than
their Twitter counterparts.
3.3 How much is said: Comparing languages
and organizations
Combining the two sets of findings above, this final sub-
section derives the amount of information content in posts
in different languages by different types of organizations.
Similar to Figure 3 in layout, Figure 4 shows the estimated
information content using the Chinese language (with sim-
engjpncmn_hantcmn_hans0123456UDHRengjpncmn_hantcmn_hans0.00.51.01.52.02.53.03.54.0TED Talks53.1106.2159.4212.5265.6318.7063.2126.3189.5252.6315.8020406080100120140Average Lengthplatform = Twitterplatform = Weiboengjpncmn_hansLanguage020406080100120140Average Lengthengjpncmn_hansLanguagetype = embassytype = newsamination it appears that Sina Weibo enforces a byte-length
limit using a variable-length character encoding such as GBK.
We found that on Sina Weibo that we were able to post
messages using up to 140 Chinese characters or 280 English
characters. This difference in characters available to users is
an important distinction and one that our data show many
Weibo users make use of as the inclusion of URLs and other
English/Latin characters leaves more space for more text (of
any language) on Weibo in comparison to Twitter.
4. DISCUSSIONS AND CONCLUSIONS
Based on a corpus linguistic approach with open, crowd-
sourced translation data, we have updated the cross-lingual
ratios of information content between English, Chinese, and
Japanese. Then we have applied the results to measure em-
pirically how much can be said and how much is actually
said in microblog posts of different languages on Twitter
and Sina Weibo.
The construction of relative information content measures
allows researchers to move beyond length-based comparisons
for microblogging to consider other content. Wikipedia, for
instance, maintains a list of the one thousand most impor-
tant articles and compares their lengths across language edi-
tions using “language weights” (relative to English) [22]. Our
findings analyzing both the UDHR and TED talks show the
impact of corpus selection for determining such weights, and
calculating accurate weights will require a parallel corpus
with a high degree of similarity to the type of text com-
monly found in Wikipedia.
We find differences in microblogging activity most strongly
by platform and language, but also by organization type. In
general, English-language posts use more characters than ei-
ther Japanese- or Chinese-language posts on Twitter. How-
ever, once the information content per character of each lan-
guage is taken into account, the relative information con-
tent per post shows that English-language posts actually
contain less information per post than either Japanese- or
Chinese-language posts. As a consequence, the very def-
inition of what constitutes “micro” on each platform dif-
fers by language, and this suggests that the user experi-
ence of microblogging platforms may differ greatly between
languages. We further find that information content differs
between Twitter and Weibo, with posts on Weibo generally
containing more information than posts on Twitter. This
platform difference is likely a consequence of how the plat-
forms enforce their length limits. Twitter enforces a limit of
140 characters without regard to the storage requirements
of the characters, while Weibo enforces a byte-limit.
Our work thus adds to the existing scholarship [e.g., 15,
24, 27] showing how the user experience of the same plat-
form differs for users writing content in different languages.
While character or byte limits impose a superficially simi-
lar measure of length across languages, we find considerable
difference in the actual amount of information content avail-
able and commonly included within microblog posts written
in different languages. Hence such a superficial measure of
length actually results in wide user-experience differences.
These user-experience differences impact both content con-
sumption and content creation as demonstrated by the liter-
ature on the impact of length restrictions on SMS messages
[e.g., 10, 21]. Our findings have important ramifications for
efforts to translate content across languages: content that
fits within one Japanese- or Chinese-language post may not
Figure 4: Relative information content (RIC) of mi-
croblog posts in English (eng), Japanese (jpn) and
Simplified Chinese (cmn hans). RIC is shown here
as the equivalent number of Simplified Chinese char-
acters (RICcmn hans).
plified characters) as the baseline.
Effectively, what distinguishes Figure 4 from Figure 3 is
that the number of characters in English and Japanese posts
have been divided by the information content ratios found
using the TED talk corpus (Equation 4 and Equation 5 re-
spectively).
In contrast to the average length in characters, the com-
parisons of information content show a clear pattern. Most
Chinese language microblog posts contain more information
than either posts in Japanese or English. Furthermore, posts
on Sina Weibo often contain even more content than posts
on Twitter.
We see a larger variation among new organizations in com-
parison to embassies. Reflecting the variance in character
lengths, the variance in information content per post among
Japanese news organizations is quite large. By manually
inspecting the data, we found that the shorter posts often
included only a news headline while the longer posts often
contained a short summary of the news story.
Across the three languages, the findings suggest a general
pattern where Chinese-language posts contain more infor-
mation per post than either Japanese-language or English-
language posts. This difference is strongest for embassies
(the top two subplots in Figure 4). For the news organiza-
tions, a higher degree of overlap exists. For example, there
are Chinese-language Twitter accounts such as Falun Gong
(shown as an outlier dot in the figure) posting short mes-
sages. The variation in Japanese-language accounts means
that some Japanese-language accounts post messages with
more information content than some Chinese-language ac-
counts, but other Japanese-language accounts post messages
with an amount of information content that is similar to
many English-language accounts.
Chinese-language posts are generally longer and contain
more information on Weibo than Chinese-language posts on
Twitter. Confusingly, we found that some Weibo posts con-
tained more than 140 characters whereas no Twitter posts
did. As explained previously, based on further manual ex-
020406080100120140platform = Twitterplatform = Weiboengjpncmn_hansLanguage020406080100120140RIC cmn_hansengjpncmn_hansLanguagetype = embassytype = newsRIC cmn_hansfit within one English-language post when character limits
are imposed. Our findings also suggest that if the “ideal”
length to maximize engagement sought after by marketing
companies does exist, it is almost certainly language depen-
dent.
The reliance on certain language-dependent properties of
information content is bound to raise a fundamental ques-
tion about how such design parameters can be uncritically
applied to other languages and platforms. It also challenges
the perceived wisdom such as the “ideal length” of tweets on
the grounds that these previous findings cannot be general-
ized straightforwardly to other languages and/or platforms.
Our findings show clear differences between the information
content commonly contained in Japanese-, Chinese-, and
English-language posts.
From the perspective of multilingual Internet or Inter-
net linguistics, digital support for the main East Asian lan-
guages is an important milestone for the internationalization
of the Internet. As put by Nakayama Shigeru, a major East
Asian Science Technology and Society scholar [31]:
East Asians are accustomed to dealing with a
multi-byte system, in contrast to Western mono-
byte reductionist culture. It may be that in the
future our multi-byte culture will prove advanta-
geous for dealing with complex systems (p. 12).
Although one does not have to agree with Shigeru’s criti-
cism of “Western mono-byte reductionist culture,” the find-
ings here do suggest that platform designers and researchers
need to carefully analyze what settings and assumptions may
be language-specific.
By using open and freely available user-generated transla-
tion data as parallel corpora and by collecting both Twitter
and Weibo posts in three languages, this research has inves-
tigated the language-specific effects of character limits on
microblogging.
It is expected that more systematic mea-
surement and more linguistically diverse data sets will help
both researchers and designers reexamine some of the de-
signs and practices that are in reality language-dependent
and/or language-biased and thereby find ways to account
for them and develop better designs and research that are
language-aware and/or language-neutral. Further research
is necessary in this area to expand our knowledge of inter-
nationalization in Web Science and Internet research as well
as cross-cultural Human-Computer Interaction (HCI).
Our work has been the first to investigate character lengths,
byte lengths, and information content across two major mi-
croblogging platforms. Future work will build upon the work
presented here to increase sample sizes, language coverage,
and the types of users included. The use of less formal, more
natural parallel corpora (i.e., TED talks) rather than formal
legalistic prose for understanding informal conversation on
Twitter and Weibo is also an important contribution. As the
efforts to build parallel corpora from Twitter and other user-
generated content platforms [e.g., 4, 25, 32] and from the
Web more generally [e.g., 18, 28] improve and organizations
such as Meedan and Global Voices continue facilitating the
human translation of user-generated content, we will have
additional tools and corpora through which to examine the
impact of length and other constraints on Internet-mediated
communication.
Acknowledgments
This research was supported in part by the University of
Oxford’s ESRC Impact Acceleration Account and Higher
Education Innovation Fund (HEIF) allocation. The authors
would like to thank our anonymous reviewers for their help-
ful comments.
5. REFERENCES
[1] 3rd Generation Partnership Project (3GPP). Digital
cellular telecommunications system (phase 2+);
universal mobile telecommunications system (umts);
technical realization of the short message service (sms)
(3gpp ts 23.040 version 12.2.0 release 12). Technical
report, 2014. http:
//www.etsi.org/deliver/etsi_ts/123000_123099/
123040/12.02.00_60/ts_123040v120200p.pdf.
[2] Y. Chan. Microblogs reshape news in China. China
Media Project, Oct. 2010.
http://cmp.hku.hk/2010/10/12/8021/.
[3] J. Constine. Facebook ups character limit to 60,000,
Google+’s is still bigger. 2011.
http://techcrunch.com/2011/11/30/status-
update-character-limit/.
[4] J. Dalton. Useful data from “pointless babble”:
Discovering sentence-aligned parallel texts from
Twitter streams. Master’s thesis, Department of
Computer Science, University of Oxford, 2012.
[5] L. Dugan. 140 Characters On Chinese Twitter Is More
Like 500 Characters On Twitter.com. AllTwitter, July
2011.
http://www.mediabistro.com/alltwitter/140-
characters-on-chinese-twitter-is-more-like-
500-characters-on-twitter-com_b11951.
[6] M. Ebner and M. Schiefner. Microblogging - more
than fun. In Proceedings of the IADIS International
Conference on Mobile Learning, pages 155–159.
IADIS, 2008.
[7] K.-w. Fu, C.-h. Chan, and M. Chau. Assessing
censorship on microblogs in China: Discriminatory
keyword analysis and impact evaluation of the “Real
Name Registration” Policy. IEEE Internet Computing,
17(3):42–50, 2013.
[8] K.-w. Fu and M. Chau. Reality check for the Chinese
microblog space: A random sampling approach. PLOS
ONE, 8(3):e58356, 2013.
[9] C. Gayomali. The text message turns 20: A brief
history of SMS, Dec. 2012.
http://theweek.com/articles/469869/text-
message-turns-20-brief-history-sms.
[10] R. E. Grinter and M. A. Eldridge. y do tngrs luv 2 txt
msg? In Proceedings of the Seventh European
Conference on Computer-Supported Cooperative Work,
ECSCW 2001, pages 219–238. Springer Netherlands,
2001.
[11] S. A. Hale. Impact of platform design on
cross-language information exchange. In Proceedings of
the 2012 ACM Annual Conference on Human Factors
in Computing Systems Extended Abstracts, CHI EA
’12, pages 1363–1368, New York, NY, USA, 2012.
ACM.
[12] S. A. Hale. Global connectivity and multilinguals in
the Twitter network. In Proceedings of the SIGCHI
[27] U. Pfeil, P. Zaphiris, and C. S. Ang. Cultural
differences in collaborative authoring of Wikipedia.
Journal of Computer-Mediated Communication,
12(1):88–113, 2006.
[28] P. Resnik and N. A. Smith. The Web as a parallel
corpus. Comput. Linguist., 29(3):349–380, Sept. 2003.
[29] R. J. Rosen. How much can you say in 140 characters?
A lot, if you speak Japanese. The Atlantic, Sept. 2011.
http://www.theatlantic.com/technology/archive/
2011/09/how-much-can-you-say-in-140-
characters-a-lot-if-you-speak-
japanese/245199/.
[30] B. Ruby. Twitter versus Weibo: What You Need To
Know. The Fearless Group, Nov. 2012.
http://thefearlessgroup.com/twitter-versus-
weibo-what-you-need-to-know/.
[31] N. C. Shigeru. The digital revolution and East Asian
science. In A. K. L. Chan, G. K. Clancey, and H.-C.
Loy, editors, Historical Perspectives on East Asian
Science, Technology, and Medicine. World Scientific,
Singapore, 2001.
[32] J. R. Smith, C. Quirk, and K. Toutanova. Extracting
parallel sentences from comparable corpora using
document level alignment. In Human Language
Technologies: The 2010 Annual Conference of the
North American Chapter of the Association for
Computational Linguistics, HLT ’10, pages 403–411,
Stroudsburg, PA, USA, 2010. Association for
Computational Linguistics.
[33] B. Summers. What’s the equivalent of Twitter’s 140
character limit for non-Latin character sets?, Feb.
2010. http://bens.me.uk/2010/twitter-charset-
experiment.
[34] H. Sun. Cross-Cultural Technology Design: Creating
Culture-Sensitive Technology for Local Users. Oxford
University Press, Oxford, Mar. 2012.
[35] Track Social. Track social blog: Optimizing Twitter
engagement – part 3: Tweet length, Oct. 2012. http:
//tracksocial.com/blog/2012/10/optimizing-
twitter-engagement-part-3-tweet-length/.
[36] Twitter. Best practices: Be the best at what, when
and how you tweet.
https://web.archive.org/web/20131020033342/
https://business.twitter.com/best-practices.
[37] Twitter. Character counting.
https://dev.twitter.com/overview/api/counting-
characters.
[38] United Nations. The World’s Most Translated
Document. Human Rights Day, Dec. 2007.
http://www.un.org/en/events/humanrightsday/
2007/worldtransdoc.shtml.
Conference on Human Factors in Computing Systems,
CHI ’14, pages 833–842, New York, NY, USA, 2014.
ACM.
[13] D. Hewitt. Has Weibo really changed China? BBC,
July 2012.
http://www.bbc.co.uk/news/magazine-18887804.
[14] F. Hillebrand. Short message and data services, 2002.
[15] L. Hong, G. Convertino, and E. Chi. Language
matters in Twitter: A large scale study. In
International AAAI Conference on Weblogs and Social
Media, pages 518–521, 2011.
[16] A. Java, X. Song, T. Finin, and B. Tseng. Why we
Twitter: Understanding microblogging usage and
communities. In Proceedings of the 9th WebKDD and
1st SNA-KDD 2007 Workshop on Web Mining and
Social Network Analysis, WebKDD/SNA-KDD ’07,
pages 56–65, New York, NY, USA, 2007. ACM.
[17] K. Lee. The proven ideal length of every tweet,
Facebook post, and headline online. Fast Company,
Apr. 2014.
http://www.fastcompany.com/3028656/work-
smart/the-proven-ideal-length-of-every-tweet-
facebook-post-and-headline-online.
[18] B. Li and J. Liu. Mining Chinese-English parallel
corpora from the Web. In In Proceedings of the 3rd
International Joint Conference on Natural Language
Processing (IJCNLP), pages 847–852, Hyderabad,
India, 2008. Citeseer.
[19] H.-T. Liao. What do Chinese-language microblog
users do with Baidu Baike and Chinese Wikipedia? a
case study of information engagement. In Proceedings
of The International Symposium on Open
Collaboration, OpenSym ’14, pages 23:1–23:10, New
York, NY, USA, 2014. ACM.
[20] M. Liberman. Language Log: One world, how many
bytes? Language Log, Aug. 2005.
http://itre.cis.upenn.edu/~myl/languagelog/
archives/002379.html.
[21] R. Ling and N. S. Baron. Text messaging and IM
linguistic comparison of American college data.
Journal of Language and Social Psychology,
26(3):291–298, Sept. 2007.
[22] Meta-Wiki. List of Wikipedias by sample of articles,
2015. http://meta.wikimedia.org/wiki/List_of_
Wikipedias_by_sample_of_articles.
[23] M. Milian. Why text messages are limited to 160
characters. LA Times Blogs, May 2009.
http://latimesblogs.latimes.com/technology/
2009/05/invented-text-messaging.html.
[24] A. X. Mina. Batman, pandaman and the blind man:
A case study in social change memes and Internet
censorship in China. Journal of Visual Culture,
13(3):359–375, 2014.
[25] M. Mohammadi and N. GhasemAghaee. Building
bilingual parallel corpora based on Wikipedia. In
Computer Engineering and Applications (ICCEA),
2010 Second International Conference on, volume 2,
pages 264–268, March 2010.
[26] G. Neubig and K. Duh. How much is said in a tweet?
A multilingual, information-theoretic perspective. In
AAAI Spring Symposium on Analyzing Microtext,
2013.
|
1801.04642 | 1 | 1801 | 2018-01-15T02:22:56 | Stable and Efficient Structures for the Content Production and Consumption in Information Communities | [
"cs.SI",
"physics.soc-ph"
] | Real-world information communities exhibit inherent structures that characterize a system that is stable and efficient for content production and consumption. In this paper, we study such structures through mathematical modelling and analysis. We formulate a generic model of a community in which each member decides how they allocate their time between content production and consumption with the objective of maximizing their individual reward. We define the community system as "stable and efficient" when a Nash equilibrium is reached while the social welfare of the community is maximized. We investigate the conditions for forming a stable and efficient community under two variations of the model representing different internal relational structures of the community. Our analysis results show that the structure with "a small core of celebrity producers" is the optimally stable and efficient for a community. These analysis results provide possible explanations to the sociological observations such as "the Law of the Few" and also provide insights into how to effectively build and maintain the structure of information communities. | cs.SI | cs |
Stable and Efficient Structures for the Content
Production and Consumption in Information
Communities
Larry Yueli Zhang1 and Peter Marbach2
1 University of Toronto
[email protected]
2 University of Toronto
[email protected]
Abstract. Real-world information communities exhibit inherent struc-
tures that characterize a system that is stable and efficient for content
production and consumption. In this paper, we study such structures
through mathematical modelling and analysis. We formulate a generic
model of a community in which each member decides how they allo-
cate their time between content production and consumption with the
objective of maximizing their individual reward. We define the commu-
nity system as "stable and efficient" when a Nash equilibrium is reached
while the social welfare of the community is maximized. We investigate
the conditions for forming a stable and efficient community under two
variations of the model representing different internal relational struc-
tures of the community. Our analysis results show that the structure
with "a small core of celebrity producers" is the optimally stable and
efficient for a community. These analysis results provide possible expla-
nations to the sociological observations such as "the Law of the Few"
and also provide insights into how to effectively build and maintain the
structure of information communities.
Key words: modelling and analysis, communities, social networks
1 Introduction
Communities are an important structure that widely exists in real-world online
and offline social networks. A common type of community is the information
community in which the members of the community produce content and con-
sume the content produced by other members, with the most popular example
being Reddit [11] where each "subreddit" is essentially an information commu-
nity with a specific topic of interest. Real-world communities often exhibit inher-
ent structures such as the high density of interactions within the community and
the existence of a core set of active members who would contribute the majority
of the content in the community ("the Law of the Few") [4, 14]. There have
been a large body of research work on community detection algorithms based
on such structures. However, there is still a lack of the formal understanding of
2
Zhang et al.
why these structures would consistently and naturally emerge during the forma-
tion process of real-world communities. Understanding the formation process of
these natural structures is important as it provides us a microscopic view of the
working mechanisms of communities and would enable us to utilize communities
more efficiently.
Our overall hypothesis is the following: real-world social network structures
have been going through an evolutionary process, and as a result of that only
the optimal structure (in terms of stability and efficiency) can survive, sustain
therefore exist widely in real-world social networks. In other words, if we observe
a widely existing structure in real-world social networks, then this structure must
be optimal in the sense that it has stable user behaviours and it is efficient for
the purpose of the network.
In the case of information communities, each member in the community is
an agent who can choose to spend certain portions of their time in producing
content items or in consuming content produced by other members. In order
for the community to be stable, all members' time allocation strategies should
collectively form a Nash equilibrium, i.e., each member would get penalized by
deviating from the equilibrium strategy. A member in the community can be
rewarded by either production or consumption. For consumption, the rewarded
is from the consumed content itself; for production, a member is rewarded when
the content she produces is consumed by other members of the community (the
reputation effect). A community structure is called "efficient" when it can pro-
vide its members the highest possible amount of reward. If we use a mathe-
matical model to formulate the above behaviours and efficiency measures, we
will then be able to formally analyze the condition under which the community
structure is optimally stable and efficient, therefore obtain a mathematical de-
scription of the "surviving and sustaining" community structure. The validity of
the model would be verified if the result of the analysis happens to agree with
the widely-existing structures observed in real-world communities. Compared to
the empirical observations, the formal analytical results would provide us more
refined understanding of the microscopic working mechanisms of the real-world
communities.
In this paper, we formulate a model that captures the production and con-
sumption behaviours inside an information community. Our analysis results show
that the structure with a small set of "celebrity producers" is the optimally sta-
ble and efficient structure. These analysis results provide possible explanations
to the sociological observations such as "the Law of the Few" and also provide
insights into how to effectively build and maintain the structure of information
communities.
2 Related Works
Social network analysis has been one of the fastest growing research fields in
the 21st century. We refer readers to Scott et al. [12] for a comprehensive cov-
erage of the development of the subject, rather than listing the large collection
Stable and Efficient Structures
3
of references in this paper. Experimental works observed interesting properties
of real-world complex networks such as the power-law degree distribution, the
small-world phenomena and the community structure. These observations lead to
modelling works that tried to explain why the observed properties would emerge,
such models include the preferential attachment models, the copying model and
the forest fire model. However, most of these works were studying macroscopic
structural properties rather than looking into the internal microscopic structures
of the network.
The community structure has been an interesting topic for researcher in
the field of social network analysis. A large body of work has been devoted
to modelling and detecting community structures in large scale social networks
(e.g., [2, 8, 10, 6, 5]). The networks are often represented by graphs in which the
vertices represent underlying social entities and the edges represent some sort of
social tie or interaction between pairs of vertices. Our model differs in the sense
that it also considers the user behaviours on top of the network connections.
In [1], the efficiency of a network in terms of information diffusion is studied,
a mathematical analysis is perform to investigate the optimal network structure
to achieve the best efficiency for information diffusion (high precision, high recall
and low diameter), and the result shows that a Kronecker-graph [6] would satisfy
such conditions. The approach taken in [1] is similar to the approach we take in
this paper except that we are more focussed on the community related aspects.
The work in [3] used a game-theoretic model to study the emergence of the "Law
of the Few" but it is also in the context of information diffusion rather than about
communities. The work in [7] is the closest to the interest of this paper. In [7],
a game theoretic model is formulated to analyze the community structures in
terms of content production and consumption. Each member's strategy involves
choosing a particular interest to produce or consume content on. The result
shows that in the Nash equilibrium of the model the members' choices form
community structures. The difference of our work from [7] is that we focus on
the internal structure of a single community rather than on the scale of multiple
communities, and besides the Nash equilibrium, we also take the social welfare
into consideration.
3 Model
We will first describe the general configuration of the model and the pay-
off/reward functions, then in Section 3.2 and Section 3.3, we introduce two
variations of modelling the internal relations between the community members.
Both models will be analyzed and the results will be compared in Section 4.
3.1 General Configuration
We have a single community with n members indexed by 1 ≤ i ≤ n. Each mem-
ber is capable of both producing and consuming content items. The produced
4
Zhang et al.
content items could be chosen by all members or a subset of the members of the
community for consumption. Each member has a limited total amount of time
which could be allocated to either production or consumption, and each mem-
ber make a decision about how much of their time to allocate to production and
consumption. A member is rewarded if their products are consumed by members
of the community (the production reward), or if the member consumes an item
that is produced by a member of the community (the consumption reward).
Each member's objective is to maximize their total individual reward from both
production and consumption.
The time slot: In our model, we investigate everything that happens within
a unit time. The assumption is that the long term behaviour of a member is the
repetition of their behaviour within a unit time.
Rates of content production and consumption: We define Np ≥ 0 to be the
number of content items that a member can produce if they were to spend 100%
of their unit time on production; and we let Nc ≥ 0 be the number of items that
a member can consume within a unit time slot if they were to spend 100% of
their time on consumption. We assume that all members share the same values
of Np and Nc, and we assume the following inequality:
0 ≤
Nc
nNp
≤ 1
(1)
This assumption is reasonable because nNp is the largest possible number of
content items that can be produced, an Nc value that is larger than nNp would
be unrealistic.
A member's time allocation strategy: Let αi (0 ≤ α ≤ 1) be the portion of
the unit time that member i allocates to production (therefore 1 − α is allocated
to consumption). Each member chooses their own αi, we will investigate if a
set of choices of αi would lead to a Nash equilibrium. Within the unit time, a
member can consume at most (1 − αi) · Nc items. If the number of available
items is less than or equal to this number, then each member would consume
all the available items without any choice; if the total number of available items
is greater than this number, then the member would choose a subset (of size
(1 − αi) · Nc) of the available items to consume, uniformly at random.
The production reward models the "reputation effect" in social networks,
i.e., having content products consumed by other people is rewarding for the
producer of the content. The reward for each item that a member produces is
proportional to the number of members who consume the item, with a constant
factor rp, i.e., if an item is consumed by m members, then the reward for this
item is rp · m. The total production reward for a member is the sum of the
rewards of all items that the member produces. The constant factor rp is the
same for all members. The consumption reward of a given item is a constant rc.
The total consumption reward of a member is rc multiplied by the number of
items consumed by the member. The total individual reward of a member in the
community is the sum of their production reward and consumption reward. The
sum of the total individual rewards of all members in the community is the social
Stable and Efficient Structures
5
welfare. While each member tries to maximize their own individual reward, the
overall efficiency of the community is measured by its social welfare.
The following two subsections will define two variations of the internal rela-
tional structure of the community.
3.2 The Celebrity-Follower Community Structure
Under the celebrity-follower relational structure, a subset of the members of the
community are "celebrities" that are followed by everyone in the community, i.e.,
the content items produced by a celebrity member can be seen by all members of
the community. A non-celebrity member has zero followers, i.e., an item produced
by a non-celebrity member cannot be seen or consumed by any member.
Let η be the portion of celebrity members, i.e., the number of celebrity mem-
bers is ηn. When η = 1, all members are connected via a complete graph. When
η is small, we have a small core of celebrities that would be responsible for pro-
ducing all content items in the community. If visualized as a directed graph, the
structure would have η · n2 edges in total. Note that we are assuming a member
can be a follower of themselves so the graph can have self-pointing edges. This
would lead to cleaner analysis results.
Note that we are not making any assumptions about how large the value of η
is, and it is interesting to see whether the efficiency of the community system can
be different with η's value being in different ranges. In real-world communities,
we often observe patterns that are similar to the celebrity-follower structure, i.e.,
a small subset of "elite contributors" would produce most of the content items
that are consumed by all members of the community, and a community typically
has a significant portion of "lurkers". We will be able to provide a theoretical
explanation to this real-world phenomenon.
3.3 The Uniform Community Structure
In contrast to the celebrity-follower structure where the members play unequal
roles in the community, the uniform relational structure has all members with
the equal role, i.e., every member has the same number of followers and follows
the same number of other members. In terms of a graph, it is a regular graph
where every vertex has the same in-degrees and out-degrees.
To make this structure comparable with the celebrity-follower structure,
we let it have the same number of edges as the celebrity-follower graph. The
celebrity-follower graph discussed in the previous section has η · n2 edges, there-
fore, in the uniform graph, we let each vertex have in-degree η · n as well as
out-degree η · n.
3.4 Summary of the model
Overall, our model is a game-theoretic model where each agent (member of
the community) chooses a strategy (αi) with the objective of optimizing their
6
Zhang et al.
individual reward. The efficiency of the whole community is measured by the
social welfare (total reward of all members). The stability of the community
is indicated by whether the strategies of all members collectively form a Nash
equilibrium.
4 Analysis
Our hypothesis is that, in order to exist and sustain in the real world, a social
structure must be stable and efficient. For an information community, this means
that the members' strategies form a Nash equilibrium while the social welfare
of the community is maximized. Therefore, our analysis will take the following
approach: we first derive the set of members' strategies that would maximize the
social welfare of the community, then we investigate the condition for this set of
strategies to form a Nash equilibrium.
In Section 4.1 and Section 4.2, we perform the analyses for the celebrity-
follower and uniform structures, respectively, then we will compare and discuss
the analysis results.
4.1 Analysis of the Celebrity-Follower Structure
The following theorem summarizes the analysis results for communities with the
celebrity-follower structure.
Theorem 1. For a community with the celebrity-follower structure where there
are η ·n celebrity members, the maximum social welfare and the Nash equilibrium
are described in the following cases.
Case 1: if η < min( Nc
nNp
, 1− Nc
nNp
, 1− Ncrc
nNprp
), then the maximum social welfare
is reached when a member i of the community takes the following strategy:
αi =(1
0
if member i is a celebrity
otherwise
The maximum social welfare Gmax is the following:
Gmax = η(1 − η)n2Np(rp + rc)
This set of strategies always form a Nash equilibrium under this case.
(2)
(3)
Case 2: if 1
2 < Nc
nNp
, then the maximum
social welfare is reached when a member i of the community follows the following
strategy.
≤ 1 and 1 − Nc
nNp
≤ η ≤ Nc
nNp
αi =( Nc
Nc+ηnNp
0
if member i is a celebrity
otherwise
(4)
The maximum social welfare Gmax is the following:
Stable and Efficient Structures
7
Gmax =
ηn2NcNp(rp + rc)
Nc + ηnNp
(5)
Case 3: if 0 ≤ Nc
nNp
However, this set of strategies never forms a Nash equilibrium under this case.
, then the maximum
social welfare is reached when a member i of the community follows the following
strategy.
≤ η ≤ 1 − Nc
nNp
2 and Nc
≤ 1
nNp
αi =( Nc
ηnNp
0
if member i is a celebrity
otherwise
The maximum social welfare under this strategy is
Gmax = Nc(cid:18)n −
Nc
Np(cid:19) (rp + rc)
(6)
(7)
This set of strategies never forms a Nash equilibrium under this case.
Case 4: η > max( Nc
nNp
, 1 − Nc
nNp
), the social welfare is maximized when a
member i of the community follows the following strategy.
αi =( Nc
Nc+ηnNp
0
if member i is a celebrity
otherwise
The maximum social welfare under this strategy is
Gmax =
ηn2NcNp(rp + rc)
Nc + ηnNp
This set of strategies never forms a Nash equilibrium under this case.
(8)
(9)
The detailed proof of Theorem 1 can be found in the appendix. This theorem
shows that Case 1 is the only case where the members' strategies reach a Nash
equilibrium while the social welfare is maximized. In other words, in order for the
community to be optimally stable and efficient, the portion of celebrity members
must be small enough, i.e., η < min( Nc
nNp
, 1 − Ncrc
nNprp
, 1 − Nc
nNp
).
4.2 Analysis of the Uniform Structure
The following theorem summarizes the analysis results for communities with the
celebrity-follower structure.
Theorem 2. For a community with the uniform structure where each member
has ηn followers and follows ηn members, the maximum social welfare is reached
when the following set of strategies is applied.
αi =
Nc
Nc + ηnNp
∀1 ≤ i ≤ n
(10)
The maximum social welfare Gmax is the following:
8
Zhang et al.
Gmax =
ηn2NpNc(rc + rp)
Nc + ηnNp
(11)
The above set of strategies forms a Nash equilibrium if and only if the following
condition is true.
(12)
η ≤(cid:18) Ncrc
nNprp
+
1
n(cid:19)
The detailed proof of Theorem 2 can be found in the appendix. This result
shows that, assuming the uniform community structure, there exist a simple set
of strategies that is stable while the social welfare is maximized. What we are
interested in is how the optimal efficiency of the uniform structure compares
with that of a community with the celebrity-follower structure. The following
theorem provides us a formal result.
Theorem 3. Let Gmax -celebrity be the maximum social welfare with a Nash equi-
librium for the celebrity-follower community structure (Eq (3)) and Gmax -uniform
be the maximum social welfare with a Nash equilibrium for the uniform commu-
nity structure (Eq (11)). The following is always true:
Gmax -celebrity ≥ Gmax -uniform
(13)
The detailed proof of Theorem 3 can be found in the appendix. This theorem
provides a simple and clear result: given being in its optimally stable and efficient
state, a community with the celebrity-follower structure always has a better
optimal social welfare than a community with the uniform structure.
5 Discussions
The combination of the analysis results in Section 4.1 and 4.2 provide us two dif-
ferent angles of explaining the common "law-of-the-few" structural patterns that
widely exist in real-life information communities. A given community structure,
in order to exist and sustain, must be both stable and efficient, meaning that
the community can stably stay at the state with the maximum social welfare.
Theorem 1 tells us that the community can only be stable and efficient if there is
a small enough "core" of celebrity members who will actively contribute all the
content to be consumed by all members of the community, while the majority
of the community members would simply consume the content produced by the
core members. A community structure that does not satisfy this condition would
not be stable therefore would not commonly exist in reality.
Moreover, among the different possible structure that are both stable and
efficient, some structures are more efficient than others. Theorem 3 shows that
the small-core celebrity-follower structure is not only stable and efficient, but also
it is more efficient than other stable structures such as the uniform structure.
With the above two factors taken into account, the celebrity-follower struc-
ture with a small set of celebrities becomes the winner, therefore becomes the
commonly existing structure in real-world information communities.
Stable and Efficient Structures
9
In the equilibrium state, the strategies of the celebrity and non-celebrity
members are clearly differentiated: the celebrity members should dedicate all
of their time in production whereas the non-celebrity members should spend
all of their time on consumption. These specialized producing and consuming
behaviours also coincide with real-world observations: in a web service such as
Reddit, the visitors of a typical subreddit would often separate into two different
roles, i.e., the "active contributors" who frequently post content in the subreddit
and the "lurkers" who would always just consume content silently.
The analysis results also provide insights into how to effectively build and
maintain information communities. The most important takeaway from our anal-
ysis results is that there should be mechanisms that encourage the formation of a
small-core celebrity-follower structure inside the community. For example, many
online social network applications use features such as "thumb-up" or "upvote"
to promote and reward high quality content that are liked by many community
members. Besides providing effective content filtering (ranking by votes), this
voting mechanism also encourages the optimally stable and efficient community
structure: since the production reward is only earned when a post is upvoted,
the members who would produce low-quality content would not be rewarded
and would essentially become the non-celebrity members in the celebrity-follower
structure. The members who produce high-quality content would be rewarded by
the upvotes and becomes the celebrities in the community. The size of the core
of celebrities will tend to be small if the display of the content in the community
is ranked by popularity: most members will only consume a small portion of the
top-ranked content items therefore only a small set of high quality producers
would actually be rewarded and become the real core of the community. This
analysis would lead to an interesting and counter-intuitive hypothesis: if the con-
tent display of the community is such that different members would see a diverse
range of different items, then this would cause the formation of a larger-sized
celebrity core or a uniform-like structure in the community which would make
the community structure less stable. It would be interesting to empirically verify
if this hypothesis is true in practice.
Another interesting insight is that, in the optimal community structure, the
number of celebrity members in the core, i.e., η n, must satisfy that η·n < Nc/Np.
This means that the size of the of celebrities core does not increase as the size
of the community n increases. This could be a possible reason of why we have
communities in the first place: having a large number of people communicating in
a single giant community is inefficient in terms of the total amount of production
because it only allows a small number of core members to contribute in content
production. Larger total production rate can be achieved by dividing people into
different smaller communities each of which has its own core members, since
the total number of people who will contribute in content production would be
multiplied by the number of communities.
10
Zhang et al.
6 Conclusions
This paper attempts to obtain a formal understanding of the natural structural
patterns of real-world information communities. We formulate a mathematical
model that describes the generic content production and consumption behaviours
in a community. The analysis result shows that the small-core celebrity-follower
structure is the optimal structure that would lead to the optimally efficient
and stable community. These analytical results agree with the sociological ob-
servations on real-world information communities. Besides providing a refined
microscopic view of the working mechanisms of information communities, the
analysis results also provide useful insights into how to better build and main-
tain the structure of information communities. Designing efficient mechanisms
that encourage the formation of stable and efficient communities would be an
interesting topic for future works.
References
1. Bosagh Zadeh, Reza, et al. "On the precision of social and information networks."
Proceedings of the first ACM conference on Online social networks. ACM, 2013.
2. Fortunato, Santo, and Darko Hric. Community detection in networks: A user guide.
Physics Reports 659: 1-44 (2016)
3. Galeotti, Andrea, and Sanjeev Goyal. The law of the few. The American Economic
Review 100.4: 1468-1492 (2010)
4. Gladwell, Malcolm. The tipping point: How little things can make a big difference.
Little, Brown (2006)
5. Kumar, Ravi, Jasmine Novak, and Andrew Tomkins. Structure and evolution of
online social networks. Link mining: models, algorithms, and applications. Springer
New York, 337-357 (2010)
6. Leskovec, Jure, et al. Kronecker graphs: An approach to modeling networks. Journal
of Machine Learning Research 11.Feb (2010): 985-1042.
7. Marbach, Peter. The structure of communities in information networks. Information
Theory and Applications Workshop (ITA) (2016)
8. Massouli, Laurent. Community detection thresholds and the weak Ramanujan prop-
erty. Proceedings of the forty-sixth annual ACM symposium on Theory of comput-
ing. ACM (2014)
9. Mislove, Alan, et al. Measurement and analysis of online social networks. Proceed-
ings of the 7th ACM SIGCOMM conference on Internet measurement. ACM (2007)
10. Newman, M. E. J. Community detection in networks: Modularity optimization and
maximum likelihood are equivalent. arXiv preprint arXiv:1606.02319 (2016)
11. Reddit: http://www.reddit.com (2017)
12. Scott, John. Social network analysis. Sage (2017)
13. Wenger, Etienne. Communities of practice: A brief introduction (2011)
14. Zhang, Jun, Mark S. Ackerman, and Lada Adamic. Expertise networks in online
communities: structure and algorithms. Proceedings of the 16th international con-
ference on World Wide Web. ACM (2007)
Stable and Efficient Structures
11
Appendices
A Proof of Theorem 1
In the following two subsections we will prove the two cases separately.
A.1 Proof of Case 1 and 2
We will first analyze the strategies for maximizing the social welfare and then
investigate the Nash equilibriums of the such strategies.
Maximum Social Welfare for Case 1 and Case 2
In this case, η < Nc
⇒ ηnNp < Nc, i.e., the celebrity members are not able sat-
nNp
isfy everyone's consumption demand even if they are producing at full capacity.
First, we present the following lemma.
Lemma 1. The optimal maximum social welfare is reached only if all non-
celebrity members have αi = 0.
Proof. This result is easy to see since a product of a non-celebrity member never
gets consumed by others, a non-celebrity member's optimal strategy is always
to spend 100% of their time on consumption.
Lemma 2. When the social welfare is maximized, all celebrity members must
choose the same αi value.
Proof. The proof is very similar to part of the proof of Theorem 2 in Appendix B,
therefore is omitted for succinctness. The idea is to compare an arbitrary con-
figuration of αi values with the configuration where everyone choose the same
value.
Now let's investigate the αi value that would maximize the social welfare
for Case 1 and Case 2. There are two cases that are possible when calculating
the social welfare of the community: whether the celebrity members are under-
supplied or over-supplied. For the celebrity members to be over-supplied, we
need the following to hold:
(1 − αi)Nc ≤ αiηnNp
⇔ αi ≥
Nc
Nc + ηnNp
(14)
(15)
Otherwise, the celebrity members are under-supplied.
When the celebrity members are over-supplied, the social welfare is calculated
as the following:
12
Zhang et al.
G = αiηnNp(cid:20)(1 − η)n +
(1 − αi)Nc
αiηnNp
· ηn(cid:21) (rp + rc)
= ηn(rp + rc) [αi ((1 − η)nNp − Nc) + Nc]
(16)
(17)
When the celebrity members are under-supplied, the social welfare is calcu-
lated as the following:
G = αiηn2Np
(18)
Combining Eq (16) and (18), the social welfare for Case 1 and Case 2 is the
following.
G =(αiηn2Np
ηn(rp + rc) [αi ((1 − η)nNp − Nc) + Nc]
if 0 ≤ αi <
if
Nc+ηnNp
Nc
Nc
Nc+ηnNp
≤ αi ≤ 1
(19)
When the celebrity members are under-supplied, G is always an increasing func-
tion of αi. When the celebrity members are over-supplied, G could be either
an increase or decreasing function of αi depending on whether the coefficient
((1 − η)nNp − Nc) is positive or negative. Note that
(1 − η)nNp − Nc > 0 ⇔ η < 1 −
Nc
nNp
(20)
Therefore, for Case 1 where η < 1 − Nc
nNp
αi = 1, and the maximum social welfare is
, the social welfare G is maximized when
Gmax = η(1 − η)n2Np(rp + rc)
(21)
Therefore, for Case 2 where η ≥ 1 − Nc
nNp
αi =
, and the maximum social welfare is
Nc
Nc+ηnNp
, the social welfare G is maximized when
Gmax =
ηn2NcNp(rp + rc)
Nc + ηnNp
(22)
Nash Equilibrium for Case 1
Now consider the Nash equilibrium for Case 1. For a non-celebrity member,
αi = 0 is clearly the best strategy since there is no additional reward if they
spent any time in production.
For a celebrity member, consider the small deviation from the equilibrium
strategy, i.e., rather than choosing αi = 1, it chooses αi = 1 − δ for some δ > 0.
This member's product reward is decreased by δNp(1 − η)nrp. This member's
consumption reward is increased by up to δNcrc. We want to show that the
change of the member's individual reward to be negative, i.e.,
∆R ≤ δNcrc − δNp(1 − η)nrp < 0
⇔ η < 1 −
Ncrc
nNprp
(23)
(24)
which is true according to the assumption of Case 1. Therefore, the Nash equi-
librium of Case 1 is proven.
Stable and Efficient Structures
13
Nash Equilibrium for Case 2
Consider a celebrity member who would change their αi to αi + δ and αi − δ for
some δ > 0. In order for a Nash equilibrium to be formed, it is necessary that
both ways of changing result in a smaller individual reward.
If the strategy is changed to αi + δ, then the gain of production reward is
up to δNpnrp and the loss of consumption reward is δNcrc. In order for the
individual reward to decrease, we need:
∆R ≤ δNpnrp − δNcrc < 0
Ncrc
nNprp
> 1
⇔
(25)
(26)
If the strategy is changed to αi − δ, then the loss of production reward is
δNpnrp and the gain of consumption reward is up to δNcrc. In order for the
individual reward to decrease, we need:
∆R ≤ δNcrc − δNpnrp < 0
Ncrc
nNprp
< 1
⇔
(27)
(28)
A Nash equilibrium requires that both (26) and (28) to be true, which is
impossible, therefore the Nash equilibrium cannot exist. The Nash equilibrium
of Case 1 is proven, which completes all proofs for Case 1 and Case 2.
A.2 Proof of Case 3 and Case 4
Case 3 and Case 4 are the cases where the celebrity members are capable of
supplying any member in community, i.e., ηnNp ≥ Nc. First of all, Lemma 1
and Lemma 2 both apply to this part of the proof. And we have the following
additional lemma.
Lemma 3. When the social welfare is maximized, a non-celebrity member must
not be over-supplied, and a celebrity member must not be under-supplied.
Proof. Suppose the non-celebrity members were over-supplied, then the high-
quality members must also be over-supplied. Reducing production time will in-
crease the total number of consumptions for sure, therefore the global welfare
would be increased.
Similarly, suppose the celebrity members were under-supplied, then the non-
celebrity members must also be under-supplied. Increasing production time will
increase the total number of consumptions for sure, therefore the global welfare
would be increased.
14
Zhang et al.
Maximum Social Welfare for Case 3
We now write down the expression of the social welfare. Because of Lemma 2, we
let αh be the common αi value of all celebrity members, then the total number of
produced items is αhηnNp. For each item, the expected number of consumptions
from the non-celebrity members is (1−η)n since each non-celebrity member is not
over-supplied; the expected number of consumptions from the celebrity members
is the following (because they are not under-supplied):
(1 − αh)Nc
αhNpηn
· ηn =
Nc
Np (cid:18) 1
αh
− 1(cid:19)
(29)
Therefore, total reward is the (rp + rc) multiplied by the total number of con-
sumptions, which is
− 1(cid:19)(cid:21)
R = (rp + rc) · αhNpηn ·(cid:20)(1 − η)n +
= (rp + rc) ·(cid:2)αh(cid:2)Npη(1 − η)n2) − Ncηn(cid:3) + Ncηn(cid:3)
Np (cid:18) 1
Nc
αh
(30)
(31)
The expression in (31) could be an increasing or decreasing function of αh. It
depends the sign of coefficient of αh. Therefore, we need to divide into two
sub-cases, which are exactly Case 3 and Case 4.
Case 3: The coefficient is non-negative, i.e.,
(cid:2)Npη(1 − η)n2 − Ncηn(cid:3) ≥ 0
⇔ η ≤ 1 −
Nc
Np
(32)
(33)
In this case, to maximize the global welfare, αh should be as large as possible,
i.e., αh should be the largest possible value that keeps the non-celebrity members
non-oversupplied. It is the value that generates exactly Nc items, which is
αh =
Nc
ηnNp
Plug the above value into Eq. (31), the maximum social welfare is
Gmax = (rp + rc)Nc(cid:18)n −
Nc
Np(cid:19)
(34)
(35)
Nash Equilibrium for Case 3
Now investigate the Nash equilibrium for Case 3 by consider the following two
types of changes (let δ > 0 denote the change amount):a celebrity member
increasing from αi to αh + δ; and a celebrity member decreasing from αh to
αh − δ.
Stable and Efficient Structures
15
If the strategy is changed to αh + δ, then the gain of production reward is
δNp((1 − ηn)n + ηn(1 − αh))rp and the loss of consumption reward is δNcrc. In
order for the individual reward to decrease, we need:
∆R = δNp((1 − ηn)n + ηn(1 − αh))rp − δNcrc < 0
⇔
Ncrc
(nNp − Nc)rp
> 1
(36)
(37)
If the strategy is changed to αh + δ, then the loss of production reward is
δNp((1 − ηn)n + ηn(1 − αh))rp and the gain of consumption reward is δNcrc. In
order for the individual reward to decrease, we need:
∆R = δNcrcδNp((1 − ηn)n + ηn(1 − αh))rp < 0
⇔
Ncrc
(nNp − Nc)rp
< 1
(38)
(39)
A Nash equilibrium requires that both (37) and (39) to be true, which is
impossible, therefore the Nash equilibrium cannot exist. The Nash equilibrium
of Case 3 is proven.
Maximum Social Welfare for Case 4
Case 4: The coefficient in (31) is negative, i.e.,
(cid:2)Npη(1 − η)n2 − Ncηn(cid:3) < 0
⇔ η > 1 −
Nc
nNp
(40)
(41)
In this case, to maximize the social welfare, αh should be as small as possible,
i.e., αh should be the smallest possible value that keeps the celebrity members
non-under-supplied. The number of produced items should be exactly (1−αh)Nc
items, i.e.,
αhNpηn = (1 − αh)Nc
⇔ αh =
Nc
Nc + ηnNp
Plug the above value into Eq. (31), the maximum global welfare is
Gmax =
ηn2NcNp(rp + rc)
Nc + ηnNp
(42)
(43)
(44)
Note that, Case 4's optimal state for social welfare is in fact exactly the same
as that of Case 2. Therefore, the Nash equilibrium of Case 4 follows the same
configuration as that of Case 2, which means this set of strategy cannot form a
Nash equilibrium. Hence, we have completed the proof for Theorem 1.
16
Zhang et al.
B Proof of Theorem 2
n
Xi=1
n
Xi=1
The claim is that the maximum social welfare is reached when (1) all members
have the same αi value and (2) the number of produced items is just enough
every member's consumption. We consider three cases when calculating the social
welfare of the community: everyone is over-supplied, everyone is under-supplied
and some people are over-supplied while others are under-supplied. Let s =
Pn
i=1 αi denote the sum of everyone's αi value.
Case 1: Everyone is over-supplied with content. The consumption reward a
member i is simply (1 − αi)Ncrc, therefore the global total consumption reward
is
(1 − αi)Ncrc = Ncrc(n −
αi) = Ncrc(n − s)
(45)
The global total production reward is equal to the total number of consumption
multiplied by rp, which is
rp ·
n
(1 − αi)Nc = Ncrp n −
Xi=1
n
Xi=1
αi! = Ncrp(n − s)
(46)
Therefore the total global welfare for Case 1 is the sum of (45) and (46) which
is
G(α) = Ncrc(n − s) + Ncrp(n − s) = Nc(rp + rc) n −
αi!
n
Xi=1
(47)
We can see that, in the case of everyone being over-supplied, the social welfare
would decrease if anybody increases their αi; the optimal value for this case is
reached when everyone reduces their αi as much as possible as long as everyone
is still over-supplied.
Now we want to show that the global welfare for this case is no greater than
the maximum global welfare shown in in Equation (11) of Theorem 2, i.e., we
want to show the following
αi! ≤
ηn2NpNc(rc + rp)
Nc + ηnNp
n
Xi=1
= n ·(cid:18)1 −
Nc
Nc + ηnNp(cid:19)
n
Nc(rp + rc) n −
αi! ≤
n −
Xi=1
αi! ≥ n ·
n
Xi=1
ηn2Np
Nc + ηnNp
Nc
Nc + ηnNp
⇔
⇔
(48)
(49)
(50)
Note that Nc/(Nc + ηnNp) is the optimal αi value which make the number
of produced items exactly the same as the number needed by every member.
The inequality in (50) must be true because if it were not true, it would cause
Stable and Efficient Structures
17
a member to be under-supplied, which violates the assumption for this case.
Completing the proof for Case 1.
Case 2: Everyone is under-supplied with content. In this case, each mem-
ber consumes all content items that are available for them, therefore the total
consumption reward is
ηnNprc
n
Xi=1
αi = ηnNprcs
(51)
The total production reward is again the total number of consumptions mul-
tiplied by rp. Each of the produced items is consumed ηn times, thus we have
the total production reward as follows:
ηnrp
n
Xi=1
αiNp = ηNprpns
(52)
Summing up the total consumption reward and the total production rewards,
the total global welfare for Case 2 is
G(α) = ηNp(rp + rc)ns = ηNp(rp + rc)n n
Xi=1
αi!
(53)
We can see that, in the case of everyone being under-supplied, the social welfare
would decrease if anybody decreases their αi; the optimal value for this case is
reached when everyone increase their αi as much as possible as long as everyone
is still under-supplied.
Again, we want to show that the global welfare for this case is no greater
than the maximum global welfare shown in in Equation (11) of Theorem 2, i.e.,
we want to show the following
αi! ≤
ηn2NpNc(rc + rp)
Nc + ηnNp
ηNp(rp + rc)n n
Xi=1
Xi=1
αi ≤ n ·
n
⇔
Nc
Nc + ηnNp
(54)
(55)
Again, since Nc/(Nc + ηnNp) is the αi value that makes the number of produced
items exactly the same as the number needed by every member. The inequality
in (55) must be true because if it were not true, it would cause a member to be
over-supplied, which violates the assumption for this case. Completing the proof
for Case 2.
Case 3 is in between Case 1 and Case 2, i.e., we assume that a portion of the
members in the community are over-supplied while others are under-supplied.
Let ¯α = Pn
i=1 αi/n be the average value of all members αi values. We will
compare an arbitrary configuration in Case 3 with the one where everyone choose
the same αi = ¯α. Note that, if everyone choose the same αi, it is either Case
18
Zhang et al.
1 or Case 2, i.e., either everyone is over-supplied or everyone is under-supplied.
We want to show that any configuration in Case 3 has smaller social welfare
than the configuration where everyone has the same αi = ¯α. We call this two
configurations the "original configuration" and the "average configuration".
Because of the choice of the value of ¯α, the sum of everyone's αi value stay
the same, therefore the total number of produced items is the same between the
two configurations. We will compare the social welfares of the two configurations
in two cases.
Case 3.1: Everyone is over-supplied in the average configuration. Then every-
one consumes exactly Nc(1 − ¯α) items in the average configuration. Therefore,
the consumption reward for each member is Ncrc(1 − ¯α). In the original con-
figuration, some members have greater αi values than ¯α and some others have
smaller αi values than ¯α. Consider a pair of members of which member A has
αi = ¯α + δ and member B has αi = ¯α − δ. For member A, since she becomes even
more over-supplied and spends less time on consumption, her consumption re-
ward decreases by exactly δNcrc. On the other hand, member B's consumption
reward increases by at most δNcrc, depending on whether B becomes under-
supplied after decreasing her αi value from ¯α. Therefore, the all-members total
consumption reward of the original configuration is no greater that of the average
configuration.
In terms of the total production reward, recall that it is the total num-
ber of consumptions multiplied by rp. Let K denote the total number of items
produced. In the average configuration, for each item, the expected number
of consumptions contributed by each member is (1 − ¯αNc)/K. In the original
configuration, consider again member A with αi = ¯α + δ and member B with
αi = ¯α −δ. Member A's contribution decreases by exactly δNc/K, while member
B's contribution increases by at most δNc/K. Therefore, the all-members total
production reward of the original configuration is no greater that of the average
configuration. Thus, we can conclude for Case 3.1 that the global welfare of the
original configuration is no greater than that of the average configuration.
eryone consumes exactly K = ηNpPn
Case 3.2: Everyone is under-supplied in the average configuration. Then ev-
i=1 αi items in the average configuration.
Therefore, the total consumption reward is nKrc. Now consider the original con-
figuration with member A having αi = ¯α + δ and member B having αi = ¯α − δ.
For member B, she is still under-supplied and her consumption reward stays the
same since the total number of items stays the same. For member A, her con-
sumption reward stays the same of she is still under-supplied and it decreases
if she becomes over-supplied and consumes less than K items. Therefore, the
all-members total consumption reward of the original configuration is no greater
that of the average configuration.
In terms of the total production reward, the average configuration has a
total production reward of nKrp, whereas the original configuration can have
the same total production rewards, or less if anyone becomes over-supplied by
having a larger αi and consumes less K items. Therefore, the all-members total
production reward of the original configuration is no greater that of the average
Stable and Efficient Structures
19
configuration. Thus, we can conclude for Case 3.2 that the social welfare of the
original configuration is no greater than that of the average configuration.
Since the average configuration belongs to either Case 1 or Case 2, both of
which are proven to have no greater global welfare than the maximum we claimed
in (11). Hence, the global welfare in (11) is the maximum possible global welfare
of the community.
Nash Equilibrium for the Uniform Structure
When every member chooses αi = Nc/(Nc + ηnNp), the consumption reward of
a member is
Rc(cid:18)αi =
Nc
Nc + ηnNp(cid:19) = (1 − αi)Ncrc =
ηnNpNcrc
Nc + ηnNp
The production reward of a member is
Rp(cid:18)αi =
Nc
Nc + nNp(cid:19) = αiNprpηn =
ηnNpNcrp
Nc + ηnNp
The total reward is the sum of the above two which is
R(cid:18)αi =
Nc
Nc + ηnNp(cid:19) =
ηnNpNc(rc + rp)
Nc + ηnNp
(56)
(57)
(58)
Now we calculate the reward for member i when she changes her strategy is
changed to αi + δ. We divide the analysis into two cases: δ > 0 and δ < 0.
Case 1: δ > 0, i.e., member i increases αi. This will make some members
over-supplied. For member i, the consumption reward decreases because of the
reduced amount of consumption time, i.e.,
∆Rc = −δNcrc
(59)
The total number of available items for the followers is now ηαinNp + δNp, the
probability of an item being chosen is
ηαinNp
ηαinNp + δNp
=
ηαin
ηαin + δ
The production reward for member i becomes
(αi + δ)ηn ·
ηαin
ηαin + δ
· Nprp
(60)
(61)
Therefore, the change in member i's total reward is
∆R = (αi + δ)ηn ·
ηαin
ηαin + δ
· Nprp − ηαinNprp − δNcrc
(62)
We want to check the condition for ∆R < 0. In the following derivation, we let
K = Nprp/Ncrc.
20
Zhang et al.
∆R = (αi + δ)ηn ·
ηαin
ηαin + δ
· Nprp − ηαinNprp − δNcrc < 0
(63)
⇒ K(cid:18) αiη2n2(αi + δ)
αiηn + δ
Kαiηnδ(ηn − 1)
− αiηn(cid:19) < δ
< δ
⇒
⇒
αiηn + δ
Kαiηn(ηn − 1)
αiηn + δ
< 1
# δ > 0
⇒ δ > αiηn(Kηn − K − 1)
To make sure (67) is satisfied, we must have
αiηn(Kηn − K − 1) ≤ 0
⇒ (Kηn − K − 1) ≤ 0
⇒ K ≤
⇒
Nprp
Ncrc
1
ηn − 1
1
≤
ηn − 1
⇒ η ≤(cid:18) Ncrc
nNprp
+
1
n(cid:19)
(64)
(65)
(66)
(67)
(68)
(69)
(70)
(71)
(72)
Summary of Case 1: If (72) is true, then the total reward for member i decreases
if she increases her αi to αi + δ (δ > 0).
Case 2: δ < 0, i.e., member i decreases her αi, then everyone in the community
become under-supplied. For member i, the production reward is reduced simply
because of the reduced value of αi, i.e.,
∆Rp = δηnNprp
(73)
The consumption reward for member i is also reduced because of the reduced
number of items available for consumption (even though member i tries to spend
more time on consumption).
∆Rc = δNprc
Therefore the change in the total reward for member i is
∆R = δ · Np(ηnrp + rc) < 0
# δ < 0
(74)
(75)
Case 2 done.
Combining Case 1 and Case 2, if and only if (72) is true, the change of αi
will result in a decrease of member i's total reward, therefore the strategy of
choosing the original αi results in a Nash equilibrium. Completing the proof for
Theorem 2.
Stable and Efficient Structures
21
C Proof of Theorem 3
Proof. The Gmax -celebrity in Eq (3) is greater than or equal to the Gmax -uniform
in Eq (11) if and only if the following is true.
η(1 − η)n2Np(rp + rc) ≥
ηn2NpNc(rc + rp)
Nc + ηnNp
⇔ 1 − η ≥
Nc
Nc + ηnNp
⇔ (1 − η)(Nc + ηnNp) ≥ Nc
⇔ η(nNp − Nc + nηNp) ≥ 0
⇔ nNp − Nc + nηNp ≥ 0
⇔ η ≥
Nc − nNp
nNp
(76)
(77)
(78)
(79)
(80)
(81)
According to the modelling assumption in Eq (1), Nc − nNp ≤ 0, and since
η ≥ 0, the condition is (81) is always true. Completing the proof of Theorem 3.
|
1701.02864 | 1 | 1701 | 2017-01-11T06:40:03 | Graph Equivalence Classes for Spectral Projector-Based Graph Fourier Transforms | [
"cs.SI"
] | We define and discuss the utility of two equivalence graph classes over which a spectral projector-based graph Fourier transform is equivalent: isomorphic equivalence classes and Jordan equivalence classes. Isomorphic equivalence classes show that the transform is equivalent up to a permutation on the node labels. Jordan equivalence classes permit identical transforms over graphs of nonidentical topologies and allow a basis-invariant characterization of total variation orderings of the spectral components. Methods to exploit these classes to reduce computation time of the transform as well as limitations are discussed. | cs.SI | cs | Graph Equivalence Classes for Spectral
Projector-Based Graph Fourier Transforms
Joya A. Deri, Member, IEEE, and José M. F. Moura, Fellow, IEEE
1
7
1
0
2
n
a
J
1
1
]
I
S
.
s
c
[
1
v
4
6
8
2
0
.
1
0
7
1
:
v
i
X
r
a
Abstract -- We define and discuss the utility of two equiv-
alence graph classes over which a spectral projector-based
graph Fourier transform is equivalent: isomorphic equiv-
alence classes and Jordan equivalence classes. Isomorphic
equivalence classes show that the transform is equivalent
up to a permutation on the node labels. Jordan equivalence
classes permit identical transforms over graphs of noniden-
tical topologies and allow a basis-invariant characterization
of total variation orderings of the spectral components.
Methods to exploit these classes to reduce computation time
of the transform as well as limitations are discussed.
Index
Terms -- Jordan
generalized
eigenspaces, directed graphs, graph equivalence classes,
graph isomorphism, signal processing on graphs, networks
decomposition,
I. INTRODUCTION
Graph signal processing [1], [2] permits applications
of digital signal processing concepts to increasingly
larger networks. It is based on defining a shift filter,
for example, the adjacency matrix in [1], [3], [4] to
analyze undirected and directed graphs, or the graph
Laplacian [2] that applies to undirected graph struc-
tures. The graph Fourier transform is defined through
the eigendecomposition of this shift operator, see these
references. Further developments have been considered
in [5], [6], [7]. In particular, filter design [1], [5], [8]
and sampling [9], [10], [11] can be applied to reduce the
computational complexity of graph Fourier transforms.
With the objective of simplifying graph Fourier trans-
forms for large network applications, this paper explores
methods based on graph equivalence classes to reduce
the computation time of the subspace projector-based
graph Fourier transform proposed in [12]. This transform
extends the graph signal processing framework proposed
by [1], [3], [4] to consider spectral analysis over directed
graphs with potentially non-diagonalizable (defective)
adjacency matrices. The graph signal processing frame-
work of [12] allows for a unique, unambiguous signal
representation over defective adjacency matrices.
This work was partially supported by NSF grants CCF-1011903 and
CCF-1513936 and an SYS-CMU grant.
The authors are with the Department of Electrical and Computer
Engineering, Carnegie Mellon University, Pittsburgh, PA 15213 USA
(email: jderi,[email protected])
Consider a graph 𝒢 = 𝐺(𝐴) with adjacency matrix
𝐴 ∈ C𝑁×𝑁 with 𝑘 ≤ 𝑁 distinct eigenvalues and Jordan
decomposition 𝐴 = 𝑉 𝐽𝑉 −1. The associated Jordan
subspaces of 𝐴 are J𝑖𝑗, 𝑖 = 1, . . . 𝑘, 𝑗 = 1, . . . , 𝑔𝑖,
where 𝑔𝑖 is the geometric multiplicity of eigenvalue 𝜆𝑖,
or the dimension of the kernel of 𝐴 − 𝜆𝑖𝐼. The signal
space 𝒮 can be uniquely decomposed by the Jordan
subspaces (see [13], [14] and Section II). For a graph
signal 𝑠 ∈ 𝒮, the graph Fourier transform (GFT) of [12]
is defined as
𝑔𝑖⨁︁
ℱ : 𝒮 → 𝑘⨁︁
𝑠 → (︀𝑠11, . . . ,︀𝑠1𝑔1, . . . ,︀𝑠𝑘1, . . . ,︀𝑠𝑘𝑔𝑘 ) ,
J𝑖𝑗
𝑖=1
𝑗=1
(1)
where 𝑠𝑖𝑗 is the (oblique) projection of 𝑠 onto the Jordan
subspace 𝐽𝑖𝑗 parallel to 𝒮∖J𝑖𝑗. That is, the Fourier
transform of 𝑠, is the unique decomposition
𝑘∑︁
𝑔𝑖∑︁
︀𝑠𝑖𝑗,
𝑠 =
︀𝑠𝑖𝑗 ∈ J𝑖𝑗.
(2)
𝑖=1
𝑗=1
The spectral components are the Jordan subspaces of the
adjacency matrix with this formulation.
the transform (1) is invariant
This paper presents graph equivalence classes where
equal GFT projections by (1) are the equivalence re-
lation. First,
to node
permutations, which we formalize with the concept of
isomorphic equivalence classes. Furthermore, the GFT
permits degrees of freedom in graph topologies, which
we formalize by defining Jordan equivalence classes, a
concept that allows graph Fourier transform computa-
tions over graphs of simpler topologies. A frequency-
like ordering based on total variation of the spectral
components is also presented to motivate low-pass, high-
pass, and pass-band graph signals.
Section II provides the graph signal processing and
linear algebra background for the graph Fourier trans-
form (1). Isomorphic equivalence classes are defined in
Section III, and Jordan equivalence classes are defined in
Section IV. The Jordan equivalence classes influence the
definition of total variation-based orderings of the Jordan
subspaces, which is discussed in detail in Section V.
Section VI illustrates Jordan equivalence classes and
total variation orderings. Limitations of the method are
discussed in Section VII.
II. BACKGROUND
This section reviews the concepts of graph signal
processing and the GFT (1). Background on graphs
signal processing, including definitions of graph signals
and the graph shift, is described in greater detail in [1],
[3], [4], [12]. For background on eigendecompositions,
the reader is directed to in [13], [15], [16].
A. Eigendecomposition
Consider matrix 𝐴 ∈ C𝑁×𝑁 with 𝑘 distinct eigen-
values 𝜆1, . . . , 𝜆𝑘, 𝑘 ≤ 𝑁. The algebraic multiplic-
ity 𝑎𝑖 of 𝜆𝑖 represents the corresponding exponent of
the characteristic polynomial of 𝐴. Denote by Ker(𝐴)
the kernel or null space of matrix 𝐴. The geometric
multiplicity 𝑔𝑖 of eigenvalue 𝜆𝑖 equals the dimension of
Ker (𝐴 − 𝜆𝑖𝐼), which is the eigenspace of 𝜆𝑖 where 𝐼 is
the 𝑁 × 𝑁 identity matrix. The generalized eigenspaces
G𝑖, 𝑖 = 1, . . . , 𝑘, of 𝐴 are defined as
G𝑖 = Ker(𝐴 − 𝜆𝑖𝐼)𝑚𝑖,
(3)
where 𝑚𝑖 is the index of eigenvalue 𝜆𝑖. The generalized
eigenspaces uniquely decompose C𝑁 as the direct sum
C𝑁 =
G𝑖.
(4)
𝑖=1
Jordan chains. Let 𝑣1 ∈ Ker(𝐴 − 𝜆𝑖𝐼), 𝑣1 = 0,
be a proper eigenvector of 𝐴 that generates generalized
eigenvectors by the recursion
𝐴𝑣𝑝 = 𝜆𝑖𝑣𝑝 + 𝑣𝑝−1, 𝑝 = 2, . . . , 𝑟
(5)
where 𝑟 is the minimal positive integer such that
(𝐴 − 𝜆𝑖𝐼)𝑟 𝑣𝑟 = 0 and (𝐴 − 𝜆𝑖𝐼)𝑟−1 𝑣𝑟 = 0. A se-
quence of vectors (𝑣1, . . . , 𝑣𝑟) that satisfy (5) is a Jordan
chain of length 𝑟 [13]. The vectors in a Jordan chain are
linearly independent and generate the Jordan subspace
J = span (𝑣1, 𝑣2, . . . , 𝑣𝑟) .
(6)
Denote by J𝑖𝑗 the 𝑗th Jordan subspace of 𝜆𝑖 with
dimension 𝑟𝑖𝑗, 𝑖 = 1, . . . , 𝑘, 𝑗 = 1, . . . , 𝑔𝑖. The Jordan
spaces are disjoint and uniquely decompose the general-
ized eigenspace G𝑖 (3) of 𝜆𝑖 as
𝑘⨁︁
G𝑖 =
J𝑖𝑗.
(7)
𝑔𝑖⨁︁
𝑗=1
𝑘⨁︁
𝑔𝑖⨁︁
𝑖=1
𝑗=1
C𝑁 =
Jordan decomposition. Let 𝑉𝑖𝑗 denote the 𝑁 × 𝑟𝑖𝑗
matrix whose columns form a Jordan chain of eigen-
that spans Jordan subspace J𝑖𝑗. Then the
value 𝜆𝑖
eigenvector matrix 𝑉 of 𝐴 is
···
𝑉𝑘1 ··· 𝑉𝑘𝑔𝑘
(9)
where 𝑘 is the number of distinct eigenvalues. The
columns of 𝑉 are a Jordan basis of C𝑁 . Then 𝐴
has block-diagonal Jordan normal form 𝐽 consisting of
Jordan blocks
𝑉 =[︀𝑉11 ··· 𝑉1𝑔1
⎡⎢⎢⎢⎢⎣
𝐽(𝜆) =
𝜆
1
𝜆
...
...
]︀ ,
⎤⎥⎥⎥⎥⎦ .
1
𝜆
(10)
of size 𝑟𝑖𝑗. The Jordan normal form 𝐽 of 𝐴 is unique
up to a permutation of the Jordan blocks. The Jordan
decomposition of 𝐴 is 𝐴 = 𝑉 𝐽𝑉 −1.
B. Spectral Components
the Fourier
The spectral components of
trans-
form (1) are expressed in terms of the eigenvector
basis 𝑣1, . . . , 𝑣𝑁 and its dual basis 𝑤1, . . . , 𝑤𝑁 since
the Jordan basis may not be orthogonal. Denote the
basis and dual basis matrices by 𝑉 = [𝑣1 ··· 𝑣𝑁 ] and
𝑊 = [𝑤1 ··· , 𝑤𝑁 ]. The dual basis matrix is the inverse
Hermitian 𝑊 = 𝑉 −𝐻 [14], [17].
Consider the 𝑗th spectral component of 𝜆𝑖
J𝑖𝑗 = span(𝑣1,··· 𝑣𝑟𝑖𝑗 ).
(11)
The projection matrix onto J𝑖𝑗 parallel to C𝑁∖J𝑖𝑗 is
(12)
𝑃𝑖𝑗 = 𝑉𝑖𝑗𝑊 𝐻
𝑖𝑗 ,
where
𝑉𝑖𝑗 = [𝑣1 ··· 𝑣𝑟𝑖𝑗 ]
(13)
𝑖𝑗 ∈ C𝑟𝑖𝑗×𝑁
is the corresponding submatrix of 𝑉 and 𝑊 𝐻
is the corresponding submatrix of 𝑊 partitioned as
𝑊 = [··· 𝑊 𝐻
𝑖1 ··· 𝑊 𝐻
(14)
As shown in [12], the projection of signal 𝑠 ∈ C𝑁
𝑖𝑔𝑖
··· ]𝑇 .
onto Jordan subspace J𝑖𝑗 can be written as
︀𝑠𝑖𝑗 =︀𝑠1𝑣1 + ··· +︀𝑠𝑟𝑖𝑗 𝑣𝑟𝑖𝑗
(15)
(16)
= 𝑉𝑖𝑗𝑊 𝐻
𝑖𝑗 𝑠.
The next sections show that invariance of the graph
Fourier transform (1) is a useful equivalence relation on
a set of graphs. Equivalence classes with respect to the
GFT are explored in Sections III and IV.
The space C𝑁 can be expressed as the unique decom-
position of Jordan spaces
J𝑖𝑗.
III. ISOMORPHIC EQUIVALENCE CLASSES
(8)
This section demonstrates that the graph Fourier trans-
form (1) is invariant up to a permutation of node labels
2
and establishes sets of isomorphic graphs as equivalence
classes with respect to invariance of the GFT (1). Two
graphs 𝒢(𝐴) and 𝒢(𝐵) are isomorphic if their adja-
cency matrices are similar with respect to a permutation
matrix 𝑇 , or 𝐵 = 𝑇 𝐴𝑇 −1 [18]. The graphs have
the same Jordan normal form and the same spectra.
Also,
if 𝑉𝐴 and 𝑉𝐵 are eigenvector matrices of 𝐴
and 𝐵, respectively, then 𝑉𝐵 = 𝑇 𝑉𝐴. We prove that
𝐴 of all graphs that are isomorphic to 𝒢(𝐴) is
the set G𝐼
an equivalence class over which the GFT is preserved.
The next theorem shows that an appropriate permutation
can be imposed on the graph signal and GFT to ensure
invariance of the GFT over all graphs 𝒢 ∈ G𝐼
𝐴.
Theorem 1. The graph Fourier transform of a signal
𝑠 is invariant to the choice of graph 𝒢 ∈ G𝐼
𝐴 up to a
permutation on the graph signal and inverse permutation
on the graph Fourier transform.
Proof: For 𝒢(𝐴),𝒢(𝐵) ∈ G𝐼
𝐴, there exists a permu-
tation matrix 𝑇 such that 𝐵 = 𝑇 𝐴𝑇 −1. For eigenvector
matrices 𝑉𝐴 and 𝑉𝐵 of 𝐴 and 𝐵, respectively, let 𝑉𝐴,𝑖𝑗
and 𝑉𝐵,𝑖𝑗 denote the 𝑁 × 𝑟𝑖𝑗 submatrices of 𝑉𝐴 and 𝑉𝐵
whose columns span the 𝑗th Jordan subspaces J𝐴,𝑖𝑗
and J𝐵,𝑖𝑗 of the 𝑖th eigenvalue of 𝐴 and 𝐵, respectively.
Let 𝑊𝐴 = 𝑉 −𝐻
denote the matrices
whose columns form dual bases of 𝑉𝐴 and 𝑉𝐵. Since
𝑉𝐵 = 𝑇 𝑉𝐴,
and 𝑊𝐵 = 𝑉 −𝐻
𝐵
𝐴
𝑊𝐵 = (𝑇 𝑉𝐴)−𝐻
(17)
(18)
(19)
(20)
where 𝑇 −𝐻 = 𝑇 since 𝑇 is a permutation matrix. Thus,
(21)
= (𝑉 −1
𝐴 𝑇 −1)𝐻
= 𝑇 −𝐻 𝑉 −𝐻
= 𝑇 𝑊𝐴,
𝐴 𝑇 𝐻 = 𝑊 𝐻
𝐴 𝑇 −1.
𝑊 𝐻
𝐵 = 𝑊 𝐻
𝐴
Consider graph signal 𝑠. By (16), the signal projection
onto J𝐴,𝑖𝑗 is
Permit a permutation 𝑠 = 𝑇 𝑠 on the graph signal. Then
the projection of 𝑠 onto J𝐵,𝑖𝑗 is
︀𝑠𝐴,𝑖𝑗 = 𝑉𝐴,𝑖𝑗𝑊 𝐻
︀𝑠𝐵,𝑖𝑗 = 𝑇 𝑉𝐴,𝑖𝑗𝑊 𝐻
= 𝑇 𝑉𝐴,𝑖𝑗𝑊 𝐻
= 𝑇︀𝑠𝐴,𝑖𝑗
𝐴,𝑖𝑗𝑠.
𝐴,𝑖𝑗𝑇 −1𝑇 𝑠
𝐴,𝑖𝑗𝑠
(22)
(23)
(24)
(25)
by (22). Therefore, the graph Fourier transform (1) is
invariant to a choice among isomorphic graphs up to a
permutation on the graph signal and inverse permutation
on the Fourier transform.
Theorem 2. Consider 𝐴 ∈ C𝑁×𝑁 . Then the set G𝐼
of graphs isomorphic to 𝒢(𝐴) is an equivalence class
𝐴
3
with respect to the invariance of the GFT (1) up to a
permutation of the graph signal and inverse permutation
of the graph Fourier transform.
Theorem 1 establishes an invariance of the GFT over
graphs that only differ up to a node labeling, and
Theorem 2 follows.
The isomorphic equivalence of graphs is important
since it signifies that the rows and columns of an adja-
cency matrix can be permuted to accelerate the eigende-
composition. For example, permutations of highly sparse
adjacency matrices can convert an arbitrary matrix to
nearly diagonal forms, such as with the Cuthill-McKee
algorithm [19]. Optimizations for such matrices in this
form are discussed in [16] and [20], for example. In the
next section, the degrees of freedom in graph topology
are explored to define another GFT equivalence class.
IV. JORDAN EQUIVALENCE CLASSES
Since the Jordan subspaces of defective adjacency
matrices are nontrivial (i.e., they have dimension larger
than one), a degree of freedom exists on the graph
structure so that the graph Fourier transform of a signal
is equal over multiple graphs of different topologies.
This section defines Jordan equivalence classes of graph
structures over which the GFT (1) is equal for a given
graph signal. The section proves important properties of
this equivalence class that are used to explore inexact
methods and real-world applications in [21].
The intuition behind Jordan equivalence is presented
in Section IV-A, and properties of Jordan equivalence
are described in Section IV-B. Section IV-C com-
pares isomorphic and Jordan equivalent graphs. Sec-
tions IV-D, IV-E, IV-F, and IV-G prove properties for
Jordan equivalence classes when adjacency matrices
have particular Jordan block structures.
A. Intuition
Consider Figure 1, which shows a basis {𝑉 } =
{𝑣1, 𝑣2, 𝑣3} of R3 such that 𝑣2 and 𝑣3 span a two-
dimensional Jordan space J of adjacency matrix 𝐴
with Jordan decomposition 𝐴 = 𝑉 𝐽𝑉 −1. The resulting
projection of a signal 𝑠 ∈ R𝑁 as in (16) is unique.
a new basis ︀𝑉 . Note that ︀𝐴 = ︀𝑉 𝐽︀𝑉 −1 does not equal
Note that the definition of the two-dimensional Jordan
subspace J in Figure 1 is not basis-dependent because
any spanning set {𝑤2, 𝑤3} could be chosen to define J .
This can be visualized by rotating 𝑣2 and 𝑣3 on the two-
dimensional plane. Any choice {𝑤2, 𝑤3} corresponds to
𝐴 = 𝑉 𝐽𝑉 −1 for all choices of {𝑤2, 𝑤3}; the underlying
graph topologies may be different, or the edge weights
may be different. Nevertheless, their spectral components
(the Jordan subspaces) are identical, and, consequently,
𝑠 (shown in black) onto a nontrivial Jordan subspace (span
of 𝑣1 and 𝑣2) and the span of 𝑣3, respectively, in R3. The
projection onto the nontrivial subspace is invariant to basis
Fig. 1: Projections ︀𝑠1 and ︀𝑠2 (shown in red) of a signal
choices {𝑣1, 𝑣2} (in blue) or {︀𝑣1,︀𝑣2} (in green).
graphs 𝒢(𝐴) and 𝒢(︀𝐴). This observation leads to the
the spectral projections of a signal onto these compo-
nents are identical; i.e., the GFT (1) is equivalent over
definition of Jordan equivalence classes which preserve
the GFT (1) as well as the underlying structure captured
by the Jordan normal form 𝐽 of 𝐴. These classes are
formally defined in the next section.
B. Definition and Properties
This section defines the Jordan equivalence class of
graphs, over which the graph Fourier transform (1) is
invariant. We will show that certain Jordan equivalence
classes allow the GFT computation to be simplified.
Consider graph 𝒢(𝐴) where 𝐴 has a Jordan chain
that spans Jordan subspace J𝑖𝑗 of dimension 𝑟𝑖𝑗 > 1.
Then (15), and consequently, (16), would hold for a non-
Jordan basis of J𝑖𝑗; that is, a basis could be chosen to
find spectral component ︀𝑠𝑖𝑗 such that the basis vectors
do not form a Jordan chain of 𝐴. This highlights that
the Fourier transform (1) is characterized not by the
Jordan basis of 𝐴 but by the set J𝐴 = {J𝑖𝑗}𝑖𝑗 of
Jordan subspaces spanned by the Jordan chains of 𝐴.
Thus, graphs with topologies yielding the same Jordan
subspace decomposition of the signal space have the
same spectral components. Such graphs are termed Jor-
dan equivalent with the following formal definition.
Definition 3 (Jordan Equivalent Graphs). Consider
graphs 𝒢(𝐴) and 𝒢(𝐵) with adjacency matrices 𝐴, 𝐵 ∈
C𝑁×𝑁 . Then 𝒢(𝐴) and 𝒢(𝐵) are Jordan equivalent
graphs if all of the following are true:
1) J𝐴 = J𝐵; and
2) 𝐽𝐴 = 𝐽𝐵 (with respect to a fixed permutation of
Jordan blocks).
Let G𝐽
𝐴 denote the set of graphs that are Jordan
equivalent to 𝒢(𝐴). Definition 3 and (1) establish that
G𝐽
𝐴 is an equivalence class.
Theorem 4. For 𝐴 ∈ C𝑁×𝑁 , the set G𝐽
𝐴 of all graphs
that are Jordan equivalent to 𝒢(𝐴) is an equivalence
class with respect to invariance of the GFT (1).
Jordan equivalent graphs have adjacency matrices with
identical Jordan subspaces and identical Jordan normal
forms. This implies equivalence of graph spectra, proven
in Theorem 5 below.
Theorem 5. Denote by Λ𝐴 and Λ𝐵 the sets of eigen-
values of 𝐴 and 𝐵, respectively. Let 𝒢(𝐴),𝒢(𝐵) ∈ G𝐽
𝐴.
Then Λ𝐴 = Λ𝐵; that is, 𝒢(𝐴) and 𝒢(𝐵) are cospectral.
Proof: Since 𝒢(𝐴) and 𝒢(𝐵) are Jordan equivalent,
their Jordan forms are equal, so their spectra (the unique
elements on the diagonal of the Jordan form) are equal.
Once a Jordan decomposition for an adjacency matrix
is found, it is useful to characterize other graphs in
the same Jordan equivalence class. To this end, Theo-
rem 6 presents a transformation that preserves the Jordan
equivalence class of a graph.
Theorem 6. Consider 𝐴, 𝐵 ∈ C𝑁×𝑁 with Jordan
decompositions 𝐴 = 𝑉 𝐽𝑉 −1 and 𝐵 = 𝑋𝐽𝑋−1 and
eigenvector matrices 𝑉 = [𝑉𝑖𝑗] and 𝑋 = [𝑋𝑖𝑗], respec-
tively. Then, 𝒢(𝐵) ∈ G𝐽
𝐴 if and only if 𝐵 has eigenvector
matrix 𝑋 = 𝑉 𝑌 for block diagonal 𝑌 with invertible
submatrices 𝑌𝑖𝑗 ∈ C𝑟𝑖𝑗×𝑟𝑖𝑗 , 𝑖 = 1, . . . , 𝑘, 𝑗 = 1, . . . , 𝑔𝑖.
Proof: The Jordan normal forms of 𝐴 and 𝐵 are
equal. By Definition 3, it remains to show J𝐴 = J𝐵 so
that 𝒢(𝐵) ∈ G𝐽
𝐴. The identity J𝐴 = J𝐵 must be true
when span{𝑉𝑖𝑗} = span{𝑋𝑖𝑗} = J𝑖𝑗, which implies
that 𝑋𝑖𝑗 represents an invertible linear transformation of
the columns of 𝑉𝑖𝑗. Thus, 𝑋𝑖𝑗 = 𝑉𝑖𝑗𝑌𝑖𝑗, where 𝑌𝑖𝑗 is
invertible. Defining 𝑌 = diag(𝑌11, . . . , 𝑌𝑖𝑗, . . . , 𝑌𝑘,𝑔𝑘 )
yields 𝑋 = 𝑉 𝑌 .
C. Jordan Equivalent Graphs vs. Isomorphic Graphs
This section shows that isomorphic graphs do not
imply Jordan equivalence, and vice versa. First it is
shown that isomorphic graphs have isomorphic Jordan
subspaces.
Lemma 7. Consider graphs 𝒢(𝐴),𝒢(𝐵) ∈ G𝐼
𝐴 so that
𝐵 = 𝑇 𝐴𝑇 −1 for a permutation matrix 𝑇 . Denote by
J𝐴 and J𝐵 the sets of Jordan subspaces for 𝐴 and 𝐵,
respectively. If {𝑣1, . . . , 𝑣𝑟} is a basis of J𝐴 ∈ J𝐴, then
there exists J𝐵 ∈ J𝐵 with basis {𝑥1, . . . , 𝑥𝑟} such that
[𝑥1 ··· 𝑥𝑟] = 𝑇 [𝑣1 ··· 𝑣𝑟]; i.e., 𝐴 and 𝐵 have isomorphic
Jordan subspaces.
Proof: Consider 𝐴 with Jordan decomposition 𝐴 =
𝑉 𝐽𝑉 −1. Since 𝐵 = 𝑇 𝐴𝑇 −1, it follows that
𝐵 = 𝑇 𝑉 𝐽𝑉 −1𝑇 −1
(26)
4
= 𝑋𝐽𝑋−1
(27)
where 𝑋 = 𝑇 𝑉 represents an eigenvector matrix of
𝐵 that is a permutation of the rows of 𝑉 . (It is clear
that the Jordan forms of 𝐴 and 𝐵 are equivalent.) Let
columns 𝑣1, . . . , 𝑣𝑟 of 𝑉 denote a Jordan chain of 𝐴 that
spans Jordan subspace J𝐴. The corresponding columns
in 𝑋 are 𝑥1, . . . , 𝑥𝑟 and span(𝑥1, . . . , 𝑥𝑟) = J𝐵.
Since [𝑥1 ··· 𝑥𝑟] = 𝑇 [𝑣1 ··· 𝑣𝑟], J𝐴 and J𝐵 are
isomorphic subspaces [13].
Theorem 8. A graph isomorphism does not imply Jordan
equivalence.
Proof: Consider 𝒢(𝐴),𝒢(𝐵) ∈ G𝐼
𝐴 and 𝐵 =
𝑇 𝐴𝑇 −1 for permutation matrix 𝑇 . By (27), 𝐽𝐴 = 𝐽𝐵.
To show 𝒢(𝐴),𝒢(𝐵) ∈ G𝐽
𝐴, it remains to check whether
J𝐴 = J𝐵.
By Lemma 7, for any J𝐴 ∈ J𝐴, there exists J𝐵 ∈
J𝐵 that is isomorphic to J𝐴. That is, if 𝑣1, . . . , 𝑣𝑟
and 𝑥1, . . . , 𝑥𝑟 are bases of J𝐴 and J𝐵, respectively,
then [𝑥1 ··· 𝑥𝑟] = 𝑇 [𝑣1 ··· 𝑣𝑟]. Checking J𝐴 = J𝐵 is
equivalent to checking
𝛼1𝑣1 + ··· + 𝛼𝑟𝑣𝑟 = 𝛽1𝑥1 + ··· + 𝛽𝑟𝑥𝑟
= 𝛽1𝑇 𝑣1 + ··· + 𝛽𝑟𝑇 𝑣𝑟
(28)
(29)
for some coefficients 𝛼𝑖 and 𝛽𝑖, 𝑖 = 1, . . . , 𝑟. How-
ever, (29) does not always hold. Consider matrices 𝐴
and 𝐵
[︃ 1
−1
−1
0
2
0
, 𝐵 =
. (30)
[︃2
𝐴 =
0
0
0
2
0
]︃
−1
−1
1
[︃1
]︃
0
0
0
1
0
]︃
0
0
2
]︃
Fig. 2: Jordan equivalent graph structures with unicellular
adjacency matrices.
Proof: A counterexample is provided. The top two
graphs in Figure 2 correspond to 0/1 adjacency matrices
with a single Jordan subspace J = C𝑁 and eigen-
value 0; therefore, they are Jordan equivalent. On the
other hand, they are not isomorphic since the graph on
the right has more edges then the graph on the left.
Theorem 8 shows that changing the graph node labels
may change the Jordan subspaces and the Jordan equiv-
alence class of the graph, while Theorem 9 shows that
a Jordan equivalence class may include graphs with dif-
ferent topologies. Thus, graph isomorphism and Jordan
equivalence are not identical concepts. Nevertheless, the
isomorphic and Jordan equivalence classes both imply
invariance of the graph Fourier transform with respect
to equivalence relations as stated in Theorems 1 and 4.
The next theorem establishes an isomorphism between
Jordan equivalence classes.
Theorem 10. If 𝐴, 𝐵 ∈ C𝑁×𝑁 and 𝒢(𝐴) and 𝒢(𝐵)
then their respective Jordan equiva-
are isomorphic,
𝐵 are isomorphic; i.e., any
𝐴 and G𝐽
lence classes G𝐽
𝐴 is isomorphic to a graph 𝒢(𝐵′) ∈
graph 𝒢(𝐴′) ∈ G𝐽
𝐵.
G𝐽
Proof: Let 𝒢(𝐴) and 𝒢(𝐵) be isomorphic by per-
mutation matrix 𝑇 such that 𝐵 = 𝑇 𝐴𝑇 −1. Consider
𝒢(𝐴′) ∈ G𝐽
𝐴, which implies that Jordan normal forms
𝐽𝐴′ = 𝐽𝐴 and sets of Jordan subspaces J𝐴′ = J𝐴 by
Definition 3. Denote by 𝐴′ = 𝑉𝐴′𝐽𝐴′𝑉𝐴′
the Jordan
decomposition of 𝐴′. Define 𝐵′ = 𝑇 𝐴′𝑇 −1. It suffices
to show 𝒢(𝐵′) ∈ G𝐽
𝐵. First simplify:
= 𝑇 𝑉𝐴′𝐽𝐴′𝑉 −1
= 𝑇 𝑉𝐴′𝐽𝐴𝑉 −1
= 𝑇 𝑉𝐴′𝐽𝐵𝑉 −1
𝐴′ 𝑇 −1
𝐴′ 𝑇 −1
𝐴′ 𝑇 −1
(since 𝒢(𝐴′) ∈ G𝐽
𝐴)
(since 𝒢(𝐴) ∈ G𝐼
𝐵).
(33)
(34)
(35)
(36)
From (36), it follows that 𝐽𝐵′ = 𝐽𝐵. It remains to
show that J𝐵′ = J𝐵. Choose arbitrary Jordan sub-
space J𝐴,𝑖𝑗 = span{𝑉𝐴,𝑖𝑗} of 𝐴. Then J𝐴′,𝑖𝑗 =
span{𝑉𝐴′,𝑖𝑗} = J𝐴,𝑖𝑗 since 𝒢(𝐴′) ∈ G𝐽
𝐴. Then the
𝑗th Jordan subspace of eigenvalue 𝜆𝑖 for 𝐵 is
J𝐵,𝑖𝑗 = span{𝑇 𝑉𝐴,𝑖𝑗}
= 𝑇 span{𝑉𝐴,𝑖𝑗}.
(37)
(38)
These matrices are similar with respect to a permutation
matrix and thus correspond to isomorphic graphs. Their
Jordan normal forms are both
0
2
0
]︃
(31)
𝐽 =
0
0
2
with possible eigenvector matrices 𝑉𝐴 and 𝑉𝐵 given by
[︃1
1
1
1
0
0
[︃1
1
1
𝑉𝐴 =
, 𝑉𝐵 =
0
1
0
0
0
1
.
(32)
𝐵′ = 𝑇 𝐴′𝑇 −1
Equation (32) shows that 𝐴 and 𝐵 both have Jordan
subspaces J1 = span([1 1 1]𝑇 ) for 𝜆1 = 1 and
J21 = span([0 1 0]𝑇 ) for one Jordan subspace of
𝜆2 = 2. However, the remaining Jordan subspace is
span([1 0 0]𝑇 ) for 𝐴 but span([0 0 1]𝑇 ) for 𝐵, so (29)
fails. Thus, 𝒢(𝐴) and 𝒢(𝐵) are not Jordan equivalent.
The next theorem shows that Jordan equivalent graphs
may not be isomorphic.
Theorem 9. Jordan equivalence does not
existence of a graph isomorphism.
imply the
5
For the 𝑗th Jordan subspace of eigenvalue 𝜆𝑖 for 𝐵′, it
follows from (36) that
J𝐵′,𝑖𝑗 = span{𝑇 𝑉𝐴′,𝑖𝑗}
= 𝑇 span{𝑉𝐴′,𝑖𝑗}
= 𝑇 span{𝑉𝐴,𝑖𝑗}
(39)
(40)
(since 𝒢(𝐴′) ∈ G𝐽
𝐴)
(41)
(42)
(by (38))
= J𝐵,𝑖𝑗.
Since (42) holds for all 𝑖 and 𝑗, the sets of Jordan
subspaces J𝐵′ = J𝐵. Therefore, 𝒢(𝐵′) and 𝒢(𝐵) are
Jordan equivalent, which proves the theorem.
Theorem 10 shows that the Jordan equivalence classes
of two isomorphic graphs are also isomorphic. This
result permits an frequency ordering on the spectral
components of a matrix 𝐴 that is invariant to both the
choice of graph in G𝐽
𝐴 and the choice of node labels, as
demonstrated in Section V.
Relation to matrices with the same set of invariant
subspaces. Let GInv
𝐴 denote the set of all matrices
i.e.,
with the same set of invariant subspaces of 𝐴;
𝒢(𝐵) ∈ GInv
𝐴 if and only if Inv(𝐴) = Inv(𝐵). The
𝐴 is a proper subset of the
next theorem shows that GInv
Jordan equivalence class G𝐽
𝐴 of 𝐴.
Theorem 11. For 𝐴 ∈ C𝑁×𝑁 , GInv
𝐴 ⊂ G𝐽
𝐴.
Proof: If 𝒢(𝐵) ∈ GInv
subspaces are equal, or J𝐴 = J𝐵.
𝐴 , then the set of Jordan
Theorem 11 sets the results of this chapter apart
from analyses such as those in Chapter 10 of [15],
which describes structures for matrices with the same
invariant spaces, and [22], which describes the eigen-
decomposition of the discrete Fourier transform matrix
in terms of projections onto invariant spaces. The Jor-
dan equivalence class relaxes the assumption that all
invariant subspaces of two adjacency matrices must be
equal. This translates to more degrees of freedom in the
graph topology. The following sections present results
for adjacency matrices with diagonal Jordan forms, one
Jordan block, and multiple Jordan blocks.
D. Diagonalizable Matrices
If the canonical Jordan form 𝐽 of 𝐴 is diagonal (𝐴
is diagonalizable), then there are no Jordan chains and
the set of Jordan subspaces J𝐴 = {J𝑝}𝑁
𝑝=1 where
J𝑝 = span(𝑣𝑝) and 𝑣𝑝 is the 𝑝th eigenvector of 𝐴.
Graphs with diagonalizable adjacency matrices include
undirected graphs, directed cycles, and other digraphs
with normal adjacency matrices such as normally regular
digraphs [23]. A graph with a diagonalizable adjacency
matrix is Jordan equivalent only to itself, as proven next.
Theorem 12. A graph 𝒢(𝐴) with diagonalizable adja-
cency matrix 𝐴 ∈ C𝑁×𝑁 belongs to a Jordan equiva-
lence class of size one.
Proof: Since the Jordan subspaces of a diagonal-
izable matrix are one-dimensional, the possible choices
of Jordan basis are limited to nonzero scalar multiples
of the eigenvectors. Then, given eigenvector matrix 𝑉
of 𝐴, all possible eigenvector matrices of 𝐴 are given
by 𝑋 = 𝑉 𝑈, where 𝑈 is a diagonal matrix with nonzero
diagonal entries. Let 𝐵 = 𝑋𝐽𝑋−1, where 𝐽 is the
diagonal canonical Jordan form of 𝐴. Since 𝑈 and 𝐽
are both diagonal, they commute, yielding
𝐵 = 𝑋𝐽𝑋−1
= 𝑉 𝑈 𝐽𝑈−1𝑉 −1
= 𝑉 𝐽𝑈 𝑈−1𝑉 −1
= 𝑉 𝐽𝑉 −1
= 𝐴.
(43)
(44)
(45)
(46)
(47)
Thus, a graph with a diagonalizable adjacency matrix is
the one and only element in its Jordan equivalence class.
When a matrix has nondefective but repeated eigen-
values, there are infinitely many choices of eigenvec-
tors [16]. An illustrative example is the identity matrix,
which has a single eigenvalue but
is diagonalizable.
Since it has infinitely many choices of eigenvectors, the
identity matrix corresponds to infinitely many Jordan
equivalence classes. By Theorem 12, each of these equiv-
alence classes have size one. This observation highlights
that the definition of a Jordan equivalence class requires
a choice of basis.
E. One Jordan Block
Consider matrix 𝐴 with Jordan decomposition 𝐴 =
𝑉 𝐽𝑉 −1 where 𝐽 is a single Jordan block and 𝑉 =
[𝑣1 ··· 𝑣𝑁 ] is an eigenvector matrix. Then 𝐴 is a repre-
sentation of a unicellular transformation 𝑇 : C𝑁 → C𝑁
with respect to Jordan basis 𝑣1, . . . 𝑣𝑁 (see [15, Sec-
tion 2.5]). In this case the set of Jordan subspaces has
one element J = C𝑁 . Properties of unicellular Jordan
equivalence classes are demonstrated next.
Theorem 13. Let 𝒢(𝐴) be an element of the unicellular
𝐴. Then all graph filters 𝐻 ∈
Jordan equivalence class G𝐽
G𝐽
over graph 𝒢(𝐴), and let ︀𝑠 represent the coordinate
Proof: Since 𝐴 is unicellular, it has a single Jordan
chain 𝑣1, . . . , 𝑣𝑁 of length 𝑁. Consider a graph signal 𝑠
vector of 𝑠 in terms of the basis {𝑣𝑖}𝑁
spectral decomposition of signal 𝑠 is given by
𝐴 are all-pass.
𝑖=1. Then the
𝑠 =︀𝑠1𝑣1 + ···︀𝑠𝑁 𝑣𝑁 =︀𝑠;
(48)
is,
that
the unique projection of 𝑠 onto the spectral
component J = C𝑁 is itself. Therefore, 𝒢(𝐴) acts as
an all-pass filter. Moreover, (48) holds for all graphs in
Jordan equivalence class G𝐽
𝐴.
6
In addition to the all-pass property of unicellular graph
filters, unicellular isomorphic graphs are also Jordan
equivalent, as proven next.
Theorem 14. Let 𝒢(𝐴),𝒢(𝐵) ∈ G𝐼
unicellular matrix. Then 𝒢(𝐴),𝒢(𝐵) ∈ G𝐽
𝐴.
𝐴 where 𝐴 is a
Proof: Since 𝒢(𝐴) and 𝒢(𝐵) are isomorphic, Jor-
dan normal forms 𝐽𝐴 = 𝐽𝐵. Therefore, 𝐵 is also
unicellular, so J𝐴 = J𝐵 = {C𝑁}. By Definition 3,
𝒢(𝐴),𝒢(𝐵) ∈ G𝐽
𝐴.
The dual basis of 𝑉 can also be used to construct
graphs in the Jordan equivalence class of unicellular 𝐴.
Theorem 15. Denote by 𝑉 an eigenvector matrix of
unicellular 𝐴 ∈ C𝑁×𝑁 and 𝑊 = 𝑉 −𝐻 is the dual basis.
Consider decompositions 𝐴 = 𝑉 𝐽𝑉 −1 and 𝐴𝑊 =
𝑊 𝐽𝑊 −1. Then 𝒢(𝐴𝑊 ) ∈ G𝐽
𝐴.
Proof: Matrices 𝐴 and 𝐴𝑊 have the same Jordan
normal form by definition. Since there is only one Jordan
block, both matrices have a single Jordan subspace C𝑁 .
By Definition 3, 𝒢(𝐴𝑊 ) and 𝒢(𝐴) are Jordan equivalent.
The next theorem characterizes the special case of
graphs in the Jordan equivalence class that contains 𝒢(𝐽)
with adjacency matrix equal to Jordan block 𝐽 = 𝐽(𝜆).
Theorem 16. Denote by 𝐽 = 𝐽(𝜆) is the 𝑁 × 𝑁 Jordan
block (10) for eigenvalue 𝜆. Then 𝒢(𝐴) ∈ G𝐽
𝐽 if 𝐴 ∈
C𝑁×𝑁 is upper triangular with diagonal entries 𝜆 and
nonzero entries on the first off-diagonal.
Proof: Consider upper
triangular matrix 𝐴 =
[𝑎𝑖𝑗] with diagonal entries 𝑎11 = ··· = 𝑎𝑁 𝑁 and
nonzero elements on the first off-diagonal. By [15,
Example 10.2.1], 𝐴 has the same invariant subspaces
as 𝐽 = 𝐽(𝜆), which implies J𝐽 = J𝐴 = {C𝑁}.
Therefore, the Jordan normal form of 𝐴 is the Jordan
block 𝐽𝐴 = 𝐽(𝑎11). Restrict the diagonal entries of 𝐴 to
𝜆 so 𝐽𝐴 = 𝐽. Then, 𝒢(𝐽),𝒢(𝐴) ∈ G𝐽
𝐽 by Definition (3).
𝐽
Figure 2 shows graph structures that are in the same
unicellular Jordan equivalence class by Theorem 16. In
addition, the theorem implies that it is sufficient to deter-
mine the GFT of unicellular 𝐴 by replacing 𝒢(𝐴) ∈ G𝐽
with 𝒢(𝐽), where 𝐽 is a single 𝑁×𝑁 Jordan block. That
is, without loss of generality, 𝒢(𝐴) can be replaced with
a directed chain graph with possible self-edges and the
eigenvector matrix 𝑉 = 𝐼 chosen to compute the GFT
of a graph signal.
Remark on invariant spaces. Example 10.2.1 of [15]
shows that a matrix 𝐴 ∈ C𝑁×𝑁 having upper triangular
entries with constant diagonal entries 𝑎 and nonzero
entries on the first off-diagonal is both necessary and
sufficient for 𝐴 to have the same invariant subspaces as
𝑁 × 𝑁 Jordan block 𝐽 = 𝐽(𝜆) (i.e., Inv(𝐽) = Inv(𝐴),
where Inv(·) represents the set of invariant spaces of a
matrix). If 𝑎 = 𝜆, Definition 3 can be applied, which
yields 𝒢(𝐴) ∈ G𝐽
𝐽.
On the other hand, consider a unicellular matrix 𝐵
such that its eigenvector is not in the span of a canonical
vector, e.g.,
⎡⎢⎢⎢⎣
𝐵 =
1
2
1
2
0
0
2
− 1
− 1
2
0
0
1
2
− 1
2
1
2
1
2
1
2
2
− 1
− 1
− 1
2
2
⎤⎥⎥⎥⎦
(49)
with Jordan normal
form 𝐽(0). Since the span of
the eigenvectors of 𝐽(0) and 𝐵 are not
identical,
Inv(𝐽(0)) = Inv(𝐵). However, by Definition 3, 𝒢(𝐵) is
in the same class of unicellular Jordan equivalent graphs
as those of Figure 2, i.e., 𝒢(𝐵) ∈ G𝐽
𝐽. In other words,
for matrices 𝐴 and 𝐵 with the same Jordan normal forms
(𝐽𝐴 = 𝐽𝐵), Jordan equivalence, i.e., J𝐴 = J𝐵, is a more
general condition than Inv(𝐴) = Inv(𝐵). This illustrates
that graphs having adjacency matrices with equal Jordan
normal forms and the same sets of invariant spaces form
a proper subset of a Jordan equivalence class, as shown
above in Theorem 11.
Remark on topology. Note that
replacing each
nonzero element of (49) with a unit entry results in a
matrix that is not unicellular. Therefore, its correspond-
ing graph is not in a unicellular Jordan equivalence class.
This observation demonstrates that topology may not
determine the Jordan equivalence class of a graph.
F. Two Jordan Blocks
⏞
︀𝑠1
⏞
︀𝑠2
Consider 𝑁 × 𝑁 matrix 𝐴 with Jordan normal
two Jordan subspaces J1 =
form consisting of
span(𝑣1, . . . , 𝑣𝑟1) and J2 = span(𝑣𝑟1+1, . . . , 𝑣𝑟2) of
dimensions 𝑟1 > 1 and 𝑟2 = 𝑁 − 𝑟1 and corresponding
eigenvalues 𝜆1 and 𝜆2, respectively. The spectral decom-
position of signal 𝑠 over 𝒢(𝐴) yields
𝑠 =︀𝑠1𝑣1 + ··· +︀𝑠𝑟1𝑣𝑟1
+︀𝑠𝑟1+1𝑣𝑟1+1 + ··· +︀𝑠𝑁 𝑣𝑁
⏟
⏟
=︀𝑠1 +︀𝑠2.
Spectral components ︀𝑠1 and ︀𝑠2 are the unique pro-
jections of 𝑠 onto the respective Jordan subspaces. By
Example 6.5.4 in [13], a Jordan basis matrix 𝑋 can be
chosen for 𝐴 = 𝑉 𝐽𝑉 −1 such that 𝑋 = 𝑉 𝑈, where 𝑈
commutes with 𝐽 and has a particular form as follows.
then 𝑈 = diag(𝑈1, 𝑈2), where 𝑈𝑖,
𝑖 = 1, 2, is an 𝑟𝑖 × 𝑟𝑖 upper triangular Toeplitz matrix;
otherwise, 𝑈 has form
If 𝜆1 = 𝜆2,
(50)
(51)
[︃
0
𝑈21
]︃
𝑈12
0
(52)
𝑈 = diag(𝑈1, 𝑈2) +
7
where 𝑈𝑖 is an 𝑟𝑖 × 𝑟𝑖 upper triangular Toeplitz matrix
and 𝑈12 and 𝑈21 are extended upper triangular Toeplitz
matrices as in Theorem 12.4.1 in [13]. Thus, all Jordan
bases of 𝐴 can be obtained by transforming eigenvector
matrix 𝑉 as 𝑋 = 𝑉 𝑈.
A corresponding theorem to Theorem 16 is presented
to characterize Jordan equivalent classes when the Jordan
form consists of two Jordan blocks. The reader is di-
rected to Sections 10.2 and 10.3 in [15] for more details.
The following definitions are needed. Denote 𝑝×𝑝 upper
triangular Toeplitz matrices 𝑇𝑟2 (𝑏1, . . . , 𝑏𝑟2) of form
⎡⎢⎢⎢⎢⎢⎢⎢⎣
𝑏1
0
...
0
0
···
...
...
···
···
𝑏2
𝑏1
...
0
0
𝑏𝑝−1
𝑏𝑝−2
...
𝑏1
0
𝑏𝑝
𝑏𝑝−1
...
𝑏2
𝑏1
𝑇𝑝 (𝑏1, . . . , 𝑏𝑝) =
⎡⎢⎢⎢⎢⎢⎢⎢⎢⎢⎣
0
0
...
0
0
0
0
...
0
0
···
···
and define 𝑞×𝑞 upper triangular matrix for some 𝑞 > 𝑝
𝑅𝑞 (𝑏1, . . . , 𝑏𝑝; 𝐹 ) =
𝑏1 ···
𝑏1
0
...
...
𝑏𝑝 𝑓11 𝑓12 ··· 𝑓1,𝑞−𝑝−1
···
𝑏𝑝 𝑓22 ··· 𝑓2,𝑞−𝑝−1
...
𝑓1,𝑞−𝑝
𝑓2,𝑞−𝑝
...
···
···
...
0
0
...
𝑏𝑝
𝑏𝑝−1
...
𝑏1
0
𝑓𝑞−𝑝,𝑞−𝑝
...
𝑏𝑝
...
𝑏2
𝑏1
where 𝐹 = [𝑓𝑖𝑗] is a (𝑞 − 𝑝) × (𝑞 − 𝑝) upper triangular
matrix and 𝑏𝑖 ∈ C, 𝑖 = 1, . . . , 𝑝. The theorems are
presented below.
Theorem 17. Consider 𝐴 = diag(𝐴1, 𝐴2) where each
matrix 𝐴𝑖, 𝑖 = 1, 2, is upper triangular with diag-
onal elements 𝜆𝑖 and nonzero elements on the first
= 𝜆2. Then 𝒢(𝐴) is Jordan
off-diagonal. Let 𝜆1
equivalent to the graph with adjacency matrix 𝐽 =
diag(𝐽𝑟1(𝜆1), 𝐽𝑟2 (𝜆2)) where 𝐽𝑟𝑖(𝜆𝑖) is the 𝑟𝑖 × 𝑟𝑖
Jordan block for eigenvalue 𝜆𝑖.
Proof: By Theorem 16, 𝒢(𝐴𝑖) and 𝒢(𝐽𝑟𝑖(𝜆𝑖)) are
Jordan equivalent for 𝑖 = 1, 2 and 𝐴𝑖 upper triangular
with nonzero elements on the first off-diagonal. There-
fore, the Jordan normal forms of 𝐽 and 𝐴 are the same.
Moreover, the set of irreducible subspaces of 𝐽 is the
union of the irreducible subspaces of [𝐽1 0]𝑇 and [0 𝐽2]𝑇 ,
which are the same as the irreducible subspaces of
[𝐴1 0]𝑇 and [0 𝐴2]𝑇 , respectively. Therefore, J𝐴 = J𝐽,
so 𝒢(𝐴) and 𝒢(𝐽) are Jordan equivalent.
Theorem 18. Consider 𝐴 = diag(𝐴1, 𝐴2) where 𝐴1 =
𝑈𝑟1 (𝜆, 𝑏1, . . . , 𝑏𝑟2 , 𝐹 ) and 𝐴2 = 𝑇𝑟2(𝜆, 𝑏1, . . . , 𝑏𝑟2),
𝑟1 ≥ 𝑟2. Then 𝒢(𝐴) is Jordan equivalent to the graph
with adjacency matrix 𝐽 = diag(𝐽𝑟1 (𝜆), 𝐽𝑟2 (𝜆)) where
⎤⎥⎥⎥⎥⎥⎥⎥⎦ , (53)
⎤⎥⎥⎥⎥⎥⎥⎥⎥⎥⎦ (54)
𝐽𝑟𝑖(𝜆) is the 𝑟𝑖 × 𝑟𝑖 Jordan block for eigenvalue 𝜆.
Proof: By Lemma 10.3.3 in [15], 𝐴 with structure
as described in the theorem have the same invariant
subspaces as 𝐽 = diag(𝐽𝑟1(𝜆), 𝐽𝑟2(𝜆)). Therefore, 𝐴
and 𝐽 have the same Jordan normal form and Jordan
subspaces and so are Jordan equivalent.
Theorems 17 and 18 demonstrate two types of Jordan
equivalences that arise from block diagonal matrices
with submatrices of form (53) and (54). These theo-
rems imply that computing the GFT (1) over the block
diagonal matrices can be simplified to computing the
transform over the adjacency matrix of a union of
directed chain graphs. That is, the canonical basis can
be chosen for 𝑉 without loss of generality.
As for the case of unicellular transformations, it is
possible to pick bases of J1 and J2 that do not form
a Jordan basis of 𝐴. Any two such choices of bases are
related by Theorem 6. Concretely, if 𝑉 is the eigenvector
matrix of 𝐴 and 𝑋 is the matrix corresponding to another
choice of basis, then Theorem 6 states that a transfor-
mation matrix 𝑌 can be found such that 𝑋 = 𝑉 𝑌 ,
where 𝑌 is partitioned as 𝑌 = diag(𝑌1, 𝑌2) with full-
rank submatrices 𝑌𝑖 ∈ C𝑟𝑖×𝑟𝑖, 𝑖 = 1, 2.
G. Multiple Jordan Blocks
This section briefly describes a special case of Jordan
equivalence classes whose graphs have adjacency matri-
ces 𝐴 ∈ C𝑁×𝑁 with 𝑝 Jordan blocks, 1 < 𝑝 < 𝑁.
Consider matrix 𝐴 with Jordan normal form 𝐽 com-
prised of 𝑝 Jordan blocks and eigenvalues 𝜆1, . . . , 𝜆𝑘.
By Theorem 10.2.1 in [15], there exists an upper tri-
angular 𝐴 with Jordan decomposition 𝐴 = 𝑉 𝐽𝑉 −1
such that 𝒢(𝐴) ∈ G𝐽
𝐽. Note that the elements in the
𝐽 of 𝒢(𝐽) are useful since
Jordan equivalence class G𝐽
signals over a graph in this class can be computed
with respect
to the canonical basis with eigenvector
matrix 𝑉 = 𝐼. Theorem 19 characterizes the possible
eigenvector matrices 𝑉 such that 𝐴 = 𝑉 𝐽𝑉 −1 allows
𝒢(𝐴) ∈ G𝐽
𝐽.
Theorem 19. Let 𝐴 = 𝑉 𝐽𝑉 −1 be the Jordan decom-
position of 𝐴 ∈ C𝑁×𝑁 and 𝒢(𝐴) ∈ G𝐽
𝐽. Then 𝑉 must
be an invertible block diagonal matrix.
Proof: Consider 𝒢(𝐽) with eigenvector matrix 𝐼.
By Theorem 6, 𝒢(𝐴) ∈ G𝐽
𝐽 implies
𝑉 = 𝐼𝑌 = 𝑌
(55)
where 𝑌 is an invertible block diagonal matrix.
The structure of 𝑉 given in Theorem 19 allows a char-
acterization of graphs in the Jordan equivalence class G𝐽
𝐽
with the dual basis of 𝑉 as proved in Theorem 20.
8
Theorem 20. Let 𝒢(𝐴) ∈ G𝐽
𝐽, where 𝐴 has Jordan
decomposition 𝐴 = 𝑉 𝐽𝑉 −1 and 𝑊 = 𝑉 −𝐻 is the dual
basis of 𝑉 . If 𝐴𝑊 = 𝑊 𝐽𝑊 −1, then 𝒢(𝐴𝑊 ) ∈ G𝐽
𝐽.
𝑖
Proof: By Theorem 19, 𝑉 is block diagonal with
invertible submatrices 𝑉𝑖. Thus, 𝑊 = 𝑉 −𝐻 is block
diagonal with submatrices 𝑊𝑖 = 𝑉 −𝐻
. By Theorem 6,
𝑊 is an appropriate eigenvector matrix such that, for
𝐴𝑊 = 𝑊 𝐽𝑊 −1, 𝒢(𝐴𝑊 ) ∈ G𝐽
𝐽.
Relation to graph topology. Certain types of ma-
trices have Jordan forms that can be deduced from
their graph structure. For example, [24] and [25] relate
the Jordan blocks of certain adjacency matrices to a
decomposition of their graph structures into unions of
cycles and chains. Applications where such graphs are
in use would allow a practitioner to determine the Jordan
equivalence classes (assuming the eigenvalues can be
computed) and potentially choose a different matrix in
the class for which the GFT can be computed more
easily. Sections IV-E and IV-G show that working with
unicellular matrices and matrices in Jordan normal form
permits the choice of the canonical basis. In this way,
for matrices with Jordan blocks of size greater than
one, finding a spanning set for each Jordan subspace
may be more efficient than attempting to compute the
Jordan chains. Nevertheless, relying on graph topology
is not always possible. Such an example was presented
in Section IV-E with adjacency matrix (49).
Relation to algebraic signal processing. The emer-
gence of Jordan equivalence from the graph Fourier
transform (1) is related to algebraic signal processing and
the signal model (𝒜,ℳ, Φ), where 𝒜 is a signal algebra
corresponding to the filter space, ℳ is a module of 𝒜
corresponding to the signal space, and Φ : 𝑉 → ℳ
is a bijective linear mapping that generalizes the 𝑧-
transform [26], [27]. We emphasize that the GFT (1) is
tied to a basis. This is most readily seen by considering
diagonal adjacency matrix 𝐴 = 𝜆𝐼, where any basis that
spans C𝑁 defines the eigenvectors (the Jordan subspaces
and spectral components) of a graph signal;
is,
a matrix, even a diagonalizable matrix, may not have
distinct spectral components. Similarly, the signal model
(𝒜,ℳ, Φ) requires a choice of basis for module (signal
space) ℳ in order to define the frequency response
(irreducible representation) of a signal [26]. On the
other hand, this section demonstrated the equivalence of
the GFT (1) over graphs in Jordan equivalence classes,
which implies an equivalence of certain bases. This
observation suggests the concept of equivalent signal
models in the algebraic signal processing framework.
Just as working with graphs that are Jordan equivalent
to those with adjacency matrices in Jordan normal form
simplifies GFT computation, we expect similar classes
of equivalent signal models for which the canonical basis
that
9
can be chosen without loss of generality.
Jordan equivalence classes show that the GFT (1)
permits degrees of freedom in graph topologies. This
has ramifications for total variation-based orderings of
the spectral components, as discussed in the next section.
V. FREQUENCY ORDERING OF SPECTRAL
COMPONENTS
This section defines a mapping of spectral components
to the real line to achieve an ordering of the spectral
components. This ordering can be used to distinguish
generalized low and high frequencies as in [4]. An upper
bound for a total-variation based mapping of a spectral
component (Jordan subspace) is derived and generalized
to Jordan equivalence classes.
The graph total variation of a graph signal 𝑠 ∈ C𝑁
is defined as [4]
TV𝐺 (𝑠) = ‖𝑠 − 𝐴𝑠‖1 .
(56)
Matrix 𝐴 can be replaced by 𝐴norm = 1𝜆max 𝐴 when
the maximum eigenvalue satisfies 𝜆max > 0.
Equation (56) can be generalized to define the total
variation of the Jordan subspaces of the graph shift 𝐴
as described in [12]. Choose a Jordan basis of 𝐴 so
that 𝑉 is the eigenvector matrix of 𝐴, i.e., 𝐴 = 𝑉 𝐽𝑉 −1,
where 𝐽 is the Jordan form of 𝐴. Partition 𝑉 into
𝑁 × 𝑟𝑖𝑗 submatrices 𝑉𝑖𝑗 whose columns are a Jordan
chain of (and thus span) the 𝑗th Jordan subspace J𝑖𝑗
of eigenvalue 𝜆𝑖, 𝑖 = 1, . . . , 𝑘 ≤ 𝑁, 𝑗 = 1, . . . , 𝑔𝑖. Then
the (graph) total variation of 𝑉𝑖𝑗 is defined as [12]
TV𝐺 (𝑉𝑖𝑗) = ‖𝑉𝑖𝑗 − 𝐴𝑉𝑖𝑗‖1 ,
(57)
where ‖·‖1 represents the induced L1 matrix norm (equal
to the maximum absolute column sum).
is invariant
is,
Theorem 21 shows that the graph total variation of
to a relabeling of
a spectral component
the graph nodes;
the total variations of the
that
spectral components for graphs in the same isomorphic
equivalence class as defined in Section III are equal.
Theorem 21. Let 𝐴, 𝐵 ∈ C𝑁×𝑁 and 𝒢(𝐵) ∈ G𝐼
𝐴, i.e.,
𝒢(𝐵) is isomorphic to 𝒢(𝐴). Let 𝑉𝐴,𝑖𝑗 ∈ C𝑁×𝑟𝑖𝑗 be
a Jordan chain of matrix 𝐴 and 𝑉𝐵,𝑖𝑗 ∈ C𝑁×𝑟𝑖𝑗
the
corresponding Jordan chain of 𝐵. Then
TV𝐺(𝑉𝐴,𝑖𝑗) = TV𝐺(𝑉𝐵,𝑖𝑗).
(58)
Proof: Since 𝒢(𝐴) and 𝒢(𝐵) are isomorphic, there
exists a permutation matrix 𝑇 such that 𝐵 = 𝑇 𝐴𝑇 −1
and the eigenvector matrices 𝑉𝐴 and 𝑉𝐵 of 𝐴 and 𝐵,
respectively, are related by 𝑉𝐵 = 𝑇 𝑉𝐴. Thus, the Jordan
chains are related by 𝑉𝐵,𝑖𝑗 = 𝑇 𝑉𝐴,𝑖𝑗. By (57),
TV (𝑉𝐵) = ‖𝑉𝐵,𝑖𝑗 − 𝐵𝑉𝐵,𝑖𝑗‖1
=⃦⃦𝑇 𝑉𝐴,𝑖𝑗 −(︀𝑇 𝐴𝑇 −1)︀ 𝑇 𝑉𝐴,𝑖𝑗
⃦⃦1
(59)
(60)
= ‖𝑇 𝑉𝐴,𝑖𝑗 − 𝑇 𝐴𝑉𝐴,𝑖𝑗‖1
= ‖𝑇 (𝑉𝐴,𝑖𝑗 − 𝐴𝑉𝐴,𝑖𝑗)‖1
= ‖𝑉𝐴,𝑖𝑗 − 𝐴𝑉𝐴,𝑖𝑗‖1
= TV (𝑉𝐴) ,
(61)
(62)
(63)
(64)
where (63) holds because the maximum absolute column
sum of a matrix is invariant to a permutation on its rows.
Theorem 21 shows that the graph total variation is
invariant to a node relabeling, which implies that an
ordering of the total variations of the frequency com-
ponents is also invariant.
Reference [12] demonstrates that each eigenvector
submatrix corresponding to a Jordan chain can be nor-
malized. This is stated as a property below:
Property 22. The eigenvector matrix 𝑉 of adjacency
matrix 𝐴 ∈ C𝑁×𝑁 can be chosen so that each Jordan
chain represented by the eigenvector submatrix 𝑉𝑖𝑗 ∈
C𝑁×𝑟𝑖𝑗 satisfies ‖𝑉𝑖𝑗‖1 = 1; i.e., ‖𝑉 ‖1 = 1 without
loss of generality.
)︀⃦⃦1
It is assumed that the eigenvector matrices are normal-
ized as in Property 22 for the remainder of the section.
Furthermore, [12] shows that (57) can be written as
TV𝐺 (𝑉𝑖𝑗) =⃦⃦𝑉𝑖𝑗
(︀𝐼𝑟𝑖𝑗 − 𝐽𝑖𝑗
𝑖=2,...,𝑟𝑖𝑗
= max
(65)
{1 − 𝜆‖𝑣1‖1 ,‖(1 − 𝜆) 𝑣𝑖 − 𝑣𝑖−1‖1} .
(66)
and establishes the upper bound for the total variation
of spectral components as
TV𝐺(𝑉𝑖𝑗) ≤ 1 − 𝜆𝑖 + 1.
(67)
Equations (65), (66), and (67) characterize the (graph)
total variation of a Jordan chain by quantifying the
change in a set of vectors that spans the Jordan sub-
space J𝑖𝑗 when they are transformed by the graph
shift 𝐴. These equations, however, are dependent on
a particular choice of Jordan basis. As seen in Sec-
tions IV-E, IV-F, and IV-G, defective graph shift matrices
belong to Jordan equivalence classes that contain more
than one element, and the GFT of a signal is the same
over any graph in a given Jordan equivalence class.
Furthermore, for any two graphs 𝒢(𝐴),𝒢(𝐵) ∈ G𝐽
𝐴, 𝐴
and 𝐵 have Jordan bases for the same Jordan subspaces,
but the respective total variations of the spanning Jordan
chains as computed by (65) may be different. Since it
is desirable to be able to order spectral components in a
manner that is invariant to the choice of Jordan basis, we
derive here a definition of the total variation of a spectral
component of 𝐴 in relation to the Jordan equivalence
class G𝐽
𝐴.
Class total variation. Let 𝒢(𝐵) be an element in
𝐴 where 𝐵 has Jordan de-
Jordan equivalence class G𝐽
10
composition 𝐵 = 𝑉 𝐽𝑉 −1. Let the columns of eigen-
vector submatrix 𝑉𝑖𝑗 span the Jordan subspace J𝑖𝑗 of
𝐴. Then the class total variation of spectral component
J𝑖𝑗 is defined as the supremum of the graph total
variation of 𝑉𝑖𝑗 over the Jordan equivalence class (for
all 𝒢(𝐵) ∈ G𝐽
𝐴):
TVG𝐽
𝐴
(J𝑖𝑗) =
TV𝐺 (𝑉𝑖𝑗) .
(68)
sup
𝐴
𝒢(𝐵)∈G𝐽
𝐵=𝑉 𝐽𝑉 −1
‖𝑉𝑖𝑗‖1=1
span{𝑉𝑖𝑗}=J𝑖𝑗
Theorem 23. Let 𝐴, 𝐵 ∈ C𝑁×𝑁 and 𝒢(𝐵) ∈ G𝐼
𝐴. Let
𝑉𝐴 and 𝑉𝐵 be the respective eigenvector matrices with
Jordan subspaces J𝐴,𝑖𝑗 = span{𝑉𝐴,𝑖𝑗} and J𝐵,𝑖𝑗 =
span{𝑉𝐵,𝑖𝑗} spanned by the 𝑗th Jordan chain of eigen-
value 𝜆𝑖. Then TVG𝐽
(J𝐴,𝑖𝑗) = TVG𝐽
(J𝐵,𝑖𝑗).
Proof: Let 𝑉 *
sponding to 𝒢(𝐴*) ∈ G𝐽
variation of Jordan subspace J𝐴,𝑖𝑗; i.e.,
𝐴 denote the eigenvector matrix corre-
𝐴 that maximizes the class total
𝐵
𝐴
𝐴
(J𝐴,𝑖𝑗) = TV𝐺
TVG𝐽
Similarly, let 𝑉 *
sponding to 𝒢(𝐵*) ∈ G𝐽
variation of Jordan subspace J𝐵,𝑖𝑗, or
(69)
𝐵 denote the eigenvector matrix corre-
𝐵 that maximizes the class total
𝐴,𝑖𝑗
(︀𝑉 *
(︀𝑉 *
)︀ .
)︀ .
𝐵
𝐵,𝑖𝑗
TVG𝐽
(J𝐵,𝑖𝑗) = TV𝐺
(70)
Since 𝒢(𝐴) and 𝒢(𝐵) are isomorphic, Theorem 10
implies that there exists 𝒢(𝐵′) ∈ G𝐽
𝐵 such that 𝐵′ =
𝑇 𝐴*𝑇 −1; i.e., 𝑉𝐵′ = 𝑇 𝑉 *
𝐴 where 𝑉𝐵′ is an eigenvector
matrix of 𝐵′. By the class total variation definition (68),
TV𝐺(𝑉𝐵′,𝑖𝑗) ≤ TV𝐺(𝑉 *
𝐵,𝑖𝑗). Applying Theorem 21 to
isomorphic graphs 𝒢(𝐴*) and 𝒢(𝐵′) yields
)︀ = TV𝐺 (𝑉𝐵′,𝑖𝑗) ≤ TV𝐺
(︀𝑉 *
𝐴,𝑖𝑗
(71)
TV𝐺
Similarly, by Theorem 10, there exists 𝒢(𝐴′) ∈ G𝐽
such that 𝐵* = 𝑇 𝐴′𝑇 −1, or 𝑉 *
𝐵 = 𝑇 𝑉𝐴′ where 𝑉𝐴′ is
an eigenvector matrix of 𝐴′. Apply (68) and Theorem 21
again to obtain
𝐵,𝑖𝑗
(︀𝑉 *
)︀ .
𝐴
(︀𝑉 *
(︀𝑉 *
𝐵,𝑖𝑗
)︀ ≥ TV𝐺 (𝑉𝐴′,𝑖𝑗) = TV𝐺
)︀, or
Equations (71) and (72) imply that TV𝐺
TV𝐺
TV𝐺
𝐴,𝑖𝑗
(︀𝑉 *
)︀ .
(︀𝑉 *
𝐵,𝑖𝑗
𝐴,𝑖𝑗
(72)
)︀ =
TVG𝐽
𝐴
(J𝐴,𝑖𝑗) = TVG𝐽
𝐵
(J𝐵,𝑖𝑗) .
(73)
Theorem 23 shows that the class total variation of
a spectral component
to a relabeling of
the nodes. This is significant because it means that an
ordering of the spectral components by their class total
variations is invariant to node labels.
is invariant
Next, the significance of the class total variation (68)
is illustrated for adjacency matrices with diagonal Jordan
form, one Jordan block, and multiple Jordan blocks.
Diagonal Jordan Form. Section IV-D shows that a
graph shift 𝐴 with diagonal Jordan form is the single
element of its Jordan equivalence class G𝐽
𝐴. This yields
the following result.
Theorem 24. Let 𝒢(𝐴) have diagonalizable adjacency
matrix 𝐴 with eigenvectors 𝑣1, . . . , 𝑣𝑁 . Then the class
the spectral component J𝑖, 𝑖 =
total variation of
1, . . . , 𝑁, of 𝐴 satisfies (for ‖𝑣𝑖‖ = 1)
(J𝑖) = 1 − 𝜆𝑖 .
(74)
TVG𝐽
𝐴
Proof: Each spectral component J𝑖 of 𝐴 is the
span of eigenvector 𝑣𝑖 corresponding to eigenvalue 𝜆𝑖.
The class total variation of J𝑖 is then
TVG𝐽
𝐴
(J𝑖) =
sup
TV𝐺 (𝑣𝑖)
𝐴
𝒢(𝐵)∈G𝐽
𝐵=𝑉 𝐽𝑉 −1
span{𝑣𝑖}=J𝑖
‖𝑣𝑖‖1=1
= TV𝐺 (𝑣𝑖)
= ‖𝑣𝑖 − 𝐵𝑣𝑖‖1
= ‖𝑣𝑖 − 𝜆𝑖𝑣𝑖‖1
= 1 − 𝜆𝑖‖𝑣𝑖‖1
= 1 − 𝜆𝑖 .
(75)
(76)
(77)
(78)
(79)
(80)
(by (57))
Theorem 24 is consistent with the total variation result
for diagonalizable graph shifts in [4]. Next, the class total
variation for defective graph shifts is characterized.
One Jordan block. Consider the graph shift 𝐴 with
a single spectral component J = C𝑁 and Jordan
form 𝐽 = 𝐽(𝜆). The next theorem proves that the total
variation of J attains the upper bound (67).
Theorem 25. Consider unicellular 𝐴 ∈ C𝑁×𝑁 with
Jordan normal form 𝐽 = 𝐽(𝜆). Then the class total
variation of G𝐽
𝐴 is 1 − 𝜆 + 1.
Proof: Graph 𝒢(𝐴) is Jordan equivalent to 𝒢(𝐽)
since 𝐴 is unicellular. Therefore, the GFT of a graph
signal can be computed over 𝒢(𝐽) by choosing the
the canonical vectors (𝑉 = 𝐼) as the Jordan basis, as
shown in (48). By (66), the maximum of 1 − 𝜆‖𝑣1‖1
and ‖1 − 𝜆 𝑣𝑖 − 𝑣𝑖−1‖1 for 𝑖 = 2, . . . , 𝑁 needs to be
computed. The former term equals 1 − 𝜆 since 𝑣1 is
the first canonical vector. The latter term has form
‖ 1 − 𝜆 𝑣𝑖 − 𝑣𝑖−1‖1 =
(81)
(82)
Since 1 − 𝜆 + 1 > 1 − 𝜆, TV𝐺(𝐼) = 1 + 1 − 𝜆.
Therefore, (67) holds with equality, so the class total
= 1 + 1 − 𝜆 ,
⃦⃦⃦⃦⃦⃦
⎡⎣ 0−1
0
1 − 𝜆
⎤⎦⃦⃦⃦⃦⃦⃦1
variation of J = C𝑁 satisfies
TVG𝐽
𝐴
(J𝑖) =
sup
𝐴
𝒢(𝐵)∈G𝐽
𝐵=𝑉 𝐽𝑉 −1
‖𝑉 ‖1=1
span{𝑉 }=J =C𝑁
TV𝐺 (𝑉 )
(83)
= TV𝐺 (𝐼)
= 1 − 𝜆 + 1.
(84)
(85)
Multiple Jordan blocks. Theorem 26 proves that
𝐽 where 𝐽 is
graphs in the Jordan equivalence class G𝐽
in Jordan normal form attains the bound (67).
Theorem 26. Let 𝒢(𝐴) ∈ G𝐽
𝐽 where 𝐽 is the Jordan
normal form of 𝐴 and J𝐴 = {J𝑖𝑗}𝑖𝑗 for 𝑖 = 1, . . . , 𝑘,
𝑗 = 1, . . . , 𝑔𝑖. Then the class total variation of J𝑖𝑗 is
1 − 𝜆𝑖 + 1.
Proof: Since 𝒢(𝐴) ∈ G𝐽
𝐽, the GFT can be com-
puted over 𝒢(𝐽) with eigenvector matrix 𝑉 = 𝐼. Then
each 𝑉𝑖𝑗 = 𝐼𝑟𝑖𝑗 that spans J𝑖𝑗 has total variation
TV𝐺 (𝐼𝑖𝑗) =⃦⃦𝐼𝑟𝑖𝑗 − 𝐽𝑖𝑗
⃦⃦1
= 1 − 𝜆𝑖 + 1
Therefore,
TVG𝐽
𝐽
(J𝑖) =
sup
span{𝑉𝑖𝑗}=J𝑖𝑗
𝐴
𝒢(𝐵)∈G𝐽
𝐵=𝑉 𝐽𝑉 −1
‖𝑉𝑖𝑗‖1=1
(︀𝐼𝑟𝑖𝑗
)︀
= TV𝐺
= 1 − 𝜆𝑖 + 1.
(by (67)).
(86)
(87)
TV𝐺 (𝑉𝑖𝑗)
(88)
(89)
(90)
Although the total variation upper bound may not be
attained for a general graph shift 𝐴, choosing this bound
as the ordering function provides a useful standard for
comparing spectral components for all graphs in a Jordan
equivalence class. The ordering proceeds as follows:
1) Order the eigenvalues 𝜆1, . . . , 𝜆𝑘 of 𝐴 by increasing
1 − 𝜆𝑖 + 1 (from low to high total variation).
2) Permute submatrices 𝑉𝑖𝑗 of eigenvector matrix 𝑉
to respect the total variation ordering.
Since the ordering is based on the class total vari-
ation (68), it is invariant to the particular choice of
Jordan basis for each nontrivial Jordan subspace. Such
an ordering can be used to study low frequency and high
frequency behaviors of graph signals; see also [4].
VI. EXAMPLE
This section illustrates the Jordan equivalence classes
of Section IV and total variation ordering of Section V
11
These results show that the degrees of freedom in the
Jordan chain recurrence (5) can lead to fluctuating total
variations of the spectral components.
We compare these results to the upper bound (67),
which is 𝜆 − 1 + 1 = 2 for 𝜆 = 0. Our results
show that this upper bound is achieved with 𝑉3 (95).
In this way, the class total variation (68) of the Jordan
subspace J2(0) = span{𝑉3} corresponding to Jordan
block 𝐽2(0) is
TVG𝐽
𝐴
(J2(0)) = 2.
(99)
This example shows that using the class total variation
or the upper bound (67) as a method of ranking the
spectral components by (57) removes the dependency
on the choice of generalized eigenvector.
We modify 𝑉3 (95) by varying the sixth component 𝑣6
(and fourth component 𝑣4 as 𝑣4 = 1 − 1.5𝑣6) of the
generalized eigenvector in the second column. It can be
verified by (5) that such vectors are valid generalized
eigenvectors. The results are shown in Figure 3 with
the total variation plotted versus the value of 𝑣6. The
data point at 𝑣6 = 0 corresponds to the total variation
of 𝑉1 (93). The figure illustrates that the total variation
15.
has a global maximum at 𝑣6 = 59
Jordan equivalence. It can be shown that the images
of the projection matrices (12) corresponding to 𝑉1(93),
𝑉2 (94), and 𝑉3 (95) are nonidentical;
is, each
choice of Jordan basis corresponds to a different Jordan
equivalence class.
Consider an alternate basis for J2(0) = span{𝑉3}
that
provided by the columns of matrix
.
3
(100)
0 1 2 0 0 0
2 1 0 0 1 5
0 0 0 −1 1
does not equal 𝐴. Nevertheless, the oblique projection
of 𝑉 that do not correspond to J2(0) in addition to the
If ︀𝑉 is defined as the matrix consisting of the columns
columns of ︀𝑉1 (100), it can be shown that ︀𝐴 = ︀𝑉 𝐽︀𝑉 −1
matrices (12) corresponding to ︀𝑉1 (100) and 𝑉3 (95)
and graphs 𝒢(𝐴) and 𝒢(︀𝐴) are in the same Jordan
The total variation of ︀𝑉1 with respect to ︀𝐴 is
Thus, ︀𝑉1 does not achieve the class total variation (99).
onto the Jordan subspaces are identical;
the
GFT (1) is equivalent for both eigenvector matrices,
equivalence class corresponding to J2(0) = span{𝑉3}.
⃦⃦⃦︀𝑉1 − ︀𝐴︀𝑉1
TV𝐺(︀𝑉1) =
⃦⃦⃦1
= 1.452.
(101)
that
is,
[︂1 0 0 3
︀𝑉1 =
]︂𝑇
VII. LIMITATIONS
The Jordan equivalence classes discussed in Sec-
tion IV show that there are degrees of freedom over
graph topologies with defective adjacency matrices that
Fig. 3: Total variation of the spectral component of 𝐽2(0)
for the example in Section VI with respect to generalized
eigenvector component 𝑣6. The data points (gray squares) show
total variation 1.181 when 𝑣6 = 0 and 2 when 𝑣6 = 59
15 .
on the 10 × 10 matrix example
⎡⎢⎢⎢⎢⎢⎢⎢⎢⎣
𝐴 =
0 0 0 −2 0 −3 0 0 0 0
0 0 0 0 1 0 0
0 0 0
0 0 0 2 0 0 0
5 0 0
0 6 0 0 0 0 0
0 0 0
0 0 0
0 0 0 0 1 0 0
0 0 0 0 0 −2 0
0 0 0
0 0 0
0 0 0 0 0 0 3
0 0 0
0 0 0 0 4 0 0
0 1 0
0 0 0 0 0 0 0
0 0 −1 0 0 0 0 0 0 0
⎤⎥⎥⎥⎥⎥⎥⎥⎥⎦ .
(91)
𝐽 = diag(︀4, 3
The Jordan normal form of 𝐴 is
√−6𝜔, 3
√−6𝜔2, 3
√−6, 𝐽4(0), 𝐽2(0))︀ ,
(92)
where 𝜔 = exp(2𝜋𝑗/3) and 𝐽4(0) and 𝐽2(0) are 4 × 4
and 2 × 2 Jordan blocks corresponding to eigenvalue
zero, respectively.
Total variation. Possible Jordan chains for the Jordan
block 𝐽2(0) and their respective total variations (57)
are computed. By applying the recurrence equation (5)
with 𝜆 = 0, the following eigenvector submatrices with
columns that span potential Jordan subspaces corre-
sponding to 𝐽2(0) in (92) are obtained:
0 0 0 1 1
2
[︃−2 0 0 3 0 −2 5 0 0 0
[︃−2 0 0
[︃−2 0 0
0 0 0 1 5
3
0 −2 5 0 0 0
1 0 0 1 5
3
0 −2 5 0 0 0
15 0 0 1 5
3
0 0 0 − 49
3
0 0 0 − 1
]︃𝑇
]︃𝑇
]︃𝑇
1
2
1
2
59
10
2
3
,
𝑉1 =
𝑉2 =
𝑉3 =
(93)
(94)
.
(95)
,
Normalizing these matrices by their L1 norm as spec-
ified by Property 22 in Section V, the resulting total
variations (57) are
TV𝐺(𝑉1) = 1.181
TV𝐺(𝑉2) = 1.389
TV𝐺(𝑉3) = 2.
(96)
(97)
(98)
12
v602468101214161820Total Variation1.21.41.61.82X: 3.933Y: 2X: 0Y: 1.181enable the GFT to be equivalent over multiple graph
structures. It may be sufficient to find these classes by
traversing the graph once (with total time complexity
𝑂(𝑉 + 𝐸)) and then determining the Jordan normal
form of the underlying graph because of the acyclic and
cyclic structures within the graph; see [24], [25] and
more details in Section IV.
On the other hand, not all graphs have structures
that readily reveal their Jordan equivalence classes. For
example, arbitrary directed, sparse matrices such as
road networks or social networks may have complex
substructures that require a full eigendecomposition be-
fore determining the corresponding Jordan equivalence
class. Inexact eigendecomposition methods are useful
to approximate the GFT in this case. In particular, the
authors explore such a method in [21].
VIII. CONCLUSION
This paper characterizes two equivalence classes of
graph structures that arise from the spectral projector-
based GFT formulation of [12]. Firstly,
isomorphic
equivalence classes ensure that the GFT is equivalent
with respect
to a given node ordering. This allows
the exploitation of banded matrix structures that permit
efficient eigendecomposition methods. Secondly, Jordan
equivalence classes show that the GFT can be identical
over graphs of different
topologies. Certain types of
graphs have Jordan equivalence classes that can be
determined by a single traversal over the graph structure,
which means that the eigenvector matrix can potentially
be chosen for a simpler matrix topology. For more
general graphs for which the equivalence class cannot
be easily determined, inexact methods such as those
proposed in [21] provide a means to computing the
spectral projector-based GFT.
Lastly, a total variation-based ordering of the Jordan
subspaces is proposed. Since the total variation is depen-
dent on the particular choice of Jordan basis, we propose
a class variation-based ordering that is defined by the
Jordan equivalence class of the graph.
REFERENCES
[1] A. Sandryhaila and J.M.F. Moura, "Discrete signal processing
on graphs," IEEE Transactions on Signal Processing, vol. 61,
no. 7, pp. 1644 -- 1656, Apr. 2013.
[2] D. Shuman, S.K. Narang, P. Frossard, A. Ortega, and P. Van-
dergheynst, "The emerging field of signal processing on graphs:
Extending high-dimensional data analysis to networks and other
irregular domains," IEEE Signal Processing Magazine, vol. 30,
no. 3, pp. 83 -- 98, Apr. 2013.
[3] A. Sandryhaila and J.M.F. Moura, "Big data analysis with signal
processing on graphs: Representation and processing of massive
IEEE Signal Processing
data sets with irregular structure,"
Magazine, vol. 31, no. 5, pp. 80 -- 90, Aug. 2014.
[4] A. Sandryhaila and J.M.F. Moura, "Discrete signal processing
on graphs: Frequency analysis," IEEE Transactions on Signal
Processing, vol. 62, no. 12, pp. 3042 -- 3054, Jun. 2014.
13
[5] O. Teke and P.P. Vaidyanathan, "Extending classical multirate
signal processing theory to graphs -- Part I: Fundamentals," IEEE
Transactions on Signal Processing, vol. 65, no. 2, pp. 409 -- 422,
Jan. 2017.
[6] X. Zhu and M. Rabbat, "Approximating signals supported on
graphs," in Proceedings of the 37th IEEE International Con-
ference on Acoustics, Speech, and Signal Processing (ICASSP),
Mar. 2012, pp. 3921 -- 3924.
[7] S.K. Narang and A. Ortega, "Perfect reconstruction two-channel
wavelet filter banks for graph structured data," IEEE Transactions
on Signal Processing, vol. 60, no. 6, pp. 2786 -- 2799, Jun. 2012.
[8] O. Teke and P.P. Vaidyanathan, "Extending classical multirate
signal processing theory to graphs -- Part II: M-channel filter
banks," IEEE Transactions on Signal Processing, vol. 65, no. 2,
pp. 423 -- 437, Jan. 2017.
[9] A.G. Marques, S. Segarra, G. Leus, and A. Ribeiro, "Sampling
IEEE
of graph signals with successive local aggregations,"
Transactions on Signal Processing, vol. 64, no. 7, pp. 1832 -- 1843,
Apr. 2016.
[10] S. Segarra, A. Marques, G. Leus, and A. Ribeiro, "Reconstruction
of graph signals through percolation from seeding nodes," IEEE
Transactions on Signal Processing, vol. 64, no. 16, pp. 4363 --
4378, Aug. 2016.
[11] S. Chen, A. Sandryhaila, J.M.F. Moura, and J. Kovacevi´c, "Signal
recovery on graphs: Variation minimization," IEEE Transactions
on Signal Processing, vol. 63, no. 17, pp. 4609 -- 4624, 2015.
[12] J.A. Deri and J.M.F. Moura,
"Spectral projector-based graph
Fourier transforms," submitted, Nov. 2016.
[13] P. Lancaster and M. Tismenetsky, The Theory of Matrices, New
York, NY, USA: Academic, 2nd edition, 1985.
[14] R.A. Horn and C.R. Johnson, Matrix Analysis, Cambridge, U.K.:
Cambridge Univ. Press, 2012.
[15] I. Gohberg, P. Lancaster, and L. Rodman, Invariant Subspaces
of Matrices with Applications, vol. 51, Philadelphia, PA, USA:
SIAM, 2006.
[16] G.H. Golub and C.F. Van Loan, Matrix Computations, Baltimore,
MD, USA: JHU Press, 4 edition, 2013.
[17] M. Vetterli, J. Kovacevi´c, and V.K. Goyal, Foundations of Signal
Processing, Cambridge, U.K.: Cambridge Univ. Press, 2014.
[18] D.M. Cvetkovi´c, M. Doob, I. Gutman, and A. Torgašev, Recent
results in the theory of graph spectra, vol. 36 of Annals of
Discrete Mathematics, North-Holland, 1988.
[19] E. Cuthill and J. McKee, "Reducing the bandwidth of sparse
symmetric matrices," in Proceedings of the 1969 24th National
Conference, New York, NY, USA, 1969, ACM '69, pp. 157 -- 172.
[20] Hwansoo Han and Chau-Wen Tseng, "A comparison of locality
transformations for irregular codes," in International Workshop
on Languages, Compilers, and Run-Time Systems for Scalable
Computers. Springer, 2000, pp. 70 -- 84.
[22] C. Candan,
[21] J.A. Deri and J.M.F. Moura, "Agile inexact methods for spectral
projector-based graph Fourier transforms," submitted, Nov. 2016.
"On the eigenstructure of DFT matrices [DSP
education]," IEEE Signal Processing Magazine, vol. 28, no. 2,
pp. 105 -- 108, 2011.
[23] L.K. Jørgensen, "On normally regular digraphs," Tech. Rep.
R 94-2023, Univ. of Aalborg, Institute for Electronic Systems,
Dept. of Mathematics and Computer Science, 1994.
[24] D.A. Cardon and B. Tuckfield, "The Jordan canonical form for a
class of zero -- one matrices," Linear Algebra and its Applications,
vol. 435, no. 11, pp. 2942 -- 2954, 2011.
[25] H. Nina, R.L. Soto, and D.M. Cardoso, "The Jordan canonical
form for a class of weighted directed graphs," Linear Algebra
and its Applications, vol. 438, no. 1, pp. 261 -- 268, 2013.
[26] M. Püschel and J.M.F. Moura,
"Algebraic signal processing
theory: Foundation and 1-D time," IEEE Transactions on Signal
Processing, vol. 56, no. 8, pp. 3572 -- 3585, Aug. 2008.
[27] M. Püschel and J.M.F. Moura,
"Algebraic signal processing
theory: 1-D space," IEEE Transactions on Signal Processing,
vol. 56, no. 8, pp. 3586 -- 3599, Aug. 2008.
|
1510.08505 | 2 | 1510 | 2015-11-12T03:23:41 | Ghost Cities Analysis Based on Positioning Data in China | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | Real estate projects are developed excessively in China in this decade. Many new housing districts are built, but they far exceed the actual demand in some cities. These cities with a high housing vacancy rate are called ghost cities. The real situation of vacant housing areas in China has not been studied in previous research. This study, using Baidu positioning data, presents the spatial distribution of the vacant housing areas in China and classifies cities with a large vacant housing area as cities or tourism sites. To the best of our knowledge, it is the first time that we detected and analyzed the ghost cities in China at such fine scale. To understand the human dynamic in ghost cities, we select one city and one tourism sites as cases to analyze the features of human dynamics. This study illustrates the capability of big data in sensing our cities objectively and comprehensively. | cs.SI | cs | “Ghost
Cities”
Analysis
Based
on
Positioning
Data
in
China
Guanghua
Chia,
b,
Yu
Liub,
Zhengwei
Wua,
Haishan
Wua*
a
Big
Data
Lab,
Baidu
Research,
Baidu
Inc.,
Beijing
100085,
China
b
Institute
of
Remote
Sensing
and
Geographic
Information
Systems,
Peking
University,
Beijing
100871,
China
Abstract:
Real
estate
projects
are
developed
excessively
in
China
in
this
decade.
Many
new
housing
districts
are
built,
but
they
far
exceed
the
actual
demand
in
some
cities.
These
cities
with
a
high
housing
vacancy
rate
are
called
"ghost
cities.”
The
real
situation
of
vacant
housing
areas
in
China
has
not
been
studied
in
previous
research.
This
study,
using
Baidu
positioning
data,
presents
the
spatial
distribution
of
the
vacant
housing
areas
in
China
and
classifies
cities
with
a
large
vacant
housing
area
as
cities
or
tourism
sites.
To
the
best
of
our
knowledge,
it
is
the
first
time
that
we
detected
and
analyzed
the
“ghost
cities”
in
China
at
such
fine
scale.
To
understand
the
human
dynamic
in
“ghost
cities”,
we
select
one
city
and
one
tourism
sites
as
cases
to
analyze
the
features
of
human
dynamics.
This
study
illustrates
the
capability
of
big
data
in
sensing
our
cities
objectively
and
comprehensively.
Keywords:
Ghost
City,
Real
Estate,
Big
Data,
Vacant
Housing
Area
Introduction
China
has
experienced
fast
development
during
the
past
decade.
From
1984
to
2010,
the
urban
built-‐up
area
has
increased
from
8,842
km2
to
41,768
km2
(Nie
&
Liu,
2013).
The
urbanization
speed
is
unprecedented
in
human
history
with
so
many
buildings
constructed
in
such
a
short
time
(Xue
&
Tsai,
2013).
The
amount
of
concrete
used
in
China
in
the
three
years
(2011-‐2013)
is
more
than
that
used
in
U.S.
in
the
20th
century
(McCarthy,
2014).
The
fast
urbanization
of
China
has
contributed
to
the
high
housing
vacancy
rate
in
some
cities.
Many
new
housing
districts
are
built,
but
they
far
exceed
the
actual
demand.
In
these
cities,
the
population
density
is
very
low,
and
the
residential
districts
are
dark
with
few
lights
at
night.
Therefore,
they
are
called
“ghost
cities.”
In
Shepard’s
book
“Ghost
Cities
of
China”
(Shepard,
2015),
he
defined
“ghost
city”
as
“a
new
development
that
is
running
at
severe
undercapacity,
a
place
with
drastically
fewer
people
and
businesses
than
there
is
available
space
for.”
The
“Ghost
city”
phenomenon
has
attracted
much
attention
in
recent
years.
Shepard
(2015)
said
that
“China
is
the
world's
most
populated
country
without
a
doubt
has
the
world's
largest
number
of
empty
homes.”
Chinese
Premier
Keqiang
Li
warned
the
risk
of
rapid
urbanization
and
said
that
“Urbanization
is
not
about
building
big,
sprawling
cities.
We
should
aim
to
avoid
the
typical
urban
malady
where
skyscrapers
coexist
with
shanty
towns”
(Ryan,
2013).
Zuoji
Dong,
head
of
the
Ministry
of
Land
and
Resources
planning
bureau,
said
"new
guidance
issued
by
the
ministry
would
allow
for
strict
controls
on
new
urban
development.
Unless
a
city's
population
is
too
dense
or
expansion
is
deemed
necessary
to
cope
with
natural
disasters,
new
urban
districts
will
not
be
permitted"
(Rafagopalan,
2014).
Media
have
reported
many
cities
in
China
with
a
large
vacant
housing
area.
However,
sometimes
their
opinions
on
a
“ghost
city”
are
completely
opposite.
For
example,
media
* Corresponding
author.
E-‐mail
address:
[email protected]
(G.
Chi),
[email protected]
(Y.
Liu),
[email protected]
(Z.
Wu),
[email protected]
(H.
Wu).
have
covered
the
serious
situation
of
high
vacant
housing
areas
in
Rushan
City,
while
other
media
have
reported
that
Rushan
City
has
added
residents
and
already
expelled
the
term
of
“ghost.”
These
reports,
obtained
by
taking
pictures
or
counting
the
number
of
homes
with
lights
at
night,
have
been
criticized
for
their
low
credibility.
Moreover,
the
internal
causes
of
"ghost
cities"
may
differ
a
lot
despite
the
same
outward
appearance.
Tourism
in
China
has
developed
quickly
recently.
To
satisfy
the
demand
of
tourists,
cities
with
attractive
tourism
resources
have
built
many
houses
for
vacation.
During
the
popular
tourism
seasons,
many
people
will
live
in
the
vacant
housing
areas.
While
in
other
seasons,
the
population
is
small.
Therefore,
it
is
unfair
to
treat
tourism
sites
and
cities
as
equal.
This
raised
the
question:
what
is
the
real
situation
of
“ghost
cities”
in
China?
The
vacant
housing
rate
is
one
of
the
most
important
indicators
to
evaluate
the
health
of
real
estate
in
each
city.
This
indicator
can
also
be
used
to
discover
the
“ghost
cities.”
The
Chinese
government
has
not
published
any
data
related
to
the
vacant
housing
rate.
The
National
Bureau
of
Statistics
of
China
mentioned
that
the
difficulty
of
calculating
vacant
housing
rates
lies
in
the
difficulty
to
define
a
standard
of
the
status
of
vacant
houses
and
length
of
vacancy
(House
China,
2015).
Besides
using
the
vacant
housing
rate
to
define
a
ghost
city,
there
are
two
other
definitions.
The
Ministry
of
Housing
and
Urban-‐Rural
Development
of
China
gives
a
standard
that
1
km2
area
holds
10
thousand
people.
Based
on
this
standard,
the
rank
of
“ghost
cities”
in
2014
defines
that
cities
with
people
smaller
than
half
of
the
standard
are
“ghost
cities”
(Su,
2014).
The
first
three
rank
cities
based
on
this
indicator
are
Erenhot,
Qinzhou
and
Lahsa.
Chen
(2014)
proposed
an
alternative
equation
to
calculate
the
indicator
of
“ghost
cities”:
(S-‐D)
/
n,
where
S
is
the
supply
of
new
houses
in
the
following
five
years.
D
is
the
demand
of
new
houses
in
the
following
five
years.
n
is
the
number
of
houses
at
present.
This
equation
reflects
the
proportion
of
current
houses
that
should
be
removed
to
satisfy
the
balance
between
supply
and
demand.
The
first
three
rank
cities
based
on
this
indicator
are
Ordos,
Yingkou
and
Ulanqab.
It
is
difficult
to
obtain
real
estate
data
and
population
data
with
high
spatial
resolution.
This
impedes
the
understanding
of
“ghost
cities.”
Su
and
Chen’s
studies
cannot
pinpoint
the
exact
location
of
vacant
housing
areas
and
can
only
reflect
the
average
level
of
“ghost”
in
each
city,
not
to
mention
finding
out
the
reasons
behind
“ghost
cities.”
These
results
would
be
questionable
since
they
are
aggregated
results.
Fortunately,
the
emergence
of
big
data
brings
opportunities
to
objectively
understand
the
status
of
or
even
reasons
behind
"ghost
cities.”
Widely-‐applied
location-‐aware
devices
(LAD),
such
as
mobile
phones
and
GPS
receivers,
generate
large
volumes
of
individual
trajectory
data
with
long
time
scale
and
high
resolution.
These
features
make
it
suitable
for
population
analysis.
For
example,
Kang
et
al.
(2012)
used
mobile
phone
data
to
estimate
the
population
distribution
in
China.
It
provides
a
mean
for
observing
urban
dynamics
from
a
micro
perspective,
including
the
human
migration
and
interaction
between
regions.
According
to
the
social
sensing
concept
proposed
by
Liu
et
al.
(2015),
we
can
use
the
data
generated
by
each
individual
to
sense
our
living
environment.
Whether
the
so
called
“ghost
cities”
have
a
high
housing
vacancy
has
always
been
disputed
for
the
lack
of
data
to
verify.
In
this
study,
we
use
the
location
data
of
mobile
APPs
and
point
of
interest
data
of
residential
area
of
Baidu,
the
largest
search
engine
company
in
China.
The
basic
idea
of
discovering
vacant
housing
areas
is
that
only
a
small
population
lives
in
these
areas.
To
the
best
of
our
knowledge,
it
is
the
first
time
that
we
detected
and
analyzed
the
“ghost
cities”
in
China
at
such
fine
scale.
We
should
note
that
we
do
not
attempt
to
give
the
rank
of
which
areas
have
the
most
“ghost
cities.”
Instead,
we
want
to
find
out
the
exact
location
of
vacant
housing
areas
at
the
moment.
Even
if
the
vacant
housing
area
is
very
large
in
a
city,
it
does
not
mean
that
this
city
will
still
have
a
high
vacant
ratio
in
the
future.
Like
the
Zhengdong
new
district,
it
has
been
developing
quickly
in
the
past
few
years
and
attracted
a
large
number
of
people.
Methodology
Data
Description
This
study
uses
two
types
of
datasets,
including
Baidu
positioning
data
and
points
of
interests
(POI).
The
attributes
of
Baidu
positioning
data
cover
anonymized
user
id,
latitude,
longitude,
and
time.
There
are
several
billions
of
positioning
points
each
day.
The
time
span
is
from
9/8/2014
to
4/22/2015.
Its
features
of
national
spatial
scale,
long
temporal
scale,
and
high
precision
make
our
study
of
“ghost
cities”
representative
and
reliable.
We
admit
that
this
dataset
is
biased.
It
cannot
represent
all
the
demography
of
a
city,
such
as
very
young
and
very
old
people,
or
those
who
do
not
use
smart
mobile
phones.
However,
it
can
represent
the
situation
of
the
population
density,
which
is
the
focus
of
our
study.
The
POI
data
include
POI
name,
latitude,
longitude,
and
category.
The
specific
processing
of
POI
data
would
be
discussed
in
the
next
section.
Discovering
and
Classifying
Vacant
Housing
Area
The
basic
idea
of
discovering
vacant
housing
areas
is
that
only
a
small
population
lives
in
a
residential
area.
Therefore,
we
should
calculate
two
variables
based
on
our
data:
users’
home
location
and
location
of
residential
areas.
We
first
adopted
DBSCAN
algorithm
to
calculate
the
home
location
of
each
user
based
on
their
positioning
points
from
9:00
am
to
6:00
pm.
DBSCAN
is
a
widely
used
density
based
clustering
algorithm
and
is
more
computationally
efficient
than
other
methods
like
MeanShift
(Ester
et
al.,
1996).
It
stands
for
density-‐based
spatial
clustering
of
applications
with
noise.
It
is
based
on
the
idea
of
density
reachability:
many
points
that
are
closely
located
will
be
grouped
together
as
clusters,
while
points
that
are
located
in
low-‐density
regions
are
considered
as
noise.
This
algorithm
requires
two
parameters:
the
minimum
distance
ε
to
decide
whether
two
points
are
reachable
and
the
minimum
number
of
points
minPts
to
form
a
cluster.
A
point
P1
is
reachable
to
point
Pn
if
there
are
a
sequence
of
points
P1,
P2,
…,
Pn
where
each
Pi
is
within
ε
to
Pi-‐1.
After
experimenting
with
different
values
of
these
two
parameters,
we
set
ε as
200
meters
and
minPts
as
2.
We
choose
the
center
of
the
cluster
with
largest
number
of
points
as
the
user's
location.
Cases
exist
where
users
move
their
houses
during
the
period
of
our
data.
But
they
only
cover
a
low
proportion
and
will
not
affect
our
results.
We
keep
both
locations
of
these
users
in
our
study.
Our
study
attempts
to
discover
the
spatial
distribution
of
vacant
housing
areas.
Therefore,
it
is
crucial
to
know
exactly
the
location
of
residential
areas.
We
use
POI
data
from
Baidu
Map,
which
has
high
reliability
and
quality.
We
select
POIs
whose
categories
are
residential
areas
and
villas.
We
delete
the
residential
area
POIs
that
are
within
one
kilometer
of
villas
since
population
density
near
villas
is
very
low.
Moreover,
it
is
possible
that
the
residential
area
is
built
recently
and
few
people
live
there.
We
will
remove
these
situations
based
on
the
population
living
there
and
the
detail
will
be
discussed
blow.
The
difficulties
of
discovering
vacant
housing
areas
based
on
positioning
points
and
POI
lie
in
two
aspects.
First,
the
residential
area
POI
is
a
point,
while
residential
district
is
an
area.
The
residential
area
POI
is
not
always
located
in
the
center
of
the
residential
area.
Second,
the
areas
of
residential
districts
are
not
the
same.
In
other
words,
they
have
different
length
and
width.
If
we
have
the
data
of
residential
area
polygons
instead
of
points,
we
can
directly
count
the
exact
population
in
each
residential
area.
Such
data
may
be
available
in
some
residential
areas
of
few
big
cities.
But
the
vacant
housing
area
is
usually
small
in
these
big
cities.
While
for
those
cities
with
a
large
vacant
housing
area,
we
do
not
have
such
data.
To
solve
this
problem,
we
use
100
m
*
100
m
grids
as
the
analysis
units
in
this
study.
As
shown
in
Figure
1,
for
each
residential
area
POI
(Point
A),
we
select
5
*
5
grids
with
the
residential
area
POI
in
the
center
grid.
We
select
the
top
six
most
populated
grids.
If
the
sum
is
less
than
300,
we
define
this
residential
area
as
the
vacant
housing
area.
The
reason
why
we
choose
the
threshold
as
300
will
be
explained
blow.
We
also
set
the
sum
more
than
60
to
exclude
those
recently
built
residential
areas
where
few
people
live.
Fig
1.
Illustration
of
the
study
area
based
on
residential
area
POIs
(This
figure
shows
the
study
area
generated
based
on
residential
area
POI
A.
Residential
area
points
B
and
C
will
be
discussed
blow.
Each
grid
is
100m
*
100m.
)
The
edge
length
of
a
residential
area
is
between
300
meter
and
500
meter
on
average.
The
location
of
a
residential
area
POI
is
not
always
located
in
the
center
of
a
residential
area.
It
may
be
located
at
the
edge
of
a
residential
area
(Point
B
in
Fig.
1).
At
the
extreme
situation,
it
may
be
located
at
the
vertex
of
a
residential
area
(Point
C
in
Fig.
1).
In
this
extreme
case,
only
a
fourth
part
of
the
500
m
*
500
m
grids
would
cover
the
residential
area.
The
other
three
fourths
part
of
the
area
may
be
covered
with
non-‐residential
area.
If
we
summarize
all
the
population
in
the
500
m
*
500
m
grids,
results
in
cases
like
point
B
and
C
in
Figure
1
would
be
distorted.
This
is
the
reason
why
we
only
select
the
first
six
grids
with
the
most
population.
The
average
floor
area
ratio
is
1
(An,
2015)
and
the
average
living
area
is
30
m2
in
China
(Ruan,
2010).
Thus
a
100
m
*
100
m
grid
can
hold
333
people.
The
dataset
we
used
in
this
study
contains
770
million
users.
China
has
a
population
of
1.36
billion.
Thus
on
average
a
100
m
*
100
m
grid
can
hold
188
Baidu
users.
We
define
that
a
grid
with
people
smaller
than
one
fourth
of
the
standard
is
a
vacant
housing
area.
If
the
six
grids
with
most
population
holds
people
smaller
than
300,
this
area
is
defined
as
the
vacant
housing
area.
We
should
note
that
the
first
six
grids
with
most
population
may
be
located
in
the
nearby
residential
area
of
the
study
residential
area
rather
than
itself.
We
admit
that
our
results
fail
to
discover
some
vacant
housing
areas.
However,
the
vacant
housing
areas
are
normally
located
spatially
aggregated.
Even
though
one
residential
area
is
lost,
its
nearby
residential
areas
will
be
discovered.
Therefore,
this
special
case
will
not
cause
too
many
noises
to
the
final
result.
To
classify
those
tourism
sites
with
a
large
vacant
housing
area,
we
use
the
positioning
data
in
China’s
National
Day
(9/29/2014
and
10/2/2014),
New
Year’s
Day
(12/30/2014
and
1/2/2015),
and
International
Workers’
Day
(4/29/2015
and
5/2/2015)
in
the
vacant
housing
areas.
By
comparing
the
change
of
population
before
and
after
the
holiday,
we
can
judge
whether
the
vacant
housing
area
is
for
tourism.
If
the
population
in
a
vacant
housing
area
increases
at
the
holiday,
it
is
defined
as
a
tourism
area.
Results
We
count
the
total
number
of
all
vacant
housing
areas
POI
in
each
county.
We
also
count
the
area
of
all
vacant
housing
areas
and
find
that
the
result
is
similar.
We
select
20
cities
with
a
large
vacant
housing
area.
The
result
is
shown
in
Figure
2,
which
can
be
browsed
interactively
on
the
website
(http://bdl.baidu.com/ghostcity/).
This
study
presents
the
spatial
distribution
of
vacant
housing
areas.
We
should
note
that
the
rank
of
these
20
cities
is
not
the
real
rank
of
our
result,
but
they
all
rank
at
the
top
of
50.
The
reason
why
we
did
not
show
the
real
rank
is
that
the
rank
is
very
sensitive
and
it
may
affect
the
sale
of
real
estate.
Fig.
2
20
cities
with
a
large
vacant
housing
area
From
a
macro
view,
cities
with
a
large
vacant
housing
area
are
mostly
second-‐tier
and
third-‐
tier
cities.
The
tiers
of
cities
in
China
are
determined
by
their
income,
education,
transportation,
technology
and
other
indicators.
East
provinces
have
more
proportion
of
cities
with
vacant
housing
areas.
From
the
micro
view,
vacant
housing
areas
are
mostly
distributed
in
the
city’s
periphery
or
new
towns
of
cities.
As
shown
in
Figure
3A,
the
500
m
*
500
m
grid
covers
the
residential
area.
Even
though
it
does
not
cover
the
other
part
of
the
residential
area,
the
result
has
already
shown
that
the
residential
area
is
a
vacant
housing
area.
Figure
3B
shows
two
residential
areas
of
vacant
housing
area.
The
location
of
the
left-‐
bottom
residential
area
in
Figure
3B
is
similar
with
the
point
C
in
Figure
1.
Our
algorithm
exactly
finds
this
area.
We
present
the
spatial
distribution
of
the
first
8
cities
plus
Dongling
district
(Liaoning
Province)
with
a
large
vacant
housing
area
in
Figure
4.
All
these
9
cities
have
been
reported
by
media
for
their
large
vacant
housing
area.
In
figure
4A,
the
vacant
housing
areas
distribute
tightly
and
are
close
to
the
sea
in
Rushan.
Media
has
reported
that
Rushan
built
too
many
see-‐view
houses
for
vacation.
The
vacant
housing
rate
is
high
except
in
summer.
Figure
4B
and
C
show
the
spatial
distribution
of
vacant
housing
area
in
Ordos,
which
is
well
known
as
“ghost
city.”
The
vacant
housing
areas
mostly
are
located
in
the
city’s
periphery.
Figure
4H
is
located
near
the
figure
4C
and
has
the
similar
situation
of
vacant
housing
rate.
Figure
4D
is
Binhai
New
Area,
which
was
called
“the
third
increasing
point
of
economy
in
China”
ever.
However,
this
new
area
exists
many
half-‐baked
buildings.
For
Rugao,
Dongying,
and
Xinghua
(Fig.
4E,
F,
G),
we
can
find
the
support
from
the
Internet
or
media
that
these
cities
contain
a
large
vacant
housing
area.
Media
reported
that
Shenyang
National
Games
Village
has
become
“ghost
town”
(Miller
&
Chow,
2015).
Our
result
confirmed
this
report
and
showed
the
real
spatial
distribution
of
vacant
housing
areas
(Fig.
4I).
We
also
detect
whether
these
cities
are
tourism
sites.
We
find
that
many
tourism
sites
are
located
near
the
sea,
such
as
Rushan
(Shandong
Province),
Rugao
(Jiangsu
Province),
Xinghua
(Jiangsu
Province),
Wenchang
(Hainan
Province),
Donggang
(Shandong
province),
and
Qionghai
(Hainan
Province).
The
other
two
cities
like
Zhuji
(Zhejiang
Province)
and
Xiaoshan
(Zhejiang
Province)
also
have
popular
tourism
resource.
A
B
Fig.
3
Illustration
of
residential
areas
of
vacant
housing
area
we
discovered.
(A.
One
residential
area
B.
Two
residential
areas)
Fig.
4
The
vacant
housing
areas
in
9
cities.
(Regions
overlaid
by
red
grids
are
inferred
as
vacant
housing
areas.
A.
Rushan
B.
Dongsheng
C.
Ordos
D.
Binhai
E.
Rugao
F.
Dongying
G.
Xinghua
H.
Yijinhuoluoqi
I.
Dongling)
Case
Study
To
find
out
the
real
situation
of
cities
with
a
large
vacant
housing
area
and
discover
the
reason
why
they
are
called
“ghost
cities”,
we
select
Rushan
(a
tourist
site)
and
Kangbashi
(a
city)
as
cases
to
analyze
the
population
change,
home-‐work
separation,
and
human
migration.
These
two
cities
are
well-‐known
for
their
large
vacant
housing
area.
Kangbashi
is
a
new
district,
which
once
belonged
to
Dongsheng.
The
Ordos
government
moved
from
Dongsheng
to
Kangbashi
in
2006
to
increase
its
development
speed.
Kangbashi
contains
abundant
coal
and
other
natural
resources,
which
boosts
its
economic
development
quickly.
As
it
became
richer,
the
government
ambitiously
starts
building
a
new
city.
Much
capital
was
invested
in
residential
real
estate,
which
became
an
investment
instead
of
living
demand.
The
housing
vacancy
ratio
is
very
high.
For
more
information,
please
refer
to
(Woodworth,
2015).
Rushan
is
located
in
Shandong
province.
It
has
a
21
kilometer
coastline
with
a
beautiful
sea
view,
which
is
called
Rushan
Yintan,
meaning
silver
beach.
Most
of
the
residential
real
estate
are
seasonal
houses.
Many
people
bought
a
house
there
for
vacation.
Every
summer
a
large
number
of
tourists
will
visit
there,
while
after
the
summer
the
population
will
decrease
dramatically.
For
these
two
different
types
of
cities
with
a
large
vacant
housing
area,
we
attempt
to
find
out
the
features
of
human
dynamic.
Population
Dynamics
We
count
the
population
in
these
two
cities
each
day
and
show
the
result
in
Figure
5.
Because
the
number
of
Baidu
users
is
increasing,
we
should
remove
this
effect
to
show
the
real
population
change
in
each
city.
In
this
study,
we
use
the
population
in
each
city
divided
by
the
total
number
of
people
in
China
as
the
indicator
of
population.
Then
we
normalize
the
value
of
these
two
cities.
Kangbashi
has
a
clear
weekly
cycle
of
population
change,
while
Rushan
is
not.
This
is
related
to
their
functional
difference.
Rushan
is
a
tourist
site
and
people
there
do
not
have
a
work
related
cycle.
In
National
Day,
Rushan
has
the
largest
population
and
the
number
is
much
more
than
other
days
in
whole
year.
The
population
in
Kangbashi
decreases,
while
in
Rushan
the
number
increase.
In
China’s
Spring
New
Year,
Kangbashi
has
the
fewest
number
of
people.
The
population
in
Rushan
is
fewest
at
the
beginning
of
February
instead
of
Chinese
Spring
New
Year.
In
New
Year,
the
population
in
Rushan
does
not
increase
significantly
because
the
weather
is
cold
and
few
people
visit
there
for
vacation.
In
Qingming
Festival
(2015/4/5),
the
population
in
Kangbashi
decreases
significantly,
while
the
number
in
Rushan
increases
slightly.
Rushan
is
a
tourist
site
while
Kangbashi
is
not,
which
leads
to
the
difference
of
population
change
in
Rushan
and
Kangbashi.
From
September
in
2014
to
April
in
2015,
the
number
of
people
in
these
two
large
vacant
housing
area
did
not
increase,
showing
no
trend
of
attracting
more
people.
However,
we
should
note
that
Rome
wasn’t
built
in
a
day;
neither
are
new
cities
in
China.
Constructing
a
new
city
is
easy,
while
making
it
functional
needs
a
long-‐term
endeavor
(Shepard,
2015).
Fig.
5
Population
change
of
Kangbashi
and
Rushan
Figure
6
shows
the
population
change
in
each
hour
of
one
week
from
2015/3/23
to
2015/3/29.
Similar
to
the
results
from
mobile
phone
data
(Kang
et
al.,
2012),
the
largest
population
appears
at
12:00pm
and
20:00pm.
The
two
peaks
are
almost
similar
in
Kangbashi,
while
in
Rushan
the
peak
in
20:00pm
is
higher.
In
weekends,
the
population
in
Kangbashi
decreases,
while
the
number
in
Rushan
keeps
stable.
Fig.
6
Population
change
in
each
hour
of
a
week
Home-‐work
Analysis
Home-‐work
separation
is
a
normal
phenomenon
in
modern
city
life,
which
means
that
a
considerable
distance
exists
between
a
person’s
home
and
work
place
(Poston,
1972).
This
study
attempts
to
understand
the
home-‐work
separation
situation
in
“ghost
cities.”
The
results
can
help
government
learn
about
the
real
situation
and
make
reasonable
planning.
We
used
DBSCAN
algorithm
to
calculate
the
work
place
based
on
a
person’s
positioning
points
from
9:00am
to
6:00pm.
We
adopted
the
algorithm
designed
by
Eric
Fischer
(Fischer,
2013)
to
visualize
the
spatial
distribution
of
people’s
home
and
work
places.
This
algorithm
assigns
lightness
value
to
each
pixel
based
on
the
number
of
points
in
the
pixel.
As
shown
in
Figure
7a,
most
of
work
places
are
located
closely
to
Kangbashi
government
seats.
In
Rushan
Yintan,
the
number
of
home
and
work
places
is
really
small
compared
with
Rushan
downtown
since
it
is
a
tourist
area
(Fig.
7b).
Rushan
government
realized
the
situation
of
few
work
opportunities
in
Rushan
Yintan
and
began
to
attract
companies
to
increase
the
employment.
We
statistic
the
proportion
of
people
who
live
or
work
in
Kangbashi
and
Rushan
Yintan
(Table
1).
It
is
a
common
sense
that
the
proportion
of
people
who
work
and
live
in
the
same
city
contains
most
part
(Shi
et
al.,
2015).
Administrative
boundaries
effectively
impact
the
human
migration
across
the
territory
(Chi
et
al.,
2014).
The
number
of
people
who
live
in
Dongsheng
and
work
in
Kangbashi
is
twice
as
many
as
that
who
live
in
Kangbashi
and
work
in
Dongsheng.
Dongsheng
has
a
perfect
infrastructure.
People
prefer
to
live
in
Dongsheng
and
work
job
opportunities
and
improve
its
infrastructure.
A
new
city
being
beautiful
and
modern
cannot
attract
people
migrate
there.
Jobs,
industry,
entertainment,
health
and
education
systems
should
be
functioning
before
many
people
migrate
to
a
new
city
(Shepard,
2015).
These
two
cases
reflect
that
vacant
housing
areas
usually
contain
limited
job
opportunities,
and
basic
infrastructure
should
be
improved
to
satisfy
people’s
need.
illustrates
that
Kangbashi
should
in
Kangbashi.
This
increase
more
a.
Kangbashi
b.
Rushan
(The
white
polygon
is
Rushan
Yintan
where
sea
view
houses
are
located.)
Fig.
7
The
spatial
distribution
of
home
and
work
place
(Red
points
denote
home.
Blue
points
are
work
places.)
Table.
1
Home
and
work
place
distribution
in
Rushan
and
Kangbashi
Home
Kangbashi
Work
place
Kangbashi
Kangbashi
Proportion
(%)
24.9
Kangbashi
Dongsheng
8.2
Home
Rushan
Yintan
Rushan
Yintan
Rushan
Work
place
Proportion
(%)
Rushan
Yintan
33.5
Rushan
downtown
8.1
Kangbashi
Other
24.7
Dongsheng
Kangbashi
17.6
Other
Kangbashi
24.5
Rushan
Yintan
Rushan
downtown
Other
Other
18.3
Rushan
Yintan
16.6
Rushan
Yintan
23.5
Human
Migration
Human
migration
reflects
the
urban
vitality.
The
tempo-‐spatial
trajectory
is
composed
of
a
person’s
positioning
points
ordered
by
time.
In
this
section,
we
attempt
to
discover
the
city
interaction
caused
by
human
migration.
If
a
user
moves
from
city
a
to
city
b,
we
suppose
that
city
a
and
b
has
an
interaction.
When
calculating
human
migration,
it
is
unreasonable
to
define
that
a
user
has
a
migration
between
two
cities
as
long
as
he/she
exposed
in
two
different
cities
because
he/she
may
pass
by
cities
between
the
origin
city
and
the
destination
city
in
space.
For
example,
as
shown
in
table
2,
a
person
moves
from
Guangzhou
to
Shanghai
at
Nov.
1st,
2014.
He/she
passed
by
Changsha,
Nanchang,
and
Hangzhou
before
arriving
at
Shanghai.
It
is
wrong
to
suppose
that
Guangzhou
and
Changshan
has
an
interaction.
In
calculating
migration,
the
difficult
part
is
how
to
remove
pass-‐by
cities.
The
frequency
of
positioning
points
exposed
by
people
is
not
stable.
The
number
of
positioning
points
exposed
in
pass-‐by
cities
may
be
larger
than
that
exposed
in
destinations.
These
situations
make
the
calculation
of
human
migration
more
difficult.
Meanwhile,
the
large
amount
of
our
dataset
requires
that
the
algorithm
has
a
high
efficiency.
This
study
supposes
that
the
migration
will
last
for
more
than
one
day.
We
ignore
the
cases
that
people
return
back
in
one
day.
We
define
a
person’s
trajectory
as
{t1,
city1},{t2,
city2},
{t3,
city3},…,{tn,
cityn}.
tn
is
the
time
of
the
nth
positioning
point.
cityn
is
the
city
of
the
nth
positioning
point.
We
first
select
the
city
of
the
first
positioning
point
each
day
as
people’s
location.
If
cityn
is
same
to
cityn-‐1,
then
we
merge
these
two
records.
Otherwise,
we
suppose
that
the
person
migrates
from
cityn-‐1
to
cityn.
Table
2
A
sample
of
a
person’s
trajectory
Province
Guangdong
Hunan
Jiangxi
Zhejiang
Shanghai
Shanghai
Shanghai
City
Guangzhou
Changsha
Nanchang
Hangzhou
Shanghai
Shanghai
Shanghai
Time
2014/11/1
10:30:01
2014/11/1
12:50:01
2014/11/1
14:52:01
2014/11/1
18:30:01
2014/11/1
19:31:01
2014/11/2
09:21:01
2014/11/3
08:13:01
Figure
8
shows
the
result
of
human
migration
in
these
two
cities.
It
makes
sense
that
the
number
of
people
inflow
or
outflow
increases
during
holidays.
The
migration
population
increases
as
the
number
of
Baidu
users
increases.
Compared
to
Kangbashi
in
National
Day,
a
peak
of
population
inflow
appears
firstly
in
Rushan,
then
followed
by
a
peak
of
population
outflow.
While
in
Kangbashi,
the
peak
of
population
inflow
and
outflow
appears
almost
at
the
same
time.
In
these
two
“ghost
cities”,
we
did
not
discover
the
increase
of
net
population
flow,
meaning
that
they
did
not
attract
more
people
live
there.
Besides
the
change
of
migration
population,
we
also
know
the
interaction
intensity
between
two
cities.
In
other
words,
we
know
the
proportion
of
migration
people
from/to
each
city.
Figure
9
shows
the
location
and
proportion
of
migration
population
in
National
Day.
The
source
and
sink
with
largest
flow
in
Kangbashi
and
Rushan
are
Yulin
and
Weihai,
respectively.
a.
Kangbashi
b.
Rushan
Fig.
8
Population
change
of
migration
a.
Kangbashi
b.
Rushan
Fig.
9
Human
migration
in
National
Day
Conclusion
The
fast
urbanization
of
China
has
contributed
so
many
housing
built
that
has
outstripped
the
actual
demand.
Whether
the
so
called
“ghost
cities”
reported
by
media
have
a
high
housing
vacancy
has
always
been
disputed
for
the
lack
of
data
to
verify.
As
far
as
we
are
concerned,
we
use
big
data
to
analyze
the
real
situation
of
“ghost
cities”
in
China
for
the
first
time.
The
features
of
national
spatial
scale,
long
temporal
scale,
and
high
precision
of
Baidu
big
data
make
the
study
of
“ghost
cities”
representative
and
reliable.
Instead
of
just
counting
the
number
of
homes
with
light
at
night
in
certain
residential
areas
as
the
indicator
of
“ghost
city”,
Baidu
big
data
can
count
the
population
precisely,
in
real
time,
and
in
national
scale.
A
limitation
of
the
data
is
that
it
cannot
represent
the
real
demography
of
a
city
because
not
all
people
are
Baidu
users.
However,
with
the
ubiquity
of
smart
mobile
phones,
Baidu
users
occupy
the
most
proportion
of
the
whole
population.
Moreover,
the
quality
of
residential
area
POIs
will
affect
our
results.
We
make
a
series
of
processing
to
make
sure
that
the
POIs
are
reliable.
Baidu
big
data
bring
opportunities
to
objectively
understand
the
status
or
even
reasons
of
"ghost
cities.”
Based
on
the
Baidu
positioning
data
and
residential
area
POI
data,
we
design
an
algorithm
to
discover
the
vacant
housing
areas.
The
results
discovered
the
specific
location
of
vacant
housing
areas,
which
can
help
government
make
smarter
and
more
reasonable
decisions.
Our
results
provide
the
real
situation
of
the
so
called
“ghost
cities”
in
China.
Cities
with
a
large
vacant
housing
area
are
mostly
second-‐tier
and
third-‐tier
cities.
The
tiers
of
cities
in
China
are
determined
by
their
income,
education,
transportation,
technology
and
other
indicators.
East
provinces
have
more
proportion
of
cities
with
vacant
housing
areas.
We
also
distinguish
the
tourism
sites
and
cities.
Based
on
Baidu
positioning
data,
we
discover
the
human
dynamic
in
cities
with
a
large
vacant
housing
area
to
help
better
understand
the
situation
in
“ghost
cities.”
Acknowledgements
The
authors
would
like
to
thank
their
colleagues
in
Big
Data
Lab
Zhengxue
Li
for
his
data
visualization
in
web
design,
Wei
Jia
for
his
help
in
pre-‐processing
the
data,
and
Geography
Librarian
Amanda
Hornby
at
University
of
Washington
for
her
insightful
comments.
References
X.
Rank
of
ghost
12.
cities
in
2014.
(2014).
October
An,
B.
(2015).
Thinking
rationally
about
the
management
of
vacant
housing
rate.
May
9.
<http://comments.caijing.com.cn/20150506/3876126.shtml>.
Chen,
Q.
(2014).
Will
the
number
of
ghost
cities
continue
increasing?
November
10.
<http://www.zhihu.com/question/26193868/answer/33116107>.
Chen,
Y.
(2015).
Chasing
ghosts:
Where
is
China's
next
wave
of
empty's
new
towns?
February
13.
<
http://multimedia.scmp.com/china-‐ghost-‐towns/>.
Chi,
G.,
Thill,
J.
C.,
Tong,
D.,
Shi,
L.,
&
Liu,
Y.
(2014).
Uncovering
regional
characteristics
from
mobile
phone
data:
A
network
science
approach.
Papers
in
Regional
Science.
Su,
<http://house.ifeng.com/detail/2014_10_12/50060123_0.shtml>.
Ester,
M.,
Kriegel,
H.
P.,
Sander,
J.,
&
Xu,
X.
(1996).
A
density-‐based
algorithm
for
discovering
clusters
in
large
spatial
databases
with
noise.
Kdd,
96(34),
226-‐231.
Fischer,
E.
(2013).
Mapping
Millions
of
Dots.
<https://www.mapbox.com/blog/mapping-‐
millions-‐of-‐dots/>.
House
China.
(2015).
China's
vacant
housing
rate
is
20%.
12
"ghost
cities"
appeared
last
year.
May
4.
<http://house.china.com.cn/wuxi/view/783741-‐all.htm>.
Kang,
C.,
Liu,
Y.,
Ma,
X.,
&
Wu,
L.
(2012).
Towards
estimating
urban
population
distributions
from
mobile
call
data.
Journal
of
Urban
Technology,
19(4),
3-‐21.
Liu,
Y.,
et
al.
(2015).
"Social
Sensing:
A
New
Approach
to
Understanding
Our
Socioeconomic
Environments."
Annals
of
the
Association
of
American
Geographers
ahead-‐of-‐print:
1-‐19.
MacCarthy,
N.
(2014).
China
Used
More
Concrete
In
3
Years
Than
The
U.S.
Used
In
The
Entire
20th
Century
December
5.
<http://www.forbes.com/sites/niallmccarthy/2014/12/05/china-‐
used-‐more-‐concrete-‐in-‐3-‐years-‐than-‐the-‐u-‐s-‐used-‐in-‐the-‐entire-‐20th-‐century-‐infographic/>
Miller,
D.
&
Chow,
E.
(2015).
Inside
China's
latest
'ghost
town':
Huge
urban
centre
built
to
hold
the
National
Games
for
13
DAYS
now
looks
like
the
set
of
a
zombie
horror
film.
June
17.
<http://www.dailymail.co.uk/news/peoplesdaily/article-‐3128561/China-‐s-‐ghost-‐city-‐Huge-‐
urban-‐centre-‐built-‐hold-‐National-‐Games-‐looks-‐like-‐set-‐zombie-‐horror-‐film.html>.
Nie,
X.,
&
Liu,
X.
(2013).
Types
of
"Ghost
Towns"
in
the
process
of
urbanization
and
countermeasures.
Journal
of
Nantong
University
(Social
Sciences
Edition),
29(4),
111-‐117.
Poston,
D.
L.
(1972).
Socioeconomic
status
and
work-‐residence
separation
in
metropolitan
America.
Pacific
Sociological
Review,
367-‐380.
Rajagopalan,
M.
(2014).
China
to
restrict
expansion
of
cities
in
move
to
curb
'ghost
towns'.
September
26.
< http://www.reuters.com/article/2014/09/26/us-‐china-‐cities-‐idUSKCN0HL1
CB20140926>
Ruan,
Y.
(2010).
Ministry
of
Housing
and
Urban-‐Rural
Development
of
the
People's
Republic
of
China:
in
China.
December
30.
<http://finance.people.com.cn/GB/13618045.html>.
Ryan,
V.
(2013).
Li
Keqiang
warns
of
urbanisation
risks
in
first
speech
as
premier.
March
18.
<http://www.scmp.com/news/china/article/1193244/li-‐keqiang-‐warns-‐urbanisation-‐risks-‐
first-‐speech-‐premier>
Shepard,
W.
(2015).
Ghost
Cities
of
China.
Zed
Books.
Shi,
L.,
Chi,
G.,
Liu,
X.,
&
Liu,
Y.
(2015).
Human
mobility
patterns
in
different
communities:
a
mobile
phone
data-‐based
social
network
approach.
Annals
of
GIS,
21(1),
15-‐26.
Woodworth,
D.
(2015).
Ordos
Municipality:
A
Market-‐Era
Resource
Boomtown.
Cities
43
(March):
115–32.
Xue,
C.
Q.,
Wang,
Y.,
&
Tsai,
L.
(2013).
Building
new
towns
in
China–A
case
study
of
Zhengdong
New
District.
Cities,
30,
223-‐232.
is
30
m2
The
average
living
area
|
1706.07405 | 1 | 1706 | 2017-06-22T17:18:08 | Characterizing information importance and the effect on the spread in various graph topologies | [
"cs.SI",
"physics.soc-ph"
] | In this paper we present a thorough analysis of the nature of news in different mediums across the ages, introducing a unique mathematical model to fit the characteristics of information spread. This model enhances the information diffusion model to account for conflicting information and the topical distribution of news in terms of popularity for a given era. We translate this information to a separate graphical node model to determine the spread of a news item given a certain category and relevance factor. The two models are used as a base for a simulation of information dissemination for varying graph topoligies. The simulation is stress-tested and compared against real-world data to prove its relevancy. We are then able to use these simulations to deduce some conclusive statements about the optimization of information spread. | cs.SI | cs | Characterizing information importance and the effect
on the spread in various graph topologies
James Flamino∗1, Alexander Norman†2, and Madison Wyatt‡2
1Department of Physics, Applied Physics, and Astrophysics, Rensselaer Polytechnic
2Department of Mathematical Sciences, Rensselaer Polytechnic Institute, 110 8th St, Troy,
Institute, 110 8th St, Troy, NY 12180, USA
NY 12180, USA
April 25, 2016
Abstract
In this paper we present a thorough analysis of the nature of news in different mediums across
the ages, introducing a unique mathematical model to fit the characteristics of information spread.
This model enhances the information diffusion model to account for conflicting information and the
topical distribution of news in terms of popularity for a given era. We translate this information to
a separate graphical node model to determine the spread of a news item given a certain category
and relevance factor. The two models are used as a base for a simulation of information dissemina-
tion for varying graph topoligies. The simulation is stress-tested and compared against real-world
data to prove its relevancy. We are then able to use these simulations to deduce some conclusive
statements about the optimization of information spread. Original paper written for COMAP's
2016 ICM competition.
7
1
0
2
n
u
J
2
2
]
I
S
.
s
c
[
1
v
5
0
4
7
0
.
6
0
7
1
:
v
i
X
r
a
∗
†
‡
[email protected]
[email protected]
[email protected]
1
2 of 19
1
Introduction
1.1 Context and Motivation
Over time, the methods we use to communicate have evolved and grown from small networks of
groups with limiting connections to the massive array of transmission associated with the internet.
In any sense, one thing has remained constant -- the inherent practice of seeking and sharing news.
Communication Theory suggests this is for a few fundamental reasons: to persuade, to give or
provide information, to seek information, and to express emotions. These basic desires drive the
ways in which we build our networks and determine the importance of each interaction.
We seek to develop a mathematical model of social networks to analyze communication at its
core. To do this, we need to understand the modes by which people communicate, the information
people convey and accept, the science of implanting news and the effects these all have on the
resulting spread of the news.
1.2 Assumptions
A few assumptions are taken in order to allow the model to run smoothly.
• We assume topical distribution trends are uniform throughout a given era.
• We assume noteworthy news has overcome the threshold of noise and disregard static traffic
of information.
• We assume a discretized time variable, updating the status of an information string in each
node at regular intervals.
• We assume that the probability of someone registering and paying attention to some string of
data, or indeed sharing this piece of data, along mediums of communication is also random.
• Finally, we assume that when a node decides to share data, it shares it with all of its neighbors.
Additional small assumptions specific to pieces of the model will be outlined at appropriate times.
2 Data Analysis
2.1 Trends of News Sources
The reach of information has exploded over the past 150 years. In today's society, information
from nearly anywhere can propogate into the mainstream media. These connections and spreads
can bring about amazing consequences and this phenomenon is seen across time. By compiling
data from census reports, statistical assessments and available databases, we determine the trends
of four information transfer mediums: newspaper, radio, television, and the internet. The industrial
revolution brought a massive increase in newspaper production so that the number of newspapers
and subsequent circulation increased dramatically. In the 20th century, radio and TV began to
replace newspapers as major sources of information, and in more recent history, the internet has
massively expanded the spread of information, working to replace outdated media outlets as a
3 of 19
(a)
(b)
(c)
Figure 1: a) Newspaper circulation trends over time. b) Percentage of TVs in US households over time. c)
Number of internet users over time. Currently, 40.6% of the world is connected to the internet.
primary source. Newspaper circulation skyrocketed from 1880 to 1940, until radio broadcasting
began to gain influence. In 1920, only about 3 million homes had a radio set, but that number
reached nearly 30 million by the end of the 1930s. By 1945, 80% of homes had a radio set and that
number continued to grow into today, in which radios are in virtually every car and every home.
The introduction of TV saw an even greater increase with only 0.4% of households having a set
in 1948, to 55.7% four years later. The trend only continued from there. Finally, the age of the
internet has exceeded the trends of the previous mediums and seen unparalleled rapid expansion.
These trends can be seen in Figure 1(a-c) depicting the true data found.
The introduction of each new medium contributed to an eventual downfall of the others. Al-
though there may not be an extinction of any one as they serve to compliment each other, it is
shown that the increased usage of a novel medium brings a decrease in relevance of the current
and past types. However, innovative sources like the internet combine the functions of newspapers,
radio, and television with eNews, internet podcasts and instant streaming, respectively. This could
serve to make outdated methods irrelevant and, consequently, obsolete.
2.2 What is news?
Ultimately, the question at hand is, what makes a news story? How does one piece of infor-
mation gain relevance over another? For the purpose of this paper, we define "news" as a piece
of information that overcomes two thresholds: the threshold of penetration and the threshold of
retention. We are concerned with the information that has the potential to have a wide spread
and/or lasting impression. The threshold of penetration is the minimum number of mentions
across various sources for a piece of information to catch wind. The threshold of retention is the
minimum amount of time a piece of information is relevant enough to be shared. Essentially, in
everyday news there is a level of noise of information that the story must overcome to be considered.
In order to enforce what qualifies as news, we look at major news stories throughout the past
150 years to get an accurate idea. To compare with actual data, we tracked the volume change
of phrases mentioned over periods of time in a database of over 10 million archived newspapers
from 1836-1922, in the Washington Post from 1960-1963, and in data compiled from internet use
of today. To begin, a phrase was chosen in terms of its relevance to the time period. The volume
of mentions of the phrase per day was tracked over a time interval and recorded.
We introduce two similar pieces of news and explore their ability to break above the thresholds.
First, we examine the volume over time of mentions of the word "Lincoln" in newspapers from
1864-1866. As seen, there is a consistent level of noise until April 15, 1865, corresponding to the
assassination of President Lincoln.
4 of 19
Figure 2: Mentions of "Lincoln" over time in US newspapers from 1864-1866.
After a time period, the volume of mentions returns to the threshold, even delving below as the
phrase becomes less relevant over time. This is also seen in a current, but similar scenario from 2012.
There is an equal distribution of mentions of "Osama Bin Laden" and "Moammar Gaddafi" until a
single source released mention of Osama Bin Laden's death into a communication network, signal-
ing a spike in his mentions. This is clearly a piece of information that reflects our definition of news.
Figure 3: Mentions of the phrase "Osama Bin Laden" over time. The plot of "Moammar Gaddafi" is
included as an equivalence reference.
Across the board, this shape and trend is seen for differing types of news in all eras, topics, and
importance to the period.
2.3 Trends of Topical Distribution
Finally, we examine the change over time of topical distribution in news sources. In spreading
news, we categorize the highest ranking stories as falling into categories of consumption, politics,
and entertainment. That is, the majority of news stories are most relevant in the realm of the
aforementioned categories. Again compiling data from census reports on the circulation of different
types of newspapers over the years, statistical data on radio and TV broadcast breakdown, and
finally examining the top ten news sources with the highest internet traffic for information type,
5 of 19
(a)
(b)
(c)
(d)
(e)
Figure 4: a) Mentions of "Inaugural Ball" in newspapers from 1864-1866. Peak corresponds to Lincoln's 2nd
Inaugural Ball. b) Mentions of "World Series" in the early 1920s. Peak corresponds to a Cleveland victory.
c) Mentions of "Suffrage" in the early 1920s. Peak corresponds to the ratification of the 19th Amendment.
Notice the dip below threshold after the release as the phrase held less relevance. d) Mentions of "Marilyn
Monroe" from 1960-1962. The peak corresponds to her deadly overdose in 1962. e) Mentions of "Berlin"
from 1960-1962. The peak shows the date of erection of the Berlin Wall. Notice the retention of the news.
we arrive at a topical distribution for the type of information being spread over time. There is a
clear trend away from political news towards entertainment which is reinforced by the comparison
of phrase volume distributions within eras.
(a) Circulation proportion
of newspaper type in 1880.
(b) News type by user vol-
ume of the top ten visited
websites in 2015.
Figure 6: Comparison of a political news story and entertainment piece of 1865 (a) and 1920 (b).
(a)
(b)
6 of 19
3 Models
3.1 How Information Spreads
In order to understand the nature of any piece of information and its spread throughout a
network, we first note the ways in which information can travel. Hence forth, we will consider that
communication is either active or passive. Active communication requires focus on the part of both
the sharer and receiver of information. A notable example would be newspapers, the journalists
and editors of a newspaper must certainly pay attention as they place stories in the next day's run,
and those that consume newspapers have to focus on consuming the text presented. Conversely,
some mediums are passive in nature. Examples such as radio and at times television, only require
the focus of one of the participants, the one sharing the information. The person receiving may
instead focus on such things as, say, driving a car or tasks around the home. A note here should be
made about the internet. The internet is distinctly upload-oriented which has often been used as
one of its major selling points; the freedom of people to express themselves universally. In addition,
the internet is at times both passive and active. There are articles one can read and interactive
games, but at the same time streaming services such as Netflix, Spotify, and podcasts. While the
internet has not yet branched out largely to those areas traditionally held by passive media, steps
are being taken, such as the listening to podcasts in the car rather than radio.
3.2 Previous models and limitations
The comparison to diffusion is largely seen in modeling information spread. The model has a
basic form of
dA(t)
dt
= i (t)[P − A(t)]
In this sense, A(t) are the individuals that have received the information, P is the total popula-
tion, and i (t) is a diffusion coefficient. The diffusion coefficient can be expanded to include an
addition factor independent of the number of current individuals pertanent to the information, a
multiplicative factor accounting for internal effect of imitation on the spread of the knowledge, or
a combination of the two. These models are outlined below.
α
i (t) =
βA(t)
α + βA(t)
These coefficients can be implemented in the above equation and can be solved to determine
the volume of people prevalent to information at given times.
This model effectively maps the increased spread of diffusion given internal and external influ-
ence qualities. However, it lacks in versatility and does not account for other factors which will
enhance or inhibit the spread of information.
In modeling the spread of information in a graph, previous work can most often be categorized
by two distinct model types. The Threshold model is defined by a system wherein people begin
to adopt a position if a certain ratio of their neighbors adopt it. Newer solutions falling under the
Cascade model suggest an alternative explanation for how information spreads in social networks.
In this model type, each node infected with information has a certain probability to infect each
of its neighbors. In this manner, one node can actually begin an information cascade, simply by
spreading something that is infectious, which is analogous to viral media.
7 of 19
(a)
(b)
Figure 7: Basic representation of (a) threshold and (b) cascade models.
3.3 Diffusion Model with Multiple Sources
We herein introduce an enhanced model of information diffusion that accounts for the factors
lost in the previous model. In order for our model to accurately describe the adoption of a story into
mainstream news and track the resulting spread, we take into consideration the following factors:
• The topical distribution of newsworthy items has changed over time and is not, nor has ever
been, equal among topics. In a community oriented towards one subject, an item of that
subject will spread quicker than one from a different subject. The topic of the item will affect
the spread among a population and is an internal factor.
• Different items have varying levels of importance to a community as a whole. Some items
with high importance, like the assassination of a President, will span the gaps of interest
distribution in a population. The importance of a item will affect the spatial spread of the
information as well as the speed with which it accomplishes this spread and is an external
factor. The importance of an item is determined by a number of characteristics:
-- Novelty or Shock (ability to spark interest without back story)
-- Accessibility (ability of any individual to understand)
-- Attractiveness (impact of news on individual)
-- Compatibility (alignment with societal values and/or acceptable notions)
These considerations combine to give a total Relevance Factor which we will model scaled from
1 to 10. This relevance factor will determine the rate of spread of the information to the con-
nected nodes of the network. An item with a high relevance factor will have high probability of
penetration, velocity, and retention. We remind the reader that an item run through our model
has already been categorized as "news" and therefore exceeds the respective thresholds. Thus, we
herein assume an item will propagate to some extent and model the subsequent spread of the item
with respect to its relevance factor.
Let y(t) denote the number of individuals who are pertanent to a piece of information. In order
to accurately model the topical distribution for a given time, we designate a certain percentage of
individuals to be "interested" in each topic based on compiled data of the time. For example, for
a model of 1880, 89% of the individuals will be politically oriented and 7% will be entertainment.
8 of 19
We are not insinuating that real individuals have single-minded interests, but simply that the
percentages of interest of a community will change given the relative distribution of the time,
modeled by designating percentages of nodes, or individuals. This will in turn account for the
respective effect of item topic on the spread. If a news piece is topically relevant to one community,
it will naturally spread between individuals within that community, but also has the potential to
leak to individuals of other communities. Essentially, an entertainment individual will still hear
and share news of a high profile political story, and vice versa. The key in this cross-community
sharing lies in the relevance of the information itself. A low relevance political story will spread
slowly in an entertainment network, and a high relevance political story will still spread quickly
in a consumption network despite the conflicting interest. This concept can be modeled in the
following way.
∆y = R(t){[β1y1(t) + η12y2(t)] (N1 − y1(t)) + [β2y2(t) + η21y1(t)] (N2 − y2(t))}∆t
Or generally,
∆y = R(t){ n(cid:88)
n(cid:88)
[βiyi(t) + ηijyj(t)] (Ni − yi(t))}∆t
i=1
j=1
j(cid:54)=i
Each i represents the components of a different topical community. For example, N1 denotes the
community interested in entertainment, N2 in politics, etc.. β1 represents the rate at which an in-
dividual in community 1 will spread an information piece relevant to his community. η12 represents
the rate at which he will spread the information to someone who does not know the information
in a different community. β2 and η21 are equivalent variables for an individual in community 2.
For a piece of information relevant to one community, it will spread quickest between nodes of this
community, slower between those nodes and conflicting nodes, and slowest through two nodes of
conflicting interest to the story. Generally, when information i is released βj < ηji < ηij < βi where
i and j range from 1 to the number of categories and i (cid:54)= j.
In determining the final number of individuals prevalent to the information in a given time,
the function is multiplied by an external relevance factor, R(t). This accounts for information
that spans the gaps in community interest. Although as a community we value some news pieces
more than others, there are certain viral news stories that bridge these differences. As a people,
we are affected by major political changes, influenced by mass entertainment, and impacted by
new innovations. Although we are trending away from political news towards technological and
entertainment oriented news as a constant influx of information, spikes of important stories will
make their way to the individuals of all communities.
R(t) can be dynamic in time and allows for consideration of the characteristics described above.
In general, items rise and decay exponentially at a speed proportional to their relevance. For exam-
ple, an item that is novel but not necessarily impactful will have a quick ascent in volume followed
by a quick decay. Whereas an item that is novel, impactful, and accessible will have a quick ascent
and slow decay corresponding to high penetration and retention.
This property is reinforced in volume data collected from real event spread.
9 of 19
(a)
(b)
Figure 8: An exponential function is fit to the decay of mentions over time.
Figure 9: The R-Squared values of fits for the aforementioned news stories. An exponential decay function
in our model is clearly physically reasonable.
The accuracy of the fit is shown in the above table. Thus far we have shown that the spread of
a piece of information is dependent on various internal and external influence factors contributing
to a combined relevance factor that varies with time. We have also shown the ability to model and
predict the nature of R(t) given the characteristics of the incident information.
3.4 Network Model
To further our model, we base it in graph theory, with the goal being to observe the flow of in-
formation in a population of people connected by different means of communication, or different
types of edges.
In considering the nature of avenues of news, a few considerations are readily
apparent. Some forms of communication are distinctly consumption-oriented in nature where one
merely receives information from these mediums, such as newspapers, radio, and television. This is
represented on a digraph as a directed edge. Conversely, forms of communication that are upload-
oriented in nature include telegraphs, the internet, and talking have an opposite that represents
itself as merely an edge.
Take a node, 0, at time t, (going into an internal state, I0,t) with inward connections to nodes
{ 1, 2, ..., j } and outward state (the state the node is transmitting to its neighbors) represented
at time t by ni,t. We represent the absorption of information by:
j(cid:89)
(I0,t,k = nk,t−1 · PN0)
(T0,t =
(1 − I0,t,k))
(I0,t = −T 2
k=1
0,t + 1)
Given that any ni,t has a value of 0 or 1, this calculation multiplies 1 or 0 by another 0 or
1, determined by PN0, a function that semi-randomly decides whether to share something or not.
10 of 19
Then, in the next step, we subtract this number from 1, meaning that if 0 notices the information
shared by a specific node, it zeroes out the entire equation, if not, it stays at 1. From then, we
modify our final result so 1 switched to 0 and vice versa.
Now, while this is a method to update the internal belief of a node, it does not necessarily signal
to other nearby nodes this information. We update their external beliefs, what they share to the
public, after a gestation period, G, from time t0, in the following manner, where PS0 denotes a 0
or 1 in the same sense as PN0, but for sharing rather than noticing:
n0,t = δt,t0+G · PS0 · I0,t
Now, one may note that this is only ever 1 at a single time slice, as it uses the Kronecker delta
to denote the time when this is put out into the open, as it is a pulse of information, not a sustained
signal. In reference to previous literature, this very much resembles a modified Independent Cascade
model for social networks or an SIR epidemic model but with increased intricacy.
3.5 Network Versatility
While our model as it stands is already quite versatile and can represent a number of scenarios, a
few important problems stand out immediately. While there is a "gestation" period for vertices, the
model lacks any means of transmitting data from two connected points over a timescale longer than
1 step. To that end, we bifurcate our vertices into two subcategories, real nodes and ghost nodes.
A real node is simply a node described above, it represents a person, and is where information may
or may not reside. A ghost node, on the other hand, is mathematically equivalent to a real node,
except that PS0 = PN0 = 1. In addition to this specialized nature of it noticing and transmitting
data, a ghost node between (0, n) also only has two directed connections, one inward from 0, and
one outward towards n. To expand even further on this model, if the speed of a connection between
two nodes is v, the time it takes to transfer between them as v steps (equivalent to things such as
newspapers moving on trains), this ghost node would have a gestation period of v − 1. Finally, to
account for the real world scenario of an individual forgetting a piece of news, the internal state of
node 0, that has "believed" something at time t0, at times after t0, is represented by:
(I0,t = I0,t0 · PV0,t)
Note here that PV0,t is 0 or 1, based on a weighted number generator, however, it changes over
time. As t − t0 increases, PV0,t will tend towards 1, as people become more forgetful of information
over time. Now, instead of the model simply reflecting people retain information, it has people
receiving information, forgetting it, then receiving it again from another source. Much like how
people hear news from an initial source, like the newspaper or Facebook, go about their day and
forget it, then hear about it again from someone in the home.
4 Simulations
The parameters mentioned above were placed in a simulation with a few additional modifications.
As mentioned in Section 3.3, we categorize news as falling into one of three functions: politics,
entertainment, and consumption. The nodes follow the proportional topical distribution of each
time era. We only allow data to originate from one source and the nodes themselves can only hold
one string at a time until another piece of data overrides it. We run the simulations on two networks
representing the cultures of the 1880 and 2015. The differences include the topical proportions,
and spread layouts. These correspond to the media categories and sources of the times. Finally,
the simulation allows for a random generation of information input (order, type, relevance) or a
controlled news input. A few simulations are represented below.
11 of 19
(a)
(b)
Figure 10: Randomly generated news simulated in the 1880 (a) and 2015 (b) model. Notice the
differences in community proportions and graph connections.
4.1 Validity of Simulation
For the validity of the model, we simulate news of varying topic and relevance and compare it
with real world data collected.
Figure 11: The volume of mentions in time of an entertainment item of relevance 9 and the data compiled
around Marilyn Monroe's death.
As seen, the components of the real data are accurately reflected in the model. This news was
highly relevant with high novelty, attractiveness, and accessibility. The death of Marilyn Monroe
would have clearly had a high relevance factor in the time and that is reflected in the model. In
a similar sense, our model for current spread and distribution reflects the news of Alan Rickman's
death in January 2016 when compared with volume data from Google Trends.
12 of 19
(a) Model simulation of entertain-
ment news (8) in the 2015 model.
(b) Real world trend of mentions of
"Alan Rickman" over a given time.
From these comparisons, we validate our model.
4.2 Robust Nature of Simulation
To test the robust nature of our model, we evaluate the predicted propagation of current news
in past networks and vice versa. Take, for example, the announcement of Osama Bin Laden's
capture and death. This would be considered political news of relevance 10. Also, consider the
announcement of Kim Kardashian's pregnancy, an entertainment relevance of 6. We then test this
information in our 1880 network to model its spread. The results are shown below.
Figure 13: Simulation run on 1880 network with news of political relevance 10 and entertainment relevance
6.
To get a sense of the accuracy of the data found, notice the similarities between real volume
data of Abraham Lincoln's assassination and news of the inaugural ball. The maximum height
of mentions is significantly lower for the entertainment news as well as the retention period. We
confidently state that the model well reflects real scenario data across time periods.
Figure 14: The volume spread of Lincoln's assassination and his earlier inaugural ball. The inaugural ball
data has been shifted linearly in time to see direct comparison.
13 of 19
5 The Future of Communication
In looking to the future, we first note on the source changes over time. As mentioned, there are
active and passive news sources as well as upload and consumption based sources. Upload-oriented
networks, in and of themselves, are capable of doing all the things a consumption-oriented network
can and more, and will dominate when the resources needed to sustain both are present. However,
as those modes of communication fight with each other for relevance, active and passive media act
differently, complimenting each other. While there is indeed a significant amount of area in our
media consumption space that the two will vie for, active media has a higher volume of communica-
tion in a given period of time, while passive media has occupancy space advantages. For example,
passive media can be consumed while driving or completing other tasks where active cannot. In
this sense, the two complement each other and neither can dominate entirely. As it stands, the
internet is immune to competition as it encompasses qualities of all the abovementioned. A new
source of media must either improve an existing feature or remove flaws that inhibit information
spread of the future.
A common occurrence in science fiction is the idea of a neural uplink, transmission of informa-
tion between minds directly. It is inherently faster than the internet, as it drastically shortens the
gestation period. Additionally, it combines all types of communication expertly, effectively layering
the models of interaction. The components of face-to-face conversation can be enhanced by the
speed of internet connection. A model of this mode would include multi-faceted edges that would
behave in compounding fashion. As it trends, we would expect the nodes to further represent
entertainment as news, but with this new wave of technology, it is impossible to predict if individ-
uals will lose community sense and begin to function on a personal premise given the immediate
availability and personal nature of media associated with a neural uplink.
6 Sensitivity Analysis
Our base model has a few fixed parameters in simulating the spread of information throughout
a network. We address the impact of these parameters by varying them in the following ways.
6.1 Competing Sources
To study the propagation of news, we limited the number of source nodes to one. In this way
we effectively tracked the singular path of this item. We have altered our simulation to include two
competing sources of news in an interconnected system. When two sources of information of the
same type are released simultaneously into the network, we follow the subsequent spread.
6.1.1 Varying Levels of Importance
We assume that there is a 50/50 chance for dominance when the two pieces of data meet at a node.
Upon setting up this model, two simulations were run, one where the two pieces of information are
equally believable, and one where one is much more believable than the other, or having higher
relevance. The results are just as one would expect, with the first splitting the graph equally and
the second being overrun by the more popular belief. In this sense, we can see how misinformation
that suits our preconceived notions spreads, it is more believable to us and thus blots out real
information in the network.
14 of 19
(a) Equal value.
(b) Unequal value.
Figure 15: The spread of information of higher value spreads quicker and further than that of a
lower value. This is amplified if the competition is increasingly uneven.
6.1.2 Varying Initial Connectivity
For two sources of equal believability, the placement of the initial prevalent nodes hold increasing
importance. This is akin to equal news beginning in a rural village as opposed to a large city. We
find that the item beginning in a more connected node reaches a larger amount of subsequent nodes
in a shorter time. This notion is physically reasonable in that less people will be prevalent to and,
thus, willing to accept, town gossip over city news.
(a) Intial sources.
(b) Spread after time.
Figure 16: It is clear to see the respective spreads of red and blue information items and how their
initial position or connections influenced this.
15 of 19
Figure 17: Red and Blue information pieces with equal relevance factors of 10 were released simultaneously.
Blue was released in a more connected hub.
Recall the internet volume data surrounding the news of Osama Bin Laden's capture and
death (Figure 3). The distribution closely resembles the spread of competing information (Figure
17). As "Osama Bin Laden" became a more relevant phrase, its volume and spread overtook that
of a similarly oriented phrase "Moammar Gaddafi". We further prove the validity of our model
through this comparison.
6.1.3 Varying Connection Distances
Finally, we alter the model to vary the distance between connections, making it so it takes
longer to move across certain edges than others. There are now groupings of connectivity that
vary in size and spread which allows simulations of differing topologies in both of our graph and
the physical world. For example, an interconnected island shares a network with the mainland. It
takes a fair amount of time to move information between them by boat, but the said information
propogates much faster both on the island and the mainland themselves. This differs from the
previous simulation in that the connective speeds as well as the connectivity volume are varied.
As before we consider two items that are equally relevant or believable. We find that the infor-
mation originating on the island remains isolated to that island, whereas the mainland information
dominates the mainland. Next, we also consider news beginning with a higher relevance or believ-
ability, this time on the less connected island, and news with a lower value, now beginning on the
mainland. The two views establish an equilibrium with roughly the same adopting nodes.
16 of 19
(a)
(b)
Figure 18: The resulting spread of two pieces of information beginning in an isolated (blue) and
connected (red) community, respectively. (a) represents equal relevance information simultaneously
spread and (b) higher relevant information (blue) released in the isolated community.
Finally, we note that if the data from the mainland is more relevant, the data on the island dies
out quite quickly, and becomes a footnote in history. In these ways we can explicitly determine
that physical isolation, much like social, is detrimental to the spread of information. If news starts
out isolated by the topology of our social networks, it must make up for it in other ways simply to
remain relevant.
Figure 19: Higher relevance information (red) is initiated in a connected community simultaneously with
information (blue) initiated in an isolated community.
6.2 Optimization of Spread
From these simulations we can also make statements about an optimaztion of spread strategy. This
information is useful for individuals or groups interested in conveying information to a maximum
number of people. This analysis furthers the expected belief that in order to maximize spread,
the information needs to have high relevance, topical importance, and a carefully selected initial
source. A node with many edges is not necessarilly more connected if the surrounding nodes are
weak. Ideally, a piece of information needs to be novel, accessible, attractive, and compatible. It
needs to, in some way, be able to be characterized with the dominant topic of the time. Finally
17 of 19
it needs to be initiated in a carefully selected initial place with the highest connectivity -- both in
personal node connections and global community connections.
In these ways, the spread of an
information piece an be optimized.
7 Conclusion
Throughout the development of our model, one thing is clear: there is a definite relationship be-
tween the importance of a piece of information and its resulting spread. However, this importance
is a combination of many factors separately intrinsic to the item and the community. We have
extensively shown that our model can account for changes in these factors and accurately reflect
the penetration, spread, and retention of the information. Although all news items will spike
and decay in varying levels, they follow a consistent model. Thus, by examining the spread of
an item, we can extrapolate the underlying factors that contribute to its relevance. Conversely,
by knowing the characteristics of an information piece, we can predict the resulting spread. Fi-
nally, we can use this knowledge to strategically spread an information item to the furthest bounds.
7.1 Strengths and Weaknesses in the Models
In total, our model is extremely multifaceted and inclusive. The diffusion model allows for
varying levels of importance to be directly seen in the resulting volume of mentions. It is easily
translated for an increasing number of interest categories or types of news and models the interac-
tions of a news piece between the categories. The graph model excels in versatility: spatial distance
can be represented based on assigning velocities to edges, different mediums can be assigned for the
propagation of information based on velocities and direction of edges. For the model as a whole,
the immense versatility allows us to see clear relationships between information with different levels
of importance based on a number of inherent characteristics and the respective spread of that item.
However, our model is not without weakness. We are unable to model true preferences of indi-
viduals, only the preferences of the network as a whole. The connections are generated randomly
so the more realistic scenario of having more connections with like-minded people within certain
communities is lost, even if the overarching preference of the community is preserved. The model
relies on discrete time values and some elements of weighted randomness in deciding how informa-
tion is noticed and shared. In addition, our model involves a static graph in that no nodes appear
or disappear and no edges change.
7.2 Supplements and Future Work
Although this model and the analysis of communication is far-reaching, further work on this
topic may be done to move closer and closer to real world simulation. First and foremost, one
could fully account for the changing nature of human interactions over time. It would further the
model to include the proportional array of ways an individual communicates and how that has
changed over time. Although individuals and their relationships are discrete, synthesizing it with
continuous time would improve this model. Finally, a way to accurately vary learning a news item
from a mass media source versus a personal connection in order to map the resulting internal effect
on the spread of that item by the individual would serve to further the model.
18 of 19
8 References
Baughman, James. "Television Comes to America, 1947-57." Television Comes to America, 1947-
57. Illinois State Library, n.d. Web. 31 Jan. 2016.
Beckford, Martin, and Graeme Paton. "Royal Wedding Facts and Figures." The Telegraph. Tele-
graph Media Group, 29 Apr. 2011. Web. 31 Jan. 2016. "Chronicling America." News about
Chronicling America RSS. Library of Congress, n.d. Web. 31 Jan. 2016.
Bell, Allan. The Language of News Media. Oxford, UK: Blackwell, 1991. 1-23. Print.
Deutschmann, P. J., and W. A. Danielson. "Diffusion of Knowledge of the Major News Story."
Journalism and Mass Communication Quarterly 37.3 (1960): 345-55. Web.
Edmonds, Rick. "State of the News Media 2015 A New Ranking of Digital Sites." Poynter Insti-
tute, 29 Apr. 2015. Web. 31 Jan. 2016.
"Feature Radio In The 1930s." PBS. PBS, n.d. Web. 31 Jan. 2016.
Geroski, P.a. "Models of Technology Diffusion." Research Policy 29.4-5 (2000): 603-25. Web. 29
Jan. 2016.
"Google Trends - Web Search Interest - Worldwide, 2004 - Present." Google Trends. Google, n.d.
Web. 31 Jan. 2016.
Granovetter, Mark. "Threshold Models of Collective Behavior." American Journal of Sociology
83.6 (1978): 1420-443. Web. 31 Jan. 2016.
Graph Representing Social Network. N.d. Independent Cascade Model of Information Diffusion.
Web. 1 Feb. 2016.
"Internet Users." Number of (2015). Internet Live Stats, n.d. Web. 01 Feb. 2016.
Kempe, David, Jon Kleinberg, and va Tardos. "Influential Nodes in a Diffusion Model for Social
Networks." Automata, Languages and Programming Lecture Notes in Computer Science (2005):
1127-138. Web. 31 Jan. 2016.
Kempe, David, Jon Kleinberg, and va Tardos. "Maximizing the Spread of Influence through a
Social Network." Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining - KDD '03 (2003): n. pag. Web. 31 Jan. 2016.
Lotan, Gilad. "Breaking Bin Laden: Visualizing the Power of a Single Tweet - SocialFlow." So-
cialFlow Atom. N.p., 06 May 2011. Web. 31 Jan. 2016.
Printed. Statistics on Radio and Television, 1950-1960; Statistical Reports and Studies 23 (1963):
n. pag. Print.
Saito, Kazumi, Ryohei Nakano, and Masahiro Kimura. "Prediction of Information Diffusion Prob-
abilities for Independent Cascade Model." Lecture Notes in Computer Science Knowledge-Based
19 of 19
Intelligent Information and Engineering Systems (n.d.): 67-75. Web. 31 Jan. 2016.
Schelling, Thomas C. "Dynamic Models of Segregation." The Journal of Mathematical Sociology
1.2 (1971): 143-86. Web. 31 Jan. 2016.
United States. Census Bureau. Statistics of Newspapers and Periodicals in the United States.
N.p.: n.p., n.d. Web. 30 Jan. 2016.
The Washington Post n.d.: n. pag. Historical Archive. Web. 30 Jan. 2016.
Threshold Model of Disease. N.d. Hawaii Genetics Program. Web. 01 Feb. 2016.
Yang, Jaewon, and Jure Leskovec. "Modeling Information Diffusion in Implicit Networks." 2010
IEEE International Conference on Data Mining (2010): n. pag. Web. 30 Jan. 2016.
"The Year 1960 From The People History." What Happened in 1962 Inc. Pop Culture, Prices and
Events. N.p., Sept. 2004. Web. 31 Jan. 2016.
Zafarani, Reza, Mohammad Ali Abbasi, and Huan Liu. "Information Diffusion in Social Media."
Social Media Mining: An Introduction. N.p.: Cambridge UP, 2014. N. pag. Web.
|
1806.10904 | 1 | 1806 | 2018-06-28T12:05:46 | From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks | [
"cs.SI",
"physics.soc-ph"
] | Uncovering latent community structure in complex networks is a field that has received an enormous amount of attention. Unfortunately, whilst potentially very powerful, unsupervised methods for uncovering labels based on topology alone has been shown to suffer from several difficulties. For example, the search space for many module extraction approaches, such as the modularity maximisation algorithm, appears to be extremely glassy, with many high valued solutions that lack any real similarity to one another. However, in this paper we argue that this is not a flaw with the modularity maximisation algorithm but, rather, information that can be used to aid the context specific classification of functional relationships between vertices. Formally, we present an approach for generating a high value modularity consensus space for a network, based on the ensemble space of locally optimal modular partitions. We then use this approach to uncover latent relationships, given small query sets. The methods developed in this paper are applied to biological and social datasets with ground-truth label data, using a small number of examples used as seed sets to uncover relationships. When tested on both real and synthetic datasets our method is shown to achieve high levels of classification accuracy in a context specific manner, with results comparable to random walk with restart methods. | cs.SI | cs | From clusters to queries: exploiting uncertainty in the
modularity landscape of complex networks
James P Gilbert
Synthetic Biology Research Centre
University of NoŠingham
NoŠingham, United Kingdom NG7 2RD
james.gilbert@noŠingham.ac.uk
Jamie Twycross
School of Computer Science
University of NoŠingham
NoŠingham, United Kingdom NG8 1BB
jamie.twycross@noŠingham.ac.uk
8
1
0
2
n
u
J
8
2
]
I
S
.
s
c
[
1
v
4
0
9
0
1
.
6
0
8
1
:
v
i
X
r
a
ABSTRACT
Uncovering latent community structure in complex networks is a
field that has received an enormous amount of aŠention. Unfor-
tunately, whilst potentially very powerful, unsupervised methods
for uncovering labels based on topology alone has been shown to
suffer from several difficulties. For example, the search space for
many module extraction approaches, such as the modularity max-
imisation algorithm, appears to be extremely glassy, with many
high valued solutions that lack any real similarity to one another.
However, in this paper we argue that this is not a flaw with the
modularity maximisation algorithm but, rather, information that
can be used to aid the context specific classification of functional
relationships between vertices. Formally, we present an approach
for generating a high value modularity consensus space for a net-
work, based on the ensemble space of locally optimal modular par-
titions. We then use this approach to uncover latent relationships,
given small query sets. OEe methods developed in this paper are ap-
plied to biological and social datasets with ground-truth label data,
using a small number of examples used as seed sets to uncover re-
lationships. When tested on both real and synthetic datasets our
method is shown to achieve high levels of classification accuracy
in a context specific manner, with results comparable to random
walk with restart methods.
1 INTRODUCTION
A fundamental issue at the heart of machine learning methods
applied to large scale datasets is the ability to correctly identify
classes of related objects in an unsupervised manner. In network
science, this methodology is o‰en referred to as community detec-
tion [13]. Many algorithms exist to solve this problem [13], yet
initial starting conditions or different optimisation strategies may
result in conflicting results even when the same objective function
is being maximised [17].
In this paper, we develop an intuitive
method to use the uncertainty amongst a high number of near op-
timal solutions to measure context sensitive relationships between
small sets of labelled vertices. OEis approach can be based on labels
that are not first order neighbours to find other potentially related
vertices.
OEe use of community detection is widespread. For example, a
core goal in systems biology is to characterise the function and
functional relationships between genes, proteins or metabolites
within a larger network [15]. In many situations, only the role of a
small number of genes is known, with much of the annotation for a
given organism being computed through naive homology informa-
tion that ignores the role of a gene within a wider context. OEe ad-
vent of high throughput experimental datasets has allowed the con-
struction of proteome scale networks, leading to the observation of
non-trivial topological properties such as densely connected clus-
ters [11]. OEese densely connected clusters are widely believed to
be associated with specific function, such as multi-protein com-
plexes or biochemical pathways.
As a form of unsupervised machine learning, module extrac-
tion methods largely focus on optimising some objective function
with the goal of finding meaningful clusterings. Perhaps the most
popular of these methods is that of modularity maximisation [29],
which seeks to find the most unexpected partition of a graph with
respect to a given null model. Overlapping methods have recently
been applied to this problem in both crisp [1, 24] and fuzzy [19]
based algorithms which have been widely used to uncover latent
relationships without labelling schemes.
In previous work, we
found that most of these methods have significant disagreement
when evaluated in a practical context [14].
OEe number and size of communities is, generally, not known
a priori, and the problem has been shown to be NP-hard [4]. OEe
work of Good et al. [17] recently highlighted that the popular mod-
ularity maximisation algorithm has a highly "glassy" search space.
In essence, for real, heterogeneous networks there are many lo-
cally optimal partitions that bear liŠle resemblance to each other
by measure of mutual information. OEis allows greedy optimisa-
tion algorithms [3] to trivially find solutions that score extremely
high values of modularity. In order to solve this issue, certain ap-
proaches use a consensus based approach to clustering, combining
many high value partitions into a given median partition [22].
However, in this paper, we do not seek to find a single "best"
partition, whether overlapping or not and our objective is not to
uncover labels but to use limited and small sets of labels to give the
notion of a membership score to some grouping. Instead, we use
the large number of highly modular solutions to form the index
for a search query system. In essence, this is a method of semi-
supervised learning that aŠempts to find items related given la-
belled sets of vertices using topology alone. Each high value parti-
tion can be treated as information about the relationships between
vertices. OEat is to say, there is not a single, correct view of the
underlying community structure to a network, but rather, many
different context dependent definitions. As the objective of com-
munity detection approaches is to relate information, it is assumed
that some labelled meta-data can be used to find unlabelled, poten-
tially related vertices.
Many representations of modular structure
Select Query Nodes
Create global relatedness ranking
Figure 1: Modularity search space of an E. coli metabolic net-
work. Distance between partitions is calculated using vari-
ation of information [27] and dimensionality reduction is
performed using curvilinear component analysis [10]. ‡e
inset (top) demonstrates the landscape of the high modular-
ity partitions. Figure generated with the so…ware of Good et
al. [17].
More formally, the problem tackled in this paper can be formu-
lated as follows: Given a graph made up of vertices and edges
G = (V , E), and a query set S ⊂ V , we ask the question; How
well is a given vertex, i < S related to S?
We propose an algorithm that pre-computes an index of clus-
terings for a given complex network, based on the fast greedy Lou-
vain algorithm [3], used in a distributed manner. OEe detected clus-
ters then form the basis of a search algorithm that allows one to
compute the relatedness of nodes to a given query set. OEe query-
ing method is a polynomial time algorithm that could be trivially
adapted to form the basis of many user facing applications. OEis
approach is then applied to synthetic benchmark networks with
known, ground-truth labels as well as social and protein-protein
interaction networks with high quality ground truth label sets.
2 EXPLOITING THE MODULARITY QUERY
SPACE
To characterise latent community structure, one of the most pop-
ular approaches is to use modularity maximisation given by the
equation [29]
Q =
1
2m i , j
(cid:20)Ai j −
kikj
2m (cid:21) δ (ci , cj ),
(1)
Figure 2: Outline of the proposed approach to querying net-
works by using multiple, high quality representations of
modular networks.
is the Kronecker delta such that δ (ci , cj ) = 1 if ci = cj and 0 oth-
erwise. As a combinatorial optimisation problem, there are many
different algorithmic approaches to finding high values of Q.
OEe work by [17] forms the basis of the motivation of the ap-
proach taken here. In this study, the authors discovered that the
modularity search space for many real-world networks contains a
huge number of high value solutions. Each of these solution parti-
tions are extremely close to the global maxima, making it both dif-
ficult to find the optimal value of Q and difficult to argue that the
highest scoring partition is the "true" community structure. OEis
fact is visually demonstrated with the so‰ware from [17] in Figure
1, which shows the modularity search space of an E. coli metabolic
network reconstruction [20]. OEe similarity between the partitions
is compared with the variation of information measure [27] and di-
mensionality of the space is reduced with curvilinear component
analysis [10] 1.
In this work, we consider each high value partition to be infor-
mation about latent relationships between vertices inferred through
the topology of the network. OEis approach, in and of itself is not
unique, as there have been previous approaches that use the con-
sensus of an ensemble of clusters to create high quality overlap-
ping clustering of networks [22]. Such an approach, whilst well
principled, is a context insensitive view of the modular structure
of a graph.
OEe objective, then, is to use the disagreement between the set
of highly modular partitions as information; that is to say, to infer
the probability that sets of vertices are contained within the same
cluster. Whilst methods based on simulated annealing can be used
where m is the number of edges in the network, Ai j is the binary
variable indicating the adjacency of nodes i and j, ki is the degree of
a vertex, ci indicates the community of a given vertex and δ (ci , cj )
1OEe reader should note that axis on these plots are a result of the dimensionality
reduction performed by curvilinear component analysis [10] and, therefore, have no
natural interpretation.
2
to guarantee full coverage of the network, the following section de-
scribes a method adapted from the greedy agglomerative Louvain
algorithm [3].
2.1 Algorithm outline
A broad outline of the proposed method is presented in Figure 2.
In essence, the objective is to use multiple modular representations
of a given dataset to generate a relatedness score for a given set of
query vertices.
In order to cover the space of high modularity partitions, ran-
domly generated starting partitions are computed with a random
cut set. To achieve this, each edge is either placed inside the cut
set or not as the result of an independent Bernoulli trial. Each ran-
dom partition is used as the starting partition for the greedy Lou-
vain process. In principle, any search exploration procedure, such
as simulated annealing [17] could be used. OEe Louvain algorithm
was selected as it is fast, running in O(n log n) time complexity [3],
and because it is a greedy algorithm and is guaranteed to stop a‰er
finding a locally maximal solution.
OEe Louvain algorithm is conceptually very simple; starting from
a random partition, clusters are agglomerated if the merge results
in a positive change in modularity ∆Q. When no possible moves
result in an increase in modularity the algorithm has found a local
optima.
OEe index coverage is directly proportional to the number of
starting random partitions. A full coverage index could be con-
sidered as every locally optimal partition. Given that there is no
free lunch and it is impossible to know every solution, one can only
ensure a full coverage index through an exhaustive search over the
2m possible starting cut sets, where m is the number of edges in
the graph. Consequently, the approach taken here is to use a large
but not exhaustive subset of the possible solutions using a suitably
large space of 2000 solutions for the networks studied in this paper
2.
2.2 Measuring the quality of relationships
Given a query of vertices, the relatedness to other vertices in a
network is quantifiable by the fraction of times they are clustered
with the query set, given the set of high quality partitions. For-
mally, this can be expressed in terms of the expansion score of a
given vertex,
for the case where i is in S we, instead, consider the value µi (S − i)
to remove bias.
3 RESULTS
3.1 Cross-validation method
In this study we test a small number of labels that we intend to use
in order to evaluate how well our method correctly generalises to
discover unlabelled vertices. We would like to test a significantly
smaller number of seed nodes than two class classification meth-
ods used in previous studies, which use leave-one-out cross valida-
tion [21]. OEe cross validation procedure we devise is described as
follows and depends on the size of the community and the number
of initial seed labels being used.
For this work we would like to capture binary classification per-
formance, true positives (tp), true negatives (tn), false positives (fp)
and false negatives (fn), on our datasets of community member-
ships. In order to generate the different sets for the cross validation
we take each label set and generate unique sample sets of vertices
from the known true positive labels.
As the seed label sets can be as small as 3 vertices, exhaustive
cross validation was not possible for all labelling schemes. Conse-
quently, cross validation is either conducted on an exhaustive set
of all possible (cid:0) S
s (cid:1) unique labellings or 120 seed queries sampled
randomly without replacement from the possible subsets 3, where
S is the set of gold standard true labels and s is the size of the ran-
domly selected seed sets.
As the selected seed sets can be contained within multiple com-
munities, we consider the set of true positives not to be the com-
munity for which the seed set is randomly selected, but all com-
munities for which that seed set is a subset of. OEis is because the
purpose of the approach presented within this paper is to distin-
guish between different communities in a context specific manner,
if the overlap between two communities is represented by the seed
nodes this should be considered in the tests.
It should therefore be noted that presented receiver operator
characteristic (ROC) scores are dependent on community sizes. We
also note that we do not consider separate training and test sets in
this study as the method does not use any examples when building
the index space from partitions of the graph.
Formally, the steps for this procedure with a given label set S
are outlined as follows:
µi (S) =
1
P S P ∈P j ∈S
δ (c
p
i , c
p
j ),
(2)
• Generate up to 120 unique subsets of size s, randomly sam-
where S denotes a query set, P is a given partition in the space of
p
all high quality partitions P, c
i indicates the cluster vertex i is con-
tained in within partition P and δ (u ,v) is the Dirac delta function
p
j are the same cluster and 0 otherwise. As
that equals 1 if c
a simple example, for a pair of vertices i and S such that S = {j} we
would consider µi to be the number of times i and j appear in the
same cluster, given an ensemble of network clusterings. We define
µi (S) for all vertices in the network, including those in S. However,
p
i and c
2Initial results indicate that a significantly smaller space of partitions may still yield
high quality results but we note that further work is required to asses the best number
of partitions in a practical context.
3
pled without replacement (set T ).
• For each test subset {∀St ∈ T St ⊂ S ∧ St = s }, generate
the µi (St ) score for all vertices in the network
• Exclude vertices in St from the test
• Consider the true community membership of St to be the
true positive set.
• Consider each of the nodes in V not in the community
membership of St to be the true negative set.
• Generate a network wide average ROC curve interpolated
from all test subsets from all communities.
3OEis is equivalent to (cid:0)10
would not be possible for the larger communities in this study.
3(cid:1) combinations, given time constraints, an exhaustive sample
In the case for the synthetic networks tested below, true labels
are drawn from the known communities, with each tested in isola-
tion. For the real world networks tested the labels are considered
in the same manner though many nodes have no assigned labels.
Every community is considered with different seed set sizes.
3.2 Random walk with restart
In the following sections compare our method with the commonly
used random walk with restart method as described in [21]. OEis
simulates an infinite random walk with a fixed probability, α that
a walker would teleport back to the initial seed nodes. Formally,
the random walk with restart algorithm uses the form
®pt +1 = (1 − α)W ®pt + α ®p0 ,
(3)
where W is the row normalised adjacency matrix of a graph, ®p0 is
the initial walk vector such that ®p0 = 1
S for vertices in the seed
set. OEe random walk algorithm repeats equation 3 from ®p0 until
the L1 norm between ®pt and ®pt +1 converges to 0, simulating the
steady state vector ®p∞. For the tests performed in this work we
use a restart probability α = 0.25.
3.3 Synthetic networks
In this section we test the method on benchmark networks con-
structed with a ground-truth community structure. To evaluate
how our method performs we use the undirected, unweighted LFR
benchmark [23] in overlapping and non-overlapping forms. We
test the area under the ROC curve (AUC) scores for networks vary-
ing the mixing parameter (fraction of edges between communities)
and the fraction of overlapping nodes. In these tests, the commu-
nity distribution is defined with a power law coefficient of −1.0,
the degree distribution is defined with a power law coefficient of
−2.0. OEe number of nodes is stated in the text.
3.3.1 Non-overlapping modules. Figure 3 represents tests on 10
networks with 1000 and 5000 nodes varying the mixing coefficient
(number of edges between communities). As one would expect,
the prediction of the method drops off steeply where communities
are less defined above a mixing coefficient of 0.6. Using larger seed
sets also improves accuracy with some prediction of true commu-
nities being possible at extremely high levels of mixing. Overall,
results are comparable to the random walk with restart method,
with slightly improved performance with a smaller number of seed
nodes.
3.3.2 Overlapping modules. In Figure 4 we show the results of
network performance when tested against an increasing level of
overlapping communities. For these tests we fix the mixing coeffi-
cient at 0.3. Here, each vertex can belong to up to 4 communities.
In order to test performance we varied the fraction of nodes that
are in more than one community. OEe method still has an AUC
score above 0.5 when all nodes are placed in multiple communi-
ties. OEis indicates that the method is capable of uncovering latent
overlapping memberships even when given a relatively small num-
ber of seed nodes. As with the non-overlapping results, the scores
are comparable with the rwr method with performance slightly im-
proved in the case of 1000 node models, but comparable for 5000
node models.
3.4 Real networks
In order to test the performance of the semi-supervised classifica-
tion on real-world data we present our findings on example net-
works with metadata communities. All datasets use the largest
single connected component sub-graph. OEe real networks used
are:
• EU emails core dataset (EU emails) [25] OEis anonymised
dataset is taken from the SNAP database [26] and contains
986 nodes and 16, 687 edges representing emails between
individuals. OEe metadata community labels represent dif-
ferent departments within the organisation. In total there
are 42 communities, 39 of which contain at least 3 nodes.
• Yeast protein-protein interaction network (Yeast PPI)
[35] OEis dataset is a collection of recorded binary inter-
actions between proteins collected with high-throughput
yeast-2-hybrid assays. OEe metadata used are known, ex-
perimentally validated protein complexes from [31]. OEe
network contains 6222 nodes in the largest connected com-
ponent, with 22,386 edges. OEere are 409 experimentally
validated protein complexes, 236 of which contain 3 or
more nodes. OEe protein complexes are typically very small
in terms of number of proteins, with 90% of the complexes
containing less than 10 proteins and only 2 complexes con-
taining 50 or more proteins.
• Escherichia coli protein-protein interaction network
(E.coli PPI) [34] For the E. coli dataset we used manually
curated interacting proteins from [34]. OEe network con-
tains 1913 nodes and 7252 edges, the protein complexes
range in size between 3 and 65 nodes. 85% of the com-
plexes contain 10 or less nodes.
• Arabidopsis thaliana protein-protein interaction net-
work (Arabidopsis PPI) [11]. OEe network itself con-
tains 4519 nodes and 11,096 edges. For the Arabidopsis
dataset, the complex sources were more limited. Conse-
quently, we obtained all gene ontology annotations under
the GO term "Protein-containing complex" from AmiGO
[6] where experimentally collected physical interaction ev-
idence was acquired. At the time of writing, this resulted
in 7 complexes containing between 4 and 12 nodes. In ad-
dition, we included small protein complexes from the In-
tAct database [30], resulting in a total of 165 unique com-
plexes. As the labels for this dataset are small it was not
possible to test algorithm performance with 15 seed nodes.
ROC curves generated with the cross validation procedure de-
scribed in Section 3.1 are shown in Figure 5. OEese results represent
ROC curves and mean AUC statistics.
OEe results of our method are comparable to the random walk
with restart approach, which performs beŠer on the datasets tested
with the exception of the EU email dataset for which our model
produces higher AUC scores.
In the case of the Arabidopsis thaliana network the protein com-
plexes tested are significantly smaller than for other networks and
so a comparison of seed sizes is not possible. However, in the other
networks studied, using 3 or more seed nodes appears to improve
results, though for 15 seed nodes the results are not significantly
4
1.0
0.9
0.8
0.7
0.6
0.5
C
U
A
n
a
e
M
0.4
0.0
1 seed nodes μ
1 seed nodes rwr
3 seed nodes μ
3 seed nodes rwr
7 seed nodes μ
7 seed nodes rwr
15 seed nodes μ
15 seed nodes rwr
0.2
0.4
0.6
Mixing coefficient
(a) 1000 nodes
1.0
0.9
0.8
0.7
0.6
0.5
C
U
A
n
a
e
M
0.8
1.0
0.4
0.0
1 seed nodes μ
1 seed nodes rwr
3 seed nodes μ
3 seed nodes rwr
7 seed nodes μ
7 seed nodes rwr
15 seed nodes μ
15 seed nodes rwr
0.2
0.4
0.6
Mixing coefficient
0.8
1.0
(b) 5000 nodes
Figure 3: Non-overlapping LFR community networks with varying seed nodes with 1000 and 5000 nodes. Data points repre-
sent mean AUC scores for all communities on 10 sampled networks at varying mixing coefficients. Error bars represent one
standard deviation.
1.0
0.9
0.8
0.7
0.6
0.5
C
U
A
n
a
e
M
0.4
0.0
1.0
0.9
0.8
0.7
0.6
0.5
C
U
A
n
a
e
M
0.8
1.0
0.4
0.0
1 seed nodes μ
1 seed nodes rwr
3 seed nodes μ
3 seed nodes rwr
7 seed nodes μ
7 seed nodes rwr
15 seed nodes μ
15 seed nodes rwr
0.2
0.4
0.6
Overlapping nodes (fraction)
0.8
1.0
1 seed nodes μ
1 seed nodes rwr
3 seed nodes μ
3 seed nodes rwr
7 seed nodes μ
7 seed nodes rwr
15 seed nodes μ
15 seed nodes rwr
0.2
0.4
0.6
Overlapping nodes (fraction)
(a) 1000 nodes
(b) 5000 nodes
Figure 4: Overlapping LFR community networks with varying seed nodes with 1000 and 5000 nodes. Data points represent
mean AUC scores for all communities on 10 sampled networks at varying overlapping fraction of nodes. Error bars represent
one standard deviation.
beŠer than with 7 seeds. OEe lower quality labels within the Ara-
bidopsis protein complex dataset likely explains the significant dif-
ference in results when compared with other protein interaction
datasets.
3.4.1 Tests on gene ontology labels. In a practical situation the
higher quality label sets described above are not likely to be avail-
able. Consequently, we wish to highlight that the method also
serves as a useful network reduction tool where the quality of la-
bels is not well defined. In order to achieve this goal, for each of
the biological data sets in this study, we acquired all Gene Ontol-
ogy terms for each of the proteins from AmiGO [7]. Gene Ontol-
ogy is a controlled vocabulary of terms associated with biological
5
functions in three broad categories of Cellular Components (CC),
Metabolic Functions (MF) and Biological Processes (BP), forming
a hierarchy of terms and associated sub terms.
OEese labels are not all likely to be represented within the protein-
protein interaction networks, though many biological processes
are. For the Yeast, Arabidopsis and E. coli PPIs we collected 85, 549
and 420 terms covering at least 3 nodes, respectively. As expected,
average ROC and AUC scores shown in Figure 6 are considerably
lower than for the Protein complexes for both our method and the
1.0
0.8
0.6
0.4
0.2
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0.0
0.0
0.2
1.0
0.8
0.6
0.4
0.2
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0.0
0.0
0.2
1.0
0.8
0.6
0.4
0.2
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0.0
0.0
0.2
μ 1 seed node(s) mean AUC: 0.87 (std: 0.14)
rwr 1 seed node(s) mean AUC: 0.78 (std: 0.14)
μ 3 seed node(s) mean AUC: 0.89 (std: 0.09)
rwr 3 seed node(s) mean AUC: 0.82 (std: 0.12)
μ 7 seed node(s) mean AUC: 0.89 (std: 0.08)
rwr 7 seed node(s) mean AUC: 0.84 (std: 0.10)
μ 15 seed node(s) mean AUC: 0.90 (std: 0.07)
rwr 15 seed node(s) mean AUC: 0.86 (std: 0.09)
0.4
0.6
False positive rate
0.8
1.0
μ 1 seed node(s) mean AUC: 0.87 (std: 0.12)
rwr 1 seed node(s) mean AUC: 0.90 (std: 0.06)
μ 3 seed node(s) mean AUC: 0.89 (std: 0.08)
rwr 3 seed node(s) mean AUC: 0.91 (std: 0.06)
μ 7 seed node(s) mean AUC: 0.89 (std: 0.06)
rwr 7 seed node(s) mean AUC: 0.90 (std: 0.06)
μ 15 seed node(s) mean AUC: 0.89 (std: 0.09)
rwr 15 seed node(s) mean AUC: 0.87 (std: 0.07)
0.4
0.6
False positive rate
0.8
1.0
(a) EU email departments
(b) Yeast PPI protein complexes
1.0
0.8
0.6
0.4
0.2
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0.0
0.0
0.2
μ 1 seed node(s) mean AUC: 0.63 (std: 0.09)
rwr 1 seed node(s) mean AUC: 0.73 (std: 0.09)
μ 3 seed node(s) mean AUC: 0.76 (std: 0.11)
rwr 3 seed node(s) mean AUC: 0.79 (std: 0.13)
μ 7 seed node(s) mean AUC: 0.75 (std: 0.13)
rwr 7 seed node(s) mean AUC: 0.90 (std: 0.11)
0.4
0.6
False positive rate
0.8
1.0
μ 1 seed node(s) mean AUC: 0.87 (std: 0.12)
rwr 1 seed node(s) mean AUC: 0.92 (std: 0.04)
μ 3 seed node(s) mean AUC: 0.90 (std: 0.07)
rwr 3 seed node(s) mean AUC: 0.92 (std: 0.04)
μ 7 seed node(s) mean AUC: 0.89 (std: 0.06)
rwr 7 seed node(s) mean AUC: 0.92 (std: 0.03)
μ 15 seed node(s) mean AUC: 0.88 (std: 0.06)
rwr 15 seed node(s) mean AUC: 0.91 (std: 0.03)
0.4
0.6
False positive rate
0.8
1.0
(c) Arabidopsis PPI protein complexes
(d) E. coli PPI protein complexes
Figure 5: Receiver operator characteristic (ROC) curves for the high quality labels for real networks described in Section 3.4.
Results represent the averages over all receiver operating characteristic scores from all samples of label sets with the cross
validation procedure described in 3.1.
rwr approach. Notably, however, the performance of the rwr ap-
proach is significantly worse than one would expect to find at ran-
dom for the Yeast GO terms. OEe reason for this performance re-
mains unknown, however, it is likely to to the fact that the gene on-
tology labels are poorly represented in the dataset. However, this
approach should be considered in contrast to conventional gene
enrichment strategies on conventional network clusters [8].
4 DISCUSSION
OEe semi-supervised method for vertex classification presented in
this work has been shown to produce good results on both syn-
thetic benchmarks and real-world datasets. Interestingly, this method
is capable of correctly classifying communities with only a small
number of seed query vertices. OEese results show that this query
method could be used as a powerful exploratory tool in network
analysis.
6
OEe fact that the method is able to uncover small protein com-
plexes seems to contradict the principle that modularity maximi-
sation algorithms have a resolution limit [12]. Whilst this appears
to be the case it is important to note that the resolution limit ap-
plies to a single partition of space. Further work is needed to in-
vestigate why small communities are still detectable. However, we
speculate that it is likely due to the fact that the co-classification
of vertices between different partitions remains fairly tolerant to
changes. In other words, the small cluster of nodes is always clus-
tered in the same community, regardless of the partition. We do
note that, where communities are very small, any approach will
be extremely sensitive to false positive and false negative results.
As such, this should be considered when using any method of this
form as an exploratory tool.
1.0
0.8
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0.6
0.4
0.2
0.0
0.0
0.2
1.0
0.8
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0.6
0.4
0.2
0.0
0.0
0.2
μ 1 seed node(s) mean AUC: 0.62 (std: 0.08)
rwr 1 seed node(s) mean AUC: 0.31 (std: 0.08)
μ 3 seed node(s) mean AUC: 0.64 (std: 0.08)
rwr 3 seed node(s) mean AUC: 0.36 (std: 0.10)
μ 7 seed node(s) mean AUC: 0.68 (std: 0.08)
rwr 7 seed node(s) mean AUC: 0.40 (std: 0.11)
μ 15 seed node(s) mean AUC: 0.71 (std: 0.07)
rwr 15 seed node(s) mean AUC: 0.45 (std: 0.13)
0.4
0.6
False positive rate
0.8
1.0
1.0
0.8
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0.6
0.4
0.2
0.0
0.0
0.2
μ 1 seed node(s) mean AUC: 0.52 (std: 0.04)
rwr 1 seed node(s) mean AUC: 0.53 (std: 0.04)
μ 3 seed node(s) mean AUC: 0.56 (std: 0.09)
rwr 3 seed node(s) mean AUC: 0.57 (std: 0.08)
μ 7 seed node(s) mean AUC: 0.60 (std: 0.12)
rwr 7 seed node(s) mean AUC: 0.62 (std: 0.11)
μ 15 seed node(s) mean AUC: 0.63 (std: 0.11)
rwr 15 seed node(s) mean AUC: 0.66 (std: 0.12)
0.4
0.6
False positive rate
0.8
1.0
μ 1 seed node(s) mean AUC: 0.54 (std: 0.08)
rwr 1 seed node(s) mean AUC: 0.57 (std: 0.11)
μ 3 seed node(s) mean AUC: 0.63 (std: 0.15)
rwr 3 seed node(s) mean AUC: 0.63 (std: 0.16)
μ 7 seed node(s) mean AUC: 0.69 (std: 0.16)
rwr 7 seed node(s) mean AUC: 0.69 (std: 0.16)
μ 15 seed node(s) mean AUC: 0.71 (std: 0.15)
rwr 15 seed node(s) mean AUC: 0.71 (std: 0.16)
0.4
0.6
False positive rate
0.8
1.0
(a) Yeast PPI GO terms
(b) Arabidopsis PPI GO terms
(c) E. coli PPI GO terms
Figure 6: Receiver operator characteristic (ROC) curves for gene ontology labels for real networks described in Section 3.4.
Results represent the averages over all receiver operating characteristic scores from all samples of label sets with the cross
validation procedure described in 3.1.
OEe approach also appears to be tolerant to a small number of
seed nodes. OEis is interesting as in most sampled cases the rel-
evant nodes are unlikely to be direct neighbours. From the per-
spective of exploratory studies, this implies that a small number of
query vertices can be used to find potentially related vertices.
5 RELATED WORK
OEis work relates very strongly to the idea of local community de-
tection, more specifically the idea of seed set expansion [16]. Here,
a given seed set is created and random walks are analysed to find
clearly related communities of vertices. One of the most common
approaches to finding related vertices in a network is the random
walk with restart (RWR) [5, 21] explained in section 3.2. OEis ap-
proach has been applied in fields as diverse as recommender sys-
tems and the detection of potential drug targets [9]. In RWR the
relatedness of any pair of vertices can be seen as the probability of
a particle traversing the graph starting at a given vertex and end-
ing at another. Conceptually, RWR is very similar to the method
presented in this paper given that the user has a given query. OEe
RWR probability as analogous though not equivalent to the value
of µi (S).
OEe reader may also consider the similarity of this approach to
that of label propagation [18, 32], which seeks to find communities
based on a vote, where at different time steps a node updates it's
label to to be the most common amongst its neighbours. A com-
mon problem with label propagation schemes is that they o‰en
fail to converge, resulting in many competing clusterings of a net-
work. We liken this to the problem encountered by Good et al. [17]
in modularity maximisation. A core contribution of this paper is
that, in such situations, there is no single, context independent la-
belling scheme that can be seen as the "true" community structure,
overlapping or not. Indeed, the approach applied here is extremely
general and could be adapted to the label propagation approach (or
any other community detection algorithm) should sufficient semi-
supervised group memberships be known a priori.
Many existing method are based on the idea of a locally dense
In contrast, the query
subgraph containing all query nodes [2].
approach presented here does not require the queries to be a self
contained sub-graph. Indeed, queries can contain spurious nodes
that are topologically distant from one another - the result is that
the µi (S) score for the query set will likely be very low. Further
investigation into how to evaluate the quality of high average µi (S)
for i ∈ S is le‰ to future work.
In the field of community detection, a number of very recent
articles have focused on using metadata to improve the results of
community detection approaches. OEese algorithms, however, are
distinct from the approach taken here as the metadata is not used
in the module discovery process. Furthermore, the results in this
work aŠempt to explicitly label unlabelled data and only require
a relatively small number of labels to operate in such a fashion.
In contrast, the recent approach by Newman and Clauset [28], for
example, uses examples in which practically the entire network
contains labels which is less useful from the perspective of label
discovery.
6 CONCLUSIONS
OEis paper has presented a novel approach to semi-supervised com-
munity detection utilising a consensus of high scoring partitions
computed with the popular modularity maximisation approach. Pre-
viously the glassy search space of this optimisation algorithm has
been seen as a major limitation. However, in this work we consider
each locally optimal partition to be information regarding the true
multi-class labels that are likely present in real networks. OEe ap-
proach presented here differs from other ensemble approaches in
that the objective is to provide a probabilistic framework for label
classification. Performance was shown to be strong on both syn-
thetically generated networks and real-world ground truth com-
munities with relatively small sets of labels. In the case of synthetic
networks communities are correctly detected up to the detectabil-
ity threshold. For real world networks with small label sets, aver-
age AUC scores were comparable to the random walk with restart
method for the high quality datasets tested in this study.
However, this approach requires the community landscape to
contain many local maxima, a property likely shared by many real-
world, heterogeneous networks. Similarly, the method presented
here requires both some labelled data and the labels to be relevant
in the context of the underlying network.
7
ACM SIGKDD international conference on Knowledge discovery and data mining.
ACM, 597–605.
[17] Benjamin H Good, Yves-Alexandre de Montjoye, and Aaron Clauset. 2010. Per-
formance of modularity maximization in practical contexts. Physical Review E
81, 4 (2010), 046106.
[18] Steve Gregory. 2010. Finding overlapping communities in networks by label
propagation. New Journal of Physics 12, 10 (2010), 103018.
[19] Steve Gregory. 2011. Fuzzy overlapping communities in networks. Journal of
Statistical Mechanics: Šeory and Experiment 2011, 02 (2011), P02017.
[20] Roger Guimera and Luis A Nunes Amaral. 2005. Functional cartography of
complex metabolic networks. Nature 433, 7028 (2005), 895–900.
[21] Sebastian Kohler, Sebastian Bauer, Denise Horn, and Peter N Robinson. 2008.
Walking the interactome for prioritization of candidate disease genes. Še Amer-
ican Journal of Human Genetics 82, 4 (2008), 949–958.
[22] Andrea LancichineŠi and Santo Fortunato. 2012. Consensus clustering in com-
plex networks. Scientific reports 2 (2012).
[23] Andrea LancichineŠi, Santo Fortunato, and Filippo Radicchi. 2008. Benchmark
graphs for testing community detection algorithms. Physical Review E 78, 4
(2008), 046110.
[24] A. LancichineŠi, F. Radicchi, J.J. Ramasco, and S. Fortunato. 2011. Finding sta-
tistically significant communities in networks. PloS one 6, 4 (2011), e18961.
[25] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. 2007. Graph evolution:
Densification and shrinking diameters. ACM Transactions on Knowledge Discov-
ery from Data (TKDD) 1, 1 (2007), 2.
[26] Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network
Dataset Collection. hŠp://snap.stanford.edu/data. (June 2014).
[27] Marina Meila. 2003. Comparing clusterings by the variation of information. In
Learning theory and kernel machines. Springer, 173–187.
[28] Mark EJ Newman and Aaron Clauset. 2016. Structure and inference in annotated
networks. Nature Communications 7 (2016), 11863.
[29] Mark EJ Newman and Michelle Girvan. 2004. Finding and evaluating commu-
nity structure in networks. Physical review E 69, 2 (2004), 026113.
[30] Sandra Orchard, Mais Ammari, Bruno Aranda, Lionel Breuza, Leonardo Brig-
anti, Fiona Broackes-Carter, Nancy H Campbell, Gayatri Chavali, Carol Chen,
Noemi Del-Toro, and others. 2013. OEe MIntAct project-IntAct as a common
curation platform for 11 molecular interaction databases. Nucleic acids research
42, D1 (2013), D358–D363.
[31] Shuye Pu, Jessica Wong, Brian Turner, Emerson Cho, and Shoshana J Wodak.
2008. Up-to-date catalogues of yeast protein complexes. Nucleic acids research
37, 3 (2008), 825–831.
[32] Usha Nandini Raghavan, R´eka Albert, and Soundar Kumara. 2007. Near linear
time algorithm to detect community structures in large-scale networks. Physical
Review E 76, 3 (2007), 036106.
[33] M Rosvall and C T Bergstrom. 2008. Maps of random walks on complex net-
works reveal community structure. Proceedings of the National Academy of Sci-
ences of the United States of America 105, 4 (Jan. 2008), 1118–1123.
[34] Chong Su, Jose M Peregrin-Alvarez, Gareth Butland, Sadhna Phanse, Vincent
Fong, Andrew Emili, and John Parkinson. 2007. Bacteriome. org-an integrated
protein interaction database for E. coli. Nucleic acids research 36, suppl 1 (2007),
D632–D636.
[35] Haiyuan Yu, Pascal Braun, Muhammed A Yıldırım, Irma Lemmens, Kavitha
Venkatesan, Julie Sahalie, Tomoko Hirozane-Kishikawa, Fana Gebreab, Na Li,
Nicolas Simonis, and others. 2008. High-quality binary protein interaction map
of the yeast interactome network. Science 322, 5898 (2008), 104–110.
OEis work presents a number of interesting potential future av-
enues for research, such as observing how query sets change in
time dynamic or multi-scale networks. Furthermore, as the algo-
rithm is trivial to run in a distributed manner, this approach could
be applied to larger graphs than those studied in this paper. Further
research should also be conducted into how this approach could be
applied to other partition quality functions, such as the infomap
algorithm [33]. OEe method was implemented in python and all
so‰ware is available at:
hŠps://github.com/SBRCNoŠingham/cluster query tool.
ACKNOWLEDGEMENTS
We would like to thank Nicole Pearcy and Jenna Reps for assis-
tance preparing this manuscript. We are grateful for access to the
University of NoŠingham High Performance Computing Facility.
OEis work was supported by the UK Biotechnology and Biological
Sciences Research Council (BBSRC) grant BB/L013940/1.
REFERENCES
[1] Yong-Yeol Ahn, James P Bagrow, and Sune Lehmann. 2010. Link communities
reveal multiscale complexity in networks. Nature 466, 7307 (2010), 761–764.
[2] Austin R Benson, David F Gleich, and Jure Leskovec. 2016. Higher-order orga-
nization of complex networks. Science 353, 6295 (2016), 163–166.
[3] Vincent D Blondel, Jean-Loup Guillaume, Renaud LambioŠe, and Etienne Lefeb-
vre. 2008. Fast unfolding of communities in large networks. Journal of Statistical
Mechanics: Šeory and Experiment 2008, 10 (2008), P10008.
[4] Ulrik Brandes, Daniel Delling, Marco Gaertler, Robert Gorke, Martin Hoefer,
Zoran Nikoloski, and Dorothea Wagner. 2007. On Finding Graph Clusterings
with Maximum Modularity Graph-OEeoretic Concepts in Computer Science.
In Graph-Šeoretic Concepts in Computer Science, Andreas Brandstadt, Dieter
Kratsch, and Haiko Muller (Eds.). Lecture Notes in Computer Science, Vol. 4769.
Springer Berlin / Heidelberg, Berlin, Heidelberg, Chapter 12, 121–132. DOI:
hŠp://dx.doi.org/10.1007/978-3-540-74839-7 12
[5] Tolga Can, Orhan C¸amoglu, and Ambuj K Singh. 2005. Analysis of protein-
protein interaction networks using random walks. In Proceedings of the 5th in-
ternational workshop on Bioinformatics. ACM, 61–68.
[6] Seth Carbon, Amelia Ireland, Christopher J Mungall, ShengQiang Shu, Brad
Marshall, Suzanna Lewis, and others. 2009. AmiGO: online access to ontology
and annotation data. Bioinformatics 25, 2 (2009), 288–289.
[7] Seth Carbon, Amelia Ireland, Christopher J Mungall, ShengQiang Shu, Brad
Marshall, Suzanna Lewis, AmiGO Hub, and Web Presence Working Group. 2008.
AmiGO: online access to ontology and annotation data. Bioinformatics 25, 2
(2008), 288–289.
[8] Edward Y Chen, Christopher M Tan, Yan Kou, Qiaonan Duan, Zichen Wang,
Gabriela Vaz Meirelles, Neil R Clark, and Avi Ma'ayan. 2013. Enrichr: interac-
tive and collaborative HTML5 gene list enrichment analysis tool. BMC bioinfor-
matics 14, 1 (2013), 128.
[9] Xing Chen, Ming-Xi Liu, and Gui-Ying Yan. 2012. Drug–target interaction pre-
diction by random walk on the heterogeneous network. Molecular BioSystems
8, 7 (2012), 1970–1978.
[10] Pierre Demartines and Jeanny H´erault. 1997. Curvilinear component analysis:
A self-organizing neural network for nonlinear mapping of data sets. Neural
Networks, IEEE Transactions on 8, 1 (1997), 148–154.
[11] Matija Dreze, Anne-Ruxandra Carvunis, Benoit Charloteaux, Mary Galli,
Samuel J Pevzner, Murat Tasan, Yong-Yeol Ahn, Padmavathi Balumuri, Albert-
L´aszl´o Barab´asi, Vanessa Bautista, and others. 2011. Evidence for network evo-
lution in an Arabidopsis interactome map. Science 333, 6042 (2011), 601–607.
[12] Santo Fortunato and Marc Barth´elemy. 2007. Resolution limit in community
detection. Proceedings of the National Academy of Sciences of the United States
of America 104, 1 (2007), 36–41.
[13] Santo Fortunato and Darko Hric. 2016. Community detection in networks: A
user guide. Physics Reports 659 (2016), 1–44.
[14] JP Gilbert. 2015. A probabilistic model for the evaluation of module extraction
algorithms in complex biological networks. Ph.D. Dissertation. University of Not-
tingham.
[15] Michelle Girvan and Mark EJ Newman. 2002. Community structure in social
and biological networks. Proceedings of the national academy of sciences 99, 12
(2002), 7821–7826.
[16] David F Gleich and C Seshadhri. 2012. Vertex neighborhoods, low conductance
cuts, and good seeds for local community methods. In Proceedings of the 18th
8
|
1808.00554 | 2 | 1808 | 2018-09-05T08:19:48 | Traj2User: exploiting embeddings for computing similarity of users mobile behavior | [
"cs.SI",
"cs.DB"
] | Semantic trajectories are high level representations of user movements where several aspects related to the movement context are represented as heterogeneous textual labels. With the objective of finding a meaningful similarity measure for semantically enriched trajectories, we propose Traj2User, a Word2Vec-inspired method for the generation of a vector representation of user movements as user embeddings. Traj2User uses simple representations of trajectories and delegates the definition of the similarity model to the learning process of the network. Preliminary results show that Traj2User is able to generate effective user embeddings. | cs.SI | cs |
Traj2User: exploiting embeddings for
computing similarity of users mobile behavior
Andrea Esuli1, Lucas May Petry2, Chiara Renso1, and Vania
Bogorny2
1ISTI-CNR, Pisa, Italy
2Programa de P´os-Gradua¸cao em Ciencia da Computa¸cao,
Universidade Federal de Santa Catarina, Florianopolis, Brazil
Abstract
Semantic trajectories are high level representations of user movements
where several aspects related to the movement context are represented as
heterogeneous textual labels. With the objective of finding a meaning-
ful similarity measure for semantically enriched trajectories, we propose
Traj2User, a Word2Vec-inspired method for the generation of a vector
representation of user movements as user embeddings.
Traj2User uses simple representations of trajectories and delegates
the definition of the similarity model to the learning process of the net-
work. Preliminary results show that Traj2User is able to generate ef-
fective user embeddings.
1
Introduction
The widespread use of GPS-equipped smartphones or positioning sensors ap-
plied to vehicles and animals, tend to produce a high number of trajectories,
recording the spatio-temporal evolution of these objects. These raw trajectories
can be enriched with semantic information to what is called semantic trajecto-
ries [15, 13], adding more meaning to the pure geometric movement facets.
In the era of Big Data, with the explosion of geolocated social media and
other kinds of user generated data (e.g. Wikipedia, Flickr, etc), human mobil-
ity data can be significantly enriched with information that encompasses our
daily life. Enriching information include weather conditions, the transportation
means, the goal or the activity performed during the movement, the opinions
and comments about people and places, the mood, being with a friend, just to
name a few examples discussed in [6] and [2].
Being able to find similarities between trajectories enables several analysis
methods like clustering or applications like recommendation systems. Several
similarity measures have been proposed for both raw and semantic trajectories,
1
Figure 1: Example of two semantically rich trajectories P and Q.
such as EDR[4], LCSS [17], Cats [9], EDWp [14], UMS[7], MSM [8], and other
approaches as presented in [1], [11] and [18]. However, these methods analyze a
few trajectory attributes and are far from considering all the different semantic
aspects that involve movement: previous works have mainly analyzed seman-
tic trajectories over one single aspect at a time, such as stops and moves, or
transportation means, or activities.
The great challenge here is how to integrate all such heterogeneous dimen-
sions in a similarity measure dealing with space, time, and multiple semantics.
Figure 1 shows an example of two semantic trajectories P and Q from users
u1 and u2. The question we want to answer is "how similar are u1 and u2 given
their semantic trajectories P and Q?".
As can be observed, first of all, the size of trajectories P and Q is different.
Both users are shopping at the same place (same spatial location) while on
foot (same transportation means) and when the weather is rainy (same weather
condition). On the other hand, both users at some time (time dimension) watch
TV, but on a different spatial location. Indeed, while the user of trajectory P
moves on foot and by bus, the user of trajectory Q moves on foot and by car.
Given all these different and heterogeneous data dimensions related to tra-
jectories, where each dimension has its own similarity model, how can we com-
pute the user similarity based on their trajectories P and Q considering all this
information together?
In this paper we represent users by modeling the many semantic aspects that
describe their movement habits. We take inspiration from word embeddings [12]
methods that model the semantics of a word, and its similarity with other words,
by observing the many contexts of use of the word in the language.
We therefore introduce here, for the first time, the new concept of user
embeddings as a way to represent the semantically rich movements of a user.
We also propose the Traj2User model for measuring the semantic trajectory
similarity of moving users. The main contribution of Traj2User is that it
does neither need any explicit definition of the similarity functions for the data
dimensions nor any explicit modeling of the relations between data dimensions,
2
PShopping(Mall)Studying(University)On footOn footBy busBy busOn footWatching TV(Home)On footBy carQWatching TV(Home)since these are implicitly learned from data.
Experiments show that the neural model of Traj2User learns user embed-
dings that better capture user similarity than other embedding methods that are
also inspired to language models. We believe that exploiting vectors to represent
semantically complex movements is promising for the analysis of semantically
enriched movement since several heterogeneous semantic aspects are uniformly
modeled into a unique and compact form. One recent approach that considers
Point of Interest (POI) and embeddings is the paper [5] where authors propose
a method to jointly model the user preference and the sequence of POIs for
predicting future visitors for a given POI.
2 Methodology
2.1 Basic definitions
We start our definitions with a state-of-art concept of raw trajectories, that has
only space and time dimensions.
Definition (Raw trajectory) A raw trajectory is the sequence of timestamped
locations of the traced moving object o in the form < o, < x1, y1, t1, . . . xn, yn, tn >>,
where each xi, yi represents the geographical coordinates and ti the timestamp
for each i = 1, . . . , n.
In this paper we define a semantic trajectory based on trajectory segments
(or movements).
Definition (Segmented Trajectory) A segmented trajectory of the moving ob-
ject o is a pair t =< o, s1, ..., sn > such that, for each i = 1, ..., n, si is a
contiguous part of the trajectory split based on some criteria.
Examples of segmenting criteria are the stops and moves [15], the trans-
portation means or the purpose of the trip [2].
Definition (Semantic Trajectory) A semantic trajectory of an object o is a
pair t = < o,{< s1, l11, ..l1k >, ..., < sn, ln1, ...lnk >} > such that, for each
i=1,. . . ,n and j=1, . . . , k lij is the j-th semantic label for the segment si.
A semantic trajectory, in the context of this work, is a segmented trajectory
where each segment is enriched with a number of different labels that represent
different semantic aspects of the trajectory segment. Considering again Figure 1,
we see that the first trajectory has 5 segments while the second has 3 segments.
The semantic representation of the first trajectory is P = <u1, <s1, "on foot",
"watching TV","sunny">, <s2, "by bus, "going to University", "sunny">, <s3,
"on foot", "studying", "sunny">, <s4, "by bus", "going shopping", "rainy">,
<s5, "on foot", "shopping", "rainy">>
2.2 Building the user embeddings
In this work we want to build vectorial representations in an embedding space,
for each user, in a population of observed individuals. Each user is represented
by a variable-sized set of semantically rich movements. We can consider each
3
movement as a context of the user's life. We observe that this situation is
similar to the one in language modeling [16, 10], where one wants to model
the semantic properties of a word and measure the semantic similarity between
words by observing the many contexts in which the word appears. The intuition
of this work is based on the observation that the similarity between two words
(e.g., king, queen) can be inferred by observing that they frequently appear in
similar contexts (e.g., near other words such as castle, crown, empire, throne. . . ).
Analogously, the similarity between two users can be inferred by observing that
their semantic trajectories frequently have similar semantic values.
Following this parallel between words and users, we make here a first ex-
ploration of how some methods for the construction of word embeddings can
be applied to the process of constructing user embeddings. In our approach we
convert the label of each segment of a semantic trajectory into a vectorial rep-
resentation (i.e., a movement descriptor as defined in Section 2.2.1). We then
combine the various movement descriptors of a user into a single user embed-
ding. We test three main models for the construction of user embeddings, which
are described in Section 2.2.2.
2.2.1 Encoding of trajectories into vectors
The various labels of a semantic trajectory are heterogeneous by nature and
therefore they may have very different forms. In this work we decided to build
a movement descriptor by encoding all the values of the segment labels using a
one-hot encoding. Given a label a with na possible different values, an actual
value la for the label is encoded as a na-sized vector with a one in the position
corresponding to the value la and na − 1 zeros for all the other possible values.
The result of encoding a movement descriptor is thus a vector d of length d =
a∈A na, where A is the set of labels.
We are aware that one-hot encoding does not explicitly model any complex
relation between values, e.g., values on ordinal scales. Our approach follows the
idea of leaving to the embedding generation method the burden of discovering
the relations between the values of a label (and across labels).
(cid:80)
2.2.2 Generating user embeddings
approach is to sum all the vectors into a single vector, i.e., ei = (cid:80)
The set of vectors representing movements and associated to a user must be
reduced into a single vector that represents the user embedding. A very simple
di,
where Di identifies all the descriptors associated to the user ui (Sum method).
Stacking all the resulting sum vectors for all users produces a matrix M
of size U · d. This is similar to what is done when building a word-context
matrix to create a language model, in which the position Ti,j of a matrix T of
size V · V stores the sums up of how many times the word wj ∈ V appears
nearby (in the context of) the word wi ∈ V , where V is a vocabulary.
di∈Di
Vectors deriving from raw sums can suffer skewness due to some values
being much more frequent than others (e.g., weekday in our dataset). Such
4
very frequent values may dominate the directions of vectors and at the same
time they may not be very discriminative.
Inspired by the approaches used in language modeling to address this issue,
we tested a number of methods1 to produce a weight-corrected matrix M of
user embeddings starting from the Sum matrix2 M :
Positive point-wise mutual information (PPMI) [3] measures the dependence
between the two observed variables (a user and a specific attribute value) only
on the occurrence of events, i.e., how much the probability of the two events to
occur together differs from chance3.
M(i,j) = P P M I(ui, dj) = max(log2(
P (ui, dj
P (ui)P (dj)
), 0)
(1)
Softmax (SM) is often used to normalize a vector so that all its values are in
the [0, 1] interval and their sum is one, i.e., a categorical probability distribution.
M(i,j) = σ(M(i,j)) =
(2)
(cid:80)d
eM(i,j)
k=1 eM(i,k)
None of the methods described so far actually explores the latent correlations
between the values of the labels, within a label or among labels.
Methods based on matrix decomposition, such as singular value decomposi-
tion (SVD) may exploit these latent relations modeling them in a project space
that is not constrained to the original encoding of values. Truncated SVD allows
to generate shorter embeddings, possibly removing noise components from input
data. We tested SVD in combination with the previously described methods
(i.e., SVD-PPMI,
SVD-SM) with all the above listed methods, and using various reduction
factors f , where the resulting user embedding length is d/f . In this paper we
propose the Traj2User method that is inspired to the Word2Vec [12] method
for the generation of word embeddings. The skip-gram variant of Word2Vec
learns word embeddings as a by-product of training a two-layer network on the
task of predicting from a single word other words that may appear in its context.
In the Traj2User network4, the role of the input word is taken by a user
id, and the context by a movement descriptor. Given a user ui represented as a
one-hot vector and one movement descriptors di
j, the first layer of the network
selects the user embedding ei = W T ui, i.e., the matrix W is the matrix of user
embeddings. The second layer multiplies ei to a second weight matrix W (cid:48) and
applies the sigmoid activation function5 S(x) = 1
1−e−x to predict the movement
1We also tested simple l1 and l2 normalization, with negative results.
2We also tested the application of such weighting methods to the distinct blocks of the
matrix M that identify the values from a single label, again with negative results.
3A small dataset, like our, can generate negative values due to lack of a sufficient number
of observations. For this reason negative values are clipped to zero.
4The Word2Vec model uses many tricks, such as hierarchical softmax and negative sam-
In this work we explore a "simple" model, leaving the
pling, to improve its performance.
evaluation of these methods to future work.
5We tested also the Softmax function, with negative results.
5
Label
Purpose
Vehicle
Start hour
End hour
Duration
Range
Weather
Weekday
Values
at home, at work, eat out, shopping (food), shopping
(other), social events, study, entertainment (sport, theater,
museum. . . ), services (doctor, bank, hairdresser. . . ), pick-
ing up/taking someone home, fueling, stop (changing trans-
portation), not specified, incomplete tracking (dead battery,
app crash)
car, bicycle, motorcycle, city public transport (but, metro),
taxi, train, boat, on foot, not specified
0-23
0-23
<5 min, 5-8 min, 8-12 min, 12-20 min, >20 min
<1 km, 1 to 2 km, 2 to 4 km, 4 to 10 km, > 10 km
sunny, rain, fog, cloudy, not specified
weekday, weekend
Total count
N.
14
9
24
24
5
5
5
2
88
Table 1: Attributes describing trajectories in the dataset.
descriptor d = S(W (cid:48)T ei). d is compared to di
j so that backpropagation updates
W (cid:48) and W .
The length of user embeddings ei is a free parameter of the model. Differ-
ently from the previous methods, Traj2User makes possible to set ei > d,
i.e., expanding the representation space. The idea supporting the use of a rep-
resentation space bigger than the original descriptors, is that it may be able to
capture and represent more relationships between the attributes.
3 Experiments
3.1 Dataset
The raw trajectories dataset has been collected by volunteers using GPS-enabled
smartphones in the area of Pisa in the period from May 20, 2014 to Septem-
ber 30, 2014, in the context of the TagMyDay6 experiment. Each user tracked
his/her movements by using a GPS tracking app installed in their mobile phone.
Each volunteer could freely decide which part of their daily movement to track
by starting the application. Each trajectory has been uploaded into the experi-
ment web site. Here, trajectory segments are automatically computed from the
raw data identifying the different movements between two stops. Then, from
the web interface the users could annotate these segments with semantic labels
like the purpose of the trip, the means of transportation, the weather. Other
information has been computed automatically from the raw trajectory like the
6We obtained this data under a non-disclosure agreement, therefore we cannot directly
redistribute it. More information at http://kdd.isti.cnr.it/project/tagmyday
6
1
2
compression factor f
0.5
method
Sum
n/a
n/a
PPMI
n/a
SM
n/a
SVD-PPMI
SVD-SM
n/a
Traj2User 0.858
0.748
0.708
0.378
0.708
0.394
0.858
n/a
n/a
n/a
0.706
0.394
0.844
4
n/a
n/a
n/a
0.666
0.393
0.803
8
n/a
n/a
n/a
0.605
0.363
0.774
Table 2: Comparison of the methods for the generation of user embeddings.
Average MRR value across 1,000 test pairs.
temporal duration of the segment, the spatial length and the day of the week
(weekday, weekend).
After the annotation task, a semantically enriched trajectory is identified by
the attributes listed in Table 1.
The dataset contains traces of 157 users for a total of 10,880 segments.
The distribution of the number of trajectories associated to the users follows
an exponential decay with the most active user having produced 727 segments
and a tail of 39 users with less than 5 segments. The encoding of a trajectory
segment into a movement descriptor produces a vector of length d = 88 (see
Table 1).
3.2 Experiments and results
1
ra
b
(cid:80)
(ua,ub)∈P
We designed our experiment as a similarity search problem. Given two users
ua and ub which are known to have very similar mobility habits, we rank all
users in U \ {ua} by the similarity of their embedding with ea, using the cosine
similarity function, and observe the rank ra
b of ub. We repeat this on a large set
of pairs of similar users P and measure the mean reciprocal rank M RR(P ) =
1P
across all pairs. The higher the M RR score the better, since it
indicates that the embeddings capture the similarities among the (ua, ub) pairs.
Our dataset does not have an explicit evaluation of similarities among users.
To solve this issue we created the pairs of similar users by randomly selecting a
user ua from U and then randomly distributing the movement descriptors of ua
between two 'virtual' users u(cid:48)
a and u(cid:48)(cid:48)
a, which actually define a test pair. Given
a pair (u(cid:48)
a), to capture the similarity between these two users we train user
embeddings on the set of users U ∪ {u(cid:48)
a} \ {ua}. We generated a test set of
a, u(cid:48)(cid:48)
1,000 pairs using this method. Each training of user embeddings consisted of
1,000 epochs, with shuffling after each epoch.
a, u(cid:48)(cid:48)
Results of experiments7 (Table 2) show that Traj2User outperforms the
other tested method by a large margin, i.e., a 14.7% relative improvement over
7We implemented Traj2User on PyTorch. Upon acceptance we will make the code avail-
able on GitHub.
7
User-by-user similarity modeled by Traj2User on a simulated
Figure 2:
population with 20 groups, each one of 10 users (the lighter the color the most
similar the pair of users).
sum, the second best performer8. An interesting negative result emerges from
the comparison of Sum, with PPMI, SM and their SVD methods. These latter
methods, that are typically applied with success on language modeling tasks
perform poorly on our task. We measured that the distribution of frequency
of values in the TagMyDay dataset follow a logarithmic distribution and not
the typical Zipf distribution of words in text, yet it is hard to consider this
difference as the cause of the drop in MRR. We leave the investigation of this
aspect to future work. Softmax-based methods are by far the worst performers,
indicating that forcing a probabilistic interpretation of the observed data is a
wrong design choice. Shorter embeddings, either from truncated SVD or set-
ting smaller size in Traj2User, reduce the MRR. However, even the shortest
Traj2User embedding, with f = 8 (ei = 11) outperforms Sum, indicating a
graceful degradation of performance and the possibility of exploiting data com-
pression. Larger embeddings performed as the original-length ones, indicating
that the information contained in the relatively small dataset we were able to
obtain was already fully modeled in the original-length embeddings.
We ran a further experiment to check if Traj2User user embeddings are
able to discover groups of similar users and to consistently model similarities
across groups. We used the method for the creation of virtual users described
in this section to create a population of 2,000 users composed of 20 groups of
100 virtual users, each one generated from a real user randomly sampled from
the TagMyDay dataset. Figure 2 visualizes the cosine similarity among users
8The difference is statistically significant for a t-test on the reciprocal rank score across
the 1,000 test pair with p = 3.66 · 10−5.
8
measured on Traj2User user embeddings. Virtual users in the same group
are adjacent. As shown, Traj2User captures the (imposed) within-group sim-
ilarity between users (the light blocks on the diagonal), and also consistently
models the (casual) inter-group similarities.
4 Conclusions and Future Works
Traj2User is an innovative way to generate effective user embeddings, starting
from simple representations of semantic trajectories and delegating the defini-
tion of the similarity model to the learning process of the network. Although
the TagMyDay dataset is limited to a few labels, the method is general enough
to expand the amount and forms of semantic information (e.g. interactions of
the user with social platforms like ratings and comments on Foursquare or Tri-
pAdvisor). For example, when the information comes in the form of a piece of
text, it can be encoded into a semantic-rich vector using neural language models,
e.g., paragraph vectors [10]. As future works we plan to make experiments on
other datasets publicly available gathered from social media, and to extend the
Traj2User network with a recurrent component, so as to model multi-segment
trajectories as a single entity.
Acknowledgments
The present paper has been partially supported by the MASTER project that
has received funding from the European Union's Horizon 2020 research and
innovation programme under the Marie-Slodowska Curie grant agreement N.
777695 and the FAPESC project MATCH N. UER2017061000002
References
[1] Donald J Berndt and James Clifford. Using dynamic time warping to find
patterns in time series. In KDD workshop, volume 10, pages 359 -- 370. AAAI
Press, 1994.
[2] Vania Bogorny, Chiara Renso, Artur Ribeiro de Aquino, Fernando
de Lucca Siqueira, and Luis Otavio Alvares. CONSTAnT -- a conceptual
data model for semantic trajectories of moving objects. Transactions in
GIS, 18(1):66 -- 68, 2014.
[3] John A. Bullinaria and Joseph P. Levy. Extracting semantic representa-
tions from word co-occurrence statistics: A computational study. Behavior
Research Methods, 39(3):510 -- 526, Aug 2007.
[4] Lei Chen, M. Tamer Ozsu, and Vincent Oria. Robust and fast similar-
In Proc. of the ACM Inter-
ity search for moving object trajectories.
9
national conference on Management of Data (SIGMOD), pages 491 -- 502.
ACM, 2005.
[5] Shanshan Feng, Gao Cong, Bo An, and Yeow Meng Chee. Poi2vec: Geo-
graphical latent representation for predicting future visitors. In Proceedings
of the Thirty-First AAAI Conference on Artificial Intelligence, February 4-
9, 2017, San Francisco, California, USA., pages 102 -- 108, 2017.
[6] Carlos Andres Ferrero, Luis Otavio Alvares, and Vania Bogorny. Multiple
aspect trajectory data analysis: Research challenges and opportunities. In
XVII Brazilian Symposium on Geoinformatics, GEOINFO '16, pages 1 -- 12,
Campos do Jordao, SP, Brazil, 2016. GEOINFO.
[7] Andre Salvaro Furtado, Luis Otavio Campos Alvares, Nikos Pelekis, Yan-
nis Theodoridis, and Vania Bogorny. Unveiling movement uncertainty for
robust trajectory similarity analysis. International Journal of Geographical
Information Science, 32(1):140 -- 168, 2018.
[8] Andre Salvaro et al. FURTADO. Multidimensional similarity measuring
for semantic trajectories. Transactions in GIS, 20(2):280 -- 298, 2016.
[9] Chih-Chieh Hung, Wen-Chih Peng, and Wang-Chien Lee. Clustering and
aggregating clues of trajectories for mining trajectory patterns and routes.
VLDB J., 24(2):169 -- 192, 2015.
[10] Quoc V. Le and Tomas Mikolov. Distributed representations of sentences
and documents. CoRR, abs/1405.4053, 2014.
[11] Hechen Liu and Markus Schneider. Similarity measurement of moving
object trajectories. In Proceedings of the 3rd ACM SIGSPATIAL Interna-
tional Workshop on GeoStreaming (IWGS '12), pages 19 -- 22, New York,
NY, USA, 2012. ACM.
[12] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean.
Distributed representations of words and phrases and their composition-
ality.
In Advances in Neural Information Processing Systems 26, pages
3111 -- 3119. Curran Associates, Inc., 2013.
[13] Christine Parent, Stefano Spaccapietra, Chiara Renso, Gennady L. An-
drienko, Natalia V. Andrienko, Vania Bogorny, Maria Luisa Damiani, Aris
Gkoulalas-Divanis, Jos´e Antonio Fernandes de Macedo, Nikos Pelekis, Yan-
nis Theodoridis, and Zhixian Yan. Semantic trajectories modeling and
analysis. ACM Comput. Surv., 45(4):42, 2013.
[14] Sayan Ranu, Deepak P, Aditya D. Telang, Prasad Deshpande, and Sriram
Raghavan. Indexing and matching trajectories under inconsistent sampling
rates. In 31st IEEE International Conference on Data Engineering, ICDE
2015, Seoul, South Korea, April 13-17, 2015, pages 999 -- 1010, 2015.
10
[15] Stefano Spaccapietra, Christine Parent, Maria Luisa Damiani, Jose Anto-
nio de Macedo, Fabio Porto, and Christelle Vangenot. A conceptual view
on trajectories. Data and Knowledge Engineering, 65(1):126 -- 146, 2008.
[16] Peter D Turney and Patrick Pantel. From frequency to meaning: Vector
space models of semantics. J. of artificial intelligence research, 37:141 -- 188,
2010.
[17] M. Vlachos, G. Kollios, and D. Gunopulos. Discovering similar multidi-
mensional trajectories. In Proceedings of the 18th International Conference
on Data Engineering, pages 673 -- 684, San Jose, CA, USA, 2002. IEEE.
[18] Xiangye Xiao, Yu Zheng, Qiong Luo, and Xing Xie. Inferring social ties
between users with human location history. Journal of Ambient Intelligence
and Humanized Computing, 5(1):3 -- 19, 2014.
11
|
1904.12593 | 1 | 1904 | 2019-04-07T21:01:21 | Density-based Community Detection/Optimization | [
"cs.SI",
"cs.IR",
"physics.soc-ph"
] | Modularity-based algorithms used for community detection have been increasing in recent years. Modularity and its application have been generating controversy since some authors argue it is not a metric without disadvantages. It has been shown that algorithms that use modularity to detect communities suffer a resolution limit and, therefore, it is unable to identify small communities in some situations. In this work, we try to apply a density optimization of communities found by the label propagation algorithm and study what happens regarding modularity of optimized results. We introduce a metric we call ADC (Average Density per Community); we use this metric to prove our optimization provides improvements to the community density obtained with benchmark algorithms. Additionally, we provide evidence this optimization might not alter modularity of resulting communities significantly. Additionally, by also using the SSC (Strongly Connected Components) concept we developed a community detection algorithm that we also compare with the label propagation algorithm. These comparisons were executed with several test networks and with different network sizes. The results of the optimization algorithm proved to be interesting. Additionally, the results of the community detection algorithm turned out to be similar to the benchmark algorithm we used. | cs.SI | cs | DENSITY BASED COMMUNITY DETECTION/OPTIMIZATION
Rui Portocarrero Sarmento
LIAAD-INESC TEC
PRODEI - Faculty of Engineering, University of Porto
[email protected]
9
1
0
2
r
p
A
7
]
I
S
.
s
c
[
1
v
3
9
5
2
1
.
4
0
9
1
:
v
i
X
r
a
April 30, 2019
ABSTRACT
Modularity-based algorithms used for community detection have been increasing in recent years.
Modularity and its application have been generating controversy since some authors argue it is not
a metric without disadvantages. It has been shown that algorithms that use modularity to detect
communities suffer a resolution limit and, therefore, it is unable to identify small communities in
some situations. In this work, we try to apply a density optimization of communities found by the
label propagation algorithm and study what happens regarding modularity of optimized results. We
introduce a metric we call ADC (Average Density per Community); we use this metric to prove
our optimization provides improvements to the community density obtained with benchmark algo-
rithms. Additionally, we provide evidence this optimization might not alter modularity of resulting
communities significantly. Additionally, by also using the SSC (Strongly Connected Components)
concept we developed a community detection algorithm that we also compare with the label prop-
agation algorithm. These comparisons were executed with several test networks and with different
network sizes. The results of the optimization algorithm proved to be interesting. Additionally, the
results of the community detection algorithm turned out to be similar to the benchmark algorithm
we used.
Keywords Social Networks · Community Detection Optimization · Modularity · Community Density
1 Developments and Benchmark
Several developments were made to test the hypothesis. An algorithm was developed, and a metric is introduced in
the following sections.
1.1 Average Density per Community (ADC) measure
Average Density per Community (ADC) is the measure that is used to compare the algorithm results and is given by
the following formula:
n(cid:88)
Ci=1
ADC =
1
nC
Density(Ci)
where nC is the number of communities identified in the graph, Density(Ci) is the density of each community Ci.
1.2 Optimization Algorithm
Algorithm 1 provides the sequence of tasks we are doing to test the hypothesis 1. We start by using the results of a
community detection algorithm. Then, we try to discover if the communities can be disbanded in smaller communities.
1Available Code at https://github.com/Sarmentor/Density-based-Community-Detection-Optimization.
These smaller communities are strongly connected components, i.e., groups of nodes with higher density. Then, if the
average community density of the disbanded communities is higher than the original community the disbanding is
indeed executed.
If not, the community founded by the benchmark algorithm is not disbanded and maintains its
original id.
APRIL 30, 2019
(cid:46) Node List and their Community
(cid:46) New Community Structure
(cid:46) If community has more than 1 component
SCC ← STRONG CONNECTED COMPONENTS OF COMMUNITY(Communityi)
mdc ← MEAN DENSITY OF COMPONENTS(SCCs)
if mdc > Community Density then
if ncomponents > 1 then
Algorithm 1 Algorithm Pseudo-Code for Optimization of Community Density
Input: Communities Data
Output: Community Results
1: while not at the end of Original Communities list do
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
end if
14:
15: end while
for SCCi ∈ Community do
end for
process next community
do nothing
Community Results ← COMPONENTNODESFORMNEWCOMMUNITY(SCCi)
else
end if
else
1.3 Community Detection Algorithm
We developed an algorithm for community detection based on density 2. Moreover, we start by finding strongly
connected components in a graph. Then, we initialize all found components to initial communities. After that, we
propagate the communities label by aggregating, for each component, the nearby component that maximizes the
clustering coefficient of the resulting sub-graph. Algorithm 2 pseudo-code represents the algorithm.
Algorithm 2 Algorithm Pseudo-Code for Community Detection
Input: Graph Data
Output: Community Results
1: SCC ← STRONG CONNECTED COMPONENTS OF GRAPH(Graph Data)
2: while not at the end of SCC list do
3:
4:
5:
6:
end for
7:
8: end while
if Agg Subgraph CCoef f icient = max ccoef f ient then
for each nearbySCC do
end if
Community Results ← LABELNODESWITHSCCLABEL(N earby SCC N odes)
(cid:46) Edge List
(cid:46) Community Structure
(cid:46) While there are Components to Explore
1.4 Benchmark Algorithm
The algorithm we used for community detection was the label propagation algorithm. This algorithm, as its name
indicates, does the propagation of community label.
At initial condition, nodes carry a label that denotes the community they belong -- belonging to community changes,
based on the labels that the neighboring nodes possess. This change is subject to the maximum number of labels
within one degree of the nodes. Every node is initialized with a unique label then the labels diffuse through the
network. Consequently, densely connected groups reach a common label quickly. When many such dense (consensus)
groups are created throughout the network, they continue to expand outwards until it is possible to do so
Label propagation algorithm has the advantage in its running time, an amount of a priori information needed about
the network structure (no parameter is required to be known beforehand). The main disadvantage is that it produces
2Available Code at https://github.com/Sarmentor/Density-based-Community-Detection-Optimization.
2
no unique solution, but an aggregate of many solutions. Thus, this algorithm suffers from stability issues, and these
issues might be adjusted with our optimization algorithm.
We will try to apply our algorithm to the results obtained with the label propagation algorithm and see the changes in
ADC and also the modularity of both outcomes.
APRIL 30, 2019
1.5 Modularity function
We used a modularity measure Q to evaluate the quality of the community structure of a graph. Modularity serves as
the objective function during the process of calculating the communities Newman and Girvan (2004). This measure,
apart from being the most widely used Chen et al. (2015, 2013), was considered as the quality measure used in the
evaluation of the algorithms. Higher values for the modularity Q mean better community structures. Therefore,
the objective is to find a community assignment for each node in the network such that Q is maximized using the
modularity function defined by
(cid:20)
(cid:88)
(cid:21)
δ(ci, cj)
(1)
Aij represents the weight of the edge between i and j, ki =(cid:80)
i,j
Aij − kikj
2m
Q =
1
2m
(cid:80)
jAij is the sum of the weights of the edges attached
to vertex i, ci is the community to which vertex i is assigned, the δ-function δ(u, v) is 1 if u = v and 0 otherwise and
ijAij. To calculate the modularity of a specific community, the number of inner edges (in[n]) and the total
m = 1
2
number of edges (tot[n]) of a specific node n is used. The modularity of the full network can be calculated using the
previous Q function, by considering all the entries of in and tot for all the nodes.
2 Case Study
In this case study, we test our optimization algorithm with several toy networks. We used these networks to test the
hypothesis that our algorithm indeed provides improvements in the ADC measure in community detection. We also
provide a comparison of the modularity results with and without optimization.
Additionally, we test our community detection algorithm with the same networks. We provide a comparison with the
label propagation algorithm.
2.1 Data Description
First, we tried optimization with three toy networks. We will call them toynet1, toynet2, and toynet3. These toy
networks are directed graphs of small size. The following figures provide a visualization of these graphs. These toy
networks have a different disposition of nodes and have strongly connected components. Thus, they offer a good
starting point to apply our optimization algorithm.
Figure 1. Toy Network 1 (left), Toy Network 2 (middle) and Toy Network 3 (right)
2.2 Experiments
We proceeded by testing both algorithms with several more networks. First, we used three directed toy networks as we
previously stated. For the second test, we generated 99 directed networks from the previous toy networks by randomly
extracting one edge from each network. This network was a randomly selected network from the set of the three
previously described toy networks. This way we would get a mixture of new graphs and also might happen that some
3
APRIL 30, 2019
graphs are repeated among all the 99 graphs. Thus, we have the possibility of testing also if the algorithms behavior is
coherent for different runs.
2.2.1 Larger Networks
Additionally, since the generated networks are small size networks we did a third test with more extensive networks.
The results of these three tests are presented in the next section.
3 Results
This section presents the results of the experiments with our algorithms and the benchmark algorithm. Thus, we show
results for ADC and community detection for directed networks.
3.1 Community Optimization
With the toy networks the optimization algorithm had the results represented in the following table:
Table 1. Community Optimization
Results
Networks
Original ADC New ADC
Toynet1
Toynet2
Toynet3
0.238
0.250
0.650
0.708
0.833
0.833
Number
of new
communi-
ties
3
4
3
For the second test with the 99 networks the following Figure 2 exposes the improvements in the ADC measure with
our algorithm and comparing with the label propagation algorithm results.
Figure 2. ADC measure (left) and Modularity results (right) for 99 graphs - comparison between ADC optimization
algorithm results (blue) and label propagation results (red)
The blue lines indicate our algorithm results and the red lines show the label propagation results. The horizontal lines
provide the average of each graph.
With these results, it is clear that the algorithm provided better ADC than the ADC presented by the original com-
munities provided with the label propagation algorithm. Additionally, regarding modularity, the changes after the
optimization are not very significant.
3.2 Community Detection
With the toy networks the community detection algorithm had the results represented in the following tables:
4
APRIL 30, 2019
Table 2. Community Detection - 1st simulation
Modularity Results
Label Propagation Algorithm Our algorithm
Then, we did a second, third, fourth and fifth simulation. The second simulation had the following table results:
Table 3. Community Detection - 2nd simulation
Modularity Results
Label Propagation Algorithm Our algorithm
Networks
Toynet1
Toynet2
Toynet3
Networks
Toynet1
Toynet2
Toynet3
Networks
Toynet1
Toynet2
Toynet3
Networks
Toynet1
Toynet2
Toynet3
0.260
0
0.119
-0.004
0
0.283
-0.004
0
0.283
-0.004
0.283
0.283
0.202
0.252
0.253
0.202
0.252
0.253
0.202
0.252
0.253
0.202
0.252
0.253
Table 4. Community Detection - 3rd simulation
Modularity Results
Label Propagation Algorithm Our algorithm
Table 5. Community Detection - 4th simulation
Modularity Results
Label Propagation Algorithm Our algorithm
After these five simulations, we suspect the label propagation algorithm is very unstable regarding its results. This is
clear with the changes in the modularity results for each network simulation. Our algorithm seems to be more stable
and presents the same result for every simulation and each tested network. Thus, we proceeded with more tests and
with the 99 networks previously generated. The results for modularity are visible in Figure 3.
After previous measurements, it is visible that our algorithm presents similar results on average when compared with
the label propagation algorithm. This is true for average modularity.
3.2.1 ADC Comparison
We measured ADC for both the label propagation results and the developed algorithm for community detection. The
figures provide evidence that the developed algorithm improves ADC measure in large scale without loss of modularity
when compared with the benchmark algorithm.
This is an expected result since the basis of our algorithm for community detection is the primary detection of strongly
connected components which are inherently regions of high density in social networks.
4 Conclusions and Future Work
There is clear evidence our density optimization algorithms provide improvements when the label propagation results
are compared with the optimizations results. This is true with our test networks that are directed and small networks.
Additionally, robustness tests were done to ensure better that the algorithms are not unstable. These tests proved to be
successful, and when we used a more considerable amount of test networks, we still obtained better ADC results.
Regarding the community detection algorithm, in several tests we performed, it achieved similar average results for
the modularity measure which might indicate it is a fairly reasonable algorithm for directed networks. Additionally,
5
APRIL 30, 2019
Table 6. Community Detection - 5th simulation
Modularity Results
Label Propagation Algorithm Our algorithm
Networks
Toynet1
Toynet2
Toynet3
-0.004
0
0.017
0.202
0.252
0.253
Figure 3. ADC results (left) and Modularity results (right) for 99 graphs - comparison between our community detec-
tion algorithm results (blue) and label propagation results (red)
this algorithm provides community detection based on dense components, and therefore the density per community
(ADC) is higher than the compared benchmark algorithm.
Acknowledgments
This work was fully financed by the Faculty of Engineering of the Porto University. Rui Portocarrero Sarmento also
gratefully acknowledges funding from FCT (Portuguese Foundation for Science and Technology) through a Ph.D.
grant (SFRH/BD/119108/2016). The authors want to thank also to the reviewers for the constructive reviews provided
in the development of this publication.
References
Chen, M., Nguyen, T., and Szymanski, B. (2013). On measuring the quality of a network community structure. In
Social Computing (SocialCom), 2013 International Conference on, pages 122 -- 127.
Chen, M., Nguyen, T., and Szymanski, B. K. (2015). A new metric for quality of network community structure. CoRR,
abs/1507.04308.
Newman, M. E. J. and Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review
E, 69(2):026113+.
6
|
1110.4015 | 1 | 1110 | 2011-10-18T15:07:30 | The large-scale structure of journal citation networks | [
"cs.SI",
"cs.DL",
"physics.soc-ph"
] | We analyse the large-scale structure of the journal citation network built from information contained in the Thomson-Reuters Journal Citation Reports. To this end, we take advantage of the network science paraphernalia and explore network properties like density, percolation robustness, average and largest node distances, reciprocity, incoming and outgoing degree distributions, as well as assortative mixing by node degrees. We discover that the journal citation network is a dense, robust, small, and reciprocal world. Furthermore, in and out node degree distributions display long-tails, with few vital journals and many trivial ones, and they are strongly positively correlated. | cs.SI | cs |
The large-scale structure of journal citation networks
Massimo Franceschet
Department of Mathematics and Computer Science, University of Udine
Via delle Scienze 206 -- 33100 Udine, Italy
[email protected]
Abstract
We analyse the large-scale structure of the journal citation network built from
information contained in the Thomson-Reuters Journal Citation Reports. To
this end, we take advantage of the network science paraphernalia and explore
network properties like density, percolation robustness, average and largest node
distances, reciprocity, incoming and outgoing degree distributions, as well as as-
sortative mixing by node degrees. We discover that the journal citation network
is a dense, robust, small, and reciprocal world. Furthermore, in and out node
degree distributions display long-tails, with few vital journals and many trivial
ones, and they are strongly positively correlated.
Key words: Network science, bibliometrics, journal citation networks, journal
citation indicators.
1. Introduction
The present study is an interdisciplinary research integrating the fields of
network science and bibliometrics. The field of network science -- the holistic
analysis of complex systems through the study of the structure of networks that
wire their components -- exploded in the last decade, boosted by the availability
of large databases on the topology of various real networks, mainly the Web and
biological networks. The network science approach has been successfully applied
to analyse disparate types of networks, including technological, information,
social, and biological networks (Brandes and Erlebach, 2005; Newman et al.,
2006; Newman, 2010). Network analysis can be performed at different levels of
aggregation:
• Node-level analysis. At this level, the goal is to measure the importance
or centrality of a node within the network. Centrality here is not an
intrinsic and permanent feature of the node but, instead, it is an extrinsic
and fleeting property that depends on the interactions of the node with
the other nodes in the network. Typical node centrality measures include
degree, eigenvector, closeness and betweenness centrality.
Preprint submitted to JASIST
July 31, 2021
• Group-level analysis. This investigation involves methods for defining and
finding cohesive groups (clusters) of nodes in the network. The definition
of cluster depends only on the topology of the network. Clusters are
tightly knit sets of nodes with many edges inside the cluster and only a
few edges between clusters. Two typical methods at this level of analysis
are graph partitioning (where the number of clusters is fixed in advance)
and community detection (in which the number of clusters is unspecified).
• Network-level analysis. The focus of this analysis is on properties of net-
works as a whole such as connectivity, mean and largest distances among
nodes, distribution of node degrees, frequency of topological motifs, and
assortative/disassortative mixing. It also includes the investigation on the-
oretical models explaining the generation of networks with certain features
(e.g., random, small-world, and scale-free models).
Bibliometrics is an older field;
it is a branch of information and library
science that quantitatively investigates the process of publication of research
achievements (Garfield, 1955; de Solla Price, 1965). Networks abound in biblio-
metrics; two important examples are citation networks of articles, journals or
disciplines and collaboration networks of scholars. Other bibliometric networks
are co-citation and co-reference networks of articles, journals or disciplines.
Collaboration networks have been largely studied using the network science
approach (Newman, 2004; Barab´asi et al., 2002; Grossman, 2002; Moody, 2004;
Radicchi et al., 2004; Franceschet, 2011). Journal citation networks have been
investigated mainly at node- and group-levels. The investigation at the node-
level concerns the proposal of eigenvector-based centrality measures for journals
(Pinski and Narin, 1976; Bollen et al., 2006; West et al., 2010), the clustering
of journal bibliometric indicators, including centrality measures, on the basis of
the statistical correlation among them (Leydesdorff, 2009; Bollen et al., 2009),
as well as the use of betweenness centrality as an interdisciplinary indicator
for journals (Leydesdorff and Rafols, 2011). The group-level analysis of journal
citation networks focuses on the detection, using different methods, of com-
munities of journals, which correspond to fields of knowledge in the map of
science (Leydesdorff, 2004; Rosvall and Bergstrom, 2008; Klanans and Boyack,
2009; Leydesdorff et al., 2010).
The investigation of journal citation networks at the network-level has been
mainly focused on the study of the distribution of citations among papers
and journals (Seglen, 1992; Redner, 1998; Stringer et al., 2008; Radicchi et al.,
2008). The aim of the present investigation is to complement this investigation
with additional large-scale structure properties of journal citation networks.
More specifically, we focus on the following network properties: density of cita-
tion links, robustness with respect to the removal of nodes according to differ-
ent percolation strategies, average and largest path lengths, topological motifs
of reciprocity, incoming and outgoing degree distributions and their statistical
correlations, as well as assortative mixing with respect to incoming and outgoing
node degrees.
2
2. The large-scale structure of journal citation networks
We considered all science and social science journals indexed in Thomson-
Reuters Journal Citation Reports. We built a journal citation network in which
the nodes are the selected journals and there is a directed edge from node A
to node B if journal A published in 2008 a paper that cites a paper printed in
journal B in the temporal window between 2003 and 2007. We only took into
account the document types article and review. We considered the sub-network
corresponding to the largest strongly connected component of the original net-
work, which covers the large majority of the original network.1 The resulting
network is a directed unweighted graph with 6708 nodes and 1,315,238 edges
between journals with the property that there exists a directed path between
any pair of nodes. We loaded the network in the R environment for statisti-
cal computing (R Development Core Team, 2008) and analysed the structure of
the network using the R package igraph developed by G´abor Cs´ardi and Tam´as
Nepusz.
The first network property that we analyse is density. Graph density is the
relative fraction of edges in the graph, that is the ratio of the actual number of
edges and the maximum number of possible edges in the graph. The density of
the journal citation graph is 3%, meaning that the graph has 3 edges every 100
possible links between nodes. The density is much higher if we consider only top
journals with large total degree, where the total degree of a journal is the sum
of the number of incoming edges (citing journals) and the number of outgoing
edges (cited journals) of the journal in the network. We sorted the journals
in decreasing order of total degree and we computed the density of the graph
containing only an increasing share of top journals; the corresponding plot is
depicted in Figure 1. For instance, when only the top-30 journals are considered,
the citation network, which is shown in Figure 2, is almost complete2, with a
remarkably high density of 93% (only 64 edges out of the 870 possible edges are
missing). Notably, the density is relatively high (32%) also for the network of
top-1000 journals.
The journal citation graph is, by construction, strongly connected. This
means that there exists a directed path of citations between any pair of journals
in the graph: a researcher can start reading any journal in any subject, e.g.,
tribology, and by following links of citations, they can reach any other journal in
any other subject, e.g., mycology. Related to connectedness of a network is the
concept of robustness. Network robustness is typically investigated with a dy-
namic process called percolation. The percolation process progressively removes
nodes, as long as the edges connected to these nodes, from the network, and
studies how the connectivity of the network changes. In particular, one wants to
find the fraction of nodes to remove from the network in order to disintegrate its
1It is typical in network science to focus the analysis on the largest component when this is
a giant one, that is, when it includes the large majority of the nodes of the network (Newman,
2010).
2A complete graph, or clique, is a graph with all possible edges.
3
y
t
i
s
n
e
D
9
.
0
8
.
0
7
.
0
6
.
0
5
.
0
4
.
0
3
.
0
0
200
400
600
800
1000
Number of hubs
Figure 1: The density of the network of top journals (journals with high total degree). The
x axis shows the number of top journals (up to 1000) and the y axis gives the density of the
network containing only these journals.
giant strongly connected component into small components. If such a fraction
is relatively large, then the network is said to be robust to the process of perco-
lation. To realize the percolation process, we progressively removed nodes from
the collaboration network and, after each removal, we computed the relative
size of the largest strongly connected component of the resulting sub-network.
We tested the following node removal strategies (Newman, 2010):
1. degree-driven percolation, in which the nodes are removed in decreasing
order of node total degree (the sum of the in-degree and the out-degree of
the node);
2. eigenvector-driven percolation, in which the nodes are removed in decreas-
ing order of eigenvector centrality scores. A node has high eigenvector
score if it is pointed to by nodes which, recursively, have high eigenvector
scores;
3. closeness-driven percolation, in which the nodes are removed in decreasing
order of closeness centrality scores. A node has high closeness score if the
mean distance from the node to all other nodes in the network is low;
4. betweenness-driven percolation, in which the nodes are removed in decreas-
ing order of betweenness centrality scores. A node has high betweenness
score if the node lies on many geodesics (shortest paths) between other
nodes in the network.
4
Figure 2: The citation network of the top-30 journals. The (almost) complete graph resembles
some Escher's works.
Figure 3 shows the outcomes of the described percolation process. A couple
of observations emerge from the plot. First, the best percolation strategy is
based on the removal of nodes in order of betweenness centrality. It dominates
the total degree strategy, which is better than the closeness one. The least ef-
fective percolation strategy is the one based on eigenvector centrality. Hence,
when the objective is to dismantle the (strong) connectivity of the network,
removing 'broker' nodes (nodes with high betweenness) is more effective than
removing nodes with high total degree. Nodes with high betweenness score have
been associated with interdisciplinary journals (Leydesdorff and Rafols, 2011),
while those with high total degree typically correspond to review journals. It
follows that interdisciplinary journals are more responsible to keep the citation
network strongly connected than review publication sources. Second, no per-
colation strategy is in fact really effective. Using the best percolation strategy
(betweenness), 82% of the nodes (almost the entirety of the graph) should be
removed to reduce the largest strongly connected component below 50% of the
graph. This is a distinct sign of the strong robustness of the journal citation
network.
The fact that the journal citation network is strongly connected does not tell
us anything about the lengths of paths in the network. For instance, compare a
5
t
n
e
n
o
p
m
o
c
t
n
a
g
f
o
e
z
s
e
v
i
t
a
e
R
l
i
i
0
.
1
8
.
0
6
.
0
4
.
0
2
.
0
0
.
0
degree
eigenvector
closeness
betweenness
0.0
0.2
0.4
0.6
0.8
1.0
Fraction of removed nodes
Figure 3: Network robustness using the percolation process. The fraction of nodes removed
from the network is plotted against the relative size of the largest strongly connected com-
ponent. Four centrality strategies have been tested to remove the nodes in the percolation
process.
graph composed of a circle of nodes and a complete graph in which there is an
edge connecting each pair of nodes. Both graphs are strongly connected, but the
average distance between nodes in the first graph is of the order of the number
of nodes, while in the second graph it is just 1. The geodesic distance between
two nodes in a graph is the number of edges of a shortest path (also known
as geodesic) connecting the two nodes. We computed the geodesic distance for
any pair of nodes in the graph. Figure 4 shows the geodesic distance histogram.
The average geodesic distance is remarkably short: 2.4 edges. This means that
given a random pair of journals, we can expect that in two or three citation hops
we get from one journal to the other. The maximum geodesic distance, known
as the diameter of the network, is just 6 links (there are 20 paths with this
largest length). We may conclude that the journal citation network is a small
world (Watts and Strogatz, 1998), in the sense that the average node distances
are remarkably short (logarithmic) with respect to the number of nodes of the
network.
It is worth noticing that the average path length on co-reference networks
have been recently proposed by Rafols and Meyer (2010) in the context of in-
dicators of interdisciplinarity. The authors investigate the interdisciplinary re-
search in terms of two aspects: diversity (the number, balance and degree of
difference between the bodies of knowledge integrated) and coherence (the ex-
6
i
s
c
s
e
d
o
e
g
f
o
e
g
a
t
n
e
c
r
e
p
6
.
0
5
.
0
4
.
0
3
.
0
2
.
0
1
.
0
0
.
0
1
2
3
4
5
6
geodesic distance
Figure 4: Histogram of geodesic distances. For any given geodesic distance from 1 to the
diameter of the network (6), a bar shows the percentage of geodesics having that distance.
tent that specific topics, concepts, tools and data used in a research process are
related). In particular, they propose the mean path length defined on paper
bibliographic coupling networks as a possible operationalization of the concept
of network coherence.
Real complex networks possess basic building blocks or motifs: patterns of
interconnections occurring in complex networks at numbers that are significantly
higher than those in randomized networks (Milo et al., 2002). Such motifs have
been found in diverse networks from biochemistry, neurobiology, ecology, and
engineering.
It is conjectured that these patterns play the role of functional
circuit elements of the complex system underlying the network. The simplest
motif that can be studied on a directed network is the loop of length two. On the
journal citation network, this corresponds to a pair of journals that reciprocally
cites themselves. This concept is known as reciprocity in network science and
it is operationalized by counting the relative frequency of edges that belong to
a loop of length two in the network (Newman, 2010). We computed reciprocity
for the journal citation network and the result is 0.29; this means that 29% of
the times that a journal A cites another journal B we have that B cites back
to A. This high percentage can be explained with the well-known phenomenon
that journals can be partitioned into highly-connected clusters corresponding
to disciplines and fields of them when journals are displayed on a citation map
(see, for instance, Rosvall and Bergstrom (2008)).
Finally, we investigate the node degree distributions of the journal citation
7
y
c
n
e
u
q
e
r
F
6
0
0
.
0
4
0
0
.
0
2
0
0
.
0
0
0
0
.
0
1 68 157 257 357 457 557 657 758 865 968 1079 1201
Out−degree
1341
1518
2193
Figure 5: The node out-degree (number of cited journals) distribution.
network. Since the citation network is a directed graph, each journal has an
out-degree -- the number of distinct journals cited by the journal, or the number
of edges leaving the journal node -- , and an in-degree -- the number of distinct
journals citing the journal, or the number of edges arriving to the journal node.
Figures 5 and 6, respectively, depict the out-degree and the in-degree distribu-
tions for nodes of the journal citation network. Both distributions have a clear
long-tail: most of the journals cite and are cited by a relatively small number of
other journals, but there is a significative number of hubs -- journals that cite a
large amount of other journals -- , and authorities, journals that are cited by a
big number of other journals. The average degree for both distributions is 196.3
The median out-degree is 126, with a maximum out-degree of 2193 (a third
of the total number of journals) accomplished by journal PNAS. The median
in-degree is 109, with a maximum in-degree of 3697 (more than half of the total
number of journals) obtained by journal Science (PNAS is second with 3640).
The in-degree distribution is more skewed and concentrated (skewness index is
3.5 and Gini concentration coefficient is 0.55) than the out-degree distribution
(skewness index is 1.9 and Gini concentration coefficient is 0.49). Neither dis-
tribution follow a power-law, so the network cannot be regarded as a scale-free
3This is the same number since each edge leaving a node is arriving at a node; this is also
equal to the ratio of the number of edges and the number of nodes of the network.
8
y
c
n
e
u
q
e
r
F
8
0
0
.
0
6
0
0
.
0
4
0
0
.
0
2
0
0
.
0
0
0
0
.
0
1 132 300 468 636 804 976 1163 1368 1575
2011
In−degree
2367
3520
Figure 6: The node in-degree (number of citing journals) distribution.
network (Barab´asi and Albert, 1999).4
Furthermore, the two distributions (in- and out-degree) are positively cor-
related (Spearman and Pearson correlation coefficients are 0.90 and 0.87, re-
spectively): this means that there is a tendency for authority journals to be
also hub journals and vice versa. This outcome is not crucially influenced by
the size of the journal (in terms of number of published papers); indeed, the
correlations of journal in-degree and out-degree with journal size are moderate
(Spearman and Pearson correlation coefficients are 0.72 and 0.55, respectively).
We also raised the following questions: do authorities prefer to cite other author-
ities/hubs? Do hubs prefer to cite other hubs/authorities? In network science,
assortative/disassortative mixing is the tendency of nodes to connect to other
nodes that are like/dislike them in some way (Newman, 2010). The concept
is implemented as a Pearson correlation coefficient over the investigated scalar
characteristic (in- or out-degrees in our case) for nodes connected by an edge in
the network. The correlation is positive and statistically significant in all four
cases: 0.08 for authority/authority mixing, 0.14 for hub/hub mixing, 0.11 for
authority/hub mixing, and 0.08 for hub/authority mixing. The low magnitude
4We preliminarily observed a clear curvature of the complementary cumulative distribu-
tion function plotted on a double logarithmic scale; furthermore we performed Clauset et al.
(2009) goodness-of-fit test for the power-law and log-normal models. Both tests excluded a
(statistically significant) fit of the empirical distributions of degrees to the surveyed theoretical
models (not even in a tail portion of the distribution for the power-law model).
9
of the correlation coefficients is not surprising: most networks are naturally
disassortative by degree because they are simple graphs (at most one edge is
possible between two nodes). Hence, a positive correlation in this case, although
not large in magnitude, indicates a real assortativity by degree. In particular,
networks having a community structure override this natural bias and become
assortative (Newman, 2010).
3. Conclusion
We have analysed the journal citation network extracted from Thomson-
Reuters Journal Citation Reports. Our conclusions are summarized in the fol-
lowing:
• the journal citation network has high reciprocity and positive assortativity
by degree, which is coherent with a community structure, in which there
are tightly interconnected sets of journals that most likely represent entire
disciplines or fields of them;
• the journal citation network is a dense and small world. This means that,
although the network is divided into closely integrated communities, there
are quite intense inter-community flows of information (citations), and
hence information can spread quickly over the whole academic community;
• the journal citation network is highly robust. These is good news for the
whole academic community, since it means that there exists no restricted
circle of influential journals that control the connectivity of the network
and the diffusion of information on the whole academic community, al-
though there are journals that are very influential within their local fields;
• interdisciplinary journals are more crucial than review sources for the
connectivity of the network and for the diffusion of information over the
academic community. The identification of interdisciplinary journals is
a hot, partially open problem; interdisciplinarity is often perceived as a
mark of good research, more successful in achieving breakthroughs and
relevant outcomes (Rafols and Meyer, 2010);
• the degree distribution of the journal citation network shows a long tail
with many poorly endorsed journals an a significant few highly cited ones;
the empirical distribution, however, does not match well the power-law
model. To test the adherence to the power-law model we used the princi-
pled statistical framework developed by Clauset et al. (2009). The same
method is used by the developers to analyse a large number of real-world
data sets from a range of different disciplines, each of which has been
conjectured to follow a power law distribution in previous studies. Only
two-third of them passed the test, and all of them showed the best adher-
ence to the model when a (limited) suffix of the distribution is considered.
10
Acknowledgements
I would like to thank Ludo Waltman (Centre for Science and Technology Studies,
Leiden University) for his assistance in the data collection.
References
Barab´asi, A.-L., Albert, R., 1999. Emergence of scaling in random networks.
Science 286, 509 -- 512.
Barab´asi, A. L., Jeong, H., N´eda, Z., Ravasz, E., Schubert, A., Vicsek, T.,
2002. Evolution of the social network of scientific collaborations. Physica A:
Statistical Mechanics and its Applications 311 (3-4), 590 -- 614.
Bollen, J., de Sompel, H. V., Hagberg, A., Chute, R., 2009. A principal compo-
nent analysis of 39 scientific impact measures. PLoS ONE 4, e6022.
Bollen, J., Rodriguez, M. A., de Sompel, H. V., 2006. Journal status. Sciento-
metrics 69 (3), 669 -- 687.
Brandes, U., Erlebach, T. (Eds.), 2005. Network Analysis: Methodological
Foundations. Vol. 3418 of Lecture Notes in Computer Science. Springer.
Clauset, A., Shalizi, C. R., Newman, M. E. J., 2009. Power-law distributions in
empirical data. SIAM Review 51, 661 -- 703.
de Solla Price, D., 1965. Networks of scientific papers. Science 149, 510 -- 515.
Franceschet, M., 2011. Collaboration in computer science: a network science
approach. Journal of the American Society for Information Science and Tech-
nology 62 (10), 1992 -- 2012.
Garfield, E., 1955. Citation indexes to science: a new dimension in documenta-
tion through association of ideas. Science 122, 108 -- 111.
Grossman, J. W., 2002. The evolution of the mathematical research collabora-
tion graph. Congressus Numerantium 158, 201 -- 212.
Klanans, R., Boyack, K., 2009. Toward a consensus map of science. Journal of
the American Society for Information Science and Technology 60 (3), 455476.
Leydesdorff, L., 2004. Top-down decomposition of the Journal Citation Report
of the Social Science Citation Index: Graph- and factor-analytical approaches.
Scientometrics 60 (2), 159 -- 180.
Leydesdorff, L., 2009. How are new citation-based journal indicators adding to
the bibliometric toolbox? Journal of the American Society for Information
Science and Technology 60 (7), 1327 -- 1336.
11
Leydesdorff, L., de Moya-Aneg´on, F., Guerrero-Bote, V. P., 2010. Journal maps
on the basis of Scopus data: A comparison with the Journal Citation Re-
ports of the ISI. Journal of the American Society for Information Science and
Technology 61 (2), 352 -- 369.
Leydesdorff, L., Rafols, I., 2011. Indicators of the interdisciplinarity of journals:
Diversity, centrality, and citations. Journal of Informetrics 5, 87 -- 100.
Milo, R., Shen-Orr, S., Itzkovitz, S., Kashtan, N., Chklovskii, D., Alon, U.,
2002. Network motifs: Simple building blocks of complex networks. Science
298 (5594), 824 -- 827.
Moody, J., 2004. The structure of a social science collaboration network: Dis-
ciplinary cohesion from 1963 to 1999. American Sociological Review 69 (2),
213 -- 238.
Newman, M. E. J., 2004. Coauthorship networks and patterns of scientific col-
laboration. Proceedings of the National Academy of Sciences of the United
States of America 101, 5200 -- 5205.
Newman, M. E. J., 2010. Networks: An introduction. Oxford University Press.
Newman, M. E. J., Barab´asi, A.-L., Watts, D. J., 2006. The Structure and
Dynamics of Networks. Princeton University Press.
Pinski, G., Narin, F., 1976. Citation influence for journal aggregates of scientific
publications: Theory, with application to the literature of physics. Informa-
tion Processing & Management 12 (5), 297 -- 312.
R Development Core Team, 2008. R: A Language and Environment for Statis-
tical Computing. R Foundation for Statistical Computing, Vienna, Austria,
ISBN 3-900051-07-0.
URL http://www.R-project.org
Radicchi, F., Castellano, C., Cecconi, F., Loreto, V., Parisi, D., 2004. Defin-
ing and identifying communities in networks. Proceedings of the National
Academy of Sciences of the United States of America 101 (9), 2658 -- 2663.
Radicchi, F., Fortunato, S., Castellano, C., 2008. Universality of citation dis-
tributions: Toward an objective measure of scientific impact. Proceedings of
the National Academy of Sciences of the United States of America 105 (45),
17268 -- 17272.
Rafols, I., Meyer, M., 2010. Diversity and network coherence as indicators of
interdisciplinarity: Case studies in bionanoscience. Scientometrics 82, 263 --
287.
Redner, S., 1998. How popular is your paper? An empirical study of the citation
distribution. The European Physical Journal B 4, 131 -- 134.
12
Rosvall, M., Bergstrom, C. T., 2008. Maps of random walks on complex networks
reveal community structure. Proceedings of the National Academy of Sciences
of the United States of America 105, 1118 -- 1123.
Seglen, P. O., 1992. The skewness of science. Journal of the American Society
for Information Science 43 (9), 628 -- 638.
Stringer, M. J., Sales-Pardo, M., Amaral, L. A. N., 2008. Effectiveness of journal
ranking schemes as a tool for locating information. PLoS ONE 3 (2), e1683.
Watts, D. J., Strogatz, S. H., 1998. Collective dynamics of 'small-world' net-
works. Nature 393, 440 -- 442.
West, J. D., Bergstrom, T. C., Bergstrom, C. T., 2010. The Eigenfactor metrics:
A network approach to assessing scholarly journals. College and Research
Libraries 71, 236 -- 244.
13
|
1905.00630 | 2 | 1905 | 2019-11-13T16:00:30 | Reliability of relational event model estimates under sampling: how to fit a relational event model to 360 million dyadic events | [
"cs.SI",
"stat.ME"
] | We assess the reliability of relational event model parameters estimated under two sampling schemes: (1) uniform sampling from the observed events and (2) case-control sampling which samples non-events, or null dyads ("controls"), from a suitably defined risk set. We experimentally determine the variability of estimated parameters as a function of the number of sampled events and controls per event, respectively. Results suggest that relational event models can be reliably fitted to networks with more than 12 million nodes connected by more than 360 million dyadic events by analyzing a sample of some tens of thousands of events and a small number of controls per event. Using data that we collected on the Wikipedia editing network, we illustrate how network effects commonly included in empirical studies based on relational event models need widely different sample sizes to be estimated reliably. For our analysis we use an open-source software which implements the two sampling schemes, allowing analysts to fit and analyze relational event models to the same or other data that may be collected in different empirical settings, varying sample parameters or model specification. | cs.SI | cs |
Reliability of relational event model estimates under sampling: how
to fit a relational event model to 360 million dyadic events∗
Jurgen Lerner
Alessandro Lomi
University of Konstanz
University of Lugano, Switzerland
[email protected]
[email protected]
Abstract
We assess the reliability of relational event model parameters estimated under two sampling schemes:
(1) uniform sampling from the observed events and (2) case-control sampling which samples non-events,
or null dyads ("controls"), from a suitably defined risk set. We experimentally determine the variability
of estimated parameters as a function of the number of sampled events and controls per event, respec-
tively. Results suggest that relational event models can be reliably fitted to networks with more than
12 million nodes connected by more than 360 million dyadic events by analyzing a sample of some tens
of thousands of events and a small number of controls per event. Using data that we collected on the
Wikipedia editing network we illustrate how network effects commonly included in empirical studies
based on relational event models need widely different sample sizes to be reliably estimated. For our
analysis we use an open-source software which implements the two sampling schemes, allowing analysts
to fit and analyze relational event models to the same or other data that may be collected in different
empirical settings, varying sample parameters or model specification.
Keywords: relational event models, dynamic networks, large networks, parameter estimation, sampling,
Wikipedia
1 Introduction
Relational event networks arise naturally from directed social interaction. Examples include communication
networks (Monge and Contractor 2003), teams (Leenders et al. 2016), online peer-production (Lerner and
Tirole 2001; Lerner and Lomi 2017), international relations (Lerner et al. 2013), and discourse networks
(Leifeld 2016; Brandenberger 2019).
In all these cases, social interaction reflects, and at the same time
shapes, relations among social actors and affects individual sentiments -- such as trust, esteem, like, or
dislike -- and their contextual behavioral expressions (Stadtfeld and Block 2017).
Relational events resulting from social interaction in open populations are often more directly and ac-
curately accessible when interaction is mediated by technology, rather than embedded in face-to-face social
relations. Data on relational event networks are increasingly accessible through social media platforms such
as Twitter (Dodds et al. 2011) or Facebook (Golder et al. 2007). Advances in automatic data collection and
coding strategies recording interaction at fine time-granularity are also encouraging the diffusion of relational
event models (Lazer et al. 2009). Relational events have been suggested as the appropriate unit of analysis,
for instance, in the study of team processes (Leenders et al. 2016), and interorganizational relations (Vu
et al. 2017), where aggregating interaction over more or less arbitrary time intervals continues to represent
the dominant research design (Pallotti and Lomi 2011).
Building on the path-breaking work of Butts (2008), empirical studies adopting relational event models
(REM) are becoming more common (Vu et al. 2017). Practical applicability of REM, however, has been
∗Manuscript accepted for publication in Network Science. We acknowledge support from Deutsche Forschungsgemeinschaft
(DFG Grant Nr. LE 2237/2-1) and Swiss National Science Foundation (NSF Project Nr. 100018 150126).
1
hampered by runtime complexity (Foucault Welles et al. 2014) -- a problem that is rooted in the likelihood
function which normalizes event rates on dyads that experience events by the rates on all dyads that could
have possibly experienced an event at the given point in time. The corresponding risk set can be huge, since
its size is often quadratic in the number of nodes. For example, in Wikipedia -- the setting for the data that
we examine in the empirical part of this paper -- more than 6 million users contribute to one or several of
more than 5 million encyclopedic articles, giving rise to more than 360 million dyadic events. Thus, at given
points in time a dyadic event could occur on more than 30 trillion (3× 1013) dyads. Computing explanatory
variables (sufficient statistics) for each of these dyads is unfeasible even for a single observed event -- much
less so for all 360 million events. Such problems are rather typical since -- as mentioned above -- large
quantities of information on relational events are often collected with automatic data-collection technologies
which in turn can easily yield large, or very large networks.
Empirical studies applying REM, therefore, have often been limited to networks with a rather small
number of nodes (Foucault Welles et al. 2014; Lerner et al. 2013; Vu et al. 2017). Exceptions include studies
exploiting a "sparsity condition," namely that a single observed event changes the values of some statistics
not for all dyads in the risk set but only for a limited subset (Perry and Wolfe 2013; Hunter et al. 2011). For
instance, an observed event on a dyad (a, b) changes the out-degree statistic only for all dyads with source a --
implying update costs that are linear, rather than quadratic in the number of nodes. This approach, however,
requires to develop specific estimation algorithms for different model statistics. Moreover, it does not apply
to models in which statistics on all dyads change from event to event, for instance, when using "recency
statistics" (Lomi et al. 2014; Vu et al. 2015). However, even if sparsity conditions hold and explanatory
variables change only on a fraction of the risk set, the method is still not applicable to networks of the size
that we consider in this paper.
A more general and less assuming approach to alleviate the runtime problems and speed-up estimation
of REM on large event-networks, involves sampling from the risk set, as suggested by Butts (2008). To
our knowledge Vu et al. (2015) were the first to propose a concrete sampling scheme and to apply it in an
empirical study (earlier mentioned in the dissertation of the first author). Vu et al. (2015) propose and
apply case-control sampling (Borgan et al. 1995) in which a sampled likelihood is constructed by including
all observed events (cases) but only a limited number of dyads from the risk set not experiencing an event
at given points in time ("null dyads" or controls).
Vu et al. (2015), however, do not clarify the variation in the parameters that is caused by sampling, nor
do they address issues about the number of controls that should be sampled per observed event. Similarly
wanting is a discussion about the possibility of applying other sampling strategies in addition to, or instead
of, case-control sampling. For instance, Vu et al. (2015) propose to sample 10,000 controls per event. On the
one hand, we might wonder whether 10,000 controls is enough to obtain reliable estimates or, on the other
hand, if so many controls per event are really needed. Moreover, Vu et al. (2015) analyze event networks
comprising some tens of thousands of events and a maximal risk set size of 1.8 million. Since our data has
more than thousand times as many events and a maximal risk set size that is more than ten million times
larger, we need lower numbers of controls per event and an additional sampling strategy, besides case-control
sampling, to achieve a feasible runtime.
Against the backdrop of this general discussion, this paper contributes to the practice of estimating REM
by performing systematic experiments to assess the variation in the estimated model parameters caused by
sampling. We consider combinations of two sampling schemes, (1) uniform sampling from the set of observed
events and (2) case-control sampling, where we sample non-events from the risk set.
An alternative to these two sampling schemes would be to restrict the analysis to sub-networks that are
sufficiently small, for instance, by considering only events among a specific subset of nodes. An example
of this strategy is given by Lerner and Lomi (2019a) who analyze edit and discussion events in Wikipedia
restricted to articles about "migration-related topics," which results in some 4, 000 articles and 87, 000 users
connected by 950, 000 events. Lerner and Lomi (2019a) applied case-control sampling from the risk set but
did not sample from the observed events among this restricted set of nodes. We claim that the sampling
strategy proposed and analyzed in this paper, which samples uniformly from all events, is preferable to
the analysis of a sub-network for at least two reasons. First, it is questionable whether a sub-network
2
is representative for a larger network. In the given example it seems rather plausible that articles about
migration-related topics are not representative for all Wikipedia articles. Second, if we restrict the analysis
to sub-networks, the computation of explanatory variables is potentially incorrect.
In the example from
Lerner and Lomi (2019a), Wikipedia users might contribute to articles that are not in the chosen subset so
that, for instance, the out-degree, in-degree, or four-cycle statistics, see Eqs. (8) to (10), might be computed
incorrectly. In brief, restricting the analysis to sub-networks needs a strong assumption about the modularity
or quasi-decomposability of the relational system of interest (Newman 2006; Simon 1996, 1977).
In this paper we follow a different analytical strategy: even though we compute explanatory variables
only for a random subset of events, all events are aggregated into the network of past events (see Sect. 3.3)
which ensures that all computed explanatory variables are correct.
We contribute to the practical applicability of REM in empirical network research by:
1. Providing a proof-of-concept that relational event models can be fitted to large event networks with
millions of nodes and hundreds of millions of events by analyzing a sample of some tens of thousands
of events and a small number of controls per event. For some network effects it is even sufficient to
analyze a sample comprising a few hundreds of events.
2. Assessing the variation of estimated parameters as a function of the number of sampled events and the
number of controls per event, separately for different commonly-used network effects. This allows us
to determine how many events and controls are needed for reliable estimation of the different effects
and sheds light on the question whether we should sample few events and many controls per event or
rather many events and fewer controls
3. Identifying characteristics in the data that explain why some network effects need many more observa-
tions than others to be reliably estimated and discussing a different sampling strategy that might be
applied in situations of badly distributed explanatory variables.
4. Introducing an open-source software with which similar parameter estimation and sensitivity tests can
be performed using different sample parameters, different models, or different data.
The remainder of this paper is structured as follows. Section 2 recalls the basic framework for relational
event models and introduces the two sampling strategies. In Sect. 3 we introduce the setting, data, empirical
model specification, and the experimental design. We provide detailed results in Sect. 4 and summarize
their implications in Sect. 5 where we also offer recommendations for the practice of estimating REMs and
refer to an open-source software that may be adopted to replicate the results of the study in the same or
different settings. We conclude with a general discussion of the implications of our work for the practice of
estimating relational event models in empirical studies. The majority of the numerical results are included
in an appendix.
2 Background
2.1 Relational event models
A general statistical modeling framework capable of exploiting the fine-grained time information inherent
in relational event sequences has been proposed by Butts (2008). Relational event models (REM) specify
time-varying event rates for all dyads as a function of past events on the same or other surrounding dyads.
Variations of this model framework include REM for weighted events (Brandes et al. 2009; Lerner and Lomi
2017), models based on marked point-processes (Amati et al. 2018), and actor-oriented REMs (Stadtfeld
and Block 2017).
In general, relational event models (Butts 2008) specify a likelihood for sequences of relational events
E = (e1, . . . , eN ), where each event ei has the form
ei = (ui, vi, ti) .
3
In the notation above ti is the time of the event, ui ∈ Uti is the source, sender, or initiator of the event, taken
from a set Uti of possible source nodes at the event time, and vi ∈ Vti is the target, receiver, or addressee
of the event, taken from a set Vti of possible target nodes at the event time. For each time point t the risk
set Rt ⊆ Ut × Vt is the set of dyads on which an event could potentially happen at t. In particular, it holds
that (ui, vi) ∈ Rti. (Note that Butts (2008) denoted by "support set" what we call "risk set"; we adopt the
latter term, using the symbol R, since it is commonly applied in survival analysis.)
For a time point t, the network of past events G[E; t] is a function of events that happened strictly before
t (and potentially of exogenous covariates). The network of past events shapes the distribution of events at
t as we explain in greater detail and in the specific empirical setting of this paper in Sect. 3.3.
For a time point t and a dyad (u, v) ∈ Rt let T denote the random variable of the time of the next event
on (u, v), that is the first event e = (u(cid:48), v(cid:48), t(cid:48)) with u(cid:48) = u, v(cid:48) = v and t(cid:48) ≥ t. The hazard rate (also intensity
or event rate) on (u, v) at t is defined by
λ(u, v, t) = lim
∆t→0
P rob(t ≤ T ≤ t + ∆t t ≤ T )
∆t
.
Under rather weak assumptions, the hazard rate λ(u, v, t) can be interpreted as the expected number of
events in the dyad (u, v) in a time interval of length one (Lawless 2003). In empirical studies one is typically
interested in factors that tend to increase or decrease the dyadic event rate.
In the Cox proportional hazard model (Cox 1972) -- corresponding to the REM with ordinal times in
Butts (2008) -- the hazard is specified, conditional on the network of past events G[E; t] and dependent on
parameters θ ∈ Rk as
(1)
(2)
λ(u, v, t, G[E; t]; θ) = λ0(t) · λ1(u, v, t, G[E; t]; θ) , where
λ1(u, v, t, G[E; t]; θ) = exp
θ(cid:96) · s(cid:96)(u, v, G[E; t])
.
(cid:33)
(cid:32) k(cid:88)
(cid:96)=1
In the equation above, λ0 is a time-varying baseline hazard function for all dyads in the risk set and the
relative event rate λ1(u, v, t, G[E; t]; θ) -- a function of parameters θ(cid:96) and sufficient statistics s(cid:96)(u, v, G[E; t])
-- is proportional to the probability that an event at t happens on (u, v), rather than on any other dyad in
the risk set.
In the Cox proportional hazard model the partial likelihood based on the observed event sequence E is
(cid:89)
ei∈E
(cid:80)
L(θ) =
λ1(ui, vi, ti, G[E; ti]; θ)
uv∈Rti
λ1(u, v, ti, G[E; ti]; θ)
,
(3)
and parameters θ are estimated to maximize L.
2.2 Case-control sampling
The problem in maximizing the likelihood is the runtime for evaluating the denominator in each of the
factors of Eq. (3). In our empirical case, the risk set at the end of the observation period has more then 30
trillion elements. Thus, we cannot even evaluate the term for the single last event -- much less the terms for
all 360 million events.
A possible solution has been suggested by Vu et al. (2015) who applied case-control sampling (Borgan
et al. 1995). In case-control sampling one analyzes all "cases" (dyads experiencing an event at the given
point in time) but only a small random subset of the "controls" (dyads in the risk set not experiencing
an event at the given point in time). (In this paper we will also speak of "events" instead of "cases" and
of "non-events" instead of "controls".) Let ei = (ui, vi, ti) be the i'th event in E and let m be a positive
integer, giving the number of controls per event. In the sampled likelihood the term Rti in the denominator
of Eq. (3) is replaced by SRi(m) ⊆ Rti which is drawn uniformly at random from
{s ⊆ Rti : (ui, vi) ∈ s ∧ s = m + 1} .
4
sampled
events
(u1, v1, t1)
(u2, v2, t2)
(u3, v3, t3)
(u4, v4, t4)
(u5, v5, t5)
(u6, v6, t6)
(u7, v7, t7)
(u8, v8, t8)
(u9, v9, t9)
. . .
risk sets at sampled event times
Rt1 =
Rt4 =
. . .
m dyads (controls) are sampled
for each sampled event
Figure 1: Schematic illustration of sampling. Observed events (left-most column) are sampled independently
with probability p; sampled observed events are indicated by black squares. For each sampled event ei, we
sample m dyads (controls) from the risk set Rti; sampled controls are indicated by grey squares. Note that
all observed events happening before time t (not just the sampled events) are used to maintain the network
of past events G[E; t] and, thus, to compute the sufficient statistics s(cid:96) in the specification of the event rate
λ1 in Eq. (2).
From another point of view, the set SRi(m) contains the dyad (ui, vi), that is the one in which event
ei happens, and additional m elements (the "controls"), different from (ui, vi), randomly drawn from Rti
without replacement. For a given sequence of sampled case-control sets SR(m) = (SR1(m), . . . , SRN (m)),
the sampled likelihood is defined by
L[SR(m)](θ) =
λ1(ui, vi, ti, G[E; ti]; θ)
uv∈SRi(m) λ1(u, v, ti, G[E; ti]; θ)
.
(4)
(cid:89)
ei∈E
(cid:80)
The procedure to sample from the risk set described above differs in several aspects from Markov chain
Monte Carlo (MCMC) sampling as it is typically employed in the estimation of exponential random graph
models (ERGM) (Hunter et al. 2008). One of the most crucial differences is that the risk set of a relational
event model grows linearly in the number of dyads (that is, quadratic in the number of nodes), while the
space of an ERGM grows exponentially in the number of dyads.
2.3 Sampling observed events
Another sampling strategy that we consider in this paper additionally to case-control sampling involves
uniform sampling from the set of observed events. Concretely, for a real number p with 0 < p ≤ 1, let
SE(p) ⊆ E be a random subset of observed events, obtained by including each e ∈ E independently at
random with probability p. Additionally, let SR(m) be a sequence of sampled case-control sets as described
above. The sampled likelihood is given by:
L[SR(m),SE(p)](θ) =
λ1(ui, vi, ti, G[E; ti]; θ)
ei∈SE(p)
uv∈SRi(m) λ1(u, v, ti, G[E; ti]; θ)
,
(5)
(cid:89)
(cid:80)
and parameters θ are estimated to maximize the sampled likelihood L[SR(m),SE(p)](θ). Both sampling
schemes, case-control sampling and uniform sampling from the observed events, are illustrated in Fig. 1.
We emphasize that the networks of past events G[E; ti] in Eq. (5) are functions of all events in E that
happen before ti, not just functions of the sampled events in SE(p). Thus, for a given dyad (u, v) the
explanatory variables (sufficient statistics) s(cid:96)(u, v, G[E, t]) from Eq. (2) are computed correctly. This points
5
to a crucial difference to the approach that analyzes sub-networks as discussed in the introduction. Moreover,
it points to a crucial difference to situations where events are missing (rather than left out due to sampling);
obviously, missing events cannot be used to compute statistics.
Using the sampled likelihood for estimation of model parameters introduces another source of uncertainty:
if we repeated the sampling of events and controls, we obtained a different sampled likelihood and thus,
probably, also different parameter estimates. In our experiments, which are explained in detail in Sect. 3.5,
we want to determine how the variation in the model parameters θ introduced by sampling depends on the
sampling parameters p (the probability to sample an observed event) and m (the number of sampled controls
per sampled event). In this paper we call p and m the sample parameters and θ the model parameters --
unless it is clear from context which set of parameters is meant.
2.4 Asymptotic properties
An attractive property of case-control sampling in the Cox proportional hazard model is that it yields an
estimator which is consistent and asymptotically normal (Borgan et al. 1995). This is a non-trivial result
since case-control sampling is a sampling strategy that actually manipulates the ratio of events to non-events.
These asymptotic properties are reassuring -- but they do not diminish the relevance of the experimental
approach of this paper.
In our experiments we assess the variation in the parameters caused by sampling for different sample sizes.
The experimental results we present suggest that for some of the most common network effects typically
included in empirical model specifications (Lomi et al. 2014), variation caused by sampling is much larger
than the estimated standard errors of model parameters, even for relatively large sample sizes. It seems
difficult to determine the sufficient sample size by purely theoretical considerations based on asymptotic
properties -- which is why we consider experimental evaluation as necessary.
3 Experiments
3.1 Empirical setting: Network analysis of collaboration in Wikipedia
Wikipedia is a prime example of a self-organizing online production community in which voluntary users
invest personal time and effort to provide a public good (Lerner and Tirole 2001; Lerner and Lomi 2017). The
most crucial resources that articles need to garner in order to attain a high level of quality are the attention
and contribution of users (Lerner and Lomi 2018b). This observation motivates a study of the factors that
induce particular users to contribute more or less to particular articles. The network of relational events
that we consider in this paper includes all events in which any registered user contributes to any article in
the English-language edition of Wikipedia. The estimated model reveals basic network effects that explain
dyadic contribution rates on all user-article pairs.
Previous work analyzing user contributions in Wikipedia mostly aggregates edits over users, articles, or
time. For instance, Moat et al. (2013) analyze patterns in the dynamics of edits received by articles -- but
do not model dyadic event rates, nor do they analyze network effects explaining edit frequencies. Yasseri
et al. (2012) analyze periodic patterns in the global edit activity in different language editions of Wikipedia.
Keegan et al. (2012) fit exponential random graph models to the two-mode network connecting Wikipedia
users to "breaking-news articles". This model framework, however, requires to aggregate relational events
per dyad over time.
Surprisingly -- considering that Wikipedia contribution data are naturally provided as time-stamped
relational events -- studies analyzing Wikipedia collaboration networks as relational event systems are still
relatively infrequent. Perhaps this is due to the lack of methods that are able to estimate REM for large
event networks. Lerner and Lomi (2017, 2018a, 2019b) propose and estimate REMs for the edit networks of
single articles. Their model does not explain user activity rates but rather specifies dyadic probabilities to
undo or redo contributions of other target users, given that a source user becomes active on the focal article.
Previous work that seems to be the closest to this paper is a recent article of Lerner and Lomi (2019a) which
6
analyzes a REM for edit and talk events on Wikipedia articles about migration-related topics (also discussed
in the introduction). Thus, Lerner and Lomi (2019a) analyze a thematically delineated sub-network. They
apply case-control sampling but do not sample from the observed events and do not experimentally vary
sample sizes. Data on the Wikipedia editing network provide a particularly valuable setting to perform the
experiments that we propose in this paper because of their size, accuracy and complexity, and because of
the substantive interest in Wikipedia as one of the largest and most successful examples of peer production
projects (Jan Piskorski and Gorbatai 2017; Greenstein and Zhu 2012).
3.2 Data
The event network that we consider in this paper is given by the sequence of relational events in which any
registered and logged-in Wikipedia user uploads a new version of any article in the English-language edition
of Wikipedia in the time period from January 15th 2001 (the launch of Wikipedia) to January 1st, 2018 (the
time of data collection). For a point in time t we define Ut to be the set of all users who edited at least one
article at or before t and we define At to be the set of all articles that received at least one edit at or before
t. The risk set at time t is defined to be the full Cartesian product of users and articles Rt = Ut × At. It
is possible to define the risk set in more sophisticated ways: users or articles could enter or leave the risk
set as a function of events, due to extended periods of inactivity, or due to exogenously given entry-times or
exit times. Such more complex risk set dynamics, however, are not considered in this paper. (We performed
robustness checks by letting users and articles drop out of the risk set due to extended periods of inactivity;
results were not affected in any meaningful way.)
Wikipedia makes its complete database available for public use.1 All edit events can conveniently be
extracted from the files enwiki-<date>-stub-meta-history.xml.gz which contain meta-information (in-
cluding user, article, and time) of every edit but not the text of the different versions (which we do not need
for the analysis in this paper).
The time of edits in the Wikipedia data is accurate to the second. The Cox proportional hazard model
does not make use of the precise timing of events. The given timestamps of events are used to determine
the decay of past events, as explained in Sect. 3.3, and the order of events, but have no further influence on
the model. In the given data several events can occur in the same second of time. We nevertheless imposed
a strict order on all events. If two events happen simultaneously, then the order in which they appear in the
input file was taken as the given order. Two non-simultaneous events are ordered by their timestamps. We
believe that the decision to enforce a strict order has no significant impact on the results (actually it is very
unlikely to select two simultaneous events in the same sample of events).
The data consists of 361, 769, 741 dyadic events of the form e = (u, a, t) indicating that user u ∈ Ut edits
article a ∈ At at time t. At the end of the observation period Ut contains 6, 701, 379 users and At contains
5, 542, 465 articles. Thus, at the end of the observation period the risk set contains 6, 701, 379 · 5, 542, 465 ≈
3.714 · 1013 (approximately 37 trillion) user-article pairs. For reproducibility and for facilitating similar
research, the preprocessed data is available at https://doi.org/10.5281/zenodo.1626323.
3.3 Model
We specify the relative event rates λ1(u, v, t, G[E; t]; θ) on all user-article pairs (u, a) ∈ Rt at time t as a
In doing so, we weight events that
function of past events that happened strictly before t, see Eq. (2).
happened further in the past weaker than events that happened more recently.
More precisely, following the model proposed in Brandes et al. (2009), we define the network of past events
G[E; t] at time t as the weighted two-mode network with node sets Ut and At where the weight w(u, a, t) on
any (u, a) ∈ Ut × At is a function of past events happening in (u, a) before t, that is, the weight is a function
of the events
Euat = {(u(cid:48), v(cid:48), t(cid:48)) ∈ E : u(cid:48) = u ∧ a(cid:48) = a ∧ t(cid:48) < t}
1https://dumps.wikimedia.org/
7
given by the formula
(cid:88)
(u,v,t(cid:48))∈Euat
exp
(cid:18)
−(t − t(cid:48)) · ln(2)
T1/2
(cid:19)
w(u, a, t) =
(6)
for a given halflife T1/2 > 0.
We set T1/2 to 30 days so that an event counts as (close to) one in the very next instant of time, it
counts as 1/2 one month later, it counts as 1/4 two months after the event, and so on. To reduce memory
consumption needed to store the network of past events, we set a dyadic weight to zero if its value drops
below 0.01. If a single event occurred in some dyad this would happen after 6.64 · T1/2, that is after more
than half a year. The weight w(u, a, t) can be interpreted as the recent event intensity in the dyad (u, a)
before t. Edges in the network of past events are implicitly defined to be all dyads with non-zero weights.
As a robustness check we repeated some of our analyses in a model without any decay (not reported in this
paper); in general, findings did not change in any meaningful way.
Following Lerner and Lomi (2019a), the event rate λ1(u, v, t, G[E; t]; θ), see Eq. (2), is specified using the
following five sufficient statistics.
repetition(u, a, G[E; t]) = w(u, a, t)
popularity(u, a, G[E; t]) =
activity(u, a, G[E; t]) =
f our.cycle(u, a, G[E; t]) =
(cid:88)
(cid:88)
(cid:88)
a(cid:48)∈At
u(cid:48)∈Ut
w(u(cid:48), a, t)
w(u, a(cid:48), t)
(cid:88)
(7)
(8)
(9)
(10)
(11)
assortativity(u, a, G[E; t]) = popularity(u, a, G[E; t]) · activity(u, a, G[E; t])
u(cid:48)∈Ut\{u}
a(cid:48)∈At\{a}
min[w(u, a(cid:48), t), w(u(cid:48), a(cid:48), t), w(u(cid:48), a, t)]
The statistic repetition(u, a, G[E; t]) characterizes the recent event intensity in the same dyad (u, a). A
positive parameter associated with this statistic would reveal that users are more likely to edit articles they
have recently edited before. The popularity statistic aggregates the recent event intensities in all dyads with
target a, that is, it gives the recent intensity by which the article a is edited. A positive parameter associated
with the popularity statistic would reveal that popular articles (those, that recently received many edits by
any user) are likely to receive edits (by potentially different users) at a higher rate in the future. The
activity statistic aggregates the recent event intensities in all dyads with source u, that is, it gives the recent
cumulative edit activity of user u. A positive parameter associated with the activity statistic would reveal
that users who have recently been more active will also edit (potentially different articles) at a higher rate in
the future. The four-cycle effect models local clustering. If users u and u(cid:48) recently collaborated in writting
an article a(cid:48) and, in addition, user u(cid:48) recently contributed to article a, then a positive parameter associated
with f our.cycle(u, a, G[E; t]) would reveal that u has a tendency to edit a at a higher rate. The assortativity
statistic models the interaction between user activity and article popularity. A positive parameter would
reveal that the more active users are rather drawn to editing the more popular articles while a negative
assortativity parameter would reveal that the more active users are rather drawn to editing the less popular
articles -- where these relations have to be understood relative to the effects of the basic variables activity
and popularity.
These five effects are very common in relational event modeling and are not particular to the specific
setting that we examine -- except that when analyzing a one-mode network, instead of a two-mode network,
we would typically include a three-cycle effect, perhaps instead of the four-cycle effect. These effects are
interesting for our current study since they assume dependence of dyadic observations on previous obser-
vations in varying levels of complexity. Repetition assumes that the rate of future events in (u, a) depends
just on previous events in the same dyad. The popularity and activity effects assume that the rate of future
events in (u, a) depends on previous events that have the same target article a (for popularity) or the same
source user u (for activity). The four-cycle effect assumes that the rate of future events in (u, a) depends on
previous events in a three-path of the form (u, a(cid:48)), (a(cid:48), u(cid:48)), (u(cid:48), a) for any user-article pair (u(cid:48), a(cid:48)) -- that are
8
Table 1: Correlation (above the diagonal), variance (bold, on the diagonal), and covariance (below the
diagonal) of the five statistics computed from about 21 million observations obtained by aggregating 100
samples with p = 10−4 and m = 5.
repetition
popularity
activity
four.cycle
assortativity
0.33
0.36
0.60
0.27
2.25
repetition popularity activity four.cycle
0.35
0.49
0.79
1.83
5.55
0.41
0.42
6.22
2.65
9.37
0.64
0.94
1.02
0.64
3.95
assortativity
0.72
0.75
0.70
0.76
29.17
different from u and a, respectively -- provided that there was at least one recent event in all three dyads
(u, a(cid:48)), (u(cid:48), a(cid:48)), and (u(cid:48), a). Assortativity is an interaction effect modeling that activity of a user u has a
different impact for editing popular articles than for editing less popular articles and vice versa. Considering
these five effects in our study is interesting since it is plausible that the different effects need different sample
sizes to be reliably estimated.
Due to skewed distributions we apply the mapping x (cid:55)→ log(1 + x) to the four statistics repetition,
popularity, activity, and f our.cycle. The interaction effect assortativity is defined to be the product of
popularity and activity after applying this logarithmic transformation.
Table 1 provides information on correlation, variance, and covariance of the five statistics computed on
the aggregated observations from 100 samples with sample parameters p = 10−4 and m = 5 (see Sects. 3.5
and 4.2). All correlations are positive and moderately high.
3.4 Runtime complexity
The total time for computing all explanatory variables is the computation time for maintaining the network
of past events plus the time needed to compute the statistics for all sampled observations, that is for sampled
events and sampled controls. Below we briefly discuss that maintenance of the network of past events has a
much smaller asymptotic runtime per event than the computation of statistics per dyad. This is an important
property of our approach since we use all events to maintain the network of past events but we compute
statistics only on a sample of observations.
The network of past events can be updated in constant time per event, so that the total cost in maintaining
the network of past events is proportional to the total number of events E. This might seem surprising
since the weights on all edges change due to decay whenever time increases, see Eq. (6) -- which actually
happens after most input events. We achieve the linear runtime by a "lazy" strategy: we do not perform
the time-decay when time increases; instead we store for each edge, additionally to its weight, the time of
the last weight-update. The weight on a dyad (u, a) is only updated if either an event happens in (u, a) or
if the value w(u, a, t) has to be accessed to compute statistics for (u, a) or surrounding dyads.
The cost for computing the statistics varies. The values of repetition, popularity, activity, and assortativity
for a given dyad at a given point in time can be computed in constant time. In order to achieve this for
the degree statistics (popularity and activity) we maintain weighted in-degrees of articles and weighted
out-degrees of users explicitly as functions defined on nodes in the network of past events. (The cost for
maintaining these node-weights is also linear in the number of events.) The time for computing the four-cycle
statistic of a dyad (u, a) is bounded by the product of the unweighted degrees (that is, the number of incident
edges) of u and a. If the unweighted degrees of all nodes were equal to d, then the runtime for computing
the four-cycle statistic for one dyad would be bounded by d2.
In summary, it is much more costly to compute statistics for one observation than to update the network
of past events as a result of one event. This is the rationale for our approach to use all events for maintaining
the network of past events but only a fraction of events to compute the likelihood defined in Eq. (5). As
discussed before, taking all events to update the network of past events ensures that the computed statistics
for each sampled observation are correct.
9
3.5 Experimental design
The general goal of the computational experiments we report in the next section, is to determine how
the distributions of estimated model parameters θ -- and their associated standard errors, z-values, and
significance levels -- depend on the sample parameters p and m. We first conducted a preliminary exploratory
analysis to identify sample parameters p0 and m0 that are large enough to reliably assess the effects of all
five statistics. It turned out that the different statistics require largely different numbers of observations
to be reliably estimated (discussed in more detail in Sect. 4). We have chosen p0 and m0 such that at
least the direction of all five effects, that is, whether they tend to increase or decrease the event rate, can
be assessed with high confidence. After the preliminary analysis we set these initial sample parameters to
p0 = 0.0001 = 10−4 and m0 = 5 resulting in approximately 36, 000 sampled events and about 5 · 36, 000
sampled controls, that is about 216, 000 sampled observations. Then we performed four types of experiments
to assess how the distributions of estimated model parameters depend on the sample parameters.
• (fixed p and m) We repeat the sampling one hundred times with fixed sample parameters p = p0 and
m = m0. Doing so allows us to assess for each of the five effects the variation of model parameters,
standard errors, and z-values caused by sampling.
• (varying p for fixed m) For fixed m = m0 we vary p as in (p0/2i)i=1,...,10. That is, for i from
one to ten we halve, starting from p0, the probability to sample events in each step. This results in
approximately 18, 000 sampled events for i = 1 and only about 35 sampled events for i = 10. The
number of sampled controls is five times the number of sampled events, so that the number of sampled
observations ranges from 108, 000 to 211. For each i = 1, . . . , 10 we repeat the sampling ten times to
assess the distribution of estimated model parameters for the five effects. In this type of experiment
we assess which sample sizes are sufficient to reliably estimate parameters for the various effects.
• (varying m for fixed p) For fixed p = p0/10 = 10−5 we vary m as in the sequence (2i)i=0,...,7. This
results in one control per event for i = 0 and 128 controls per event for i = 7. The expected number of
sampled events is fixed to about 3, 600 so that the number of sampled observations ranges from 7, 200
(for i = 0) to 464, 400 (for i = 7). Thus, for i = 7 we sample more than twice as many observations as
for the initial sample parameters p0 and m0 -- but the sampled observations contain much fewer events
and a much higher ratio of controls per event. For each i = 0, . . . , 7 we repeat the sampling ten times.
In this type of experiment we assess the benefit of using more controls per event for a given limited
number of events.
• (varying p and m for a fixed budget of observations) Similar to the experiment type above, we
vary m as in the sequence (2i)i=1,...,8. However, in this type of experiment we let p change as a function
of m to fix the number of sampled observations to that determined by p0 and m0. More precisely, for
i = 1, . . . , 8 we set m = 2i and p = 6 · 10−4/(2i + 1). The expected number of sampled observations is,
thus, fixed at about 216, 000. The number of controls per event ranges from 2 to 256 and the expected
number of sampled events ranges from about 72, 000 (for i = 1) to about 840 (for i = 8). For each
i = 1, . . . , 8 we repeat the sampling ten times. In this type of experiment we assume that we have a
given budget of observations (for instance, constrained by runtime considerations) and assess whether
it is preferable to include more events (and fewer controls per event), or the other way round, or if
there is an optimal intermediate number of controls per event.
After conducting these experiments and analyzing the results we perform additional analyses to identify
reasons why the estimation of the model parameter for the repetition effect needs so many more observations
than for the other effects.
4 Results
In Sect. 4.1 we present and discuss estimated parameters on a single sample obtained with p = p0 and
m = m0. Sections 4.2 to 4.5 present and discuss results of the four types of experiments described above.
10
Table 2: Estimated parameters and standard errors (in brackets) on a single sample obtained with p0 = 0.0001
and m0 = 5. All parameters are significantly different from zero at the 0.1% level.
repetition
12.348 (0.999)
popularity
1.244 (0.035)
activity
1.445 (0.030)
four.cycle
0.659 (0.089)
assortativity −0.120 (0.024)
5,607.475
AIC
Num. events
36,114
216,684
Num. obs.
Section 4.6 conducts additional analyses to clarify findings about the repetition effect.
4.1 Model estimation on a single sample
Table 2 reports estimated model parameters and standard errors of a single sample obtained with the initial
sample parameters p0 = 10−4 and m0 = 5 resulting in about 36, 000 events and 216, 000 observations. All
parameters are significantly different from zero at the 0.1% level, point in the expected direction, and are
consistent with results reported in previous studies based on a much smaller sub-network (Lerner and Lomi
2019a).
The parameter associated with repetition is positive indicating that a user u typically is more likely
to edit an article if she has recently edited it before. We find a positive popularity effect: articles that
recently received more edits from any user are likely to be edited at a higher rate by potentially different
users. Considering that contributions by users are a crucial resource for articles (Lerner and Lomi 2018b),
this "rich-get-richer" effect (Barab´asi and Albert 1999) might actually have adverse implications for the
development and quality of Wikipedia.
Indeed, if contributing users tend to crowd together on a few
popular articles, other articles are in danger of being neglected. We also find a positive activity effect: users
that recently contributed more frequently to any article are likely to edit potentially different articles at a
higher rate. The positive parameter of the four-cycle effect points to local clustering, where the clusters
might be interpreted as latent topics of articles, or interests of users, respectively. If the interpretation via
user interests and article topics applies, the four-cycle effect can be understood as follows. If two users u and
u(cid:48) recently co-edited an article a(cid:48), then they are likely to have similar interests. If, additionally u(cid:48) recently
edited another article a, then a and a(cid:48) are likely to involve similar topics. In turn user u is also likely to
edit article a at a higher rate. Assortativity, that is the interaction effect between the activity of users and
the popularity of articles, is found to be negative. Thus, while users in general have the tendency to edit
already popular articles, this behavior is less pronounced for the more active users. Thus, the more active
users seem to dedicate a bigger share of their work (than the less active users) to the less popular articles.
In the light of the discussion about the popularity effect above, this negative assortativity might be very
important for Wikipedia, since it gives an indication that the more active users might be the ones who start
editing less popular articles -- which would otherwise be in danger of being neglected.
Having established the consistency of the results with prior studies (Lerner and Lomi 2019a), and the
contextual interpretability of the empirical estimates, we focus in the next sections on the variation in the
estimates associated with different sample parameters.
4.2 Variation caused by sampling (fixed sample parameters)
Table 3 reports summary statistics of estimated parameters, standard errors, and z-values for the five effects
over these 100 samples. The boxplots in Fig. 2 display the summary statistics for the estimated parameters.
It is encouraging that all estimations over 100 samples confirm the qualitative findings from Table 2.
The parameters for the repetition, popularity, activity, and four-cycle effects are positive in all 100 samples
11
Table 3: Summary statistics (minimum, first quartile, median, mean, third quartile, maximum, and standard
deviation) of parameters (par ), standard errors (se), and z-values (z ) for the five effects repetition (rep),
popularity (pop), activity (act), four.cycle (4cy), and assortativity (asr ) over 100 samples with p = 0.0001
and m = 5. Bold-font highlights the standard deviation of the parameters and the mean of the standard
errors.
min 1st qu median mean 3rd qu max
9.38
0.61
3.44
1.20
0.04
32.99
1.39
0.03
44.83
0.47
0.08
5.37
-0.25
0.02
-9.53
sd
86.73 27.00
6.40
18.18
3.53
15.33
1.39
0.04
0.00
0.04
0.78
36.73
0.04
1.57
0.03
0.00
1.00
50.08
0.15
1.24
0.01
0.12
1.07
10.38
-0.10
0.03
0.00
0.03
-3.57
1.39
66.38
14.49
11.07
1.32
0.04
35.63
1.52
0.03
48.14
0.87
0.10
8.54
-0.14
0.03
-5.37
19.25
2.91
7.08
1.29
0.04
35.16
1.50
0.03
47.54
0.79
0.10
7.94
-0.16
0.03
-6.36
34.86
6.42
8.16
1.29
0.04
35.17
1.49
0.03
47.40
0.79
0.10
7.94
-0.16
0.03
-6.36
effect
rep
rep
rep
pop
pop
pop
act
act
act
4cy
4cy
4cy
asr
asr
asr
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
13.40
1.30
5.02
1.27
0.04
34.71
1.47
0.03
46.66
0.68
0.09
7.17
-0.18
0.02
-7.37
Figure 2: Boxplots (different y-axes) of parameter estimates for the five effects over 100 samples with
p = 0.0001 and m = 5.
12
20406080repetition1.201.30popularity1.401.50activity0.61.0four cycle−0.25−0.15assortativityand the parameters for the assortativity effect are negative in all samples. These findings are also highly
significant in all samples. The minimum absolute value of a z-value (that is, the parameter divided by its
standard error) over all 100 samples and all five effects is 3.44 (for repetition) -- still pointing to an effect
that is significant at the 0.1% level. Thus, the conclusions about the effects in the Wikipedia collaboration
network could have been obtained by analyzing any of the 100 samples and coincide with the effects discussed
in Sect. 4.1.
Differences in the reliability of estimates for the different effects, however, become apparent once we
focus on the size of parameters. Variability of parameters over the different samples shown in Table 3 (also
compare Fig. 2) varies between effects. The parameters for the popularity and activity effects -- and to a
lesser extent for four-cycle and assortativity -- show relatively small variations as do their associated standard
errors and z-values. For instance, for the popularity effect the interquartile range of parameters is [1.27, 1.32]
and the minimum and maximum parameters over 100 samples span the interval [1.20, 1.39]. Thus, had we
analyzed just one of the samples, then with 50% probability we would have obtained a parameter value
from the interval [1.27, 1.32], with 25% probability a value from [1.20, 1.27], and with 25% probability a
value from [1.32, 1.39]. Conclusions drawn from any of these results would hardly vary in a remarkable way.
Parameters for the activity effect show about the same variability and the variability of the parameters
for the assortativity and four-cycle effects are somewhat higher but would still not affect conclusions in
any meaningful way. By far the highest variation can be found for the repetition effect where parameters
range from 9.38 to 86.73 with an interquartile range of [13.40, 66.38]. We also find that the mean over the
repetition parameter is considerably higher than the median pointing to a right-skewed distribution (also
compare Fig. 2). Standard errors and z-values for the repetition effect also show high variations. Thus, while
the qualitative finding of a significantly positive repetition effect does not depend on the specific sample, the
magnitude of the parameter strongly varies over samples, at least for the given sample parameters p0 and
m0. We will tackle in Sect. 4.6 why exactly the repetition effect displays such a different behavior.
A further insight that we can draw from Table 3 is that for those effects that have a low variation over
samples (that is, popularity, activity, assortativity, and to a lesser extent the four-cycle effect) the standard
deviation2 of the model parameters over samples and the mean standard errors of the model parameters are
quite similar. For these four effects, variation of standard errors is also rather small. Together, these findings
seem to suggest that, if variation over samples is small, then the standard deviation of parameters caused
by sampling can be approximated by the typical standard error -- a result that is consistent with asymptotic
properties. This is a convenient result since standard errors can be estimated from a single sample. However,
checking the relation between standard deviation of parameters over samples and mean standard error for
the repetition effect, we find a much larger difference. The standard deviation of the repetition parameter
over the 100 samples is 27.00 -- much higher than the mean standard error (6.42), or the median standard
error (2.91), and even higher than the maximum standard error over all 100 samples (18.18). Thus, judging
variation in model parameters caused by sampling from the standard error of a single sample would be a
poor approximation for the repetition effect.
4.3 Varying the number of events
In a second family of experiments we fix the number of controls per event to m = 5 and let the probability p
to sample from events vary from about 10−7 to 0.5· 10−4 where we double p in each step (compare Sect. 3.5).
For each of these values of p we draw ten samples. Model parameters for the five effects estimated for the
different sample parameter settings are displayed in Figure 3; summary statistics of estimated parameters,
standard errors, and z-values for the five effects are in the Appendix in Tables 5 to 9. Typically, variability
of parameters decreases when the number of sampled events increases -- as it could have been expected. An
exception to this rule is the repetition effect which we discuss last.
For the popularity effect (see Table 6) we find that only the two smallest sample sizes give unreliable
(but also insignificant) results. We never estimated a parameter that is significantly negative at the 5% level
2In the whole paper, standard deviation refers to the unbiased estimator of the sample standard deviation, where we divide
the sum of squared differences to the mean by the number of values minus one.
13
Figure 3: Boxplots of parameter estimates over 10 samples with varying p (as given in the x-axis) and
m = 5. We discard boxplots if their dispersion causes a scaling of the y-axis that would make the less
dispersed boxplots unreadable. (All results are given in the Appendix in Tables 5 to 9.)
14
0.977E−70.195E−60.391E−60.781E−60.156E−50.313E−50.625E−50.125E−40.25E−40.5E−4050100repetition0.391E−60.781E−60.156E−50.313E−50.625E−50.125E−40.25E−40.5E−40.81.01.21.41.61.82.0article popularity0.156E−50.313E−50.625E−50.125E−40.25E−40.5E−41.52.02.5user activity0.313E−50.625E−50.125E−40.25E−40.5E−412345four cycle0.313E−50.625E−50.125E−40.25E−40.5E−4−0.4−0.3−0.2−0.10.00.10.2assortativity(corresponding to a z-value that is at least 1.96 in absolute value). For values of p = 0.391 · 10−6 -- which
corresponds to as little as 140 events (and five times as many controls) -- or higher we estimate only positive
parameters, although not all estimates are significant. For values of p = 0.156 · 10−5 -- which corresponds to
561 events -- or higher we estimate only parameters for the popularity effect which are significantly positive
at the 5% level. The mean of estimated standard errors for p = 0.156 · 10−5 is already approximately equal
to the standard deviation of parameters over the different samples. For higher values of p they become even
closer and both tend to zero. In summary, to reliably estimate the parameter of the popularity effect a few
hundred events already seem to be sufficient.
Findings for the activity effect (see Table 7) are similar to those of popularity. All estimated parameters
for user activity are positive (though not always significant), even for the smallest sample comprising about
35 events. All parameters are significantly positive at the 5%-level, starting from p = 0.781 · 10−6 resulting
in about 281 events and five times as many controls. The standard deviation of estimated parameters is
close to the mean of the standard errors for all but the two smallest sample sizes and tends to zero when the
sample size increases.
Reliable estimation of the parameter for the four-cycle effect (see Table 8) requires more observations
than for the degree effects popularity and activity. For a sample probability ranging from p = 0.977· 10−7 to
p = 0.156 · 10−5 (corresponding to about 35 to 561 events) some of the estimated four-cycle parameters are
negative (in contrast to the more reliable finding reported in Table 2) -- although the negative parameters
are never significant at the 5%-level. Starting from p = 0.313 · 10−5 all estimates are positive and for
p = 0.25·10−4 (corresponding to about 9, 000 sampled events), or higher, all estimated four-cycle parameters
are significantly positive.
Findings for the assortativity effect (see Table 9) are similar to those for the four-cycle effect (keeping
in mind that there is a negative assortativity effect according to the findings reported in Table 2). For p
up to 0.313 · 10−5 we estimate some positive parameters for the assortativity effect -- which, however are
never significant at the 5%-level. For p = 0.5 · 10−4 (corresponding to about 18, 000 events) all estimated
assortativity parameters are significantly negative. For both effects, four-cycle and assortativity, the identity
between the standard deviation of the parameters and the mean standard error is approximately valid once
all parameters are significant and these values tend to zero when the sample size increases.
Findings for the repetition effect (see Table 5) are different. For this effect we observe that the standard
deviation of the estimated parameters (that is, the uncertainty caused by sampling) does not decrease when
we increase the number of sampled events from 35 to 18,000. In contrast, the standard errors tend to decrease
with increasing sample size. Together we obtain that the identity between the standard deviation of the
parameters and the mean standard error does not hold for the repetition effect (at least not for this range of
sample sizes). While these findings are somewhat disturbing since they imply that considerable uncertainty
in the parameter sizes is caused by sampling, findings on the direction of the repetition effect seem to be
quite reliable. For all but the two smallest sample sizes we only estimate positive parameters (the negative
estimates are never significant) and for p = 0.5 · 10−4 all estimates are significantly positive. Thus, while
there is considerable uncertainty about the size of the repetition effect, the danger of incorrectly rejecting
the null hypothesis seems to be small. We further analyze why the repetition effect shows such an outlying
behavior in Sect. 4.6.
4.4 Varying the number of controls per event
In the next family of experiments we fix the probability to sample events to p = 10−5, corresponding to
about 3, 600 sampled events, and let the number of controls per event m vary from 1 to 128 where we double
m in each step (compare Sect. 3.5). Thus, for the smallest m = 1 we sample about 7, 200 observations
(events plus controls) and for the largest m = 128 we sample about 464, 400 observations, which are more
than twice as many observations as we analyzed in Table 2 or in each of the samples considered in Sect. 4.2,
but with a much higher ratio of controls over events. For each of these values of m we draw ten samples.
Model parameters for the five effects estimated for the different sample parameter settings are displayed in
Figure 4; summary statistics of estimated parameters, standard errors, and z-values for the five effects are in
15
Figure 4: Boxplots of parameter estimates over 10 samples with varying m (as given in the x-axis) and
p = 1.0E − 5. (All results are given in the Appendix in Tables 10 to 14.)
the Appendix in Tables 10 to 14. In general, the variability of parameters decreases for all but the repetition
effect when the number of sampled controls increases for a fixed number of sampled events.
Similar to the findings obtained by varying the number of sampled events, for the repetition effect (see
Table 10) we observe that the variability caused by sampling (that is, the standard deviation of parameter
estimates) does not decrease when increasing the number of observations. On the other hand, all parameter
estimates are consistently positive and all estimates are significantly positive at the 5%-level for m = 128.
In contrast to the standard deviation of the parameters, the mean standard errors do decrease with growing
number of observations. Thus, for higher m more and more parameters are significantly different from zero.
We can observe however, that the strategy to sample more controls per event needs higher numbers of
observations to achieve the same standard errors. For instance, we need more than 464, 000 observations,
3, 600 of which are events, to bring down the standard errors to about 12.9, while 18, 000 events (p =
0.5 · 10−4) together with 90, 000 controls yield a mean standard error of about 7.7 (see Table 5). This
supports the rationale of case-control sampling that "the contribution of the nonfailures [controls], in terms
of the statistical power of the study, will be negligible compared to that of the failures [events]" (Borgan et al.
16
124816326412820406080100repetition12481632641281.01.11.21.31.41.51.6article popularity12481632641281.21.41.61.82.02.22.42.6user activity1248163264128−0.50.00.51.01.52.0four cycle1248163264128−0.6−0.4−0.20.0assortativity1995). In Sect. 4.5 we will analyze more systematically whether there is an optimal number of controls per
event.
For the popularity effect (see Table 11) we find that not only the mean standard error, but also the
standard deviation of the parameters gets smaller with growing number of observations for a fixed number
of events. All parameter estimates for this effect are significantly positive, for all values of m that we
considered in this type of experiments. We find that increasing the number of controls for a fixed number of
events seems to require more observations to bring down the standard errors -- or the standard deviation of
parameters -- than when sampling more events but fewer controls per event. For instance, the setting with
sample parameters p = 10−5 and m = 64 yields about 234, 000 observations and achieves about the same
standard deviation of the parameters as the setting with p = 0.5·10−4 and m = 5 which yields about 108, 000
observations. Findings for the activity effect (see Table 12) are very similar to those for the popularity effect.
Estimating the parameters of the four-cycle effect (see Table 13) requires more observations than for the
degree effects. The setting with p = 10−5 and m = 2 is actually the only one in which we estimate a parameter
that is significant at the 5%-level and that points in the opposite direction than the corresponding parameter
given in Table 2. Considering that we draw and analyze in total 360 samples, it seems to be acceptable to
incorrectly reject a null hypothesis once at the 5%-level. We find in Table 13 that starting from m = 16 we
only estimate significantly positive four-cycle parameters.
Estimated parameters for the assortativity effect (see Table 14) are in most cases negative (as in Table 2),
the positive estimates are never significant, and starting from m = 64 we only estimate significantly negative
parameters.
4.5 Varying the ratio of controls per event for a given budget of observations
In the final set of computational experiments we explore whether, given a limited budget to allocate to
observations, it is preferable to draw fewer events and more controls per events or whether more events and
fewer controls yield more reliable estimates. Thus, we fix the number of observations to about 216, 000 --
the number of observations resulting from the initial sample parameters p = 10−4 and m = 5 considered in
Sect. 4.2. We let the number of controls per event m vary from 2 to 256 where we double m in each step
(compare Sect. 3.5). For a given m we set the probability to sample events to p = 6·10−4/(m+1) to keep the
number of sampled observations constant. Thus, for the smallest m = 2 we sample about 72, 000 events and
144, 000 controls and for the largest m = 256 we sample about 840 events and about 215, 000 controls. For
each of these values of m and p we draw ten samples. Model parameters for the five effects estimated for the
different sample parameter settings are displayed in Figure 5; summary statistics of estimated parameters,
standard errors, and z-values for the five effects are in the Appendix in Tables 15 to 19. In general, the
variability of parameters increases when we sample additional controls at the expense of sampling fewer
events, so that sampling more events and fewer controls seems to be the better investment.
Findings for the repetition effect (see Table 15) fit into the general pattern that variability of estimates
increases if the number of sampled events decreases and the number of controls increases accordingly. For this
effect, a considerable jump becomes apparent when m changes from 2 over 4 to 8. For m = 2 the standard
deviation of the parameters is 3.33 and the mean standard error is equal to 0.97. These numbers increase
to a standard deviation of 9.09 and a mean standard error of 1.87 for m = 4 and to a standard deviation
of 26.06 and a mean standard error of 13.34 for m = 8. For higher values of m, the standard deviation is
consistently above 20 and the mean standard error consistently above 10. Starting from m = 64, some of
the estimated parameters are no longer significant at the 5%-level, although all estimates are positive.
These findings seem to suggest that increasing the ratio of events over controls, while keeping the number
of observations constant, is a strategy for reliably estimating the repetition parameter. As a cautionary note
we want to indicate already here that results from Sect. 4.6 suggest that this is misleading: the repetition
variable is very skewed and almost all controls have the same value (equal to zero). We discuss estimation
of the repetition effect in more detail in Sect. 4.6.
Parameter estimates for the popularity effect (see Table 16) are almost unaffected by the ratio of controls
over events for values from m = 2 to m = 32. Standard errors and standard deviation of the parameter
estimates increase slightly for m = 64 and m = 128 and increase sharply for m = 256. For this last value
17
Figure 5: Boxplots of parameter estimates over 10 samples with varying m (as given in the x-axis) and
varying p satisfying (m + 1) · p = 6 · 0.0001. We discard boxplots if their dispersion causes a scaling of the
y-axis that would make the less dispersed boxplots unreadable. (All results are given in the Appendix in
Tables 15 to 19.)
18
24816326412825620406080100repetition2481632641282560.60.81.01.21.4article popularity2481632641281.301.351.401.451.501.551.60user activity2481632641280.20.40.60.81.0four cycle248163264128−0.20−0.15−0.10−0.05assortativityTable 4: Density (i. e., proportion of observations with non-zero values) for the five statistics, reported for
all observations (2nd column), restricted to events (3rd column), and restricted to controls (4th column)
computed from the about 21 million observations obtained by aggregating the 100 samples with p = 10−4
and m = 5, used in Sect. 4.2.
statistic
repetition
popularity
activity
four.cycle
assortativity
density.obs density.events density.controls
0.000006
0.748634
0.258588
0.042329
0.215737
0.084385
0.780180
0.378371
0.163034
0.332671
0.506282
0.937911
0.977290
0.766557
0.917340
we also get the first non-significant estimates, although all estimates are positive. Findings for the activity
effect (see Table 17) and the four-cycle effect (see Table 18) are similar to those for the popularity effect,
showing a sharp increase in variability for m = 256 -- although all estimated parameters for activity and
four-cycle remain significant for the analyzed range of m.
For the assortativity effect (see Table 19) we make the same observation that variability increases sharply
for m = 256. Some estimates for this parameter become insignificant for m = 32 or higher, although all
estimates are negative.
In general, it seems to be a more useful investment to sample events, rather than controls, so that the
number of controls per event is best set to a small number. For values in the range of m = 2 to m = 16
the actual value seems to make little difference. The remarkable differences between m = 2, 4, or 8 for the
repetition effect rather seems to be a spurious finding, as discussed in Sect. 4.6.
4.6 Examining the repetition effect
A common pattern in the results discussed above is that the estimated parameters of the repetition effect
had a much higher variability across samples than those of the other effects. Disturbingly -- and in contrast
to findings for the other effects in the model -- the variability of the repetition parameter does often not
decrease when we increase the sample size, at least not for the ranges of sample parameters considered so
far. We have also found -- again in contrast to findings for the other effects -- that the standard errors of the
repetition effect are a poor approximation for the variability caused by sampling. Thus, while the direction
of this effect is consistently positive, its magnitude can only be estimated with a relatively high degree of
uncertainty.
In this section we perform an additional analysis to find explanations why the estimated parameters of
the repetition effect have such a high standard deviation, compared to the other effects. We analyze the
combined 100 samples obtained with p = 10−4 and m = 5, that is, the aggregation of the samples used
in Sect. 4.2. These constitute more than 21 million observations, 16.7% of which are events and 83.3% are
controls. The densities, that is, the proportions of observations with non-zero values for the five statistics are
reported in Table 4. We compute and report densities separately for all observations, restricted to events,
and restricted to controls (i. e., dyads not experiencing an event at the given time).
In short, the reason for the anomalous behavior of the repetition parameter seems to be the extremely
low number of controls that have a non-zero value in the repetition statistic. The density of the repetition
statistic restricted to controls is just about 6 · 10−6. In the aggregation of all 100 samples, we have about
100 controls with non-zero repetition values. Thus, each of the samples analyzed in Sect. 4.2 has on average
just one control with a non-zero repetition value. The high variability of estimated repetition parameters
across samples seems to be caused by the randomness of sampling none, just one, or several controls with a
non-zero value in the repetition statistic.
We can now also better understand the result reported in Sect. 4.5 (also see Table 15) that sampling
fewer controls (while increasing the number of events accordingly) seems to bring down the variability of
the repetition parameter to a relatively low value. Decreasing the number of sampled controls actually also
19
decreases the probability that the sample includes an exceptional non-event dyad with non-zero repetition
variable. For low numbers of controls it becomes unlikely to sample even a single one of these exceptional
controls.
In such situations, the parameter estimates become only seemingly reliable, since the sample
variation of the explanatory variable among the controls suddenly drops to zero. Clearly this is misleading:
if our sample accidentally included one of the exceptional controls with non-zero repetition variable, then
the parameter estimate would change strongly.
The other four statistics are much more homogeneously distributed. The statistic with the next lowest
density is the four-cycle statistic, which has a density of 0.04 among the controls. This translates to more
than 760, 000 controls with a non-zero four-cycle statistic in the aggregation of all 100 samples and on
average more than 7, 600 in each of the samples analyzed in Sect. 4.2. Apparently this number is sufficient
to estimate parameters with low uncertainty caused by sampling. The other statistics, popularity, activity,
and assortativity, are more evenly distributed than the four-cycle statistic. We discuss in Sect. 5.1 a possible
way to reduce the variability of the repetition parameter.
We emphasize that it is important to check the density of non-zero values -- or, more generally, the
distributions of explanatory variables -- separately for events and controls. Table 4 reveals that the density
of the repetition statistic over all observations (events and controls) is not exceptional.
5 Summary of results and future work
In general, findings reported in this paper are encouraging. Reliably estimating relational event models on
event networks with millions of nodes and hundreds of millions of events seems to be possible by sampling
some tens of thousands of events and a small number of controls per event. For some of the analyzed effects
-- most notably the degree effects popularity and activity -- an even smaller sample size comprising a few
hundred events seems to be sufficient. In general, z-values (that is, parameters divided by their standard
errors) seem to provide a reliable criterion for whether estimated parameters are significantly positive or
negative. This suggests that one way to scale up REMs is by applying relatively simple and well-established
sampling schemes.
Thus, the direction of effects can apparently be estimated in a reliable way with relatively small sample
sizes. A different task however is to assess the size of parameters with small variability. In this aspect, the
repetition effect turned out to be exceptionally difficult.
For those settings of the sample parameters that yield a low parameter variation caused by sampling,
the standard deviation of parameters across samples is approximately equal to the mean standard errors, as
suggested by asymptotic results. This is a convenient result since standard errors can be estimated from a
single sample. Our results related with the repetition parameter, however, indicate that this approximate
identity can not be taken for granted: the standard deviation of the repetition parameter is consistently
much higher than its typical standard error. We identified the extreme sparseness of the repetition variable
among the controls as a likely reason for this finding. Only six controls in a million have a non-zero value in
the repetition variable. Reliable estimation seems to need more than just a few of these exceptional controls,
implying that the sampled set of controls should have several millions of elements (see, however, Sect. 5.1
for a more efficient way to get reliable estimates).
Due to the above findings, analysts should not just estimate parameters and standard errors for a single
sample and draw their conclusions from the resulting z-values. It is definitely recommendable to check the
distribution of statistics separately for sampled events and for sampled controls. It seems to be problematic
if any of these distributions reveal that almost all controls, or almost all events, have the same value. Just
checking the distribution of statistics over all observations (events and controls) is insufficient to detect
outlying statistics -- as is the variance, covariance, or correlation of statistics computed over all observations,
see Table 1. Additionally to checking empirical distributions one could also infer by theoretical arguments
whether certain statistics are likely to be heavily skewed.
In our concrete model we could conclude by
comparing the size of the risk set (more than 30 trillion) with the number of dyadic events (about 360
million) that the repetition variable cannot be evenly distributed over the risk set. (On the other hand, it
seems to be much more difficult to conclude from theoretical considerations why the four-cycle statistic has
20
a relatively high density, equal to 0.04, among the controls.) In situations in which almost all controls take
a single value in some statistic, the most efficient way seems to change the sampling design as it is sketched
in Sect. 5.1.
If computational resources are sufficient, analysts can draw several samples with the same sample pa-
rameters, fit models separately to these, and then assess the variation caused by sampling (as we do in this
paper). If for computational reasons (or otherwise) repeated sampling is not possible, bootstrap sampling
(Efron 1992) might be an alternative to assess variation of parameters from one given set of observations.
(We experimentally applied bootstrap sampling to one single sample and found parameter variation esti-
mated from bootstrapping to be very similar to the one obtained in Sect. 4.2.) However, in light of the
findings discussed in Sects. 4.5 and 4.6, re-sampling (or bootstrap sampling) does not render it unnecessary
to check distributions of statistics:
if some statistic is extremely degenerate, even large combined sample
sizes might miss the exceptional observations and would incorrectly suggest a small parameter variation.
Inspecting the values of statistics separately on sampled events and sampled controls might reveal that, for
instance, all sampled controls take the same value, and thus could point to near-degenerate distributions.
We also analyzed the trade-off between sampling more events and fewer controls per event versus sampling
fewer events and more controls per event, given a limited budget of observations. Results seem to confirm
that events are more valuable than controls (Borgan et al. 1995) so that m, the number of controls per event
is best kept at a small number -- provided that the number of observed events to sample from is sufficiently
high. In our experiments, the actual value of m seemed to make little difference for values up to m = 16,
but choosing higher values of m -- at the expense of sampling fewer events -- increased parameter variation.
We fitted model parameters also after standardizing explanatory variables (these estimates are not re-
ported in this paper). That is, we transformed all the statistics by subtracting their mean and dividing by
their standard deviation before fitting the model. In general, standardization resulted in lower variation of
the estimated model parameters; this applies especially to the repetition effect, as variation for the other
effects is small anyway. However, dividing statistics by their standard deviation has a side effect when we
want to compare estimations on samples with varying numbers of controls per event. Typically, controls
have much smaller values in the various statistics. Thus, if we include more controls per event we typically
get lower standard deviations of statistics. Due to these data characteristics, standardization of statistics
resulted in parameter estimates that systematically tend to zero with higher ratio of controls per event
(although standardization does not affect z-values, since standard errors are scaled with the same factor
as parameters). In this paper, we leave it open whether standardization of statistics is recommendable in
general. In our study we do not want to scale statistics with different factors in different samples -- for this
reason we report results obtained without standardization. Yet, in other studies standardization might be
appropriate to improve comparability of parameter sizes over different effects.
5.1 Improving estimation of the repetition parameter: stratified sampling
Reliable estimation of the size of the repetition parameter turned out to be much more difficult than for
the other effects. We have found in Sect. 4.6 that the extreme sparsity of the repetition statistic among
the controls is a likely cause for this. One obvious way to bring down the sample variance of the repetition
parameter is to further increase the sample size, until the samples include a sufficiently high number of
controls with non-zero values. However, this approach is inefficient. A more efficient approach seems to
be stratified sampling (Langholz and Borgan 1995) where we divide observations into strata -- for instance,
those dyads that have zero weights, compare Sect. 3.3, and those that have non-zero weights -- and sample
controls evenly from these strata.
When applying stratified sampling we have to re-weight observations when estimating the Cox-proportional
hazard model. Stratification typically leads to estimates with lower variation (Langholz and Borgan 1995);
it has been applied to fitting REM in Vu et al. (2015). We do not consider stratified sampling in this paper,
but suggest it as a strategy to estimate REM in situations with near-degenerate explanatory variables, that
is, variables that are (almost) constant on the vast majority of instances, but take considerably different
values on few instances.
21
5.2 Beyond the Cox proportional hazard model
In this paper we considered the Cox proportional hazard model where the estimated parameters explain
which statistics increase or decrease the rate of events but where the baseline hazard λ0(t), see Eq. (1), is
left unspecified. This model, which corresponds to the "ordinal model" from Butts (2008), is appropriate in
many situations since we are often less interested in the absolute rate of events but rather in the factors that
increase or decrease the likelihood of events. In our setting, the baseline hazard λ0(t) corresponds to the
rate of edit events at time t in the whole of Wikipedia, that is, independent of the active user or the target
article. This global rate of events changes systematically over the lifetime of Wikipedia and also changes
periodically by the day of the week and the time of the day (Yasseri et al. 2012). Thus, it seems to be even
preferable to filter out these regularities in the event rate -- as it is done in the Cox proportional hazard
model -- if the goal of a study is to analyze network effects explaining dyadic event rates.
Yet, in other applications of relational event models analysts might be interested in the absolute event
rate, or from another point of view, in the expected time to events, and not just in whether the rate on
some dyads tends to be higher than on others. Relational event models that achieve this are well-known
(Butts 2008) -- but applying case-control sampling to these REMs that take time information from a ratio
scale, rather than an ordinal scale, brings up some additional issues. It is easy to see that manipulating the
number of controls per event -- as it is done by case-control sampling -- affects at least the intercept of a
parametric specification of the full hazard function. (In contrast, a Cox proportional hazard model has no
intercept since an intercept would be absorbed by the baseline hazard.)
An alternative for analysts interested in the absolute hazard rate would be to estimate the integrated
0 λ0(t(cid:48)) dt(cid:48), where λ0(t) is the baseline hazard from Eq. (1), in a non-parametric
way -- an approach that can be combined with case-control sampling (Borgan et al. 1995). If we also sample
from the observed events with probability p < 1, additionally to case-control sampling, we just have to scale
the obtained baseline hazard with 1/p.
baseline hazard Λ0(t) =(cid:82) t
5.3 Reproducibility
Computation of explanatory variables for the experiments presented in this paper has been done with the
open-source software eventnet 3 and parameter estimation has been done with the survival package4 (Th-
erneau and Grambsch 2013) in the R software for statistical computing. The preprocessed list of 360
million relational events which constitutes our input data is publicly available at https://doi.org/10.
5281/zenodo.1626323. The eventnet configuration, and an R script to fit models are also available online.5
This facilitates to reproduce experiments as the ones presented in this paper -- potentially varying sample
parameters, model statistics, model estimation procedure, or the empirical data used to fit the model.
6 Conclusion
Relational event networks naturally result from computer-mediated communication and collaboration or
automated data collection strategies that record social interaction. Networks obtained in this way are often
large. Relational event models provide an appropriate statistical framework to model event networks without
having to aggregate dyadic events over time intervals. Yet, studies that apply REM to large event networks
are surprisingly rare.
Previous work (Vu et al. 2015) proposed case-control sampling to reduce the size of the risk set which is
often quadratic in the number of nodes. In this paper we systematically assess the variation in parameter
estimates that have been obtained by a combination of case-control sampling and uniform sampling from
the observed events.
Results from this paper give an encouraging message. It seems to be possible to reliably fit relational
event models to networks with millions of nodes and hundreds of millions of events by analyzing a sample
3https://github.com/juergenlerner/eventnet
4https://CRAN.R-project.org/package=survival
5https://github.com/juergenlerner/eventnet/wiki/Large-event-networks-(tutorial)
22
of some tens of thousands of events and a small number of controls per event. Some network effects, such
as degree effects, seem to require even much smaller sample sizes comprising a few hundred events to be
reliably estimated. We identified characteristics of the data that might cause a relatively high variability
in the estimation of some effects and recommend that analysts should check distributions of explanatory
variables -- separately for sampled events and controls -- to recognize such situations.
Future work might experimentally assess empirical properties of different sampling strategies, including
stratified sampling (Vu et al. 2015) which might be a way to overcome situations of very skewed variables.
Additionally to case-control sampling and sampling observed events used for fitting the model, one might
also consider sampling from the input events that define the network of past events, see Sect. 3.3. Such an
approach might be a way to analyze even larger event networks -- especially if the unrestricted network of
past events is too large to be kept in computer memory. In this paper we maintained the network of past
events as a function of all input events without sampling, since this ensures that explanatory variables are
computed correctly. Sampling from the input events would require to conduct sensitivity experiments similar
to the ones presented in this paper. (We note that the scenario of using only the sampled events to build
up the network of past events is equivalent to settings with missing data -- given the assumption that dyadic
observations are missing completely at random.
In our situation, where we have the full data available
and sample only to reduce computational runtime, the assumtion of "missing completely at random" is
guaranteed by design.) Last but not least, computation times of statistics could potentially be reduced by
improvements in graph algorithms. For instance, in our model the computation of the four-cycle statistic
has an asymptotic runtime which is by orders of magnitude larger than the runtime needed to compute the
other statistics. Algorithms for more efficiently maintaining counts of four-cycles in dynamic networks exist
(Eppstein et al. 2012) but do not match the usage scenario of this paper where we have many updates and
need four-cycle counts only for a much smaller number of dyads.
Conflicts of interest:
the authors have nothing to disclose.
References
Amati, V., Lomi, A., and Mascia, D. (2018), "Some days are better than others: Examining time-specific
variation in the structuring of interorganizational relations," Social Networks, forthcomming.
Barab´asi, A.-L. and Albert, R. (1999), "Emergence of scaling in random networks," Science, 286, 509 -- 512.
Borgan, Ø., Goldstein, L., and Langholz, B. (1995), "Methods for the analysis of sampled cohort data in the
Cox proportional hazards model," The Annals of Statistics, 1749 -- 1778.
Brandenberger, L. (2019), "Predicting Network Events to Assess Goodness of Fit of Relational Event Mod-
els," Political Analysis, 1 -- 16.
Brandes, U., Lerner, J., and Snijders, T. A. (2009), "Networks Evolving Step by Step: Statistical Analy-
sis of Dyadic Event Data," in Proc. 2009 Intl. Conf. Advances in Social Network Analysis and Mining
(ASONAM), IEEE, pp. 200 -- 205.
Butts, C. T. (2008), "A relational event framework for social action," Sociological Methodology, 38, 155 -- 200.
Cox, D. (1972), "Regression Models and Life-Tables," Journal of the Royal Statistical Society. Series B
(Methodological), 34, 87 -- 22.
Dodds, P. S., Harris, K. D., Kloumann, I. M., Bliss, C. A., and Danforth, C. M. (2011), "Temporal patterns
of happiness and information in a global social network: Hedonometrics and Twitter," PloS one, 6, e26752.
Efron, B. (1992), "Bootstrap methods: another look at the jackknife," in Breakthroughs in statistics, Springer,
pp. 569 -- 593.
23
Eppstein, D., Goodrich, M. T., Strash, D., and Trott, L. (2012), "Extended dynamic subgraph statistics
using h-index parameterized data structures," Theoretical Computer Science, 447, 44 -- 52.
Foucault Welles, B., Vashevko, A., Bennett, N., and Contractor, N. (2014), "Dynamic models of communi-
cation in an online friendship network," Communication Methods and Measures, 8, 223 -- 243.
Golder, S. A., Wilkinson, D. M., and Huberman, B. A. (2007), "Rhythms of social interaction: Messaging
within a massive online network," in Communities and technologies 2007, Springer, pp. 41 -- 66.
Greenstein, S. and Zhu, F. (2012), "Is Wikipedia Biased?" American Economic Review, 102, 343 -- 48.
Hunter, D., Smyth, P., Vu, D. Q., and Asuncion, A. U. (2011), "Dynamic egocentric models for citation
networks," in Proceedings of the 28th International Conference on Machine Learning (ICML-11), pp.
857 -- 864.
Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., and Morris, M. (2008), "ergm: A package
to fit, simulate and diagnose exponential-family models for networks," Journal of statistical software, 24,
nihpa54860.
Jan Piskorski, M. and Gorbatai, A. (2017), "Testing Coleman's social-norm enforcement mechanism: Evi-
dence from Wikipedia," American Journal of Sociology, 122, 1183 -- 1222.
Keegan, B., Gergle, D., and Contractor, N. (2012), "Do editors or articles drive collaboration? Multilevel sta-
tistical network analysis of Wikipedia coauthorship," in Proc. 2012 Conf. Computer Supported Cooperative
Work, ACM, pp. 427 -- 436.
Langholz, B. and Borgan, Ø. (1995), "Counter-matching: a stratified nested case-control sampling method,"
Biometrika, 82, 69 -- 79.
Lawless, J. F. (2003), Statistical Models and Methods for Lifetime Data, Wiley.
Lazer, D., Pentland, A., Adamic, L., Aral, S., Barab´asi, A.-L., Brewer, D., Christakis, N., Contractor,
N., Fowler, J., Gutmann, M., Jebara, T., King, G., Macy, M., Roy, D., and Van Alstyne, M. (2009),
"Computational Social Science," Science, 323, 721 -- 723.
Leenders, R. T. A., Contractor, N. S., and DeChurch, L. A. (2016), "Once upon a time: Understanding
team processes as relational event networks," Organizational Psychology Review, 6, 92 -- 115.
Leifeld, P. (2016), "Discourse Network Analysis: Policy Debates as Dynamic Networks," in The Oxford
Handbook of Political Networks, eds. Victor, J. N., Montgomery, A. H., and Lubell, M., Oxford University
Press.
Lerner, J., Bussmann, M., Snijders, T. A., and Brandes, U. (2013), "Modeling Frequency and Type of
Interaction in Event Networks," Corvinus Journal of Sociology and Social Policy, 4, 3 -- 32.
Lerner, J. and Lomi, A. (2017), "The Third Man: Hierarchy Formation in Wikipedia," Applied Network
Science, 2, 24.
Lerner, J. and Lomi, A. (2018a), "The free encyclopedia that anyone can dispute: an analysis of the micro-
structural dynamics of positive and negative relations in the production of contentious Wikipedia articles,"
Social Networks, forthcoming https://doi.org/10.1016/j.socnet.2018.12.003.
Lerner, J. and Lomi, A. (2018b), "Knowledge categorization affects popularity and quality of Wikipedia
articles," PloS one, 13, e0190674.
Lerner, J. and Lomi, A. (2019a), "Let's Talk About Refugees: Network Effects Drive Contributor Attention to
Wikipedia Articles About Migration-Related Topics," in Proc. Complex Networks and Their Applications
VII, Springer International Publishing, pp. 211 -- 222.
24
Lerner, J. and Lomi, A. (2019b), "The Network Structure of Successful Collaboration in Wikipedia," in
Proc. 52nd Hawaii Intl. Conf. System Sciences (HICSS 2019), IEEE Computer Society, pp. 2622 -- 2631.
Lerner, J. and Tirole, J. (2001), "The open source movement: Key research questions," European economic
review, 45, 819 -- 826.
Lomi, A., Mascia, D., Vu, D. Q., Pallotti, F., Conaldi, G., and Iwashyna, T. J. (2014), "Quality of care and
interhospital collaboration: a study of patient transfers in Italy," Medical care, 52, 407.
Moat, H. S., Curme, C., Avakian, A., Kenett, D. Y., Stanley, H. E., and Preis, T. (2013), "Quantifying
Wikipedia usage patterns before stock market moves," Scientific reports, 3, 1801.
Monge, P. R. and Contractor, N. S. (2003), Theories of Communication Networks, Oxford University Press,
USA.
Newman, M. E. (2006), "Modularity and community structure in networks," Proceedings of the national
academy of sciences, 103, 8577 -- 8582.
Pallotti, F. and Lomi, A. (2011), "Network influence and organizational performance: The effects of tie
strength and structural equivalence," European Management Journal, 29, 389 -- 403.
Perry, P. O. and Wolfe, P. J. (2013), "Point process modelling for directed interaction networks," Journal of
the Royal Statistical Society: Series B (Statistical Methodology), 75, 821 -- 849.
Simon, H. A. (1977), "Aggregation of variables in dynamic systems," in Models of Discovery, Springer, pp.
183 -- 213.
Simon, H. A. (1996), The architecture of complexity, Cambridge, MA: MIT Press.
Stadtfeld, C. and Block, P. (2017), "Interactions, actors, and time: Dynamic network actor models for
relational events," Sociological Science, 4, 318 -- 352.
Therneau, T. M. and Grambsch, P. M. (2013), Modeling survival data: extending the Cox model, Springer
Science & Business Media.
Vu, D., Lomi, A., Mascia, D., and Pallotti, F. (2017), "Relational event models for longitudinal network
data with an application to interhospital patient transfers," Statistics in medicine, 36, 2265 -- 2287.
Vu, D., Pattison, P., and Robins, G. (2015), "Relational event models for social learning in MOOCs," Social
Networks, 43, 121 -- 135.
Yasseri, T., Sumi, R., and Kert´esz, J. (2012), "Circadian patterns of Wikipedia editorial activity: A demo-
graphic analysis," PloS one, 7, e30091.
A Detailed results: distributions of parameters, standard errors,
and z-values
25
Table 5: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the repetition
effect over 10 samples with m = 5 and varying p (as given in the first column).
se
z
se
z
se
z
se
z
p
0.977E-7 par
0.977E-7
0.977E-7
0.195E-6 par
0.195E-6
0.195E-6
0.391E-6 par
0.391E-6
0.391E-6
0.781E-6 par
0.781E-6
0.781E-6
0.156E-5 par
0.156E-5
0.156E-5
0.313E-5 par
0.313E-5
0.313E-5
0.625E-5 par
0.625E-5
0.625E-5
0.125E-4 par
0.125E-4
0.125E-4
0.25E-4
0.25E-4
0.25E-4
0.5E-4
0.5E-4
0.5E-4
se
z
par
se
z
par
se
z
se
z
se
z
se
z
1st qu median
13.81
min
2.71
-24.29
141.56 10145.18
0.00
8.73
304.21
0.00
43.76
730.62
0.01
85.47
902.81
0.01
83.03
226.98
0.08
69.45
56.15
0.50
72.90
56.08
0.75
59.24
31.15
1.00
43.75
21.93
2.06
11.75
1.37
3.58
-0.00
-1.20
101.80
-0.00
20.89
70.17
0.00
26.31
181.24
0.01
34.95
39.04
0.02
31.09
43.21
0.04
8.06
1.74
0.70
34.91
25.11
0.87
21.49
7.18
1.60
10.33
0.97
3.19
mean
13.41
0.00
49.91
7374.75
0.09
85.64
3rd qu
29.71
12967.66 12726.78 14125.86
0.00
74.09
8400.51
0.19
115.40
4732.95 10076.41
0.08
128.36
5816.34
0.12
118.24
1222.64
0.46
91.20
186.65
0.79
105.36
131.87
1.41
72.52
53.42
1.88
80.65
33.90
2.54
42.50
13.17
8.62
0.00
43.78
3534.09
0.01
106.11
2352.02
0.04
108.36
1960.73
0.04
98.40
532.09
0.15
78.68
118.55
0.65
92.39
91.67
0.98
67.53
42.43
1.39
59.93
31.14
2.44
13.30
1.92
6.98
0.19
97.35
3318.56
0.13
94.46
1232.39
0.29
78.95
355.64
0.79
83.28
88.97
1.41
67.14
51.70
1.54
59.73
26.59
2.31
31.09
7.74
6.44
max
34.48
30204.59
0.01
125.75
37400.83
0.28
143.17
10852.35
1.50
131.21
9886.83
0.69
127.19
5309.28
0.90
108.30
2534.21
2.23
110.79
145.67
4.64
96.80
111.70
2.79
88.57
34.77
2.99
85.84
23.90
10.60
sd
18.40
7990.80
0.00
45.21
11410.16
0.11
45.61
4794.37
0.46
38.30
3350.04
0.21
29.72
1659.93
0.29
22.71
767.86
0.61
31.64
48.37
1.20
17.63
29.81
0.66
23.27
9.66
0.45
29.53
9.19
2.76
26
Table 6: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the popularity
effect over 10 samples with m = 5 and varying p (as given in the first column).
se
z
se
z
p
0.977E-7 par
0.977E-7
0.977E-7
0.195E-6 par
0.195E-6
0.195E-6
0.391E-6 par
0.391E-6
0.391E-6
0.781E-6 par
0.781E-6
0.781E-6
0.156E-5 par
0.156E-5
0.156E-5
0.313E-5 par
0.313E-5
0.313E-5
0.625E-5 par
0.625E-5
0.625E-5
0.125E-4 par
0.125E-4
0.125E-4
0.25E-4
0.25E-4
0.25E-4
0.5E-4
0.5E-4
0.5E-4
se
z
par
se
z
par
se
z
se
z
se
z
se
z
se
z
se
z
mean
12.52
min 1st qu median
-3.48
11.72
0.71
-0.57
-21.66
0.73
-0.34
0.67
0.41
1.16
0.79
0.32
1.61
0.83
0.23
2.69
0.71
0.18
3.67
1.06
0.13
7.52
1.11
0.10
10.11
1.18
0.07
15.70
1.21
0.05
23.33
2.75
107.06
0.00
1.01
1.00
0.00
1.16
0.55
1.46
0.87
0.36
2.49
0.87
0.28
3.19
1.04
0.20
4.67
1.20
0.15
8.00
1.20
0.10
11.46
1.22
0.07
16.62
1.28
0.05
24.66
3rd qu
20.78
3296.22 2765.42 4865.10
0.03
7.05
948.11
1.26
1.84
1.05
2.28
1.79
0.58
3.06
1.51
0.33
4.80
1.42
0.24
5.81
1.46
0.16
9.02
1.34
0.11
12.22
1.31
0.08
17.47
1.35
0.05
25.60
0.05
0.00
1.62
5.47
46.57 2504.07
0.56
0.07
1.46
1.49
0.83
0.77
1.90
1.84
1.28
1.34
0.49
0.49
2.76
2.66
1.23
1.04
0.31
0.31
3.91
3.84
1.17
1.14
0.22
0.22
5.33
5.24
1.33
1.31
0.16
0.16
8.50
8.52
1.29
1.28
0.11
0.11
11.75
12.09
1.28
1.25
0.07
0.07
17.13
17.30
1.31
1.31
0.05
0.05
25.13
25.01
max
34.24
5552.37
0.76
65.67
22365.06
1.84
1.94
1.39
2.92
2.07
0.75
3.97
1.95
0.39
5.10
1.51
0.31
6.39
1.63
0.18
9.60
1.46
0.12
12.95
1.40
0.08
18.83
1.39
0.06
25.90
sd
11.73
2440.08
0.32
23.47
6996.94
0.85
0.43
0.35
0.59
0.51
0.14
0.64
0.45
0.05
0.91
0.27
0.04
0.86
0.18
0.01
0.71
0.11
0.01
0.92
0.07
0.00
0.88
0.06
0.00
0.80
27
Table 7: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the activity
effect over 10 samples with m = 5 and varying p (as given in the first column).
se
z
se
z
se
z
se
z
p
0.977E-7 par
0.977E-7
0.977E-7
0.195E-6 par
0.195E-6
0.195E-6
0.391E-6 par
0.391E-6
0.391E-6
0.781E-6 par
0.781E-6
0.781E-6
0.156E-5 par
0.156E-5
0.156E-5
0.313E-5 par
0.313E-5
0.313E-5
0.625E-5 par
0.625E-5
0.625E-5
0.125E-4 par
0.125E-4
0.125E-4
0.25E-4
0.25E-4
0.25E-4
0.5E-4
0.5E-4
0.5E-4
se
z
par
se
z
par
se
z
se
z
se
z
se
z
0.00
3.89
mean
10.63
min 1st qu median
0.49
10.61
0.56
0.00
0.66
0.37
0.00
1.11
0.24
0.37
0.97
0.23
2.35
1.12
0.22
3.69
1.28
0.16
6.44
1.32
0.11
9.66
1.39
0.08
14.23
1.41
0.06
22.93
1.45
0.04
31.86
5.69
103.33
0.00
1.25
1.73
0.07
1.24
0.44
1.74
1.25
0.31
2.70
1.47
0.25
4.59
1.55
0.20
6.76
1.43
0.12
11.03
1.42
0.09
15.88
1.46
0.06
23.08
1.46
0.04
32.90
3rd qu
12.11
3698.22 2992.04 4814.90
0.20
14.02
414.82
1.36
2.60
1.46
2.84
2.09
0.69
4.29
1.97
0.43
5.73
1.83
0.27
7.86
1.62
0.15
12.14
1.60
0.10
16.54
1.55
0.07
23.52
1.59
0.05
34.07
0.24
7.90
12.12 1964.63
0.67
2.25
1.80
2.37
1.84
0.59
3.59
1.78
0.36
5.25
1.73
0.24
7.30
1.56
0.14
11.41
1.51
0.09
16.09
1.51
0.06
23.46
1.52
0.05
33.56
0.30
1.61
0.69
2.40
1.61
0.41
3.74
1.67
0.30
5.54
1.70
0.24
7.25
1.52
0.13
11.47
1.51
0.09
16.13
1.52
0.06
23.40
1.50
0.04
33.73
max
30.82
7721.00
1.27
24.62
15140.75
2.00
6.64
8.64
4.54
3.53
1.37
4.78
2.61
0.64
6.72
2.35
0.36
8.08
1.94
0.20
12.56
1.67
0.11
17.39
1.58
0.07
25.10
1.63
0.05
34.77
sd
8.69
2744.08
0.45
8.95
4784.95
0.81
1.69
2.63
1.11
0.81
0.40
0.92
0.46
0.14
0.96
0.31
0.06
0.62
0.21
0.03
0.92
0.10
0.01
0.91
0.06
0.00
0.62
0.07
0.00
0.91
28
Table 8: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the four-cycle
effect over 10 samples with m = 5 and varying p (as given in the first column).
min 1st qu median
2.61
se
z
se
z
se
z
se
z
p
0.977E-7 par
0.977E-7
0.977E-7
0.195E-6 par
0.195E-6
0.195E-6
0.391E-6 par
0.391E-6
0.391E-6
0.781E-6 par
0.781E-6
0.781E-6
0.156E-5 par
0.156E-5
0.156E-5
0.313E-5 par
0.313E-5
0.313E-5
0.625E-5 par
0.625E-5
0.625E-5
0.125E-4 par
0.125E-4
0.125E-4
0.25E-4
0.25E-4
0.25E-4
0.5E-4
0.5E-4
0.5E-4
se
z
par
se
z
par
se
z
se
z
se
z
se
z
-18.92
5.81
-0.01
-28.76
0.96
-0.36
-8.50
0.76
-1.50
-1.23
0.57
-1.83
-0.39
0.42
-0.85
0.21
0.57
0.37
0.25
0.25
0.90
0.33
0.25
0.90
0.56
0.16
2.75
0.50
0.12
3.99
-3.98
526.14
-0.00
-0.04
24.15
-0.00
0.86
1.92
0.19
0.16
0.76
0.19
0.56
1.08
0.46
0.52
0.70
0.80
0.69
0.36
1.95
0.74
0.27
2.45
0.66
0.20
3.76
0.67
0.13
5.11
0.00
3.74
0.09
19.84
mean
5.63
3rd qu
6.44
6998.87 5963.65 7674.41
0.04
53.04
75.29 2309.34 3626.52
0.27
4.33
13.34
0.84
4.48
3.20
1.37
2.93
1.45
1.97
3.21
1.78
1.91
1.77
0.60
2.88
1.12
0.36
2.98
1.02
0.23
4.55
0.93
0.15
5.86
0.08
8.42
40.34
0.32
2.99
2.58
0.39
2.43
1.74
1.08
1.98
1.23
1.38
1.19
0.47
2.37
0.89
0.32
2.77
0.87
0.21
4.07
0.76
0.14
5.53
0.02
2.26
4.49
0.40
0.24
1.08
0.26
1.73
1.23
1.27
1.43
0.80
1.27
1.08
0.47
2.51
0.79
0.34
2.85
0.98
0.21
4.18
0.70
0.13
5.42
max
62.52
15535.57
0.52
93.26
11803.40
0.54
70.53
343.64
1.39
15.70
10.94
2.00
8.22
6.02
2.08
4.98
2.83
2.54
2.04
0.70
3.37
1.36
0.42
3.93
1.11
0.24
5.01
1.04
0.17
7.48
sd
21.94
5562.52
0.19
42.49
4023.58
0.27
22.24
106.75
0.83
5.17
3.17
1.21
2.77
1.67
1.01
1.86
0.79
0.74
0.66
0.16
0.81
0.33
0.05
0.86
0.21
0.02
0.74
0.19
0.02
0.98
29
Table 9: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the assortativity
effect over 10 samples with m = 5 and varying p (as given in the first column).
se
z
se
z
se
z
p
0.977E-7 par
0.977E-7
0.977E-7
0.195E-6 par
0.195E-6
0.195E-6
0.391E-6 par
0.391E-6
0.391E-6
0.781E-6 par
0.781E-6
0.781E-6
0.156E-5 par
0.156E-5
0.156E-5
0.313E-5 par
0.313E-5
0.313E-5
0.625E-5 par
0.625E-5
0.625E-5
0.125E-4 par
0.125E-4
0.125E-4
0.25E-4
0.25E-4
0.25E-4
0.5E-4
0.5E-4
0.5E-4
se
z
par
se
z
par
se
z
se
z
se
z
se
z
se
z
-0.00
0.50
mean
-1.56
min 1st qu median
-9.31
-1.81
0.91
-0.72
-13.44
0.48
-0.61
-0.91
0.16
-2.32
-1.41
0.17
-2.14
-0.65
0.16
-2.50
-0.40
0.14
-2.04
-0.41
0.08
-2.76
-0.22
0.06
-3.27
-0.27
0.04
-5.92
-0.23
0.03
-6.94
-4.00
79.70
-0.00
-1.76
7.36
-0.00
-0.37
0.53
-1.33
-0.33
0.24
-1.09
-0.32
0.21
-1.50
-0.22
0.18
-0.98
-0.26
0.10
-2.32
-0.19
0.07
-2.58
-0.19
0.05
-3.99
-0.20
0.03
-5.55
3rd qu
1.54
1588.41 1614.18 2140.75
0.00
11.23
425.53
0.36
0.92
2.48
0.44
0.36
0.68
0.91
-0.17
0.33
-0.50
0.08
0.27
0.29
-0.14
0.13
-1.37
-0.13
0.08
-1.67
-0.10
0.06
-1.75
-0.15
0.04
-4.04
-0.01
2.36
39.79 1545.68
0.14
0.41
2.14
-0.40
0.16
0.61
-0.08
-0.12
0.33
-0.75
-0.09
0.22
-0.45
-0.20
0.11
-1.66
-0.13
0.08
-1.87
-0.15
0.05
-2.99
-0.17
0.04
-4.85
0.14
0.04
0.77
0.03
0.04
0.48
0.07
-0.29
0.27
-1.02
-0.08
0.21
-0.34
-0.19
0.11
-1.51
-0.17
0.08
-2.25
-0.17
0.05
-3.46
-0.17
0.04
-4.67
max
7.66
4405.15
0.61
13.31
11377.11
0.85
2.47
10.56
0.73
2.94
1.84
1.60
1.23
0.86
1.43
0.15
0.35
0.70
0.02
0.16
0.20
0.24
0.13
1.86
0.00
0.06
0.07
-0.11
0.04
-3.14
sd
4.91
1667.14
0.32
9.20
3609.04
0.42
1.13
3.17
1.09
1.22
0.53
1.33
0.52
0.21
1.28
0.19
0.07
0.93
0.12
0.02
0.85
0.13
0.02
1.42
0.08
0.01
1.75
0.04
0.00
1.30
30
Table 10: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the repetition
effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column).
min 1st qu median
86.95
0.57
84.20
mean 3rd qu
84.80
91.64
184.99 183.31 258.16
0.78
94.86
147.94 180.60 248.64
1.07
87.87
73.77
1.60
88.18
66.96
1.67
84.24
54.28
3.06
84.03
33.39
3.67
67.03
31.18
4.68
61.24
16.69
5.29
0.73
74.08
79.83
1.34
67.11
49.18
1.78
63.85
33.71
2.60
65.04
23.94
3.80
47.24
22.68
3.31
53.03
12.90
4.68
0.50
89.39
0.52
80.18
57.82
1.03
69.01
48.82
1.36
72.21
32.96
1.89
74.40
24.73
3.07
44.10
18.18
2.65
54.74
14.40
4.30
max
101.02
311.05
0.93
109.33
485.05
1.42
94.42
291.75
3.26
99.30
87.42
5.03
105.82
60.01
5.93
98.10
44.54
8.71
79.21
64.24
6.71
95.40
26.17
7.00
sd
10.66
89.50
0.25
19.18
140.31
0.46
20.20
77.35
0.81
26.24
24.45
1.19
34.09
22.34
1.47
29.47
13.96
2.25
23.92
20.99
1.77
25.90
7.53
1.30
m
par 65.46
1
se
81.66
1
z
0.24
1
par 45.70
2
32.85
se
2
z
0.21
2
par 33.99
4
24.61
se
4
z
0.32
4
par 11.93
8
se
2.37
8
z
0.94
8
par 10.45
16
se
1.76
16
z
1.36
16
par 12.30
32
1.41
se
32
z
1.92
32
par 19.85
64
3.89
se
64
64
z
1.23
128 par 16.83
128 se
2.59
3.13
128 z
76.66
104.62
0.36
75.30
76.29
0.38
68.32
46.56
0.95
55.17
35.12
1.27
37.27
17.86
1.66
60.51
18.53
2.43
25.22
4.84
2.08
31.61
6.27
3.90
31
Table 11: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the popularity
effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column).
sd
1.55 0.18
0.30
0.04
6.38
0.53
1.66 0.21
0.03
0.22
8.63
0.72
1.53 0.15
0.01
0.14
11.71
0.94
1.40 0.08
0.11
0.00
13.42
0.55
1.42 0.10
0.09
0.00
17.06
1.14
1.36 0.08
0.00
0.07
20.20
1.39
1.32 0.05
0.00
0.06
22.17
1.22
1.27 0.03
0.05
0.00
1.01
25.79
min 1st qu median mean 3rd qu max
1.03
0.18
4.87
1.02
0.13
6.55
1.10
0.11
8.92
1.12
0.10
11.51
1.13
0.08
13.43
1.08
0.06
16.15
1.15
0.06
18.19
1.16
0.05
22.16
1.35
0.23
5.80
1.29
0.17
7.69
1.31
0.12
10.50
1.28
0.10
12.56
1.26
0.08
15.13
1.20
0.07
17.82
1.25
0.06
21.19
1.24
0.05
23.72
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
m
1
1
1
2
2
2
4
4
4
8
8
8
16
16
16
32
32
32
64
64
64
128 par
128 se
128 z
1.45
0.26
6.25
1.44
0.19
8.15
1.45
0.13
11.35
1.33
0.11
12.91
1.35
0.09
16.01
1.23
0.07
18.47
1.29
0.06
21.98
1.26
0.05
24.26
1.33
0.21
5.47
1.11
0.15
7.34
1.19
0.12
9.83
1.24
0.10
12.30
1.17
0.08
14.32
1.15
0.07
16.59
1.22
0.06
20.90
1.23
0.05
23.23
1.38
0.23
5.89
1.30
0.16
7.90
1.28
0.13
10.37
1.27
0.10
12.61
1.24
0.08
14.87
1.21
0.07
17.78
1.26
0.06
21.58
1.25
0.05
23.43
32
Table 12: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the activity
effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column).
sd
2.64 0.37
0.46
0.08
8.28
0.78
2.18 0.27
0.04
0.26
11.92
1.09
1.84 0.16
0.01
0.14
14.58
0.61
1.66 0.11
0.10
0.01
18.58
0.58
1.62 0.08
0.07
0.00
23.36
0.56
1.43 0.04
0.00
0.05
30.51
1.19
1.42 0.03
0.00
0.04
37.14
0.84
1.38 0.02
0.03
0.00
0.74
44.34
min 1st qu median mean 3rd qu max
1.21
0.15
5.71
1.26
0.11
8.34
1.35
0.09
12.40
1.36
0.07
16.51
1.32
0.06
21.74
1.30
0.04
26.24
1.32
0.04
34.21
1.30
0.03
42.17
1.75
0.25
7.27
1.60
0.16
10.34
1.55
0.12
13.33
1.47
0.08
17.61
1.45
0.06
22.45
1.36
0.05
29.14
1.36
0.04
35.19
1.34
0.03
43.36
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
m
1
1
1
2
2
2
4
4
4
8
8
8
16
16
16
32
32
32
64
64
64
128 par
128 se
128 z
1.84
0.26
7.77
1.66
0.17
10.89
1.64
0.12
13.67
1.56
0.09
17.92
1.49
0.07
22.80
1.39
0.05
29.75
1.38
0.04
35.40
1.35
0.03
43.91
1.59
0.21
6.84
1.44
0.13
9.88
1.43
0.11
12.93
1.40
0.08
17.40
1.39
0.06
21.98
1.34
0.05
28.87
1.35
0.04
34.63
1.32
0.03
42.68
1.68
0.24
7.32
1.54
0.15
10.31
1.54
0.12
13.25
1.43
0.08
17.56
1.44
0.06
22.36
1.36
0.05
29.11
1.36
0.04
35.03
1.34
0.03
43.62
33
Table 13: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the four-cycle
effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column).
sd
2.28 0.50
1.46
0.30
2.28
0.43
2.31 0.81
0.18
0.88
3.32
1.52
1.33 0.28
0.06
0.55
3.63
0.66
1.43 0.42
0.34
0.05
4.25
1.49
1.14 0.24
0.22
0.03
5.22
0.82
0.94 0.17
0.01
0.15
6.85
0.86
0.84 0.14
0.01
0.11
7.95
1.00
0.56 0.04
0.08
0.00
0.47
7.78
min 1st qu median mean 3rd qu max
0.66
0.59
0.75
-0.57
0.28
-2.03
0.56
0.31
1.57
-0.20
0.18
-1.07
0.32
0.14
2.30
0.46
0.11
3.79
0.45
0.08
5.07
0.45
0.07
6.53
1.35
0.93
1.47
0.61
0.45
1.06
0.86
0.38
2.25
0.78
0.26
2.85
0.75
0.19
3.91
0.67
0.13
5.10
0.63
0.10
6.31
0.52
0.07
7.17
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
m
1
1
1
2
2
2
4
4
4
8
8
8
16
16
16
32
32
32
64
64
64
128 par
128 se
128 z
1.67
1.00
1.68
0.95
0.51
1.99
1.06
0.40
2.51
0.98
0.29
3.56
0.88
0.21
4.41
0.80
0.14
5.38
0.74
0.11
7.21
0.55
0.07
7.55
1.02
0.77
1.32
0.13
0.34
0.36
0.61
0.36
1.82
0.64
0.25
2.60
0.61
0.17
3.60
0.54
0.12
4.56
0.50
0.09
5.49
0.49
0.07
6.85
1.27
0.84
1.39
0.49
0.39
1.14
0.78
0.36
2.05
0.83
0.26
3.34
0.75
0.19
4.06
0.62
0.13
5.05
0.63
0.10
6.05
0.53
0.07
7.12
34
Table 14: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the assorta-
tivity effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column).
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
m
1
1
1
2
2
2
4
4
4
8
8
8
16
16
16
32
32
32
64
64
64
128 par
128 se
128 z
min 1st qu median mean 3rd qu max
-0.67
0.14
-3.56
-0.37
0.09
-3.56
-0.30
0.08
-3.42
-0.27
0.05
-4.39
-0.19
0.05
-4.04
-0.18
0.03
-5.54
-0.21
0.02
-7.35
-0.14
0.02
-6.76
sd
-0.02 0.23
0.29
0.06
-0.07
1.25
0.13 0.17
0.03
0.18
1.03
1.54
0.10 0.11
0.01
0.12
0.90
1.25
-0.07 0.07
0.08
0.01
-0.94
1.15
-0.01 0.06
0.06
0.00
-0.20
1.20
-0.03 0.06
0.00
0.04
-0.65
1.87
-0.07 0.04
0.00
0.03
-2.36
1.43
-0.07 0.02
0.02
0.00
1.17
-3.04
-0.14
0.25
-0.80
-0.01
0.12
-0.14
-0.13
0.11
-1.28
-0.09
0.07
-1.34
-0.09
0.05
-1.67
-0.08
0.04
-1.95
-0.11
0.03
-3.69
-0.09
0.02
-3.91
-0.51
0.15
-2.72
-0.25
0.10
-1.98
-0.24
0.09
-2.36
-0.21
0.06
-3.17
-0.15
0.05
-2.83
-0.17
0.03
-4.80
-0.15
0.03
-5.11
-0.12
0.02
-5.61
-0.34
0.16
-1.74
-0.16
0.11
-1.25
-0.19
0.10
-2.26
-0.16
0.07
-2.30
-0.12
0.05
-2.33
-0.15
0.04
-4.41
-0.13
0.03
-4.54
-0.10
0.02
-4.64
-0.33
0.19
-1.80
-0.13
0.12
-1.21
-0.17
0.10
-1.83
-0.16
0.07
-2.34
-0.11
0.05
-2.30
-0.12
0.04
-3.53
-0.13
0.03
-4.60
-0.10
0.02
-4.79
35
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
m
2
2
2
4
4
4
8
8
8
16
16
16
32
32
32
64
64
64
128 par
128 se
128 z
256 par
256 se
256 z
min 1st qu median mean 3rd qu
12.34
7.83
0.48
1.15
15.46
7.06
14.32
10.61
1.52
0.67
5.06
12.53
80.75
14.64
18.95
1.63
4.92
3.58
12.42
71.88
13.31
1.24
6.10
3.98
75.97
15.91
2.46
23.24
3.81
2.80
77.97
13.17
26.28
1.39
3.91
1.78
25.74
83.31
33.59
5.26
3.53
1.34
77.15
7.13
0.58
17.94
5.13
0.74
10.79
9.36
0.97
0.61
13.16
14.73
15.73
12.72
1.86
1.11
11.06
11.76
62.76
60.02
14.27 13.34
4.98
4.68
57.97
53.13
12.32 10.87
6.01
5.34
67.61
56.56
16.87 16.56
3.71
3.47
61.98
55.70
19.70 19.68
3.05
3.82
79.49
64.01
23.93 26.64
2.85
2.60
64.14
54.71
15.78 21.27
4.31
3.65
8.48
0.56
11.03
12.11
0.94
10.20
50.30
10.53
4.42
30.66
5.43
4.61
31.35
9.96
3.18
32.18
8.86
2.82
32.59
13.71
2.29
37.28
11.71
2.68
Table 15: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the repetition
effect over 10 samples with varying m (as given in the first column) and varying p satisfying (m + 1) · p =
6 · 0.0001.
sd
max
3.33
17.16
0.66
2.21
3.37
16.44
9.09
41.14
2.23
8.14
3.02
15.81
88.85 26.06
6.62
20.42
8.97
1.46
91.63 27.80
7.22
23.00
10.12
2.25
93.35 26.47
27.58
8.51
1.06
6.47
88.49 27.29
14.27
49.80
9.44
2.17
102.49 29.76
17.01
59.53
4.89
1.10
80.65 27.54
71.37
20.76
3.20
12.32
36
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
m
2
2
2
4
4
4
8
8
8
16
16
16
32
32
32
64
64
64
128 par
128 se
128 z
256 par
256 se
256 z
min 1st qu median mean 3rd qu max
1.23
0.03
35.52
1.24
0.04
34.80
1.25
0.04
31.82
1.13
0.04
26.50
1.14
0.05
21.87
1.08
0.06
17.36
1.03
0.07
12.76
0.54
0.08
0.47
sd
1.38 0.05
0.04
0.00
37.30
0.57
1.36 0.04
0.00
0.04
36.64
0.63
1.36 0.04
0.00
0.04
33.90
0.72
1.29 0.05
0.00
0.05
29.62
0.87
1.29 0.05
0.05
0.00
25.50
1.39
1.36 0.08
0.00
0.07
21.61
1.52
1.37 0.09
0.00
0.08
17.32
1.28
1.27 0.30
1.16
0.43
5.89
14.21
1.30
0.04
36.44
1.31
0.04
35.69
1.29
0.04
32.85
1.23
0.04
28.32
1.22
0.05
23.70
1.22
0.06
19.31
1.24
0.08
16.07
0.93
0.39
7.59
1.28
0.03
36.37
1.28
0.04
35.18
1.26
0.04
32.25
1.22
0.04
27.90
1.21
0.05
22.75
1.21
0.06
17.86
1.22
0.07
16.00
0.61
0.09
1.00
Table 16: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the popularity
effect over 10 samples with varying m (as given in the first column) and varying p satisfying (m + 1) · p =
6 · 0.0001.
1.34
0.04
36.77
1.34
0.04
36.27
1.32
0.04
33.27
1.26
0.04
28.84
1.26
0.05
25.07
1.25
0.06
20.28
1.27
0.08
16.82
1.17
0.68
11.65
1.30
0.04
36.40
1.31
0.04
35.57
1.28
0.04
32.89
1.25
0.04
28.34
1.22
0.05
23.39
1.23
0.06
19.51
1.25
0.08
16.31
1.09
0.11
10.57
37
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
m
2
2
2
4
4
4
8
8
8
16
16
16
32
32
32
64
64
64
128 par
128 se
128 z
256 par
256 se
256 z
min 1st qu median mean 3rd qu max
1.58
1.48
0.03
0.03
48.40
46.32
1.59
1.48
0.03
0.03
46.85
48.62
1.50
1.39
0.03
0.03
46.89
45.01
1.38
1.48
0.03
0.03
45.70
41.82
1.46
1.36
0.04
0.04
39.63
36.55
1.44
1.30
0.04
0.04
35.65
32.46
1.27
1.43
0.05
0.04
30.65
28.02
5.36
1.26
0.05
1.17
27.72
4.34
1.51
0.03
46.77
1.49
0.03
47.25
1.44
0.03
45.73
1.39
0.03
42.90
1.40
0.04
37.97
1.34
0.04
32.73
1.32
0.04
28.17
1.28
0.05
5.62
1.53
0.03
47.11
1.51
0.03
47.65
1.47
0.03
46.52
1.42
0.03
43.23
1.42
0.04
38.64
1.37
0.04
33.45
1.33
0.05
29.28
1.30
0.05
24.16
sd
0.03
0.00
0.69
0.03
0.00
0.57
0.03
0.00
0.65
0.03
0.00
1.07
0.03
0.00
1.04
0.04
0.00
1.16
0.05
0.00
1.13
2.03
0.51
10.44
Table 17: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the activity
effect over 10 samples with varying m (as given in the first column) and varying p satisfying (m + 1) · p =
6 · 0.0001.
1.53
0.03
47.26
1.52
0.03
47.66
1.46
0.03
46.23
1.42
0.03
43.31
1.41
0.04
38.31
1.37
0.04
33.68
1.34
0.05
29.31
2.86
0.44
17.24
1.54
0.03
47.79
1.53
0.03
47.86
1.49
0.03
46.74
1.44
0.03
43.64
1.42
0.04
38.91
1.39
0.04
34.21
1.37
0.05
30.41
5.14
0.93
25.27
38
Table 18: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the four-cycle
effect over 10 samples with varying m (as given in the first column) and varying p satisfying (m + 1) · p =
6 · 0.0001.
min 1st qu median mean 3rd qu max
1.01
0.11
8.91
0.95
0.11
9.25
0.91
0.11
8.39
0.91
0.11
8.43
0.80
0.12
7.42
0.72
0.11
6.77
0.75
0.12
6.26
sd
0.17
0.01
1.20
0.12
0.00
1.04
0.09
0.01
0.60
0.10
0.01
0.71
0.09
0.01
0.77
0.10
0.01
0.68
0.16
0.01
1.18
31.43 15.16
7.41
3.12
0.72
5.93
0.85
0.11
7.90
0.86
0.10
8.66
0.80
0.10
8.08
0.70
0.10
7.13
0.66
0.10
6.71
0.67
0.11
6.29
0.63
0.12
5.53
29.21
5.29
5.14
0.70
0.10
6.94
0.79
0.10
8.15
0.77
0.10
7.94
0.67
0.10
6.93
0.63
0.10
6.53
0.60
0.10
5.77
0.57
0.11
5.08
0.61
0.13
4.77
0.72
0.10
7.06
0.79
0.10
7.92
0.75
0.10
7.68
0.67
0.10
6.96
0.63
0.10
6.34
0.58
0.10
5.76
0.53
0.11
4.78
12.26
2.49
4.69
m
par 0.45
2
se
0.09
2
z
5.20
2
par 0.58
4
0.10
se
4
z
6.04
4
par 0.60
8
0.09
se
8
z
6.58
8
par 0.53
16
0.09
se
16
z
5.85
16
par 0.47
32
se
0.09
32
z
5.28
32
par 0.42
64
0.08
se
64
64
z
4.88
128 par 0.20
0.10
128 se
128 z
2.09
256 par 0.40
256 se
0.11
3.41
256 z
0.61
0.09
6.20
0.72
0.10
7.29
0.71
0.10
7.40
0.63
0.09
6.68
0.59
0.10
5.64
0.50
0.10
5.14
0.44
0.10
4.24
0.53
0.12
4.24
39
Table 19: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the assor-
tativity effect over 10 samples with varying m (as given in the first column) and varying p satisfying
(m + 1) · p = 6 · 0.0001.
m
2
2
2
4
4
4
8
8
8
16
16
16
32
32
32
64
64
64
128 par
128 se
128 z
256 par
256 se
256 z
min 1st qu median mean 3rd qu max
-0.23
0.02
-8.96
-0.19
0.02
-7.61
-0.21
0.02
-8.77
-0.14
0.02
-5.33
-0.20
0.03
-7.30
-0.16
0.03
-5.71
-0.17
0.03
-5.36
-2.31
0.03
-5.75
-0.19
0.03
-7.16
-0.17
0.03
-6.49
-0.13
0.03
-5.21
-0.12
0.03
-4.45
-0.10
0.03
-3.79
-0.10
0.03
-3.24
-0.08
0.03
-2.68
-0.14
0.04
-3.40
-0.20
0.03
-7.55
-0.18
0.03
-7.04
-0.16
0.02
-6.52
-0.13
0.03
-5.00
-0.13
0.03
-4.63
-0.14
0.03
-4.58
-0.14
0.03
-4.29
-1.71
0.03
-4.73
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
par
se
z
-0.18
0.03
-6.91
-0.16
0.03
-6.33
-0.14
0.03
-5.56
-0.11
0.03
-4.33
-0.11
0.03
-3.92
-0.10
0.03
-3.54
-0.10
0.03
-3.16
-0.82
0.19
-3.66
sd
-0.13 0.03
0.03
0.00
-4.57
1.38
-0.12 0.03
0.00
0.03
-4.40
1.07
-0.11 0.04
0.00
0.03
-3.92
1.65
-0.07 0.02
0.00
0.03
-2.73
0.89
-0.06 0.04
0.03
0.00
-1.69
1.65
-0.04 0.04
0.00
0.03
-1.25
1.51
-0.05 0.05
0.00
0.04
-1.33
1.45
-0.05 0.94
0.54
0.20
1.43
-1.52
-0.17
0.03
-6.21
-0.15
0.03
-5.52
-0.11
0.03
-4.10
-0.10
0.03
-4.10
-0.08
0.03
-2.68
-0.07
0.03
-2.63
-0.07
0.03
-2.00
-0.10
0.34
-2.74
40
|
1904.02413 | 1 | 1904 | 2019-04-04T08:54:00 | Temporal similarity metrics for latent network reconstruction: The role of time-lag decay | [
"cs.SI",
"physics.data-an"
] | When investigating the spreading of a piece of information or the diffusion of an innovation, we often lack information on the underlying propagation network. Reconstructing the hidden propagation paths based on the observed diffusion process is a challenging problem which has recently attracted attention from diverse research fields. To address this reconstruction problem, based on static similarity metrics commonly used in the link prediction literature, we introduce new node-node temporal similarity metrics. The new metrics take as input the time-series of multiple independent spreading processes, based on the hypothesis that two nodes are more likely to be connected if they were often infected at similar points in time. This hypothesis is implemented by introducing a time-lag function which penalizes distant infection times. We find that the choice of this time-lag strongly affects the metrics' reconstruction accuracy, depending on the network's clustering coefficient and we provide an extensive comparative analysis of static and temporal similarity metrics for network reconstruction. Our findings shed new light on the notion of similarity between pairs of nodes in complex networks. | cs.SI | cs | TEMPORAL SIMILARITY METRICS FOR LATENT NETWORK
RECONSTRUCTION: THE ROLE OF TIME-LAG DECAY
A PREPRINT
Hao Liao
National Engineering Laboratory for Big Data System Computing Technology
Guangdong Province Key Laboratory of Popular High Performance Computers
College of Computer Science and Software Engineering
Shenzhen University
Shenzhen 518060, PR China
Ming-Kai Liu
National Engineering Laboratory for Big Data System Computing Technology
Guangdong Province Key Laboratory of Popular High Performance Computers
College of Computer Science and Software Engineering
Shenzhen University
Shenzhen 518060, PR China
Manuel Sebastian Mariani
Institute of Fundamental and Frontier Sciences
University of Electronic Science and Technology of China
Chengdu 610051, PR China
URPP Social Networks
Universitat Zurich
CH-8050 Switzerland
Mingyang Zhou
National Engineering Laboratory for Big Data System Computing Technology
Guangdong Province Key Laboratory of Popular High Performance Computers
College of Computer Science and Software Engineering
Shenzhen University
Shenzhen 518060, PR China
Xingtong Wu
9
1
0
2
r
p
A
4
]
I
S
.
s
c
[
1
v
3
1
4
2
0
.
4
0
9
1
:
v
i
X
r
a
National Engineering Laboratory for Big Data System Computing Technology
Guangdong Province Key Laboratory of Popular High Performance Computers
College of Computer Science and Software Engineering
Shenzhen University
Shenzhen 518060, PR China
April 5, 2019
ABSTRACT
When investigating the spreading of a piece of information or the diffusion of an innovation, we of-
ten lack information on the underlying propagation network. Reconstructing the hidden propagation
paths based on the observed diffusion process is a challenging problem which has recently attracted
attention from diverse research fields. To address this reconstruction problem, based on static simi-
A PREPRINT - APRIL 5, 2019
larity metrics commonly used in the link prediction literature, we introduce new node-node temporal
similarity metrics. The new metrics take as input the time-series of multiple independent spreading
processes, based on the hypothesis that two nodes are more likely to be connected if they were often
infected at similar points in time. This hypothesis is implemented by introducing a time-lag function
which penalizes distant infection times. We find that the choice of this time-lag strongly affects the
metrics' reconstruction accuracy, depending on the network's clustering coefficient and we provide
an extensive comparative analysis of static and temporal similarity metrics for network reconstruc-
tion. Our findings shed new light on the notion of similarity between pairs of nodes in complex
networks.
Keywords Information networks · Network reconstruction · Temporal similarity · Innovation diffusion
1 Introduction
Our understanding of social networks is affected by the fact that, typically, we only have incomplete knowledge about
the topology of real networks [16, 5]. Aimed at overcoming this shortcoming, the problem of reconstructing missing
links has attracted enormous attention from scholars from diverse fields (see [53] for a recent review on the problem).
Existing approaches to the network reconstruction problem include the use of local structural metrics [43, 53, 19],
global walk-counting methods [39, 53], stochastic block models [33], fitness-based methods [14], structural perturba-
tion analysis [50, 47], machine-learning techniques [31], among many others. Scholars have aimed to identify missing
connections in a wide variety of systems, including protein-protein interaction networks [41], neural networks [10],
citation networks [15], and social networks [49, 4].
In parallel, there has been recent interest [59, 63, 28, 83, 68, 48] on a different problem of network reconstruction: if
we are only provided with information on the outcome of a dynamical process on an unknown propagation network,
can we reconstruct the propagation network? The problem -- which has been referred to as latent network reconstruc-
tion [59] -- can be included in the broader class of problems that aim to reconstruct the properties of a spreading process
(for instance, the seed node [9] or the epidemic parameters [59]) from data on observed realizations of the process.
The question is fundamentally different from the traditional link prediction problem [53]: while link prediction stud-
ies [53] typically assume that only part of the network is hidden and needs to be reconstructed, here we assume that the
topology of the propagation network is completely hidden. The reconstruction problem studied here is important as
we often deal with datasets where the propagation network is largely unknown: for instance, the owners of an online
e-commerce platform might have complete information on the time-series of users' purchases, but lack information
about the social connections between the users which might have affected, to some extent, the observed purchasing
patterns.
Existing works have tackled the latent network reconstruction problem from various perspectives. Among the most rel-
evant contributions, Myers et al. [59] addressed the problem through a maximum-likelihood estimation method based
on a cascade spreading model, which was further mapped into a convex optimization problem. Gomez-Rodriguez et
al. [28] developed a faster maximum-likelihood method based on a cascade propagation model. Shen et al. [68] lever-
aged compressed sensing theory to map the network reconstruction problem into a convex optimization problem. Such
a mapping is non-trivial and model-specific; they solved the problem for the Susceptible-Infected-Susceptible (SIS)
and the "contact process" dynamics [68]. The main limitation of these approaches is that they are model-dependent:
Different spreading models require the solution of a different set of equations. For example, in the compressed-sensing
theory approach, the convex-optimization equations for the SIS and the contact process model differ substantially [68].
Besides, the compressed-sensing approach to network reconstruction can be only applied to sparse networks [68].
On the other hand, other studies [83, 48] have tackled the latent network reconstruction problem by means of simple
similarity metrics. With respect to convex optimization [59] and methods based on compressed sensing theory [68],
similarity metrics have two main advantages: (1) They do not depend on the specific spreading model considered;
(2) Their implementation is faster. Temporal similarity metrics for the latent network reconstruction [48] build on the
hypothesis that two nodes are more likely to be connected if independent spreading processes tend to infect them at
similar times. A simple way to implement this assumption is to impose, for each pair (i, j) of nodes that are infected
by the same spreading process, a contribution to their similarity sij in the form of a power-law decreasing function of
the time lag between the two infection times [48]. For this reason, we refer to these metrics as temporal similarities
with power-law time lag decay.
Here, we develop new temporal similarity indexes based on the hypothesis that two nodes are more likely to be con-
nected if independent spreading processes tend to infect them at two consecutive time steps of the dynamics. We refer
to the new metrics as temporal similarities with one-step time lag decay. Based on the power-law and one-step decay
functions, for each of the eight classes of structural similarity metrics considered here, we construct two corresponding
2
(a) BA- -Precision-COS
0.8
(b) BA- -Precision-SSI
0.8
(c) BA- -Precision-HPI
0.8
(d) BA- -Precision-CN
0.6
A PREPRINT - APRIL 5, 2019
i
i
n
o
s
c
e
r
P
0.6
0.4
0.2
COS
TCOS
TCOS-1
i
i
n
o
s
c
e
r
P
0.6
0.4
0.2
SSI
TSSI
TSSI-1
i
i
n
o
s
c
e
r
P
0.6
0.4
0.2
HPI
THPI
THPI-1
i
i
n
o
s
c
e
r
P
0.4
0.2
CN
TCN
TCN-1
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
(e) BA- -Precision-JAC
0.8
0.8
(f) BA- -Precision-HDI
(g) BA- -Precision-PA
0.4
(h) BA- -Precision-LHN
0.8
i
i
n
o
s
c
e
r
P
0.6
0.4
0.2
JAC
TJAC
TJAC-1
HDI
THDI
THDI-1
i
i
n
o
s
c
e
r
P
0.6
0.4
0.2
i
i
n
o
s
c
e
r
P
0.3
0.2
0.1
i
i
n
o
s
c
e
r
P
0.6
0.4
0.2
LHN
TLHN
TLHN-1
0
0
0.1
0.2
0.3
PA
TPA
TPA-1
0.1
0.2
0.3
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
0
0
Figure 1: Reconstruction precision of different similarity metrics as a function of β for eight classes of similarity
metrics (CN, COS, SSI, HPI, JAC, HDI, PA, LHN), for the SIR dynamics (f = 0.5) on BA networks (N = 500,
hki = 5). The results are averaged over 50 independent realizations. For sufficiently large β values, temporal similarity
metrics with one-step time-lag decay substantially outperform temporal similarity metrics with power-law time-lag and
static metrics.
temporal similarity metrics. We compare their performance in reconstructing the whole propagation network in both
synthetic and real data. By analyzing 40 empirical networks, we provide the first systematic performance comparison
of temporal similarity metrics based on different classes of structural similarity metrics.
We find that for the Susceptible-Infected-Recovered (SIR) spreading dynamics [64], for almost all the analyzed net-
works, the temporal similarities with one-step time lag decay outperform the temporal similarities with a power-law
time lag decay. The performance gap is substantially larger for spreading processes sufficiently above their critical
point. Besides, among all the classes of similarity metrics considered, we find that the temporal similarity metric with
one-step time-lag decay based on the Cosine similarity [67] tends to outperform the other metrics; other competitive
classes of similarity are the temporal variants of the Sorensen index [69] and the Jaccard similarity [37]. Results
for two additional spreading models (Susceptible-Infected, SI, and Linear Threshold Model, LTM) are in qualitative
agreement.
Our findings move the first steps toward an extensive benchmarking of methods for the reconstruction of a hidden
topology from the available event time-series of a spreading process. Our work sheds new light on the notion of
node-similarity based on the outcome of dynamical processes on networks, and it has potential implications for social
network analysis that will be outlined in the Discussion section.
2 Results
2.1 Problem statement
We assume that there is a unipartite network (whose adjacency matrix is denoted by A) whose topology is unknown,
and our goal is to reconstruct it. Our available information is the time-stamped list of adoptions of multiple items that
diffuse through a given spreading process. Entry (i, α, tiα) in this list tells us that node i adopted item α at time tiα.
The adoption processes considered here is ruled by the SIR dynamics [64]: the "adoption" of item α corresponds to
the "infection" during realization α of the SIR dynamics. For this reason, in the following, we will use "adoption" and
"infection" interchangeably.
3
(a) SW- -Precision-COS
1
(b) SW- -Precision-SSI
1
(c) SW- -Precision-HPI
1
(d) SW- -Precision-CN
1
A PREPRINT - APRIL 5, 2019
i
i
n
o
s
c
e
r
P
0.5
COS
TCOS
TCOS-1
0.5
SSI
TSSI
TSSI-1
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
0.5
HPI
THPI
THPI-1
i
i
n
o
s
c
e
r
P
0.5
CN
TCN
TCN-1
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
(e) SW- -Precision-JAC
1
(f) SW- -Precision-HDI
1
(g) SW- -Precision-PA
1
(h) SW- -Precision-LHN
1
i
i
n
o
s
c
e
r
P
0.5
JAC
TJAC
TJAC-1
0.5
HDI
THDI
THDI-1
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
0.5
PA
TPA
TPA-1
i
i
n
o
s
c
e
r
P
0.5
LHN
TLHN
TLHN-1
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
0
0
0.1
0.2
0.3
Figure 2: (Color online) Reconstruction precision of different similarity metrics as a function of β for eight classes
of similarity metrics (CN, COS, SSI, HPI, JAC, HDI, PA, LHN), for the SIR dynamics (f = 0.5) on SW networks
(N = 500, P = 0.1, hki = 5). The results are averaged over 50 independent realizations. For sufficiently large β
values, temporal similarity metrics with one-step time-lag decay substantially outperform temporal similarity metrics
with power-law time-lag and static metrics.
We consider 40 empirical unipartite networks; among these, 20 are information networks (details in the Supplemen-
tary Material). We generate the time-series {(i, α, tiα)} of adoptions by running, for each network, 50 independent
realizations of the SIR spreading dynamics initiated by a fraction f of initiators (see Methods for details) [48]. Each
independent realization α of the spreading process is therefore interpreted as an item that gradually diffuses across the
network. In fact, the time-series {(i, α, tiα)} can be interpreted as a temporal bipartite network [34]; we denote by R
the incidence matrix of the corresponding time-aggregate bipartite network: Riα = 1 if node i adopted item α.
We address the following problem. Assuming that we only know {i, α, tiα}, which is the best method to reconstruct the
E edges of A from {i, α, tiα}? While, in principle, several techniques of network reconstruction can be designed [53,
68, 48], we narrow our focus to similarity metrics that aim to infer the similarity sij of two nodes i and j based on
their co-adoption patterns [83, 48]. The definitions of the metrics of interest are provided in Sections 2.2 and 4.1.
Such similarity metrics produce a ranking of the pairs of nodes (potential edges) in descending order of sij. Assuming
that we know the number of edges E of the underlying propagation network A, the E top-ranked links by sij form the
network A(s) reconstructed by metric s. It is natural to assess the precision of the metric sij by measuring the fraction
of common links between A and A(s). This metric is typically referred to as precision in the link prediction [53]
and information filtering literature, and we use it to evaluate the reconstruction performance of the similarity metrics.
The results for another evaluation metric1 (Area Under the Curve, AUC [51]) are in qualitative agreement with those
obtained with the precision (Figs. S8).
2.2 From structural to temporal similarity metrics
We consider here eight classes of structural similarities [53]: common neighbors (CN), Jaccard Index (Jac), Leicht-
Holme-Newman Index (LHN), Cosine Index (COS), Sorensen Index (SSI), Hub Promoted Index (HPI), Hub De-
pressed Index (HDI), Preferential Attachment (PA). These structural metrics have been used by researchers from
diverse domains to address various problems in network analysis. They have been applied to the reconstruction of
missing links in networks where only a part of the topology is available [16, 51], to the prediction of new connections
in social and information systems [49], and to the latent network reconstruction problem studied here as well [83].
1Differently from the precision metric, the AUC metric is independent of E.
4
A PREPRINT - APRIL 5, 2019
(b) TSSI1-SSI
30
20
10
0
(c) THPI1-HPI
30
20
10
0
)
S
P
(
/
)
,
S
1
T
(
P
(d) TCN1-CN
30
20
10
0
)
S
P
(
/
)
,
S
1
T
(
P
(a) TCOS1-COS
30
20
10
0
)
S
P
(
/
)
,
S
1
T
(
P
-10
0
1
Clustering coefficient
0.5
-10
0
1
Clustering coefficient
0.5
-10
0
1
Clustering coefficient
0.5
-10
0
1
Clustering coefficient
0.5
(e) TJAC1-JAC
30
20
10
0
(f) THDI1-HDI
30
20
10
0
(g) TPA1-PA
30
20
10
0
)
S
P
(
/
)
,
S
1
T
(
P
(h) TLHN1-LHN
30
20
10
0
)
S
P
(
/
)
,
S
1
T
(
P
)
S
P
(
/
)
,
S
1
T
(
P
)
S
P
(
/
)
,
S
1
T
(
P
)
S
P
(
/
)
,
S
1
T
(
P
-10
0
1
Clustering coefficient
0.5
-10
0
1
Clustering coefficient
0.5
-10
0
1
Clustering coefficient
0.5
-10
0
1
Clustering coefficient
0.5
Figure 3: Reconstruction precision relative difference ∆P (T 1, S)/P (S) = (P (T 1) − P (S))/P (S) as a function
of the network clustering coefficient. Each dot represents an empirical network; we analyzed 40 empirical contact
networks. For all classes of similarity, almost all the empirical networks fall above the P (T 1) = P (S) red line. We
use β = 4βc and f = 0.5 here. The results are averaged over 50 independent realizations.
For each class2 X of similarities, we consider the standard static metric [53] (directly denoted as X), and two temporal
similarity metrics: temporal metrics with the power-law time-lag decay (denoted as TX) [48], and the new temporal
metrics with the one-step time-lag decay (denoted as TX1). The last two classes of metrics differ in how the similarity
score of a given pair (i, j) of nodes depends on the time lag tiα − tjα between node i's and j's adoption times tiα and
tjα for item α. We refer to the Methods section for all the definitions.
To illustrate the main idea behind each class of metrics, we define here the common-neighbors metrics: static common
neighbors (CN), temporal common neighbors with a power-law decay of time-lag (TCN), and temporal common
neighbors with one-step decay of time lag (TCN1). The common neighbors (CN) of a given pair (i, j) of nodes is
simply given by [53]
ij = X
sCN
RiαRjα.
α
(1)
According to this definition, two nodes are similar (and, therefore, more likely to be connected in the hidden unipartite
network) if they often adopted the same item.
Zeng [83] found that this metric and similar static metrics can be used to reconstruct the topology of a hidden network
based on the time-series of a spreading dynamics. Subsequently, the static metric proved to be sub-optimal with respect
to time-aware metrics [48]. Indeed, while it is plausible that two nodes that often adopt the same item at similar times
are more likely to be connected, the same is not necessarily true if the common adoptions happen at very distant points
in time: given two adopters i and j, with tiα ≪ tjα, item α might indeed have reached j though a long network path,
without the two nodes being directly connected.
To penalize longer time lags, [48] introduced the temporal common neighbors with power-law time-lag decay (TCN)
as
(2)
sT CN
ij
= X
Riα Rjα tiα − tjα−1(1 − δtiα,tjα ).
α
This time-aware metric significantly outperforms its static counterpart, sCN , in the latent network reconstruction [48].
However, as a consequence of the power-law function, the similarity sT CN of a given pair of nodes receives substantial
non-zero contributions also when the two nodes adopt the same item at substantially different times.
2X is a placeholder here. E.g., X can represent common neighbors CN.
5
A PREPRINT - APRIL 5, 2019
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(a) TCOS1-TCOS
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(b) TSSI1-TSSI
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(c) THPI1-THPI
(d) TCN1-TCN
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(e) TJAC1-TJAC
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(f) THDI1-THDI
(g) TPA1-TPA
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(h) TLHN1-TLHN
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
Figure 4: Reconstruction precision relative difference ∆P (T 1, T )/P (T ) = (P (T 1) − P (T ))/P (T ) as a function
of the network clustering coefficient. Each dot represents an empirical network; we analyzed 40 empirical contact
networks. For all classes of similarity, almost all the empirical networks fall above the P (T 1) = P (T ) red line; the
only exceptions are some of the networks with low clustering coefficient. We use β = 4βc and f = 0.5 here. The
results are averaged over 50 independent realizations.
In this work, we introduce the temporal common neighbors with a one-step decay time-lag decay (TCN1) as
sT CN 1
ij
= X
Riα Rjα δtiα−tjα,1.
α
(3)
According to this definition, the similarity sT CN 1 of a given pair (i, j) of nodes only receives a contribution when the
two nodes adopt the same item at two consecutive time steps.
Analogous definitions for the other seven classes of similarities and their temporal variants with power-law and one-
step time-lag decay are provided in the Methods section. The goal of the rest of the paper is to extensively compare
the performance of these metrics in reconstructing both synthetic and empirical networks.
2.3 Reconstruction of synthetic networks
We start our investigation from synthetic networks generated with the Barabási-Albert model [6] (see Methods for
the generation details). Fig. 1 shows our reconstruction results: each panel refers to a class of similarities; for each
class of similarities (e.g., common neighbors), we show the results for the static metric (CN), the temporal metric with
power-law time lag decay (TCN), and the new temporal metric with one-step time lag decay (TCN1). The precision
values attained by the metrics are shown as a function of the transmission probability β of the SIR spreading process.
For each considered structural metric (e.g., CN), for sufficiently large β values, the corresponding temporal metric with
one-step decay (TCN1) performs significantly better than the corresponding temporal metric with power-law decay
(e.g., TCN). As we reduce β, spreading processes tend to die out more rapidly, and it becomes increasingly harder to
correctly reconstruct the underlying diffusion network; in the small-β regime, the temporal metrics with a one-step
and power-law decay perform similarly. As expected [48], the time-aware metrics significantly outperform the static
metric.
Fig. 2 shows analogous results for a small-world network [79] (see Methods for the generation details). We observe
again a systematic performance edge of the temporal metrics with a one-step time lag decay over the temporal metrics
with power-law time lag decay, yet this gap is smaller than in the BA networks.
6
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
Real networks mean relative precision
TC O S1
TPA1
TSSI1
TJA C1
TH DI1
TC N1
TH PI1
TLH N1
7
6
5
k
n
a
r
n
a
e
M
4
3
2
1
0
A PREPRINT - APRIL 5, 2019
Real networks mean rank
TC O S1
TSSI1
TJA C1
TH DI1
TH PI1
TC N1
TLH N1
TPA1
i
l
i
n
o
s
c
e
r
p
e
v
i
t
a
e
r
n
a
e
M
Figure 5: Mean relative precision (higher values correspond to better performance) and mean rank (lower values
correspond to better performance) of the eight TX1 metrics. According to both evaluation metrics, TCOS1 is the
best-performing metric, followed by TSSI1 and TJAC1. We use β = 4βc and f = 0.5 here. The results are averaged
over 50 independent realizations.
2.4 Reconstruction of real networks
Our results on synthetic networks suggest that the temporal metrics with one-step time lag decay reconstruct synthetic
contact networks better than the temporal metrics with power-law time lag decay. To further validate this assertion,
we analyzed 40 empirical contact networks of diverse nature including 20 information networks (details in the Supple-
mentary Material).
For almost all the analyzed datasets, the temporal metrics with one-step time lag decay substantially improve the
reconstruction accuracy with respect to both static (Fig. 3) and temporal metrics with power-law time lag decay (Fig. 4).
The only networks where the temporal metrics with power-law time-lag decay can outperform the temporal metrics
with one-step time-lag decay are those with low clustering coefficient3. This is intuitive: In a network with lower
clustering, it is less likely that two non-connected nodes are reached by long propagation paths. This mitigates the
advantage of considering only adoptions with one-step time lag when computing the similarity score of a given pair of
nodes.
The results in Fig. 4 were obtained with β = 4 βc, where βc is the epidemic threshold [64]. As expected from
the synthetic network analysis, we find that for larger β values (Fig. S1), the one-step time lag metrics show better
reconstruction accuracy for the vast majority of datasets and considered metrics. On the other hand, for lower β values,
there is not a clear advantage of the metrics with the one-step time-lag decay (Figs. S2-S3).
So far, we have compared similarities of the same class (e.g., common neighbors) with different time-lag decay func-
tions. A natural question arises: what is the relative performance of the eight temporal metrics TX1 with one-step
time-lag decay obtained from the eight different classes of similarities? We compare the eight metrics' performance
across the 40 empirical datasets considered here. We refer to Figs. S4-S5 for the results on individual datasets. To
gain a general understanding of the metrics' performance, we aggregate the metrics' performance over the analyzed
networks. To this end, we consider two evaluation metrics: the metrics' mean rank [58] and the mean relative precision.
3In our work, we use the average local clustering coefficient as a metric for clustering. For each node i in the network, we
calculate the number Ki of existing edges that connect nodes that are connected with i, and the maximum number Ei of possible
links between i's neighbors. For an undirected graph, Ei = ki (ki − 1)/2. Finally, we define i's local clustering coefficient Ci =
Ki/Ei, and the network's clustering coefficient as C = N −1 Pi Ci.
7
A PREPRINT - APRIL 5, 2019
To compute the metrics' mean rank, for each dataset d, we rank the eight TX1 metrics in order of decreasing precision.
We denote by rd(s) ∈ {1, 2, . . . , 8} the ranking position metric s for dataset d. Given D analyzed empirical networks
(D = 40 in our work), the mean rank r(s) of metric s is simply defined as r(s) = D−1 PD
d=1 rd(s). Better performing
metric should exhibit lower mean rank values [58]. In addition, denoting by Pd(s) the precision achieved by metric
s in dataset d, we define the mean relative precision P (s) of metric s as D−1 PD
d=1 Pd(s)/ maxs′ {Pd(s′)}. Better
performing metric should exhibit larger mean relative precision values.
Both evaluation metrics lead to the same overall conclusion (Fig. 5): on average, the TCOS1 (temporal Cosine with
one-step time-lag decay) metric
sT COS1
ij
= Pα RiαRjαδtiα−tjα,1
pPα Riα Pα Rjα
(4)
is the best-performing metric, followed by TSS1 and TJAC1 (see Methods for their definition). While TCOS1 provides
us with a computationally fast metric to reconstruct the hidden topology, its mean precision is 0.349. This leaves the
door open for future performance improvements, possibly based on new similarity metrics or more sophisticated
methods.
3 Discussion
Our work provided a systematic benchmarking of temporal similarity metrics with respect to their accuracy in recon-
structing a hidden network topology. The reconstruction was more accurate for SIR spreading processes with a large
transmission probability, i.e., in the supercritical regime. On both real and synthetic networks, we found that temporal
metrics with one-step time-lag decay perform systematically better than metrics with power-law time-lag decay. Be-
sides, we found that the temporal cosine metric with one-step time-lag decay is the best-performing metric. Differently
from maximum-likelihood methods [28] and compressed-sensing theory approaches [59], the temporal similarity met-
rics considered here are general and not restricted to a specific dynamics. In this sense, they can be interpreted not
only as parsimonious and effective reconstruction tools, but also as general baselines against which more sophisticated,
model-specific reconstruction techniques can be evaluated. While we focused on the SIR dynamics, we also assessed
the metrics' performance for two additional spreading models: the Susceptible-Infected (SI) model [3, 70] and the
Linear Threshold Model (LTM) [30, 40, 12]. The results obtained for these two models are in qualitative agreement
with the results obtained for the SIR model (Figs. S6-S7), supporting the generality of our conclusions.
Our study paves the way for several extensions. Temporal similarity metrics might be applied to other network recon-
struction problems, such as the problem where part of the topology is known [51] and the matching of user accounts
across different domains or devices [11, 46]. Even more intriguingly, one can attempt to reconstruct the hidden topol-
ogy of a social network based on the observed dynamics of real diffusion processes. For instance, from the observed
spreading dynamics of many pieces of information, one might attempt to reconstruct propagation networks in social
media [65] and e-commerce platforms [56]. The results presented here support metrics based on one-step time lags as
the best-performing ones in the latent network reconstruction task. While the time step of the dynamics is unambigu-
ously defined for simulated processes, the same does not hold for real spreading processes. Using temporal similarity
metrics to reconstruct propagation topologies based on real time-series data will likely require us to first identify the
typical timescale needed for a given piece of information to be transmitted from an individual to another, and then to
use this typical timescale as the time-lag parameter in the similarity metric.
Finally, our work contributes to the rich literature on similarity on social and information networks [45, 44, 73, 29, 13,
66]. Previous research has stressed the role of structural similarity metrics, i.e., similarity metrics based either on the
time-aggregate contact network of individuals (who is connected to whom) [35, 80, 42] or on the time-aggregate user-
item bipartite adoption network (who collected what) [44, 83]. Here, we combined structure and temporal information
(who collected what at which time) to define temporal similarity metrics that are effective in the propagation network
task. We envision that future research on social and information network analysis might further develop simple yet
well-performing time-aware metrics for network reconstruction.
4 Methods
4.1 Temporal similarity metrics
For each class C of similarity metrics, we define three metrics: a static metric C, a temporal metric with power-law
time-lag decay T C, and a temporal metric with one-step time-lag decay T C1. In our work, we consider eight classes
C of similarities: Common Neighbors (CN), Jaccard (Jac), Cosine (COS), Leicht-Holme-Newman (LHN), Sorensen
8
Index (SSI), Hub-promoted Index (HPI), Preferential Attachment (PA), Hub-depressed Index (HDI). As we already
defined the three CN similarities in the main text, we define here the metrics based on the seven additional classes.
A PREPRINT - APRIL 5, 2019
Jaccard (Jac) similarity We define three metrics:
• Jaccard similarity (Jac):
sJac
ij =
• Temporal Jaccard similarity with power-law time-lag decay (TJac):
Pα Riα Rjα
.
Pα(Riα + Rjα − Riα Rjα)
sT Jac
ij
= Pα Riα Rjα tiα − tjα−1(1 − δtiα,tjα )
Pα(Riα + Rjα − Riα Rjα)
.
• Temporal Jaccard similarity with one-step time-lag decay (TJac1):
sT Jac1
ij
= Pα RiαRjαδtiα−tjα,1
Pα(Riα + Rjα − RiαRjα)
.
Cosine (COS) similarity We define three metrics:
• Cosine similarity (COS):
pPα Riα Pα Rjα
• Temporal Cosine similarity with power-law time-lag decay (TCOS):
ij = Pα RiαRjα
sCOS
.
pPα Riα Pα Rjα
• Temporal Cosine similarity with one-step time-lag decay (TCOS1):
sT COS
ij
= Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα )
.
= Pα RiαRjαδtiα−tjα,1
pPα Riα Pα Rjα
Leicht-Holme-Newman Index (LHN) similarity We define three metrics:
sT COS1
ij
.
• Leicht-Holme-Newman Index similarity (LHN):
sLHN
ij
= Pα RiαRjα
Pα Riα Pα Rjα
.
• Temporal Leicht-Holme-Newman Index similarity with power-law time-lag decay (TLHN):
sT LHN
ij
= Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα )
Pα Riα Pα Rjα
.
• Temporal Leicht-Holme-Newman Index similarity with one-step time-lag decay (TLHN1):
sT LHN 1
ij
= Pα RiαRjαδtiα−tjα,1
Pα Riα Pα Rjα
.
Sørensen Index (SSI) similarity We define three metrics:
• Sørensen Index similarity (SSI):
• Temporal Sørensen Index similarity with power-law time-lag decay (TSSI):
sSSI
ij =
2 × Pα RiαRjα
Pα Riα + Pα Rjα
.
sT SSI
ij
=
2 × Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα )
Pα Riα + Pα Rjα
.
• Temporal Sørensen Index similarity with one-step time-lag decay (TSSI1):
2 × Pα RiαRjαδtiα−tjα,1
sT SSI1
ij
=
.
Pα Riα + Pα Rjα
9
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
A PREPRINT - APRIL 5, 2019
Hub Promoted Index (HPI) similarity We define three metrics:
• Hub Promoted Index similarity (HPI):
sHP I
ij =
Pα RiαRjα
min{Pα Riα, Pα Rjα}
• Temporal Hub Promoted Index similarity with power-law time-lag decay (THPI):
= Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα )
sT HP I
ij
min{Pα Riα, Pα Rjα}
• Temporal Hub Promoted Index similarity with one-step time-lag decay (THPI1):
sT HP I1
ij
= Pα RiαRjαδtiα−tjα,1
min{Pα Riα, Pα Rjα}
Hub Depressed Index (HDI) similarity We define three metrics:
• Hub Depressed Index similarity (HDI):
sHDI
ij =
Pα RiαRjα
max{Pα Riα, Pα Rjα}
• Temporal Hub Depressed Index similarity with power-law time-lag decay (THDI):
sT HDI
ij
= Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα )
max{Pα Riα, Pα Rjα}
• Temporal Hub Depressed Index similarity with one-step time-lag decay (THDI1):
sT HDI1
ij
= Pα RiαRjαδtiα−tjα,1
max{Pα Riα, Pα Rjα}
Preferential Attachment (PA) similarity We define three metrics:
• Preferential Attachment similarity (PA):
ij = X
sP A
Riα X
Rjα.
α
α
• Temporal Preferential Attachment similarity with power-law time-lag decay (TPA):
ij = X
sT P A
Riα X
Rjαtiα − tjα−1(1 − δtiα,tjα ).
α
α
• Temporal Preferential Attachment similarity with one-step time-lag decay (TPA1):
sT P A1
ij
= X
Riα X
Rjαδtiα−tjα,1.
α
α
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
In all the temporal similarity methods above, we set (tiα − tjα)−1 = 0 when tiα = tjα. Note that in the TC metrics,
the factor 1 − δtiα,tjα makes sure that events where tiα = tjα do not contribute to the similarity. Indeed, when
tiα = tjα, i is not the node that infected j; therefore, i and j are unlikely to be connected in the networks. Note that
in other problems such as link prediction and recommendation, the case tiα = tjα may need to be treated differently.
4.2 SIR spreading dynamics
In the SIR model, each node is in one of the three states: Susceptible (S), Infected (I), Recovered (R). Each node has a
probability f to be an initiator of the spreading process; therefore, there are f × N simultaneous initiators, on average,
for each spreading process. At each time step, each infected node can infect each of its neighbors with probability β;
each infected node can recover with probability µ. For simplicity, we fix µ = 1 (each node recovers one step after
having been infected). The process ends when there are no more infected nodes in the system. For each empirical
network, we run 50 independent realizations of the SIR dynamics. For each process α, we record the temporal list
of the nodes infected by that process. The bipartite adjacency matrix R records which nodes were infected by which
process: Riα = 1 if i has been infected by α, whereas Riα = 0 otherwise. If Riα = 1, the time step at which i was
infected by α is recorded in tiα.
10
A PREPRINT - APRIL 5, 2019
4.3 Generation of the synthetic networks
We use two well-known models for the generation of synthetic networks: the Barabási-Albert (BA) model [6], and the
Small-World (SW) model [79].
Barabási-Albert (BA) We generate networks composed of N = 500 nodes. Our initial condition is a regular
network where each node composed of m0 = 9 nodes; each initial node has the degree equal to hki = 5. At each time
step t, we add a new node to the network. The new node connects with hki preexisting nodes; the probability that a
preexisting node i is selected is proportional to its degree ki(t) at time t.
Small-World (SW) We start from a regular ring lattice composed of N = 500 nodes and degree k = hki = 5: we
connect each of the N nodes with its nearest k neighbors. We rewire each link with probability p -- in this work, we
set p = 0.1. More specifically, for each node i, we select a node j from its neighbors and we extract a random number
r from the uniform distribution in (0, 1). If p is larger than r, we and remove the edge between node i and node j, we
randomly select a node m, and we establish an edge between node i and node m.
Competing interests
The authors declare that they have no competing interests.
Author's contribution
The work presented in this paper corresponds to a collaborative development by all authors. Conceptualization, H.L.,
M.S.M, and M-Y.Z.; Data Curation, M-K.L. and H.L.; Formal Analysis, H.L., M-K.L. and M.S.M.; Funding Ac-
quisition, H.L. and M-Y.Z.; Methodology, M.S.M.; Resources, H.L. and M-Y.Z.; Software, M-K.L. and X-T.W.;
Writing -- Original Draft, M.S.M., M-K.L., M-Y.Z., X-T.W. and H.L.
Acknowledgements
We wish to thank Prof. Ginestra Bianconi and Prof. Chi Ho Yeung for providing us valuable suggestions. H.L and
M.Y.Z acknowledge financial support from the National Natural Science Foundation of China (Grant Nos. 61803266,
61703281), Guangdong Province Natural Science Foundation (Grant Nos. 2016A030310051,2017A030310374,
2017B030314073), Guangdong Pre-national project (Grant Nos. 2014GK
XM054), Shenzhen Fundamental Research Foundation ( JCYJ20160520162743717, JCYJ20150529164-656096), Nat-
ural Science Foundation of SZU (Grant No. 2016-24), Foundation for Distinguished Young Talents in Higher Educa-
tion of Guangdong, China(Grant No. 2015K-QNCX143). MSM acknowledges the University of Zurich for support
through the URPP Social Networks.
Supplementary
Here we describe the 40 empirical networks analyzed in the main text.
Data Description
1) Facebook: a social network which contains Facebook user -- user friendships. [55]
2) Jazz: a music collaboration network obtained from the Red Hot Jazz Archive digital database. It includes
198 bands that performed between 1912 and 1940, with most of the bands from 1920 to 1940. [27]
3) Residence hall: a network which contains friendship ratings between 217 residents living at a residence hall
located in the Australian National University campus. [23]
4) E.coli: a metabolic network of E.coli. [38]
5) Physicians: a network which captures the spreading paths of an innovation among 246 physicians in for
towns in Illinois, Peoria, Bloomington, Quincy and Galesburg. [17]
6) Neural: a neural network in C. elegans. [20]
7) Usair: the US air transportation network that connects airport located in the United States.
11
A PREPRINT - APRIL 5, 2019
8) Dublin: a network which describes the face-to-face behavior of people during the exhibition "infectious: stay
away" in 2009 at the Science Gallery in Dublin. [36]
9) Crim: a network which connects persons who appeared in at least one crime case as either a suspect, a victim,
a witness or both a suspect and victim at the same time.
10) Caenorhabditis elegans: a metabolic network of the roundworm Caenorhabditis elegans. [21]
11) Email: an email communication network at the University Rovira i Virgili in Tarragona in the south of
Catalonia in Spain [32]
12) Blogs: a network which contains front-page hyperlinks between blogs in the context of the 2004 US elec-
tion. [1]
13) Air traffic control: a network which was constructed from the USA's FAA (Federal Aviation Administration)
National Flight Data Center (NFDC), Preferred Routes Database.
14) Human protein: a network of interactions between proteins in Humans (Homo sapiens), from the first large-
scale study of protein -- protein interactions in Human cells using a mass spectrometry-based approach. [71]
15) Hamsterster friendships: a network which contains friendships between users of the website hamster-
ster.com.
16) UC Irvine messages: a network which contains sent messages between the users of an online community of
students from the University of California, Irvine. [62]
17) Adolescent health: a network which was created from a survey that took place in 1994/1995. [57]
18) Advogato: a network from an online community platform for developers of free software launched in
1999. [54]
19) Euroroad: an international E-road network, a road network located mostly in Europe. [76]
20) Highschool: a network which contains friendships between boys in a small high school in Illinois. [18]
21) Hypertext: a network of face-to-face contacts between the attendees of the ACM Hypertext 2009 confer-
ence. [36]
22) IUI: a network of the collaborations among the authors of papers published in Informatica and Uporabna
informatika. [24]
23) Amazon: a network between web pages in amazon.com. [72]
24) SCSC: a network of collaborations between Slovenian computer scientists. [7]
25) Zachary karate club: the well-known Zachary karate club social network. [82]
26) Polbooks: a network of books about US politics published around the time of the 2004 presidential election
and sold by the online bookseller Amazon.com. [2]
27) Powergrid: the power grid of the Western States of the United States of America. [78]
28) Subelj: the software class dependency network of the JUNG 2.0.1 and javax 1.6.0.7 libraries, namespaces
edu.uci.ics.jung and java/javax.
29) PPI: a protein-protein interaction network. [75]
30) Openflights: a network which contains flights between airports of the world. [61]
31) Bible: a network which contains nouns (places and names) of the King James Version of the Bible and
information about their co-occurrences. [84]
32) Chicago: a network on the road transportation of the Chicago region (USA). [22, 8]
33) DNC email: a network of emails in the 2016 Democratic National Committee email leak. [81]
34) Word: an adjacency network of common adjectives and nouns in the novel David Copperfield written by
Charles Dickens. [60]
35) Football: a network of American football games between Division IA colleges during regular season Fall
2000. [26, 74]
36) Little Rock Lake: the food web of Little Rock Lake, Wisconsin in the United States of America. [52]
37) Unicode: a bipartite network denotes which languages are spoken in which countries. Here we transferred it
to a unipartite network. [77]
38) Netsci: a coauthorship network between scientists who published on the topic of network science. [60]
39) TAP: a yeast protein binding network generated by tandem affinity purification experiments. [25]
40) Slavko: a small friendship network from an online website. [7]
12
A PREPRINT - APRIL 5, 2019
SI Tables
Table 1: Properties of the analyzed empirical networks. N is the number of nodes. E is the number of edges. The
parameter hki, refers to the average node degree. C is the average clustering coefficient. βc = hki/(hk2i − hki)
represents the critical value of the transmission probability in the SIR model in the mean-field scenario [64].
Network
Zachary karate club (Zkc)
Highschool (Highs)
Polbooks (Polbs)
Word
Hypertext (Hypert)
Football (Footb)
Little Rock Lake (LRL)
Jazz
Residence hall (Rhall)
E.coli
Physicians (Phys)
Neural
USAir
Slavko
Netsci
Dublin
Caenorhabditis elegans (Cae)
Unicode (Unic)
Scsc
Email
Euroroad (Eroad)
Blogs
Air traffic control (Air.tra)
TAP
Crim
Chicago (Chic)
Human protein (HP)
Bible
Hamsterster friendships (HF)
UC Irvine messages (UC.irv)
DNC emails (DNC)
IUI
PPI
Adolescent health (Health)
Amazon (Ama)
Facebook (Faceb)
Openflights (Oflgs)
Powergrid (Pgrid)
Subelj
Advogato (Adv)
N
34
70
105
112
113
115
183
198
217
230
241
297
332
334
379
410
453
767
961
1133
1174
1224
1226
1373
1380
1467
1706
1773
1858
1899
2029
2288
2375
2539
2880
2888
2939
4941
6434
6541
hki
4.58
10.45
8.4
3.79
368.46
21.4
27.25
27.69
24.62
6.04
9.11
15.88
12.8
13.28
4.82
13.48
10.15
3.27
4.01
9.62
2.41
31.08
4.26
9.96
2.13
1.76
7.27
18.5
13.49
63.01
38.70
3.66
9.84
10.21
3.49
2.06
20.75
2.66
46.93
7.82
E
78
366
441
425
20818
1231
2494
2742
2672
695
1098
2359
2126
2218
914
2765
4596
1255
1925
5451
1417
19025
2615
6833
1476
1298
6207
16401
12534
59835
39264
4190
11693
12969
5037
2981
30501
6594
150985
51127
13
C
0.12
0.29
0.15
0.17
0.26
0.17
0.09
0.62
0.24
0.22
0.13
0.12
0.63
0.17
0.74
0.30
0.07
0.01
0.02
0.22
0.01
0.14
0.02
0.53
0.1
0
0.02
0.1
0
0.04
0.06
0.03
0.3
0.10
0.01
0
0.39
0.01
0.09
0.11
βc
0.1688
0.1487
0.2067
0.0783
0.0392
0.1623
0.0229
0.0266
0.0688
0.0752
0.1366
0.049
0.0231
0.0791
0.1424
0.1044
0.0465
0.0455
0.2033
0.0565
0.1563
0.0123
0.2353
0.0651
0.0458
0.1411
0.0653
0.1299
0.0217
0.0317
0.0164
0.3068
0.0301
0.1408
0.1651
0.1879
0.0184
0.1175
0.0513
0.0171
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
url
A PREPRINT - APRIL 5, 2019
Table 2: Basic properties of real networks and the performance of the COS, TCOS, TCOS1, SS, TSS, TSS1, LHN,
TLHN, TLHN1, HD, THD and THD1 methods on these networks, based on the AUC metric. The parameters are set as
β = 4 βc and f = 0.5. We select a relatively large β because the performance difference between traditional similarity
metric and temporal similarity metric becomes more significant under large β. The similarity method with the best
performance in each network is highlighted in bold font. The results are averaged over 50 independent realizations.
Network Basic properties
Zkc
Highs
Polbs
Word
Hypert
Footb
LRL
Jazz
Rhall
E. coli
Phys
Neural
USAir
Slavko
Netsci
Dublin
Cae
Unic
Scsc
Email
Eroad
Blogs
Air.tra
TAP
Crim
Chic
HP
Bible
HF
Uc.irv
DNC
IUI
PPI
Health
Ama
Faceb
Oflgs
Pgrid
Subelj
Adv
TLHN TLHN1
0.6770
0.6776
0.8367
0.8367
0.6711
0.6714
0.9033
0.9396
0.5491
0.5509
0.7108
0.7116
0.6469
0.6469
0.7875
0.8218
0.8308
0.8311
0.8999
0.9307
0.8375
0.8377
0.7865
0.8068
0.8199
0.8273
0.7574
0.7576
0.9632
0.9635
0.7567
0.7567
0.7161
0.7190
0.6020
0.6021
0.8159
0.8160
0.9407
0.9823
0.9172
0.9177
0.8451
0.8452
0.8568
0.8571
0.9902
0.9980
0.8297
0.8298
0.6518
0.6519
0.9756
0.9760
0.7303
0.7310
0.7737
0.7738
0.9265
0.9266
0.9432
0.9437
0.8283
0.8278
0.9249
0.9250
0.9339
0.9347
0.9160
0.9168
0.7108
0.7116
0.7957
0.7957
0.8927
0.8928
0.6908
0.6916
0.8361
0.8373
TCOS1
0.6811
0.8525
0.7199
0.9506
0.5438
0.7216
0.6491
0.8783
0.8682
0.9822
0.8738
0.8380
0.9539
0.7683
0.9752
0.8462
0.7348
0.6020
0.8161
0.9946
0.9185
0.8581
0.8643
0.9983
0.8446
0.6517
0.9831
0.7555
0.7770
0.9471
0.9619
0.8274
0.9747
0.8979
0.9178
0.7216
0.9578
0.8929
0.7016
0.9270
E
78
366
441
425
20818
1231
2494
2742
2672
695
1098
2359
2126
2218
914
2765
4596
1255
1925
5451
1417
19025
2615
6833
1476
1298
6207
16401
12534
59835
39264
4190
11693
12969
5037
2981
30501
6594
150985
51127
SSI
0.6659
0.7600
0.7073
0.7821
0.5219
0.6557
0.6452
0.8211
0.6856
0.8876
0.8587
0.7287
0.9089
0.7596
0.9198
0.7322
0.7062
0.6019
0.8151
0.8423
0.8943
0.8401
0.8257
0.8757
0.6986
0.6517
0.8802
0.7131
0.7673
0.8973
0.9608
0.8281
0.9336
0.7502
0.6502
0.6557
0.9311
0.8922
0.6353
0.9099
TSSI
0.6797
0.8491
0.7096
0.8898
0.5356
0.6945
0.6482
0.8609
0.7954
0.9659
0.8717
0.8098
0.9365
0.7615
0.9760
0.8427
0.7202
0.6021
0.8159
0.9617
0.9146
0.8493
0.8533
0.9906
0.7556
0.6516
0.9371
0.7253
0.7714
0.9254
0.9613
0.8268
0.9707
0.8886
0.9172
0.6945
0.9505
0.8929
0.6745
0.9242
COS
0.6683
0.7614
0.7201
0.8413
0.5314
0.6789
0.6462
0.8312
0.7103
0.9018
0.8610
0.7314
0.9135
0.7711
0.9225
0.7959
0.7122
0.6018
0.8158
0.8567
0.8942
0.8431
0.8439
0.8964
0.7959
0.6513
0.9376
0.7413
0.7726
0.8996
0.9613
0.8276
0.9349
0.7561
0.6535
0.6789
0.9384
0.8927
0.6284
0.9104
TCOS
0.6816
0.8532
0.7206
0.9350
0.5447
0.7216
0.6488
0.8650
0.8683
0.9726
0.8737
0.8266
0.9435
0.7686
0.9755
0.8460
0.7369
0.6020
0.8160
0.9725
0.9186
0.8580
0.8640
0.9924
0.8444
0.6515
0.9833
0.7551
0.7768
0.9471
0.9618
0.8277
0.9747
0.8970
0.9172
0.7216
0.9581
0.8928
0.7016
0.9269
LHN
0.6585
0.6396
0.6552
0.8311
0.5446
0.6813
0.6431
0.7563
0.7094
0.7924
0.6278
0.7174
0.7852
0.7552
0.9138
0.6985
0.6794
0.6022
0.8158
0.8341
0.8114
0.8342
0.8330
0.8423
0.7870
0.6517
0.9274
0.7056
0.7708
0.8952
0.9372
0.8287
0.7811
0.7896
0.6531
0.6813
0.6979
0.8916
0.6616
0.7914
HDI
0.6604
0.7500
0.6888
0.8056
0.5137
0.6373
0.6464
0.7942
0.7030
0.8965
0.8521
0.7213
0.9023
0.7508
0.8987
0.7735
0.6992
0.6021
0.8151
0.8389
0.8925
0.8269
0.8527
0.8558
0.7738
0.6519
0.9081
0.6822
0.7701
0.8956
0.9603
0.8275
0.9314
0.7444
0.6314
0.6373
0.9239
0.8917
0.6178
0.9050
THDI
0.6782
0.8411
0.7002
0.8937
0.5271
0.6750
0.6488
0.8487
0.8344
0.9504
0.8672
0.7920
0.9289
0.7549
0.9810
0.8226
0.7160
0.6021
0.8162
0.9470
0.9136
0.8391
0.8652
0.9814
0.8219
0.6517
0.9720
0.7005
0.7737
0.9123
0.9612
0.8271
0.9652
0.8724
0.9138
0.6750
0.9432
0.8928
0.6550
0.9180
THDI1
0.6775
0.8410
0.7011
0.9313
0.5271
0.6741
0.6488
0.8686
0.8346
0.9712
0.8675
0.8176
0.9390
0.7549
0.9807
0.8231
0.7163
0.6020
0.8154
0.9797
0.9136
0.8390
0.8652
0.9966
0.8220
0.6518
0.9723
0.7007
0.7733
0.9127
0.9611
0.8278
0.9650
0.8733
0.9140
0.6741
0.9433
0.8927
0.6541
0.9173
N
34
70
105
112
113
115
183
198
217
230
241
297
332
334
379
410
453
767
961
1133
1174
1224
1226
1373
1380
1467
1706
1773
1858
1899
2029
2288
2375
2539
2880
2888
2939
4941
6434
6541
AUC
TSSI1
0.6835
0.8490
0.7101
0.9305
0.5352
0.6941
0.6481
0.8753
0.7956
0.9797
0.8720
0.8303
0.9474
0.7609
0.9760
0.8430
0.7231
0.6023
0.8159
0.9925
0.9148
0.8494
0.8537
0.9982
0.7558
0.6516
0.9373
0.7245
0.7717
0.9258
0.9614
0.8278
0.9706
0.8890
0.9172
0.6941
0.9507
0.8926
0.6741
0.9249
14
A PREPRINT - APRIL 5, 2019
Table 3: Basic properties of real networks and the performance of the COS, TCOS, TCOS1, SS, TSS, TSS1, LHN,
TLHN, TLHN1, HD, THD and THD1 methods on these networks, based on the precision metric. The parameters are
set as β = 4 βc and f = 0.5. We select a relatively large β because the performance difference between traditional
similarity metric and temporal similarity metric becomes more significant under large β. The similarity method with
the best performance in each network is highlighted in bold font. The results are averaged over 50 independent
realizations.
Network
Basic properties
Zkc
Highs
Polbs
Word
Hypert
Footb
LRL
Jazz
Rhall
E. coli
Phys
Neural
USAir
Slavko
Netsci
Dublin
Cae
Unic
Scsc
Email
Eroad
Blogs
Air.tra
TAP
Crim
Chic
HP
Bible
HF
Uc.irv
DNC
IUI
Health
Ama
Faceb
Oflgs
Pgrid
Subelj
Adv
N
34
70
105
112
113
115
183
198
217
230
241
297
332
334
379
410
453
767
961
1133
1174
1224
1226
1373
1380
1467
1706
1773
1858
1899
2029
2288
2539
2880
2888
2939
4941
6434
6541
E
78
366
441
425
20818
1231
2494
2742
2672
695
1098
2359
2126
2218
914
2765
4596
1255
1925
5451
1417
19025
2615
6833
1476
1298
6207
16401
12534
59835
39264
4190
12969
5037
2981
30501
6594
150985
51127
COS
0.207
0.365
0.217
0.313
0.221
0.224
0.282
0.434
0.189
0.323
0.315
0.178
0.561
0.253
0.371
0.203
0.141
0.104
0.233
0.467
0.230
0.173
0.186
0.232
0.034
0.294
0.135
0.152
0.090
0.176
0.373
0.140
0.025
0.008
0.224
0.248
0.185
0.067
0.061
TCOS TCOS1
0.235
0.236
0.535
0.610
0.217
0.241
0.568
0.624
0.239
0.244
0.286
0.320
0.287
0.310
0.531
0.538
0.462
0.565
0.584
0.652
0.460
0.464
0.327
0.376
0.541
0.555
0.258
0.261
0.581
0.771
0.355
0.361
0.229
0.236
0.153
0.156
0.271
0.279
0.568
0.766
0.424
0.425
0.242
0.287
0.374
0.402
0.635
0.734
0.227
0.228
0.303
0.304
0.221
0.312
0.208
0.213
0.157
0.195
0.354
0.370
0.373
0.376
0.196
0.229
0.533
0.618
0.015
0.015
0.286
0.320
0.321
0.368
0.311
0.312
0.124
0.130
0.155
0.322
SSI
0.209
0.365
0.217
0.307
0.215
0.212
0.275
0.426
0.181
0.348
0.162
0.152
0.554
0.243
0.370
0.115
0.139
0.103
0.230
0.442
0.227
0.166
0.179
0.215
0.041
0.298
0.122
0.148
0.067
0.113
0.372
0.143
0.025
0.009
0.212
0.248
0.183
0.065
0.060
TSSI
0.237
0.536
0.213
0.548
0.231
0.267
0.305
0.528
0.340
0.558
0.275
0.312
0.549
0.254
0.583
0.212
0.224
0.152
0.266
0.503
0.424
0.216
0.383
0.617
0.228
0.303
0.189
0.207
0.075
0.257
0.375
0.196
0.530
0.013
0.268
0.320
0.310
0.120
0.151
Precision
LHN
0.193
0.181
0.138
0.241
0.220
0.156
0.259
0.304
0.189
0.278
0.309
0.124
0.219
0.132
0.279
0.199
0.077
0.098
0.179
0.145
0.137
0.173
0.056
0.158
0.077
0.287
0.136
0.043
0.086
0.171
0.013
0.351
0.039
0.005
0.157
0.021
0.122
0.016
0.002
TSSI1
0.230
0.611
0.234
0.610
0.240
0.306
0.286
0.537
0.457
0.626
0.353
0.369
0.536
0.253
0.773
0.279
0.233
0.153
0.272
0.707
0.425
0.246
0.403
0.717
0.228
0.304
0.246
0.216
0.086
0.324
0.374
0.205
0.616
0.014
0.306
0.363
0.311
0.125
0.288
TLHN TLHN1
0.214
0.221
0.474
0.571
0.172
0.186
0.320
0.390
0.231
0.233
0.201
0.232
0.287
0.294
0.342
0.407
0.379
0.506
0.303
0.354
0.439
0.468
0.243
0.295
0.234
0.339
0.162
0.175
0.0.517
0.628
0.343
0.370
0.101
0.114
0.141
0.152
0.214
0.234
0.206
0.341
0.185
0.259
0.226
0.254
0.132
0.156
0.502
0.713
0.229
0.287
0.302
0.304
0.199
0.255
0.052
0.056
0.127
0.159
0.371
0.374
0.019
0.019
0.303
0.323
0.327
0.478
0.014
0.014
0.201
0.232
0.028
0.031
0.206
0.228
0.046
0.051
0.069
0.091
HDI
0.209
0.357
0.205
0.297
0.202
0.176
0.270
0.405
0.185
0.317
0.284
0.142
0.526
0.215
0.359
0.176
0.112
0.101
0.216
0.256
0.228
0.171
0.158
0.187
0.041
0.298
0.131
0.119
0.071
0.155
0.362
0.142
0.025
0.007
0.176
0.244
0.184
0.066
0.061
THDI THDI1
0.224
0.230
0.537
0.620
0.198
0.220
0.489
0.562
0.221
0.228
0.233
0.278
0.285
0.302
0.509
0.531
0.408
0.520
0.514
0.579
0.427
0.453
0.271
0.335
0.532
0.533
0.229
0.236
0.579
0.788
0.319
0.348
0.195
0.214
0.148
0.152
0.250
0.258
0.397
0.581
0.413
0.414
0.226
0.256
0.366
0.367
0.590
0.678
0.228
0.231
0.303
0.304
0.198
0.255
0.184
0.210
0.122
0.151
0.339
0.342
0.370
0.373
0.183
0.199
0.418
0.599
0.013
0.014
0.234
0.278
0.293
0.335
0.301
0.302
0.114
0.115
0.120
0.240
15
A PREPRINT - APRIL 5, 2019
(a) TCOS1-TCOS
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
SI FIGURES
(b) TSSI1-TSSI
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(c) THPI1-THPI
(d) TCN1-TCN
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
(e) TJAC1-TJAC
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(f) THDI1-THDI
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(g) TPA1-TPA
6
4
2
0
)
T
(
P
,
/
)
T
1
T
(
P
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(h) TLHN1-TLHN
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-2
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
Figure S1: Results for the SIR spreading dynamics: Reconstruction precision relative difference ∆P (T 1, T )/P (T ) =
(P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient (see Methods for the definition). Each dot
represents an empirical network, we totally analyzed 40 empirical network. We use f = 0.5, β = 8βc here, where
βc = hki/(hk2i − hki). The results are averaged over 50 independent realizations.
(a) TCOS1-TCOS
0.2
0
-0.2
-0.4
)
T
(
P
,
/
)
T
1
T
(
P
(c) THPI1-THPI
(b) TSSI1-TSSI
0.2
0
-0.2
-0.4
)
T
(
P
,
/
)
T
1
T
(
P
0.5
0
-0.5
-1
)
T
(
P
,
/
)
T
1
T
(
P
(d) TCN1-TCN
0.5
0
-0.5
-1
)
T
(
P
,
/
)
T
1
T
(
P
-0.6
0
1
Clustering coefficient
0.5
-0.6
0
1
Clustering coefficient
0.5
-1.5
0
1
Clustering coefficient
0.5
-1.5
0
1
Clustering coefficient
0.5
(e) TJAC1-TJAC
0.5
0
-0.5
-1
)
T
(
P
,
/
)
T
1
T
(
P
(f) THDI1-THDI
0.5
0
-0.5
-1
)
T
(
P
,
/
)
T
1
T
(
P
(g) TPA1-TPA
1
0
-1
-2
)
T
(
P
,
/
)
T
1
T
(
P
2
0
-2
-4
)
T
(
P
,
/
)
T
1
T
(
P
(h) TLHN1-TLHN
-1.5
0
1
Clustering coefficient
0.5
-1.5
0
1
Clustering coefficient
0.5
-3
0
1
Clustering coefficient
0.5
-6
0
1
Clustering coefficient
0.5
Figure S2: Results for the SIR spreading dynamics: Reconstruction precision relative difference ∆P (T 1, T )/P (T ) =
(P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient (see Methods for the definition). Each dot
represents an empirical network, we totally analyzed 40 empirical network. We use f = 0.5, β = βc here, where
βc = hki/(hk2i − hki). The results are averaged over 50 independent realizations.
16
(a) TCOS1-TCOS
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
-0.5
1
0
Clustering coefficient
0.5
-0.5
(b) TSSI1-TSSI
(c) THPI1-THPI
)
T
(
P
,
/
)
T
1
T
(
P
1
0.5
0
-0.5
A PREPRINT - APRIL 5, 2019
(d) TCN1-TCN
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
1
0
Clustering coefficient
0.5
1
0
Clustering coefficient
0.5
-0.5
1
0
Clustering coefficient
0.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(e) TJAC1-TJAC
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(f) THDI1-THDI
(g) TPA1-TPA
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(h) TLHN1-TLHN
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
Figure S3: Results for the SIR spreading dynamics: Reconstruction precision relative difference ∆P (T 1, T )/P (T ) =
(P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient (see Methods for the definition). Each dot
represents an empirical network, we totally analyzed 40 empirical network. We use f = 0.5, β = 2 βc here, where
βc = hki/(hk2i − hki). The results are averaged over 50 independent realizations.
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
1
0.5
0
1
0.5
0
1
0.5
0
1
0.5
0
0.4
0.2
0
(a) Word
TC O S1
TSSI1
TH PI1
TJA C1
TC N1
(c) Residence hall
TH DI1
TPA1
TLH N1
TC O S1
TSSI1
TH PI1
TJA C1
TH DI1
TC N1
(e) Physicians
TPA1
TLH N1
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
TC O S1
TSSI1
TH PI1
TC N1
TJA C1
TH DI1
(g) USAir
i
i
n
o
s
c
e
r
P
TPA1
TLH N1
TC O S1
TSSI1
TH PI1
TC N1
TJA C1
(i) Crim
TH DI1
TPA1
TLH N1
TC O S1
TSSI1
TH PI1
TC N1
TJA C1
TH DI1
TPA1
TLH N1
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
1
0.5
0
1
0.5
0
0.4
0.2
0
0.4
0.2
0
0.2
0.1
0
(b) Jazz
TJA C1
TH DI1
(d) E.coli
TJA C1
TH DI1
(f) Neural
TJA C1
TH DI1
(h) Dublin
TPA1
TLH N1
TPA1
TLH N1
TPA1
TLH N1
TC O S1
TSSI1
TH PI1
TC N1
TC O S1
TSSI1
TH PI1
TC N1
TC O S1
TSSI1
TH PI1
TC N1
TC O S1
TSSI1
TC N1
TH PI1
TPA1
(j) Caenorhabditis elegans
TJA C1
TH DI1
TLH N1
TC O S1
TSSI1
TH PI1
TC N1
TJA C1
TH DI1
TPA1
TLH N1
Figure S4: Results for the SIR spreading dynamics: Reconstruction precision for 10 networks. Each panel represents
the performance of the 8 TX1 metrics for a single network. This figure shows the results for β = 4 βc, where
βc = hki/(hk2i − hki), and f = 0.5. The results are averaged over 50 independent realizations.
17
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
1
0.5
0
0.4
0.2
0
0.2
0.1
0
1
0.5
0
i
i
n
o
s
c
e
r
P
0.02
0.01
0
(a) Email
TC O S1
TSSI1
TH PI1
TC O S1
TSSI1
TH PI1
TC N1
TJA C1
TH DI1
(c) Air traffic control
TC N1
(e) Human protein
TJA C1
TH DI1
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
TPA1
TLH N1
TPA1
TLH N1
TC O S1
TSSI1
TH PI1
TC N1
TPA1
(g) UC Irvine messages
TJA C1
TH DI1
TLH N1
TC O S1
TSSI1
TH PI1
TJA C1
TH DI1
TC N1
(i) Advogato
TPA1
TLH N1
TC O S1
TSSI1
TH PI1
TC N1
TJA C1
TH DI1
TPA1
TLH N1
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
i
i
n
o
s
c
e
r
P
0.4
0.2
0
1
0.5
0
0.4
0.2
0
0.4
0.2
0
1
0.5
0
A PREPRINT - APRIL 5, 2019
(b) Blogs
TC O S1
TSSI1
TH PI1
TC N1
TJA C1
(d) TAP
TH DI1
TPA1
TLH N1
TC O S1
TSSI1
TC N1
TH PI1
TPA1
(f) Hamsterster friendships
TJA C1
TH DI1
TC O S1
TSSI1
TH PI1
TC N1
TJA C1
TH DI1
(h) Adolescent health
TPA1
TLH N1
TLH N1
TC O S1
TSSI1
TH PI1
TH DI1
TC N1
(j) Euroroad
TJA C1
TPA1
TLH N1
TC O S1
TSSI1
TH PI1
TC N1
TJA C1
TH DI1
TPA1
TLH N1
Figure S5: Results for the SIR spreading dynamics: Reconstruction precision for 10 networks. Each panel is the
performance of the 8 TX1 metrics for a single network. This figure shows the results for β = 4 βc, where βc =
hki/(hk2i − hki), and f = 0.5. The results are averaged over 50 independent realizations.
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(a) TCOS1-TCOS
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(b) TSSI1-TSSI
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(c) THPI1-THPI
(d) TCN1-TCN
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(e) TJAC1-TJAC
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(f) THDI1-THDI
(g) TPA1-TPA
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
1.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(h) TLHN1-TLHN
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
Figure S6: Results for the SI spreading dynamics [3, 70]. The SI model is a special case of the SIR model where each
infected node cannot recover (µ = 0). Reconstruction precision relative difference ∆P (T 1, T )/P (T ) = (P (T 1) −
P (T ))/P (T ) as a function of the network clustering coefficient. Each dot represents an empirical network; we
analyzed 40 empirical contact networks. For all classes of similarity, almost all the empirical networks fall above
the P(T1)=P(T) red line; the only exceptions are some of the networks with low clustering coefficient. We used
β = 4hki/(hk2i − hki), and f = 0.5 here. The results are averaged over 50 independent realizations.
18
A PREPRINT - APRIL 5, 2019
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(a) TCOS1-TCOS
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(b) TSSI1-TSSI
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(c) THPI1-THPI
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(d) TCN1-TCN
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(e) TJAC1-TJAC
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(f) THDI1-THDI
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(g) TPA1-TPA
1
0.5
0
)
T
(
P
,
/
)
T
1
T
(
P
(h) TLHN1-TLHN
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
Figure S7: Results for the LTM (Linear Threshold Model) [12, 30]. In the LTM, we replace a link by a pair of directed
links, A → B and B → A, and every directed edge has a weight 1/kind
represents the indegree of
node i. Each node is in one among two possible states, Inactive or Active. A node activates if Pj Aij Wij ≥ θi,
where θi represents node i's threshold. In our simulations, we start from an initial condition with a fraction f = 0.5
of randomly-selected Active nodes, and we set θi = θ = 0.1. We show here the reconstruction precision relative
difference ∆P (T 1, T )/P (T ) = (P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient. Each
dot represents an empirical network; we analyzed 40 empirical contact networks. For all classes of similarity, almost
all the empirical networks fall above the P(T1)=P(T) red line; the only exceptions are some of the networks with low
clustering coefficient. The results are averaged over 50 independent realizations.
, where kind
i
i
19
A PREPRINT - APRIL 5, 2019
(c) THPI1-HPI
(b) TSSI1-SSI
(a) TCOS1-COS
1
0.5
0
1
0.5
0
)
(
S
C
U
A
/
)
,
S
1
T
(
C
U
A
1
0.5
0
)
(
S
C
U
A
/
)
,
S
1
T
(
C
U
A
1
0.5
0
)
(
S
C
U
A
/
)
,
S
1
T
(
C
U
A
(d) TCN1-CN
-0.5
1
0
Clustering coefficient
0.5
-0.5
1
0
Clustering coefficient
0.5
-0.5
1
0
Clustering coefficient
0.5
-0.5
1
0
Clustering coefficient
0.5
(g) TPA1-PA
(f) THDI1-HDI
(e) TJAC1-JAC
1
0.5
0
1
0.5
0
)
(
S
C
U
A
/
)
,
S
1
T
(
C
U
A
2
1
0
)
(
S
C
U
A
/
)
,
S
1
T
(
C
U
A
1
0.5
0
)
(
S
C
U
A
/
)
,
S
1
T
(
C
U
A
(h) TLHN1-LHN
-0.5
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
-1
0
1
Clustering coefficient
0.5
-0.5
0
1
Clustering coefficient
0.5
)
(
S
C
U
A
/
)
,
S
1
T
(
C
U
A
)
(
S
C
U
A
/
)
,
S
1
T
(
C
U
A
for
Results
the SIR spreading
Figure S8:
difference
∆AU C(T 1, S)/AU C(S) = (AU C(T 1) − AU C(S))/AU C(S) as a function of the network clustering coeffi-
cient (see Methods for the definition). Each dot represents an empirical network, we totally analyzed 40 empirical
network. We use f = 0.5, β = 4 βc here, where βc = hki/(hk2i − hki). The results are averaged over 50 independent
realizations.
Reconstruction AUC relative
dynamics:
References
[1] Lada A Adamic and Natalie Glance. The Political Blogosphere and the 2004 US Election: Divided they Blog.
In Proceedings of the 3rd International Workshop on Link Discovery, pages 36 -- 43. ACM, 2005.
[2] Mohammad Al Hasan and Mohammed J Zaki. A survey of link prediction in social networks. In Social network
data analytics, pages 243 -- 275. Springer, 2011.
[3] Roy M Anderson and Robert M May. Infectious diseases of humans: dynamics and control. Oxford university
press, Oxford, England, UK, 1992.
[4] Lars Backstrom and Jure Leskovec. Supervised random walks: predicting and recommending links in social
networks. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining, pages
635 -- 644. ACM, 2011.
[5] Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. The role of social networks in information
In Proceedings of the 21st International Conference on World Wide Web, pages 519 -- 528. ACM,
diffusion.
2012.
[6] Albert-László Barabási and Réka Albert. Emergence of scaling in random networks. Science, 286(5439):509 --
512, 1999.
[7] Neli Blagus, Lovro Šubelj, and Marko Bajec. Self-similar scaling of density in complex real-world networks.
Physica A, 391(8):2794 -- 2802, 2012.
[8] D. E. Boyce, K. S. Chon, M. E. Ferris, Y. J. Lee, K-T. Lin, and R. W. Eash. Implementation and evaluation
of combined models of urban travel and location on a sketch planning network. Chicago Area Transportation
Study, pages xii + 169, 1985.
[9] Dirk Brockmann and Dirk Helbing. The hidden geometry of complex, network-driven contagion phenomena.
Science, 342(6164):1337 -- 1342, 2013.
[10] Carlo Vittorio Cannistraci, Gregorio Alanis-Lobato, and Timothy Ravasi. From link-prediction in brain con-
nectomes and protein interactomes to the local-community-paradigm in complex networks. Sci. Rep., 3:1613,
2013.
20
A PREPRINT - APRIL 5, 2019
[11] Wei Chen, Hongzhi Yin, Weiqing Wang, Lei Zhao, and Xiaofang Zhou. Effective and efficient user account
linkage across location based social networks. In Proceedings of the 34th IEEE International Conference on
Data Engineering, pages 1085 -- 1096. IEEE, 2018.
[12] Wei Chen, Yifei Yuan, and Li Zhang. Scalable influence maximization in social networks under the linear
threshold model. In Proceedings of the 10th IEEE International Conference on Data Mining, pages 88 -- 97.
IEEE, 2010.
[13] Yuanfang Chen, Noel Crespi, Antonio M Ortiz, and Lei Shu. Reality mining: A prediction algorithm for disease
dynamics based on mobile big data. Inf. Sci., 379:82 -- 93, 2017.
[14] Giulio Cimini, Tiziano Squartini, Diego Garlaschelli, and Andrea Gabrielli. Systemic risk analysis on recon-
structed economic and financial networks. Sci. Rep., 5:15758, 2015.
[15] Valerio Ciotti, Moreno Bonaventura, Vincenzo Nicosia, Pietro Panzarasa, and Vito Latora. Homophily and
missing links in citation networks. EPJ Data Sci., 5(1):7, 2016.
[16] Aaron Clauset, Cristopher Moore, and Mark EJ Newman. Hierarchical structure and the prediction of missing
links in networks. Nature, 453(7191):98, 2008.
[17] James Coleman, Elihu Katz, and Herbert Menzel. The diffusion of an innovation among physicians. Sociometry,
pages 253 -- 270, 1957.
[18] James Samuel Coleman. Introduction to mathematical sociology. London Free Press Glencoe, 1964.
[19] Simone Daminelli, Josephine Maria Thomas, Claudio Durán, and Carlo Vittorio Cannistraci. Common neigh-
bours and the local-community-paradigm for topological link prediction in bipartite networks. New J. Phys.,
17(11):113037, 2015.
[20] Jordi Duch and Alex Arenas. Community detection in complex networks using extremal optimization. Phys.
Rev. E Stat. Nonlin. Soft, 72(2):027104, 2005.
[21] Jordi Duch and Alex Arenas. Community detection in complex networks using extremal optimization. Phys.
Rev. E Stat. Nonlin. Soft, 72(2):027104, 2005.
[22] R. W. Eash, K. S. Chon, Y. J. Lee, and D. E. Boyce. Equilibrium traffic assignment on an aggregated highway
network for sketch planning. Transportation Research Record, 994:30 -- 37, 1983.
[23] Linton Clarke Freeman, Cynthia Marie Webster, and Deirdre M Kirke. Exploring social structure using dynamic
three-dimensional color images. Social Networks, 20(2):109 -- 118, 1998.
[24] Zhong-Ke Gao, Yu-Xuan Yang, Peng-Cheng Fang, Ning-De Jin, Cheng-Yi Xia, and Li-Dan Hu. Multi-
frequency complex network from time series for uncovering oil-water flow structure. Sci. Rep., 5:8222, 2015.
[25] Anne-Claude Gavin, Patrick Aloy, Paola Grandi, Roland Krause, Markus Boesche, Martina Marzioch, Christina
Rau, Lars Juhl Jensen, Sonja Bastuck, Birgit Dümpelfeld, et al. Proteome survey reveals modularity of the yeast
cell machinery. Nature, 440(7084):631, 2006.
[26] M Girvan and MEJ Newman. Network of american football games between division ia colleges during regular
season fall 2000. Proc. Natl. Acad. Sci., 99:7821 -- 7826, 2002.
[27] Pablo M. Gleiser and Leon Danon. Community structure in jazz. Advances in Complex Systems, 6(4):565 -- 573,
2003.
[28] Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Krause. Inferring networks of diffusion and influence.
ACM Trans. Knowl. Discov. Data, 5(4):21, 2012.
[29] Maoguo Gong, Jianan Yan, Bo Shen, Lijia Ma, and Qing Cai. Influence maximization in social networks based
on discrete particle swarm optimization. Inf. Sci., 367:600 -- 614, 2016.
[30] Mark Granovetter. Threshold models of collective behavior. Am. J. Sociol., 83(6):1420 -- 1443, 1978.
[31] Aditya Grover and Jure Leskovec. Node2vec: Scalable feature learning for networks. In Proceedings of the
22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 855 -- 864.
ACM, 2016.
[32] Roger Guimerà, Leon Danon, Albert Dàaz-Guilera, Francesc Giralt, and Alex Arenas. Self-similar community
structure in a network of human interactions. Phys. Rev. E Stat. Nonlin. Soft, 68(6):065103, 2003.
[33] Roger Guimerà and Marta Sales-Pardo. Missing and spurious interactions and the reconstruction of complex
networks. Proc. Natl. Acad. Sci., 106(52):22073 -- 22078, 2009.
[34] Petter Holme and Jari Saramäki. Temporal networks. Phys. Rep., 519(3):97 -- 125, 2012.
21
A PREPRINT - APRIL 5, 2019
[35] Zan Huang and Dennis KJ Lin. The time-series link prediction problem with applications in communication
surveillance. INFORMS J. Comput., 21(2):286 -- 303, 2009.
[36] Lorenzo Isella, Juliette Stehlà c(cid:13), Alain Barrat, Ciro Cattuto, Jean-François Pinton, and Wouter Van den
Broeck. What's in a crowd? analysis of face-to-face behavioral networks. J. Theor. Biol., 271(1):166 -- 180,
2011.
[37] Paul Jaccard. Étude comparative de la distribution florale dans une portion des alpes et des jura. Bull. Soc.
Vaudoise Sci. Nat., 37:547 -- 579, 1901.
[38] Hawoong Jeong, Bálint Tombor, Réka Albert, Zoltan N Oltvai, and A-L Barabási. The large-scale organization
of metabolic networks. Nature, 407(6804):651, 2000.
[39] Leo Katz. A new status index derived from sociometric analysis. Psychometrika, 18(1):39 -- 43, 1953.
[40] David Kempe, Jon Kleinberg, and Éva Tardos. Maximizing the spread of influence through a social network.
In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
pages 137 -- 146. ACM, 2003.
[41] István A Kovács, Katja Luck, Kerstin Spirohn, Yang Wang, Carl Pollis, Sadie Schlabach, Wenting Bian, Dae-
Kyum Kim, Nishka Kishore, and Tong Hao. Network-based prediction of protein interactions. bioRxiv, page
275529, 2018.
[42] Danielle H Lee and Peter Brusilovsky. How to measure information similarity in online social networks: A case
study of citeulike. Inf. Sci., 418:46 -- 60, 2017.
[43] Elizabeth A Leicht, Petter Holme, and Mark EJ Newman. Vertex similarity in networks. Phys. Rev. E,
73(2):026120, 2006.
[44] Rong-Hua Li, Jeffery Xu Yu, Xin Huang, and Hong Cheng. Robust reputation-based ranking on bipartite rating
networks. In Proceedings of the 2012 SIAM International Conference on Data Mining, pages 612 -- 623. SIAM,
2012.
[45] Rong-Hua Li, Jeffrey Xu Yu, and Jianquan Liu. Link prediction: the power of maximal entropy random walk.
In Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pages
1147 -- 1156. ACM, 2011.
[46] Yongjun Li, Zhen Zhang, You Peng, Hongzhi Yin, and Quanqing Xu. Matching user accounts based on user
generated content across social networks. Future Gener. Comput. Syst., 83:104 -- 115, 2018.
[47] Hao Liao, Manuel Sebastian Mariani, Matúš Medo, Yi-Cheng Zhang, and Ming-Yang Zhou. Ranking in evolv-
ing complex networks. Phys. Rep., 689:1 -- 54, 2017.
[48] Hao Liao and An Zeng. Reconstructing propagation networks with temporal similarity. Sci. Rep., 5:11404,
2015.
[49] David Liben-Nowell and Jon Kleinberg. The link-prediction problem for social networks. J. Am. Soc. Inform.
Sci. Tech., 58(7):1019 -- 1031, 2007.
[50] Linyuan Lü, Liming Pan, Tao Zhou, Yi-Cheng Zhang, and H Eugene Stanley. Toward link predictability of
complex networks. Proc. Natl. Acad. Sci., 112(8):2325 -- 2330, 2015.
[51] Linyuan Lü and Tao Zhou. Link prediction in complex networks: A survey. Physica A, 390(6):1150 -- 1170,
2011.
[52] Neo D. Martinez, John J. Magnuson, Timothy. Kratz, and M. Sierszen. Artifacts or attributes? effects of
resolution on the Little Rock Lake food web. Ecological Monographs, 61:367 -- 392, 1991.
[53] Víctor Martínez, Fernando Berzal, and Juan-Carlos Cubero. A survey of link prediction in complex networks.
ACM Comput. Surv., 49(4):69, 2017.
[54] Paolo Massa, Martino Salvetti, and Danilo Tomasoni. Bowling alone and trust decline in social network sites.
In Proc. Int. Conf. Dependable, Autonomic and Secure Computing, pages 658 -- 663, 2009.
[55] Julian McAuley and Jure Leskovec. Learning to discover social circles in ego networks. In Advances in Neural
Information Processing Systems, pages 548 -- 556. 2012.
[56] Matúš Medo, Manuel S Mariani, An Zeng, and Yi-Cheng Zhang. Identification and impact of discoverers in
online social systems. Sci. Rep., 6:34218, 2016.
[57] James Moody. Peer influence groups: Identifying dense clusters in large networks. Social Networks, 23(4):261 --
283, 2001.
22
A PREPRINT - APRIL 5, 2019
[58] Alessandro Muscoloni and Carlo Vittorio Cannistraci. Local-ring network automata and the impact of hyper-
bolic geometry in complex network link-prediction. arXiv preprint arXiv:1707.09496, 2017.
[59] Seth Myers and Jure Leskovec. On the convexity of latent social network inference. In Advances in Neural
Information Processing Systems 23, pages 1741 -- 1749, 2010.
[60] Mark E. J. Newman. Finding community structure in networks using the eigenvectors of matrices. Phys. Rev.
E Stat. Nonlin. Soft, 74(3), 2006.
[61] Tore Opsahl, Filip Agneessens, and John Skvoretz. Node centrality in weighted networks: Generalizing degree
and shortest paths. Social Networks, 3(32):245 -- 251, 2010.
[62] Tore Opsahl and Pietro Panzarasa. Clustering in weighted networks. Social Networks, 31(2):155 -- 163, 2009.
[63] Fragkiskos Papadopoulos, Maksim Kitsak, M Ángeles Serrano, Marián Boguná, and Dmitri Krioukov. Popu-
larity versus similarity in growing networks. Nature, 489(7417):537, 2012.
[64] Romualdo Pastor-Satorras, Claudio Castellano, Piet Van Mieghem, and Alessandro Vespignani. Epidemic
processes in complex networks. Rev. Mod. Phys., 87(3):925, 2015.
[65] Sen Pei, Lev Muchnik, José S Andrade Jr, Zhiming Zheng, and Hernán A Makse. Searching for superspreaders
of information in real-world social media. Sci. Rep., 4:5547, 2014.
[66] Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu, and Dongqing Xie. Social influence modeling using
information theory in mobile social networks. Inf. Sci., 379:146 -- 159, 2017.
[67] Gerard Salton and Michael J. McGill. Introduction to Modern Information Retrieval. McGraw-Hill, Inc., New
York, NY, USA, 1986.
[68] Zhesi Shen, Wen-Xu Wang, Ying Fan, Zengru Di, and Ying-Cheng Lai. Reconstructing propagation networks
with natural diversity and identifying hidden sources. Nat. Commun., 5:4323, 2014.
[69] T.J. Sørensen. A Method of Establishing Groups of Equal Amplitude in Plant Sociology Based on Similarity of
Species Content and Its Application to Analyses of the Vegetation on Danish Commons. Biologiske skrifter. I
kommission hos E. Munksgaard, Argentina, Schleswig, Sun, 1948.
[70] Michele Starnini, Anna Machens, Ciro Cattuto, Alain Barrat, and Romualdo Pastor-Satorras. Immunization
strategies for epidemic processes in time-varying contact networks. J. Theor. Biol., 337:89 -- 100, 2013.
[71] U. Stelzl, U. Worm, M. Lalowski, C. Haenig, F. H. Brembeck, H. Goehler, M. Stroedicke, M. Zenkner,
A. Schoenherr, S. Koeppen, J. Timm, S. Mintzlaff, C. Abraham, N. Bock, S. Kietzmann, A. Goedde, E Toksàz,
A. Droege, S. Krobitsch, B. Korn, W. Birchmeier, H. Lehrach, and E. E. Wanker. A human protein -- protein
interaction network: A resource for annotating the proteome. Cell, 122:957 -- 968, 2005.
[72] Lovro Šubelj and Marko Bajec. Ubiquitousness of link-density and link-pattern communities in real-world
networks. Eur. Phys. J. B Condens. Matter, 85(1):32, 2012.
[73] Zhi Sun, Qinke Peng, Jia Lv, and Jing Zhang. A prediction model of post subjects based on information lifecycle
in forum. Inf. Sci., 337:59 -- 71, 2016.
[74] Matic Tribušon and Matevž Lenic. Identifying top football players and springboard clubs from a football player
collaboration and club transfer networks. arXiv preprint arXiv:1602.03664, 2016.
[75] Christian Von Mering, Roland Krause, Berend Snel, Michael Cornell, Stephen G Oliver, Stanley Fields,
and Peer Bork. Comparative assessment of large-scale data sets of protein -- protein interactions. Nature,
417(6887):399, 2002.
[76] Lovro Šubelj and Marko Bajec. Robust network community detection using balanced propagation. Eur. Phys.
J. B, 81(3):353 -- 362, 2011.
[77] Jian Wang, Reinhilde Veugelers, and Paula Stephan. Bias against novelty in science: A cautionary tale for users
of bibliometric indicators. Research Policy, 46(8):1416 -- 1436, 2017.
[78] Duncan J. Watts and Steven H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(1):440 --
442, 1998.
[79] Duncan J Watts and Steven H Strogatz. Collective dynamics of 'small-world'networks. Nature, 393(6684):440,
1998.
[80] Peipei Xia, Li Zhang, and Fanzhang Li. Learning similarity with cosine similarity ensemble. Inf. Sci., 307:39 --
52, 2015.
[81] Zhi Yu, Can Wang, Jiajun Bu, Xin Wang, Yue Wu, and Chun Chen. Friend recommendation with content spread
enhancement in social networks. Inf. Sci., 309:102 -- 118, 2015.
23
A PREPRINT - APRIL 5, 2019
[82] Wayne Zachary. An information flow model for conflict and fission in small groups. J. of Anthropological
Research, 33:452 -- 473, 1977.
[83] An Zeng. Inferring network topology via the propagation process. J. Stat. Mech. Theory Exp., 2013(11):11010,
2013.
[84] Qian-Ming Zhang, Linyuan Lü, Wen-Qiang Wang, Tao Zhou, et al. Potential theory for directed networks. PloS
one, 8(2):e55437, 2013.
24
|
1307.2084 | 1 | 1307 | 2013-07-08T13:15:12 | Mitigating Epidemics through Mobile Micro-measures | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | Epidemics of infectious diseases are among the largest threats to the quality of life and the economic and social well-being of developing countries. The arsenal of measures against such epidemics is well-established, but costly and insufficient to mitigate their impact. In this paper, we argue that mobile technology adds a powerful weapon to this arsenal, because (a) mobile devices endow us with the unprecedented ability to measure and model the detailed behavioral patterns of the affected population, and (b) they enable the delivery of personalized behavioral recommendations to individuals in real time. We combine these two ideas and propose several strategies to generate such recommendations from mobility patterns. The goal of each strategy is a large reduction in infections, with a small impact on the normal course of daily life. We evaluate these strategies over the Orange D4D dataset and show the benefit of mobile micro-measures, even if only a fraction of the population participates. These preliminary results demonstrate the potential of mobile technology to complement other measures like vaccination and quarantines against disease epidemics. | cs.SI | cs | Mitigating Epidemics through
Mobile Micro-measures
Mohamed Kafsi, Ehsan Kazemi, Lucas Maystre, Lyudmila Yartseva,
Matthias Grossglauser, Patrick Thiran
School of Computer and Communication Sciences, EPFL
[email protected]
Abstract.
Epidemics of infectious diseases are among the largest threats to the
quality of life and the economic and social well-being of developing countries. The arsenal
of measures against such epidemics is well-established, but costly and insufficient to mitigate
their impact. In this paper, we argue that mobile technology adds a powerful weapon to
this arsenal, because (a) mobile devices endow us with the unprecedented ability to measure
and model the detailed behavioral patterns of the affected population, and (b) they enable
the delivery of personalized behavioral recommendations to individuals in real time. We
combine these two ideas and propose several strategies to generate such recommendations
from mobility patterns. The goal of each strategy is a large reduction in infections, with a
small impact on the normal course of daily life. We evaluate these strategies over the Orange
D4D dataset and show the benefit of mobile micro-measures, even if only a fraction of the
population participates. These preliminary results demonstrate the potential of mobile
technology to complement other measures like vaccination and quarantines against disease
epidemics.
1 Introduction
Modeling and effectively mitigating the spread of infectious diseases has been a long-
standing public health goal. The stakes are high: throughout human history, epidemics
have had significant death tolls. In the mid-14th century [15], between 30% and 50% of Eu-
rope's population died due to the Black Death. In 1918, the Spanish flu pandemic caused
an estimated 50 million deaths worldwide [33]. More recently, the 2002 -- 2003 SARS pan-
demic that originated in Hong-Kong and spread worldwide caused the death of 774 [36].
These events highlight not only the scale of the problem but also our vulnerability, past and
present. The situation worsens in times of crises. A recent example is the ongoing cholera
outbreak in Haiti: it started in 2010, a few months after a major earthquake. Cholera is
a recurring issue in West African countries as well, with many deaths reported each time.
Effective measures against an epidemic require an accurate and up-to-date assessment of the
situation, a very fast response and a strong coordination, which are colossal organizational
efforts under tight time constraints. To this day, there is no uncontested way of preventing
epidemics in general. Traditionally, many methods that have been used involve top-down
approaches such as vaccination campaigns, the set-up of medical shelters, travel restrictions
or quarantines [19]. These methods have several drawbacks: they are difficult and slow to
be put into place, they can be expensive and also freedom-restrictive. It is clear that any
improvement could have a tremendous impact and translate into significant welfare gains.
In our work, we focus on human-mediated epidemics (transmitted by human contact, e.g.,
influenza). For these epidemics, human mobility clearly plays a crucial role in that it enables
the epidemic to travel and spread geographically. We will explore new mitigation methods
1
3
1
0
2
l
u
J
8
]
I
S
.
s
c
[
1
v
4
8
0
2
.
7
0
3
1
:
v
i
X
r
a
and expand the solution space. In particular, we argue that taking advantage of mobile
technology opens up many possibilities for mitigating the spread of an epidemic in original
and distinctive ways.
Importantly, mobile technology is unique in that it is allows the
personalization of countermeasures through precise measurements at the individual level,
as well as individualized recommendations. It is this combination of information extracted
from mobile data and subsequent personalization of prevention advice that opens up novel
ways of mitigating an epidemic. We envision a mobile service that sends recommendations
that invite the individuals to adapt their behavior, for example by delaying or canceling
a trip. More generally, we formulate subtle, precise and minimally restrictive personalized
behavioral rules that, if followed even partially, will have a positive global effect on the
epidemic.
1.1 Context and Contributions
Our work was spurred by the Data for Development challenge1 organized by France Telecom-
Orange, a global telecommunications operator. Participants in this challenge have access to
data gathered from 2.5 billion calls made by 5 million users in Ivory Coast. The goal is to
find an original and creative use of this data that contributes towards the social, economic
and environmental development of Ivory Coast. Four different datasets were derived from
call detail records (CDRs) recorded over a period of 5 months, from December 2011 to April
2012. Blondel et al. [8] provide a detailed description of the datasets. Among these, two are
mobility traces containing the time and the location at which a sample of the users made
their phone calls. In order to protect the users' privacy, the datasets reflect different trade-
offs in terms of the location's accuracy and the time span over which the trace is provided.
We use this data to build a home location and time-dependent model of human mobility
in Ivory Coast, which allows us to accurately capture population movements across the
country (Section 4). These mobility patterns then power the core of our epidemic model,
which allows us to analyze epidemic outbreaks at the level of single individuals (Section 5).
Beyond these models, our main contribution is to foster the idea of a mobile service that
sends personal recommendations to help mitigate an epidemic. The mobile service is an
original idea that has several advantages over existing methods. In particular, we introduce
and motivate the concept of micro-measures, individual countermeasures tailored to their
recipients' specific behavior; this new approach is the opposite of the one-size-fits-all pattern
that characterizes most traditional mitigation measures. We present several concrete such
micro-measures and discuss their potential (Section 3). Finally, we empirically evaluate
their effectiveness using our epidemic model and provide some insights into further research
directions (Section 6).
2 Related Work
Infectious diseases, also known as transmissible diseases are one of the the major causes of
deaths in human societies. An epidemic is a rapid and extensive spread of a transmissible
disease that affects many individuals in an area, community, or population. In order to
study epidemics, scientists need to describe them mathematically, which enables them to
1See: http://www.d4d.orange.com/. The challenge was launched in mid-2012 and ended on February
15th, 2013.
2
predict epidemic outbreaks and to find strategies for decreasing mortality rates, and hence
the costs to the economy. In their seminal work, Kermack and McKendrick [23] introduce a
SIR model with three distinct classes of populations: susceptibles, infectives and recovered.
This simple, yet powerful, model is very popular for modeling the evolution of epidemics
in populations. Hethcote [17] reviews different extensions of this model (SIS, SI, SEIS and
etc.), as well as threshold theorems involving measures such as the reproduction number,
which is the average number of secondary infections caused by an infected individual when
in contact with a population of susceptibles.
Instead of modeling an epidemic for the population in a region, it is possible to increase
geographical granularity by dividing the original region in sub-regions, and then study the
SIR model for the population of each region [1, 5, 26, 34]. By assuming that human contacts
are responsible for disease transmission, the disease spread among sub-regions is driven by
the mobility of individuals. Sattenspiel and Dietz [26] take into account the home region of
individuals in order to simulate their mobility. One of the simple approaches to modeling
population mobility is the gravity model that is based on two assumptions: Mobility flux
between two regions is proportional to the product of their population's size.
It decays
as the distance separating them increases [29]. For example, recently, Rinaldo et al. [25]
study the Haiti cholera outbreak (2010 -- 2011) and try to predict the next outbreaks of
cholera, using the gravity model and rainfall as drivers of disease transmission. By using a
stochastic computational framework, Colizza et al. [9] study the epidemic propagation on a
larger scale: They analyse the effect of airline transportation (complete worldwide air travel
infrastructure complemented with census population data) on global epidemics.
In order to improve the realism of epidemic models, we need to build more accurate and data-
driven mobility models. CDRs collected by cellular services are used for studying human
mobility, because they represent a rich source of information about mobility [2, 3, 4, 14, 20,
31]. For example, Gonzalez et al. [14] analyze the trajectory of 100,000 mobile phone users
over a six-month period. They find that human trajectories exhibit very regular patterns,
hence we can model each individual mobility with only a few parameters. Isaacman et al.
[21] model how a large population move within different metropolitan areas. Because of the
sporadic nature of CDRs, Ficek and Kencl [12] use a Gaussian mixture model to reproduce
probabilistically location of users between two consecutive calls. Based on the number of
unique antennas observed by each user, Halepovic and Williamson [16] assume that some
proportion of the population are static and always stay in their home regions.
The development of strategies for controlling epidemics such as influenza is one of the high
priorities of global public health policies [11, 13, 18, 19]. SIR models, which incorporate mo-
bility between regions, represent powerful tools for designing and testing different strategies
to control epidemics. The quarantine is one of the methods often used to limit the spread of
infectious diseases within human populations. We lack information however about the ef-
fectiveness of quarantine on controlling epidemics. Sattenspiel and Herring [27] use records
of the influenza epidemic, which took place in Canada at 1918-19, to investigate the effect
of quarantine. They show that a quarantine is effective only when mobility is restricted,
and that it depends on its application-time and duration. In addition to these issues about
the effectiveness of quarantine, there are issues, that include implementation challenges,
economic cost and the violation of civil rights, especially in the cases of long confinement
or isolation from society. Another way to control epidemics is to vaccinate the susceptible
3
population in a series of pulses called pulse vaccination [24, 28, 30, 37, 38]. For example,
Zaman et al. [37] define a control optimization problem based on the SIR model. They try
to compute the optimum percentage of susceptible population to be vaccinated at each time.
This method requires the vaccination of at least 10 percent of the susceptible population at
each time step, in order to make a small change in the epidemic behaviour of the infectious
disease.
3 Mobile Micro-measures
Traditional epidemic mitigation methods consist of heavy, top-down approaches such as
blockades, quarantines or large-scale vaccinations. As an alternative, we suggest that mobile
technology could enable a much richer and sophisticated set of mitigation measures for
human-mediated epidemics, which we name micro-measures. Let us illustrate our vision by
describing a simple scenario.
Jean, an 18 year old inhabitant of Ivory Coast living in Northeastern Bouak´e,
would like to play pickup football. He knows that a meningitis outbreak just
surfaced in his district, and he does not want to take any risk. Bouak´e happens
to be part of a pilot program of a mobile service that helps mitigate the spread
of meningitis. Using his mobile phone, he sends a short request to the service
that instantly computes the following personalized recommendation for him: to
minimize the risk, he should try the football field a few kilometers southwards,
instead of going to the one he is used to. It would be best if he took the gbaka
(small bus) in about 17 minutes, this way he would avoid contact with the kids
coming back home from the school nearby.
Of course, this scenario presents an idealized and naive view of reality; Jean might not have a
cell phone to begin with, the bus might not have such a precise schedule, and there might not
be alternative locations where people are playing pickup football. It nevertheless gives an
overview of the level of refinement that can be achieved through personal recommendations.
The main properties of such a service are as follows:
Personalized. Recommendations are generated and communicated on an individual basis.
Mobile technology enables this in two ways: first, it allows for a quantity of valuable
behavioral information (such as location and activity) to be recorded and second, it
provides a readily available unicast communication channel.
Adaptive. As the epidemic progresses and each individuals' intentions are discovered,
the recommendations are instantly adapted. The personalization of mobile micro-
recommendations ensures their effectiveness. Such recommendations, in contrast with
most large-scale mitigation efforts, would typically require much less time to be set
up and would always be in phase with the current state of the epidemic.
Microscopic. In contrast with a one-size-fits-all policy that typically considers an epidemic
from a macroscopic perspective, micro-measures tend to focus on subtle and local
changes. These changes, when looked at independently, are mostly insignificant; but
taken together, they result in important global improvements.
4
State-independent. An additional property of the service is that it is epidemic-state
independent: the recommendation should not depend on whether the individual is
infective or not. First, it does not require prior knowledge about the state of an
individual: it is often hard to determine precisely when he becomes infected. Second,
it aligns the incentives: without additional knowledge, everyone can expect to benefit
from following the recommendation -- this might not necessarily be the case when the
state is known.
This lays the foundation of our approach but does not yet suggest any concrete mitigation
scheme. Still, there are fundamental questions related to the feasibility of micro-measures.
Under which conditions do small, local changes (such as an individual agreeing to commute
slightly earlier) have a global impact? How many individuals need to cooperate, and how
does this, significantly alter the dynamics of the epidemic ? An epidemic can often be seen as
being either supercritical (the epidemic grows) or subcritical (it declines). What microscopic
changes are susceptible to cause a phase transition? Although a precise characterization of
these changes and, by extension, rigorous answers to these questions are beyond the scope
of our work, we intend to show initial evidence of the relevance of such a mobile service.
3.1 Concrete Micro-Measures
Beyond a theoretical argument, our contribution is the description and evaluation of three
concrete strategies we can use to generate micro-measures. They represent initial baselines
for further developments. Let us first note that contacts between individuals can broadly
be categorized into two groups: the deliberate contacts are, for example, between family
members or at work, whereas the accidental contacts are formed by random encounters,
for instance, while shopping or commuting. At a high level, our approach is to maintain
deliberate contacts and rewiring the accidental ones. The idea is to weaken the links in the
contact network that form the path through which the epidemic spreads. By changing its
structure, we seek to decelerate the dynamics and drive the epidemic down to a sub-critical
level.
CutCommunities
DecreaseMix
GoHome
to
Knowledge
maintain
Recommendation Do not cross commu-
List of communities of
locations
Intuition
nity boundaries
Weakening the weak
geographical links
Social communities of
users
Stay with your social
circle
Segmenting
communities
social
State of the epidemic
across regions
Go/stay home
Home is a safe place
Table 1. We recapitulate the main characteristics of the three strategies we have imple-
mented to mitigate the spread of epidemic.
3.1.1 CutCommunities strategy
It is clear that mobility drives the spread of an epidemic. A straightforward strategy
would therefore be to reduce long-range contacts, be it at the expense of reinforcing local
ones. Uniformly reducing mobility is, however, both expensive and inflexible. To overcome
5
Figure 1. We find 30 communities in the mobility network (Section 6) when using the
Louvain community detection algorithm. It is not surprising that these communities reflects
the geographical proximity between nodes, as trips are more frequent between close antennas
than between distant ones.
this, our first strategy, CutCommunities, takes into account communities of locations
in the mobility network, and focuses on reducing human mobility over inter-community
links -- this is, in a sense, analogous to weakening the weak links in the network. The main
difference with a simple blockade is that our strategy is able to adapt to changes in the
network (mobility patterns vary over time, cf. Section 4). In practice, the service operator
would maintain a list of location communities identified through the mobility patterns of
its userbase; when an individual checks whether a trip is safe, the service would verify
whether it crosses community boundaries and, if this is the case, discourage the individual
from making this trip2. If additional per-location information is available about the current
state of the epidemic, recommendations could be further corrected according to the strength
2As a relaxation of this counter-measure, we could consider postponing the trip instead. Simply by
delaying certain trips, we could prevent harmful interactions between groups of individuals. This is analogous
to time-division multiplexing; a slight change in the habits of a group of people might significantly change
the contact surface.
6
of the epidemic at the individual's current and projected locations.
3.1.2 DecreaseMix strategy
Instead of acting on mobility to segment contacts across location communities, we also
consider segmentation social communities. The aim is to separate individuals inside the
same location, e.g., by making them visit different aisles of the same supermarket at different
times. Putting in place such a segmentation is more sophisticated than in the case of
mobility, but this strategy is the perfect example of another extremal point in the solution
space. The service operator would keep a list of social communities and would communicate
a distinctive tag (e.g., a color) to individuals according to their community. Individuals
would access locations differently, depending on their tag; for example, seating in a theater
would be organized in such a way that contacts between communities are minimized. We are
aware that this strategy could raise many concerns, because it segregates people, therefore
great care would be needed if it were to be implemented. Despite this, we retain it because
it reflects a different trade-off with respect to CutCommunities: instead of discouraging
individuals from going to certain locations where they can be in contact with everyone, we
allow them go everywhere, but restrict the contact network.
3.1.3 GoHome strategy
We consider a third case where the service recommends individuals to go home. The intu-
ition behind this strategy is that we assume that when at home, the contact rate decreases.
Whereas the previous strategies target the individuals' location or contact network, this
one is distinctive in that it affects the the rate of contact. With information on the progress
of the epidemic across locations, the operator could prioritize sending advice to those indi-
viduals whose cooperation would yield the greatest effect. In Section 6, we will provide a
detailed evaluation of the three described strategies. Before doing so, we will introduce the
mobility and epidemic models used for our assessments.
4 Mobility Model
Because the spread of epidemics depends greatly on the mobility of infected individuals,
and on the locations where they interact with other individuals, a realistic, data-driven
mobility model is a essential tool for simulating realistic epidemic propagation. It should
therefore model population mobility, take into account certain microscopic aspects at the
individual level, and still allow simulations of epidemic propagation to scale up to millions
of individuals. Moreover, it should capture the main differences between the mobility of
different groups of individuals, where a group is constituted of individuals exhibiting similar
mobility profiles. To construct a mobility model that fulfils these requirements, our intuition
is : The home location of individuals strongly shapes their mobility patterns because the
places they visit regularly e.g., their workplaces, schools or the shopping centers, depend
on the proximity to their home. Typically, we expect the most visited location (home) and
the second most visited location (school, university or work) to be geographically close to
each other. In addition to this geographical aspect, mobility is strongly time-dependent:
Individuals commute between home and work during the weekdays, with a substantial
change in their travel behavior during the weekends.
7
Definition
A = {1, . . . , 1231}
SP = {1, . . . , 255}
k
sphome(u)
ahome(u)
X(n)
t(n)
hk(n)
d(n) = day(t(n))
w(n) = weekday(t(n))
Domain
-
-
N
SP
A
A
N
Explanation
Set of antennas
Set of sub-prefectures
Time resolution
Home sub-prefecture
Home antenna
Antenna
Absolute time
{1, . . . , k} Period of the day
{1, . . . , 7} Day of the week
{0, 1}
Day type: weekday or weekend
Table 2. List of the definition and domain of the variables relative to user u, as well as
those describing his nth visit.
Building on this, we make the assumption that the individuals that share the same home-
location exhibit a similar mobility pattern. Therefore, we construct a location and time-
based mobility model that depends on the variables presented in Table 2. The conditional
distribution of the location X(n) of user u depends on his home antenna ahome(u), but also
on the time of the visits (hk(n), w(n)):
p (X(n)u, t(n)) = p
X(n)hk(n), w(n), ahome(u)
(cid:16)
(cid:17)
.
(1)
First, we choose the the time resolution k = 3 in order to divide the day in 3 distinct
periods: Morning (6 am to 1 pm), afternoon (1 pm to 8 pm) and night (8 pm to 6 am).
Second, conditioning on the parameter w(n) allows us to distinguish between weekdays
and weekends. Finally, the home antenna ahome(u) of user u is defined as the most visited
antenna during the night period. Consequently, given the period of the day, the day type
and the home antenna of user u, the distribution of the location that he might visit (1) is
a multinomial distribution with A categories.
4.1 Learning and Evaluating Mobility Models
In order to build our model from data, we analyse SET2, one of the datatsets provided
by France Telecom-Orange [8]. It contains high-resolution trajectories of 500,000 users,
observed over a two-week period. We focus on this datatset, as it offers the highest geo-
graphical resolution : Individuals' locations are observed across antennas. To avoid having
to deal with users whose location samples are very sparse, we consider only the users who
visited more than 1 antenna and made on average more than 1 call per day. In order to
evaluate the realism of our mobility model, we separate the data into two parts: For each
user, we put 90% of the calls in the training set and the remaining 10% in the test set. First,
we build a mobility model by learning from the training set by using a maximum likelihood
estimator . Then, we evaluate our mobility model by computing the average log-likelihood
of the calls belonging to the unseen test set. The average log-likelihood reflects how well our
model generalizes to unseen data. As the test set might contain some locations not visited
by a given class of users in the training set, the maximum likelihood estimate of the distri-
bution (1) assigns zero probability to these observations. We cope with this by assuming
8
Mobility model Average log-likelihood
Our model
SPM
TM
MC
-1.07
-1.67
-2.9
-6.49
Table 3. Log-likelihood of the unseen data from the test set. Our mobility model signifi-
cantly outperforms the baseline models since its predictive power, with respect to the test
set, is higher.
that the distribution (1) is a multinomial distribution drawn from an exchangeable Dirichlet
distribution, which implies that the inferred distribution (1) is a random variable drawn
from a posterior distribution conditioned on the training data. A more detailed description
of this smoothing procedure is given by Blei et al. [6].
We tested several variants of mobility models by varying their structure and parameters
(time resolution, day of the week, etc). To have three representative baseline models for
comparison, we choose three predictors out of the several variants we tested.
The first baseline model is a time-based mobility (TM) model
X(n)hk(n), w(n)
p (X(n)u, t(n)) = p
(cid:16)
(cid:17)
,
(2)
where all mobile-phone users exhibit the same time-dependant geographical distribution.
The second baseline is a location-dependent first order Markov chain (MC)
p (X(n)u, t(n), X(n − 1), . . . , X(0)) = p (X(n)X(n − 1)) ,
(3)
where the current location of a user depends only the location he visited just before. The
third baseline is a time and sub-prefecture dependant mobility model (SPM)
p (X(n)u, t(n)) = p
X(n)hk(n), w(n), sphome(u)
(cid:16)
(cid:17)
,
(4)
where the home of a user is represented by a sub-prefecture instead of an antenna. This
implies a more important aggregation of users, where two users who share the same home
sub-prefecture, have the same mobility pattern.
The experimental results are shown in Table 3. The first order Markov chain (MC) performs
the worst. This is not surprising since the time difference between two call records varies
greatly, ranging from a few minutes to a few days. The location associated with a call made
in the past few hours or days does not necessarily affect the current location. As the location
data is sporadic, it is not surprising than any model that learns from transitions performs
poorly, and is outperformed by time-based models. Our model performs the best; and by
comparing it to the time-based model (TM), we realise that knowing the home-locations
of users enhances the predictive power of the mobility model. Moreover, the granularity of
home locations is crucial: Our model significantly outperforms the sub-prefecture dependent
mobility model because it has a finer granularity of the home-location.
9
A realistic mobility model is an essential building block of a realistic epidemic propagation
model because mobility drives population flows between regions, and therefore the geo-
graphical proximity between individuals. In the next section, we introduce the epidemic
model we use to simulate a local epidemic propagation.
5 Epidemic Model
Building up on the mobility, this section introduces our epidemic model. It is based on a
discretized, stochastic version of the SIR model [23]; Tables 4 and 5 provide an overview of
the different parameters and quantities used throughout the section. We assume that the
size of the population (N individuals) remains constant -- there are no births nor deaths, a
reasonable assumption if the time horizon is limited to at most a few months. Under the
SIR model, an individual can be either susceptible to the disease, infective, or recovered
from the disease and immunized against further infections3. We assume that most of the
population is initially susceptible, except for a small number of infective individuals that
form the seed of the epidemic. Individuals successively go through the susceptible, infective
and recovered states; a desirable outcome would have many individuals stay susceptible
without ever becoming infective. The basic SIR model assumes random mixing of the
whole population: any individual meets any other one with a uniform probability. In our
model, we relax this strong assumption by taking into account the mobility. We spread the
population across M regions; each region bears its own SIR process where the corresponding
meta-population mixes at random. These regional processes are independent and isolated,
and the only way the epidemic crosses regional boundaries is through human mobility
[22].
In summary, regional interactions take place uniformly at random, whereas global
interactions are shaped by the individuals' mobility.
i
N
M number of regions
N∗
L
β
g
total population
initial population of region i, where i ∈ {1, . . . , M}
number of different mobility classes
contact probability
recovery probability
Table 4. Parameters of the epidemic model.
5.1 Local Epidemic Dynamics
In order to work at the individual level, we adapt the classic deterministic SIR model in
order to have a discrete-time stochastic variant. The contact probability β and recovery
probability g are constant across all regions4. For a region i ∈ {1, . . . , M} we compute, at
each time step, the force of infection λi = β Ii
. This quantity represents the probability
Ni
of making a contact that results in an infection. During a time step, every susceptible
individual gets infected independently at random with probability λi, while every infective
3In the literature, this state is sometimes known as removed. The important point is that they do not
participate in the epidemic anymore.
4These quantities are rates in the continuous time SIR model. In order to carry over the characteristics
of the SIR model to our discretized version, we need to ensure that the sampling interval is short enough to
ensure that β, g < 1.
10
cl mobility class l, where l ∈ {1, . . . , L}
Si
distribution of the number of susceptible individuals in re-
gion i across classes. Si = (Si,c1, . . . , Si,cL)
distribution of the number of infected individuals in region
i across classes. Ii = (Ii,c1, . . . , Ii,cL)
distribution of the number of recovered individuals in region
i across classes. Ri = (Ri,c1, . . . , Ri,cL)
number of susceptible individuals in region i, equal to (cid:107)Si(cid:107)1
number of infected individuals in region i, equal to (cid:107)Ii(cid:107)1
number of recovered individuals in region i, equal to (cid:107)Ri(cid:107)1
population of region i, where i ∈ {1, . . . , M}
infection probability for region i. λi = β Ii
Ni
Ii
Ri
Si
Ii
Ri
Ni
λi
Table 5. Notation for various quantities related to the epidemic.
individual recovers independently at random with probability g. If we denote by ∆Xi the
variation of Xi, Xi ∈ {S, I, R} after one time step, it is easy to see that
E(∆Si) = −λiSi
E(∆Ii) = λiSi − gIi
E(∆Ri) = gIi,
which are the expected difference equations for the SIR model under the random mixing
assumption. We note that our model has many similarities with that of Colizza et al. [10],
used to model the SARS pandemic.
5.2 Implementation
To allow for distinctive mobility patterns across the population, individuals belong to one
out of L classes {c1, . . . , cL} that fully characterize their mobility patterns. In accordance
with the mobility model (Section 4), the individuals' class is determined by their home an-
tenna. The implementation is best understood when decomposed into two distinct, succes-
sive phases: a mobility phase where individuals can move between regions, and an epidemic
phase where individuals get infected or recover.
Mobility phase We consider every individual. Suppose the individual is in region i; the
mobility model assigns a new region j according to its mobility class. If i (cid:54)= j we
update the vectors Xi and Xj accordingly, where X ∈ {S, I, R} depends on the
current state of the individual.
Epidemic phase We consider every region i ∈ {1, . . . , M}. We begin this phase by up-
dating the infection rate λi given the current values of Ni and Ii. Every infected
individual then recovers with probability g, while every susceptible individual gets
infected with probability λi. Si, Ii and Ri are updated accordingly.
This process is repeated until the end of the period of interest.
11
Figure 2. Snapshots of a sample epidemic process where each dot represents a region
(here, the surroundings of an antenna). Colors indicate the relative proportion of infective
individuals. Initially, just a few individuals form a seed of infectives (left). A little more
that 9 days later, the epidemic has spread over most of the country (right).
6 Empirical Evaluation
Next, we use our models to test the strategies previously described in Section 3. Before
evaluating our strategies, we first explain how the epidemic model is parameterized and
how epidemic spreads are quantitatively characterized.
6.1 Model Parameters and Evaluation Metrics
In order to be consistent with our mobility model, the epidemic model defines regions to
be the area surrounding the antennas (M = 1231). Hence, we will use the words region
and antenna interchangeably. As an individual's mobility is tied to his home antenna, we
distinguish among L = 1231 different classes. To initialize the population attached to each
antenna, we use data from the AfriPop project [32] which provides us with Ivory Coast
population figures at the hectare level; to account for the fact that not every individual is
mobile, we allow only 55% of the population to move during the mobility phase5, which
roughly corresponds to the proportion of the population in the 15-to-64 age bracket [35].
Days are divided into three time steps in order to match the mobility model6, and the
typical time horizon is between 100 and 400 time steps (i.e. 1 -- 4 months). Contact and
recovery probability are usually set to β = 1, respectively g = 0.5; Although these synthetic
values do not directly match any well-known disease, they are still qualitatively close to
realistic cases, such as influenza. All our simulations start with a seed set of 23 infectives
5This distinction is rather crude and could certainly be further refined. However we deemed it to be
sufficient for our purposes.
6Notice that this is not a formal requirement. We use this subdivision mainly for simplicity.
12
p
0.90
0.99
1.00
Affected movements Maximum
10.91%
12.57%
5.32%
21.38% (ts = 42)
22.91% (ts = 51)
12.20% (ts = 33)
Table 6. Proportion of movements affected when using the CutCommunities strategy
for three different values of the compliance probability p. We indicate the overall average
over the 80 time steps, as well as the maximum value.
distributed across 5 antennas7 in the Att´ecoub´e district of Abidjan.
In order to quantify the difference between epidemic spreads, we propose three metrics to
(cid:80)M
evaluate the effectiveness of our mitigation strategies. Figure 3 shows how these quan-
tities are related to the epidemic's evolution over time. For notational clarity, let X =
i=1 Xi, X ∈ {S, I, R} be the total number of individuals in each state over the country as
a whole. As these quantities evolve over time, they are functions of the time step n. The
first metric is the size of the largest outbreak or, equivalently, the maximal proportion of
infective individuals,
∗ = max
I
n
I(n)
N
.
The reasoning behind this metric is self-evident: in most cases, the larger the proportion
of infective individuals, the more difficult the control of the epidemic. It is also, broadly
speaking, a good indicator of the epidemic's strength. Our second metric is closely related
to the first one, but considers the complementary dimension: it measures the time of the
largest outbreak,
∗ = arg max
T
I(n).
n
Delaying the moment at which the epidemic reaches its peak allows individuals and gov-
ernments to have enough time to adapt their behavior, respectively, to deploy measures.
Finally, our last metric captures the tail behavior of the epidemic:
it measures the final
proportion of recovered users,
∗ = lim
Q
n→∞
R(n)
N
.
Note that we would like to minimize this metric. After the epidemic dies out, all individuals
are either recovered or susceptible, and a low proportion of recovered individuals means that
a high percentage of the population did not go through the infective state at all.
6.2 Results
We now take a closer look at our three proposed strategies. We will describe how we
instantiate them and we provide qualitative and quantitative assessments with respect to
their effectiveness.
13
Figure 3. Metrics used to evaluate the effectiveness of mitigation strategies. I∗ indicates
the magnitude of the epidemic's peak, T ∗ the time at which the peak happens, and Q∗
describes the asymptotic number of individuals that got infected and recovered.
6.2.1 CutCommunities strategy
The first strategy divides the country into location communities according to the network of
mobility. We consider the weighted, undirected graph where nodes represent antennas, and
edge weight is equal to the average number of trips between the two endpoints (regardless
of direction). We use the Louvain community detection algorithm [7]; Figure 1 shows the 30
identified communities. It is interesting -- but not surprising -- to note that the communities
are roughly geographicaly based8. This confirms our hypothesis stating that there are
geographical weak links. Micro-measures are then generated as follows: when an individual
checks whether a trip is safe, the service first verifies whether the trip crosses community
boundaries and whether the current or projected locations are affected by the disease; if
both of these conditions are met, the individual is discouraged from making the trip. The
recipient then complies with probability p.
Figure 4 shows the effect of CutCommunities for different values of p. Compared to
the baseline (p = 0), the strategy affects the size I∗ and the time T ∗ of the epidemic's
peak. However, it does not change much the tail behavior: Q∗ stays constant at around
0.8, except for the degenerate case where p = 1, which represents a blockade around the
community initially infected. We also observe that there seem to be two infection phases,
7In the datasets provided by France Telecom-Orange, these antennas have the following identifiers: 57,
146, 330, 836, 926.
8As a sidenote, we ran the Louvain method on a number of other graphs generated from the datasets
provided for the D4D challenge, including one derived from SET1 representing total antenna-to-antenna
communications. The communities always displayed the same geographical clustering. Furthermore, we
observed that mobility communities seem to be correlated to phone call communities.
14
T∗Q∗I∗Figure 4. Shape of the epidemic under the CutCommunities strategy, β = 1.0, g = 0.5.
On the left: solid lines represent the baseline (p = 0), dashed lines p = 0.9, dotted lines
p = 0.99. On the right, we compare p = 0.99 (solid) to a complete blockade (p = 1, dashed).
made progressively more apparent as p → 1, and that the blockade removes the second
phase; these two phases correspond to infections happening inside, respectively, outside
the initially infected community. Recall that this strategy only sends micro-measures to a
fraction of the individuals, those who cross community boundaries -- a case that by definition
should not happen too often.
It is therefore interesting to consider the number of trips
actually canceled as a result: Table 6 lists the average and maximal proportion for different
values of p. The numbers are quite low9, suggesting that the communities form a natural
partitioning of the regions.
In conclusion, this strategy does not affect the asymptotic
behavior of the epidemic but significantly shifts its peak. Altogether, it justifies the relevance
of mobility-based geographical communities as a data source to generate micro-measures.
6.2.2 DecreaseMix strategy
Recall that this strategy assigns tags to individuals according to the social community to
which they belong and segregates contacts across social communities. A service operator
might use the call graph (i.e. the social network derived from who calls whom) to infer social
communities in the population; unfortunately, we do have access to such data10. In order
to quantify the effectiveness this strategy, we proceed as follows. Similarly to our mobility
model, we make the assumption that the individual's community C is determined by his
home antenna. The DecreaseMix strategy do not decrease the total number of contacts;
instead it rewires contacts across communities to contacts inside the community. This
is done by splitting the contact probability to into intra-community and inter-community
9That these proportions are lowest when p = 1 is due to the fact that the epidemic is local to the infective
seeds' community
10The data provided for the Orange D4D challenge does include a dataset consisting of myopic views of
the call graph. SET4 is a sample of egonets, i.e. balls of radius two centred at a particular user. However,
this dataset did not yield anything useful for our purposes.
15
01020304050607080time step0.00.20.40.60.81.0proportion of populationinfectedrecovered01020304050607080time step0.00.20.40.60.81.0proportion of populationinfectedrecoveredFigure 5. Shape of the epidemic under the DecreaseMix strategy averaged over 10 runs,
β = 1.0, g = 0.5, for different values of the mixing parameter. Solid lines correspond to
q = 1.0, dashed ones to q = 0.1, dotted ones to q = 0.01.
contact probabilities and introducing a mixing parameter q
(cid:18)
(cid:19)
β
1 − q + q
Ni,C
Ni
βi,C =
βi,C = β − βi,C
Ii,C
Ni,C
λi,C = βi,C
+ βi,C
Ii,C
Ni,C
,
where Ni,C indicates the number of individuals of community C currently in region i,
Ni,C = Ni − Ni,C and the other quantities follow the same convention of notation. The
intuition is as follows: When q = 1, everyone mixes at random inside a region just as if
no countermeasure was applied at all. At the other extreme, when q = 0, contacts happen
only with individuals from the same community. Intermediary values of q allow us to play
with the strength of the segregation.
We evaluate the effectiveness of DecreaseMix for different values of the mixing parameter
q. Our simulations are parameterized with β = 1.0, g = 0.5 and q ∈ {1, 0.1, 0.01}; Figure
5 shows the average behavior of the epidemic over 10 runs. The main characteristic of this
strategy is that it delays the epidemic outbreak. However, the slopes of the two curves
at the strongest point of the epidemic are not very differentiated. As s result, the final
proportion of recovered Q∗ does not vary much. But by making it 10 or 100 times more
likely to contact an individual of the same community, we delay T ∗ by approximately 5
and 16 days, respectively, on average. Our intuition about this phenomenon is that it takes
more time for the epidemic to reach certain communities (as they are more segregated), but
16
050100150200time step0.00.20.40.60.81.0proportion of populationinfectedrecoveredp
0.1
0.5
Affected movements Maximum
2.81%
15.80%
5.21% (ts = 190)
26.12% (ts = 316)
Table 7. Proportion of movements affected when using the GoHome strategy for two
different values of the compliance probability p. We indicate the overall average over the
400 time steps, as well as the maximum value.
once a community sees its first case of infection, the spread is just as fast as before. We
argue that one of the main limiting factors at play here is the random mixing assumption:
if we were able to bring finer structural changes to the contact graph, the situation would
look very different.
6.3 GoHome strategy
Figure 6. Shape of the epidemic under the GoHome strategy, β = 1.0, g = 0.5. Light
curves indicate individual runs, dark curves indicate average. On the left: p = 0.1, on the
right: p = 0.5.
Our last strategy advices individuals to go home or stay home. In order to focus the micro-
measures on the most influential individuals, we assume that at each time step, the service
operator knows the proportion of susceptible, infective and recovered individuals across
locations. We suppose that before every trip, an individual sends a request to the service
that compares the proportion of infectives in both source and destination, and recommends
to go home if the destination has a proportion of infectives, lower than the source location.
Individuals then comply with probability p. The main intuition behind this choice is to
avoid sending infective individuals to highly susceptible locations. Note that we keep the
state-independent assumption here: we do not know the state of the individual when sending
out a recommendation. The second important assumption is that, when the individual is
at at home, the contact probability is set to be equal to the recovery probability11, i.e.
βhome := g. This models the fact that there are less contacts at home, in term of accidental
11When contact and recovery probability are equal, the single-population SIR epidemic (under the random
mixing assumption) does not develop anymore; setting βhome := g can therefore be seen as the least change
needed to stabilize the epidemic.
17
050100150200250300350400time step0.000.020.040.060.080.100.120.140.160.18proportion of populationinfectedrecovered050100150200250300350400time step0.000.020.040.060.080.100.120.140.160.18proportion of populationinfectedrecoveredones. Mixing is not exactly uniform anymore, and the infection probability is adapted as
follows:
λi,loc = βhome
Ii
Ni
λi,vis = β
Ivis
Ni
+ βhome
Iloc
Ni
.
Quantities with loc and vis subscripts correspond to individuals whose home region is
(respectively is not) i. Note that the contact probability of visitors can significantly decrease
in a region where the proportion of visitors to locals is low.
This time, the effectiveness depends on the value of the compliance probability p. We
use again β = 1.0, g = 0.5 and let p ∈ {0.0, 0.1, 0.5, 0.7}; Figure 6 shows the behavior of
the epidemic over 10 runs. As opposed to the results obtained with the DecreaseMix
strategy, we obtain significant improvements to Q∗ as p increases12. This observation is not
surprising because by suggesting to individuals to go home, we are directly reducing their
contact probability, which is a determining factor of the epidemic's dynamics. It is also
interesting to look at the actual number of trips that are affected (i.e., cancelled) because of
the micro-measures; Table 7 shows that a relatively low number of trips have to be affected
to noticeably impact the spread. In summary, this strategy has the potential to be quite
effective, although the assumptions it makes deserve closer analysis.
7 Conclusion
In this paper, we explore the novel idea of using mobile technology in order to mitigate the
spread of human-mediated infectious diseases. We motivate the concept of mobile micro-
measures that consist of personalized behavioral recommendations given to individuals.
By affecting, even partially, individual behaviors, we are able to globally impact the epi-
demic propagation. These mobile micro-measures have several original properties; they are
adaptive, target individuals at the microscopic level and provide a rich set of mitigation
methods. Using the data provided for the Orange D4D challenge [8], we first develop a
realistic mobility model for the population of Ivory Coast. Then, we incorporate it into an
epidemic model based on SIR in order to simulate the epidemic propagation, while taking
into account population mobility. Taking advantage of this framework, we propose and
evaluate three concrete strategies used to generate micro-measures. Our strategies weaken
the epidemic's intensity, successfully delay its peak and, in one case, significantly lower the
total number of infected individuals.
These preliminary results allow us to identify several research avenues. First, random
mixing is the most limiting assumption. Being able to change the structure of human
contacts at a finer level is a key component of more advanced micro-measures. The mobile
call graph is an example of a source of information about social contacts, one that is
readily available to mobile phone operators. Second, beyond our preliminary strategies, it
is highly important to deepen our understanding of the key ingredients that make mobile
micro-measures effective yet minimally restrictive. In parallel to mobile micro-measures, the
12Unfortunately, our simulation was limited to 400 time steps, which is not enough to clearly show the
asymptotical behavior. The claim, however, is justified by looking at the worst runs whose slope quickly
tends to zero.
18
availability of large-scale mobility data opens up new research directions in epidemiology: a
more precise characterization of the relation between epidemic spread and human mobility
patterns is an interesting topic we would also like to investigate in the future.
To conclude, we firmly believe that data-driven and personalized measures which take ad-
vantage of mobile technology are an important step towards effective epidemic mitigation.
Acknowledgements
We would like to thank Vincent Etter for his insightful comments and feedback about this
paper.
References
[1] J. Arino and P. Van den Driessche. A multi-city epidemic model. Mathematical Pop-
ulation Studies, 10(3):175 -- 193, 2003.
[2] A.-L. Barabasi. The origin of bursts and heavy tails in human dynamics. Nature, 435
(7039):207 -- 211, 2005.
[3] M. A. Bayir, M. Demirbas, and N. Eagle. Discovering SpatioTemporal Mobility Profiles
of Cellphone Users. In WoWMoM 2009, pages 1 -- 9. IEEE, 2009.
[4] R. Becker, R. C´aceres, K. Hanson, S. Isaacman, J. M. Loh, M. Martonosi, J. Rowland,
S. Urbanek, A. Varshavsky, and C. Volinsky. Human Mobility Characterization from
Cellular Network Data. Communications of the ACM, 56(1):74 -- 82, 2013.
[5] V. Belik, T. Geisel, and D. Brockmann. The impact of human mobility on spatial
disease dynamics. In CSE 2009, volume 4, pages 932 -- 935. IEEE, 2009.
[6] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet Allocation. Journal of
Machine Learning Research, 3:993 -- 1022, 2003.
[7] V. Blondel, J. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communities
in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10):
P10008, 2008.
[8] V. D. Blondel, M. Esch, C. Chan, F. Clerot, P. Deville, E. Huens, F. Morlot,
Z. Smoreda, and C. Ziemlicki. Data for Development: the D4D Challenge on Mo-
bile Phone Data. arXiv preprint arXiv:1210.0137, 2012.
[9] V. Colizza, A. Barrat, M. Barth´elemy, and A. Vespignani. The role of the airline
transportation network in the prediction and predictability of global epidemics. PNAS,
103(7):2015 -- 2020, 2006.
[10] V. Colizza, A. Barrat, M. Barth´elemy, and A. Vespignani. Predictability and epi-
demic pathways in global outbreaks of infectious diseases: the SARS case study. BMC
Medicine, 5(34), 2007.
[11] N. M. Ferguson, D. A. Cummings, C. Fraser, J. C. Cajka, P. C. Cooley, and D. S.
Burke. Strategies for mitigating an influenza pandemic. Nature, 442(7101):448 -- 452,
2006.
19
[12] M. Ficek and L. Kencl.
Inter-Call Mobility Model: A Spatio-temporal Refinement
of Call Data Records Using a Gaussian Mixture Model. In INFOCOM 2012, pages
469 -- 477. IEEE, 2012.
[13] T. C. Germann, K. Kadau, I. M. Longini Jr, and C. A. Macken. Mitigation strategies
for pandemic influenza in the United States. PNAS, 103(15):5935 -- 5940, 2006.
[14] M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi. Understanding individual human
mobility patterns. Nature, 453(7196):779 -- 782, 2008.
[15] R. Gottfried. Black Death. Simon and Schuster, 1985.
[16] E. Halepovic and C. Williamson. Characterizing and Modeling User Mobility in a
Cellular Data Network. In Proc. Workshop on PE-WASUN 20, pages 71 -- 78. ACM,
2005.
[17] H. W. Hethcote. The Mathematics of Infectious Diseases. SIAM review, 42(4):599 -- 653,
2000.
[18] L. Hufnagel, D. Brockmann, and T. Geisel. Forecast and control of epidemics in a
globalized world. PNAS, 101(42):15124 -- 15129, 2004.
[19] T. Inglesby, J. Nuzzo, T. O'Toole, and D. Henderson. Disease Mitigation Measures in
the Control of Pandemic Influenza. Biosecurity and Bioterrorism: Biodefense Strategy,
Practice, and Science, 4(4):366 -- 375, 2006.
[20] S. Isaacman, R. Becker, R. C´aceres, S. Kobourov, M. Martonosi, J. Rowland, and
A. Varshavsky. Ranges of Human Mobility in Los Angeles and New York. In PERCOM
2011, pages 88 -- 93. IEEE, 2011.
[21] S. Isaacman, R. Becker, R. C´aceres, M. Martonosi, J. Rowland, A. Varshavsky, and
W. Willinger. Human Mobility Modeling at Metropolitan Scales. In MobiSys 2012,
pages 239 -- 252. ACM, 2012.
[22] M. J. Keeling, L. Danon, M. C. Vernon, and T. A. House.
Individual identity and
movement networks for disease metapopulations. PNAS, 107(19):8866 -- 8870, 2010.
[23] W. Kermack and A. McKendrick. A contribution to the mathematical theory of epi-
demics. Proceedings of the Royal Society A, 115:700 -- 721, 1927.
[24] X. Meng and L. Chen. The dynamics of a new SIR epidemic model concerning pulse
vaccination strategy. Applied Mathematics and Computation, 197(2):582 -- 597, 2008.
[25] A. Rinaldo, E. Bertuzzo, L. Mari, L. Righetto, M. Blokesch, M. Gatto, R. Casagrandi,
M. Murray, S. M. Vesenbeckh, and I. Rodriguez-Iturbe. Reassessment of the 2010 --
2011 Haiti cholera outbreak and rainfall-driven multiseason projections. PNAS, 109
(17):6602 -- 6607, 2012.
[26] L. Sattenspiel and K. Dietz. A Structured Epidemic Model Incorporating Geographic
Mobility Among Regions. Mathematical Biosciences, 128(1):71 -- 91, 1995.
[27] L. Sattenspiel and D. A. Herring. Simulating the Effect of Quarantine on the Spread
of the 1918 -- 19 Flu in Central Canada. Bulletin of Mathematical Biology, 65(1):1 -- 26,
2003.
20
[28] B. Shulgin, L. Stone, and Z. Agur. Pulse Vaccination Strategy in the SIR Epidemic
Model. Bulletin of Mathematical Biology, 60(6):1123 -- 1148, 1998.
[29] F. Simini, M. C. Gonz´alez, A. Maritan, and A.-L. Barab´asi. A universal model for
mobility and migration patterns. Nature, 484(7392):96 -- 100, 2012.
[30] L. Stone, B. Shulgin, and Z. Agur. Theoretical Examination of the Pulse Vaccination
Policy in the SIR Epidemic Model. Mathematical and Computer Modelling, 31(4):
207 -- 215, 2000.
[31] Y. Tanahashi, J. R. Rowland, S. North, and K.-L. Ma.
Patterns from Anonymized Mobile Communication Usage.
151 -- 160. ACM, 2012.
Inferring Human Mobility
In MoMM 2012, pages
[32] Tatem, A.J. Cote d'Ivoire AfriPop Data 2010 (alpha version). Emerging Pathogens In-
stitute, University of Florida, 2010. URL http://www.clas.ufl.edu/users/atatem/
index_files/CIV.htm.
[33] J. Taubenberger and D. Morens. 1918 Influenza: The mother of all pandemics. Rev
Biomed, 17:69 -- 79, 2006.
[34] J. Truscott and N. M. Ferguson. Evaluating the Adequacy of Gravity Models as a
Description of Human Mobility for Epidemic Modelling. PLOS Computational Biology,
8(10):e1002699, 2012.
[35] United Nations, Department of Economic and Social Affairs. World Population
Prospects, the 2010 Revision, 2010. URL http://esa.un.org/unpd/wpp/index.htm.
[36] World Health Organization. Summary of probable SARS cases with onset of illness
from 1 November 2002 to 31 July 2003, 2004. URL http://www.who.int/csr/sars/
country/table2004_04_21/en/index.html.
[37] G. Zaman, Y. Han Kang, and I. H. Jung. Stability analysis and optimal vaccination
of an SIR epidemic model. BioSystems, 93(3):240 -- 249, 2008.
[38] G. Zaman, Y. H. Kang, and I. H. Jung. Optimal treatment of an SIR epidemic model
with time delay. BioSystems, 98(1):43 -- 50, 2009.
21
|
1710.11064 | 3 | 1710 | 2018-11-13T15:57:51 | Asymptotic degree distributions in large (homogeneous) random networks: A little theory and a counterexample | [
"cs.SI",
"cs.DM",
"math.PR",
"physics.soc-ph"
] | In random graph models, the degree distribution of an individual node should be distinguished from the (empirical) degree distribution of the graph that records the fractions of nodes with given degree. We introduce a general framework to explore when these two degree distributions coincide asymptotically in large homogeneous random networks. The discussion is carried under three basic statistical assumptions on the degree sequences: (i) a weak form of distributional homogeneity; (ii) the existence of an asymptotic (nodal) degree distribution; and (iii) a weak form of asymptotic uncorrelatedness. We show that this asymptotic equality may fail in homogeneous random networks for which (i) and (ii) hold but (iii) does not. The counterexample is found in the class of random threshold graphs. An implication of this finding is that random threshold graphs cannot be used as a substitute to the Barab\'asi-Albert model for scale-free network modeling, as has been proposed by some authors. The results can also be formulated for non-homogeneous models by making use of a random sampling procedure over the nodes. | cs.SI | cs |
1
Asymptotic degree distributions
in large (homogeneous) random networks:
A little theory and a counterexample
Siddharth Pal and Armand M. Makowski
Abstract -- In random graph models, the degree distribution of an individual node should be distinguished from the (empirical) degree
distribution of the graph that records the fractions of nodes with given degree. We introduce a general framework to explore when these
two degree distributions coincide asymptotically in a sequence of homogeneous random networks of increasingly large size. The
discussion is carried under three basic statistical assumptions on the degree sequences: (i) distributional homogeneity; (ii) existence of
an asymptotic (nodal) degree distribution; and (iii) asymptotic uncorrelatedness. It follows from the discussion that under (i)-(ii) the
asymptotic equality of the two degree distributions occurs if and only if (iii) holds. We use this observation to show that the asymptotic
equality may fail in some homogeneous random networks. The counterexample is found in the class of random threshold graphs for
which (i) and (ii) hold but where (iii) does not. An implication of this finding is that these random threshold graphs cannot be used as a
substitute to the Barab´asi-Albert model for scale-free network modeling, as was proposed by some authors. The results can also be
formulated for non-homogeneous models by making use of a random sampling procedure over the nodes.
Index Terms -- Random graphs; random threshold graphs; degree distribution; scale-free networks.
!
1 INTRODUCTION
In the past three decades considerable efforts have been
devoted to understanding the rich structure and functions
of complex networks, be they technologically engineered,
found in nature or generated through social interactions.
These developments have been recorded in surveys, e.g.,
[1], [19], [32], research monographs, e.g., [4], [16], [20], [25],
[33], and anthologies of research papers, e.g., [34].
The questions of interest often relate to a collection of
entities (alternatively called nodes, agents, etc.) and to a set
of relationships between them. The pairings can be phys-
ical, logical or social in nature; when pictured as links or
edges between nodes, they naturally give rise to graphs and
graph-like structures (customarily referred to as networks)
on the set of nodes. Often the pairwise relationships are
best viewed as inherently random, suggesting that random
graph models be used to frame the relevant issues -- Here we
understand a random graph to be a graph-valued random
variable (rv).
A popular research direction has been concerned with
designing random graph models that exhibit key proper-
This work was supported in part by NSF Grant CCF-1217997. The paper was
completed during the academic year 2014-2015 while A.M. Makowski was a
Visiting Professor with the Department of Statistics of the Hebrew University
of Jerusalem with the support of a fellowship from the Lady Davis Trust.
This document does not contain technology or technical data controlled under
either the U.S. International Traffic in Arms Regulations or the U.S. Export
Administration Regulations.
Parts of the material were presented in the 53rd IEEE Conference on Decision
and Control (CDC 2015), Osaka (Japan), December 2015.
S. Pal was with the Department of Electrical and Computer Engineering,
and the Institute for Systems Research, University of Maryland, College
Park, MD 20742 USA. He is now with Raytheon BBN Technologies (email:
[email protected]).
A. M. Makowski is with the Department of Electrical and Computer Engineer-
ing, and the Institute for Systems Research, University of Maryland, College
Park, MD 20742 USA (e-mail: [email protected]).
ties observed in real networks. Historically attention has
been given to the simplest of network properties, namely
the degree of nodes and their various distributions. The
discussion invariably starts with the work of Erdos and
R´enyi [22]: With n nodes and link probability p, the (bino-
mial) Erdos-R´enyi graph G(n; p) postulates that the n(n−1)
potential undirected links between these n nodes are each
created with probability p, independently of each other. The
degree distribution in Erdos-R´enyi graphs is announced to
be Poisson-like, the justification going roughly as follows: (i)
With Dn,k(p) denoting the degree rv of node k in G(n; p),
the rvs Dn,1(p), . . . , Dn,n(p) are identically distributed,
each distributed according to a binomial rv Bin(n − 1; p);
(ii) If the link probability scales with n as pn ∼ λ
n for some
λ > 0, then Poisson convergence ensures the distributional
convergence
2
Dn,1(pn) =⇒n D
(1)
(2)
with D denoting a Poisson rv with parameter λ. A rich
asymptotic theory has been developed for Erdos-R´enyi
graphs in the many node regime; see the monographs [10],
[18], [20], [26].
However, in many networks the data tells a different
story: If the network comprises a large number n nodes and
Nn(d) is the number of nodes with degree d in the network,
then statistical analysis suggests a power-law behavior of
the form
Nn(d)
(cid:39) Cd−α
n
for some α in the range [2, 3] (with occasional exceptions)
and C > 0. See [20, Section 4.2] for an introductory dis-
cussion and references, and the paper by Clauset et al. [15]
for a principled statistical framework. Statements such as (2)
are usually left somewhat vague as the range of d is never
carefully specified; networks where (2) was observed are
often called scale-free networks.
On account of this observation, Erdos-R´enyi graphs were
deemed inadequate for modeling scale-free networks (as
well as other networks of interest). As a result, new classes
of random graph models have been proposed in an attempt
to capture the behavior (2) (and other properties), e.g., the
configuration model [8], [9], [30], [31], generalized random
graphs [12], and exponential random graphs [24], [40] to
name some of the possibilities. The Barab´asi-Albert network
model came to prominence for its ability to formally "ex-
plain" the existence of power law degree distributions in
large networks via the mechanism of preferential attach-
ment [3].
The statement (2) concerns an empirical degree distribu-
tion computed network-wide, whereas the convergence (1)
addresses the behavior of the (generic) degree of a single
node, its distribution being identical across nodes. A natural
question is then whether these two different points of view
are compatible with each other and can be reconciled, at
least asymptotically, in large networks, and if so, under what
conditions. The purpose of this paper is to explore this issue
in some details. What follows is an outline of some of the
contributions along these lines:
1. In Section 2 a general framework to investigate this
discrepancy is introduced in terms of a sequence of random
graphs {Gn, n = 1, 2, . . .} whose size goes to infinity
with n. Two different settings of increasing generality are
considered.
2. The homogeneous setting captures situations where an
asymptotic nodal degree distribution exists, and is pre-
sented in Section 3. It is defined in terms of the following
three assumptions:
(i) A weak form of distributional homogeneity (hence the
terminology homogeneous networks): In particular, for
each n = 1, 2, . . ., the degree rvs in Gn are identically
distributed across nodes -- Let Dn denote the generic
degree rv in Gn;
(ii) Existence of an asymptotic (nodal) degree distribution:
In analogy with (1), there exists an N-valued rv D such
that
Dn =⇒n D.
(3)
Let (p(d), d = 0, 1, . . .) denote the pmf of D; and
(iii) Asymptotic uncorrelatedness: The degree rvs {Dn, n =
1, 2, . . .} display a weak form of asymptotic "pairwise
independence."
3. The relevant results for the homogeneous case are dis-
cussed in Section 4. Under the aforementioned assumptions,
Proposition 4.2 states that if (Pn(d), d = 0, 1, . . .) is the
empirical degree distribution in Gn (with Pn(d) denoting
the fraction of nodes with degree d in Gn), then
Pn(d) P−→n p(d),
d = 0, 1, . . .
(4)
where the pmf (p(d), d = 0, 1, . . .) on N is as postulated
in (ii) above. A strengthening of this result in terms of total
variation distance is provided as Proposition 6.1.
4. A more general setting is considered in Section 5 where
degree homogeneity, namely (i) above, is replaced by a ran-
dom sampling procedure over pairs of nodes. Many situations
are easily fitted into this more general framework. They
2
include the non-homogeneous Barab´asi-Albert model (and
other growth models), sequences of deterministic graphs
and sequences which are locally weakly convergent [2] (or
weakly convergent in the sense of Benjamini and Schramm
[5]).
5. In Section 7 we introduce a broad class of models where
the underlying assumptions (i) -- (iii) can be checked; this pro-
vides a natural and convenient setting for applying Propo-
sition 4.2. Erdos-R´enyi graphs (under the scaling yielding
(1)) are readily subsumed in this framework, as are many
other homogeneous networks of interest in applications; see
[35] for details. This resolves the discrepancy mentioned
earlier in that the appropriate version of (4) does hold for
both Erdos-R´enyi graphs (by virtue of Proposition 4.2) [35]
and for the Barab´asi-Albert model (for which (4) holds with
limiting pmf satisfying p(d) ∼ d−3 (d → ∞) [11]).
6. Next we turn our attention to the proposition, too often
taken for granted, that in homogeneous random graphs the
convergence (3) of the generic degree distribution automati-
cally implies the convergence (4) of the empirical degree dis-
tribution. In Section 8 we provide a counterexample drawn
from the class of random threshold graph models [13],
[23], [29], [39]. For this class of models under exponentially
distributed fitness, although (3) is known to take place with
p(d) ∼ d−2 (d → ∞) [23], we show that (4) fails to hold.
This fact, contained in Proposition 8.2, constitutes an easy
byproduct of Proposition 8.1. Proofs occupy Section 10 to
Section 13, and rely on the asymptotics of order statistics
for i.i.d. variates [21], [28]. We illustrate this failure through
limited simulation results in Section 9.
7. One implication of this last finding is that random thresh-
old graphs with exponentially distributed fitness cannot be
used as an alternative scale-free model to the Barab´asi-
Albert model (see below) as claimed by some authors
[13], [39]. Indeed, only the convergence (4) has meaning in
the preferential attachment model while (3) is meaningless
there, with the situation being reversed for random thresh-
old graphs. In other words, leaving aside the issue of which
value of α is appropriate, the two models cannot be com-
pared in terms of their degree distributions! This highlights
the fact that even in homogeneous graphs, the network-wide
degree distribution and the nodal degree distribution may
capture vastly different information.
Some of the results discussed in this paper were an-
nounced in the conference paper [36], mostly without
proofs. Different proofs to establish Proposition 8.2. were
originally given in the Ph.D. thesis of the first author [35].
2 A SIMPLE FRAMEWORK
First some notation and conventions: The random variables
(rvs) under consideration are all defined on the same proba-
bility triple (Ω,F, P). The construction of a probability triple
sufficiently large to carry all the required rvs is standard,
and omitted in the interest of brevity. All probabilistic state-
ments are made with respect to the probability measure P,
and we denote the corresponding expectation operator by
P−→n (resp. =⇒n) is used to signify con-
E. The notation
vergence in probability (resp. convergence in distribution)
(under P) with n going to infinity; see the monographs [7],
[14] for definitions and properties. If E is a subset of Ω,
then 1 [E] is the indicator rv of the set E with the usual
understanding that 1 [E] (ω) = 1 (resp. 1 [E] (ω) = 0) if
ω ∈ E (resp. ω /∈ E). The symbol N (resp. N0) denotes the
set of non-negative (resp. positive) integers.
The discussion is carried out in the following framework
often encountered in the literature; see Section 7 for ex-
amples: Given is a sequence of random graphs {Gn, n =
2, 3, . . .} defined on the probability triple (Ω,F, P) -- We
interchangeably use the terms random graphs and random
networks. Fix n = 2, 3, . . .. The random graph Gn is then
an ordered pair (Vn, En) defined on the set of nodes Vn
with random edge set En ⊆ Vn × Vn. Throughout the
deterministic set Vn is assumed to be non-empty and fi-
nite. The random edge set En is equivalently determined
by a set of {0, 1}-valued edge rvs {χn(k, (cid:96)), k, (cid:96) ∈ Vn}
-- Thus, χn(k, (cid:96)) = 1 (resp. χn(k, (cid:96)) = 0) if there is a
directed edge (resp. no edge) from node k to node (cid:96), so
that En = {(k, (cid:96)) ∈ Vn × Vn : χn(k, (cid:96)) = 1}. We do
not necessarily assume that Gn is an undirected graph, and
we allow self-loops. There is no loss in generality in taking
Vn = {1, . . . , kn} for some positive integer kn. In most cases
of interest Vn = {1, . . . , n} so that kn = n.
graph Gn is the rv Dn,k given by
For each k in Vn, the degree of node k in the random
Dn,k =
χn(k, (cid:96)).
(5)
(6)
(cid:88)
(cid:88)
(cid:96)∈Vn
k∈Vn
For each d = 0, 1, . . ., the rv Nn(d) defined by
Nn(d) =
1 [Dn,k = d]
(cid:88)
k∈Vn
counts the number of nodes in Vn which have degree d in
Gn. The fraction of nodes in Vn with degree d in Gn is then
given by
Pn(d) =
Nn(d)
Vn =
This defines the random pmf
1
Vn
(cid:18) Nn(d)
Vn
P n =
, d = 0, 1, . . .
1 [Dn,k = d] .
(cid:19)
on N with support contained in Vn ∪ {0}. Strictly speaking,
the expression (5) defines the out-degree of a node. How-
ever, everything said for out-degrees can also be developed
for in-degrees with no substantive changes. In what follows
the term degree will refer interchangeably to either out-
degree or in-degree, the point being moot when considering
undirected graphs as is the case in many situations.
For each d = 0, 1, . . ., we explore the convergence (in
probability) of the random sequence {Pn(d), n = 2, . . .} to
a deterministic limit, say L(d) in R, when the graph size
becomes infinitely large, namely limn→∞ Vn = ∞.
For sequences of bounded rvs, convergence in proba-
bility and mean-square convergence are equivalent by stan-
dard facts concerning modes of convergence for rvs [7], [14].
Therefore, the convergence
occurs if and only if
lim
n→∞
Pn(d) P−→n L(d)
E(cid:104)Pn(d) − L(d)2(cid:105)
= 0.
(7)
(8)
3
For each n = 2, 3, . . ., standard properties of the variance
give
E(cid:104)Pn(d) − L(d)2(cid:105)
= Var [Pn(d)] + E [Pn(d)] − L(d)2 ,
(9)
and the following characterization is readily obtained.
Fact 2.1. With d = 0, 1, . . ., the convergence in probability (7)
occurs to some scalar L(d) if and only if we simultaneously
have limn→∞ E [Pn(d)] = L(d) and limn→∞ Var [Pn(d)] =
0.
first two moments E [Nn(d)] and E(cid:2)Nn(d)2(cid:3). The definition
To exploit this observation we begin by computing the
(6) of the rv Nn(d) yields the expressions
E [Nn(d)] =
P [Dn,k = d]
(10)
(cid:88)
k∈Vn
and
E(cid:2)Nn(d)2(cid:3)
(cid:88)
(cid:88)
k∈Vn
=
+
P [Dn,k = d]
(cid:88)
E [1 [Dn,k = d] 1 [Dn,(cid:96) = d]]
(11)
k∈Vn
(cid:96)∈Vn: (cid:96)(cid:54)=k
by the binary nature of the involved rvs.
We leverage Fact 2.1 in two different settings: The homo-
geneous setting, introduced in Section 3, captures situations
already mentioned in the introduction where an asymptotic
nodal degree distribution exists; the relevant results are
presented in Section 4. A more general setting is considered
in Section 5.
3 THE HOMOGENEOUS CASE -- ASSUMPTIONS
First we specify what we mean by a random network (or
interchangeably, a random graph) to be homogeneous for the
purpose of this paper.
Assumption 1. (Homogeneity) For each n = 2, 3, . . ., the
degree rvs in Gn are equidistributed in the sense that
Dn,k =st Dn,1,
k ∈ Vn
and
(Dn,k, Dn,(cid:96)) =st (Dn,1, Dn,2)
k (cid:54)= (cid:96)
k, (cid:96) ∈ Vn.
(12)
(13)
Obviously condition (13) implies condition (12). In many
settings (see Section 7), Assumption 1 follows from the
stronger structural assumption that for each n = 1, 2, . . .,
the edge rvs {χn(k, (cid:96)), k, (cid:96) ∈ Vn} (or a subset thereof in the
undirected case) are exchangeable -- Random networks with
this property are traditionally called homogeneous. Under
Assumption 1, for each n = 2, 3, . . ., it is appropriate to
speak of the degree distribution of a node in Gn, namely the
distribution of Dn,1.
In many cases of interest the degree rvs {Dn,1, n =
2, 3, . . .} converge in the following sense.
Assumption 2. (Existence of an asymptotic degree distribu-
tion) Assume that Assumption 1 holds and that there exists
an N-valued rv D such that
Dn,1 =⇒n D.
(14)
Let p = (p(d), d = 0, 1, . . .) denote the pmf of the limiting
rv D.
Assumption 2 can be rephrased as
P [Dn,1 = d] = p(d),
lim
n→∞
d = 0, 1, . . .
(15)
Even in well-structured settings where Assumption 1 holds,
the convergence (14) may fail. For instance, in large homoge-
neous binary multiplicative attribute graph (MAG) models
introduced by Kim and Leskovec [27], although (14) occurs,
it does so only with a trivial limiting pmf p, say D = 0 a.s.
or D = ∞ a.s. depending on the parameter values; see [38]
for an extended discussion.
In the homogeneous setting, the motivating issue driving
the discussion is whether under Assumptions 1 and 2, the
convergence
Pn(d) P−→n p(d),
d = 0, 1, . . .
(16)
takes place where the pmf p = (p(d), d = 0, 1, . . .) is the
pmf postulated in Assumption 2. The next assumption turns
out to be key.
Assumption 3. (Asymptotic uncorrelatedness) Assume that
Assumption 1 holds, and that for each d = 0, 1, . . ., the
identically distributed rvs 1 [Dn,1 = d] and 1 [Dn,2 = d] are
asymptotically uncorrelated in the sense that
lim
n→∞ Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]] = 0.
(17)
Assumption 3 amounts to the convergence statement
(cid:0)P [Dn,1 = d, Dn,2 = d]
− P [Dn,1 = d] P [Dn,2 = d](cid:1) = 0
lim
n→∞
(18)
for each d = 0, 1, . . .. It is implied by the following stronger
assumption which is easier to check in practice; see Section
7 for some examples in a commonly occurring setting.
Assumption 4.
(Pairwise asymptotic independence) As-
sume Assumptions 1 and 2 to hold. Furthermore, the degree
rvs Dn,1 and Dn,2 are asymptotically independent in the
sense that
(Dn,1, Dn,2) =⇒n (D1, D2)
(19)
where D1 and D2 are independent N-valued rvs, each dis-
tributed according to the pmf p postulated in Assumption 2.
and
Var [Pn(d)]
= E
(cid:21)(cid:19)2
(cid:18)
E
(cid:20) Nn(d)
Vn
−
· P [Dn,1 = d, Dn,2 = d]
− (P [Dn,1 = d])2
(cid:34)(cid:18) Nn(d)
(cid:19)2(cid:35)
Vn
Vn − 1
Vn
P [Dn,1 = d]
+
Vn
Vn
Vn − 1
Vn
Var [1 [Dn,1 = d]]
=
=
of independence of the rvs D1 and D2 does not preclude
the possibility that the rvs 1 [D1 = d] and 1 [D2 = d] are
independent -- It is possible to have P [D1 = d, D2 = d] =
P [D1 = d] P [D2 = d] for all d = 0, 1, . . . without the rvs D1
and D2 being independent.
4
4 A LITTLE THEORY -- THE HOMOGENEOUS CASE
We return to Fact 2.1. Fix d = 0, 1, . . . and n = 2, 3, . . ..
Under Assumption 1, the expressions (10) and (11) become
E [Nn(d)] = Vn · P [Dn,1 = d]
and
E(cid:2)Nn(d)2(cid:3) = Vn(Vn − 1) · P [Dn,1 = d, Dn,2 = d]
+ Vn · P [Dn,1 = d] ,
respectively. It follows that
E [Pn(d)] = P [Dn,1 = d]
(20)
(21)
+
· Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]]
since P [Dn,1 = d] = P [Dn,2 = d] under Assumption 1.
Let n go to infinity in (20) and (21) with limn→∞ Vn =
∞. It is plain that limn→∞ E [Pn(d)] exists if and only if
limn→∞ P [Dn,1 = d] exists, and that limn→∞ Var [Pn(d)]
exists if and only if the limit
C(d) ≡ lim
n→∞ Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]]
(22)
exists. Fact 2.1 translates into the following equivalence.
Proposition 4.1. Assume Assumption 1. With d = 0, 1, . . .,
we have the convergence (7) for some constant L(d) in R if
and only if
P [Dn,1 = d] = L(d)
lim
n→∞
and
(23)
(24)
While Assumption 4 reads
lim
n→∞ Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]] = 0.
d, d(cid:48) = 0, 1, . . .
P [Dn,1 = d, Dn,2 = d(cid:48)] = p(d)p(d(cid:48)),
lim
n→∞
Assumption 3 does not require the joint convergence (19)
to hold. However, if (19) were known to hold (but with
no further characterization of the joint limit), then under
Assumption 2 it is easy to check that Assumption 3 is
equivalent to the independence of the binary rvs 1 [D1 = d]
and 1 [D2 = d] for each d = 0, 1, . . .. However, the lack
Under Assumption 1, Assumption 2 and Assumption 3
imply that the conditions (23) (with L(d) = p(d)) and (24)
hold for all d = 0, 1, . . ., respectively. Applying Proposition
4.1 we then obtain the following compact conclusion.
Proposition 4.2. Under Assumptions 1-3, the convergence
(16) holds for all d = 0, 1, . . . where the pmf p = (p(d), d =
0, 1, . . .) is the pmf postulated in Assumption 2.
To formulate a converse to Proposition 4.2, assume As-
sumption 1 to hold. The mere existence of the limit (23) for
all d = 0, 1, . . . does not guarantee that the limiting values
{L(d), d = 0, 1, . . .} constitute a pmf on N. Without any
d=0 L(d) ≤ 1:
d∈V Pn(d) ≤ 1 for
E [Pn(d)] ≤ 1. By
d∈V
P [Dn,1 = d] ≤ 1.
d∈V
d∈V p(d) ≤ 1, and the
additional assumption, it only holds that (cid:80)∞
Indeed, for each n = 2, 3, . . ., we have(cid:80)
every finite subset V ⊆ N, hence (cid:80)
virtue of (20) this is equivalent to(cid:80)
Letting n go to infinity we get (cid:80)
desired conclusion follows.
Proposition 4.3. Under Assumption 1, assume that for every
d = 0, 1, . . ., there exists a scalar L(d) such that
Pn(d) P−→n L(d).
(25)
If the limiting values {L(d), d = 0, 1, . . .} constitute a pmf
p = (p(d), d = 0, 1, . . .) on N, then both Assumption 2 (with
pmf p) and Assumption 3 must hold.
Proof.
By Proposition 4.1, the validity of (25) for all
implies (24) for all d = 0, 1, . . ., hence
d = 0, 1, . . .
Assumption 3 holds. By Proposition 4.1,
the validity
of (25) for all d = 0, 1, . . . also implies that (23) holds
for all d = 0, 1, . . .. If additionally the limiting values
{L(d), d = 0, 1, . . .} constitute a pmf p on N, then there
exists an N-valued rv D distributed according to the pmf p
such that Dn,1 =⇒n D, and Assumption 2 holds.
As we survey the discussion so far, it is plain that under
Assumptions 1-2, the convergence (7) necessarily takes the
form (16). Furthermore, whenever we have
lim
n→∞ Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]] > 0,
(26)
then (16) cannot hold.
5 A LITTLE THEORY -- THE GENERAL SETTING
Proposition 4.1 is a special case of a more general fact that
does not require any homogeneity assumption. We devote
this section to a presentation of this more general viewpoint:
Fix n = 2, 3, . . .. In the context of the random graph Gn, let
Σn denote the set {(k, (cid:96)) ∈ Vn × Vn : k (cid:54)= (cid:96)} that comprises
all ordered pairs drawn from Vn without repetition. Let also
the rv (νn, µn) : Ω → Σn be uniformly distributed over Σn,
i.e.,
P [νn = k, µn = (cid:96)] =
1
Vn(Vn − 1)
,
k (cid:54)= (cid:96)
k, (cid:96) ∈ Vn.
Thus, the rv (νn, µn) models the randomly uniform selec-
tion of two nodes in Vn (without repetition); the rvs νn and
µn are both uniformly distributed over Vn. The selection rv
(νn, µn) is assumed to be independent of the random graph
Gn.
Fix d = 0, 1, . . .. Under the enforced independence
assumptions, we note from (10) that
(cid:20) Nn(d)
(cid:21)
Vn
E
1
Vn · (cid:88)
(cid:88)
k∈Vn
=
=
P [Dn,k = d]
k∈Vn
P [νn = k, Dn,k = d] ,
5
(27)
and it follows that
E [Pn(d)] = P [Dn,νn = d] .
Using (11) we also conclude from (27) that
E(cid:2)Nn(d)2(cid:3)
= Vn · P [Dn,νn = d]
+ Vn (Vn − 1) · P [Dn,νn = d, Dn,µn = d] ,
whence
Var [Pn(d)]
= E
(cid:34)(cid:18) Nn(d)
(cid:19)2(cid:35)
Vn
(cid:20) Nn(d)
(cid:21)(cid:19)2
E
(cid:18)
−
Vn − 1
Vn
Vn
· P [Dn,νn = d, Dn,µn = d]
+
Vn
P [Dn,νn = d]
− P [Dn,νn = d] P [Dn,µn = d]
Var [1 [Dn,νn = d]]
=
=
Vn
Vn − 1
Vn
+
· Cov [1 [Dn,νn = d] , 1 [Dn,µn = d]] .
(28)
To obtain the variance term in (28) we used the obvious
equality P [Dn,µn = d] = P [Dn,νn = d]. Let n go to infinity
in (27) and (28) with limn→∞ Vn = ∞. Appealing again to
Fact 2.1 we obtain the following analog of Proposition 4.1.
Proposition 5.1. Under the foregoing assumptions, with d =
0, 1, . . ., the convergence (7) holds for some scalar L(d) in R
if and only if
P [Dn,νn = d] = L(d)
lim
n→∞
and
lim
n→∞ Cov [1 [Dn,νn = d] , 1 [Dn,µn = d]] = 0.
(29)
(30)
Under Assumption 1, for each n = 1, 2, . . . the distri-
butional equalities Dn,νn =st Dn,1, Dn,µn =st Dn,1, and
(Dn,νn , Dn,µn ) =st (Dn,1, Dn,2) hold, in which case the
conditions (29) and (30) reduce to conditions (23) and (24)
of Proposition 4.1, respectively -- Proposition 4.1 is plainly
subsumed by Proposition 5.1. While the latter holds under
no assumption on the sequence {Gn, n = 2, 3, . . .}, unfor-
tunately in that generality it does not retain the operational
ability of Proposition 4.1 of equating the two different degree
distributions available in the homogeneous case.
Proposition 5.1 also applies when the graphs {Gn, n =
2, 3, . . .} are deterministic. The non-homogeneous Barab´asi-
Albert model (and other growth models) are easily fitted
into this more general framework. In particular, Proposition
5.1 offers the possibility of establishing the convergence (7)
through (29) and (30). These two properties follow if the
sequence {Gn, n = 2, 3, . . .} is locally weakly convergent (or
weakly convergent in the sense of Benjamini and Schramm
[5]); see the reference [2] for an introduction to these ideas.
The Barab´asi-Albert model (and some of its variants) were
shown to be locally weakly convergent by Berger et al.
[6]. However, in the Barab´asi-Albert model, Bollob´as et al.
have shown the convergence (7) by direct Hoeffding-Azuma
bounding arguments [11], thereby implying (30) (as well as
(29) trivially by bounded convergence).
6 CONVERGENCE IN TOTAL VARIATION DISTANCE
The weak convergence of N-valued rvs is equivalent to
convergence in the total variation distance of their corre-
sponding pmfs (on N); this is a well-known consequence
of Scheff´e's Theorem [7, App. II, p. 224] when applied to
discrete rvs. Here we show an analogous equivalence when
the convergence in probability (16) holds for all d = 0, 1, . . .:
If µ = (µ(x), x = 0, 1, . . .) and ν = (ν(x), x = 0, 1, . . .)
are two pmfs on N, the total variation distance between them
is given by
dTV(µ, ν) =
1
2
µ(x) − ν(x) .
∞(cid:88)
x=0
∞(cid:88)
∞(cid:88)
This quantity can alternatively be expressed as
dTV(µ, ν) =
(µ(x) − ν(x))+ =
(ν(x) − µ(x))+ .
x=0
x=0
Proposition 6.1. Under Assumptions 1-3, we have
dTV (P n, p) P−→n 0
(31)
where the pmf p = (p(d), d = 0, 1, . . .) is the pmf postulated
in Assumption 2.
x∈V
(cid:88)
E(cid:104)
Proof. Pick V ⊆ N0 arbitrary with V < ∞. Using the
alternate representation above, we get
(p(x) − Pn(x))+(cid:105)
E [dTV (P n, p)] ≤ (cid:88)
each x = 0, 1, . . ., whence limn→∞ E(cid:104)
E [dTV (P n, p)] ≤ (cid:88)
by bounded convergence. It follows that
for each n = 1, 2, . . .. Let n go to infinity in this last
inequality. By Proposition 4.2 we have Pn(x) P−→n p(x) for
= 0
(p(x) − Pn(x))+(cid:105)
p(x).
p(x)
+
x /∈V
lim sup
n→∞
x /∈V
The set V being an arbitrary finite subset of N and
p being a pmf on N (hence tight), we readily obtain
limn→∞ E [dTV (P n, p)] = 0, and the desired conclusion
(31) follows by Markov's inequality.
6
Gn ≡ G(n; αn), n = 2, 3, . . .
because all nodes have the same degree distribution, namely
that of the rv Dn,1(α).
We construct the collection {Gn, n = 2, 3, . . .} by setting
(33)
for some scaling α : N0 → A, in which case Dn,k =
Dn,k(αn) for each k in Vn -- Scalings are sequences which
we view as mappings defined on N0; the mapping itself is
denoted by the same symbol used for the generic element
of the sequence.
The scaling α : N0 → A appearing in (33) is the (usually
unique) scaling which ensures the convergence
Dn,1(αn) =⇒n D
(34)
for some non-degenerate N-valued rv D; this scaling is often
the critical scaling associated with the emergence of a max-
imal component. Under these circumstances, Assumptions
1 and 2 are automatically satisfied, and only Assumption 3
needs to be verified.
∼ c
n ∼ c
n [10], [18], [22];
The setting outlined above applies to a number of ex-
amples routinely discussed in the literature: Here for each
n = 1, 2, . . ., we take Vn = {1, . . . , n}. With c > 0,
1) Erdos-R´enyi graphs G(n; p) (0 ≤ p ≤ 1) with scaling
2) Geometric random graphs G(n; ρ) on a unit square (ρ >
n [37];
3) Random key graphs K(n; K, P ) (K < P in N0) with
p : N0 → [0, 1] such that pn ∼ c
0) with scaling ρ : N0 → R+ such that πρ2
and
scalings K, P : N0 → N0 such that K2
Assumption 1 is readily satisfied in these homogeneous
situations. In each case, Poisson convergence can be invoked
to validate Assumption 2 with the rv D in (34) being
a Poisson rv with parameter c. In all cases, the stronger
Assumption 4 is established, thereby implying Assumption
3. While it is elementary to do so for Erdos-R´enyi graphs, the
calculations become increasingly tedious as we move from
geometric random graphs to random key graphs; see [35] for
details. Finally, despite an abundance of situations where
Assumptions 1-3 are satisfied (beyond the ones discussed
above), it is nevertheless possible to find homogeneous
random networks in the sense of Assumption 1 where (14)
occurs but where the convergence (16) fails. This is taken on
in the remainder of the paper starting with the next section.
n [41].
n
Pn
7 A COMMONLY ENCOUNTERED SETTING
In many situations of interest the sequence of random
graphs {Gn, n = 1, 2, . . .} arises in the following natural
manner: Given is an underlying parametric family of random
graphs, say
{G(n; α), n = 2, 3, . . .}, α ∈ A ⊆ Rr
(32)
where A is some parameter set and r is a positive integer.
With α in A, for each n = 2, 3, . . ., the random graph
G(n; α) is a random graph on Vn whose statistics depend
on the parameter α. For each k in Vn, let Dn,k(α) denote the
degree of node k in G(n; α); it is often the case that the rvs
{Dn,k(α), k ∈ Vn} constitute an exchangeable family, as we
assume thereafter in this section. Thus, there is no ambiguity
when speaking of the (nodal) degree distribution in G(n; α)
8 A COUNTEREXAMPLE
8.1 Random threshold graphs
The setting is that of [13], [23], [29], [39]: Let {ξ, ξk, k =
1, 2, . . .} denote a collection of i.i.d. R+-valued rvs de-
fined on the probability triple (Ω,F, P), each distributed
according to a given (probability) distribution function
F : R → [0, 1] with F (x) = 0 for x ≤ 0. With ξ acting
as a generic representative for this sequence of i.i.d. rvs, we
have
P [ξ ≤ x] = F (x), x ∈ R.
Once F is specified, random thresholds graphs are char-
acterized by two parameters, namely a positive integer n
and a threshold value θ > 0: The network comprises n
nodes, labelled k = 1, . . . , n, and to each node k we assign a
fitness variable (or weight) ξk which measures its importance
or rank. For distinct k, (cid:96) = 1, . . . , n, the nodes k and (cid:96) are
declared to be adjacent if
ξk + ξ(cid:96) > θ,
(35)
and a bidirectional edge exists between nodes k and (cid:96). The
adjacency notion (35) defines the random threshold graph
T(n; θ) on the set of vertices Vn = {1, . . . , n}. The degree
Dn,k(θ) of node k in T(n; θ) is clearly given by
Dn,k(θ) =
1 [ξk + ξ(cid:96) > θ] ,
k = 1, . . . , n.
n(cid:88)
(cid:96)=1, (cid:96)(cid:54)=k
the
Under
Dn,1(θ), . . . , Dn,n(θ)
tributed.
enforced
are
assumptions,
exchangeable,
the
rvs
equidis-
thus
8.2 Applying Proposition 4.2 under exponential fitness
From now on we focus on the special case when ξ is
exponentially distributed with parameter λ > 0, written
ξ ∼ Exp(λ), that is
P [ξ ≤ x] = 1 − e−λx+
, x ∈ R
(36)
where we have used the standard notation x+ = max(x, 0).
While other distributions could be considered to develop
counterexamples to Proposition 4.2, the exponential distri-
bution was selected for two main reasons: This situation was
considered in the references [13], [23], [39] in making the
case that scale-free networks can be generated through the
fitness-based mechanism used in random threshold graphs;
more on that later. Moreover, calculations are greatly sim-
plified in the exponential case.
With random threshold graphs as the underlying family
(32), the definition (33) here takes the form
Gn = T(n; θ(cid:63)
n), n = 2, 3, . . .
with scaling θ(cid:63) : N0 → [0,∞) given by
n = λ−1 log n, n = 2, 3, . . . .
θ(cid:63)
(37)
(38)
We are in the setting of Section 7. Having in mind to
apply Proposition 4.2 to the random graphs {Gn, n =
1, 2, . . .}, we recover the notation of Section 2 by setting
Dn,k = Dn,k(θ(cid:63)
n),
k = 1, . . . , n
n = 2, 3, . . .
Assumption 1 is obviously satisfied in light of the afore-
mentioned exchangeability. It was shown by Fujihara et
al. [23, Example 1, p. 366] that Dn,1 =⇒n D where the
N-valued rv D is a conditionally Poisson rv with pmf
pFuj = (pFuj(d), d = 0, 1, . . .) given by
(cid:34)
(cid:35)
7
8.3 Assumption 3 fails
The remainder of the paper is devoted to showing the
following convergence result.
Proposition 8.1. Assume ξ ∼ Exp(λ) for some λ > 0. For
each d = 0, 1, . . ., the limit
C(d) ≡ lim
n) = d] , 1 [Dn,2(θ(cid:63)
n) = d]] (41)
n→∞ Cov [1 [Dn,1(θ(cid:63)
exists and C(d) > 0.
Proposition 8.1 is established from Section 10 to Section
12 where expressions are given for the limits (41): For
instance, we show at (70) that
C(0) = E(cid:104)
e− max(eλξ1 ,eλξ2 )(cid:105) − E(cid:104)
e−(eλξ1 +eλξ2 )(cid:105)
> 0.
The expression (74) of the limit C(d) for d (cid:54)= 0 is rather
cumbersome and is omitted at this point. However, the
fact that C(d) > 0 on the entire range suffices to establish
the desired counterexample by virtue of the observation
following Proposition 4.3.
Proposition 8.2. Assume ξ ∼ Exp(λ) for some λ > 0. For
each d = 0, 1, . . ., the sequence of rvs
(cid:41)
1 [Dn,k(θ(cid:63)
n) = d] , n = 2, 3, . . .
(42)
does not converge in probability to any constant.
In fact, for each d = 0, 1, . . ., there exists a non-
degenerate [0, 1]-valued rv Π(d) with E [Π(d)] = pFuj(d)
and Var [Π(d)] > 0 such that
(cid:40)
n(cid:88)
k=1
1
n
n(cid:88)
k=1
1
n
1 [Dn,k(θ(cid:63)
n) = d] =⇒n Π(d).
Details are available in [35].
The failure of the convergence (16) in the context of
random threshold graphs with exponentially distributed
fitness is noteworthy for the following reason: Caldarelli
et al. [13], [39] have proposed this class of random graph
models as an alternative scale-free model to the preferential
attachment model of Barab´asi and Albert [3]. The basis for
their proposal was the provable power-law behavior
pFuj(d) ∼ d−2
(d → ∞).
(43)
See Fujihara et al. [23, Example 1, p. 366] for details. How-
ever, a meaningful comparison between the two models
would have required at minimum the validity of the con-
vergence
1 [Dn,k(θ(cid:63)
n) = d] P−→n pFuj(d),
d = 0, 1, . . .
By Proposition 8.2 this last convergence fails to happen, and
the two models cannot be meaningfully compared since for
the Barab´asi-Albert model it only holds that
n(cid:88)
k=1
1
n
n(cid:88)
k=1
pFuj(d) = P [D = d] = E
(eλξ)d
d!
e−eλξ
,
d = 0, 1, . . . (39)
1
n
1 [Dn,k(θ(cid:63)
n) = d] P−→n pBA(d),
d = 0, 1, . . .
Therefore, Assumption 2 holds with
P [Dn,1 = d] = pFuj(d),
lim
n→∞
d = 0, 1, . . .
(40)
with pBA(d) ∼ d−3 (d → ∞) [11]. Although the Barab´asi-
Albert model has attracted much attention as a network
model, its tree-like structure does not make it a particularly
good fit for the empirical data coming from large real-life
networks. Similar comments apply to the class of random
threshold graph models due to a propensity to produce star-
like structures.
9 SIMULATION RESULTS
Through a limited set of simulation experiments, we now
demonstrate the failure of the convergence (16) established
for random threshold graphs in Proposition 8.2. Through-
out, the fitness variable ξ is taken to be exponentially
distributed with parameter λ = 1, and the threshold is
scaled in accordance to (38), namely θ(cid:63)
n = log n for each
n = 2, 3, . . ..
The number n of nodes being given, we gen-
erate R mutually independent
the
random threshold graph T(n; θ(cid:63)
n);
they are denoted
T(1)(n; θ(cid:63)
n), . . . , T(n)(n; θ(cid:63)
n),
respectively. For
each k = 1, 2, . . . , n and r = 1, 2, . . . , R, let D(r)
n,k(θ(cid:63)
n) denote
the degree of node k in the random graph T(r)(n; θ(cid:63)
n).
n), T(2)(n; θ(cid:63)
realizations of
8
(cid:105)
(cid:104)
n(cid:88)
k=1
through a single network realization. We do so by plotting
the histograms
N (r)
n (d; θ(cid:63)
n)
n
=
1
n
1
D(r)
n,k(θ(cid:63)
n) = d
,
d = 0, 1, . . .
r = 1, . . . , R
(44)
for various values of d and r, and large n, and compar-
ing against the corresponding value for the limiting nodal
distribution pFuj(d) given in (39). Using this expression we
numerically evaluate pFuj(d) as
(cid:90) ∞
0
pFuj(d) =
1
d!
e−ex
e−xdx
edx
d!
n
n (.;θ(cid:63)
n)
for each d = 0, 1, . . .. In Figure 1 we plot the histogram
N (r)
for different runs r = 1, 2, . . . , R and varying
graph sizes n = 10000, 30000. Observe the high variability
with respect to the nodal degree distribution pFuj which
does not change as the graph size is increased.
We smooth out the variability observed in Figure 1 by
averaging the empirical degree distributions (44) over the
n), . . . , T(R)(n; θ(cid:63)
R i.i.d. realizations T(1)(n; θ(cid:63)
n).
This results in the statistic
N (r)
n), T(2)(n; θ(cid:63)
R(cid:88)
n (d; θ(cid:63)
n)
, d = 0, 1, . . . .
(45)
Fix d = 0, 1, . . .. The Strong Law of Large Numbers yields
(cid:20) Nn(d; θ(cid:63)
n)
(cid:21)
n
a.s.
(46)
= P [Dn,1(θ(cid:63)
n) = d]
by exchangeability. On the other hand, by virtue of (40) we
have limn→∞ P [Dn,1(θ(cid:63)
n) = d] = pFuj(d). Combining these
observations yields the approximation
lim
R→∞
1
R
with
1
R
r=1
n
N (r)
R(cid:88)
(cid:20) Nn(d; θ(cid:63)
r=1
n
E
n)
(cid:21)
n
n (d; θ(cid:63)
n)
= E
R(cid:88)
N (r)
n (d; θ(cid:63)
n)
r=1
n
(a) n = 10000, R = 100
1
R
=Approx pFuj(d)
(47)
for large n and R. The goodness of the approximation (47) is
noted in Figure 1, where the empirical distribution averaged
over R = 100 runs is observed to be very close to the
nodal degree distribution. However, the accuracy of the
approximation (47) does in no way imply the validity of
(16). In fact the mistaken belief that (16) holds, implicitly
assumed in the papers [13], [39], might have stemmed from
using the smoothed estimate (47).
10 PREPARING THE PROOF OF PROPOSITION 8.1
For every n = 2, 3, . . . and θ > 0, the decomposition
Dn,j(θ) = 1 [ξ1 + ξ2 > θ] + D(cid:63)
n,j(θ),
j = 1, 2
(48)
holds where we have set
D(cid:63)
n,j(θ) =
n(cid:88)
1 [ξj + ξk > θ] .
Fix d = 0, 1, . . .. It is a simple matter to check that
k=3
(cid:12)(cid:12)P [Dn,j(θ) = d] − P(cid:2)D(cid:63)
n,j(θ) = d(cid:3)(cid:12)(cid:12)
(b) n = 30000, R = 100
Fig. 1
We explore the behavior of the empirical degree dis-
tribution along the scaling (38) (with λ = 1) as generated
≤ 2P [ξ1 + ξ2 > θ] ,
j = 1, 2
and (cid:12)(cid:12)P [Dn,j(θ) = d, j = 1, 2] − P(cid:2)D(cid:63)
n,j(θ) = d, j = 1, 2(cid:3)(cid:12)(cid:12)
(49)
≤ 2P [ξ1 + ξ2 > θ] .
(50)
and
Next we consider the case d = 1, 2, . . .. Under the
enforced independence assumptions we have
(cid:96)=1
(cid:3)
(cid:35)
= P [ξ1 + η(cid:96) ≤ θ, (cid:96) = 1, . . . , n − 2]
n,1(θ) = 0, D(cid:63)
(cid:34)n−2(cid:88)
P(cid:2)D(cid:63)
= P
= P [ξ1 + η(cid:96) ≤ θ, ξ2 + η(cid:96) ≤ θ, (cid:96) = 1, . . . , n − 2]
= P(cid:2)ξ1 + ηn−21 ≤ θ(cid:3)
= P(cid:2)ηn−21 − θ ≤ −ξ1
n,2(θ) = 0(cid:3)
1(cid:2)ξj + ηn−2(cid:96) > θ(cid:3) = 0, j = 1, 2
= P(cid:2)ξ1 + ηn−21 ≤ θ, ξ2 + ηn−21 ≤ θ(cid:3)
= P(cid:2)ηn−21 − θ ≤ − max (ξ1, ξ2)(cid:3) .
n,1(θ) = d(cid:3)
P(cid:2)D(cid:63)
(cid:34)n−2(cid:88)
(cid:35)
1(cid:2)ξ1 + ηn−2(cid:96) > θ(cid:3) = d
(cid:3)
= P(cid:2)ξ1 + ηn−2d+1 ≤ θ < ξ1 + ηn−2d
(cid:3)
= P(cid:2)θ − ηn−2d < ξ1 ≤ θ − ηn−2d+1
= E(cid:104)
e−λ(θ−ηn−2d)+ − e−λ(θ−ηn−2d+1)+(cid:105)
P(cid:2)D(cid:63)
n,2(θ) = d(cid:3)
(cid:34)n−2(cid:88)
(cid:35)
1(cid:2)ξj + ηn−2(cid:96) > θ(cid:3) = 0, j = 1, 2
= P(cid:2)ξj + ηn−2d+1 ≤ θ < ξj + ηn−2d, j = 1, 2(cid:3)
= P(cid:2)θ − ηn−2d < ξj ≤ θ − ηn−2d+1, j = 1, 2(cid:3)
(cid:20)(cid:16)
e−λ(θ−ηn−2d)+ − e−λ(θ−ηn−2d+1)+(cid:17)2(cid:21)
n,1(θ) = d, D(cid:63)
= E
= P
= P
(cid:96)=1
(cid:96)=1
.
9
(54)
(55)
(56)
(57)
and
In the next step, carried out in Section 12, we replace θ
by θ(cid:63)
n in the expressions above, and let n go to infinity in
the resulting expressions. To evaluate these limits we shall
rely on asymptotic properties of the order statistics which
are discussed next.
(cid:33)
(cid:32) s−1(cid:88)
11 ASYMPTOTIC RESULTS FOR ORDER STATISTICS
We begin with a one-dimensional result. For each s =
1, 2, . . ., consider the mapping Gs : R → R+ defined by
e−mxs
m!
Gs(xs) ≡
(58)
where G : R → R+ denotes the well-known Gumbel
distribution given by
m=0
G(xs), xs ∈ R
G(x) = e−e−x
, x ∈ R.
(59)
The next result is well known [28, Thm. 2.2.1, p. 33], and
takes the following form when applied to exponential dis-
tributions.
Lemma 11.1. For each s = 1, 2, . . ., it holds that
(cid:1) ≤ xs
(cid:3) = Gs(xs), xs ∈ R
P(cid:2)λ(cid:0)ηps − θ(cid:63)
p
(60)
lim
p→∞
where the scaling θ(cid:63) : N0 → R is given by (38).
P(cid:2)D(cid:63)
n,1(θ(cid:63)
Next,
for each n = 2, 3, . . . we substitute θ by
θ(cid:63)
n in the bound (50) and let n go to infinity in
n = ∞, we
the resulting inequality. Since limn→∞ θ(cid:63)
n) = d] −
conclude that
n) = d, Dn,2(θ(cid:63)
limn→∞(cid:12)(cid:12)P [Dn,1(θ(cid:63)
n) = d(cid:3)(cid:12)(cid:12) = 0, whence
P(cid:2)D(cid:63)
n,2(θ(cid:63)
P [Dn,1(θ(cid:63)
n,1(θ(cid:63)
n) = d, Dn,2(θ(cid:63)
n,2(θ(cid:63)
n) = d, D(cid:63)
n) = d, D(cid:63)
lim
n→∞
= lim
n→∞
(51)
provided either limit exists. The same argument applied to
the bounds (49) readily yields
n) = d]
n) = d(cid:3)
n) = d(cid:3)
n,j(θ(cid:63)
j = 1, 2
P(cid:2)D(cid:63)
lim
n→∞
P [Dn,j(θ(cid:63)
n) = d] = lim
n→∞
= pFuj(d),
(52)
in light of (40). It then follows from (51) and (52) that
C(d)
n→∞ Cov(cid:2)1(cid:2)D(cid:63)
= lim
n) = d(cid:3) , 1(cid:2)D(cid:63)
n,1(θ(cid:63)
n) = d(cid:3)(cid:3)
(53)
n,2(θ(cid:63)
provided either limit at (51) exists.
As we now turn to evaluating (53), it will be notation-
ally convenient to introduce a second collection of R+-
valued rvs {η(cid:96), (cid:96) = 1, 2, . . .}. We assume that the rvs
{η(cid:96), (cid:96) = 1, 2, . . .} are also i.i.d. rvs, each of which is
exponentially distributed with parameter λ > 0. The two
collections {ξ, ξk, k = 1, 2, . . .} and {η(cid:96), (cid:96) = 1, 2, . . .}
are assumed to be mutually independent. For each integer
p = 2, 3, . . ., let ηp1, . . . , ηpp denote the values of the
rvs η1, . . . , ηp arranged in decreasing order, namely ηpp ≤
. . . ≤ ηp1, with a lexicographic tiebreaker when needed.
The rvs ηp1, . . . , ηpp are the order statistics associated with
the collection η1, . . . , ηp, so that for each s = 1, . . . , p, the
rv ηps denotes the sth largest value amongst η1, . . . , ηp; in
particular ηp1 and ηpp are the maximum and minimum of
the rvs η1, . . . , ηp, respectively [17], [21].
The evaluation of the limiting covariances (53) proceeds
with the following observation: Fix d = 0, 1, . . . and take
n = 3, 4, . . . such that d ≤ n − 2. Under the enforced i.i.d.
assumptions, for each θ > 0 we get
(cid:0)D(cid:63)
n,1(θ), D(cid:63)
n,2(θ)(cid:1)
(cid:32) n(cid:88)
(cid:32)n−2(cid:88)
(cid:32)n−2(cid:88)
1 [ξ1 + ξk > θ] ,
n(cid:88)
n−2(cid:88)
1(cid:2)ξ1 + ηn−2(cid:96) > θ(cid:3) ,
1 [ξ1 + η(cid:96) > θ] ,
k=3
k=3
(cid:96)=1
(cid:96)=1
(cid:96)=1
=
=st
=
First, with d = 0 we find
P(cid:2)D(cid:63)
n,1(θ) = 0(cid:3) = P
(cid:34)n−2(cid:88)
(cid:96)=1
(cid:33)
(cid:33)
1 [ξ2 + ξk > θ]
(cid:96)=1
n−2(cid:88)
1 [ξ2 + η(cid:96) > θ]
1(cid:2)ξ2 + ηn−2(cid:96) > θ(cid:3)(cid:33)
(cid:35)
1(cid:2)ξ1 + ηn−2(cid:96) > θ(cid:3) = 0
where =st denotes distributional equality between rvs. Two
different cases arise:
With s = 1, Lemma 11.1 expresses the well-known
membership of exponential distributions in the maximal
domain of attraction of the Gumbel distribution [21] [28,
Example 1.7.2, p. 21].
We now turn to the two-dimensional result we need: For
each s = 1, 2, . . ., define the mapping Js : R2 → R+ given
by
(. . .) × e−ksxs
ks!
· e−e
− min(xs ,xs+1)
(61)
Js(xs+1, xs) ≡ s−1(cid:88)
(cid:16)
s(cid:88)
ks=0
. . . =
with
ks+1=ks
(cid:17)ks+1−ks
e− min(xs,xs+1) − e−xs
(ks+1 − ks)!
(62)
and
as xs and xs+1 range over R. In these expressions we use
the convention 00 = 1.
Lemma 11.2. For each s = 1, 2, . . ., we have
P(cid:2)λ(ηps+1 − θ(cid:63)
lim
p→∞
p) ≤ xs+1, λ(ηps − θ(cid:63)
p) ≤ xs
= Js(xs+1, xs), xs+1, xs ∈ R
(63)
with mapping Js : R2 → R+ given by (61)-(62), and scaling
θ(cid:63) : N0 → R given by (38).
(cid:3)
This result is a consequence of Theorem 2.3.1 in [28, p.
34]. As only the case s = 1 was discussed in [28, Thm 2.3.2,
p. 34], we provide in Section 13 a proof for arbitrary values
of s when the variates {ηk, k = 1, 2, . . .} are exponentially
distributed. By inspection we note from (61)-(62) that
and
10
12 COMPLETING THE PROOF OF PROPOSITION
8.1
We return to the expressions obtained in Section 10: With
d = 0, 1, . . . held fixed, for each n = 2, 3, . . . we substitute θ
by θ(cid:63)
n in these expressions according to (38), and let n go to
infinity in the resulting expressions.
12.1 The case d = 0
For each n = 3, 4, . . ., with the aforementioned substitution,
we rewrite (54) and (55) as
n,1(θ(cid:63)
P(cid:2)D(cid:63)
P(cid:2)D(cid:63)
= P(cid:2)λ(ηn−21 − θ(cid:63)
n) = 0(cid:3) = P(cid:2)λ(ηn−21 − θ(cid:63)
n) = 0(cid:3)
n) ≤ −λ max(ξ1, ξ2)(cid:3)
n) = 0, D(cid:63)
n) ≤ −λξ1
n,1(θ(cid:63)
n,2(θ(cid:63)
(cid:3)
where by construction the rv ηn−21 is independent of the
i.i.d. rvs ξ1 and ξ2.
n−2
lim
n→∞
Let Λ1 denote a rv which is distributed according to the
Gumbel distribution (59), and which is independent of the
i.i.d. rvs ξ1 and ξ2. By Lemma 11.1 (for s = 1 and p = n− 2),
since limn→∞(cid:0)θ(cid:63)
n,1(θ(cid:63)
n,2(θ(cid:63)
n,1(θ(cid:63)
n − θ(cid:63)
n) = 0, D(cid:63)
pFuj(0) = lim
n→∞
n) = 0(cid:3)
= P [Λ1 ≤ −λξ1] = E(cid:104)
n) = 0(cid:3)
P(cid:2)D(cid:63)
= P [Λ1 ≤ −λ max(ξ1, ξ2)] = E(cid:104)
n→∞ Cov(cid:2)1(cid:2)D(cid:63)
n) = 0(cid:3) , 1(cid:2)D(cid:63)
= E(cid:104)
e−eλ max(ξ1 ,ξ2)(cid:105) − E(cid:104)
n→∞ Cov(cid:2)1(cid:2)D(cid:63)
= E(cid:104)
e−eλ max(ξ1,ξ2)(cid:105) − E(cid:104)
(cid:1) = 0, it is now plain that
P(cid:2)D(cid:63)
e−eλξ1(cid:105)
e−eλ max(ξ1 ,ξ2)(cid:105)
n) = 0(cid:3)(cid:3)
e−eλξ2(cid:105)
n) = 0(cid:3)(cid:3)
e−eλξ2(cid:105)
e−eλξ1(cid:105) E(cid:104)
n) = 0(cid:3) , 1(cid:2)D(cid:63)
e−eλξ1(cid:105) E(cid:104)
n,2(θ(cid:63)
n,1(θ(cid:63)
n,2(θ(cid:63)
under the independence assumptions. Collecting these facts,
we find
As we make use of the reduction step (53) discussed in
Section 10. It follows that
C(0) = lim
n,1(θ(cid:63)
(69)
lim
.
> 0
(70)
since max(eλξ1 , eλξ2 ) < eλξ1 + eλξ2.
12.2 The case d = 1, 2, . . .
Pick n = 3, 4, . . . such that d < n − 2. Under the aforemen-
tioned substitution, we can rewrite (56) and (57) as
n) = d(cid:3)
n,1(θ(cid:63)
P(cid:2)D(cid:63)
= E(cid:104)
P(cid:2)D(cid:63)
n,1(θ(cid:63)
n) = d, D(cid:63)
n,2(θ(cid:63)
n) = d(cid:3)
e−λ(θ(cid:63)
n−ηn−2d)+ − e−λ(θ(cid:63)
n−ηn−2d+1)+(cid:105)
(71)
Js(xs+1, xs) = Gs(xs),
xs ≤ xs+1
xs, xs+1 ∈ R
Js(∞, xs) = lim
xs+1→∞ Js(xs+1, xs)
= Gs(xs), xs ∈ R
so that
while
Js(xs+1,∞) = lim
xs→∞ Js(xs+1, xs)
= Gs+1(xs+1), xs+1 ∈ R.
(64)
(65)
(66)
This confirms that the probability distributions Gs+1 and
Gs are the one-dimensional marginal distributions of Js (as
expected).
For use in Section 12 we find it convenient to give
Lemma 11.1 and Lemma 11.2 the following probabilistic
(and more compact) formulation: For any given s = 1, 2, . . .,
there exists a pair of R-valued rvs Λs+1 and Λs defined on
(Ω,F, P) such that
λ(cid:0)ηps+j − θ(cid:63)
p
(cid:1) =⇒p Λs+j,
j = 0, 1
and(cid:0)λ(cid:0)ηps+1 − θ(cid:63)
p
(cid:1) , λ(cid:0)ηps − θ(cid:63)
p
(cid:1)(cid:1) =⇒p (Λs+1, Λs)
(67)
(68)
with (Λs+1, Λs) jointly distributed according to Js, and the
R-valued rvs Λs+1 and Λs distributed according to Gs+1
and Gs, respectively.
and
(cid:20)(cid:16)
= E
e−λ(θ(cid:63)
n−ηn−2d)+ − e−λ(θ(cid:63)
n−ηn−2d+1)+(cid:17)2(cid:21)
.(72)
given in [28, Section 2.2, p. 33]; see also [28, Theorem 2.3.2,
p. 36] for the case s = 1. Throughout we shall write
11
Applying Lemma 11.1 and Lemma 11.2 (for s = d and
p = n − 2) we conclude that
(cid:1)(cid:1) =⇒n (Λd+1, Λd)
(cid:0)λ(cid:0)ηn−2d+1 − θ(cid:63)
in the notation used at (68). Because limn→∞(cid:0)θ(cid:63)
(cid:1) =
(cid:1)+(cid:17)
(cid:16)
λ(cid:0)θ(cid:63)
(cid:1) , λ(cid:0)ηn−2d − θ(cid:63)
(cid:1)+ , λ(cid:0)θ(cid:63)
0, we obtain
n − θ(cid:63)
n − ηn−2d
n−2
n−2
n−2
n − ηn−2d+1
=⇒n ((−Λd+1)+, (−Λd)+)
by the Continuous Mapping Theorem for weak conver-
gence, whence
e−λ(θ(cid:63)
n−ηn−2d)+ − e−λ(θ(cid:63)
=⇒n e−(−Λd)+ − e−(−Λd+1)+
n−ηn−2d+1)+
(73)
lim
n→∞
e−λ(θ(cid:63)
by applying the Continuous Mapping Theorem once more.
Let n go to infinity in (71) and (72): The Bounded
Convergence Theorem yields
for each a = 1, 2 upon observing the obvious bounds
n−ηn−2d)+ − e−λ(θ(cid:63)
n−ηn−2d)+ − e−λ(θ(cid:63)
n−ηn−2d+1)+(cid:17)a(cid:105)
e−(−Λd)+ − e−(−Λd+1)+(cid:17)a(cid:105)
E(cid:104)(cid:16)
= E(cid:104)(cid:16)
(cid:12)(cid:12)(cid:12)e−λ(θ(cid:63)
n−ηn−2d+1)+(cid:12)(cid:12)(cid:12) ≤ 1, n = 3, 4, . . .
n) = d(cid:3) , 1(cid:2)D(cid:63)
n→∞ Cov(cid:2)1(cid:2)D(cid:63)
(cid:20)(cid:16)
e−(−Λd)+ − e−(−Λd+1)+(cid:17)2(cid:21)
−(cid:16)E(cid:104)
e−(−Λd)+ − e−(−Λd+1)+(cid:105)(cid:17)2
n→∞ Cov(cid:2)1(cid:2)D(cid:63)
n) = d(cid:3) , 1(cid:2)D(cid:63)
e−(−Λd)+ − e−(−Λd+1)+(cid:105)
(cid:104)
n) = d(cid:3)(cid:3)
and the reduction step (53) leads to
n) = d(cid:3)(cid:3)
It follows that
C(d) = lim
= E
n,2(θ(cid:63)
n,1(θ(cid:63)
n,1(θ(cid:63)
n,2(θ(cid:63)
= Var
lim
.
(74)
Note that C(d) > 0 as the variance of the non-degenerate
rv e−(−Λd)+ − e−(−Λd+1)+.
13 A PROOF OF LEMMA 11.2
First some preliminaries. Fix p = 1, 2, . . . and u ≥ 0. The rv
Sp(u) given by
p(cid:88)
up(x) = λ−1 (log p + x)+ , x ∈ R.
(76)
Fix s = 1, 2, . . ., and pick xs and xs+1 in R. Two cases
(i) If xs ≤ xs+1 in R, then for each p = s + 1, s + 2, . . ., it
are possible:
holds that up(xs) ≤ up(xs+1), whence
P(cid:2)ηps+1 ≤ up(xs+1), ηps ≤ up(xs)(cid:3)
= P(cid:2)ηps+1 ≤ up(xs), ηps ≤ up(xs)(cid:3)
= P(cid:2)ηps ≤ up(xs)(cid:3)
P(cid:2)λ(ηps+1 − θ(cid:63)
P(cid:2)λ(ηps − θ(cid:63)
since ηps+1 ≤ ηps. From Lemma 11.1 it follows that
p) ≤ xs+1, λ(ηps − θ(cid:63)
p) ≤ xs
p) ≤ xs
lim
p→∞
= lim
p→∞
(cid:3)
(cid:3)
= Gs(xs)
and (63) holds as seen through (64).
(ii) If xs+1 ≤ xs in R, then for each p = s + 1, s + 2, . . .,
the equivalence (75) yields
P(cid:2)ηps+1 ≤ up(xs+1), ηps ≤ up(xs)(cid:3)
= P [Sp(up(xs+1)) < s + 1, Sp(up(xs)) < s]
s(cid:88)
(cid:32)
s(cid:88)
s−1(cid:88)
s−1(cid:88)
ks=0
ks+1=0
P
Sp(up(xs+1)) = ks+1
(cid:80)p
(cid:80)p
P
=
=
Sp(up(xs)) = ks
(cid:96)=1 1 [ξ(cid:96) > up(xs+1)] = ks+1
(77)
(78)
ks=0
ks+1=ks
(cid:96)=1 1 [ξ(cid:96) > up(xs)] = ks
upon noting the fact Sp(up(xs)) ≤ Sp(up(xs+1)) since
up(xs+1) ≤ up(xs). For arbitrary ks, ks+1 = 0, 1, . . . with
ks ≤ ks+1, standard counting arguments give
P
(cid:96)=1 1 [ξ(cid:96) > up(xs)] = ks
(cid:96)=1 1 [ξ(cid:96) > up(xs+1)] = ks+1
(cid:80)p
(cid:80)p
(cid:32)
(cid:33)
e−λksup(xs)(cid:16)
e−λup(xs+1) − e−λup(xs)(cid:17)ks+1−ks
(cid:32)
(cid:33)(cid:16)
1 − e−λup(xs+1)(cid:17)p−ks+1
p − ks
ks+1 − ks
· p! · p−ks+1
(cid:18)
(p − ks+1)!
×(cid:0)e−xs+1 − e−xs(cid:1)ks+1−ks ·
· e−ksxs
1 − e−xs+1
(cid:19)p−ks+1
ks!(ks+1 − ks)!
p
ks
×
1
=
=
(79)
p
where the last step holds whenever p is large enough so that
log p + xs > 0 and log p + xs+1 > 0.
Let p go to infinity in (78): From (79) the limit of each
(cid:96)=1 1 [ξ(cid:96) > up(xs+1)] = ks+1
(cid:80)p
(cid:80)p
· (e−xs+1 − e−xs)ks+1−ks
(cid:96)=1 1 [ξ(cid:96) > up(xs)] = ks
(ks+1 − ks)!
e−ksxs
ks!
· e−e
−xs+1
Sp(u) =
1 [ξ(cid:96) > u]
term in (78) is given by
(cid:96)=1
counts the number of exceedances of level u by the rvs
ξ1, . . . , ξp. The proof of Lemma 11.2 relies on the well-
known equivalence
ηps ≤ u if and only if Sp(u) < s,
s = 0, 1, . . . , p (75)
P
lim
p→∞
=
for ks ≤ ks+1 in N, as we note that
= 1
lim
p→∞
(cid:18)
p!
(p − ks+1)! · pks+1
(cid:19)p−ks+1
1 − e−xs+1
p
= e−e
−xs+1 .
and
lim
p→∞
The convergence (63) follows upon using the equivalence
(77)
together with the observation that up(xs) =
λ−1 (log p + xs) and up(xs+1) = λ−1 (log p + xs+1)
for p sufficiently large.
ACKNOWLEDGMENT
The authors thank the anonymous referee from the first
round of reviews for pointing out reference [28] which
lead to a much shorter proof of Proposition 8.1, and for
additional comments which greatly improved the presen-
tation of the paper. They also would like to thank another
anonymous referee which indicated the possibility of ex-
tending the original results to a more general setting without
homogeneity assumptions as was done in Section 5.
REFERENCES
[1] R. Albert and A.L. Barab´asi, "Statistical mechanics of complex
systems," Review of Modern Physics 74 (2002), pp. 47-97.
[2] D. Aldous and J.M. Steele, "The Objective Method: Probabilistic
Combinatorial Optimization and Local Weak Convergence," Proba-
bility on Discrete Structures pp. 1-72
[3] A.L. Barab´asi and R. Albert, "Emergence of scaling in random
networks," Science 286 (1999), pp. 509-512.
[4] A. Barrat, M. Barth´elemy and A. Vespignani, Dynamical Processes
on Complex Networks, Cambridge University Press, Cambridge
(U.K.), 2008.
[5] I. Benjamini and O. Schramm, "Recurrence of distributional limits
of finite planar graphs," Electronic Journal of Probability 6 (2001),
pp. 1-13.
[6] N. Berger, C. Borgs, J.T. Chayes and A. Saberi, "Asymptotic behav-
ior and distributional limits of preferential attachment graphs," The
Annals of Probability 42 (20140, pp. 1-40.
[7] P. Billingsley, Convergence of Probability Measures, John Wiley &
Sons, New York (NY), 1968.
[8] E.A. Bender and E.R. Caulfield, "The asymptotic number of labelled
graphs with given degree sequence," Journal of Combinatorial
Theory (A) 24 (1978), pp. 296-307.
[9] B. Bollob´as, "A probabilistic proof of an asymptotic formula for the
number of labelled regular graphs," European Journal of Combina-
torics 1 (1980), pp. 311-316.
[10] B. Bollob´as, Random Graphs, Second Edition, Cambridge Stud-
ies in Advanced Mathematics, Cambridge University Press, Cam-
bridge (UK), 2001.
[11] B. Bollob´as, O. Riordan, J. Spencer and G. Tusn´ady, "The degree
sequence of a scale free random graph process," Random Structures
and Algorithms 18 (2001), pp. 279-290.
[12] T. Britton, M. Deijfen, and A. Martin-Lof, "Generating simple
random graphs with prescribed degree distribution," Journal of
Statistical Physics 124 (2006), pp. 1377-1397.
[13] G. Caldarelli, A. Capocci, P. De Los Rios and M.A. Mu noz,
"Scale-free networks from varying vertex intrinsic fitness," Physical
Review Letters 89 (2002), 258702.
[14] K.L. Chung, A Course in Probability Theory, Second Edition,
Academic Press, Harcourt, New York (NY), 1974.
[15] A. Clauset, C. Rohilla Shalizi and M.E.J. Newman, "Power-law
distributions in empirical data," SIAM Review 51 (2009), pp. 661-
703.
[16] R. Cohen and S. Havlin, Complex Networks: Structure, Robustness
and Function, Cambridge University Press, Cambridge (U.K.), 2010.
12
[17] H.A. David and H.N. Nagaraja, Order Statistics, 3rd Edition, Wiley
Series in Probability and Statistics, John Wiley & Sons, Hoboken
(NJ), 2003.
[18] M. Draief and L. Massouli´e, Epidemics and Rumours in Complex
Networks, London Mathematical Society Lecture Note Series 369,
Cambridge University Press, Cambridge (UK), 2010.
[19] S.N. Dorogovstev and J.F.F. Mendes, "Evolution of networks,"
Advances in Physics 51 (2002), pp. 1097-1187.
[20] R. Durrett, Random Graph Dynamics, Cambridge Series in Statis-
tical and Probabilistic Mathematics, Cambridge University Press,
Cambridge (U.K.), 2007.
[21] P. Embrechts, C. Kl uppelberg and T. Mikosch, Modelling Extremal
Events for Insurance and Finance, Stochastic Modelling and Ap-
plied Probability, Springer-Verlag, New York (NY), 1997.
[22] P. Erdos and A. R´enyi, "On the evolution of random graphs," Publ.
Math. Inst. Hung. Acad. Sci 5 (1960), pp. 17-61.
[23] A. Fujihara, Y. Ide, N. Konno, N. Masuda, H. Miwa and M. Uchida,
"Limit theorems for the average distance and the degree distribu-
tion of the threshold network model," Interdisciplinary Information
Sciences 15 (2003), pp. 361-366.
[24] P.W. Holland and S. Leinhardt, "An exponential family of prob-
ability distributions for directed graphs," Journal of the American
Statistical Association 76 (1981), pp. 33-50.
[25] M.O. Jackson, Social and Economic Networks, Princeton Univer-
sity Press, Princeton (NJ), 2008.
[26] S. Janson, T. Łuczak and A. Ruci ´nski, Random Graphs, Wiley-
Interscience Series in Discrete Mathematics and Optimization, John
Wiley & Sons, 2000.
[27] M. Kim and J. Leskovec, "Multiplicative attribute graph model of
real-world networks," Internet Mathematics 8 (2011), pp. 113-160.
[28] M.R. Leadbetter, G. Lindgren and H. Rootz´en Extremes and
Related Properties of Random Sequences and Processes, Springer
Series in Statistics, Springer (Berlin), 1983.
[29] A. M. Makowski and O. Yagan, "Scaling laws for connectivity
in random threshold graph models with non-negative fitness vari-
ables," IEEE Journal on Selected Areas in Communications JSAC --
31 (2013), Special Issues on Emerging Technologies in Communica-
tions (Area 4: Social Networks).
[30] M. Molloy and B. Reed, "A critical point for random graphs with
a given degree sequence," Random Structures and Algorithms 6
(1995), pp. 161-179.
[31] M. Molloy and B. Reed, "The size of the giant component of a
random graph with a given degree sequence," Journal of Combina-
torics, Probability and Computing 7 (1988), pp. 295-305
[32] M.E.J. Newman, "The structure and function of complex net-
works," SIAM Review 45 (2003), pp. 167-256.
[33] M.E.J. Newman, Networks: An Introduction, Oxford University
Press, Oxford (U.K.), 2010.
[34] M.E.J. Newman, A.L. Barab´asi and D.J. Watts, Edrs., The Structure
and Dynamics of Networks, Princeton University Press, Princeton
(NJ), 2006.
[35] S. Pal, Adventures on Networks: Degrees and Games, Ph.D. The-
sis, Department of Electrical and Computer Engineering, University
of Maryland, College Park (MD). December 2015.
[36] S. Pal and A.M. Makowski, "On the asymptotics of degree dis-
tributions," in the Proceedings of the 53rd IEEE Conference on
Decision and Control (CDC 2015), Osaka (Japan), December 2015.
[37] M.D. Penrose, Random Geometric Graphs, Oxford Studies in Prob-
ability 5, Oxford University Press, New York (NY), 2003.
[38] S. Qu and A.M. Makowski, "On the log-normality of the degree
distribution in large homogeneous binary multiplicative attribute
graph models," Available at arXiv:1810.10114.
[39] V.D.P. Servedio and G. Caldarelli, "Vertex intrinsic fitness: How
to produce arbitrary scale-free networks," Physical Review E 70
(2004), 056126.
[40] D. Strauss, "On a general class of models for interaction," SIAM
Review 28 (1986), pp. 513-527.
[41] O. Yagan and A.M. Makowski, "Zero-one laws for connectivity
in random key graphs." IEEE Transactions on Information Theory
IT-58 (2012), pp. 2983-2999.
Siddharth Pal received his Bachelors degree in
Electronics and Telecommunication Engineering
from Jadavpur University, India, in 2011, and his
Masters and Ph.D degrees. both in Electrical
Engineering from University of Maryland College
Park, USA, in 2014 and 2015 respectively. Since
then he has been working as a research sci-
entist at Raytheon BBN Technologies. His re-
search interests include network science and
analysis, game theory, machine learning with
emphasis on neural network based approaches,
and stochastic systems.
13
Armand M. Makowski (M'83-SM'94-F'06) re-
ceived the Licence en Sciences Math´ematiques
from the Universit´e Libre de Bruxelles in 1975,
the M.S. degree in Engineering-Systems Sci-
ence from U.C.L.A. in 1976 and the Ph.D. degree
in Applied Mathematics from the University of
Kentucky in 1981. In August 1981, he joined
the faculty of the Electrical Engineering Depart-
ment at the University of Maryland College Park,
where he is Professor of Electrical and Com-
puter Engineering. He has held a joint appoint-
ment with the Institute for Systems Research since its establishment in
1985.
Armand Makowski was a C.R.B. Fellow of the Belgian-American
Educational Foundation (BAEF) for the academic year 1975-76; he is
also a 1984 recipient of the NSF Presidential Young Investigator Award
and became an IEEE Fellow in 2006.
His research interests lie in applying advanced methods from the
theory of stochastic processes to the modeling, design and performance
evaluation of engineering systems, with particular emphasis on commu-
nication systems and networks.
|
1512.06915 | 2 | 1512 | 2015-12-24T23:24:39 | An Evaluation of Yelp Dataset | [
"cs.SI"
] | Yelp is one of the largest online searching and reviewing systems for kinds of businesses, including restaurants, shopping, home services et al. Analyzing the real world data from Yelp is valuable in acquiring the interests of users, which helps to improve the design of the next generation system. This paper targets the evaluation of Yelp dataset, which is provided in the Yelp data challenge. A bunch of interesting results are found. For instance, to reach any one in the Yelp social network, one only needs 4.5 hops on average, which verifies the classical six degree separation theory; Elite user mechanism is especially effective in maintaining the healthy of the whole network; Users who write less than 100 business reviews dominate. Those insights are expected to be considered by Yelp to make intelligent business decisions in the future. | cs.SI | cs | An Evaluation of Yelp Dataset
YAN CUI
Columbia University
5
1
0
2
c
e
D
4
2
]
I
S
.
s
c
[
2
v
5
1
9
6
0
.
2
1
5
1
:
v
i
X
r
a
1. ABSTRACT
3. DATA STORAGE
Yelp is one of the largest online searching and review-
ing systems for kinds of businesses, including restau-
rants, shopping, home services et al. Analyzing the real
world data from Yelp is valuable in acquiring the inter-
ests of users, which helps to improve the design of the
next generation system. This paper targets the evalua-
tion of Yelp dataset, which is provided in the Yelp data
challenge. A bunch of interesting results are found. For
instance, to reach any one in the Yelp social network,
one only needs 4.5 hops on average, which verifies the
classical six degree separation theory; Elite user mech-
anism is especially effective in maintaining the healthy
of the whole network; Users who write less than 100
business reviews dominate. Those insights are expected
to be considered by Yelp to make intelligent business
decisions in the future.
2. DATASET
The dataset is collected from real Yelp business and
is released for academic purpose [10]. It contains 366K
user profiles for a total of 2.9M edges; 1.6M reviews and
500K tips for 61K businesses and aggregated check-ins
over time for each of the 61K businesses. To make the
dataset diversity, the data of four countries are included
(U.S., UK, Germany and Canada). All the data are
divided into 5 JSON files, which are business, review,
user, checkin and tip. The content of these files are
straightforward to understand. Specifically, business file
presents the attributes of each business, like the internal
unique id of the business, name, geolocation, categories,
et al. The checkin file is a complementary attributes for
each business. It presents the aggregated checkin time
for each business in the grain of each hour in a week.
User file contains the basic information for each user,
such as yelping time, name, fans and social relationship
with other users. Tip and review files are the review of
a particular user to a business. The difference of tip and
review is that tip is always short to represent a user’s
opinion, like ”Don’t waste your time.” or ”Great drink
specials!”, while review is long enough to allow users
express their feedback.
Due to the size of dataset, it is both time consum-
ing and inconvenient to analyze the statistics without
the help of data storage system. At the same time, it
is rather natural to model the network of Yelp using
graphs, because users and businesses can be abstracted
as nodes with different properties; review to a business
and user friendships can be modeled as the relationships
between nodes. Thus, the graph database is a great fit
for this purpose. For this project, we select Neo4j [7]
as the database as it has a great web UI which makes
graph visualization possible and a SQL-like query lan-
guage (Cypher), which is easy to learn and use. In our
graph, there are two kinds of nodes, User and Business.
The information used to describe users and businesses
are stored as attributes in the node. Three relations ex-
ist in the graph, which are knows, used for user friend
relationship, tip and review for user and business rela-
tionships, respectively.
Importing the dataset into Neo4j is all about creating
nodes or relationships. However, it is worth to mention
two tricks we made. The first one is used when import-
ing user friendship data into Neo4j. Each user has zero
to many friends. To build up the friendship, what we
can do is a straightforward twice scan algorithm. We
create each user node without adding the friendship at
the first scan, and build up relationship at the second
time. To improve the performance of data importing,
we adopt a scan-once method. The basic idea is when
creating a user node, we build up the friend relation-
ship directly. Specifically, for each friend of a user, a
look up is performed in the current graph. If a node is
found, the user node being established and the found
node is connected using knows relationship, otherwise,
we create a node with label Person, which means it will
become a user in future, but right now its full set of
properties are not filled. When trying to create a new
user, a look up is also necessary. If there is not such
a node, we create a new user, otherwise, the user node
exists as a Person, and the full information should be
filled into the node. exist as a Person node. Another
trick that we used to speedup the dataset importing is
1
Figure 1: Number of Yelp Users against Degree
Figure 2: CDF for Number of Hops between Two Nodes
to create unique index for both users and businesses be-
cause we noticed that the internal user id and business
id are unique and there are a lot of queries made based
on their ids.
Although the use of these tricks, the whole import-
ing process is also quite slow. Roughly speaking, it
costs us 2 weeks to import all 366K user basic infor-
mation and their relationships. Although one can op-
timize the graph establish using REST API instead of
Cypher, it is left as future work.
In order to estab-
lish graph quickly and reproduce our experiments re-
sults easily, our database is open sourced using Drop-
box, along with the graph establish and analysis codes
used in this paper (https://github.com/ycui1984/yelp-
data-challenge). Readers who are interested to use our
database just need to download the database, extract
in the proper folder and restart the service.
4. ANALYSIS
The benefits of using Neo4j is that it simplifies our
analysis process by writing simple Cypher queries. For
complex tasks, we created python scripts and used py2neo
library to manipulate Neo4j.
4.1 Number of Friends Distribution
From the high level, we found that there are 2576179
knows directed friend relationships among 366715 users.
So, on average, each user has roughly 7 friends. To in-
vestigate into the number of friends distribution for each
user, we looked at the number of Yelp users for different
degrees, which is shown in Figure 1. In this figure, we
ignore 192621 users with no friends. One thing worth
to point out is that x and y axises use the log scale.
As shown in this figure, the degree distribution exhibits
the power law phenomenon, which is expected. In the
dataset, the largest degree among all users is 3830. Al-
though there is a hard limit for the largest number of
friends for a user on Yelp (5000) [12], we did not see
any user who hits the limit.
4.2 Hop Length between Users
The number of hops between users are investigated in
this subsection. A classical conclusion about social net-
work is six degrees of separation [8], which means that
the average number of hops between every two nodes is
no more than 6. To verify this, we randomly selected
10000 node pairs among all nodes and measured length
of shortest path. Based on the measurement, the cumu-
lative distribution function (CDF) against the number
of hops is calculated. Figure 2 presents the experimen-
tal results. As we can see, the CDF curve increases with
the number of hops, and stabilizes at 8 hops. The proba-
bility of two users within 8 hops is 21%. Actually, most
of the time (79%), there is no path between selected
user nodes. One natural reasoning is that two nodes
are selected from two separate connected components
when there is no path, otherwise, nodes come from the
same connected component. Also, there should be a lot
of connected components such that there is no path be-
tween two nodes in a high probability. Based on these
conclusions, we can see the largest number of hops be-
tween any two nodes in the same connected component
is 8, which is the diameter of the connected component.
The average distance of two nodes in the same con-
nected component is calculated to be 4.5, which verifies
the six degree separation theory. Note that the aver-
age path length is even smaller than most of social net-
works including Facebook [2], YoutTube [1], and Live-
Journal [1], which implies that the information in Yelp
network spreads faster than other networks.
4.3 Connected Components Distribution
To verify our reasoning about the structure of Yelp
network, this subsection investigates the distribution of
2
1 10 100 1000 10000 1 10 100 1000Number of Yelp UsersDegree 0 0.05 0.1 0.15 0.2 0.25012345678Percentage of Pairs within Hop DistanceHop DistanceFigure 3: Connected Components Distribution
Figure 5: Number of Friends of Friends
Figure 4: Cluster Coefficient and Maximal K-Core
connected components. To find all components and the
number of nodes in each component, we recorded each
subgraph encountered so far. Then, each user node is
iterated one by one. For each subgraph, the path ex-
istence between the subgraph and the target node was
tested. If there exists a path, the user node is included
into the subgraph, otherwise, a new subgraph is cre-
ated. Figure 3 presents the experimental results. As
expected, there is 192621 connected components where
single user exists. Except that, most of users belongs
to a single large connected component, which includes
168917 users. If we calculate the probability of two user
nodes in the same connected component, it is roughly
0.21, which matches the results in the last subsection.
4.4 Clustering Coefficient and Maximal K-Core
After understanding the network structure in the high
level, the next investigation is how Yelp friends of a par-
ticular user interact with each other. We try to answer
3
interesting questions such as how many of your friends
are also friends? To this end, we measure the average
clustering coefficient for users with different degrees.
The clustering coefficient for a graph is calculated by
dividing the existing number of knows relationships by
the total possible number of relationships. For exam-
ple, assume there are 4 nodes in a graph, and there are
2 knows relationships. So, the clustering coefficient is
2/(4∗3/2) = 0.33. Figure 4 (labeled as clustering coeffi-
cient) shows the results for users with different degrees.
As indicated, the coefficient keeps decreasing with the
increasing degree, which suggests that the more friends
one has, the more possible ways one’s friends are also
friends. Specifically, the total number of relationships is
a number of O(n ∗ n), where n is the number of friends
for a user, while the actual graph is not dense enough
to keep up with the total number. To shed light on the
structure of the subgraph formed by all friends of a user,
we also measured the average maximal k-core for users
with increasing degrees. The k-core of a graph is defined
as the maximal subgraph where each node has k degrees
at least. The maximal k-core is to look for a k-core
which maximizes k. The curve labeled as degeneracy
in Figure 4 plots the experimental results. Overall, the
trend is the more friends one has, the larger the maximal
k-core. For instance, if one has 100 friends, the average
maximal k-core is roughly 13, which means there are at
least 14 users who knows the other 13 friends of this
user. One exception of the curve is the data point when
the degree is 1000. It is larger than that when degree is
3830. After examining the results, we found that there
is only one user who has degree 1000 and 3830. The
exception is considered as statistical errors. If enough
users with high degrees exist, the curve is believed to
increase continuously.
4.5 Friends of Friends
1 10 100 1000 10000 100000 1 10 100 1000 10000 100000Number of ComponentsComponent Size 0 0.05 0.1 0.15 0.2 10 100 1000 0 10 20 30 40 50Average Clustering CoefficientAverage DegeneracyDegreeClustering CoefficientDegeneracy 0 50000 100000 150000 200000 250000 300000 350000 10 100 1000Number of Friends-of-friendsDegreeUnique Friends-of-friendsNon-unique Friends-of-friendsk2Figure 6: Average Neighbor’s Degree
One important property of social networks is friends
of friends. For example, Linkedin recommends people
you may know if two users share the same friend. Yelp
can also benefit from recommending to a user the busi-
nesses that liked by his friends of friends. To this end,
the number of unique friends of friends and non-unique
friends of friends with increasing number of degrees are
counted. Note that unique friends of friends are a dis-
tinct set of user nodes one can reach by two hops from
a user, while non-unique friends of friends are all user
nodes that are reachable by two hops. Figure 5 plots
the results. Besides, the k ∗ k curve is also presented
for comparison, where k is degree. The common sense
is that if one has k friends, then k ∗ k is an estimation
of the number of total friends of friends, assuming that
each of his friends has k friends. By adding the k ∗ k
curve, one can compare with our estimation. From this
figure, we can see that the number of unique friends of
friends and non-unique friends of friends is larger than
our estimation when the degree is smaller than 100 and
200, respectively. Note that the percentage of users
whose degree is smaller than 100 is over 90%, which
suggests that, for most of users in Yelp network, your
friends have more friends than you.
To further prove this conclusion, the average neigh-
bor’s degree against degree is presented in Figure 6.
Note that the figure is drawn in log scale for both x and
y axises. As can be seen, the average neighbor’s degree
keeps increasing when the degree of a user is relatively
small, which verifies that your friends has more friends
than you. Once the degree is large enough, the average
neighbor’s degree becomes smaller. However, this only
happens to a small portion of users.
4.6 User Distribution in Stars, Reviews, Fans
and Votes
attributes (stars, reviews, fans and votes) are evaluated
in this subsection. Before going into the details of the
results, we introduce how these attributes are generated
in Yelp. Stars are used to evaluate the quality of a busi-
ness after a visit. One can give stars from 1 to 5. The
more the better; Reviews are comments from a user to
a business, users usually write reviews to express their
opinions; Fans are used when an user likes reviews or
comments from another user (probability because they
have similar taste) and wants to receive more recom-
mendations from him; Votes are comments to a review
from a user. Specifically, user can submit a vote of use-
ful or cool or funny to a review.
Figure 7a-Figure 7d present the distributions of users
for each attribute. The following details the analysis for
each attribute. In terms of star distribution, businesses
with 4 stars and 5 stars are the most (41% and 38% re-
spectively), which means that businesses collaborated
with Yelp are high quality and users have positive feed-
backs to most of these businesses. Note that the results
are highly consistent with the results released in the
official website [6].
In terms of review distribution, besides the percent-
age of users who do not write any reviews, the percent-
age of users who write a particular number range of
reviews (in the grain of 100) are also presented. As in-
dicated in Figure 7b, the percentage of users who do not
write reviews are negligible, although 53% of all users
do not have any friends on Yelp, which implies that re-
view is a well-regarded feature on Yelp. If we look at
the distribution of users who write reviews, it is easy
to find that users who write no more than 100 reviews
dominate (92%). This number tells us that although
most of Yelp user do write reviews, most of them do
not write a lot.
Figure 7c presents the results for fans. The interest-
ing finding is that most of Yelp users (74%) do not have
any fans, while users with 0 to 100 fans dominate the
remaining percentage. From the results, we know that
only a small portion of users actively comment a lot of
businesses, which makes them followed by others. Most
of users only care about the businesses that they have
ever been experienced, which are limited.
Figure 7d shows the user breakdown in terms of votes.
Similar to Figure 7b, users who vote 0 to 1000 are the
largest part (83%). The second largest part are users
who do not vote (15%). The total number of votes
is also breakdown according to useful, cool and funny.
The percentage for each category is 48%, 27% and 25%,
respectively. Among these three words, only funny is
negative in tone. Thus, most of the time(75%), Yelp
users satisfy with the quality of reviews.
4.7 Effectiveness of Elite User Mechanism
The distribution of users in terms of four important
A famous mechanism used to encourage review writ-
4
1 10 100 1000 1 10 100 1000Neighbor’s Average DegreeDegreeActualDiagonal(a) Star Distribution
(b) Review Distribution
(c) Fans Distribution
(d) Votes Distribution
ing on Yelp is elite members [11]. If one becomes elite
user successfully, he or she will be invited to many epic
parties for free, which are not available for common
users. Any Yelp user can apply for a elite user, but there
is a community to decide whether the application passes
or not. Without doubt, elite users should be very ac-
tive in many aspects such as review writing, comment-
ing reviews from others and making friends on Yelp,
although the internal algorithm to decide elite users are
not available to the public. This subsection measures
the effectiveness of elite user mechanism, which we be-
lieve important to Yelp because if elite users are not
much more important than common users, Yelp should
stop the investment to elite users as soon as possible to
save cost.
Before introducing the details of measurement, let
us look at the percentage change of elite users against
years. Figure 7 presents the experimental results. As
shown in the figure, there is an increase of the percent-
age in 2005, and the curve keeps decreasing since then.
At 2005, the percentage is more than 50%, while it is
even smaller than 1% in 2014. Note that Yelp is estab-
lished in 2004. The curve suggests that at early stage of
Yelp, the company uses this mechanism to engage users.
Once the reputation is established, the increase of elite
users is much slower than the increase of common users.
Next, we start to measure the effectiveness of elite
user mechanism. Our methodology is to collect sev-
eral metrics of elite users and compare them to average
users. The first metric is the average number of fans for
elite users, which is calculated to be 16. For all users,
the average number of fans is 1.6, which is significantly
smaller than 16. Next, we look at the average number of
reviews written. The experimental results for elite users
and all users are 245 and 32, respectively. Again, the
metric for elite users is much better than the average
5
for elite users, which are complementary to their work.
Crain et al. analyzed the elite users in terms of the net-
work structure, where they found elite users are super-
connectors in Yelp [3]. The results are consistent with
ours. Besides, a lot more analysis are provided in our
work. Tanvi Jindal proposed to find local experts by
the use of machine learning [5], while our focus in this
paper is to analyze the dataset, find useful insights and
be helpful to the design of next generation online review
system.
6. CONCLUSION
This paper presents analysis results for Yelp dataset.
Our main focus is user related data, such as the social
network formed by users and attributes in user nodes.
We did not investigate the user behaviors of visiting
a business and Yelp reviews, which are believed to be
valuable. These parts are left in future work.
7. REFERENCES
[1] Measurement and Analysis of Online Social
Networks. ACM, 2007.
[2] The Anatomy of the Facebook Social Graph, 2011.
[3] An Analysis of the a AIJElitea A I Users on
Yelp.com. course project report, 2014.
[4] Multidimensional Characterization of Expert
Users in the Yelp Review Network, 2014.
[5] Finding Local Experts From Yelp Dataset. master
thesis, 2015.
[6] An introduction to yelp metrics as of september
30,2015, 2015. http://www.yelp.com/factsheet.
[7] Neo4j, 2015. http://neo4j.com/.
[8] Six degrees of separation, 2015.
https://en.wikipedia.org/wiki/Six_
degrees_of_separation.
[9] Understanding Online Reviews: Funny, Cool or
Useful? ACM, 2015.
[10] Yelp dataset challenge, 2015.
http://www.yelp.com/dataset_challenge.
[11] Yelp elite squad: La west, 2015.
http://www.yelp.com/elite.
[12] Yelp places a limit on number of friends = 5000,
2015. http://www.yelp.com/topic/
sacramento-yelp-places-a-limit-on-number-of-friends-5000.
Figure 7: The Percentage of Elite Users against Years
of all users. The third metric we used is the average
number of votes. The number is 1336 for elite users
and 122 for all users. Finally, we compare the average
degree for elite users. The result is 55, which is much
larger than the average(7). From these four metrics, one
can find elite users own significantly more fans (10×),
write much more reviews (7.6×), comments more than
others(10.9×), and has more friends (7.8×). In another
word, elite users are much more active in the commu-
nity. Next, we try to answer an interesting question. Do
elite users give more or less stars for a business, com-
pared to common users? Similar to metrics collected,
the average of stars given by elite users is 3.78, while the
average is 3.72, when considering all users as a whole.
Although the value for elite users is higher, it is rather
close to the average of all users. This result implies
that elite users are famous for their activeness in the
community(like the quality of reviews), instead of giv-
ing stars which are out of exceptions. Another insight
of the measurement to elite users is that Yelp commu-
nity can develop a machine learning model by the use
of our metrics, which helps to decide whether an appli-
cation for elite user passes or not, instead of evaluating
it manually.
5. RELATED WORK
During the several rounds of Yelp challenge, a lot of
interesting works are done to make use of the dataset.
For instance, Bakhshi et al. use the dataset to under-
stand the difference of review feedbacks including use-
ful, cool and funny [9]. Lee et al. targets for a multi-
dimensional model, which are used to find expert (elite
users) on Yelp [4]. The model uses review text, network
structure, and user metadata to find elite users. Their
conclusion was the model needs to consider all infor-
mation together to improve the accuracy of the model.
In this paper, we also find several efficient indicators
6
0 0.1 0.2 0.3 0.4 0.5 0.620042005200620072008200920102011201220132014Percentage of Elite UsersYear |
1908.00164 | 2 | 1908 | 2019-08-06T04:12:29 | Supervised Learning of the Global Risk Network Activation from Media Event Reports | [
"cs.SI",
"physics.soc-ph"
] | The World Economic Forum (WEF) publishes annual reports on global risks which have the high impact on the world's economy. Currently, many researchers analyze the modeling and evolution of risks. However, few studies focus on validation of the global risk networks published by the WEF. In this paper, we first create a risk knowledge graph from the annotated risk events crawled from the Wikipedia. Then, we compare the relational dependencies of risks in the WEF and Wikipedia networks, and find that they share over 50% of their edges. Moreover, the edges unique to each network signify the different perspectives of the experts and the public on global risks. To reduce the cost of manual annotation of events triggering risk activation, we build an auto-detection tool which filters out over 80% media reported events unrelated to the global risks. In the process of filtering, our tool also continuously learns keywords relevant to global risks from the event sentences. Using locations of events extracted from the risk knowledge graph, we find characteristics of geographical distributions of the categories of global risks. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
Supervised Learning of the Global Risk Network Activation
from Media Event Reports
Xiang Niu · Gyorgy Korniss · Boleslaw K. Szymanski
9
1
0
2
g
u
A
6
]
I
S
.
s
c
[
2
v
4
6
1
0
0
.
8
0
9
1
:
v
i
X
r
a
Abstract The World Economic Forum (WEF) pub-
lishes annual reports of global risks which have the high
impact on the world's economy. Currently, many re-
searchers analyze the modeling and evolution of risks.
However, few studies focus on validation of the global
risk networks published by the WEF. In this paper,
we first create a risk knowledge graph from the anno-
tated risk events crawled from the Wikipedia. Then,
we compare the relational dependencies of risks in the
WEF and Wikipedia networks, and find that they share
over 50% of their edges. Moreover, the edges unique to
each network signify the different perspectives of the
experts and the public on global risks. To reduce the
cost of manual annotation of events triggering risk ac-
tivation, we build an auto-detection tool which filters
out over 80% media reported events unrelated to the
global risks. In the process of filtering, our tool also con-
tinuously learns keywords relevant to global risks from
the event sentences. Using locations of events extracted
from the risk knowledge graph, we find characteristics
of geographical distributions of the categories of global
risks.
Xiang Niu
Department of Computer Science & Network Science and
Technology Center, Rensselaer Polytechnic Institute (RPI),
Troy, NY, USA
E-mail: [email protected]
Gyorgy Korniss
Department of Physics & Network Science and Technology
Center, Rensselaer Polytechnic Institute (RPI), Troy, NY,
USA
E-mail: [email protected]
Boleslaw K. Szymanski
Department of Computer Science & Network Science and
Technology Center, Rensselaer Polytechnic Institute (RPI),
Troy, NY, USA
E-mail: [email protected]
Keywords Global risk network · Knowledge graph ·
Auto-detection · Supervised learning
1 Introduction
The World Economic Forum publishes annually the list
of global risks and their properties. . The global risks are
clustered into five categories: Economic, Environmen-
tal, Geopolitical, Societal and Technological [1]. These
risks affect many aspects of lives of countless people.
Economic risks may inflict tremendous damage on in-
dividuals, financial institutions, and governments. For
example, in 2008, the asset bubble in several countries
caused most of the major economies to undergo a reces-
sion lasting several years [2]. Environmental risks affect
both individuals and infrastructure but their impact is
global when thousands of people die or are displaced
by hurricanes or earthquakes [3]. Geopolitical risks are
mainly caused by a failure of national or global gov-
ernance but may result in millions of people suffering
from war [4], hunger [5], and poverty [6]. Technological
risks are real and often unpredictable consequences of
advanced technologies such as cyberattacks [7] and data
leaks [8] threatening well-being of individual and corpo-
rations. In short, all risks have critical ability to disrupt
civilization at diverse levels, ranging from individuals to
nations, so there is an is urgent need to develop tools
for their discovery, analysis and prediction.
The big challenge to progress in this direction is
to identify activation of global risks from massive event
records in Web media. Therefore, risk-event labeling is a
fundamental and necessary preparatory step before any
in-depth study of risks, such as risk modeling [9] and
control [10], can be attempted. A high-quality dataset
combined with the validated models are a foundation
for global risks reliable discovery, analysis and predic-
2
Niu, Korniss, Szymanski
tion. The first systematic approach for such data collec-
tion effort was done and described in [11], in which the
researchers manually collected monthly data points for
each risk using online event resources such as articles,
news, and Wikipedia to annotate events relevant to any
global risk activation. The covered period ranged from
beginning of year 2000 to the end of year 2016. Con-
sidering the inaccuracy and incompleteness of manually
labeled risk event records, researchers further improve
these aspects of collected data by providing a detailed
reason for selecting each risk event [12, 13]. However
currently, manual annotation is the only way to label
risk events because of the difficulty to automate this
operation caused by the unstructured format of event
description. Here, we first propose a human-machine
interaction model to augment the manual annotation
process by precisely filtering out a large number of un-
related event. Then, we enhance this process by con-
tinuously expanding keyword sets for events using the
supervised online-learning.
The auto-detection tool helps analysts to detect ev-
ery single risk from event descriptions in Web media.
However, individual risk analysis is not sufficient be-
cause rarely a risk activation happens in isolation. Ac-
cording to the annual report from the World Economic
Forum, the connectivity among risks is common and
complicated. The global risks are clustered into five cat-
egories but their links includes both intra-category and
inter-categories edges, both types of which are common.
Most of the societal risks can activate under influence
of economic (profound political and social instability),
environmental (rapid and massive spread of infectious
diseases) or geopolitical (large-scale involuntary migra-
tion) risks. The yearly WEF Global Risk Report is
based on the experts' answers to the annual question-
naires that ask about each risk probability of activa-
tion, such activation costs to global economy and inter-
connectivity between risks. This dependence on expert
opinions raises one important question: "how well do
the experts estimate risk probability of activation, im-
pact, and interconnectivity?" followed by another: "are
their networks reliable, integrated, and representative?"
To partially answer these questions, here, we create an-
other risk network based only on the risk events dis-
covered in Web media data. Then, we compare the re-
sulting network with the WEF global risk network for
the same risk nodes to assess both networks correct-
ness and authoritativeness. We expect that the network
from event risk data will be biased towards risks with
high level of public awareness, which tend to be directly
related to human lives, such as "Asset bubble" and "Ex-
treme weather event".
Although the global risks attempt to represent events
with impact on global economy and systematic impact
on the entire world, most of the time, the risk events
occur locally and have regional effects and influence.
Thanks to the specific characteristic of the risk-events
dataset, we extract local information from each event
record and build connections between the locations and
related risks. Having collected data for the period from
year 2000 to 2014, we illustrate the different regional
patterns of five risk categories on the world political
maps.
2 Risk detection
In [11], authors investigate multiple event resources in-
cluding articles, news, Wikipedia. Here, we only focus
on the Wikipedia Current Events Portal (WCEP) [14],
which comprehensively includes daily summaries of news
events edited by crowdsourcing. Because of its popular-
ity and completeness, the WCEP has been fully ana-
lyzed by comparing it with content written by profes-
sional journalists in WikiTimes project [15]. The con-
clusion of this project is that the WCEP is a representa-
tive source of public news thanks to its stable contribu-
tion volumes and crowdsourcing. The WikiTimes [15]
also provides specific crawling methods and extracted
dataset with over 50k events from the WCEP from the
year 2000 to 2014, which are sufficient enough for the
risk-event labeling and further studies. In the dataset,
each event contains information detailed in Table 1.
Fig. 1 shows sample subnetwork of events. The event
4359, with description "Tropical Storm Gaston douses
Richmond, Virginia, with up to 14 inches of rain, caus-
ing widespread flooding" and entities "Tropical Storm
Gaston", "Virginia" and "Mark Warner", are parts of
story "2004 Atlantic hurricane season" occurring on
Aug. 30, 2004, reported by ABC-NEWS. The event
4571 is described as "At least nine deaths in Florida,
two deaths in the Bahamas, and one death in Geor-
gia are blamed on the storm. Damage estimates range
widely from US$2 to US$15 billion". The event 4622 re-
ports "The Cuban government evacuates between 800,000
and 1.3 million people from coastal cities and developed
areas". The last two events are parts of the same story
about "2004 Atlantic hurricane season".
Manual annotation requires a person to go first through
the event description word by word and select the risk
related keywords, then label the event with risk tags
according to the keywords. For example, for the event
4359, two keywords "storm" and "flooding" may be se-
lected and then the event will be labeled with tags
"storm" and "flood" accordingly. Both tags belong to
the same risk "10. Extreme weather events", as shown
Supervised Learning of the Global Risk Network Activation
3
Concept
Event
Story
Category
Date
Entities
References
Description
sentences of a news summary
a story in Wikipedia of which the event is part
a category to which the event belongs
the event date of occurrence
a list of entities in the event sentences
external sources for the same event
Table 1 Structured event information extracted from the
WCEP [15].
Fig. 1 An example of risk knowledge graph consisting of
three events. Event 4359: "Tropical Storm Gaston douses
Richmond, Virginia, with up to 14 inches of rain, caus-
ing widespread flooding. (8/30/04)". Event 4571: "At least
nine deaths in Florida, two deaths in the Bahamas, and one
death in Georgia are blamed on the storm. Damage estimates
range widely from US$2 to US$15 billion. (9/7/04)". Event
4622: "The Cuban government evacuates between 800,000
and 1.3 million people from coastal cities and developed ar-
eas. (9/13/04)".
Table 5 in Appendix. The event 4571 contains two more
tags "death" and "economic loss" in addition to "storm".
Thus, this event shows the activity of one more risk "11.
Failure of climate-change mitigation and adaptation",
see Table 5 in Appendix. The event 4622 contains only
one tag "evacuation", which belongs to risk "23. Large-
scale involuntary migration", as shown in Table 7 in
Appendix. Thus, the three events represent the activi-
ties of three risks in two risk categories: environmental
risks, as seen in Table 5 in Appendix, and societal risks
according to Table 7 in Appendix.
With the development of modern information soci-
ety, there is a large number of news events described
all over the internet. Specifically, around three thou-
sand new events are generated in the WCEP every year
amounting to about 250 per each month and over fifty
thousand events in the past 15 years. Given 29 risk
labels and around 20 words per event description, an
expert would have to go through 3000 × 30 × 20 so
nearly two million comparisons to process just one year
of events data in the WCEP, which is a heavy workload.
Besides, during the labeling, only a few (around two
thousand) of the fifty thousand events are relevant to
global risks. These observations motivated us to create
an auto-detection tool to help analysts by filtering out
the irrelevant events, thereby saving time in risk-event
labeling. Our risk auto-detection module is depicted in
Fig. 2. The detailed processing proceeds according to
the following steps:
-- Step 1. Initially, an analyst prepares a few key-
words and tags for each risk according to the de-
scription of 29 risks in Appendix based on [1].
-- Step 2. If the given list of new pairs with keyword
k and tag t (cid:104)k, t(cid:105) is empty, processing terminates,
otherwise, these pairs are merged into keyword dic-
tionary.
-- Step 3. For each event e and a list of keywords K,
each paired with some tag t, if a keyword k ∈ K
appears in the event sentence manually accepted as
relevant, the event e is labeled with the tag t as
(cid:104)e, t+(cid:105), otherwise, the event e is labeled as (cid:104)e, t−(cid:105).
-- Step 4. We use a bag-of-words representation b =
(cid:104)w1, c1(cid:105), ..., (cid:104)wn, cn(cid:105) for each event sentence, where
wi is the ith word of event sentence in e, ci is the
count of appearances of the word wi for n unique
words. For each tag t, we have a list of events: (cid:104)e, t+(cid:105)
is a positive instance with bag-of-words representa-
tion b+ ∈ B+, while (cid:104)e, t−(cid:105) is a negative instance
with bag-of-words representation b− ∈ B− in the
event sentence.
-- Step 5. With random forest classifier given training
dataset B+ and B−, we get entropy ranking of fea-
tured keywords w1, w2, ..., wm, where m is the total
number of unique words in B+ and B−. The words
with high rank are important for the classification.
-- Step 6. Based on the entropy ranking list, we select
meaningful keywords from top a (default a = 5)
new ones and create a list of (cid:104)k, t(cid:105). Then, processing
restarts at step 2.
Tables 4-8 in Appendix show the list of selected tags
and keywords of 29 risks with current dataset up to year
2014. With new events data, the module can update the
list further and improve the filtering accuracy. In step
3, the events without any keyword k ∈ K or rejected
by analysts are filtered out as non-relevant events.
3 Risk network
The auto-detection module produces a structured event
dataset containing rich independent information such
in risk ofin location ofin risk ofat date ofin location ofin risk ofin location ofprior toat date ofin risk ofprior toin risk ofin location ofin location ofin risk ofat date ofevent4571GeorgiaresidentevacuationCuba9/7/04FloridaVirginiaevent4622economic lossby weatherBahamasflood8/30/04death byweatherstorm9/13/04event43594
Niu, Korniss, Szymanski
Fig. 2 The activity diagram of risk auto-detection module.
Fig. 3 The entire risk knowledge graph with small yellow
nodes representing events, small purple nodes representing
the date, and large nodes representing thirty risks from five
colored categories: economic, environmental, geopolitical, so-
cietal, and technological.
as risk labels, stories, event descriptions, their occur-
rence locations, and dates. Based on that, with the
specific principal (story) and subordinate (event) rela-
tionship, we further build event correlations, see Fig. 1.
Any two events are considered related when they be-
long to the same story. The knowledge graph includes
the following four types of relationships:
-- At date of: an event e happened at date d. Any event
e has a unique d associated with it. But one date d
may correspond to multiple events.
-- At location of: an event e happened at location l or
at location relevant to l. Any event e may happen
(affect) multiple locations, e.g., Fig. 1 event 4571
affected locations at Bahamas, Florida and Geor-
gia. One location l may also correspond to multiple
events.
-- Prior to: an event e1 happened prior to another
event e2 when they are in the same story and the
date d1 of e1 precedes the date d2 of e2.
-- In risk of: an event e is in risk of t after the event
sentence is labeled by the tag t by the auto-labeling
module, see Fig. 2.
Fig. 3 depicts the entire knowledge graph that contains
all relationships between any two events, and between
two pairs for event e, (e, risk) and (e, date). Here, we
group all tags t1, t2, ... belonging to the same risk r
into one risk node. For example, in Fig. 1, event 4359
is in risk of "storm" and "flood", which correspond to
the same risk "10. Extreme weather event".
(cid:83) R2, i (cid:54)= j.
Additionally, we extracted the risk network (Wiki
in Fig. 4) from the entire knowledge graph (Fig. 3). For
each pair of events (e1, e2), when e1 is prior to e2, e1 is
in risks of R1 and e2 in risks of R2, we create an edge
between each pair of (ri, rj), ri, rj ∈ R1
For example in Fig. 1, event 4359 is in risks of "10.
Extreme weather event" r10, event 4571 is in risks of
"10. Extreme weather event" r10 and "11. Failure of
climate-change mitigation and adaptation" r11, event
4622 is in risks of "23. Large-scale involuntary migra-
tion" r23. Thus, we have three connections r10 − r11,
r10 − r23 and r11 − r23. To make a comparison of so cre-
ated network with the undirected and unweighted risk
Supervised Learning of the Global Risk Network Activation
5
Fig. 4 A comparison between two risk networks, one created by the WEF and the other built by us from Wiki events. The
first subfigure is the common part extracted from the two networks, the second subfigure contains edges unique to the WEF
network and the third one includes relational dependencies unique to the Wiki network.
network created by the World Economic Forum (WEF)
in report [1], we transform the Wiki network to be also
undirected and unweighted, as seen in Fig. 4, where the
size of each risk node represents its degree. In general,
the two networks are similar in nodes sizes and connec-
tions. There are 170 edges in WEF network and 224
edges in Wiki networks, with the number of common
edges as high as 121, see Table 2. Specifically, the risk
"23. Profound social instability" has the largest number
(18) of common related risks between the two networks.
We also highlight the different risk dependencies in
WEF and in Wiki networks in Fig. 4. For example, in
Wiki network, risk "1. Asset bubbles in a major econ-
omy" influences and is influenced also by risks "4. Fail-
ure/shortfall of critical infrastructure", "22. Large-scale
involuntary migration", and etc. The degree differences
between the two risk networks arise from the differ-
ent views of the risks by experts and the public. The
risks with a higher degree in Wiki network tend to be
a focus of public concerns, such as "1. Asset bubbles
in a major economy", "10. Extreme weather events",
"17. Large-scale terrorist attacks", "21. Food crises"
and "29. Massive incident of data fraud/theft". Never-
theless, the risks with a higher degree in WEF network
tend to be a focus of expert concerns, often novel or
merely newly arising, such as "2. Deflation in a major
economy", "12. Major biodiversity loss and ecosystem
collapse", and "26. Adverse consequences of technolog-
ical advances". In addition, in Table 2, the common
part of the two networks includes most of the intra-
group edges. After extracting it from the WEF and the
Wiki network, almost no intra-group edges left, espe-
cially in Wiki network. Moreover, in Table 3, after ex-
tracting the common part, the WEF network becomes
Common part:WEF only:Wiki only:1918151417161110131289231674518191415161710111213881932547691234567252427262120232229282425262720212223282929282726252423222120181912131011161714156
Niu, Korniss, Szymanski
Fig. 5 Economic risks heat-map over political map of the
world.
Fig. 6 Environmental risks heat-map over political map of
the world.
fragmented with extremely low average clustering coef-
ficients in each group and in the entire network.
4 Risk activities heat maps layered over the
political maps of the world
Using the risk knowledge graph, we extract connections
between locations and risks. For any event e in risk
r ∈ R that occurred at location l ∈ L, where R is one
of five risk categories, L is a country to which location
l belongs, we record an occurrence of pair (R, L). After
processing all events, we obtain the number of occur-
rences of each pair (R, L). For each risk category R,
we normalize the number of occurrences in all coun-
tries L by taking logarithm of a ratio of number of oc-
currence+1 in the given country to 1+the maximum
number of occurrences in any country for category R.
We show the results as a heat-maps layered over the
political maps of the world shown in Figs. 5-9. Each of
these figures displays normalized levels of activities of
one of the five risk categories. For example, in economic
risks, the economic risk-events related to Russia occur
42 times, related to Japan 16 times, to India 6 times,
to Italy 2 times. These scores after the normalization
become 1, 0.75, 0.52, 0.29, respectively.
Most of the economic risks happen in the developed
countries or countries with high volume of trading re-
sources, industrial products or services, such as Rus-
sia (1.00), U.S. (0.95), Malaysia (0.78), Japan (0.75),
Mexico (0.72), Cyprus (0.68), Australia (0.61), Greece
(0.61). The most impactful story in Russia is "2008
Russian financial crisis", in the U.S. "Subprime mort-
gage crisis", in Malaysia "Malaysia Airlines Flight 370",
in Japan "Automotive industry crisis of 2008-10", in
Fig. 7 Geopolitical risks heat-map over political map of the
world.
Mexico "Mexican Drug War", in Cyprus "2012-13 Cypriot
financial crisis", in Australia "August 2011 stock mar-
kets fall", and in Greece "Greek government-debt cri-
sis". Those economic risks are related to a failure of
financial mechanisms such as stock (Russia, Australia),
mortgage (U.S.), banking (Cyprus, Greece), illicit trade,
such as smuggling (Mexico), and decreased demand for
manufacturing products, such as cars (Japan).
The environmental risks usually happen in coastal
countries, especially those near Atlantic, Pacific, or In-
dian Oceans, such as U.S. (1.00), Philippines (1.00),
China (0.97), Japan (0.91), India (0.91), Mexico (0.90),
Haiti (0.87), Pakistan (0.83), Cuba (0.71). "Atlantic
hurricane season" mainly affects the U.S., Mexico, Haiti,
Cuba. "Pacific typhoon season" mainly affects the Philip-
pines, China, Japan. "North Indian Ocean cyclone sea-
son" mainly affects India. Beyond that, some other dis-
0.00.20.30.50.70.81.0Economic0.00.20.30.50.70.81.0Environmental0.00.20.30.50.70.81.0GeopoliticalSupervised Learning of the Global Risk Network Activation
7
Networks
Economic
Intra
Inter
Environmental Geopolitical
Intra
Inter
Intra
Inter
Societal
Intra
Inter
Technological Whole Network
Intra
Inter Number of edges
Common part
WEF only
WEF
Wiki only
Wiki
21
4
25
6
27
36
13
49
50
86
4
6
10
0
4
22
14
36
28
50
8
2
10
0
8
29
11
40
34
63
12
2
14
1
13
47
13
60
45
92
3
3
6
0
3
12
13
25
35
47
121
49
170
103
224
Table 2 The number of intra-group and inter-group edges of each risk category and network. WEF represents the network
published by the World Economic Forum; Wiki represents the network created by us from Wiki events. Common part represents
the edges existing in both networks. WEF only represents the edges unique to the WEF network, while Wiki only includes the
edges unique to the Wiki network.
Networks
Common part
WEF only
WEF
Wiki only
Wiki
Economic
(cid:104)k(cid:105)
(cid:104)c(cid:105)
0.6
8.67
2.33
0.0
0.61
11.0
6.89
0.35
0.74
15.56
Environmental Geopolitical
(cid:104)k(cid:105)
6.0
5.2
11.2
5.6
11.6
(cid:104)c(cid:105)
0.69
0.31
0.57
0.35
0.81
(cid:104)c(cid:105)
0.49
0.06
0.66
0.42
0.81
(cid:104)k(cid:105)
9.0
3.0
12.0
6.8
15.8
Societal
(cid:104)k(cid:105)
(cid:104)c(cid:105)
0.59
11.83
0.17
2.83
0.59
14.67
7.83
0.32
0.72
19.67
Technological Whole Network
(cid:104)k(cid:105)
4.5
4.75
9.25
8.75
13.25
(cid:104)c(cid:105)
0.47
0.01
0.48
0.22
0.85
(cid:104)c(cid:105)
0.58
0.1
0.59
0.34
0.78
(cid:104)k(cid:105)
8.34
3.38
11.72
15.45
7.1
Table 3 The average degree (cid:104)k(cid:105) and average clustering coefficient (cid:104)c(cid:105) of each risk category and network. WEF represents the
network published by the World Economic Forum; Wiki represents the network created by us from Wiki events. Common part
includes the edges existing in both networks. WEF only represents the edges unique to the WEF network, while Wiki only
includes the edges unique to the Wiki network.
Fig. 8 Societal risks heat-map over political map of the
world.
Fig. 9 Technological risks heat-map over political map of
the world.
asters also happen in the U.S. "2011 Mississippi River
floods", in China "2008 Sichuan earthquake", in Japan
"2011 Thoku earthquake and tsunami", in India "2004
Indian Ocean earthquake and tsunami", in Mexico "Deep-
water Horizon oil spill", and in Pakistan "2010 Pak-
istan floods".
The geopolitical risks are most frequent in coun-
tries having unstable regime or involved in international
conflicts, such as North Korea (1.00), Thailand (0.80),
Iran (0.80), U.S. (0.72), Egypt (0.72), Pakistan (0.62),
Syria (0.62), Nigeria (0.62), Iraq (0.38). Risk "16. In-
terstate conflict with regional consequences" is between
the U.S. and Iraq in "Iraq War". Risk "17. Large-scale
terrorist attacks" is in Pakistan "Terrorism in Pak-
istan" and Nigeria "Islamist insurgency in Nigeria".
Risk "18. State collapse or crisis" is in Thailand "Thai
coup d'tat", Egypt "Egyptian coup d'tat", and Syria
"Syrian civil war". Risk "19. Weapons of mass destruc-
tion" is in North Korean "North Korean nuclear test"
and Iran "Nuclear program of Iran".
Societal risks, are often a consequence of geopolit-
ical risks, and usually occur in the same countries as
the latter group of risks does, such as Egypt (1.00),
Syria (0.98), Yemen (0.80), Libya (0.77), Tunisia (0.77),
China (0.76), Russia (0.76), Saudi Arabia (0.73). The
most influential story in Egypt is "Egyptian Revolu-
0.00.20.30.50.70.81.0Societal0.00.20.30.50.70.81.0Technological8
Niu, Korniss, Szymanski
tion of 2011", in Syria "Syrian civil war", in Yemen
"Yemeni Revolution", in Libya "Libyan civil war", in
Tunisia "Tunisian Revolution", in China "2009 rmqi ri-
ots", in Russia "Snow Revolution", and in Saudi Arabia
"Arab Spring".
Technological risks frequently happen either in a sci-
entifically developed country such as U.S. (1.00) and
U.K. (0.51) or in an unstable nations such as Egypt
(0.85), Syria (0.66), Iraq (0.51), Pakistan (0.51), North
Korea (0.51). When information technology is highly
developed, risk "29. Massive incident of data fraud/theft"
is often active because of a massive amount of official
and personal data online, such as "United States diplo-
matic cables leak" in the U.S. and "News International
phone hacking scandal" in the U.K. Related geopolitical
risks may also cause other technological risks. For ex-
ample, in Egypt, a long-lasting internet blackout and
censorship was triggered by "Egyptian Revolution of
2011"; in North Korea, risk "28. Large-scale cyberat-
tacks" was caused by "2013 Korean crisis".
find that the economic risks arise in countries with high
volume of trade. The environmental risks are common
in coastal areas. The geopolitical risks are concentrated
mainly in the Middle East. Most of the societal risks
are the consequences of geopolitical risks and thus oc-
cur in the same countries as the former. The technolog-
ical risks arise in scientifically developed countries and
in the countries in conflict with other nations.
Acknowledgment
This work was supported in part by the Army Research
Office under grant W911NF-16-1-0524 and by the Army
Research Laboratory under Cooperative Agreement Num-
ber W911NF-09-2-0053 (NS CTA). The views and con-
clusions contained in this document are those of the
authors and should not be interpreted as representing
the official policies either expressed or implied of the
Army Research Laboratory or the U.S. Government.
5 Conclusion
References
Our paper contributes the first event-driven analysis of
global risks using the complete Wikipedia Event Por-
tal dataset over the years 2000 to 2014. To overcome
the limitation of risk-event manual annotation used in
the current research [11, 13], here we introduce a novel
risk auto-detection module, which filters out over 80%
of data about the non-relevant events and reduces sig-
nificantly volume of data to be manually labeled. This
approach can be used in other machine learning sce-
narios when the true negative instances account for
a large proportion of the dataset during the super-
vised learning classification. With the help from auto-
detection tool and sufficient effort devoted to manual la-
beling, we created the complete and structured dataset
from Wikipedia Event Portal, which can be studied in-
depth in the future. This data set contains two thou-
sand labeled risk events extracted from over 50 thou-
sand events. These labeled risks are structured hierar-
chically with events linked to stories, locations, dates,
categories, and references creating a knowledge net-
work.
From this rich dataset, we build a relational net-
work, which is surprisingly similar to the network cre-
ated by the WEF experts [1]. Moreover, the differences
between the two networks reflect the differences in risk
views of the expert and the public. The experts show
concerns about yet unseen risks that may arise in the fu-
ture or have an enormous impact on all humanity, while
the public tends to focus on risks that matter more to
everyday life. By studying the local effects of risks, we
1. World Economic Forum Global Risks Report.
URL https://www.weforum.org/reports/
(2016).
the-global-risks-report-2016. Accessed: 2018-07-31
2. D.H. Erkens, M. Hung, P. Matos, Journal of corporate
finance 18(2), 389 (2012)
3. R.A. Pielke Jr, J. Gratz, C.W. Landsea, D. Collins, M.A.
Saunders, R. Musulin, Natural Hazards Review 9(1), 29
(2008)
4. J. Lee Ray, Conflict Management and Peace Science
20(2), 1 (2003)
5. P.A. Sanchez, Science 295(5562), 2019 (2002)
6. T. Pogge, Ethics & international affairs 19(1), 1 (2005)
7. T. Rid, B. Buchanan, Journal of Strategic Studies 38(1-
2), 4 (2015)
8. L. Harding, The Guardian 5 (2016)
9. X. Lin, A. Moussawi, G. Korniss, J.Z. Bakdash, B.K.
Szymanski, Scientific reports 7(1), 6699 (2017)
10. D. Baloi, A.D. Price, International journal of project
management 21(4), 261 (2003)
11. B.K. Szymanski, X. Lin, A. Asztalos, S. Sreenivasan, Sci.
Rep. 5(10998) (2015)
12. X. Niu, A. Moussawi, N. Derzsy, X. Lin, G. Korniss, B.K.
Szymanski, in International Workshop on Complex Net-
works and their Applications (Springer, 2017), pp. 1124 --
1134
13. X. Niu, A. Moussawi, G. Korniss, B.K. Szymanski, Ap-
plied Network Science 3(1), 24 (2018)
14. Wikipedia event portal
URL https://
en.wikipedia.org/wiki/Portal:Current_events. Ac-
cessed: 2019-05-22
(2019).
15. G.B. Tran, M. Alrifai, in Proceedings of the 23rd Inter-
national Conference on World Wide Web (ACM, 2014),
pp. 511 -- 516
Appendix: Tables 4-8
Supervised Learning of the Global Risk Network Activation
9
ID
Risk
1
2
3
4
5
6
7
8
9
Asset bubbles in a major
economy
Deflation in a major
economy
Failure of a major financial mechanism or
institution
Failure/shortfall of critical infrastructure
Fiscal crises in key
economies
High structural unemployment or
underemployment
Illicit trade
Severe energy price shock
Unmanageable inflation
Tag
housing bubble
stock bubble
commodity bubble
asset bubble
deflation
decline in prices
bank failure
financial crisis
oil/gas network failure
water supply failure
power grid failure
civil flight failure
sovereign debt crisis
liquidity crisis
unemployment
drug trade
smuggling
tax evasion
money laundering
human trafficking
counterfeiting
energy price shock
inflation
rising good price
Keyword
housing, mortgage, estate
share, stock, exchange
commodit-
liquidity, asset
deflation
price
bank
financial
pipe
pipe
power, grid, electricity, blackout
flight, airport, airline, plane,
aircraft
debt, loan, lend
liquid
employ, job
drug
smuggl-
tax
launder
trafficking
counterfeit
price, oil, gas
inflation
price
Table 4 Economic risks and subordinate tags. Each tag corresponds to a list of the roots of keywords.
ID
10
11
12
13
14
Risk
Extreme weather events
Failure of climate-change mitigation and
adaptation
Major biodiversity loss and ecosystem
collapse
Major natural disasters
Man-made environmental damage and
disasters
Tag
storm
blizzard
torrential rain
flood
death
missing
injury
homeless
damage
economic loss
ecosystem collapse
biodiversity loss
earthquake
volcanic activity
tsunami
landslide
natural wildfire
radioactive contamination
environment contamination
urban pollution
oil spill
manmade wildfire
Keyword
hurricane, storm, typhoon, cyclone
snow, blizzard, hailstone
rain
flood
death, dead, die, toll, kill, corpse
missing, disappear
injur-, hurt, wound
home
collaps, damage, destory
cost, loss, dollar, usd, euro, $, e
ecosystem
biodiversity, species, wildlife
earthquake, temblor
volcan-
tsunami
slide
wildfire
radioact-
contamin-
pollution
oil, spill
wildfire
Table 5 Environmental risks and and their corresponding tags. Each tag must match at least one entry in the list of the roots
of keywords.
ID
15
16
17
18
19
Risk
Failure of national governance
Interstate conflict with regional
consequences
Large-scale terrorist attacks
State collapse or crisis
Weapons of mass destruction
Tag
corruption
trade war
military war
terrorist attack
military coup
civil war
nuclear weapon
Keyword
corruption
trade, currency
military, invasion, occupation,
conflict
terror
coup
civil, war
nuclear
Table 6 Geopolitical risks and and their corresponding tags. Each tag must match at least one entry in the list of the roots
of keywords.
Tag
urban pollution
factory explosion
building collapse
starvation
crop destruction
low quality of food
rising food price
food shortage
evacuation
refugee flee
migration
eviction
riot
unrest
demonstration
march
revolution
avian influenza
swine influenza
equine influenza
aids
cholera
fever
diarrhea
ebola
epidemic
Niu, Korniss, Szymanski
Keyword
pollution
factory
collapse
starv-, hunger, famin-
crop, agricult-
poison, taint, contaminat-, poultry,
meat, pork
price
shortage, suppl-
evacuat-, evacuee
refugee, flee
migrant, migrate
evict
riot
unrest
demonstration
march
revolution
bird, avian, h5n1, h6n1, h7n9
h1n1, swine
equine
aids, hiv
cholera
fever
diarrhea
ebola
epidemic, outbreak, pandemic
thirst, shortage, deprivat-, suppl-
water
10
ID
20
21
Risk
Failure of urban planning
Food crises
22
Large-scale involuntary migration
23
Profound social instability
Rapid and massive spread of infectious
diseases
24
25
Water crises
water shortage
water contamination
Table 7 Societal risks and and their corresponding tags. Each tag must match at least one entry in the list of the roots of
keywords.
ID
26
27
28
Risk
Adverse consequences of technological
advances
Breakdown of critical information
infrastructure
Large-scale cyberattacks
29
Massive incident of data fraud/theft
Tag
genetically modified food
radioactive contamination
pyrotechnics
internet blackout
satellite break
cyberattack
malware
computer worm
software virus
trojan horse
hacking attack
DOS attack
online attack
data leak
hacking data
Keyword
genetic
radioact-
pyrotech-
internet
satellite
cyber
malware
worm
virus
trojan
hack
denial
online
leak, classified, secret
hack
Table 8 Technological risks and and their corresponding tags. Each tag must match at least one entry in the list of the roots
of keywords.
|
1806.11316 | 1 | 1806 | 2018-06-29T09:36:46 | Fake News Identification on Twitter with Hybrid CNN and RNN Models | [
"cs.SI",
"cs.CL"
] | The problem associated with the propagation of fake news continues to grow at an alarming scale. This trend has generated much interest from politics to academia and industry alike. We propose a framework that detects and classifies fake news messages from Twitter posts using hybrid of convolutional neural networks and long-short term recurrent neural network models. The proposed work using this deep learning approach achieves 82% accuracy. Our approach intuitively identifies relevant features associated with fake news stories without previous knowledge of the domain. | cs.SI | cs | Fake News Identification on Twitter with
Hybrid CNN and RNN Models
Deepayan Bhowmik
C3Ri Research Institute
Sheffield Hallam University
United Kingdom
[email protected]
Shahrzad Zargari
C3Ri Research Institute
Sheffield Hallam University
United Kingdom
[email protected]
doctored stories on social media including microblogs such
as Twitter. All over the world, the growing influence of
fake news is felt on daily basis from politics to education
and financial markets. This has continually become a cause
of concern for politicians and citizens alike. For example,
on April 23rd 2013, the Twitter account of the news
agency, Associated Press, which had almost 2 million
followers at the time was hacked.
Figure 1: Tweet allegedly sent by the Syrian
Electronic Army from hacked Twitter account of
Associated Press
The impact may also be severe. The following message
was sent, "Breaking: Two Explosions in the White House
and Barack Obama is injured" (shown in Figure 1). This
message led to a flash crash on the New York Stock
Exchange, where investors lost 136 billion dollars on the
Standard & Poors Index in two minutes [1]. It would be
interesting and indeed beneficial if the origin of messages
could be verified and filtered where the fake messages were
separated from authentic ones. The information that people
listen to and share in social media is largely influenced by
the social circles and relationships they form online [2].
The feat of accurately tracking the spread of fake messages
and especially news content would be of interest to
researchers, politicians, citizens as well as individuals all
around the world. This can be achieved by using effective
and relevant "social sensor tools" [3]. This need is more
important in countries that have trusted and embraced
technology as part of their electoral process and thus
adopted e-voting. [4] For example, in France and Italy,
Oluwaseun Ajao
C3Ri Research Institute
Sheffield Hallam University
United Kingdom
[email protected]
ABSTRACT
The problem associated with the propagation of fake news
continues to grow at an alarming scale. This trend has
generated much interest from politics to academia and
industry alike. We propose a framework that detects and
classifies fake news messages from Twitter posts using
hybrid of convolutional neural networks and long-short
term recurrent neural network models. The proposed work
using this deep learning approach achieves 82% accuracy.
Our approach
features
associated with fake news stories without previous
knowledge of the domain.
intuitively
identifies
relevant
CCS CONCEPTS
• Information systems → Social networking sites
KEYWORDS
Fake News, Twitter, Social Media
ACM Reference format:
Oluwaseun Ajao, Deepayan Bhowmik, and Shahrzad
Zargari. 2018. Fake News Identification on Twitter with
Hybrid CNN and RNN Models. In Proceedings of the
International Conference on Social Media & Society,
Copenhagen,
DOI:
https://doi.org/10.1145/3217804.3217917
(SMSociety).
Denmark
1
1 INTRODUCTION
The growing influence experienced by the propaganda
of fake news is now cause for concern for all walks of life.
Election results are argued on some occasions to have been
manipulated through the circulation of unfounded and
1 Permission to make digital or hard copies of part or all of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. Copyrights for third-
party components of this work must be honored. For all other uses, contact
the owner/author(s).
SMSociety, July 2018, Copenhagen, Denmark
© 2018 Copyright held by the owner/author(s). $15.00.
DOI: https://doi.org/10.1145/3217804.3217917
SMSociety, July 2018, Copenhagen, Denmark
Oluwaseun Ajao, Deepayan Bhowmik and Shahrzad Zargari
Table 1: Most Circulated and Engaging Fake News Stories on Facebook in 2016
S/N
1
2
3
4
5
6
7
8
9
10
Fake News Headline
Obama Signs Executive Order Banning The Pledge of Allegiance in Schools Nationwide
Woman arrested for defecating on boss' desk after winning the lottery
Pope Francis Shocks World, Endorses Donald Trump for President, Releases Statement
Trump Offering Free One-Way Tickets to Africa & Mexico for Those Who Wanna Leave America
Cinnamon Roll Can Explodes Inside Man's Butt During Shoplifting Incident
Florida Man dies in meth-lab explosion after lighting farts on fire
FBI Agent Suspected in Hillary email Leaks Found Dead in Apparent Murder-Suicide
RAGE AGAINST THE MACHINE To Reunite And Release Anti Donald Trump Album
Police Find 19 White Female Bodies In Freezers With "Black Lives Matter" Carved Into Skin
ISIS Leader calls for American Muslim Voters to Support Hillary Clinton
Category
Politics
Crime
Politics
Politics
Crime
Crime
Politics
Politics
Crime
Politics
even though internet users may not accurately represent the
demographics of the entire population, opinions on social
media and mass surveys of citizens are correlated. They are
both found to be largely influenced by external factors such
as news stories from newspapers, TV and ultimately on
social media.
In addition, there is a growing and alarming use of social
media for anti-social behaviors such as cyberbullying,
propaganda, hate crimes, and for radicalization and
recruitment of individuals into terrorism organizations such
as ISIS [5]. A study by Burgess et al. into the top 50 most
retweeted stories with pictures of the Hurricane Sandy
disaster found that less than 25% were real while the rest
were either fake or from unsubstantiated sources [6].
Facebook announced the use of "filters" for removing
hoaxes and fake news from the news feed on the world's
largest social media platform [7]. The development
followed concerns that the spread of fake news on the
platform might have helped Donald Trump win the US
presidential elections held in 2016 [8]. According to the
social media site, 46% of the top fake news stories
circulated on Facebook were about US politics and election
[9]. Table 1 gives detail of the top ranking news stories that
were circulated on Facebook in year 2016.
Tambuscio et al proposed a model for tracking the
spread of hoaxes using four parameters: spreading rate,
gullibility, probability to verify a hoax, and forgetting one's
current belief[10]. Many organizations now employ social
media accounts on Twitter, Facebook and Instagram for the
purposes of announcing corporate information such as
earnings reports and new product releases. Consumers,
investors, and other stake holders take these news messages
as seriously as they would for any other mass media [11].
Other reasons that fake news have been widely proliferated
include for humor, and as ploys to get readers to click on
sponsored content (also referred to as "clickbait".
In this work, we aim to answer the following research
questions:
• Given tweets about a news item or story, can we
determine their truth or authenticity based on the
content of the messages?
• Can semantic features or linguistic characteristics
associated with a fake news story on Twitter be
automatically identified without prior knowledge
of the domain or news topic?
The remainder of the paper is structured as follows: in
Section 2, we discuss related works in rumor and fake news
detection, Section 3 presents the methodology that we
propose and utilize in our task of fake news detection,
while the results of our findings are discussed and
evaluated in Section 4. Finally, conclusions and future
work are presented in Section 5.
2 RELATED WORKS
its platform,
The work on fake news detection has been initially
reviewed by several authors, who in the past referred to it
only "rumors", until 2016 and the US presidential election.
During the election, the phrase "fake news" became
popular with then-candidate, Donald Trump. Until recently,
Twitter allowed their users to communicate with 140
characters on
to
communicate with others. Therefore, users who propagate
fake news, rumors and questionable posts have been found
to incorporate other mediums to make their messages go
viral. A good example happened in the aftermath of
Hurricane Sandy, where enormous amounts of fake and
altered images were circulating on the internet. Gupta et al
used a Decision Tree classifier to distinguish between fake
and real images posted about the event[12].
limiting users ability
Neural networks are a form of machine learning method
that have been found to exhibit high accuracy and precision
in clustering and classification of text [13]. They also prove
effective in the prompt detection of spatio-temporal trends
in content propagation on social media. In this approach,
we combine this with the efficiency of recurrent neural
networks
semantic
interpretation of images. Although this hybrid approach in
semantic interpretation of text and images is not new
[14][15], to the best of our knowledge, this is the first
attempt involving the use of a hybrid approach in the
detection of the origin and propagation of fake news posts.
Kwon et al identified and utilized three hand-crafted feature
the detection and
(RNN)
in
Fake News Identification on Twitter
types associated with rumor classification including: (1)
Temporal features - how a tweet propagates from one time
window to another; (2) Structural Features - how the
influence or followership of posters affect other posts; and
(3) Linguistic Features - sentiment categories of words[16].
Previous work done by Ferrara achieved 97% accuracy
in detecting fake images from tweets posted during the
Hurricane Sandy disaster in the United States They
performed a characterization analysis, to understand the
temporal, social reputation and influence patterns for the
spread of fake images by examining more than 10,000
images posted on Twitter during the incident[12]. They
used two broad types of features in the detection of fake
images posted during the event. These include seven user-
based features such as age of the user account, followers'
size and the follower-followee ratio. They also deduced
eighteen tweet-based features such as tweet length, retweet
count, presence of emoticons and exclamation marks.
Aggarwal et al had identified four certain features
based on URLs, protocols to query databases content and
followers networks of tweets associated with phishing,
which present a similar problem to fake and non-credible
tweets but in their case also have the potential to cause
significant financial harm to someone clicking on the links
associated with these "phishing" messages[17].
Yardi et al developed three feature types for spam
detection on Twitter; which includes searches for URLs,
matching username patterns, and detection of keywords
from supposedly spam messages[18]. O'Donovan et al
identified the most useful indicators of credible and non-
credible tweets as URLs, mentions, retweets, and tweet
lengths[19].
Other works on the credibility and veracity identification
on Twitter include Gupta et al that developed a framework
and real-time assessment system for validating authors
content on Twitter as they are being posted[20]. Their
approach assigns a graduated credibility score or rank to
each tweet as they are posted live on the social network
platform.
3 METHODOLOGY
The approach of our work is twofold. First is the
automatic identification of features within Twitter post
without prior knowledge of the subject domain or topic of
discussion using the application of a hybrid deep learning
model of LSTM and CNN models. Second
the
determination and classification of fake news posts on
Twitter using both text and images.
We posit that since the use of deep learning models
enables automatic feature extraction, the dependencies
amongst the words in fake messages can be identified
automatically [13] without expressly defining them in the
network. The knowledge of the news topic or domain being
is
SMSociety, July 2018, Copenhagen, Denmark
discussed would not be necessary to achieve the feat of
fake news detection.
3.1 The Deep learning Architectures
We implemented three deep neural network variants.
The models applied to train the datasets include:
for
3.1.1 Long-Short Term Memory (LSTM)
LSTM recurrent neural network (RNN) was adopted for
the sequence classification of the data. The LSTM [7]
remains a popular method
learning
classification involving text since when they first appeared
20 years ago [22]
the deep
LSTM with dropout regularization
3.1.2
LSTM with dropout regularization [23] layers between
the word embedding layer and the LSTM layer was
adopted to avoid over-fitting to the training dataset.
Following
this approach, we randomly selected and
dropped weights amounting to 20% of neurons in the
LSTM layer.
3.1.3 LSTM with convolutional neural networks (CNN)
We included a 1D CNN [14] immediately after the word
embedding layer of the LSTM model. We further added a
max pooling layer to reduce dimensionality of the input
layer while preserving the depth and avoid over-fitting of
the training data. This also helps in reducing computational
time and resources in the training of the model. The overall
aim is to ultimately improve model prediction accuracy.
3.2 About the Dataset
The dataset consisted of approximately 5,800 tweets
centered on five rumor stories. The tweets were collected
and used in the works by Zubiaga et al[24. The dataset
consisted of original tweets and they were labeled as rumor
and non-rumors. The events were widely reported in online,
print and conventional electronic media such radio and
Television at the time of occurrence:
• CharlieHebdo
• SydneySiege
• Ottawa Shooting
• Germanwings-Crash
• Ferguson Shooting
We applied ten-fold cross validation on the entire dataset
of 5,800 tweets and performed padding of the tweets (i.e.,
adding zeros to the tweets for uniform inclusion in the
feature vector for analysis and processing).
3.3 Recurrent Neural Network (RNNs)
This type of neural network has been shown to be effective
in time and sequence based predictions [25]. Twitter posts
can be likened to events that occur in time [16] where the
intervals between the retweet of one user to another is
contained within a time window and treated in sequential
modes. Rumors have been examined in the context of
SMSociety, July 2018, Copenhagen, Denmark
varying time windows [26]. Recurrent Neural Networks
were initially limited by the problem associated with the
adjustment of weights over time. Several methods have
been adopted in solving the vanishing gradient problem but
can largely be categorized into two types, namely, the
exploding gradient and the vanishing gradient. Solutions
adopted for the former include truncated back propagation,
penalties and gradient clipping (these resolve the exploding
gradient problem), while the vanishing gradient problem
has been resolved using dynamic weight initializations, the
echo state networks (ESN) and Long-Short Term Memory
(LSTMs). LSTMs will be the main focus of this work as
they preserve the memory from the last phase and
incorporate this in the prediction task of the neural network
model. Weights are the long term memories of the neural
network.
3.4 Incorporating Convolutional Neural Network
Another popular model is the convolutional neural network
(CNN) which has been well known for its application in
image processing as well as use in text mining [27]. We
posit that addition of the hybrid method would improve
performance of the model and give much better results for
the content based fake news detection. However, the hybrid
implementation for this work so far involves a text-only
approach.
3.5 Selection of Training Parameters
The following hyper-parameters were optimized using a
grid search approach and optimal values derived for the
following batch size, epochs, learning rates, activation
function and dropout regularization rate which is set at
20%. This hybrid method of detecting fake news using this
approach complements the natural language semantic
processing of text by ensuring that images allow for the
disambiguation of posts and making them more enriched in
the identification repository. We posit that it would also be
interesting to look at users' impact in the propagation of
these messages and fake news content on Twitter.
The aim of the study is to detect the veracity of posts on
law
Twitter. Possible applications
enforcement agencies
the spread and
propagation of such messages, especially when they have
negative implications and consequences for readers who
believe them.
include assisting
in curtailing
4 EVALUATION, RESULTS AND DISCUSSION
Our deep learning model intuitively achieves 82% accuracy
on the classification task in detecting fake news posts
without prior domain knowledge of the topics being
discussed. So far in the experiments completed, it is
revealed that the plain vanilla LSTM model achieved the
best performance
terms of precision, recall and
FMeasure and an accuracy of 82% as shown in Table 2. On
in
Oluwaseun Ajao, Deepayan Bhowmik and Shahrzad Zargari
for
the
reason
the network. Another
the other hand,
the LSTM method with dropout
regularization performed the least in terms of the metrics
adopted. This is likely a result of under fitting the model, in
addition to the lack of sufficient training data and examples
within
low
performance of the dropout regularization may be the depth
of the network, as it is relatively shallow, resulting in the
drop-out layer being quite close to the input and output
layers of the model. This could severely degrade the
performance of the method. An alternative to improve
model performance could be through Batch Normalization
[28], where the input values in the layers have a mean
activation of zero and standard deviation of one as in a
standard normal distribution; this is beyond the scope of
this current work.
The LSTM-CNN hybrid model performed better than
the dropout regularization model, with a 74% accuracy and
an FMeasure of 39.7%. However insufficient training
examples for the neural network model led to negative
appreciation against the plain-vanilla LSTM model.
The precision of 68% achieved by the state of the art
PHEME dataset by [24] was still higher than the results
obtained so far. However we believe that with the inclusion
of more training data from the reactions to the original
twitter posts, there will be more significant improvement in
model performance.
5 CONCLUSION AND FUTURE WORK
We have presented a novel approach for the detection of
fake news spread on Twitter from message text and images.
We achieved an 82% accuracy performance beating the
state of the art on the PHEME Dataset. It is expected that
our approach will achieve much better results following
incorporation of fake image disambiguation (found in these
tweets aimed at making the posts go viral).
We leverage on a hybrid implementation of two deep
learning models to find that we do not require a very large
number of tweets about an event to determine the veracity
or credibility of the messages. Our approach gives a boost
in the achievement of a higher performance while not
requiring a
typically
associated with deep learning models. We are progressively
examining the inference of the tweet geo-locations and
origin of these fake news items and the authors that
large amount of
training data
Table 2: Proposed Deep Learning Methods in
Fake News Detection
Technique
LSTM
LSTMDrop
LSTM-CNN
propagate them. It would be interesting if also the training
data required in this task was relatively smaller such that
F-M
40.59
30.93
39.70
ACC
82.29
73.78
80.38
REC
40.55
29.71
39.53
PRE
44.35
39.67
43.94
SMSociety, July 2018, Copenhagen, Denmark
IEEE Conference on Computer Vision and Pattern Recognition.
3128–3137.
[15] JiangWang, Yi Yang, Junhua Mao, Zhiheng Huang, Chang Huang,
and Wei Xu. 2016. Cnn-rnn: A unified framework for multi-label
image classification. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition. 2285–2294.
[16] Sejeong Kwon, Meeyoung Cha, Kyomin Jung, Wei Chen, and Yajun
Wang. 2013. Prominent features of rumor propagation in online social
media. In Data Mining (ICDM), 2013 IEEE 13th International
Conference on. IEEE, 1103–1108.
[17] Anupama Aggarwal, Ashwin Rajadesingan, and Ponnurangam
Kumaraguru.2012. Phishari: automatic realtime phishing detection on
twitter. In eCrime Researchers Summit (eCrime), 2012. IEEE, 1–12.'
[18] Sarita Yardi, Daniel Romero, Grant Schoenebeck, et al. 2009.
Detecting spam in a twitter network. First Monday 15, 1 (2009).
[19] John O'Donovan, Byungkyu Kang, Greg Meyer, Tobias Hollerer, and
Sibel Adalii. 2012. Credibility in context: An analysis of feature
distributions
in twitter. In Privacy, Security, Risk and Trust
(PASSAT), 2012 international conference on and 2012 international
conference on social computing (SocialCom). IEEE, 293–301.
[20] Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick
Meier. 2014. Tweetcred: Real-time credibility assessment of content
on twitter. In International Conference on Social Informatics.
Springer, 228–243.
[21] Klaus Greff, Rupesh K Srivastava, Jan Koutník, Bas R Steunebrink,
and Jürgen Schmidhuber. 2017. LSTM: A search space odyssey.
IEEE transactions on neural networks and learning systems 28, 10
(2017), 2222–2232.
[22] Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term
memory. Neural computation 9, 8 (1997), 1735–1780.
[23] Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever,
and Ruslan Salakhutdinov. 2014. Dropout: A simple way to prevent
neural networks from overfitting. The Journal of Machine Learning
Research 15, 1 (2014), 1929–1958.
[24] Arkaitz Zubiaga, Maria Liakata, and Rob Procter. 2016. Learning
Reporting Dynamics during Breaking News for Rumour Detection in
Social Media. arXiv preprint arXiv:1610.07363 (2016).
[25] Jing Ma, Wei Gao, Zhongyu Wei, Yueming Lu, and Kam-Fai Wong.
2015. Detect rumors using time series of social context information
on microblogging websites. In Proceedings of the 24th ACM
International Conference
on
and Knowledge
Management. ACM, 1751–1754
Information
[26] Sejeong Kwon, Meeyoung Cha, and Kyomin Jung. 2017. Rumor
detection over varying time windows. PloS one 12, 1 (2017),
e0168344.
[27] Shiou Tian Hsu, Changsung Moon, Paul Jones, and Nagiza Samatova.
2017. A Hybrid CNN-RNN Alignment Model for Phrase-Aware
Sentence Classification. In Proceedings of the 15th Conference of the
European Chapter of the Association for Computational Linguistics:
Volume 2, Short Papers, Vol. 2. 443–449.
[28] Sergey Ioffe and Christian Szegedy. 2015. Batch normalization:
Accelerating deep network training by reducing internal covariate
shift. In International conference on machine learning. 448–456.
[29] Oluwaseun Ajao, Jun Hong, and Weiru Liu. 2015. A survey of
location inference techniques on Twitter. Journal of Information
Science 41, 6(2015), 855–864.
Fake News Identification on Twitter
fake news items can be quickly identified. It would be
further beneficial if the origin and location [29] of fake
posts were tracked with minimal computational resources.
Deep learning models such as CNN and RNN often
require much larger datasets, and in some cases multiple
layers of neural networks for the effective training of their
models. In our case, we have a small dataset of 5,800
tweets. In our ongoing and future work we have collected
the reactions of other users to these messages via the
Twitter API in the magnitude of hundreds of thousands,
with the aim of enriching the size of the training dataset
and
the model
performance. We expect that this will also help to draw
more actionable insights for the propagation of these
messages from one user to another and how they react-
specifically if they embraced or refrained from becoming
evangelists and promoters of these messages to other users
on the platform.
robustness of
improving
thus
the
REFERENCES
[1] J Keller. 2013. A fake AP tweet sinks the DOWfor an instant.
Bloomberg Businessweek (2013).
[2] Jure Leskovec and Julian J Mcauley. 2012. Learning to discover
social circles in ego networks. In Advances in neural information
processing systems. 539–547.
[3] Steve Schifferes, Nic Newman, Neil Thurman, David Corney, Ayse
Göker, and Carlos Martin. 2014. Identifying and verifying news
through social media: Developing a user-centred tool for professional
journalists. Digital Journalism 2, 3 (2014), 406–418.
[4] Andrea Ceron, Luigi Curini, Stefano M Iacus, and Giuseppe Porro.
2014. Every tweet counts? How sentiment analysis of social media
can improve our knowledge of citizens' political preferences with an
application to Italy and France. New Media & Society 16, 2 (2014),
340–358.
[5] Emilio Ferrara. 2015. Manipulation and abuse on social media by
emilio ferrara with ching-man au yeung as coordinator. ACM
SIGWEB Newsletter Spring (2015), 4.
[6] Jean Burgess, Farida Vis, and Axel Bruns. 2012. Hurricane Sandy:
The Most Tweeted Pictures. The Guardian Data Blog, November 6
(2012).
[7] BBC. 2017. Facebook to tackle fake news in Germany 2017. (2017).
[8] Olivia Solon. 2016. Facebook's failure: Did fake news and polarized
politics get Trump elected. The Guardian 10 (2016).
from
2016.
[9] Craig Silverman. 2016. Here are 50 of the biggest fake news hits on
https://www.
Facebook
buzzfeed.com/craigsilverman/top-fake-news-of-2016 (2016).
BuzzFeed,
[10] Marcella Tambuscio, Giancarlo Ruffo, Alessandro Flammini, and
Filippo Menczer. 2015. Fact-checking effect on viral hoaxes: A
model of misinformation spread in social networks. In Proceedings of
the 24th International Conference on World Wide Web. ACM, 977–
982.
[11] Andreas M Kaplan and Michael Haenlein. 2010. Users of the world,
unite! The challenges and opportunities of Social Media. Business
horizons 53, 1 (2010), 59–68.
[12] Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and
Anupam Joshi. 2013. Faking sandy: characterizing and identifying
fake images on twitter during hurricane sandy. In Proceedings of the
22nd international conference on World Wide Web. ACM, 729–736.
[13] Jing Ma, Wei Gao, Prasenjit Mitra, Sejeong Kwon, Bernard J Jansen,
Kam-Fai Wong, and Meeyoung Cha. 2016. Detecting Rumors from
Microblogs with Recurrent Neural Networks.. In IJCAI. 3818–3824.
[14] Andrej Karpathy and Li Fei-Fei. 2015. Deep visual-semantic
alignments for generating image descriptions. In Proceedings of the
|
1702.05379 | 2 | 1702 | 2017-03-16T10:08:20 | Why We Read Wikipedia | [
"cs.SI",
"cs.DL",
"cs.HC"
] | Wikipedia is one of the most popular sites on the Web, with millions of users relying on it to satisfy a broad range of information needs every day. Although it is crucial to understand what exactly these needs are in order to be able to meet them, little is currently known about why users visit Wikipedia. The goal of this paper is to fill this gap by combining a survey of Wikipedia readers with a log-based analysis of user activity. Based on an initial series of user surveys, we build a taxonomy of Wikipedia use cases along several dimensions, capturing users' motivations to visit Wikipedia, the depth of knowledge they are seeking, and their knowledge of the topic of interest prior to visiting Wikipedia. Then, we quantify the prevalence of these use cases via a large-scale user survey conducted on live Wikipedia with almost 30,000 responses. Our analyses highlight the variety of factors driving users to Wikipedia, such as current events, media coverage of a topic, personal curiosity, work or school assignments, or boredom. Finally, we match survey responses to the respondents' digital traces in Wikipedia's server logs, enabling the discovery of behavioral patterns associated with specific use cases. For instance, we observe long and fast-paced page sequences across topics for users who are bored or exploring randomly, whereas those using Wikipedia for work or school spend more time on individual articles focused on topics such as science. Our findings advance our understanding of reader motivations and behavior on Wikipedia and can have implications for developers aiming to improve Wikipedia's user experience, editors striving to cater to their readers' needs, third-party services (such as search engines) providing access to Wikipedia content, and researchers aiming to build tools such as recommendation engines. | cs.SI | cs | Why We Read Wikipedia
Philipp Singer∗1, Florian Lemmerich∗1, Robert West†2,
Leila Zia3, Ellery Wulczyn3, Markus Strohmaier1, Jure Leskovec4
1GESIS & University of Koblenz-Landau, 2EPFL, 3Wikimedia Foundation, 4Stanford University
[email protected], [email protected], [email protected], [email protected]
7
1
0
2
r
a
M
6
1
]
I
S
.
s
c
[
2
v
9
7
3
5
0
.
2
0
7
1
:
v
i
X
r
a
ABSTRACT
Wikipedia is one of the most popular sites on the Web, with
millions of users relying on it to satisfy a broad range of infor-
mation needs every day. Although it is crucial to understand
what exactly these needs are in order to be able to meet
them, little is currently known about why users visit Wikipe-
dia. The goal of this paper is to fill this gap by combining a
survey of Wikipedia readers with a log-based analysis of user
activity. Based on an initial series of user surveys, we build
a taxonomy of Wikipedia use cases along several dimensions,
capturing users' motivations to visit Wikipedia, the depth of
knowledge they are seeking, and their knowledge of the topic
of interest prior to visiting Wikipedia. Then, we quantify
the prevalence of these use cases via a large-scale user survey
conducted on live Wikipedia with almost 30,000 responses.
Our analyses highlight the variety of factors driving users
to Wikipedia, such as current events, media coverage of a
topic, personal curiosity, work or school assignments, or bore-
dom. Finally, we match survey responses to the respondents'
digital traces in Wikipedia's server logs, enabling the dis-
covery of behavioral patterns associated with specific use
cases. For instance, we observe long and fast-paced page
sequences across topics for users who are bored or exploring
randomly, whereas those using Wikipedia for work or school
spend more time on individual articles focused on topics
such as science. Our findings advance our understanding of
reader motivations and behavior on Wikipedia and can have
implications for developers aiming to improve Wikipedia's
user experience, editors striving to cater to their readers'
needs, third-party services (such as search engines) providing
access to Wikipedia content, and researchers aiming to build
tools such as recommendation engines.
Keywords: Wikipedia; survey; motivation; log analysis
1.
INTRODUCTION
Wikipedia is the world's largest encyclopedia and one of the
most popular websites, with more than 500 million pageviews
∗
†
Both authors contributed equally to this work.
Robert West is a Wikimedia Foundation Research Fellow.
©2017 International World Wide Web Conference Committee
(IW3C2), published under Creative Commons CC BY 4.0 License.
WWW 2017, April 3–7, 2017, Perth, Australia.
ACM 978-1-4503-4913-0/17/04.
http://dx.doi.org/10.1145/3038912.3052716
.
per day. It attracts millions of readers from across the globe
and serves a broad range of their daily information needs.
Despite this, very little is known about the motivations and
needs of this diverse user group: why they come to Wikipedia,
how they consume the content in the encyclopedia, and
how they learn. Without this knowledge, creating more
content, products, and services that ensure high levels of
user experience remains an open challenge [3, 8, 20, 43].
Background and objectives. A rich body of work has
investigated motivations and behavior patterns of users on
the Web [11, 21]. Specific attention has been cast on a
few major sites including search engines [6, 33, 41], and
social networking sites such as Twitter [15, 22] and Facebook
[34]. Yet, surprisingly little is known about the motivations,
needs, and behaviors of Wikipedia readers, possibly keeping
Wikipedia from reaching its full potential.
The vast literature on user behavior in Wikipedia (cf. Okoli
et al. [30] for an overview) has focused on content production.
It mainly investigates editors' motivations [1, 29], patterns
of editing behavior [16], and the quality of content [18, 39].
Much less is known about content consumption, even though
readers make up the majority of Wikipedia users. The
limited work on readers has focused on topics such as content
preferences [26, 32, 37], search queries leading to Wikipedia
[40], or navigation patterns [23, 31, 36, 42]. In contrast, the
present work aims at understanding why we read Wikipedia.
Materials and methods. We present a robust taxonomy of
use cases for reading Wikipedia, constructed through a series
of surveys based on techniques from grounded theory [38].
Initially, we administered a survey to elicit free text responses
to the question, Why are you reading this article today?
Based on the responses, we designed a taxonomy covering
three major dimensions that can be used to characterize the
observed use cases. After validating the robustness of our
taxonomy, we study the prevalence of use cases as measured
by a large-scale multiple-choice survey on English Wikipedia.
To correct for various forms of representation bias in our pool
of respondents, we use inverse propensity score weighting
adjustment. We then enrich the survey data by linking
each survey response to the respondent's behavior traces
mined from Wikipedia's webrequest logs. An illustration of
how both survey and log data are collected can be found
in Fig. 1. Finally, we use the joined survey and log data to
identify characteristic behavior patterns for reader groups
with specific intentions via subgroup discovery [14, 19].
Contributions and findings. The following are our three
main contributions: (i) We present a robust taxonomy for
characterizing use cases for reading Wikipedia (Sec. 2), which
ing on a subset of the 5,000 responses, without discussing
any expectations or definitions ahead of time. In the first
stage, all researchers worked together on 20 entries to build
a common understanding of the types of response. In the
second stage, based on the discussions of the first stage, tags
were generously assigned by each researcher individually to
100 randomly selected responses, for a total of 500 responses
tagged. All 500 tagged responses were reviewed, and four
main trends (motivation, information need, context, and
source) were identified, alongside tags associated with each
response. In the third stage, each researcher was randomly
assigned another 100 responses and assessed if they contained
information about the four main trends identified in the pre-
vious stage and if the trends and tags should be reconsidered.
The outcome of these stages revealed the following three
broad ways in which users interpreted the question; we use
them as orthogonal dimensions to shape our taxonomy:
• Motivation: work/school project, personal decision, cur-
rent event, media, conversation, bored/random, intrinsic
learning.
• Information need : quick fact look-up, overview, in-depth.
• Prior knowledge: familiar, unfamiliar.
Assessing the robustness of the taxonomy. We con-
ducted two surveys similar to Survey 1 on the Spanish and
Persian Wikipedias which resulted in similar observations
and dimensions as above. Additionally, we assessed the ro-
bustness of the above taxonomy in two follow-up surveys.
First, we ran a survey identical to Survey 1 to validate our
categories on unseen data (Survey 2; sampling rate 1:2000,
mobile, 3 days, 1,650 responses). No new categories were
revealed through hand-coding.
Second, we crafted a multiple-choice version of the free-
form surveys (Survey 3; sampling rate 1:200, desktop and
mobile, 6 days, about 10,500 responses). It comprised three
questions with the following answer options in random order
(the first two questions also offered "other" as an answer,
with the option to enter free-form text):
• I am reading this article because. . . : I have a work or school-
related assignment; I need to make a personal decision
based on this topic (e.g., buy a book, choose a travel
destination); I want to know more about a current event
(e.g., a soccer game, a recent earthquake, somebody's
death); the topic was referenced in a piece of media (e.g.,
TV, radio, article, film, book); the topic came up in a
conversation; I am bored or randomly exploring Wikipedia
for fun; this topic is important to me and I want to learn
more about it (e.g., to learn about a culture). Users could
select multiple answers for this question.
• I am reading this article to. . . : look up a specific fact or
to get a quick answer; get an overview of the topic; get an
in-depth understanding of the topic.
• Prior to visiting this article. . . : I was already familiar
with the topic; I was not familiar with the topic, and I am
learning about it for the first time.
Only 2.3% of respondents used the "other" option, and
hand-coding of the corresponding free-form responses did
not result in new categories. We thus conclude that our
categories are robust and use the resulting classification as
our taxonomy of Wikipedia readers in the rest of this paper.
Figure 1: Example Wikipedia reading session. The
user arrives from a search engine and visits the ar-
ticle about Oceania; she then navigates to Australia,
where she responds to our survey. Afterwards, the
reader goes back to the search engine and finally
visits the article about Nauru. This paper studies
survey responses as well as webrequest logs.
captures users' motivations to visit Wikipedia, the depth of
information they are seeking, and their familiarity with the
topic of interest prior to visiting Wikipedia. (ii) We quantify
the prevalence and interactions between users' motivations,
information needs, and prior familiarity via a large-scale
survey yielding almost 30,000 responses (Sec. 4.1). (iii) We
enhance our understanding of the behavioral patterns as-
sociated with different use cases by combining survey re-
sponses with digital traces recorded in Wikipedia's server
logs (Sec. 4.2).
Our analysis lets us conclude that there is a variety of
motivations bringing readers to Wikipedia, which can be
characterized by distinct behavioral patterns. For exam-
ple, users visiting Wikipedia out of boredom view multiple,
topically different articles in quick succession. While no
motivation clearly dominates, it is generally the case that
Wikipedia is used for shallow information needs (fact look-
up and overview) more often than for in-depth information
needs. Also, prior to reading an article, readers are familiar
with its topic about as often as not.
The outcomes of this research can help Wikipedia's edi-
tor and developer communities, as well as the Wikimedia
Foundation, to make more informed decisions about how to
create and serve encyclopedic content in the future.
2. TAXONOMY OF WIKIPEDIA READERS
Our research relies on a taxonomy of Wikipedia readers,
something that was previously absent from the literature. We
designed and analyzed a series of surveys based on techniques
from grounded theory [38] to build a robust categorization
scheme for Wikipedia readers' motivations and needs. In
this section, we explain the individual steps taken and the
resulting taxonomy.
Building the initial taxonomy. We started with an ini-
tial questionnaire (Survey 1), where a randomly selected
subgroup of English Wikipedia readers (sampling rate 1:200,
desktop and mobile, 4 days, about 5,000 responses) saw
a survey widget while browsing Wikipedia articles. If the
reader chose to participate, she was taken to an external site
(Google Forms) and asked to answer the question "Why are
you reading this article today?" in free-form text (100-charac-
ter limit).
To arrive at categories for describing use cases of Wikipedia
reading, five researchers performed three rounds of hand-cod-
Table 1: Features. This table describes all features utilized in this work. Survey features capture responses
to our survey questions; request features capture background information about the respondent mined from
webrequest logs; article features describe the requested Wikipedia article; and session/activity features are
derived from the entire reading session and beyond-session activity.
feature
motivation
information need
prior knowledge
country
continent
local time weekday
local time hour
host
referer class
article in-degree
article out-degree
article pagerank
article text length
article pageviews
article topics
description
Type of motivation for reading an article, as selected by respondent in survey. As multiple responses
were allowed, we work with boolean dummy variables for each motivation.
Information need for reading an article, as selected by respondent in survey.
Prior knowledge about the topic before visiting the article, as selected by respondent in survey.
Country code of respondent in survey (e.g., USA) derived from the IP address.
Continent of respondent in survey (e.g., North America) derived from the IP address.
Local weekday of survey request detected by timezone information (Mon-Sun).
Local hour of survey request detected by timezone information (0-24).
Requested Wikipedia host: "desktop" (en.wikipedia.org), or "mobile web" (en.m.wikipedia.org).
Referer class of request (none, internal, external, external search engine, or unknown).
The topological in-degree of an article.
The topological out-degree of an article.
The unnormalized pagerank of an article; calculated with damping factor of 0.85.
The text length of an article as extracted from HTML-number of characters.
The sum of pageviews for the article in same time period as survey.
Probability vector for 20 topics as extracted by LDA from a bag-of-words representation. Topics
were manually labeled as follows: (1) transportation & modern military, (2) biology & chemistry, (3)
South Asia, Middle East, (4) mathematics, (5) 21st century, (6) TV, movies, & novels, (7) Britain
& Commonwealth, (8) East Asia, (9) Spanish (stubs), (10) war, history, (11) geography (unions,
trade), (12) literature, art, (13) education, government, law, (14) 20th century, (15) sports, (16)
United States, (17) numbers, (18) technology, energy, & power, (19) music, and (20) geographical
entities. We use the probabilistic topic distribution as 20 individual features for each article.
Measures the topic specificity of an article from LDA probability vector.
The number of requests within the session.
Total time spent in the session in minutes.
Average time difference between subsequent session requests (i.e., dwelling time).
y
e
v
r
u
s
t
s
e
u
q
e
r
e
l
c
i
t
r
a
y
t
i
v
i
t
c
a
/
n
o
i
s
s
e
s
article topic entropy
session length
session duration
avg. time difference
avg. pagerank difference Average pagerank difference between subsequent session requests (i.e., stating whether readers move
avg. topic distance
referer class frequency
session article frequency
session position
num. of sessions
num. of requests
to periphery or core).
Average Manhattan distance between topic distributions for subsequent session requests (i.e.,
capturing topical changes).
For each referer class (see survey features): frequency in session.
The number of times requested article for survey response occurs within the session.
Relative position inside a session when answering the survey.
The total number of sessions for respondent in survey time period.
The total number of requests for respondent in survey time period.
3. DATASETS AND PREPROCESSING
Here, we describe utilized datasets and preprocessing.
3.1 Survey
To quantify the prevalence of the driving factors specified
by our taxonomy, we ran an additional large-scale survey on
English Wikipedia consisting of the same three questions on
motivation, depth of information need, and prior knowledge
as Survey 3 (Sec. 2). The survey was run at a sampling rate of
1:50 from 2016-03-01 to 2016-03-08 on all requests to English
Wikipedia's mobile and desktop sites. It was not shown on
non-article pages (discussion pages, search pages, etc.), on
the main page of Wikipedia, and to browsers with Do not
Track enabled. Potential survey participants were identified
by assigning a token to their browsers and eventually showing
a widget with an invitation to participate in the survey. Once
shown, the reader could ignore it, dismiss it, or opt in to
participate which would take the reader to an external site
(Google Forms), where she would see the three questions
described in Sec. 2. A unique, anonymous ID was passed to
Google Forms for each user, which would later be used to link
the survey responses to users' webrequest logs (Sec. 3.2). A
privacy and consent statement1 providing details about the
1https://wikimediafoundation.org/wiki/Survey_
Privacy_Statement_for_Schema_Revision_15266417
collection, sharing, and usage of the survey data was shown
to all users prior to submitting their responses. Overall, our
dataset consists of survey answers from 29,372 participants
after basic data cleaning such as removing duplicate answers
from the same users. Whenever we write "survey" throughout
the rest of this paper, we refer to the survey described here.
3.2 Webrequest logs
Ultimately, we aim to to understand how users' motivation,
desired depth of knowledge, and prior knowledge (i.e., their
answers to our survey) manifest themselves in their reading
behavior. The data collected through the survey alone, how-
ever, does not provide any information on the respondent's
behavior beyond the single pageview upon which the survey
was presented.
In order to be able to analyze respondents' reading behavior
in context, we connect survey responses to the webrequest
logs maintained by Wikipedia's web servers, where every
access to any Wikipedia page is stored as a record that
contains, among others, the requested URL, referer URL,
timestamp, client IP address, browser version, and city-level
geolocation inferred from the IP address. Since the logs
do not contain unique user IDs, we construct approximate
user IDs by concatenating the client IP address and browser
version; cf. discussion in Sec. 5.2.
As the information needs and reading behavior of the same
user may change over time, we operate at an intermediate
temporal granularity by decomposing a user's entire browsing
history into sessions, where we define a session as a contigu-
ous sequence of pageviews with no break longer than one
hour [12]. To reconstruct the session in which a user took
our survey (cf. Fig. 1), we retrieved from the webrequest
logs all records with the user's (approximate) ID, ordered
them by time, chunked them into sessions according to the
aforementioned one-hour rule, and returned the session that
contains the record with the specific URL and timestamp of
the survey response.
3.3 Wikipedia article data
Different articles are consumed in different ways. Hence,
the properties of articles viewed by survey respondents play
an important role in our analysis. To extract these properties,
we utilized the public dump of English Wikipedia released on
2016-03-05,2 such that article revisions closely match those
seen by survey participants.
The dump contains wiki markup, whereas browsers re-
ceive HTML code generated from this markup. Since the
markup may contain templates that are expanded only upon
conversion to HTML, some page content is not immediately
available in markup form. In order to obtain a more complete
representation, we retrieved the full HTML of the article
contents using Wikimedia's public API. In addition to the
textual article content, we extracted the network of articles
(5.1M) connected by hyperlinks (370M).
3.4 Features
Throughout this work, we study features extracted di-
rectly from the survey responses (Sec. 3.1), from underlying
webrequest logs of article requests and extracted sessions
(Sec. 3.2), and background Wikipedia article data associated
with requested articles (Sec. 3.3). We list and describe all
features utilized in this work in Table 1.
For topic detection, we fit a Latent Dirichlet Allocation
(LDA) [4] model on bag-of-words vectors representing arti-
cles' textual content (with stopwords removed) using online
variational Bayes. To find a balance between complexity
and interpretability, we decided to work with 20 topics. We
assigned labels to topics by manually inspecting the topics'
word distributions and their top Wikipedia articles.
3.5 Correcting survey bias via webrequest logs
The goal of this work is to study the motivations and
behaviors representative of Wikipedia's entire reader popula-
tion. However, deducing properties of a general population
from surveying a limited subpopulation is subject to differ-
ent kinds of biases and confounders, including coverage bias
(inability to reach certain subpopulations), sampling bias
(distortions due to sampling procedure), and non-response
bias (diverse likelihood of survey participation after being
sampled as a participant).
Consequently, an important step in our analysis is to
account for potential biases in survey responses. Finding
suitable adjustments has been a decade-long research effort in
the survey methodology community [5]. Since strata methods
such as poststratification [9] are less well suited to control for
a large number of features, we opt for inverse propensity score
2https://archive.org/details/enwiki-20160305
weighting [2] as an alternative. This technique assigns control
weights to each survey response, thus correcting bias with
respect to a control group (Wikipedia population). The ratio-
nale behind this procedure is that answers of users less likely
to participate in the survey should receive higher weights, as
they represent a larger part of the overall population with
similar features. For determining participation probabilities
(propensity scores), we use gradient-boosted regression trees
on individual samples to predict if they belong to the survey
vs. the control group, using all features of Sec. 3.4. (We
provide additional methodological details in the appendix.)
By using background features (e.g., country, time) plus digi-
tal traces (e.g., sessions), and by building a representative
control group, we have an advantage over traditional survey
design, which is often limited to few response features such
as gender and age, as well as to small control groups.
When discussing results in the next section, we shall see
(Fig. 2) that our weight adjustment changes the relative
shares of survey responses only slightly, with general trends
staying intact. Hence, we shall utilize only weighted survey
responses for inference on statistical properties from this
point on. Additionally, we use the so-called effective sample
size (cf. appendix) when calculating standard errors, confi-
dence intervals, and statistical tests, in order to account for
differing standard errors of weighted estimators.
4. RESULTS: WHY WE READ WIKIPEDIA
This section discusses results on why users read Wikipedia.
4.1 Survey results
We start with a discussion of the responses to our survey.
Survey responses. First, we examine the percentages of
survey respondents with specific motivations, information
needs, and prior knowledge. We visualize the results in Fig. 2,
focusing on the green (right) bars representing weighted
survey responses (sorted by popularity).
With respect to motivation, we find that Wikipedia is
consulted in a large spectrum of use cases and that no clearly
dominant motivation can be identified. Prominently, extrin-
sic situations trigger readers to visit Wikipedia to look up
a topic that was referenced in the media (30%), came up
in a conversation (22%), is work or school-related (16%), or
corresponds to a current event (13%). At the same time,
readers have intrinsic motivations, such as wanting to learn
something (25%), being bored (20%), or facing a personal
decision (10%). We also find that the "other" option was
only rarely selected, further confirming the robustness of the
taxonomy of readers introduced in Sec. 2.
The results also show that Wikipedia is visited to satisfy
different kinds of information needs. Interestingly, shallow
information needs (overview [39%] and quick fact-checking
[38%]) appear to be more common than deep information
needs (21%). As for prior knowledge, we observe nearly
identical shares of readers being familiar (50%) vs. unfamiliar
(47%) with the topic of interest.
Survey response correlations. Next, in Table 2, we study
whether certain combinations of motivations, information
needs, and prior knowledge occur more frequently than ex-
pected, quantified by the lift, i.e., the ratio between observed
and expected frequencies.
Table 2a suggests that different motivations are coupled
with different information depths. Specifically, in-depth in-
Figure 2: Survey responses. This figure visualizes the share of answers for the three parts of the user survey:
motivation, information need, and prior knowledge. The blue bars (left) reflect the raw unweighted responses,
and the green bars (right) depict the bias-corrected weighted responses (propensity score weight adjustment).
Error bars visualize the 95% confidence intervals using effective sample size for the weighted responses. In
general, results suggest popularity of both extrinsic and intrinsic motivation, as well as high, but balanced,
relevance for certain information needs and prior knowledge. The results based on bias-correction weighting
reflect minor changes in responses without drastically changing the general direction.
Survey responses over time. Next, we study how the
prevalence of motivations, information needs, and prior knowl-
edge changes over time. For motivations, shown in Fig. 3,
we find relatively stable trends over the course of a week
or day. Three notable exceptions, however, emerge. First,
on weekends (Saturday, Sunday) and at night, there is a
higher share of readers who are led to Wikipedia by media
coverage; this is potentially due to a higher likelihood of
being exposed to media during these time periods. Similarly,
conversations play a more important role on Fridays and
Saturdays, possibly since people go out, meet with friends,
and are involved in conversations that lead to consulting
Wikipedia. By contrast, reading an article for work or school
reasons has a relatively lower share towards the weekend,
but peaks at daytime hours, probably because people work
and go to school on working days and during daytime hours.
Additionally, results on information need show overall
quite stable trends over a week and over a day without clear
outliers, also due to larger confidence intervals (results not
visualized). For prior knowledge, we identify small upward
trends on weekends and evening hours for already being famil-
iar with the topic, compared to being unfamiliar. However,
error bars are again too large to justify stronger claims.
4.2 Webrequest-log results
Our previous results suggest that Wikipedia is visited for
a variety of use cases that differ not only in their motivation
triggers, but also in the depth of information needs, and
readers' prior familiarity with the topic.
In this section,
we investigate correlations of survey responses with behav-
ioral patterns based on request, article, and session features
(Sec. 3.4). In doing so, we reveal characteristic differences
and develop stereotypes for motivational groups.
Methodology.
Due to our large set of features at in-
terest (Sec. 3.4), we investigate behavioral reader patterns
based on rule mining techniques, specifically subgroup discov-
ery [14, 19]. The general goal of subgroup discovery is to find
descriptions of subsets of the data that show an interesting
(i.e., significantly different) distribution with respect to a
Figure 3: Motivation day and time. This figure visu-
alizes how the relative share of motivation (y-axes)
changes over the course of a week and the course of a
day (x-axes). Error bars depict the 95% confidence
interval with effective sample size.
formation needs prevail when readers are driven by intrinsic
learning (lift 1.62); quick fact look-ups are associated more
strongly with conversation and work/school motivations than
one would expect a priori; and gaining an overview of a topic
appears to be especially important for readers motivated by
media coverage and for the bored.
In Table 2b, we find weaker correlations between motiva-
tions and levels of prior knowledge, apparent from lifts closer
to 1 and a lack of significance. However, certain trends still
emerge; e.g., when readers research a topic from the media,
they are more likely to be unfamiliar with the topic (lift 1.22).
In contrast, readers whose goal is learning are more likely to
be familiar with the topic (lift 1.14).
As a corollary of the above correlations, we also observe
patterns when contrasting prior knowledge with information
need (Table 2c). We find that familiar readers are more likely
to look up quick facts (lift 1.13) and aim at getting in-depth
knowledge about a topic (lift 1.15) than one would expect.
Contrarily, unfamiliar readers are more likely to first aim at
getting an overview of the topic (lift 1.22) instead of directly
going into depth (lift 0.87).
mediaintrinsic learningconversationbored/randomwork/schoolcurrent eventpersonal decisionotherno response0.000.050.100.150.200.250.30response percentagemotivationoverviewfactin-depthno response0.00.10.20.30.4response percentageinformation needfamiliarunfamiliarno response0.00.10.20.30.40.5response percentageprior knowledgesurvey responseweighted survey responsemediaintrinsic learningconversationbored/randomwork/schoolcurrent eventpersonal decisionMonTueWedThuFriSatSun0.00.10.20.30.4Weekday0-33-66-99-1212-1515-1818-2121-240.00.10.20.30.4Hourpredefined target concept from a large set of candidates. In
our scenario, we perform a series of subgroup searches, each
using one survey answer option as the target. To create the
search space of candidate subgroup descriptions, we use all
features described in Sec. 3.4. For the topic features, we
consider a topic as present in an article viewed by a user if
our topic model provided a probability for this topic above
20%. Other numeric features are binarized in five intervals
using equal-frequency discretization. Due to missing values
and multiple occurrences of values, bin sizes can significantly
deviate from 20% of the dataset for some features. To select
the most interesting subgroups, we use the lift as a quality
function [10]. This measure is computed as the ratio between
the likelihood of a survey answer in the subgroup and the
respective likelihood in the overall dataset. As an example,
a lift of 1.3 means that the respective survey answer is 30%
Table 2: Survey response correlations. Each cell
depicts the row-normalized share of responses that
have also selected a given column as answer (with-
out "other" and non-responses). The bottom rows
highlight the overall share of responses for a given
column as expectation. Values in brackets reflect
the lift ratio of observed vs. expected frequency.
The last column indicates significance (*** < 0.001,
** < 0.01, * < 0.05) for the hypothesis test of inde-
pendence of observed frequencies (contingency table
with row frequencies and complement of all other
rows) and expected frequencies (as in the last table
row) using a χ2 test using the effective sample size.
(a) Motivation vs. information need
information need
motivation
media
intrinsic learning
conversation
bored/random
work/school
current event
personal decision
response perc.
fact
in-depth
overview
sig.
0.38 (1.00)
0.29 (0.76)
0.43 (1.13)
0.31 (0.83)
0.39 (1.04)
0.36 (0.95)
0.32 (0.85)
0.38
0.19 (0.87)
0.35 (1.62)
0.20 (0.93)
0.23 (1.05)
0.23 (1.09)
0.28 (1.30)
0.29 (1.35)
0.21
0.43 (1.12)
0.35 (0.92)
0.36 (0.94)
0.45 (1.17)
0.36 (0.93)
0.35 (0.92)
0.38 (0.97)
0.39
***
***
***
***
***
***
(b) Motivation vs. prior knowledge
prior knowledge
motivation
media
intrinsic learning
conversation
bored/random
work/school
current event
personal decision
response perc.
familiar
unfamiliar
0.42 (0.83)
0.57 (1.14)
0.49 (0.98)
0.53 (1.07)
0.52 (1.04)
0.52 (1.03)
0.50 (0.99)
0.50
0.58 (1.22)
0.41 (0.87)
0.49 (1.04)
0.45 (0.95)
0.46 (0.97)
0.46 (0.98)
0.48 (1.02)
0.47
sig.
***
***
***
(c) Prior knowledge vs. information need
information need
prior knowledge
familiar
unfamiliar
response perc.
fact
in-depth
overview sig.
0.43
(1.13)
0.34
(0.90)
0.38
0.25
(1.15)
0.19
(0.87)
0.21
0.32
(0.83)
0.47
(1.22)
0.39
***
***
more likely to occur in the subgroup than in the overall data.
Additionally, we apply a filter to remove all subgroups that
could not be shown to be significant by a χ2 test with a
Bonferroni-corrected threshold of α = 0.05.
As a result, we obtain a list with the top k interesting
subgroups for each survey answer T . For each subgroup S,
we can compute various statistics: the (relative) size P (S) of
the subgroup, i.e., the share of users that are covered by the
subgroup description, the share P (ST ) of subgroup users
among those who answered with T in the survey, the target
share P (TS) in the subgroup, i.e., the share of users within
the subgroup that reported the respective answer, and the
lift, which is defined as P (TS)/P (T ) = P (ST )/P (S). Note
that the absence of a feature in the discussion does not mean
that it was not considered, but that it is not among the most
significant subgroups.
Motivation. We start with characterizing groups with
specific motivations as reported in the survey. In particular,
we provide detailed results for two exemplary motivational
groups (work/school and bored/random; Table 3) and only
shortly summarize results for other motivations.
Users who intend to use Wikipedia for work or school are
more frequently observed for specific topics of articles, namely
war & history, mathematics, technology, biology & chemistry,
and literature & arts. For the first two of these topics, users
are more than twice as often motivated by work or school
tasks as on average. While these topics cover a wide range
of different areas, all of them are more related to academic
or professional activities than for leisure. Additionally, this
type of motivation is more often reported by users accessing
Wikipedia's desktop version. This could be expected since
many work/school activities are performed in office settings.
Furthermore, we can see that this motivation occurs more
often for users who are referred by external search engines
multiple times in a session, and by users who stay longer on
an individual page, which can be seen as a potential indicator
for intensive studying.
By contrast, users who describe their motivation as
bored/random, are more likely to use internal navigation
within Wikipedia and to spend only little time on the indi-
vidual articles. Also, they tend to switch topics between the
individual articles more often (as indicated by the subgroup
with a high average topic distance). These are telltales for
less focused browsing behavior. Bored users also view more
articles on Wikipedia both within the survey session and over-
all during the respective week. Finally, this motivation can
also be observed more frequently for articles that cover spe-
cific topics, such as sports, 21st century, and TV, movies, &
novels. Clearly, these topics are more leisure-oriented and are
in stark contrast to the previously discussed topics favored
by users who use Wikipedia for work or school.
Due to limited space, we only outline findings for other
motivations: For example, motivation via media is signif-
icantly more often observed for the topics TV, movies, &
novels (lift 1.37) and 21st century (lift 1.26), for popular
articles, i.e., articles with a high number of pageviews (lift
1.17), and for articles in the periphery of the Wikipedia link
network according to pagerank (lift 1.14). The motivation
of looking up something that came up in a conversation is
more frequently reported for users with a single Wikipedia
article request within a session (lift 1.08) and for users of the
mobile version of Wikipedia (lift 1.08). The current-event
motivation is more likely for articles about sports (lift 1.97),
Table 3: Top subgroups for the motivations "work/school" and "bored/random". Each table shows the top
subgroups with significantly different shares of users with a certain motivation T . For each subgroup S, we
display the relative size P (S) of the subgroup (i.e., the share of users covered by the subgroup description),
the share P (ST ) of the subgroup among those with motivation T , the target share P (TS) in the subgroup, and
the lift measure, defined as P (TS)/P (T ) = P (ST )/P (S). Rows are ranked by lift. The last column indicates
significance (*** < 0.001, ** < 0.01, * < 0.05) for the hypothesis test of independence between subgroup and
target motivation using a χ2 test with effective sample size and Bonferroni correction.
(a) T : "motivation = work/school"; P (T ) = 16.1%
(b) T : "motivation = bored/random"; P (T ) = 19.5%
Subgroup S
topic (mathematics)
topic (war, history)
topic (technology)
topic (biology, chemistry)
host = desktop
article pagerank ≥ 9.98
avg. time difference ≥ 9.40
avg. pagerank difference < -4.35
topic (literature, art)
avg. time difference: [3.60:9.40[
num. (referer=search) ≥ 2
session duration ≥ 6.60
P (S)
P (ST ) P (TS) lift
7.9% 17.1% 34.8% 2.17
4.4% 9.6% 34.7% 2.16
13.2% 23.7% 28.8% 1.79
8.6% 14.0% 26.2% 1.63
35.5% 57.8% 26.1% 1.63
20.0% 32.4% 26.1% 1.62
7.7% 11.5% 24.0% 1.50
7.6% 11.2% 23.6% 1.47
10.1% 14.7% 23.5% 1.46
7.7% 11.0% 23.1% 1.44
20.5% 28.5% 22.4% 1.39
18.0% 24.2% 21.6% 1.34
sig.
***
***
***
***
***
***
***
***
***
***
***
***
Subgroup S
referer class: internal
num. of requests ≥ 8
topic (sports)
num. (referer=internal) ≥ 1
session position: [0.33:0.75[
avg. topic distance ≥ 1.08
topic (21st century)
session length ≥ 3
avg. time difference: [0.68:1.56[
num. (referer=none) ≥ 2
topic (tv, movies, novels)
# article pageviews ≥ 63606
P (S)
P (ST ) P (TS) lift
9.4% 14.0% 29.0% 1.49
11.8% 16.6% 27.5% 1.41
5.9% 8.0% 26.1% 1.34
17.1% 22.7% 25.9% 1.33
7.5% 9.8% 25.6% 1.31
7.5% 9.8% 25.2% 1.29
25.1% 32.1% 25.0% 1.28
22.2% 28.3% 24.8% 1.27
7.7% 9.7% 24.7% 1.27
9.7% 12.2% 24.5% 1.26
34.1% 41.4% 23.7% 1.21
19.8% 23.5% 23.1% 1.19
sig.
***
***
**
***
**
*
***
***
*
*
***
**
21st century (lift 1.49), and education, government, & law
(lift 1.49). It is also more common for articles with many
page views (lift 1.68), possibly because articles on current
events are trending. Users who aim at intrinsic learning show
a topic preference for more scholarly topics such as literature
& art (lift 1.30), mathematics (lift 1.24), and technology (lift
1.21). Finally, the geographical origin of a user also has an
effect: the motivations personal decision, current event, and
intrinsic learning are reported significantly more often for
users from Asia (mostly India; lifts 1.46, 1.44, and 1.20).
Information need. Overall, the investigated subgroups
are more homogeneous with respect to the reported informa-
tion need. We can, however, find some notable (anecdotal)
exceptions: Users from Asia describe their information needs
significantly more often as acquiring in-depth information
(lift 1.51). For users who want to obtain an overview of a
topic, using the desktop version of Wikipedia is more com-
mon than for the average user (lift 1.13) Also, topics play
a certain role: fact look-ups, for example, are more often
observed for the sports topic (lift 1.08). Session features that
describe user behavior across multiple page visits do not lead
to any significant differences in information need.
Prior knowledge. Regarding readers' prior knowledge, we
can observe that users feel familiar with topics that are more
spare-time oriented, such as sports (lift 1.21), 21st century
(lift 1.08), and TV, movies, & novels (lift 1.07). They also
feel more familiar about articles that are popular, i.e., have
many pageviews (lift 1.11), are longer (lift 1.10), and are
more central in the link network (out-degree, in-degree, or
pagerank; lifts 1.11, 1.09, and 1.08). Naturally, the answer
"unfamiliar" is more often reported for the exact opposite of
these subgroups. Features that describe a user behavior over
multiple article views do not lead to significant deviations.
4.3 Summary of results
Prevalence of use cases. We have shown that Wikipedia
is read in a wide variety of use cases that differ in their
motivation triggers, the depth of information needs, and
readers' prior familiarity with the topic. There are no clearly
dominating use cases, and readers are familiar with the topic
they are interacting with as often as they are not. Wikipe-
dia is used for shallow information needs (fact look-up and
overview) more often than for deep information needs. While
deep information needs prevail foremost when the reader is
driven by intrinsic learning, and fact look-ups are triggered
by conversations, we saw that overviews are triggered by
bored/random exploration, media coverage, or the need for
making a personal decision.
Use cases over time. Motivations appear to be mostly
stable over time (days of the week and hours of the day),
with a few exceptions: motivations triggered by the media
are increased over the weekends and at nights, conversation
triggers are increased over the weekends, and work/school
triggers are increased on week days and during the day.
Behavioral patterns. By connecting survey responses with
webrequest logs, we identified certain behavioral patterns:
• When Wikipedia is used for work or school assignments,
users tend to use a desktop computer to engage in long
pageviews and sessions; sessions tend to be topically coher-
ent and predominantly involve central, "serious" articles,
rather than entertainment-related ones; search engine us-
age is increased; and sessions tend to traverse from the
core to the periphery of the article network.
• Media-driven usage is directed toward popular, entertain-
ment-related articles that are frequently less well embedded
into the article network.
• Intrinsic learning tends to involve arts and science articles
with no significant navigational features; conversations
bring infrequent users to Wikipedia, who engage in short
interactions with the site, frequently on mobile devices.
• People who use Wikipedia out of boredom or in order to
explore randomly tend to be power users; they navigate
Wikipedia on long, fast-paced, topically diverse link chains;
and they often visit popular articles on entertainment-
related topics, less so on science-related topics.
• Current events tend to drive traffic to long sports and
politics-related articles; the articles tend to be popular,
likely because the triggering event is trending.
• When Wikipedia is consulted to make a personal decision,
the articles are often geography and technology-related,
possibly due to travel or product purchase decisions.
5. DISCUSSION
Every day, Wikipedia articles are viewed more than 500
million times, but so far, very little has been known about
the motivations and behaviors of the people behind these
pageviews. The present study is the first comprehensive at-
tempt to help us understand this group of users by combining
a survey with a log-based analysis.
The work most closely related to ours is by Lehmann et al.
[26], who extracted Wikipedia navigation traces from Yahoo!
toolbar logs (which may be considered a biased sample of the
complete logs we have access to) with the goal of discovering a
set of usage patterns according to which articles are consumed.
Using clustering techniques, they concluded that there are
four types of articles: trending articles, articles read in a
focused manner, articles read by exploring users, and articles
users just quickly pass through. Lehmann et al.'s work is
entirely "unsupervised", in the sense that they have no ground
truth of the actual underlying user motivations and needs.
We, on the contrary, have elicited the ground truth through
our survey and can thus arrive at stronger and more ac-
tionable conclusions, which we discuss next. We do so by
first highlighting implications and directions for future work
(Sec. 5.1), and then reflecting on our methodology and point-
ing out its limitations (Sec. 5.2).
5.1
Implications and future directions
This research has already had considerable impact within
the Wikimedia Foundation, where it has informed several
items on the product development agenda, and we hope
that it will further inspire Wikimedia developers, academic
researchers, and volunteers to build tools for improving the
user experience on Wikipedia.
Predicting motivation and desired depth of knowl-
edge. A tool immediately suggested by our results could
involve statistical models for real-time inference of user ses-
sion motivations from behavioral traces as captured in the
webrequest logs. Such models could be trained in a super-
vised fashion with features of Sec. 3.2 as input, and survey
responses as output, and could form the basis for products
and services for supporting the needs of Wikipedia readers
more proactively. For instance, if an editor working on an
article could be shown an estimate of the distribution of the
motivations and desired depths of knowledge on behalf of
the readers of the article, she can take this information into
account to tailor the content to the needs of the audience or
attempt to change the distribution of the audience's motiva-
tion by creating specific types of content in the article. Such
a tool could have large impact, considering that, currently,
editors contribute to content on Wikipedia without much
knowledge of the users who will eventually read it.
Similarly, predicting the distribution over depths of knowl-
edge sought by the readers of an article could offer oppor-
tunities for creating different versions the article, e.g., for
those who are interested in quick look-ups vs. in-depth read-
ers. This could enhance the usability of Wikipedia articles
particularly on mobile devices with smaller screens and low-
bandwidth connections.
The above task of using digital traces to predict survey
responses has been called amplified asking, and it is known to
be difficult [35]. This has been confirmed by our preliminary
attempts, where we have achieved accuracies only slightly
better than simple baselines. This may be partly explained
by the fact that user motivations may change during a ses-
sion, and while the survey captures the motivations at the
article level accurately, it fails to capture possible transitions
between motivations during a session. For instance, a session
might start with a school or work project in mind, but the
user might then transition to procrastinating by exploring
Wikipedia randomly, which would not be captured in our
current setting. Also, prediction is complicated by the fact
that, even for a fixed article, user motivations might vary
widely. For instance, of the 222 users taking the survey upon
reading the article about Donald Trump, 38% read the article
out of boredom, 32% in response to media coverage, 24%
because of a conversation, 23% due to current events, 17%
because the topic was personally important to them, etc.
Despite these difficulties, future work should investigate
the problem of predicting user intentions in more depth.
5.2 Methodological limitations
We discuss certain limitations of present research next.
Survey selection bias. A general caveat with surveys is
that one typically cannot guarantee that whether a subject
participates or not is a fully random choice. Certain covari-
ates may be associated with both participation rates and
responses given, leading to biased conclusions. We made a
best effort to correct for this bias by adjusting survey re-
sponses based on a random sample of all Wikipedia pageviews
drawn from Wikipedia's webrequest logs (Sec. 3.5). However,
if the bias-inducing covariates are hidden, one cannot fully
correct for the bias. For instance, young users might be
both more prone to use Wikipedia for work or school and
to participate in our survey; this would over-represent the
work/school motivation in our raw survey results, and since
we have no information about users' age, we could not cor-
rect for this bias. Apart from that, survey answers might be
biased by social desirability [7]; e.g., even in an anonymous
survey, users might be reluctant to admit they are visiting
Wikipedia out of boredom.
Unique visitors and level of analysis. Wikipedia does
not require users to log in, nor does it use cookies in webre-
quest logs to maintain a notion of unique clients. Hence, we
need to rely on an approximate notion of user IDs based on
IP addresses and browser versions (Sec. 3.2), which makes
the attribution of pageviews to users and the construction
of sessions imperfect. In particular, we might not recognize
that two pageviews are by the same user if they use several
devices or if their IP address changes for other reasons; and
we might conflate several users if they share the same device
or IP address (e.g., via a proxy). Currently, we limit the
impact of such errors by analyzing the data on a session level
and operating at relatively short time scales (an inactivity
of more than one hour ends the session being studied). If
the attribution of pageviews to unique users becomes more
precise in the future, we could study user behavior at longer
time scales, which would, e.g., allow us to understand and
support long-term learning needs. Also, our current method
aims at giving each user session equal weight. An alterna-
tive approach would be to analyze the data on a request
level, which would put more emphasis on the motivations
and needs of power users.
Cultural issues. The results discussed here pertain to
the English edition of Wikipedia. Even within this limited
scope, our behavioral analysis hints at subtle cultural and
geographical differences; e.g., the bored/random motivation
is particularly frequent in the U.S., whereas current events
are a stronger motivator in India. Survey answers might
also be influenced by different notions and associations of
the survey phrasing across cultures [13]. Since Wikipedia
strives to reach beyond cultural and linguistic boundaries, it
is important to further investigate these cultural issues. As
part of this effort, we are planning to repeat our study in
additional language versions of Wikipedia to elicit cultural
differences on a larger scale.
6. CONCLUSIONS
In this work, we study why users read Wikipedia. We
use survey data to develop a taxonomy of Wikipedia usage
along three dimensions: motivation, information need, and
prior knowledge. In a large-scale survey with almost 30,000
participants, we quantify the share of readership for these
driving factors. The bias-corrected survey results reveal a
broad range of usage scenarios, interdependencies between
survey answers, and temporal trends. Combining the survey
responses with webrequest logs allows us to characterize
motivational groups with behavioral patterns. The outcomes
of this study are currently being discussed in the Wikimedia
Foundation as a stimulus for developing specialized tools for
readers and editors.
APPENDIX: SURVEY BIAS CORRECTION
This appendix covers the details of the survey bias correction.
Propensity score weight adjustment. We use inverse
propensity score weighting to adjust for potential biases in
survey response data with respect to control data [2, 27].
Specifically, we want to infer unbiased estimates of survey
answers for the whole Wikipedia readership. Thus, we ran-
domly sampled a large set of Wikipedia readers (25 times
the number of survey responses) from the webrequests logs
in the survey period. Then, we proceeded to sample one
request for each selected user and marked it as an imagi-
nary request reflecting a potential survey response; we also
deduced the same set of features as for our survey (except
responses). We only sampled requests that are desktop or mo-
bile pageviews in English Wikipedia's main namespace and
applied bot-filtering in order to match the original survey.
The propensity score of a single instance then reflects
the probability that an instance with these control features
(Sec. 3.4) participated in the survey. We approximate it using
our control group. For that, a post-stratification approach
[27] is infeasible due to the large number of control features
we consider. Instead, we model the group membership (sur-
vey participant or control group) using gradient boosted
regression trees showing promising results in the past in
comparison to traditional approaches like logistic regression
[24]. Given the features of an instance x, the model predicts
a probability p(x) that x belongs to the survey group. We
then set the weight w for instance to 1/p(x). The rationale
behind this procedure is that answers of users that are overall
less likely to participate in the survey receive higher weights
since they represent a larger part of the entire population
with similar features.
Evaluating weights. To evaluate if applied weighting
schemes have the intended correcting effect of making the
user survey data more representative for the overall Wikipe-
dia, we resort to two scenarios.
First, we check that the resulting weights do not contain
drastic outliers dominating subsequent results, which would
warrant so-called trimming [25]. In that regard, we observe
that weights are sufficiently homogeneous distributed with
a minimum of 1, a maximum of 190, a mean of 17.6, and a
standard deviation of 26.9.
Additionally, we evaluate how well we can recover the mean
value of features in the overall population from observed
survey response features and our weighting scheme. For that
purpose, we compute weighted and unweighted averages of
the observed values for the survey users and compare them
with the mean of a different random sample as a ground
truth. As a result, the average of relative errors is reduced
by 86%, from 0.556 in the unweighted case to 0.079 in the
weighted case. The reduction is strongly significant (p ≤
0.001 according to a Wilcoxon signed rank test). If weighting
is applied, then the mean recovered from the weighted survey
is never more than 0.2 standard deviations off compared to
the actual feature mean in the sample.
Effective sample size. Int this work, we employ a variety
of statistical techniques on the survey data. Yet, the introduc-
tion of sample weights for correcting bias in survey responses
leads to violations of IID assumptions [28]. Thus, standard
errors of estimators are estimated as too small, which in turn
leads to confidence intervals being too narrow and statistical
tests asserting significance too often if standard procedures
are applied. The extent to which the sampling error in the
survey for some parameter θ deviates from the expected error
from an IID sample due to survey design and correction, is
known as the design effect (deff) [17]. If the design effect
deviates from 1-as it is the case in our survey-then our
understanding of sample size for calculating standard errors
becomes incorrect. To that end, we consider the effective
sample size estimating the required sample size of a random
sampling survey for achieving the same error as the weighted
sample-it is defined as neff = n/deff. As we cannot directly
calculate deff without knowing the expected sampling error,
we use Kish's approximation formula with weights wi [17]:
(cid:0)(cid:80)n
(cid:80)n
i=1 wi
i=1 w2
i
(cid:1)2
neff =
For our complete survey data, neff = 8839. We use this
effective sample size throughout this article for calculating
standard errors, confidence intervals, and statistical tests.
Note that this makes reported confidence interval and sta-
tistical hypothesis tests overly careful. For further details,
please refer to [28].
Acknowledgements. We thank Dario Taraborelli from
Wikimedia Foundation who was indispensable to the early
phases of the project. We also thank Jonathan Morgan
for helping us with the hand-coding; Jon Katz and Toby
Negrin for helping us shape the direction of the research
and supporting us throughout; Anne Gomez, Jeff Hobson,
Bahodir Mansurov, Jon Robson, and Sam Smith for running
the surveys on Wikipedia; and Aeryn Palmer for creating
the privacy statements for this research. This research has
been supported in part by NSF IIS-1149837, ARO MURI,
DARPA NGS2, and Stanford Data Science Initiative.
References
[1] O. Arazy, H. Lifshitz-Assaf, O. Nov, J. Daxenberger,
M. Balestra, and C. Cheshire. On the "how" and "why" of
emergent role behaviors in Wikipedia. In Conference on
Computer-Supported Cooperative Work and Social
Computing, 2017.
[2] P. C. Austin. An introduction to propensity score methods
for reducing the effects of confounding in observational
studies. Multivariate Behavioral Research, 46(3):399–424,
2011.
[3] A. Basu. Context-driven assessment of commercial web sites.
In International Conference On System Sciences, 2003.
[4] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet
allocation. Journal of Machine Learning Research,
3(Jan):993–1022, 2003.
[5] J. M. Brick. Unit nonresponse and weighting adjustments:
A critical review. Journal of Official Statistics,
29(3):329–353, 2013.
[6] A. Broder. A taxonomy of web search. In ACM SIGIR
Forum, 2002.
[7] T. J. DeMaio. Social desirability and survey. Surveying
Subjective Phenomena, 2:257, 1984.
[8] H. A. Feild, J. Allan, and R. Jones. Predicting searcher
frustration. In International Conference on Research and
Development in Information Retrieval, 2010.
[9] A. Gelman and J. B. Carlin. Poststratification and
weighting adjustments. In CiteSeerX, 2000.
[10] L. Geng and H. J. Hamilton. Interestingness measures for
data mining: A survey. ACM Computing Surveys, 38(3):9,
2006.
[11] S. Goel, J. M. Hofman, and M. I. Sirer. Who does what on
the Web: A large-scale study of browsing behavior. In
International Conference on Web and Social Media, 2012.
[12] A. Halfaker, O. Keyes, D. Kluver, J. Thebault-Spieker,
T. Nguyen, K. Shores, A. Uduwage, and M. Warncke-Wang.
User session identification based on strong regularities in
inter-activity time. In International Conference on World
Wide Web, 2015.
[13] J. A. Harkness, F. J. Van de Vijver, P. P. Mohler, et al.
Cross-cultural survey methods. Wiley-Interscience Hoboken,
2003.
[14] F. Herrera, C. J. Carmona, P. Gonz´alez, and M. J. Del Jesus.
An overview on subgroup discovery: Foundations and
applications. Knowledge and Information Systems,
29(3):495–525, 2010.
[15] A. Java, X. Song, T. Finin, and B. Tseng. Why we twitter:
Understanding microblogging usage and communities. In
Workshop on Web Mining and Social Network Analysis,
2007.
[16] D. Jurgens and T.-C. Lu. Temporal motifs reveal the
dynamics of editor interactions in Wikipedia. In
International Conference on Web and Social Media, 2012.
[17] L. Kish. Survey sampling. John Wiley and Sons, 1965.
[18] A. Kittur and R. E. Kraut. Harnessing the wisdom of
crowds in Wikipedia: Quality through coordination. In
Conference on Computer Supported Cooperative Work, 2008.
[19] W. Klosgen. Explora: A multipattern and multistrategy
discovery assistant. In Advances in Knowledge Discovery
and Data Mining, pages 249–271. American Association for
Artificial Intelligence, 1996.
[20] S. Krug. Don't Make Me Think, Revisited: A Common
Sense Approach to Web Usability. New Riders, 2014.
[21] R. Kumar and A. Tomkins. A characterization of online
browsing behavior. In International Conference on World
Wide Web, 2010.
[22] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a
social network or a news media? In International
Conference on World Wide Web, 2010.
[23] D. Lamprecht, D. Dimitrov, D. Helic, and M. Strohmaier.
Evaluating and improving navigability of Wikipedia: A
comparative study of eight language editions. In
International Symposium on Open Collaboration, 2016.
[24] B. K. Lee, J. Lessler, and E. A. Stuart. Improving
propensity score weighting using machine learning. Statistics
in Medicine, 29(3):337–346, 2010.
[25] B. K. Lee, J. Lessler, and E. A. Stuart. Weight trimming and
propensity score weighting. PloS One, 6(3):e18174, 2011.
[26] J. Lehmann, C. Muller-Birn, D. Laniado, M. Lalmas, and
A. Kaltenbrunner. Reader preferences and behavior on
Wikipedia. In Conference on Hypertext and Social Media,
2014.
[27] J. K. Lunceford and M. Davidian. Stratification and
weighting via the propensity score in estimation of causal
treatment effects: A comparative study. Statistics in
Medicine, 23(19):2937–2960, 2004.
[28] P. Mukhopadhyay. Complex Surveys: Analysis of
Categorical Data. Springer, 2016.
[29] O. Nov. What motivates Wikipedians? Communications of
the ACM, 50(11):60–64, 2007.
[30] C. Okoli, M. Mehdi, M. Mesgari, F. A. Nielsen, and
A. Lanamaki. The people's encyclopedia under the gaze of
the sages: A systematic review of scholarly research on
Wikipedia. SSRN 2021326, 2012.
[31] A. Paranjape, R. West, L. Zia, and J. Leskovec. Improving
website hyperlink structure using server logs. In
International Conference on Web Search and Data Mining,
2016.
[32] J. Ratkiewicz, S. Fortunato, A. Flammini, F. Menczer, and
A. Vespignani. Characterizing and modeling the dynamics of
online popularity. Physical Review Letters, 105(15):158701,
2010.
[33] D. E. Rose and D. Levinson. Understanding user goals in
web search. In International Conference on World Wide
Web, 2004.
[34] T. Ryan and S. Xenos. Who uses Facebook? An
investigation into the relationship between the Big Five,
shyness, narcissism, loneliness, and Facebook usage.
Computers in Human Behavior, 27(5):1658–1664, 2011.
[35] M. J. Salganik. Bit by Bit: Social Research in the Digital
Age. Princeton University Press, 2017.
[36] P. Singer, D. Helic, B. Taraghi, and M. Strohmaier.
Detecting memory and structure in human navigation
patterns using Markov chain models of varying order. PloS
One, 9(7):e102070, 2014.
[37] A. Spoerri. What is popular on Wikipedia and why? First
Monday, 12(4), 2007.
[38] A. Strauss and J. Corbin. Basics of Qualitative Research:
Techniques and Procedures for Developing Grounded Theory.
Sage Publications, 1998.
[39] B. Stvilia, M. B. Twidale, L. C. Smith, and L. Gasser.
Information quality work organization in Wikipedia. Journal
of the American Society for Information Science and
Technology, 59(6):983–1001, 2008.
[40] V. Waller. The search queries that took Australian Internet
users to Wikipedia. Information Research, 16(2), 2011.
[41] I. Weber and A. Jaimes. Who uses web search for what: and
how. In International Conference on Web Search and Data
Mining, 2011.
[42] R. West and J. Leskovec. Human wayfinding in information
networks. In International Conference on World Wide Web,
2012.
[43] R. W. White and S. T. Dumais. Characterizing and
predicting search engine switching behavior. In Conference
on Information and Knowledge Management, 2009.
|
1601.05283 | 2 | 1601 | 2016-03-07T17:48:18 | Marketing Impact on Diffusion in Social Networks | [
"cs.SI",
"cs.LO",
"math.LO"
] | The paper proposes a way to add marketing into the standard threshold model of social networks. Within this framework, the paper studies logical properties of the influence relation between sets of agents in social networks. Two different forms of this relation are considered: one for promotional marketing and the other for preventive marketing. In each case a sound and complete logical system describing properties of the influence relation is proposed. Both systems could be viewed as extensions of Armstrong's axioms of functional dependency from the database theory. | cs.SI | cs |
Marketing Impact on Diffusion in Social Networks
Pavel Naumov(cid:63)
Jia Tao∗
September 9, 2018
Abstract
The paper proposes a way to add marketing into the standard thresh-
old model of social networks. Within this framework, the paper studies
logical properties of the influence relation between sets of agents in social
networks. Two different forms of this relation are considered: one for pro-
motional marketing and the other for preventive marketing. In each case
a sound and complete logical system describing properties of the influ-
ence relation is proposed. Both systems could be viewed as extensions of
Armstrong's axioms of functional dependency from the database theory.
1
Introduction
1.1 Social Networks
In this paper we study how diffusion in social networks could be affected by mar-
keting. Diffusion happens when a product or a social norm is initially adopted
by a small group of agents who later influence their peers to adopt the same
product. The peers influence their peers, and so on. There are two most com-
monly used models of diffusion: the cascading model and the threshold model.
In the cascading model [12, 8] the behaviour of agents is random and the peer
influence manifests itself in a change of a probability of an agent to adopt the
product. In the threshold model [16, 9, 7, 1], originally introduced by Granovet-
ter [6] and Schelling [13], the behavior of the agents is deterministic.
The focus of this paper is on the threshold model of diffusion of a given
product.
In this model, there is a threshold value θ(a) associated with each
agent a and an influence value w(a, b) associated with each pair of agents a
and b. Informally, the threshold value θ(a) represents the resistance of agent a
to adoption of the product and the influence value w(a, b) represents the peer
pressure that agent a puts on agent b upon adopting the product. If the total
the United States, [email protected]
(cid:63) Department of Computer Science, Illinois Wesleyan University, Bloomington, Illinois,
∗ Department of Computer Science, The College of New Jersey, Ewing, New Jersey, the
United States, [email protected]
1
peer pressure from the set of agents A who have already adopted the product
on an agent b is no less than the threshold value θ(b), i.e.,
w(a, b) ≥ θ(b),
(1)
(cid:88)
a∈A
then agent b also adopts the product.
1.2
Influence Relation
We say that a set of agents A influences a set of agents B if the social network
is such that an adoption of the product by all agents in set A will unavoidably
lead to an adoption of the product by all agents in set B. Note that it is not
important how original adoption of the product by agents in set A happens. For
example, agents in set A can receive and start using free samples of the product.
Also, agents in set A can influence agents in set B indirectly. If agents in set
A put enough peer pressure on some other agents to adopt the product, who in
turn put enough peer pressure on the agents in set B to adopt the product, we
still say that set A influences set B. We denote this influence relation by A(cid:3) B.
In this paper we focus on universal principles of influence that are true for all
social networks. The set of such principles for a fixed distribution of influence
values has been studied by Azimipour and Naumov [3], who provided a complete
axiomatization of these principles that consists of the following three axioms of
influence:
1. Reflexivity: A(cid:3) B, where B ⊆ A,
2. Augmentation: A(cid:3) B → (A, C (cid:3) B, C),
3. Transitivity: A(cid:3) B → (B (cid:3) C → A(cid:3) C),
and an additional fourth axiom describing a property specific to the fixed dis-
tribution of influence values. In these axioms, A, B denotes the union of sets
A and B. The three axioms above were originally proposed by Armstrong [2]
to describe functional dependence relation in database theory. They became
known in database literature as Armstrong's axioms [5, p. 81]. Vaananen pro-
posed a first order version of these principles [14]. Beeri, Fagin, and Howard [4]
suggested a variation of Armstrong's axioms that describes properties of multi-
valued dependence. Naumov and Nicholls [10] proposed another variation of
these axioms that describes a rationally functional dependence.
There have been at least two different attempts to enrich the language of
Armstring's axioms by introducing an additional parameter to the functional
dependence relation. Vaananen [15] studied approximate dependence relation
A(cid:3)p B, where p refers to the fraction of "exceptions" in which functional depen-
dence does not hold. In our previous work [11], we interpreted relation A(cid:3)p B
as "knowing values of database attributes A and having an additional budget
p one can reconstruct the values of attributes in set B". In the current paper
2
we interpret A(cid:3)p B as the influence relation in social networks with parame-
ter p referring to the available marketing budget to either promote or prevent
influence.
1.3 Marketing Impact
We propose an extension of the threshold model that incorporates marketing.
This is done by representing a marketing campaign as a non-negative spending
function s, where s(b) specifies the amount of money spent on marketing the
product to agent b. In addition, we associate a value λ(b) with each agent b,
which we call the propensity of agent b. This value represents the resistance
of agent b to marketing. The higher the value of the propensity is, the more
responsive the agent is to the marketing. We modify formula (1) to say that
agent b adopts the product if the total sum of the marketing pressure and the
peer pressure from the set of agents who have already adopted the product is
no less than the threshold value:
λ(b) · s(b) +
w(a, b) ≥ θ(b).
(2)
(cid:88)
a∈A
In the first part of this paper we assume that the goal of marketing is to pro-
mote the adoption of the product. In the second part of the paper we investigate
marketing campaigns designed to prevent adoption of the product. An example
of the second type of campaign is an anti-smoking advertisement campaign. In
either of these two cases, the same equation (2) describes the condition under
which the product is adopted by agent b.
Note that most people would be more likely to buy a product when they
are exposed to a promotional marketing campaign. That is, in case of promo-
tional marketing, the value of the propensity is usually positive. On the other
hand, people are usually less likely to buy a product or to adopt a social norm
after being exposed to preventive marketing. In other words, in the preventive
marketing setting, the value of the propensity is usually negative. However,
our framework is general enough to allow for the propensity value to be either
positive or negative in both of these cases.
While studying the marketing that promotes adoption of the product, we
interpret predicate A(cid:3)p B as "there is a marketing campaign with budget no
more than p that guarantees that the set of agents A will influence the set of
agents B". As we show, the following three modified Armstrong's axioms give a
sound and complete axiomatization of universal propositional properties of this
relation:
1. Reflexivity: A(cid:3)p B, where B ⊆ A,
2. Augmentation: A(cid:3)p B → A, C (cid:3)p B, C,
3. Transitivity: A(cid:3)p B → (B (cid:3)q C → A(cid:3)p+q C).
3
These axioms are identical to our axioms of budget-constrained functional de-
pendence [11].
In the case of marketing that aims to prevent the influence, one would natu-
rally be interested in considering relation "there is a marketing campaign with
budget no more than p that guarantees that the set of agents A will not influ-
ence the set of agents B". Equivalently, one can study the properties of the
negation of this relation, or, in other words, the properties of the relation "for
any preventive marketing campaign with budget no more than p, the set of
agents A is able to influence the set of agents B". We have chosen to study the
latter relation because the axiomatic system for this relation is more elegant. In
this paper we show that the following four axioms give a sound and complete
axiomatization of the latter relation:
1. Reflexivity: A(cid:3)p B, where B ⊆ A,
2. Augmentation: A(cid:3)p B → A, C (cid:3)p B, C,
3. Transitivity: A(cid:3)p B → (B (cid:3)p C → A(cid:3)p C),
4. Monotonicity: A(cid:3)p B → A(cid:3)q B, where q ≤ p.
The difference between the axiomatic systems for promotional marketing
and preventive marketing is in transitivity and monotonicity axioms. Both sys-
tems include a form of transitivity axiom, but these forms are different and
not equivalent. The system for preventive marketing contains a form of mono-
tonicity axiom. For promotional marketing, the following form of monotonicity
axiom is true and provable, as is shown in Lemma 7:
A(cid:3)p B → A(cid:3)q B, where p ≤ q.
Both of the above axiomatic systems differ from Vaananen [15] axiomatization
of approximate functional dependence.
The paper is organized as follows. In Section 2, we give formal definitions of a
social network and of a diffusion in such networks. We also prove basic properties
of diffusion used later in the paper. This section of the paper is common to both
promotional and preventive marketing. In Section 3, we introduce semantics
of promotional marketing, give axioms of our logical system for promotional
marketing and prove the soundness and the completeness of this logical system.
In Section 4, we do the same for preventive marketing. Section 5 concludes the
paper.
2 Social Networks
As discussed in the introduction, the threshold model of a social network is
specified by a non-negative influence value between any pair of agents in the
network and by a threshold value for each agent. Additionally, each agent is
4
assigned a propensity value that specifies the resistance of the agent to mar-
keting. The value of the propensity could be positive, zero, or negative. We
assume that the set of agents is finite.
Definition 1 A social network is a tuple (A, w, λ, θ), where
1. Set A is a finite set of agents.
2. Function w maps A × A into the set of non-negative real numbers. The
value w(a, b) represents the "influence" of agent a on agent b.
3. Function λ maps A into real numbers. The value of λ(a) represents the
"propensity" of an agent a to marketing.
4. "Threshold" function θ maps A into the set of real numbers.
Figure 1 illustrates Definition 1. In this figure, the set of agents is the set
{u, v, w, t, x, y, z}. The influence value w(a, b) is specified by the label on the
directed edge from a to b. The edges for which the influence value is zero are
omitted. Threshold and propensity values are shown next to each agent.
Figure 1: A Social Network.
We describe a marketing campaign by specifying "spending" on advertise-
ment to each agent in the social network.
Definition 2 For any social network (A, w, λ, θ), a spending function is an
arbitrary function from set A into non-negative real numbers.
The following is an example of a spending function for the social network de-
picted in Figure 1. This function specifies a marketing campaign targeting
exclusively agent t.
(cid:40)
s(a) =
if a = t,
3,
0, otherwise.
(3)
Definition 3 For any social network (A, w, λ, θ) and any spending function s,
let (cid:107)s(cid:107) =(cid:80)
a∈A s(a).
5
vuwtxyz1123121313λ = 0, θ = 6λ = 0, θ = 2λ = 0, θ = 5λ = 1, θ = 4λ = 0, θ = 2λ = 0, θ = 0λ = 0, θ = 1For the spending function defined by equation (3), we have (cid:107)s(cid:107) = 3.
Next we formally define the diffusion in social network under marketing
campaign specified by a spending function s. Suppose that initially the product
is adopted by a set of agent A. We recursively define the diffusion chain of sets
of agents
A = A0
s ⊆ A1
s ⊆ A2
s ⊆ A3
s ⊆ . . . ,
s is the set of agents who have adopted the product on or before the
where Ak
k-th step of the diffusion.
Definition 4 For any given social network (A, w, λ, θ), any spending function
s, and any subset A ⊆ A, let set An
s be recursively defined as follows:
1. A0
s = A,
2. An+1
s = An
s ∪(cid:110)
b ∈ A λ(b) · s(b) +(cid:80)
(cid:111)
w(a, b) ≥ θ(b)
.
a∈An
s
For example, consider again the social network depicted in Figure 1. Let A
be the set {v} and s be the spending function defined by equation (3). Note that
the threshold value of agent u in this network is zero and, thus, it will adopt the
product without any peer or marketing pressure. For the other agents in this
network, the combination of the marketing pressure specified by the marketing
function s and the peer pressure from agent v is not enough to adopt the product.
s = {v, u}. Once agent v and agent u both adopt the product, their
Thus, A1
combined peer pressure on agent w reaches the threshold value of w and agent
w also adopts the product. No other agent is experiencing enough pressure to
s = {v, u, w}. Next, agent t will
adopt the product at this point. Hence, A2
adopt the product due to the combination of the peer pressure from agent w
and the marketing pressure specified by the spending function s, and so on.
This diffusion process is illustrated in Figure 2.
for each social network (A, w, λ, θ), each n, k ≥ 0,
s
s )k
s = An+k
s =(cid:83)
Corollary 1 (An
each set A ⊆ A, and each spending function s.
Definition 5 A∗
Corollary 2 A ⊆ A∗
tion s, and each subset A ⊆ A.
n≥0 An
s .
s for each social network (A, w, λ, θ), each spending func-
In the rest of this section we establish technical properties of the chain
{An
s}n≥0 and the set A∗
s that are used later. The first of these properties
is a corollary that follows from the assumption of the finiteness of set A in
Definition 1.
Corollary 3 For any social network (A, w, λ, θ), any subset A of A and any
spending function s, there is n ≥ 0 such that A∗
s = An
s .
Next, we prove that A∗
s is an idempotent operator.
6
Figure 2: Diffusion Chain A1
s ⊆ A2
s ⊆ A2
s ⊆ A4
s.
s for each social network (A, w, λ, θ), each spending func-
s ⊆ A∗
s)∗
Lemma 1 (A∗
tion s, and each subsets A of A.
Proof. By Corollary 3, there is n ≥ 0 such that A∗
there also is k ≥ 0 such that (An
s )∗
s )k
s = (An
(A∗
s)∗
s )∗
s = (An
s = (An
s by Definition 5.
s ⊆ A∗
s)∗
Therefore, (A∗
s = An
s . By the same corollary,
s . Thus, by Corollary 1,
s )k
s = An+k
.
s
(cid:2)
We now show that any set of agents influences at least as many agents as any
of its subsets, given the same fixed spending function. This claim is formally
stated as Corollary 4 that follows from the next lemma:
Lemma 2 If A ⊆ B, then Ak
spending function s, each k ≥ 0, and all subsets A and B of A.
s , for each social network (A, w, λ, θ), each
s ⊆ Bk
s . Let x ∈ Ak+1
Proof. We prove the statement of the lemma by induction on k. If k = 0, then
s = A ⊆ B = B0
A0
s by Definition 4.
. It suffices to show that x ∈ Bk+1
s ⊆ Bk
λ(x)· s(x) +(cid:80)
Suppose that Ak
.
implies that either x ∈ Ak
Indeed, by Definition 4, assumption x ∈ Ak+1
s
s or
w(a, x) ≥ θ(x). When x ∈ Ak
When λ(x) · s(x) +(cid:80)
s , by the induction hypothesis,
s . Thus, x ∈ Bk
s . Therefore, x ∈ Bk+1
(cid:88)
w(a, x) ≥ θ(x), due to the assumption Ak ⊆ Bk,
a∈Ak
w(b, x) ≥ λ(x) · s(x) +
w(a, x) ≥ θ(x).
λ(x) · s(x) +
by Definition 4.
s ⊆ Bk
(cid:88)
x ∈ Ak
a∈Ak
s
s
s
s
s
b∈Bk
s
a∈Ak
s
7
vuwtxyzA0sA1sA2sA3sA4sTherefore, x ∈ Bk+1
s
by Definition 4.
(cid:2)
Corollary 4 If A ⊆ B, then A∗
each spending function s, and all subsets A and B of A.
s ⊆ B∗
s , for each social network (A, w, λ, θ),
Next, we establish that the influence of the union of two sets of agents is at least
as strong as the combination of the influence of these two sets.
Lemma 3 A∗
ing function s, and all subsets A and B of A.
Proof. Note that A ⊆ A ∪ B and B ⊆ A ∪ B. Thus, A∗
s ⊆ (A ∪ B)∗
s ⊆ (A ∪ B)∗
s ⊆ (A ∪ B)∗
B∗
s.
s, for each social network (A, w, λ, θ), each spend-
s by Corollary 4. Therefore, A∗
s ⊆ (A∪B)∗
s ∪ B∗
s and
(cid:2)
s∪B∗
One might intuitively think that the result of two consecutive marketing
campaigns can not be more effective than the combined campaign, or, in other
terms, that (A∗
. More careful analysis shows that this claim is
true only if all agents have non-negative propensity. However, this property can
be restated in the form which is true for negative propensity as well. To do this,
we introduce a binary operation ⊕λ on spending functions.
⊆ A∗
s1+s2
)∗
s1
s2
Definition 6 For any two spending functions s1 and s2 and any propensity
function λ, let s1 ⊕λ s2 be spending function such that for each agent a,
(cid:40)
(s1 ⊕λ s2)(a) =
s1(a) + s2(a),
0,
if λ(a) ≥ 0,
otherwise.
The desired property, expressed in terms of operation ⊕λ, is stated later as
Lemma 6. We start with two auxiliary observations.
Lemma 4 λ(b) · s1(b) ≤ λ(b) · (s1 ⊕λ s2)(b) for any social network (A, w, λ, θ),
any agent b ∈ A, and any two spending functions s1 and s2.
Proof. We consider the following two cases separately:
Case I: λ(b) ≥ 0.
In this case by Definition 6 and because s2(b) ≥ 0 due
to Definition 2, we have s1(b) ≤ s1(b) + s2(b) = (s1 ⊕λ s2)(b). Therefore,
λ(b) · s1(b) ≤ λ(b) · (s1 ⊕λ s2)(b) by the assumption λ(b) ≥ 0.
In this case by Definition 6 and because s1(b) ≥ 0 due
Case II: λ(b) < 0.
to Definition 2, we have s1(b) ≥ 0 = (s1 ⊕λ s2)(b). Therefore, λ(b) · s1(b) ≤
λ(b) · (s1 ⊕λ s2)(b) by the assumption λ(b) < 0.
(cid:2)
Now we prove that the spending function s1 ⊕λ s2 is at least as effective as
s1.
, for any social network (A, w, λ, θ), any set A ⊆ A,
Lemma 5 An
any n ≥ 0, any propensity function λ, and any two spending function s1 and s2.
s1
⊆ An
s1⊕λs2
8
Proof. We show the lemma by induction on n.
tion 4, A0
s1
that An+1
hypothesis,
If n = 0, then, by Defini-
s1⊕λs2
. We need to show
. Indeed, by Definition 4, Lemma 4, and the induction
= A = A0
⊆ An+1
s1⊕λs2
. Suppose that An
s1
⊆ An
s1⊕λs2
s1
b ∈ A λ(b) · s1(b) +
(cid:88)
b ∈ A λ(b) · (s1 ⊕λ s2)(b) +
a∈An
s1
∪
w(a, b) ≥ θ(b)
(cid:88)
a∈An
s1⊕λ s2
An+1
s1
= An
s1
∪
⊆ An
s1⊕λs2
= An+1
s1⊕λs2
.
w(a, b) ≥ θ(b)
(cid:2)
Finally, we are ready to state and prove that a marketing campaign with
spending function s1 ⊕λ s2 is at least as effective as a sequential combination of
two marketing campaigns with spending functions s1 and s2. This property is
used in Lemma 12 to prove the soundness of Transitivity axiom for promotional
marketing.
Lemma 6 (A∗
A, any propensity function λ, and any two spending function s1 and s2.
Proof. By Corollary 3, there are n1, n2 ≥ 0 such that A∗
and (An1
s1
(An1
s1
, for any social network (A, w, λ, θ), any set A ⊆
⊆ A∗
= An1
s1
s1⊕λs2
. Thus,
)n2
s2
)∗
=
s1
)∗
s2
s1
s2
(A∗
s1
)∗
s2
)n2
s2
)n2
s2⊕λs1
)n2
s1⊕λs2
)n2
s2
= (An1
s1
⊆ (An1
s1⊕λs2
⊆ (An1
s1⊕λs2
⊆ (An1
s1⊕λs2
⊆ An1+n2
s1⊕λs2
⊆ A∗
s1⊕λs2
by Lemma 5 and Lemma 2
by Lemma 5
by Definition 6
by Corollary 1
by Definition 5.
(cid:2)
3 Logic of Promotional Marketing
There are two logical systems that we study in this paper. In this section we
introduce a logical system for the marketing aiming to promote influence and
prove its soundness and completeness. In the next section we do the same for
the marketing aiming to prevent influence.
9
3.1 Syntax and Semantics
We start by defining the syntax of our logical systems. The logic of promotional
marketing and the logic of preventive marketing use the same language Φ(A),
but different semantics.
Definition 7 For any finite set A, let Φ(A) be the minimum set of formulas
such that
1. A(cid:3)p B ∈ Φ(A) for all subsets A and B of set A and all non-negative real
2. ¬ϕ ∈ Φ(A) for all ϕ ∈ Φ(A),
3. ϕ → ψ ∈ Φ(A) for all ϕ, ψ ∈ Φ(A).
numbers p,
The next definition is the key definition of this section. Its item 1 specifies
the influence relation in a social network with a fixed marketing budget.
Definition 8 For any social network N with the set of agents A and any for-
mula ϕ ∈ Φ(A), we define satisfiability relation N (cid:15) ϕ as follows:
1. N (cid:15) A(cid:3)p B if B ⊆ A∗
2. N (cid:15) ¬ψ if N (cid:50) ψ,
3. N (cid:15) ψ → χ if N (cid:50) ψ or N (cid:15) χ.
s for some spending function s such that (cid:107)s(cid:107) ≤ p,
For example, as we have seen in the introduction, for social network N depicted
in Figure 1, we have {x, z} ⊆ {v}∗
s, where spending function s is defined by
equation (3). Thus, N (cid:15) {v}(cid:3)3 {x, z}. Through the rest of the paper we omit
curly braces from the formulas like this and write them simply as N (cid:15) v(cid:3)3 x, z.
3.2 Axioms
Let A be any fixed finite set of agents. Our logical system for promotional
influence, in addition to propositional tautologies in language Φ(A), contains
the following axioms:
1. Reflexivity: A(cid:3)p B, where B ⊆ A,
2. Augmentation: A(cid:3)p B → A, C (cid:3)p B, C,
3. Transitivity: A(cid:3)p B → (B (cid:3)q C → A(cid:3)p+q C).
We write (cid:96) ϕ if formula ϕ ∈ Φ(A) is derivable in this logical system using
Modus Ponens inference rule. We write X (cid:96) ϕ if formula ϕ is derivable using
an additional set of axioms X ⊆ Φ(A).
10
3.3 Examples
Ponens inference rule.
The soundness and the completeness of our logical system will be shown later.
In this section we give several examples of formal proofs in our system. We start
with a form of the monotonicity statement from the introduction. As the next
lemma shows, this statement is provable in our logic of promotional marketing
when p ≤ q:
Lemma 7 (cid:96) A(cid:3)p B → A(cid:3)q B, where p ≤ q.
Proof. By Transitivity axiom, (cid:96) A(cid:3)q−p A → (A(cid:3)p B → A(cid:3)q B). At the same
time, (cid:96) A(cid:3)q−p A by Reflexivity axiom. Thus, (cid:96) A(cid:3)p B → A(cid:3)q B by Modus
Lemma 8 (cid:96) A(cid:3)p B → (A(cid:3)q C → A(cid:3)p+q B, C).
(cid:96) A(cid:3)p B → A(cid:3)p A, B
(cid:96) A(cid:3)q C → A, B (cid:3)q B, C.
Proof. By Augmentation axiom,
and
(4)
(5)
(cid:2)
By Transitivity axiom,
(cid:96) A(cid:3)p A, B → (A, B (cid:3)q B, C → A(cid:3)p+q B, C).
(6)
The statement of the lemma follows from statements (4), (5), and (6) by the
(cid:2)
laws of propositional logic.
The next lemma will be used later in the proof of the completeness.
Lemma 9 Let X be a subset of Φ(A), m be a non-negative integer number, sets
A, B1, . . . , Bm be subsets of A, and p1, . . . , pm be non-negative real numbers. If
X (cid:96) A(cid:3)pi Bi for all 1 ≤ i ≤ m, then X (cid:96) A(cid:3)q
Suppose that X (cid:96) A(cid:3)q(cid:48)(cid:83)m−1
that X (cid:96) A(cid:3)0 ∅, which is an instance of Reflexivity axiom.
q =(cid:80)m
due to the assumption of the lemma, by Lemma 8, X (cid:96) A (cid:3)q
(cid:83)m
i=1 Bi, where q =(cid:80)m
i=1 Bi, where q(cid:48) =(cid:80)m−1
i=1 pi. Since X (cid:96) A(cid:3)pm Bm
Proof. We prove the lemma by induction on m. If m = 0, then we need to show
i=1 Bi, where
(cid:2)
(cid:83)m
i=1 pi.
i=1 pi.
3.4 Soundness
In this section we prove the soundness of the logic for promotional marketing.
Theorem 1 For any finite set A and any ϕ ∈ Φ(A), if (cid:96) ϕ, then N (cid:15) ϕ for
each social network N = (A, w, λ, θ).
11
The soundness of propositional tautologies and of Modus Ponens inference
rule is straightforward. Below we show the soundness of each of the remaining
axioms as a separate lemma.
Lemma 10 N (cid:15) A (cid:3)p B, for any social network N = (A, w, λ, θ) and any
subsets A and B of A such that B ⊆ A.
Proof. Let s be the spending function equal to 0 on each a ∈ A. Thus,
(cid:107)s(cid:107) = 0 ≤ p by Definition 3. At the same time, B ⊆ A ⊆ A∗
s by Corol-
lary 2. Therefore, N (cid:15) A(cid:3)p B by Definition 8.
(cid:2)
Lemma 11 If N (cid:15) A (cid:3)p B, then N (cid:15) A, C (cid:3)p B, C, for each social network
N = (A, w, λ, θ) and all subsets A, B, and C of A.
Proof. Suppose that N (cid:15) A (cid:3)p B. Thus, by Definition 8, there is a spending
function s such that (cid:107)s(cid:107) ≤ p and B ⊆ A∗
Thus, B ∪ C ⊆ A∗
s by Lemma 3. Therefore, N (cid:15) A, C(cid:3)p B, C,
by Definition 8.
Lemma 12 For any social network N = (A, w, λ, θ), if N (cid:15) A(cid:3)p B and N (cid:15)
B (cid:3)q C, then N (cid:15) A(cid:3)p+q C.
Proof. By Definition 8, assumption N (cid:15) B(cid:3)q C implies that there is a spending
function s1 such that (cid:107)s1(cid:107) ≤ q and C ⊆ B∗
Similarly, assumption N (cid:15) A(cid:3)p B implies that there is a spending function
s2 such that (cid:107)s2(cid:107) ≤ p and B ⊆ A∗
by Corollary 4.
Thus, B∗
by Lemma 6.
. At the same time, (cid:107)s1 ⊕λ s2(cid:107) ≤
It follows that C ⊆ B∗
⊆ A∗
(cid:107)s1(cid:107) + (cid:107)s2(cid:107) ≤ p + q, by Definition 6. Therefore, N (cid:15) A (cid:3)p+q C by Defini-
(cid:2)
s by Corollary 2.
(cid:2)
s . Note that C ⊆ C∗
s ∪ C∗
s ⊆ (A∪ C)∗
. Hence, B∗
⊆ A∗
s1⊕λs2
s1⊕λs2
tion 8.
s2
⊆ (A∗
s2
)∗
s1
s1
.
s1
s1
s1
This concludes the proof of the soundness of our logical system for promo-
tional marketing.
3.5 Completeness
We now show the completeness of our logical system for promotional marketing.
This result is formally stated as Theorem 2 in the end of this section. As usual,
at the core of the proof of the completeness is a construction of a canonical
model. In our case, the role of a canonical model is played by the canonical
social network.
Let A0 be any finite set and X = {Ai (cid:3)pi Bi}i≤m be any finite set of
atomic formulas in language Φ(A0). We now proceed to define the canonical
social network NX = (A, w, λ, θ). An example of the canonical network for set
X consisting of formula a, c (cid:3)1 d, formula b, c (cid:3)2 a, and formula a, b (cid:3)3 c is
12
Figure 3: The canonical social network NX for set X consisting of formula
a, c(cid:3)1 d, formula b, c(cid:3)2 a, and formula a, b(cid:3)3 c.
depicted in Figure 3. We associate two new agents αi and βi with each formula
Ai (cid:3)pi Bi ∈ X. We assume that agents α1, . . . , αm, β1, . . . , βm are distinct and
that they do not belong to set A0.
Definition 9 A = A0 ∪ {αi}i≤m ∪ {βi}i≤m.
In social network NX only agents {αi}i≤m are responsive to promotional
marketing. We formally capture this through the following definition of function
λ:
Definition 10 For any a ∈ A,
(cid:40)
λ(a) =
if a = αi for some i ≤ m,
1,
0, otherwise.
We assume that for each i ≤ m, all agents in set Ai as well as agent αi
put peer pressure on agent βi once they adopt the product. In addition, upon
adopting the product, agent βi puts peer pressure on each agent in set Bi.
Besides that, no agent can put peer pressure on any other agent in this network.
We formally capture this in Definition 11.
Definition 11
w(a, b) =
1,
if a ∈ Ai ∪ {αi} and b = βi for some i ≤ m,
if a = βi and b ∈ Bi for some i ≤ m,
1,
0, otherwise.
Before continuing with the definition of the social network NX , we state
and prove a property of this network that follows from Definition 11. We show
that in order to put peer pressure of at least Ai + 1 on agent βi, one needs to
influence agent αi and all of the agents in set Ai.
13
abcβ3β1β2dα2α3α1A011111111111λ: 1, θ: 21λ: 0, θ: 1λ: 0, θ: 1λ: 0, θ: 1λ: 0, θ: 1λ: 1, θ: 1λ: 1, θ: 3λ: 0, θ: 3λ: 0, θ: 3λ: 0, θ: 3Lemma 13 If(cid:80)
all other a ∈ A. Thus, inequality (cid:80)
a∈An
s
Proof. By Definition 11, w(a, βi) = 1 if a ∈ Ai ∪ {αi} and w(a, βi) = 0 for
w(a, βi) ≥ Ai + 1 implies that
Ai ∪ {αi} ⊆ An
(cid:2)
s . Therefore, αi ∈ An
s and Ai ⊆ An
s .
a∈An
s
w(a, βi) ≥ Ai + 1, then αi ∈ An
s and Ai ⊆ An
s .
We are now ready to define the threshold value function θ for the social
network NX . Recall that according to Definition 11 and Definition 10, no agent
can put peer pressure on agent αi, but agent αi is responsive to promotional
marketing. We set the threshold value θ(αi) to pi so that this agent can only
be influenced by a marketing campaign with budget at least pi. We set value
θ(βi) high enough to guarantee (see Lemma 13) that agent αi and each agent
in set Ai adopt the product before agent βi is influenced. Threshold values of
all agents in set A0 are set to 1.
Definition 12
θ(a) =
pi,
Ai + 1,
1,
if a = αi for some i ≤ m,
if a = βi for some i ≤ m,
otherwise.
This concludes the definition of the canonical social network NX = (A, w, λ, θ).
Recall that Figure 3 depicts the canonical social network NX for set X
consisting of formula a, c(cid:3)1 d, formula b, c(cid:3)2 a, and formula a, b(cid:3)3 c. Note that
formula a, c(cid:3)1 d, formula b, c(cid:3)2 a, and formula a, b(cid:3)3 c are all satisfied in the
canonical network depicted in Figure 3. For example, for the formula a, c(cid:3)1 d,
let spending function s be such that it spends 1 on agent αi and nothing on all
other agents. Thus, {a, c}1
s = {a, c, α1}. Once α1 adopts the product, the total
peer pressure on agent β1 becomes 3 and it too adopts the product: {a, c}2
s =
{a, c, α1, β1}. Finally, upon adopting of the product, agent β1 alone puts enough
s = {a, c, α1, β1, d}. Thus,
pressure on agent d to also adopt the product: {a, c}3
formula a, c(cid:3)1 d is satisfied in this network.
to a claim that all formulas from set X = {Ai (cid:3)pi Bi}i≤m are satisfied in the
Lemma 14 NX (cid:15) Ai (cid:3)pi Bi for each i ≤ m.
Proof. Consider any i ≤ m. Let s be a spending function such that
The next lemma generalizes the observation made in the previous paragraph
canonical network NX .
(cid:40)
s(a) =
pi,
0,
if a = αi,
otherwise.
(7)
Then, by Definition 10, Definition 11, and Definition 12,
λ(αi) · s(αi) +
(cid:88)
a∈Ai
(cid:88)
a∈Ai
w(a, αi) = 1 · pi +
14
0 = pi = θ(αi).
s by Definition 4. Hence, by Definition 10, Definition 11, and
λ(βi) · s(βi) +
w(a, βi) ≥ λ(βi) · s(βi) + w(αi, βi) +
w(a, βi)
Thus, αi ∈ (Ai)1
Definition 12,
(cid:88)
a∈(Ai)1
s
(cid:88)
a∈Ai
≥ 0 · 0 + 1 + Ai = 1 + Ai = θ(βi).
Thus, βi ∈ (Ai)2
Definition 11, and Definition 12,
s by Definition 4. Finally, for each b ∈ Bi, by Definition 10,
(cid:88)
w(a, b) ≥ 0 · 0 + w(βi, b) = w(βi, b) = 1 = θ(b).
λ(b) · s(b) +
s
a∈(Ai)2
s by Definition 4. Thus, b ∈ (Ai)∗
s by Definition 5 for each
s. Note that (cid:107)s(cid:107) = pi due to definition (7). Therefore,
(cid:2)
Hence, b ∈ (Ai)3
b ∈ Bi. Then, Bi ⊆ A∗
NX (cid:15) Ai (cid:3)pi Bi by Definition 8.
s , then αi ∈ An
s , for each A ⊆ A0, each i ≤ m, and each
Our next important result is the converse of Lemma 14 stated later as
Lemma 22. In preparation for its, we make several technical observations about
the social network NX . First, we prove that, for each i ≤ m, agent βi can not
be influenced without agent αi being influenced as well.
Lemma 15 If βi ∈ An
n ≥ 0.
s . Let k be the smallest integer such that 0 ≤ k ≤ n and
Proof. Suppose βi ∈ An
βi ∈ Ak
s .
s = A by Definition 4. Thus, βi ∈ A0 due to the
assumption A ⊆ A0, which contradicts the choice of β1, . . . , βm. Therefore, the
lemma is vacuously true.
Suppose that k > 0. Since k > 0 is the smallest integer such that βi ∈ Ak
s ,
it must be that βi ∈ Ak
If k = 0, then βi ∈ A0
. Thus, by Definition 4,
s \ Ak−1
λ(βi) · s(βi) +
s
(cid:88)
a∈Ak−1
s
w(a, βi) ≥ θ(βi).
(cid:88)
w(a, βi) ≥ Ai + 1.
By Definition 10, λ(βi) = 0. By Definition 12, θ(βi) = Ai + 1. Thus,
a∈Ak−1
s
Thus, αi ∈ Ak−1
Definition 4 and since k − 1 < k ≤ n.
by Lemma 13. Hence, αi ∈ Ak−1
s
s
. Therefore, αi ∈ An
s by
(cid:2)
The next lemma shows that the only way to influence agent αi is to spend
at least pi on promotional marketing to this agent.
Lemma 16 If αi ∈ An
s , then s(αi) ≥ pi, for each A ⊆ A0.
15
Proof. Suppose that αi ∈ An
α1, . . . , αm. Thus, by Definition 4, there is k < n such that
w(a, αi) ≥ θ(αi).
s . Note that αi /∈ A0 ⊇ A = A0
λ(αi) · s(αi) +
(cid:88)
s by the choice of
a∈Ak
s
By Definition 11, w(a, αi) = 0 for each a ∈ A. Hence, λ(αi) · s(αi) ≥ θ(αi).
By Definition 10, λ(αi) = 1. By Definition 12, θ(αi) = pi. Therefore, s(αi) ≥
(cid:2)
pi.
a∈An
s
(cid:83)
a∈An
s
a∈An
s
\ An
s
βi∈An+1
s
\An
s
s implies that
\ An
s , then
by Transitivity axiom.
λ(βi) · s(βi) +
w(a, βi) ≥ θ(βi).
s ∩ A0)(cid:3)q
w(a, βi) ≥ Ai + 1. Thus, Ai ⊆ An
Lemma 17 For each n ≥ 0 and each subset A of A0, if βi ∈ An+1
X (cid:96) (An
Proof. By Definition 4, assumption βi ∈ An+1
s ∩ A0)(cid:3)pi Bi.
w(a, βi) ≥ θ(βi). Hence, by Defini-
s by Lemma 13. Recall that
s ∩A0)(cid:3)0 Ai
s ∩ A0)(cid:3)pi Bi
(cid:88)
By Definition 10, λ(βi) = 0. Thus, (cid:80)
tion 12,(cid:80)
s ∩A0. Then, (cid:96) (An
Ai ⊆ A0 by the choice of set X. Hence, Ai ⊆ An
by Reflexivity axiom. Recall that Ai (cid:3)pi Bi ∈ X. Thus, X (cid:96) (An
Bi, where q =(cid:80)
Lemma 18 X (cid:96) (An
pi.
Proof. The statement of the lemma follows from Lemma 17 and Lemma 9. (cid:2)
)∩A0), where q =(cid:80)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) λ(b) · s(b) +
(cid:88)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) λ(b) · s(b) +
(cid:88)
b ∈ A0
\
b ∈ A0
b ∈ A0
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
b ∈ A0
(cid:88)
Lemma 19 X (cid:96) (An
for each subset A of A0, each spending function s, and each n ≥ 0.
By Definition 10, λ(b) = 0 for all b ∈ A0. By Definition 12, θ(b) = 1 for all
b ∈ A0. Thus,
s ∩A0)(cid:3)q ((An+2
s
.
w(a, b) ≥ θ(b)
w(a, b) ≥ θ(b)
Proof. By Definition 4,
) ∩ A0 =
w(a, b) ≥ 1
) ∩ A0 =
(cid:88)
\ An+1
\ An+1
\An+1
s
βi∈An+1
s
\An
s
βi∈An+1
s
\An
s
(An+2
s
s
(An+2
s
s
a∈An+1
s
a∈An
s
(cid:2)
pi,
s
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
\
.
w(a, b) ≥ 1
a∈An
s
a∈An+1
s
16
Since α1, . . . , αm, β1, . . . βm /∈ A0, by Definition 11, for each b ∈ A0, we have
w(a, b) (cid:54)= 0 only if a = βi and b ∈ Bi for some i ≤ m, in which case w(a, b) = 1.
Hence,
(An+2
s
\ An+1
s
) ∩ A0 =
βi∈An+1
s
\An
s
X (cid:96) (An
s ∩ A0)(cid:3)q
βi∈An+1
s
\An
s
(cid:91)
(cid:91)
Bi.
Bi,
Thus, to finish the proof of the lemma, it is sufficient to show that
pi, which follows from Lemma 18.
(cid:2)
s∩A0), for each subset A of A0, each spending function
where q =(cid:80)
Lemma 20 X (cid:96) A(cid:3)q(A1
βi∈An+1
\An
s
s
Proof. By Definition 4,
s ∩ A0 = (A ∩ A0) ∪
A1
s, and each non-negative real number q.
(cid:41)
w(a, b) ≥ θ(b)
.
(cid:88)
a∈A
(cid:41)
By Definition 10, λ(b) = 0 for all b ∈ A0. By Definition 12, θ(b) = 1 for all
b ∈ A0. Thus,
s ∩ A0 = (A ∩ A0) ∪
A1
w(a, b) ≥ 1
.
By Definition 11, w(a, b) = 0 for all a ∈ A ⊆ A0 and all b ∈ A0. Thus, the set
(cid:40)
b ∈ A0
b ∈ A0
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) λ(b) · s(b) +
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:88)
(cid:40)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:88)
(cid:41)
∩A0), where q =(cid:80)
w(a, b) ≥ 1
a∈A
a∈A
(cid:40)
b ∈ A0
is empty. Hence, A1
ivity axiom.
s ∩ A0 = A ∩ A0. Therefore, X (cid:96) A(cid:3)q (A1
s ∩ A0) by Reflex-
(cid:2)
Lemma 21 X (cid:96) A(cid:3)q (An+1
A0, each spending function s, and each n ≥ 0.
s
βi∈An
s
pi, for each subset A of
Proof. We prove this lemma by induction on n. If n = 0, then the required
follows from Lemma 20.
Assume now that
where q =(cid:80)
βi∈An
s
pi.
X (cid:96) A(cid:3)q (An+1
s
∩ A0),
17
(8)
Note that An
s ⊆ An+1
s
by Reflexivity axiom. At the same time, by Lemma 19,
s
∩ A0)(cid:3)0 (An
s ∩ A0)
where r =(cid:80)
βi∈An+1
s
Then, by Augmentation axiom,
X (cid:96) (An+1
s
In other words,
) ∩ A0),
s
s
s
s
\An
\ An+1
X (cid:96) (An
X (cid:96) (An+1
pi. Thus, by Transitivity axiom,
by Definition 4. Hence, (cid:96) (An+1
s ∩ A0)(cid:3)r ((An+2
∩ A0)(cid:3)r ((An+2
∩ A0)(cid:3)r ((An+2
∩ A0)(cid:3)r (An+2
∩ A0), where q(cid:48) = q + r =(cid:80)
X (cid:96) (An+1
\ An+1
\ An+1
∩ A0).
pi.
s
s
s
s
s
s
s
∩ A0), (An+1
) ∩ A0).
) ∩ A0), (An+1
s
∩ A0).
(9)
s
s
βi∈An+1
We are now ready to prove the converse of Lemma 14.
Therefore, by Transitivity axiom from statement (8) and (9) we can conclude
(cid:2)
X (cid:96) A(cid:3)q(cid:48) (An+2
Lemma 22 If NX (cid:15) A(cid:3)p B, then X (cid:96) A(cid:3)p B, for each subsets A and B of
A0 and each non-negative real number p.
Proof. Suppose that NX (cid:15) A(cid:3)p B. By Definition 8, there is a spending function
s. Thus, by Corollary 3, there is n ≥ 0 such that
s such that (cid:107)s(cid:107) ≤ p and B ⊆ A∗
s ⊆ An+1
B ⊆ An
s . By Definition 4, An
. Since B is a subset
∩ A0. Hence, (cid:96) (An+1 ∩ A0) (cid:3)0 B by Reflexivity
of A0, we have B ⊆ An+1
where q =(cid:80)
axiom. Then, from Transitivity axiom and Lemma 21, we have X (cid:96) A (cid:3)q B,
pi ≤(cid:80)
Note that(cid:80)
pi ≤ (cid:88)
(cid:88)
pi by Lemma 15 and(cid:80)
pi ≤ (cid:88)
s(αi) ≤(cid:88)
s(a) = (cid:107)s(cid:107) ≤ p.
Hence, q ≤ p. Then, (cid:96) B (cid:3)p−q B by Reflexivity axiom. Finally, X (cid:96) A(cid:3)q B
and (cid:96) B (cid:3)p−q B, by Transitivity axiom, imply that X (cid:96) A(cid:3)p B.
by Lemma 16. Thus, taking into account Definition 3,
pi ≤ (cid:88)
. Thus, B ⊆ An+1
pi ≤(cid:80)
pi.
βi∈An
s(αi)≥pi
s(αi)≥pi
s(αi)≥pi
αi∈An
αi∈An
αi∈An
βi∈An
βi∈An
a∈A
q =
(cid:2)
We conclude this section by stating and proving the completeness theorem
s
s
s
s
s
s
s
s
s
for promotional marketing.
Theorem 2 If (cid:48) ϕ, then there exists social network N = (A, w, λ, θ) such that
ϕ ∈ Φ(A) and N (cid:50) ϕ.
Proof. Suppose that (cid:48) ϕ. Let M be any maximal consistent subset of
{ψ,¬ψ ψ is a subformula of ¬ψ}
such that ¬ψ ∈ M . Let X be the set of all atomic formulas of the form A(cid:3)p B
in set M . To finish the proof of the theorem, we first establish the following
lemma:
18
pi
Lemma 23 ψ ∈ M if and only if NX (cid:15) ψ for each subformula ψ of ¬ϕ.
Proof. We prove the lemma by induction on the structural complexity of formula
by Lemma 14.
ψ. In the base case, suppose that ψ is A(cid:3)p B.
(⇒) If A(cid:3)p B ∈ M , then A(cid:3)p B ∈ X by the choice of set X. Thus, NX (cid:15) A(cid:3)p B
(⇐) If NX (cid:15) A (cid:3)p B, then X (cid:96) A (cid:3)p B by Lemma 22. Thus, M (cid:96) A (cid:3)p B.
Hence, by the maximality of set M , we have A (cid:3)p B ∈ M since A (cid:3)p B is a
subformula of ¬ϕ.
and the consistency of set M and Definition 8 in the standard way.
The induction step follows from the induction hypothesis, the maximality
(cid:2)
To finish the proof of the theorem, note that ¬ϕ ∈ M by the choice of set
(cid:2)
M . Thus, NX (cid:15) ¬ψ by Lemma 23. Therefore, NX (cid:50) ψ by Definition 8.
4 Logic of Preventive Marketing
In this section we study the impact of preventive marketing on influence in
social networks. Our definition of a social network given in Definition 1 and the
language Φ(A) remain the same. As it has been discussed in the introduction,
we only modify the meaning of the influence relation A (cid:3)p B to be "for any
preventive marketing campaign with budget no more than p, the set of agents
A is able to influence the set of agents B". The latter is formally captured in
item 1 of Definition 13.
Definition 13 For any social network N with the set of agents A and any
formula ϕ ∈ Φ(A), we define the satisfiability relation N (cid:15) ϕ as follows:
1. N (cid:15) A(cid:3)p B if B ⊆ A∗
2. N (cid:15) ¬ψ if N (cid:50) ψ,
3. N (cid:15) ψ → χ if N (cid:50) ψ or N (cid:15) χ.
s for each spending function s such that (cid:107)s(cid:107) ≤ p,
Note the significant difference between the above definition and the similar
Definition 8 for promotional marketing. Item 1 of Definition 13 has a universal
quantifier over spending functions and corresponding part of Definition 8 has
an existential quantifier over spending functions.
4.1 Axioms
Let A be any fixed finite set of agents. Our logical system for influence with
preventive marketing, in addition to propositional tautologies in language Φ(A),
contains the following axioms:
1. Reflexivity: A(cid:3)p B, where B ⊆ A,
19
2. Augmentation: A(cid:3)p B → A, C (cid:3)p B, C,
3. Transitivity: A(cid:3)p B → (B (cid:3)p C → A(cid:3)p C),
4. Monotonicity: A(cid:3)p B → A(cid:3)q B, where q ≤ p.
Just like in the case of promotional marketing, we write (cid:96) ϕ if formula ϕ ∈ Φ(A)
is derivable in our logical system using Modus Ponens inference rule. We write
X (cid:96) ϕ if formula ϕ is derivable using an additional set of axioms X ⊆ Φ(A).
4.2 Example
The soundness and the completeness of our logical system will be shown later.
In this section we give two examples of formal proofs in our system. First, we
show a preventive marketing analogy of Lemma 8:
Proof. By Augmentation axiom,
Lemma 24 (cid:96) A(cid:3)p B → (A(cid:3)p C → A(cid:3)p B, C).
(cid:96) A(cid:3)p B → A(cid:3)p A, B
(cid:96) A(cid:3)p C → A, B (cid:3)p B, C.
By Transitivity axiom,
and
(10)
(11)
(12)
(cid:96) A(cid:3)p A, B → (A, B (cid:3)p B, C → A(cid:3)p B, C).
The statement of the lemma follows from statements (10), (11), and (12) by the
(cid:2)
laws of the propositional logic.
Next, we show an auxiliary lemma that is used later in the proof of com-
pleteness.
Lemma 25 If X (cid:96) B (cid:3)p c for each c ∈ C, then X (cid:96) B (cid:3)p C, where B and C
are subsets of A0 and p ≥ 0.
Proof. We prove the lemma by induction on the size of set C.
Base Case: X (cid:96) B (cid:3)p ∅ by Reflexivity axiom.
Induction Step: Assume that X (cid:96) B(cid:3)p C. Let c be any element of A0 \ C such
that X (cid:96) B (cid:3)p c. We need to show that X (cid:96) B (cid:3)p C ∪ {c}. By Augmentation
Recall that X (cid:96) B (cid:3)p c. Again by Augmentation axiom, X (cid:96) B (cid:3)p B ∪ {c}.
Hence, X (cid:96) B (cid:3)p C ∪ {c}, due to (13) and Transitivity axiom.
X (cid:96) B ∪ {c}(cid:3)p C ∪ {c}.
axiom,
(13)
(cid:2)
20
4.3 Soundness
In this section we prove the soundness of the logic for preventive marketing.
Theorem 3 For any finite set A and any ϕ ∈ Φ(A), if (cid:96) ϕ, then N (cid:15) ϕ for
each social network N = (A, w, λ, θ).
The soundness of propositional tautologies and of Modus Ponens inference
rule is straightforward. Below we show the soundness of each of the remaining
axioms as a separate lemma.
Lemma 26 N (cid:15) A (cid:3)p B, for any social network N = (A, w, λ, θ) and any
subsets A and B of A such that B ⊆ A.
Proof. Let s be any spending function. By Definition 13, it suffices to show
that B ⊆ A∗
s due to the
assumption B ⊆ A of the lemma.
(cid:2)
s by Corollary 2. Therefore, B ⊆ A∗
s. Indeed, A ⊆ A∗
s ∪ C∗
Lemma 27 If N (cid:15) A (cid:3)p B, then N (cid:15) A, C (cid:3)p B, C, for each social network
N = (A, w, λ, θ) and all subsets A, B, and C of A.
Proof. Suppose that N (cid:15) A (cid:3)p B. Consider any spending function s such
that (cid:107)s(cid:107) ≤ p. It suffices to show that B ∪ C ⊆ (A ∪ C)∗
s. Indeed, assumption
s by Definition 13. At the same time, C ⊆ C∗
N (cid:15) A(cid:3)p B implies that B ⊆ A∗
by Corollary 2. Therefore, B ∪ C ⊆ A∗
s ⊆ (A ∪ C)∗
s
(cid:2)
Lemma 28 If N (cid:15) A(cid:3)p B and N (cid:15) B(cid:3)p C, then N (cid:15) A(cid:3)p C, for each social
network N = (A, w, λ, θ) and all subsets A, B, and C of A.
Proof. Suppose that N (cid:15) A (cid:3)p B and N (cid:15) B (cid:3)p C. Consider any spending
function s such that (cid:107)s(cid:107) ≤ p. By Definition 13, it suffices to show that C ⊆ A∗
s.
Note that assumption N (cid:15) A (cid:3)p B, by Definition 13, imply that B ⊆ A∗
s.
s ⊆ (A∗
s by Corollary 4. At the same time, assumption N (cid:15) B (cid:3)p C
s)∗
Thus, B∗
s. Therefore, C ⊆ A∗
s by Definition 13. Hence, C ⊆ (A∗
implies that C ⊆ B∗
s)∗
(cid:2)
by Lemma 1.
s, by Lemma 3.
s
Lemma 29 If N (cid:15) A(cid:3)p B, then N (cid:15) A(cid:3)q B, for each q ≤ p, each each social
network N = (A, w, λ, θ) and all subsets A and B of A.
Proof. Consider any spending function s such that (cid:107)s(cid:107) ≤ q. By Definition 13,
it suffices to show that B ⊆ A∗
s. To prove this, note that (cid:107)s(cid:107) ≤ q ≤ p. Thus,
B ⊆ A∗
s due to Definition 13 and the assumption N (cid:15) A(cid:3)p B of the lemma. (cid:2)
This concludes the proof of the soundness of our logical system for preventive
marketing.
21
4.4 Completeness
The rest of this section contains the proof of the following result.
Theorem 4 If (cid:48) ϕ, then there is a social network N = (A, w, λ, θ) such that
ϕ ∈ Φ(A) and N (cid:50) ϕ.
Suppose that (cid:48) ϕ.
It suffices to construct a "canonical" social network
N = (A, w, λ, θ) such that N (cid:50) ϕ. Define P ⊂ R to be the finite set of all
subscripts that appear in formula ϕ. Let ε > 0 be such that p1 − p2 > ε for all
p1, p2 ∈ P where p1 (cid:54)= p2. Let A0 be the finite set of all agents that appear in
formula ϕ and X be a maximal consistent subset of Φ(A0) containing formula
¬ϕ.
In Section 2, we have introduced closures Ak
s of a set of agents A.
Both of these closures are semantic in the sense that they are defined in terms
of a given social network. We are about to introduce another closure A+
p that
will be used to construct the canonical social network N . Unlike closures Ak
s
and A∗
p is syntactic because it is defined in terms of provability
of certain statements in our logical system.
s, closure the A+
s and A∗
Definition 14 A+
any p ≥ 0.
Lemma 30 X (cid:96) A(cid:3)p A+
p = {a ∈ A0 X (cid:96) A(cid:3)p a}, for any set of agents A ⊆ A0 and
p , for any A ⊆ A0 and any p ≥ 0.
Proof. The statement of the lemma follows from Definition 14 and Lemma 25.
(cid:2)
p = A+
q
Generally speaking, it is possible that A+
for some p and q such
that p (cid:54)= q. In the construction of the canonical social network N it will be
convenient to distinguish closures A+
p for different values of parameter p.
In
such situations, instead of closure A+
p we consider labeled closure, formally
defined as pair (A+
Definition 15 Let L = {(A+
p , p) A ⊆ A0, p ∈ P}.
p , p).
Next we define the canonical network N = (A, w, λ, θ). Besides agents in
set A0, our social network also has two additional agents for each (cid:96) ∈ L. By
analogy with the canonical social network NX from the proof of completeness
for promotional marking, we call these additional agents α((cid:96)) and β((cid:96)).
Definition 16 A = A0 ∪ {α((cid:96)), β((cid:96)) (cid:96) ∈ L}.
For any (cid:96) = (A+
p , p), we assume that upon adopting the product agent α((cid:96))
puts peer pressure on agent β((cid:96)), agent β((cid:96)) puts peer pressure on each agent
p and each agent in set A0 \ A+
in set A0 \ A+
p , in turn, puts peer pressure on
agent β((cid:96)). The peer pressure structure is illustrated in Figure 4. Note that the
same agent a ∈ A0 can belong to set A0 \ A+
p for several different values of p.
Such agent a could experience (or put) peer pressure from (on) several different
agents β((cid:96)). The structure is formally specified in Definition 17.
22
Figure 4: Towards the definition of the influence function in the canonical social
network.
Definition 17 For any a, b ∈ A,
w(a, b) =
if a = α((cid:96)) and b = β((cid:96)) for some (cid:96) ∈ L,
if a ∈ A0 \ A+
if a = β(A+
otherwise.
p , p) ∈ L,
p , p) ∈ L and b ∈ A0 \ A+
p ,
p and b = β(A+
1,
1,
1,
0,
We assume that only agents {α((cid:96)) (cid:96) ∈ L} are responsive to preventive
marketing. This is formally captured in the definition of the propensity function
below.
Definition 18 For any a ∈ A,
(cid:40)−1,
0,
λ(a) =
if a = α((cid:96)) for some (cid:96) ∈ L,
otherwise.
To finish the definition of canonical social network N = (A, w, λ, θ), we only
need to define threshold function θ(a) for each a ∈ A. There are three different
cases to consider: a = α((cid:96)) for some (cid:96) ∈ L, a = β((cid:96)) for some (cid:96) ∈ L, and a ∈ A0.
Recall that by Definition 17 and Definition 18, agent α((cid:96)) is not responsive to
peer pressure of any other agent. It is only responsive to the marketing pressure
with propensity −1. We set the threshold value of this agent to ε − p, where
(cid:96) = (A+
p , p). Thus, if an amount at least p is spent on the preventive marketing
to this agent, it will not adopt the product.
either agent α((cid:96)) or any of the agents in the set A0 \ A+
then agent β((cid:96)) will also adopt the product.
We set threshold value of agent β((cid:96)) to 1. Thus, for each (cid:96) = (A+
p , p), if
p adopts the product,
23
α((cid:361))β((cid:361))A0\ A+pA+p1111111Finally, recall from Definition 17 that agent a ∈ A0 can experience peer
pressure from any agent β(A+
p . There are exactly
p } such β-agents. We set the threshold value θ(a)
p , p) ∈ L a ∈ A0 \ A+
{(A+
high enough so that it adopts the product only if all of these β-agents adopt
the product.
p , p) such that a ∈ A0 \ A+
The next definition captures the three cases discussed above.
Definition 19 For any a ∈ A,
ε − p,
1,
{(A+
θ(a) =
p , p) ∈ L a ∈ A0 \ A+
p },
if a = α(A+
if a = β(A+
if a ∈ A0.
p , p),
p , p),
For any c ∈ A0, we have chosen θ(c) to be equal to the number of β(A+
p , p)
such that c ∈ A0 \ A+
p . Thus, if all such β-agents adopt the product, then the
total peer pressure on agent c would reach θ(c) and agent c also would adopt
the product. This observation is formalized by the next lemma.
Lemma 31 Let c be an agent in A0, set B be a subset of A0, and s be an
p , p) ∈ L at
arbitrary spending function for the social network N . If for each (A+
s , then c ∈ B∗
least one of the following is true: (i) c ∈ A+
s .
s for some n ≥ 0. Thus, by the assumption of
Proof. By Corollary 3, B∗
p , p) ∈ L at least one of the following is true: (i) c ∈ A+
this lemma, for each (A+
p ,
(ii) β(A+
(cid:88)
(cid:88)
s . In other words, {β(A+
p , p) ∈ Bn
p , p) c ∈ A0 \ A+
p , p) ∈ B∗
p } ⊆ Bn
p , (ii) β(A+
s . Hence,
s = Bn
w(b, c) ≥
w(β((cid:96)), c).
b∈Bn
s
(cid:96)∈{(A+
p ,p)∈L c∈A0\A+
p }
Thus, by Definition 17,
w(b, c) ≥
(cid:88)
b∈Bn
s
(cid:96)∈{(A+
p }
p ,p)∈L c∈A0\A+
1 = {(A+
p , p) ∈ L c ∈ A0 \ A+
p }.
(cid:88)
(cid:88)
b∈Bn
s
At the same time λ(c) = 0 by Definition 18. Hence,
λ(c) · s(c) +
w(b, c) ≥ {(A+
p , p) ∈ L c ∈ A0 \ A+
p }.
Then, by Definition 19,
λ(c) · s(c) +
(cid:88)
b∈Bn
s
w(b, c) ≥ θ(c).
s
Thus, c ∈ Bn+1
by Definition 4. Therefore, c ∈ B∗
s by Definition 5.
Referring back to Figure 4, note that if an agent in set A0 \ A+
p adopts the
product, then it will put enough pressure on β(A+
p , p)
also adopts the product. We formally state this observation as the lemma below.
p , p) so that agent β(A+
(cid:2)
24
p , p) ∈ B∗
s ,
p , p) ∈ L, set B is a subset of A0, and s is an arbitrary spending
s such that b0 ∈ A0 \ A+
p , then β(A+
Lemma 32 If there is b0 ∈ B∗
where (A+
function for the social network N .
Proof. By Corollary 3, B∗
Definition 17, assumption b0 ∈ A0 \ A+
s = Bn
s for some n ≥ 0. At the same time, by
p , p)) = 1. Thus,
p implies that w(b0, β(A+
w(b, β(A+
p , p)) = 1,
p , p)) ≥ w(b0, β(A+
(cid:88)
w(b, β(A+
since b0 ∈ B∗
s = Bn
p , p)) · s(β(A+
λ(β(A+
p , p)) +
b∈Bn
s
s . Note that λ(β(A+
p , p)) = 0 by Definition 18. Hence,
(cid:88)
b∈Bn
s
p , p)) ≥ w(b0, β(A+
p , p)) = 1.
Thus, by Definition 19,
λ(β(A+
p , p)) · s(β(A+
p , p)) +
(cid:88)
b∈Bn
s
w(b, β(A+
p , p)) ≥ θ(β(A+
p , p)).
p , p) ∈ B∗
p , p) ∈ Bn+1
s
Hence, β(A+
tion 5.
by Definition 4. Therefore, β(A+
Recall that we have set the threshold value of agent α(A+
s by Defini-
(cid:2)
p , p) to be ε − p,
so that by spending at least p on preventive marketing one would prevent an
adoption of the product by agent α(A+
p , p). At the same time, spending no more
than p − ε will result in α(A+
p , p)
adopts the product, it will put enough pressure on agent β(A+
p , p) to adopt the
product as well. This observation is formally stated below.
p , p) ∈ B∗
p , p) ∈ L,
Lemma 33 If s(α(A+
set B is a subset of A0, and s is an arbitrary spending function for the social
network N .
p , p) adopting the product. Once agent α(A+
p , p)) ≤ p − ε, then β(A+
s , where (A+
Proof. Suppose that s(α(A+
Definition 18 and w(b, α(A+
p , p)) ≤ p − ε. Note that λ(α(A+
p , p)) = 0 for each b ∈ A by Definition 17. Thus,
p , p)) = −1 by
(cid:88)
p , p)) + 0 = −s(α(A+
p , p)) +
b∈B0
s
w(b, α(A+
p , p))
p , p)) ≥ ε − p.
λ(α(A+
p , p)) · s(α(A+
= −1 · s(α(A+
Thus, by Definition 19,
λ(α(A+
p , p)) · s(α(A+
p , p)) +
w(b, α(A+
p , p)) ≥ θ(α(A+
p , p)).
(cid:88)
b∈B0
s
25
Hence, α(A+
Definition 17,
p , p) ∈ B1
(cid:88)
b∈B1
s
s by Definition 4. Since w is a non-negative function, by
w(b, β(A+
p , p)) = w(α(A+
p , p), β(A+
p , p)) +
w(b, β(A+
p , p))
(cid:88)
b∈B1
s\{α(A+
p ,p)}
(cid:88)
b∈B1
s
w(b, β(A+
p , p)) ≥ 1.
w(b, β(A+
p , p)) ≥ θ(β(A+
p , p)).
≥ w(α(A+
p , p), β(A+
p , p)) = 1.
Note that λ(β(A+
p , p)) = 0 by Definition 18. Thus,
λ(β(A+
p , p)) · s(β(A+
p , p)) +
Hence, by Definition 19,
λ(β(A+
p , p)) · s(β(A+
p , p)) +
(cid:88)
b∈B1
s
p , p) ∈ B2
Thus, β(A+
tion 5.
s by Definition 4. Therefore, β(A+
p , p) ∈ B∗
s by Defini-
(cid:2)
The next lemma states that if we do spend at least p on preventive marketing
to agent α(A+
p , p), then this agent will never adopt the product.
Lemma 34 For every (A+
p, then α(A+
p , p) /∈ A∗
s.
p , p) ∈ L and every spending function s, if s(α(A+
p , p)) ≥
p , p) /∈ Ak
s for each k ≥ 0.
Proof. By Definition 5, it suffices to show that α(A+
We prove this statement by induction on k.
Base Case: By Definition 4, we have A0
nition 15, (A+
p , p) /∈ A0
α(A+
Induction Step: Suppose that α(A+
Definition 4,
p , p) ∈ L implies that A ⊆ A0. Hence, A0
s by Definition 16.
s and α(A+
s = A. At the same time, by Defi-
s ⊆ A0. Therefore,
p , p) ∈ Ak+1
s
. Thus, by
λ(α(A+
p , p)) · s(α(A+
p , p)) +
w(b, α(A+
p , p)) ≥ θ(α(A+
p , p)).
p , p) /∈ Ak
(cid:88)
b∈Ak
s
Hence, by Definition 18, Definition 17, and Definition 19,
1 · s(α(A+
p , p)) + 0 ≥ ε − p.
Thus, s(α(A+
tradicts the assumption s(α(A+
p , p)) ≤ p − ε. Therefore, s(α(A+
p , p)) ≥ p of the lemma.
p , p)) < p since ε > 0. This con-
(cid:2)
As we have seen in the previous lemma, spending at least p on preventive
p , p) prevents it from adopting the product. We now
p , p) prevents all agents in set A0\A+
p
marketing to agent α(A+
show that spending at least p on agent α(A+
from adopting the product. See Figure 4.
26
s ∩ A0 ⊆ A+
Lemma 35 A∗
function such that s(α(A+
p , where (A+
p , p)) ≥ p.
p , p) ∈ L and s is an arbitrary spending
p , p) ∈ L and s be an arbitrary spending function such that
Proof. Let (A+
s(α(A+
p for
each k ≥ 0. Instead, we prove the following two statements simultaneously by
induction on k:
p , p)) ≥ p. By Definition 5, it suffices to show that Ak
s ∩ A0 ⊆ A+
(cid:40)
s ∩ A0 ⊆ A+
Ak
p ,
p , p) /∈ Ak
β(A+
s .
s. Thus, a ∈ A by Definition 4. Hence, (cid:96) A(cid:3)p a
p by Definition 14. Assume now that
p , p) ∈ A ⊆ A0 by Definition 4 and Definition 15,
p , p) /∈ A0 by the choice of α((cid:96)) and β((cid:96)).
Base Case: Suppose that a ∈ A0
by Reflexivity axiom. Therefore, a ∈ A+
β(A+
which is a contradiction with β(A+
s. Thus, β(A+
p , p) ∈ A0
Induction Step: Assume that(cid:40)
(cid:40)
We need to show that
s ∩ A0 ⊆ A+
Ak
p ,
p , p) /∈ Ak
β(A+
s .
To prove the first statement, suppose that there is a ∈ A0 such that a ∈ Ak+1
p . Note that a /∈ Ak
A+
s
s by the induction hypothesis. Thus, by Definition 4,
\
(14)
s
Ak+1
β(A+
s
∩ A0 ⊆ A+
p ,
p , p) /∈ Ak+1
.
(cid:88)
b∈Ak
s
λ(a) · s(a) +
w(b, a) ≥ θ(a).
Hence, by Definition 18 and Definition 19,
w(b, a) ≥ {(A+
0 · s(a) +
q , q) ∈ L a ∈ A0 \ A+
q }.
(cid:88)
b∈Ak
s
Therefore, by Definition 17,
(cid:88)
(cid:96)∈{(A+
q ,q)∈L a∈A0\A+
q ,β((cid:96))∈Ak
s}
Hence, again by Definition 17,(cid:88)
(cid:96)∈{(A+
q ,q)∈L a∈A0\A+
q ,β((cid:96))∈Ak
s}
w(β((cid:96)), a) ≥ {(A+
q , q) ∈ L a ∈ A0 \ A+
q }.
1 ≥ {(A+
q , q) ∈ L a ∈ A0 \ A+
q }.
Thus,
{(A+
q , q) ∈ L a ∈ A0 \ A+
q , β((cid:96)) ∈ Ak
s} ≥ {(A+
q , q) ∈ L a ∈ A0 \ A+
q }.
27
q , β((cid:96)) ∈ Ak
s} ⊆ {(A+
q , q) ∈ L a ∈ A0 \ A+
q }.
At the same time,
{(A+
q , q) ∈ L a ∈ A0 \ A+
Then it must be the case that
q , q) ∈ L a ∈ A0 \ A+
{(A+
q , β((cid:96)) ∈ Ak
s} = {(A+
q , q) ∈ L a ∈ A0 \ A+
q }.
Hence, β((cid:96)) ∈ Ak
β(A+
s for all (cid:96) ∈ {(A+
q , q) ∈ L a ∈ A0 \ A+
q }.
p , p) ∈ Ak
To prove the second statement from (14), suppose that β(A+
In particular,
p , p) ∈ Ak+1
.
s due to the induction hypothesis. Thus, by Definition 4,
s , which is a contradiction to the induction hypothesis.
p , p) /∈ Ak
p , p)) · s(β(A+
p , p)) ≥ θ(β(A+
w(b, β(A+
p , p)) +
λ(β(A+
p , p)).
Note that β(A+
s
(cid:88)
(cid:88)
b∈Ak
s
b∈Ak
s
Hence, by Definition 18 and Definition 19,
0 · s(β(A+
p , p)) +
w(b, β(A+
p , p)) ≥ 1.
Thus, there must exist at least one b ∈ Ak
Definition 17 and Lemma 34, this implies that b ∈ A0 \ A+
diction to the first part of the induction hypothesis, i.e. Ak
s such that w(b, β(A+
p , p)) > 0. By
p , which is a contra-
s ∩ A0 ⊆ A+
(cid:2)
p .
s . The latter, by Lemma 32, implies that B∗
Thus, by Lemma 31, there exists (A+
p , p) /∈ B∗
Lemma 36 For each B, C ⊆ A0 and each q ∈ P , if B (cid:3)q C ∈ X, then N (cid:15)
B (cid:3)q C.
Proof. Consider any spending function s such that (cid:107)s(cid:107) ≤ q. By Definition 13, it
s . Suppose that there is c0 ∈ C such that c0 /∈ B∗
suffices to show that C ⊆ B∗
s .
p and
p ) = ∅.
β(A+
s ∩ A0 ⊆ A+
Hence, (B∗
by Definition 4 and Definition 5. We next consider the following two cases:
Case I: p ≤ q. In this case, assumption B (cid:3)q C ∈ X, by Monotonicity axiom,
implies that X (cid:96) B (cid:3)p C. At the same time, by Reflexivity axiom, B ⊆ A+
implies that (cid:96) A+
p (cid:3)p C by Transitivity axiom. Again by
Reflexivity axiom, we have (cid:96) C (cid:3)p c0. Hence, X (cid:96) A+
p (cid:3)p c0 by Transitivity
axiom. Thus, X (cid:96) A (cid:3)p c0 by Lemma 30 and Transitivity axiom. Therefore,
c0 ∈ A+
p , which is a contradiction with the choice of set A.
Case II: p > q. Then, p − ε > q by the choice of ε. Hence,
p , p) ∈ L such that c0 /∈ A+
s ∩ (A0 \ A+
p (cid:3)p B. Thus, X (cid:96) A+
p . Thus, B ⊆ B∗
p = ∅. Then, B∗
s ∩ A0 ⊆ A+
s ∩ A0) \ A+
p
p
s(α(A+
p , p)) ≤ (cid:107)s(cid:107) ≤ q < p − ε.
Therefore, β(A+
of set A.
p , p) ∈ B∗
s by Lemma 33, which is a contradiction with the choice
(cid:2)
28
X.
Lemma 37 For each B, C ⊆ A0 and each q ∈ P , if N (cid:15) B(cid:3)q C, then B(cid:3)q C ∈
Proof. Suppose that B (cid:3)q C /∈ X. Thus, by Lemma 25 and the maximality of
set X, there is c0 ∈ C such that X (cid:48) B(cid:3)q c0. Hence, c0 /∈ B+
Consider spending function s such that
q by Definition 14.
(cid:40)
s(a) =
if a = α(B+
q,
0, otherwise.
q , q),
Note that (cid:107)s(cid:107) = q. Thus, C ⊆ B∗
Hence, c0 ∈ B∗
c0 ∈ C ⊆ A0.
s . This together with c0 /∈ B+
s by the assumption N (cid:15) B(cid:3)q C of the lemma.
q contradicts with Lemma 35 and
(cid:2)
Lemma 38 ψ ∈ X iff N (cid:15) ψ, for each ψ ∈ Φ(A0).
Proof. We prove the lemma by induction on the structural complexity of formula
ψ. The base case follows from Lemma 36 and Lemma 37. The induction step
follows from Definition 13 and maximality and consistency of set X in the
(cid:2)
standard way.
To finish the proof of Theorem 4 note that ¬ϕ ∈ X due to the choice of the set
X. Thus, ϕ /∈ X due to consistency of set X. Therefore, N (cid:50) ϕ by Lemma 38.
5 Conclusion
In this paper we have suggested a way of adding marketing to the standard
threshold model of diffusion in social networks. The model is general enough
to simulate both promotional and preventive marketing. We have also defined
formal logical systems for reasoning about influence relation in social networks
with marketing of these two types. Both systems are based on Armstrong's
axioms from the database theory. The main technical results of the paper are
the completeness theorems for these two systems. A possible extension of this
work is an analysis of the computational complexity of this model.
References
[1] Krzysztof R Apt and Evangelos Markakis. Social networks with competing
products. Fundamenta Informaticae, 129(3):225 -- 250, 2014.
[2] W. W. Armstrong. Dependency structures of data base relationships. In
Information processing 74 (Proc. IFIP Congress, Stockholm, 1974), pages
580 -- 583. North-Holland, Amsterdam, 1974.
[3] Sanaz Azimipour and Pavel Naumov. Lighthouse principle for diffusion in
social networks. arXiv preprint arXiv:1601.04098, 2016.
29
[4] Catriel Beeri, Ronald Fagin, and John H. Howard. A complete axiomatiza-
tion for functional and multivalued dependencies in database relations. In
SIGMOD '77: Proceedings of the 1977 ACM SIGMOD international con-
ference on Management of data, pages 47 -- 61, New York, NY, USA, 1977.
ACM.
[5] Hector Garcia-Molina, Jeffrey Ullman, and Jennifer Widom. Database Sys-
tems: The Complete Book. Prentice-Hall, second edition, 2009.
[6] Mark Granovetter. Threshold models of collective behavior. American
journal of sociology, pages 1420 -- 1443, 1978.
[7] David Kempe, Jon Kleinberg, and ´Eva Tardos. Maximizing the spread
of influence through a social network. In Proceedings of the ninth ACM
SIGKDD international conference on Knowledge discovery and data min-
ing, pages 137 -- 146. ACM, 2003.
[8] David Kempe, Jon Kleinberg, and ´Eva Tardos. Influential nodes in a diffu-
sion model for social networks. In Automata, languages and programming,
pages 1127 -- 1138. Springer, 2005.
[9] Michael W Macy. Chains of cooperation: Threshold effects in collective
action. American Sociological Review, pages 730 -- 747, 1991.
[10] Pavel Naumov and Brittany Nicholls. Rationally functional dependence.
Journal of Philosophical Logic, 43(2-3):603 -- 616, 2014.
[11] Pavel Naumov and Jia Tao. The budget-constrained functional dependency.
arXiv preprint arXiv:1507.05964, 2015.
[12] Kazumi Saito, Ryohei Nakano, and Masahiro Kimura. Prediction of in-
formation diffusion probabilities for independent cascade model. In Ignac
Lovrek, Robert J. Howlett, and Lakhmi C. Jain, editors, Knowledge-Based
Intelligent Information and Engineering Systems, volume 5179 of Lecture
Notes in Computer Science, pages 67 -- 75. Springer Berlin Heidelberg, 2008.
[13] Thomas Schelling. Micromotives and Macrobehavior. Norton, 1978.
[14] Jouko Vaananen. Dependence logic: A new approach to independence
friendly logic, volume 70. Cambridge University Press, 2007.
[15] Jouko Vaananen. The logic of approximate dependence. arXiv preprint
arXiv:1408.4437, 2014.
[16] Thomas W Valente. Social network thresholds in the diffusion of innova-
tions. Social networks, 18(1):69 -- 89, 1996.
30
|
1903.02650 | 2 | 1903 | 2019-08-12T16:59:13 | Learning Graphs from Noisy Epidemic Cascades | [
"cs.SI",
"cs.LG",
"stat.ML"
] | We consider the problem of learning the weighted edges of a graph by observing the noisy times of infection for multiple epidemic cascades on this graph. Past work has considered this problem when the cascade information, i.e., infection times, are known exactly. Though the noisy setting is well motivated by many epidemic processes (e.g., most human epidemics), to the best of our knowledge, very little is known about when it is solvable. Previous work on the no-noise setting critically uses the ordering information. If noise can reverse this -- a node's reported (noisy) infection time comes after the reported infection time of some node it infected -- then we are unable to see how previous results can be extended.
We therefore tackle two versions of the noisy setting: the limited-noise setting, where we know noisy times of infections, and the extreme-noise setting, in which we only know whether or not a node was infected. We provide a polynomial time algorithm for recovering the structure of bidirectional trees in the extreme-noise setting, and show our algorithm almost matches lower bounds established in the no-noise setting, and hence is optimal up to log-factors. We extend our results for general degree-bounded graphs, where again we show that our (poly-time) algorithm can recover the structure of the graph with optimal sample complexity. We also provide the first efficient algorithm to learn the weights of the bidirectional tree in the limited-noise setting. Finally, we give a polynomial time algorithm for learning the weights of general bounded-degree graphs in the limited-noise setting. This algorithm extends to general graphs (at the price of exponential running time), proving the problem is solvable in the general case. All our algorithms work for any noise distribution, without any restriction on the variance. | cs.SI | cs |
Learning Graphs from Noisy Epidemic Cascades
Jessica Hoffmann, Constantine Caramanis
August 13, 2019
Abstract
We consider the problem of learning the weighted edges of a graph by observing the noisy times of
infection for multiple epidemic cascades on this graph. Past work has considered this problem when
the cascade information, i.e., infection times, are known exactly. Though the noisy setting is well
motivated by many epidemic processes (e.g., most human epidemics), to the best of our knowledge,
very little is known about when it is solvable. Previous work on the no-noise setting critically uses
the ordering information. If noise can reverse this -- a node's reported (noisy) infection time comes
after the reported infection time of some node it infected -- then we are unable to see how previous
results can be extended. We therefore tackle two versions of the noisy setting: the limited-noise
setting, where we know noisy times of infections, and the extreme-noise setting, in which we only
know whether or not a node was infected. We provide a polynomial time algorithm for recovering the
structure of bidirectional trees in the extreme-noise setting, and show our algorithm almost matches
lower bounds established in the no-noise setting, and hence is optimal up to log-factors. We extend
our results for general degree-bounded graphs, where again we show that our (poly-time) algorithm
can recover the structure of the graph with optimal sample complexity. We also provide the first
efficient algorithm to learn the weights of the bidirectional tree in the limited-noise setting. Finally,
we give a polynomial time algorithm for learning the weights of general bounded-degree graphs in the
limited-noise setting. This algorithm extends to general graphs (at the price of exponential running
time), proving the problem is solvable in the general case. All our algorithms work for any noise
distribution, without any restriction on the variance.
1 Introduction
Epidemic models accurately represent (among other processes) the spread of diseases, information (ru-
mors, viral videos, news stories, etc.), the spread of malevolent agents in a network (computer viruses,
malicious apps, etc.), or even biological processes (pathways in cell signaling networks, chains of activation
in the gene regulatory network, etc.).
We focus on epidemics that spread on an underlying graph [30], as opposed to the fully mixed models
introduced in the early literature [4].
Most settings assume we know the underlying graph and aim to study properties of the spread. Much
work has been done in detection [2, 3, 27, 26, 25, 24, 21], where the goal is to decide whether or not there
is indeed an infection. This problem is of importance in deciding whether or not a computer network
is under attack, for instance, or whether a product gets sold through word-of-mouth or thanks to the
advertisement campaign (or both [28]). More specifically, the problem of source detection [32, 33, 31,
34, 35] or obfuscation [11, 13, 12] has been extensively studied. On the other side of the spectrum, both
experimental and theoretical work has tackled the problem of modeling [7, 36, 17], predicting the growth
[6, 38], and controlling the spread of epidemics [9, 10, 18, 14].
In this work, we take the opposite approach: assuming we know some properties of the spread,
can we recover the underlying graph? The early works on this subject proposed a few heuristics and
experimentally proved their effectiveness [16, 19]. Netrapalli et al.
[29] established the first theoretical
guarantees for this problem for discrete-time infections. They proved one can recover the edges of any
graph with correlation decay, with access to the times of infection for multiple cascades spreading on the
graph. They introduced a likelihood, proved it decouples into convex subproblems, and demonstrated
1
Table 1: Notations
G = (V, E)
N
T m
i
nm
i
(cid:48)m
i = T m
i + nm
T
i
I m
i
pij
Graph G, V set of nodes, E set of edges.
Number of nodes in the graph.
Random variable for the actual time of infection of node i during cascade m.
Noise of node i during cascade m.
Random variable for the noisy time of infection of node i during cascade m.
Random boolean variable. (I
Weight of edge (i, j), corresponding to the probability that i infects j.
i = T rue ⇔ node i was infected during cascade m).
(cid:48)m
that the edges of the graph can therefore be obtained efficiently. They also proved a sample complexity
lower bound and showed their method is within a log factor of it. Abrahao et al. [1] also introduced a
method of solving this problem, this time for a more realistic, continuous-time infection model, through
learning only the first edge of each cascade. Zarezade et al. [37] proposed a first experimental attempt to
tackle the case of correlated cascades using Hawkes processes. Khim et al. [22] extended the theoretical
results to the case where the the cascades spreading on the graph are not independent, which required
completely new machinery involving martingales and weighted P´olya urns.
All the results above assume we have perfect knowledge of the properties of the spread we use to
reconstruct the graph. For most of the literature, those are the times of infection for all nodes for each
cascade. This assumption may hold for online epidemics, as information is usually dated (for instance,
posts or retweets on social networks have time stamps). For human networks, however, this assumption
is often unrealistic: official diagnosis (and hence recording by any tracking entity such as the CDC) may
come days, weeks, or in important examples such as HIV, years after the actual moment of infection.
Moreover, this can be highly variable from person to person, hence the infector is often diagnosed after
the infectee. Similar issues arise with biological networks: we only know the expression of a gene when a
measure is taken, which can happen after a typically arbitrary delay.
We therefore develop a method for learning the graph of epidemics with noisy times of infection.
We demonstrate that past approaches are unusable, due to the fact that even small levels of noise are
typically enough to cause order-of-diagnosis to differ from order-of-infection. We develop new techniques
to deal with this setting, and prove our algorithm can reliably learn the edges of a tree in the limited-noise
setting, for any noise distribution. We also show we can learn the structure of any bounded degree graph
from a very weak observation model, in an sample-optimal fashion (up to log-factors). We finally provide
an algorithm which learns the weights of any bounded-degree graph in the limited-noise setting.
1.1 Model
We observe epidemics spreading on a graph, and aim to reconstruct the graph structure from noisy
estimates of the times of infection. In this section, we specify the exact propagation model, the noisy
observation model, and the two learning tasks this work tackles.
Propagation model: We consider a particular variant of the independent cascade model, close to
the one-step model introduced by [15] and further studied by [20]. The epidemic spreads in discrete time
on a weighted directed graph G = (V, E), where parents can infect their children with probability equal
to the weight of the edge between them, but children cannot infect their parents. We allow bidirectional
edges: it is possible that both (i, j) ∈ E and (j, i) ∈ E, possibly with different weights. For each edge
(i, j) ∈ E, the corresponding weight pij is such that 0 < pmin ≤ pij ≤ pmax < 1.
This process is an instance of a Susceptible → Inf ected → Removed (SIR) process. Each node starts
out in the susceptible state. As in [1], each cascade m starts at a positive time 1 on a unique node source
node, picked uniformly among the nodes of the graph. Once the source becomes infected, it is removed
1Most of the literature considers the initial time of infection to be 0. This is because when we have access to the exact
times of infection, we can make this assumption without loss of generality. In our case, it would imply we know exactly
when an outbreak started, which is usually not the case.
2
(a) At t=0, node 1 is
the source,
in the in-
fected state. It can pos-
sibly infect node 2, 3
and 4, all in the suscep-
tible state.
(b) At t=1, nodes 3 and
4 are infected. Node 3
can infect node 5, in the
susceptible state. Node
4 can infect node 2,
in the susceptible state,
but not node 1, since
node 1 is now removed.
(c) At t=2, node 2 is
infected. All its neigh-
bors are in the removed
state, so new node can
be infected.
(d) At t=3, the cascade
stops, even if node 5 re-
mains in the susceptible
state.
Figure 1: A complete cascade.
from the graph, and if it has children, each is infected at the next time step independently according to
a probability specified by the weight of the edge shared with the source.
The process ends when there are no newly infected nodes (either because no infection happened during
the previous time step, in which case some nodes may never be infected, or because all the nodes of the
graph are removed). One realization of this process from start to finish is called a cascade. If two nodes
are infected during the same cascade, we say that they are co-infected for this cascade. This process is
illustrated in Figure 1.
Observation model: Let T m
during cascade m, and let tm
have tm
i = ∞). We introduce three observation models.
i be a random variable corresponding to the time of infection of node i
i be its realization (if i stays in the susceptible state during cascade m, we
In the no-noise setting, we have access to the exact times of infection T m
In the limited-noise setting, we never get to observe the exact times of infection T m
.
i
(cid:48)m
i = T m
noisy version T
added to the T m
i
that it cannot have infinite value (i.e., t
been infected or not).
. We assume nm
i
i + nm
i
(with realization t
, but only a
i are i.i.d., and represent the noise
follows a known distribution D. The only restriction we put on D is
i = ∞, and we know for a fact when nodes have
(cid:48)m
i ), where all the nm
i = ∞ ⇔ tm
(cid:48)m
i
i . We know I m
i < ∞ ⇔ I m
(cid:48)m
i = T rue if i was infected during cascade m, and I m
In the extreme-noise setting, we take the previous setting to the extreme, and we assume that
(cid:48)m
, we only have access to the infection status
instead of having access to the noisy times of infection T
i
of the nodes I m
i = F alse otherwise.
Note that T
i = T rue, so we can always deduce the infection status from the noisy times
of infection. However, we cannot guess the noisy times of infection from the infection status: the (noisy)
times of infections contain strictly more information than the infection status.
the no-noise setting, this is the extended-integer vector {tm
extended-integer vector {t
the realization of {I m
i }i∈V . We also use the notation T (cid:48) = {T
for the matrix representing the random variable (respectively the realizations) of all the samples.
In
i }i∈V . In the limited-noise setting, this is the
i }i∈V . In the extreme-noise setting, this is the boolean vector corresponding to
(cid:48)m
i }m=1...M
(cid:48)m
)
For these three settings, we call a sample the vector of all observations for the cascade m.
(respectively t(cid:48) = {t
i∈V
i }m=1...M
(cid:48)m
i∈V
Learning tasks: We focus on two different learning tasks. When we learn the structure of a graph,
it means that for any two nodes i and j, we can decide whether or not there exists an edge between these
two nodes (whatever its direction). When we learn the weights of the graph, it means that for every
two nodes i and j, we learn the exact value2 of both pij and pji up to precision .
2When (i, j) /∈ E, we have pij = 0.
3
Figure 2: Possible scenarios which could have led to T
this implies Ti = 2, Tj = 3, Tk = 4, and there is only one possible infection pattern.
(cid:48)
k = 4. In the no-noise setting,
(cid:48)
i = 2, T
(cid:48)
j = 3 and T
1.2 Why is it a hard problem?
1.2.1 Counting approaches
Most approaches in the no-noise setting relate to counting. In our setting, for instance, a natural (and
consistent) estimator for pij is to count how often an infection occurred along an edge, and divide it by
how often such an infection could have happened:
pij =
Number of times j becomes infected one time step after i
Number of times i was infected before j
.
In the no-noise setting, j could only have been infected by a node signaling exactly one time step
before j. However, in the limited-noise setting, j signaling its infection one time step after i could stem
from a variety of scenarios:
• i could have indeed infected j: cases a), b) and c) of Figure ?? above.
• j could have infected i, but the noise flipped the order of signaling: cases d), e) and f).
• No infection happen between i and j, and the probability of infectin depends mainly on another
node k: cases g), e) and f). This could happen for any other node k in the graph.
The natural estimator introduced earlier is therefore not consistent anymore;
instead, it tends to a
quantity which depends on pij, but also pji, and pik, pki, pjk, pkj as well, for all the other nodes k in the
graph. By counting the number of times j became infected one time step after i, we are not counting the
number of infections along the edge (i, j) anymore, but instead a mixture of all the scenarios described
above, which not only include the cases where j infected i, but also events in which the cascade spread
through another node k, and the edge (i, j) was irrelevant to the process. Using this estimator, or any
obvious (to us) extension of it, would not only imply learning the wrong weights for the edges, but
also learning edges when there are no edges. Our first contribution is therefore to design a new set of
estimators, from which we can deduce the value of pij (Sections 2.3 and 3.2).
Adding noise in the time of infection not only reverses the cascade chronology, it also exponentially
increased the number of possible infection patterns that could have happened. Bounding the realm of
possibilities is therefore our second step towards solving the problem (Section 2.1).
1.2.2 Max-likelihood approaches
Another common approach is to use likelihood-based methods. For instance, in [29], the authors develop
a max-likelihood-based approach to learn the edges of the graph. They prove the log-likelihood has
it decouples into only one local problem for each node, and this local problem is
desirable properties:
4
(a)
T n
2
0
1
2
2
2
(d)
T n
1
1
0
3
2
2
(g)
T n
2
0
1
2
1
3
i
j
k
i
j
k
i
j
k
(b)
T n
2
0
1
2
3
1
(e)
T n
1
1
0
3
3
1
(h)
T n
1
1
2
1
0
4
i
j
k
i
j
k
i
j
k
(c)
T n
1
1
2
1
4
0
(f)
T n
0
2
1
2
4
0
(i)
T n
0
2
3
0
1
3
i
j
k
i
j
k
i
j
k
(cid:48)
Figure 3: Possible scenarios which could have led to T
l = Tl + nl. In
the limited-noise setting, there are nine possible infection patterns (many more scenarios with the same
infection pattern, but different noise values, are not shown).
(cid:48)
k = 4. We have T
(cid:48)
i = 2, T
(cid:48)
j = 3 and T
5
convex (up to the change of variable θij = − log(1 − pij)):
1
N
(cid:18) 1
N
(1 − pji)
·
(cid:89)
(cid:124)
(cid:88)
j;tj <ti−1
(cid:123)(cid:122)
1≤i≤N
· (cid:89)
(cid:19)
N(cid:88)
+
i=1
j;tj <ti−1
Probability that i was not
infected before t(cid:48)
i.
log(1 − pji) +
(cid:125)
(cid:125)
(1 − pji)
1 − (cid:89)
(cid:124)
(cid:123)(cid:122)
(cid:88)
j;tj =ti−1
j;t(cid:48)
j =t(cid:48)
i−1
Probability that i was
infected at t(cid:48)
i.
log(1 − pji)
L(T, Pij) = log
L(T, Pij) = log
In our setting, the log-likelihood has none of these properties. It is not convex, and it is unclear any
method other than brute force could find its maximum. Moreover, it does not decouple anymore, and
even computing the log-likelihood itself takes exponential time.
(t1,...,tN )≤(t(cid:48)
1−1,...,t(cid:48)
N−1)
·
N
1
(cid:124)
(cid:89)
(cid:124)
(cid:19)
(cid:18) 1
·
+ log
N
j;tj <ti−1
(cid:88)
(cid:123)(cid:122)
This is the root
of the difficulty.
·
(1 − pji)
(cid:125)
(cid:123)(cid:122)
(cid:88)
n(t(cid:48)
Noise at node
i − ti.
i is t(cid:48)
1≤i≤N
· (cid:89)
(cid:32)
(cid:124)
(cid:125)
1 − (cid:89)
(cid:123)(cid:122)
(cid:124)
(cid:89)
j;tj =ti−1
(cid:33)
i − ti)
(cid:125)
(cid:123)(cid:122)
(cid:125)
(cid:89)
(1 − pji)
L(T, Pij) = log
= log
Probability that i was not
infected before t(cid:48)
i.
Probability that i was
infected at t(cid:48)
i.
(t1,...,tN )≤
1−1,...,t(cid:48)
(t(cid:48)
N−1)
1≤i≤N
n(t(cid:48)
i − ti)
(1 − pji)
j;tj <ti−1
·
1 − (cid:89)
j;tj =ti−1
(1 − pji)
When dealing with hidden variables, a common technique would be to use the Expectation-Maximization
t(cid:48)
algorithm [8]. However, in our setting, the number of hidden states is
i, which can be as large as
(N − 1)N . This prohibits any realistic use of the Expectation-Maximization algorithm for networks with
more than twelve nodes. Moreover, except for the recent contributions [23], very little is known about
the theoretical convergence of the Expectation-Maximization algorithm.
i=1
N(cid:89)
1.3 Contributions
The contributions of this article are multiple:
• To the best of our knowledge, we are the first to tackle the problem of learning the edges of a graph
from noisy times of infection, a simple but natural extension of a well-known problem.
• We provide the first efficient algorithm for learning the structure and weights of a bidirectional tree
in this setting. We also establish a tree-specific lower bound which shows that our algorithm is
sample-optimal (up to log-factors) for learning the structure of the tree (Section 2).
6
• We prove it is possible to learn the structure of any bounded-degree graph in the extreme setting
for which we only have access to the infection status (i.e., whether or not a node was infected).
Moreover, we can do so with almost optimal sample complexity, according to the bound established
in [29].
• We provide polynomial algorithms for learning the weights of bounded degree graphs.
• Finally, we extend the results from bounded-degree graphs to general graphs. This proves the
problem is solvable under any noise distribution, although the exponential sample complexity and
running time prohibits any use of this algorithm in practice (Section 3.2).
2 Learning bidirectional trees
The bidirectional tree is the simplest example which illustrates some of the difficulties of the noisy
setting. Indeed, for a directed tree, the true sequence of infections can be reconstructed, and we can
use techniques from the no-noise setting. For a bidirectional tree, those techniques cannot be extended.
However, the uniqueness of paths in the bidirectional tree still makes this problem considerably easier
than the general setting. We therefore start by presenting a solution for the bidirectional tree. The key
ideas here generalize to the neighborhood-based decomposition we introduce below, which forms our key
conceptual approach for the general problem.
This section contains three contributions. First, we show how to learn the structure of a tree using
only the infection status, i.e., what we call the extreme-noise setting (Section 2.1). For each cascade, we
only know which nodes were infected. We show this contains enough information to learn the structure
of bidirectional tree. Second, we establish a lower bound for the no-noise setting, and show our algorithm
has the same dependency in the number of nodes N as this lower bound (up to log-factors). In other
words, for the task of learning the structure of any tree, an optimal algorithm in the no-noise setting
would need as many cascades as our algorithm needs in the extreme-noise setting (up to log-factors).
Finally, we show how we can leverage this learned structure to learn the weights of the tree, this
time when we have noisy access to the times of infection, i.e., the limited-noise setting (Section 2.3). We
provide sample complexity for this task.
2.1 Tree structure
As illustrated in Section 1.2, the number of edges that could exist is much higher in the limited-noise
setting than the number of actual edges in the tree. Our first key contribution is therefore to introduce
a new estimator, hij, which keeps track of the fraction of cascades for which i and j were both infected.
This estimator can therefore be computed only with the infection status in the extreme-noise setting.
Using this estimator, we show that in the specific case where the graph is a tree, we learn the structure
of this tree, i.e. whether or not both pij = pij = 0.
Our algorithm for learning the edges of the tree relies on one central observation: hi,j achieves a kind
of local maximum if there is an edge between i and j (Lemma 1). This observation relies heavily on the
fact that there is uniqueness of paths on a tree. Let us now dive into the proof.
Definition 1. Let hi,j be the fraction of cascades in which both i and j became infected. We have:
hi,j →M→∞ P(I m
i & I m
j ) := hi,j.
We now show that the limit hi,j of the estimator hi,j satisfies a local maximum property on the edges
of the tree:
Lemma 1. If i and j are not neighbors, let (u0, u1, . . . , ud) be the path between them, with u0 = i, ud = j,
and d > 1. Then:
∀r ∈ {0, d − 1}, hi,j < hur,ur+1.
7
Proof. We consider the case in which both i and j have been infected. There is a unique source of
infection and a unique path between i and j. Therefore, all the nodes on the path from i to j must have
been infected as well. In particular, both ur and ur+1 were infected. This shows I m
,
so P(I m
), and therefore hi,j ≤ hur,ur+1.
j ) ≤ P(I m
j ⇒ I m
i & I m
i & I m
& I m
ur+1
& I m
ur+1
ur
What's more, every time ur and ur+1 became infected, at least one more infection along an edge must
have occurred in order for j to become infected as well. This occurred with probability at most pmax < 1.
Therefore, hi,j = P(I m
) = pmax · hur,ur+1. We conclude hi,j < hur,ur+1.
j ) ≤ pmax · P(I m
i & I m
& I m
ur+1
ur
ur
This simple lemma allows us to design Algorithm 1. Indeed, suppose we have access to all the limits
hi,j. By ordering them in decreasing order, we can deduce the structure of the tree by greedily adding
every edge unless it forms a cycle3.
Algorithm 1 Learn the undirected edges of the tree.
1: procedure LearnTree({hi,j}i,j∈V )
pairs h edge ← [(hi,j, (i, j)) for 1 ≤ i ≤ j ≤ nnodes]
Sort(pairs h edge) by decreasing order
edges tree ← []
for (∼ , potential edge) ∈ pairs h edge do
2:
3:
4:
5:
6:
7:
if Adding potential edge to edges tree does not create a cycle then
Add potential edge to edges tree
return edges tree
(cid:46) hi,j limit of hi,j.
We show that if we have access to the limits hi,j of the estimators hi,j, the algorithm above correctly
find the structure of the tree.
Lemma 2. Algorithm 1 correctly finds all the N − 1 pairs (i, j) such that there exists at least one directed
edge between i and j.
Proof. We show that in the for-loop at line 5, we add an edge to edges tree if and only if this edge was
a real edge in the original tree. We prove it by induction on the elements of the sorted list pairs h edge.
Suppose now that t elements of pairs h edge have been examined so far. Let (∼, (i, j)) be the t + 1th
element. Two cases arise:
When no element has been selected, the proposition is trivially true.
1. i and j are not neighbors. Let (u0, . . . , ud) be the path between them, with u0 = i and ud = j. In
this case, using Lemma 1, ∀r, hur,ur+1 > hi,j. In other words, all the pairs (ur, ur+1) have already
been considered by the algorithm. By induction, we have kept all of them in edges tree. Therefore,
adding the pair (i, j) would form a cycle. This pair is not kept in edges tree, which is what we
wanted since it is not an edge in the original tree.
2. i and j are neighbors. Suppose that adding this pair forms a cycle. Then there is a sequence
(v0 = i, . . . , vd = j) of nodes such that hvk,vk+1 were all bigger than hi,j, and the pairs (vk, vk+1)
were kept by the algorithm for all k. However, by uniqueness of paths in a tree, there exists a
pair (va, va+1) such that the path connecting va and va+1 in the original tree goes through (i, j).
Using Lemma 1, this means hi,j > hva,va+1 , which is a contradiction. Therefore, adding this pair
in edges tree does not form a cycle. This pair is kept in edges tree.
Therefore, this algorithm keeps all the edges, and only the edges of the tree, so it recovers the tree
structure.
3This algorithm is very similar in spirit to Kruskal's algorithm for finding the maximum spanning tree []
8
We next quantify how many cascades M are needed for Algorithm 1 to be correct if we replace the
{hi,j}i,j∈V by their estimates {hi,j}i,j∈V . We note that we do not require hi,j to be close to their limit,
but only need the order of the hi,j to be the same as the order of the hi,j. We identify events which
guarantee that the order is the same (Corollary 1):
Definition 2. Let H3 := {(i, j, k) ∈ {1, . . . , N}3, pij + pji > 0 & pjk + pjk > 0} be the set of triplets of
nodes such that at least one directed edge exists between the first and the second node, as well as between
the second and the third node.
Proposition 1. If:
∀(i, j, k) ∈ H3, hi,j > hi,k and hj,k > hi,k,
then for all paths (u0, . . . , ud) in the tree, with d > 1, we have:
∀r ∈ {0, . . . , d − 1}, hur,ur+1 > hu0,ud .
Proof. For r ∈ {0, . . . , d − 2}, we have by hypothesis hur,ur+1 > hur,ur+2 . Now, we recall that hu0,ud is
the number of cascades for which both u0 and ud were infected. By uniqueness of paths in the tree, every
time both u0 and ud were infected, both ur and ur+2 must have been infected as well. This shows that
hu0,ud ≤ hur,ur+2. Notice that this is a deterministic property, not an asymptotic property. Therefore,
hur,ur+1 > hur,ur+2 ≥ hu0,ud .
For r = d − 1, we follow an identical reasoning, but with hur,ur+1 > hur−1,ur+1.
Corollary 1. If:
∀(i, j, k) ∈ H3, hi,j > hi,k and hj,k > hi,k,
then the correctness of Algorithm 1 is preserved when given h as input instead of h.
In other words, Algorithm 1 outputs a correct set of undirected edges with finite samples.
Proof. According to Proposition 1, for all paths (u0, . . . , ud) in the tree, with d > 1, we have that
∀r ∈ {0, . . . , d − 1}, hur,ur+1 > hu0,ud . As shown in the proof of Lemma 2, this is the only property of
the input needed in order to yield the correct output.
Proposition 2. With M =
N(log( 1
δ )+2 log(N ))
cascades, with probability at least 1 − δ, we have:
pmin(1−pmax)
∀(i, j, k) ∈ H3, hi,j > hi,k and hj,k > hi,k.
Proof. Let us consider one triplet (i, j, k) in H3. We recall that hi,k is the number of cascades for
which both i and k were infected. Since the only path from i to k is through j, we always have that
hi,j ≥ hi,k and hj,k ≥ hi,k. We notice that to obtain hi,j > hi,k, we only need one cascade for which both
i and j got infected, but not k. We lower bound the probability Ptriplet identified of this cascade happening.
For each cascade m, we have:
Ptriplet identified = P(I m
i & I m
j & Not(I m
k ))
≥ P(i was a source, i infected j, j did not infect k)
+ P(j was a source, j infected i, j did not infect k)
The probability that this event never occurs during the M cascades is upper bounded by:
P(hi,j = hi,k) ≤
1 − 1
N
pmin(1 − pmax)
(cid:19)M
≥ 1
N
≥ 1
N
· pij · (1 − pjk) +
pmin(1 − pmax).
1
N
· pji · (1 − pjk)
(cid:18)
9
Now, there are N − 1 edges in a tree, therefore H3 ≤ (N − 1)2 < N 2. By union bound:
N pmin(1−pmax)
≤ e− M
≤ δ
N 2 .
≤ (cid:88)
(i,j,k) ∈ H3)
(cid:91)
P
(i,j,k) ∈ H3
hi,j = hi,k
P(hi,j = hi,k)
< N 2 · δ
N 2
≤ δ.
Notice that H3 contains both (i, j, k) and (k, j, i). We have therefore proven that with probability at least
1 − δ, when considering M =
cascades, we have ∀(i, j, k) ∈ H3, hi,j > hi,k and hj,k >
hi,k.
pmin(1−pmax)
δ )+2 log(N ))
N(log( 1
Putting together Proposition 2 and Corollary 1, we obtain our first theorem for learning the undirected
edges with finite samples:
cascades, with probability at least 1 − δ, we can learn the
Theorem 1. With M =
structure of a any bidirectional tree in the extreme-noise setting, i.e., when we only have access to the
infection status of the nodes.
pmin(1−pmax)
δ )+2 log(N ))
N(log( 1
2.2 Lower bound
In this section, we prove a lower bound for trees in the no-noise setting. With very minor adjustments,
we adapt the lower bound of [29]. Since for a general tree, the max degree can be up to N − 1, we design
a lower bound which is independent from the max-degree. Let G be a tree drawn uniformly from G,
the set of all possible trees on N nodes, and G be the reconstructed graph from the times of infection.
G ↔ T ↔ G therefore forms a Markov chain. We have:
H(G) = I(G; G) + H(G G)
(data processing inequality) ≤ I(G; T ) + H(G G)
(independent cascades) ≤ M · I(T 1; T
(I(X, Y ) ≤ H(X)) = M · N(cid:88)
(Fano's inequality) ≤ M · N(cid:88)
i=1
H(T 1
(cid:48)1) + H(G G)
i ) + H(G G)
H(T 1
i ) + (1 + Pe log(G))
i=1
Since G is drawn uniformly from G, H(G) = log(G). There are N N−2 trees on N nodes, according
to Cayley's formula [5], so H(G) = (N − 2) · log(N ).
In conclusion:
M ≥ (1 − Pe)(N − 2) log(N ) − 1
N · H(T 1
i )
= Ω
Using the same kind of techniques as in [29], we can assume H(T 1
(cid:18) log(N )
(cid:19)
H(T 1
i )
i ) ∼ log(N )
N . Therefore:
Theorem 2. In the no-noise setting, we need M = Ω (N ) cascades to learn the tree structure.
In our extreme-noise setting, when we have only access to the infection status of the nodes, we can
learn the tree structure with the same sample complexity (up to log-factors) as the no-noise setting!
10
2.3 Tree weights
In this section, we assume we are in the limited-noise setting, and we have access to the times of infection.
We also assume we have already learned the structure of the tree.
(cid:48)m
and T
j
Once we have reduced the set of possible edges by learning the structure of the bidirectional tree,
(cid:48)m
learning the weights of the edges is still non-trivial. Indeed, from T
, it is still impossible to
i
know whether this sample is useful for estimating pij (case when i infected j), or whether we should use
this sample for estimating pji instead (case when j infected i). What is more, we only get one sample per
node and per cascade, so it is impossible to know what really happened during that cascade. However,
knowing the distribution of the noise, it is possible to compute the probability that the noise maintained
the order of infections. Using this information and the reduced set of known undirected edges, we can
compute two sets of N (N − 1) estimators, from which it is possible to infer the weights of all edges in
the tree.
We introduce these two sets of N (N − 1) estimators, or, in other words, two estimators for each
directed edge. These estimators tend to multivariate polynomials of the weights of most edges of the
tree. Thus in general these polynomials have exponentially many terms; however, when i and j are
neighbors, it is possible to express them concisely using a quantity PCj(→ i), which we define formally
below. This succinct representation is the key idea we exploit to solve the resulting system of equations.
Once we know the structure of the bidirectional tree, we can consider the four estimators for each
undirected edge (two estimators for each directed edge). They form a system of four equations and four
unknowns, which we solve to obtain the weights of the edges.
Definition 3. PCi(→ j) is the probability that j became infected before any node on the path from j to i,
including i, became infected.
We now introduce the estimators:
Definition 4. We introduce 2 sets of N (N − 1) estimators:
fi<j = Fraction of infections for which i and j got infected, and i reported before j.
gi,Cj = Fraction of infections for which i got infected, but j did not.
By the law of large numbers, as the number of cascades scales, fi<j tends to fi<j and gi,Cj to gi,Cj,
where
:= P(T
:= P(T
j < ∞),
(cid:48)m
(cid:48)m
i < T
i < ∞, T
(cid:48)m
j = ∞).
(cid:48)m
fi<j
gi,Cj
We now compute the exact values of these two quantities. Let us assume the (unique) path between i
and j has length d. We call (u0, . . . , ud) the set of nodes on the path from i to j, with u0 = i and ud = j.
We then have:
Lemma 3. Recall fi<j and gi,Cj are the expectation of the estimators defined above. We have:
fi<j = PCj(→ i) · pi→j · s−d+1 + PCi(→ j) · pj→i · sd+1
PCi,Cj(→ ul) · pul→i · pul→j · s2l−d+1.
d−1(cid:88)
l=1
+
gi,Cj = PCj(→ i) · (1 − pi→j) +
PCi,Cj(→ ul) · pul→i · (1 − pul→j).
d−1(cid:88)
l=1
What's more, when i and j are neighbors (which implies d = 1), the expressions simplify to:
fi<j = PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2
gi,Cj = PCj(→ i) · (1 − pij).
11
Proof.
fi<j = P(T
(cid:48)m
i < T
j < ∞)
(cid:48)m
= P(i got infected before any nodes on the path from i to j,
then infected j, and the noise did not flip the times of infection)
+ P(j got infected before any nodes on the path from i to j,
then infected i, and the noise flipped the times of infection)
+ P(One node on the path from i to j got infected before i and j,
then infected both i and j, but i reported before j)
= PCj(→ i) · pi→j · s−d+1
+ PCi(→ j) · pj→i · sd+1
d−1(cid:88)
PCi,Cj(→ ul) · pul→i · pul→j · s2l−d+1.
+
l=1
This expression is involved in general. However, if i and j are neighbors, then there are no nodes ul on
the path between i and j, other than i and j themselves. What's more, pi→j = pij, and d = 1. Therefore:
fi<j = PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2.
Let us now focus on gi,Cj:
i < ∞, T
j = ∞)
(cid:48)m
(cid:48)m
gi,Cj = P(T
= P(i got infected before any nodes on the path from i to j, but j did not get infected)
+ P(One node on the path from i to j got infected before i and j, then infected i but not j)
= PCj(→ i) · (1 − pi→j)
d−1(cid:88)
l=1
+
PCi,Cj(→ ul) · pul→i · (1 − pul→j).
As before, this expression is complex in general, but simplifies if i and j are neighbors, in which case:
gi,Cj = PCj(→ i) · (1 − pij).
Using the simplified expression only for when i and j are neighbors, we obtain:
Proposition 3. If we know (i, j) is an edge in the original tree, then the probability of infection along
this edge is given by:
pij =
gi,Cj · (s2
fi<j · s0 − fj<i · s2
0 − s2
2) + fi<j · s0 − fj<i · s2
.
Proof. According to Lemma 3, we had four second-order equations, with 4 unknowns: pij, pji, PCj(→ i)
and PCi(→ j). We solve it, and obtain the wanted result. See Appendix A for details.
Combining all the pieces, we obtain our first theorem for infinite samples:
Theorem 3. It is possible to learn the weights of a bidirectional tree in the limited-noise setting.
Now that we have proven the problem is solvable, we establish the number of samples needed to learn
the weights with the method above.
12
2 log(cid:0) 6
δ
Lemma 4. With M = N 2
have:
(cid:1) ((s2
0−s2
2+s0+s2)pmax+s0+s2)2
2)2
0−s2
(s2
pij − pij ≤ .
samples, with probability at least 1 − δ, we
Proof. Using Hoeffding's inequality:
P( fi<j − fi<j > 1) ≤ 2e−2M 2
1,
P( fj<i − fj<i > 1) ≤ 2e−2M 2
1,
P(gi,Cj − gi,Cj > 1) ≤ 2e−2M 2
1.
(cid:1), we have that with probability at least 1 − δ, all the following hold:
log(cid:0) 6
δ
Choosing M = 1
2
1
fi<j − fi<j ≤ 1,
fj<i − fj<i ≤ 1,
gi,Cj − gi,Cj ≤ 1.
Hence, with probability at least 1 − δ, we have (see Appendix A for details):
pij − pij ≤ 1
0 − s2
(s2
gi,Cj · (s2
0 − s2
0 − s2
gi,Cj · (s2
2 + s0 + s2)pmax
2) + fi<j · s0 − fj<i · s2
2) + fi<j · s0 − fj<i · s2
s0 + s2
+ 1
+ o(1).
We use the results from Lemma 3 to bound the denominator by s2
0−s2
N . In the end, we obtain:
2
pij − pij ≤ 1N
0 − s2
(s2
2 + s0 + s2)pmax + s0 + s2
+ o(1).
0 − s2
s2
2
2 log(cid:0) 6
δ
0−s2
(s2
(cid:1) ((s2
We choose 1 =
N
With M = N 2
pij ≤ .
0−s2
s2
2
. Therefore:
2+s0+s2)pmax+s0+s2
0−s2
2+s0+s2)pmax+s0+s2)2
0−s2
(s2
2)2
samples, with probability at least 1 − δ, we have pij −
By a union bound on all the weights of the tree, knowing there are at most 2N (N − 1) < 2N 2 directed
edges in a directed tree, we obtain the following sample complexity:
cascades, with probability 1 − δ, we
Theorem 4. With M = N 2
can learn all the weights of the edges of a bidirectional tree in the limited-noise setting, i.e., when we only
have access to the noisy times of infection.
2+s0+s2)pmax+s0+s2)2
0−s2
(s2
2 log
2)2
δ
(cid:16) 12N 2
(cid:17) ((s2
0−s2
3 Bounded-degree graphs
In the previous section, the algorithm presented relies heavily on the uniqueness of paths. This property
implies that we can deduce the edges from the nodes which are co-infected the most often. However, this
is not true for a general bounded-degree graph. In Figure 4, we can see that the two nodes i and j would
be co-infected frequently despite not sharing an edge. This makes the task of finding the structure much
more challenging than for the bidirectional tree.
In this section, we show how the main ideas for learning the structure of the bidirectional tree can
be extended for learning the structure of general bounded-degree graphs, in the extreme-noise setting,
with almost optimal sample complexity. The framework for learning the weights of the edges in the
limited-noise setting is - to the best of our knowledge - not extendable to general bounded-degree graphs;
we therefore develop a new algorithm to learn the weights for general bounded-degree graphs.
13
Figure 4: Two nodes can be co-infected frequently without sharing an edge.
3.1 Bounded-degree structure
In the previous section, we introduced the estimator hi,j, which records the fraction of cascades for which
both i and j are infected. From a local maximum property of this estimator, we deduced the structure
of the tree, in a sample efficient fashion. Indeed, if there exists a path between i and k, and the first edge
on this path is (i, j), then if i and k are infected, j must have been infected as well.
We want to build on this idea for a bounded-degree graph of maximum degree d. However, for such
a graph, there may be multiple paths leading from i to j, and we cannot guarantee a single node will be
infected each time. However, if i is a node, Ni is its neighborhood, and k /∈ Ni is another node of the
graph, we can guarantee that if both i and k are infected, there exists a node in Ni which is infected.
Moreover, Ni is the set of smallest size for which at least one node is infected at the same time as i the
most frequently. This leads us to a new set of estimators:
Definition 5. Let i be a node of the graph, and let S be a set such that S < d and i /∈ S. We define a
new set of estimators:
hi,S = Fraction of cascades for which i is infected, and at least one node of S is infected.
Let us assume that for each pair (i, S), we have access to the limit hi,S of hi,S. We now introduce an
algorithm showing how to leverage these limits to learn the structure of any bounded-degree graph.
Algorithm 2 Learn the undirected edges of any graph of maximum degree d.
1: procedure LearnGraph({hi,S}S≤d
i∈V )
edges ← []
for i = 1 . . . nnodes do
2:
3:
4:
5:
6:
S max i ← set such that hi,S max i is maximal, and such that Size(S max i) is minimal.
for nj in S max i do
Add edge (i, nj) to edges
return edges
We show this algorithm is correct.
Lemma 5. Algorithm 2 correctly finds the neighborhood of each node.
14
Proof. Let us recall that hi,S is the probability that node i and at least one node of S are co-infected.
To prove the correctness of this algorithm, it suffices to prove:
∀i ∈ V,∀S s.t.S ≤ d, hi,S ≥ hi,Ni =⇒ Ni ⊆ S
Let pick a set S such that Ni \ S (cid:54)= ∅, and let k be a node in Ni \ S. We know hi,S∪{k} ≥ hi,S +
P(i and k are the only infected nodes). Since i and k are neighbors, P(i and k are the only infected nodes) >
0, and therefore hi,S∪{k} > hi,S. Following this line of reasoning, if Ni \ S (cid:54)= ∅, S we can always increase
the value of hi,S by adding a node of Ni.
are co-infected, we know one node of Ni is also infected. Therefore, the algorithm is correct.
However, it is impossible to increase the value of hi,Ni, because if i and any other node of the graph
Unfortunately, we do not have direct access to hi,S. We therefore study how many samples are needed
to replace hi,S by its estimate hi,S while preserving the correctness of the algorithm. Just like in Section
2.1, we notice that we do not need the {hi,S}S≤d
to be close to their limit, we only need the indexes of
i∈V
their ordering to be the same. We notice that the neighborhood Ni of i is the set of smallest size which
is the most often infected at the same time as i is (Ni = arg max
hi,R). Therefore, we must have that for
R≤d
every set S, hi,S ≤ hi,Ni. However, some other sets might achieve the same value if we do not observe
enough cascades. This could happen in two cases:
• Not all the nodes of the neighborhood were infected, and therefore a subset T1 ⊂ Ni of the neigh-
borhood is such that hi,T1 = hi,Ni. Since T1 < Ni, the algorithm would return T1 and not Ni,
which would be a failure case.
• Some other node k is always infected every time a specific node j ∈ Ni is infected. The set
T2 = Ni \ {j} ∪ {k} will therefore be such that hi,T2 = hi,Ni, and the algorithm would not know
which maximum to pick. This is a failure case as well.
We identify events which guarantee that the failure cases above cannot arise. Let Em
and j were the only infected nodes during cascade m. Ei,j =
i,j be the event that i
i,j is therefore the event that there
Em
(cid:91)
1≤m≤M
exists a cascade for which only i and j were infected. If such a cascade exists, the set Smax = arg max
R≤d
hi,R
must contain j. If the event Ei,j happens for every node j in the neighborhood of i, we can therefore
guarantee Algorithm 2 is correct. We characterize the sample complexity needed for this below.
Proposition 4. Let i be a node, and let j be one of its neighbors. Let S be a set of size S ≤ d, such
that i /∈ S and j /∈ S. With probability at least 1 − δ
cascades,
there exists a cascade in which i and j are infected, but no nodes of S are infected.
(d+2)·N log(N )+N log( d
δ )
pmin(1−pmax)2(d−1)
d·N d+2 , among M =
Proof. We notice that if, during cascade m, the only infected nodes are i and j, no nodes of S are infected.
This is exactly the event Em
i,j defined above.
P(Em
i,j) = P(i and j are the only infected nodes during cascade m)
≥ P(cascade started at i, j was the only infected neighbor of i, and j did not infect any nodes)
≥ 1
N
· pmin · (1 − pmax)2(d−1).
The probability that this never happens during M cascade is exactly the complement of the event Ei,j
defined above:
(cid:18)
P(Not(Ei,j)) ≤
(cid:19)M
1 − 1
N
· pmin · (1 − pmax)2(d−1)
15
N ·(1−pmax)2(d−1)
≤ e−M· pmin
≤
d · N d+2 .
δ
cascades, Algorithm
(d+2)·N log(N )+N log( d
δ )
pmin(1−pmax)2(d−1)
Lemma 6. With probability at least 1− δ, if we observe M =
2 is correct, and has running time O(M · N d+2) = O(d · N d+3 log(N )).
Proof. Let S = {S ∈ P(V ),S ≤ d} be the set of sets of nodes of size at most d, let SCi = {S ∈ S, i /∈ S}
be the set of sets of S which do not contain i, and let Ni = {j, (i, j) ∈ E} be the neighborhood of i. We
pick a set S ∈ S, such that S (cid:54)= Ni.
We first prove that hi,S ≤ hi,Ni. Since the neighborhood of i separates i from the rest of the graph,
and infected nodes are connected, we can conclude that every time i and another node of S are infected,
one node in the neighborhood Ni of i is infected as well. Therefore, we cannot increase hi,S without
also increasing hi,Ni . In particular, this means that even if S > Ni (for instance if Ni ⊂ S), we have
hi,S ≤ hi,Ni . We therefore know that Ni ∈ arg max
Ci
We now prove that with probability at least 1 − δ, Ni is the set of arg max
Ci
hi,R of minimal size. To
do so, we notice that if there exists a cascade such that i and j ∈ Ni are infected, but no node of S is
infected, then this implies hi,S < hi,Ni. Indeed, as shown above, every time we increase hi,S, we also
increase hi,Ni, and we know there exists one cascade for which we increased hi,Ni without increasing hi,S.
We now calculate the probability Pfailure that such a cascade does not exist for all nodes i in the graph,
all nodes j in their neighborhood, and all sets S which do not include i or j.
hi,R.
R∈S
R∈S
Pfailure ≤ P(∃i ∈ V,∃j ∈ Ni,∃S ∈ SCi,Cj, every time i and j are infected, a node of S is also infected)
P(every time i and j are infected, a node of S is also infected).
≤(cid:88)
i∈V
(cid:88)
(cid:88)
j∈Ni
S∈S
Ci,Cj
We use Proposition 4 to bound this quantity:
Pfailure ≤(cid:88)
(cid:88)
(cid:88)
δ
d · N d+2
δ
d · N d+2
i∈V
j∈Ni
S∈S
Ci,Cj
≤ N · d · N d+1 ·
≤ δ.
hi,R < hi,Ni.
We now know that with probability at least 1 − δ:
SCi,Cj,
This implies that no set of(cid:83)
j∈Ni
∀R ∈ (cid:91)
SCi,Cj can belong in arg max
R∈S
Ci
j∈Ni
SCi \ (cid:91)
In particular, this means that Ni is the only set of SCi \(cid:83)
probability at least 1− δ, Ni is the set of arg max
Ci
j∈Ni
R∈S
SCi,Cj = {S ∈ S,Ni ⊆ S}.
hi,R. However, we have:
SCi,Cj of minimal size. This shows that with
hi,R of minimal size. This proves Algorithm 2 is correct,
j∈Ni
16
and that we can learn the structure of any graph of maximum degree d with M =
cascades.
N d+1 · M ), which is what we wanted to prove.
Since we do at most one operation by pair of (node, set) and by cascade, the running time is O(N ·
(d+2)·N log(N )+N log( d
δ )
pmin(1−pmax)2(d−1)
This leads to our theorem for learning the structure of any bounded-degree graph.
Theorem 5. With probability at least 1 − δ, in the extreme-noise setting, we can learn the structure of
any graph of maximum degree d with M = O
cascades in polynomial time.
δ )
(cid:18) d·N log( N
pmin(1−pmax)2d
(cid:19)
Let us now assume that pmax ∼ 1
d . This assumption is reasonable when you expect a constant number
of infections by time step. For instance, it makes sense for real diseases, for which carriers have to meet
to transmit it (we can only meet a constant number of people each day). It would not make sense for
social networks, in which it is possible to reach many followers with each post.
Corollary 2. With probability at least 1 − δ, in the extreme-noise setting, if we assume pmax ∼ 1
pmin constant, we can learn the structure of any graph of maximum degree d with M = O(cid:0)d · N log(cid:0) N
(cid:1)(cid:1).
d and
δ
This sample complexity is optimal up to log-factors, and almost matches the lower bound established in
the no-noise setting.
Proof. We need at least O (d · N log (N )) samples to learn the structure of a bounded-degree graph with
maximum degree d, according to the lower bound in [29].
3.2 Bounded-degree weights
For the remainder of this paper, we state results in the limited-noise setting.
If we consider cascades of size k, the exact probability of infection between two nodes is a multivariate
polynomial of degree N on N (N − 1) variables (the variables here would be the weights of the graph),
terms. If the graph has more than five nodes, the resulting polynomial
with a sum of up to 2· k(cid:88)
(N − 2)!
(N − k)!
l=1
is of degree more than five.
For our algorithm, we therefore only use cascades of size 1 or 2. This is a waste of the data, since
we simply discard cascades of larger size. However, we are not aware of techniques on how to utilize
larger cascades in the limited-noise setting. Cascades of size 1 or 2 are simple enough that we can write
explicitly their probability. This allows use to:
1. Design estimators for which we can calculate the exact limit.
2. Combine these estimators to transform a polynomial system of degree N to a polynomial system
of degree 2.
3. Solve this system exactly and obtain the probabilities of infection.
3.3 Estimators
We start by designing a few estimators:
Definition 6. We introduce two sets of N (N − 1) estimators and one set of N estimators. These
estimators can be computed even if we only have access to the noisy times of infection.
h2
i,j = Fraction of cascades for which only i and j are infected.
i<j = Fraction of cascades for which only i and j are infected, and t(cid:48)
f 2
e1
i = Fraction of cascades for which only i is infected.
i < t(cid:48)
j.
17
To simplify the coming notations, let us introduce sk, which is the probability that the noise on j has
delay at least k relative to the noise on i. Since the noise is i.i.d., this value is independent from i and j:
sk = P(nj −ni ≥ k)4. For instance, if i infected j during cascade m, the probability that the noise did not
j ) is P(nj ≥ ni) = s0. In the reverse case, the probability that
flip the order of infection (i.e. T
i + ni) = P(1 + nj < ni) = P(ni − nj ≥ 2) = s2.
(cid:48)m
the noise flipped the order of infection is P(T m
(cid:48)m
i < T m
j + nj < T
We now compute the limits of those estimators.
Proposition 5. As the number of cascades M goes to infinity, the estimators introduced above tend to
the following limit:
i,j →M→∞
h2
i<j →M→∞
f 2
i →M→∞
e1
1
N
1
N
1
N
(1 − pij)
(cid:89)
k(cid:54)=i,j
(cid:89)
(cid:89)
k(cid:54)=i,j
k(cid:54)=i,j
(1 − pik).
(pij + pji)
(1 − pik)(1 − pjk),
(pij · s0 + pji · s2)
(1 − pik)(1 − pjk),
Proof. The proof is very similar to 3. See details in Appendix B.2.
3.4 Solving the system
The limit of these estimators, as seen as a function of the probabilities of infection, is a complex polynomial
on up to 2(N − 1) variables. The crux of our algorithm is to combine those estimators in order to cancel
out most of these variables, and create N − 1 systems of two equations of degree 2 and two unknowns,
which we then solve.
Proposition 6. Let Vij =
only depends on the variables pij and pji :
i,j +N·e1
h2
i ·e1
j
f 2
i<j
. Then the limit of Vij as the number of cascades M goes to infinity
Vij →M→∞
pij · s0 + pji · s2
1 + pij · pji
.
Proof. Since all the estimators converge towards a constant, we can use Slutsky's lemma to find the limit
(1 − pik)(1 − pjk) parts
of Vij. Let Vij be the limit of Vij as M goes to infinity. We notice that the
(cid:89)
k(cid:54)=i,j
cancel each other out:
Vij =
=
(cid:32)
1 − (1 − q)1−min(0,k)
(cid:33)
2 − q
q)max(0,k)
f 2
i<j
i,j + N · e1
h2
i · e1
j
1
N (pij · s0 + pji · s2)
(cid:16) 1
k(cid:54)=i,j
N (pij + pji) + N (1−pij )(1−pji)
N 2
(cid:89)
(cid:17)(cid:89)
k(cid:54)=i,j
(1 − pik)(1 − pjk)
(1 − pjk)(1 − pjk)
tj−k(cid:88)
∞(cid:88)
.
tj =max(0,k)
ti=0
18
4For instance,
for geometric noise of parameter q, we have:
sk =
(1 − q)ti+tj = (1 −
(pij · s0 + pji · s2)
1 + pij · pji
.
=
We can therefore use this equality to deduce the weights of all the edges of the graph:
Theorem 6. For any graph, for any noise distribution having finite values, we can learn the weights of
all the edges of the graph. In particular, we can compute a quantity which converges to the true weight
of each edge:
pij =
0 − s2
(s2
2) +
0 − s2
(s2
2( Vjis2 − Vijs0)
2)2 − 4( Vjis2 − Vijs0)( Vijs2 − Vjis0)
.
(cid:113)
Proof. We present a sketch of the proof here. The details can be found in Appendix B.1. We know Vij
tends to Vij = pij·s0+pji·s2
1+pij·pji
. Using both Vij and Vji, we can establish this second-degree equation:
Vjis2 − Vijs0 +(cid:0)s2
0 − s2
2
(cid:1) pij + (Vijs2 − Vjis0) p2
ij = 0
We recall that by definition, s0 ≥ s2. We also notice that if pij = q1 and pji = q2 is a pair of solutions of
this system, then pij = 1
forms the other pair of solution, which implies there is uniqueness
q2
of solutions in [0, pmax]. Since the real probabilities of infection satisfy this system, we also know the
(cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). The only solution of this system in
solution exists. Let ∆ =(cid:0)s2
and pji = 1
q1
0 − s2
2
[0, pmax] is then:
pij =
2(Vjis2 − Vijs0)
0 − s2
(s2
∆
2) +
√
.
3.5 Sample complexity
We establish the sample complexity needed to estimate pij with precision . To do so, we start by
estimating Vij. Note that we only consider the pair of nodes i and j if, among the M samples, there
exists a cascade of size 2 in which i and j are the only infected nodes (i.e. h2
i,j > 0). Otherwise, we set
pij = pji = 0 as our estimate for pij.
Proposition 7. With probability 1 − δ
N 2 , with M = samples, we can estimate Vij with precision V .
Proof. We present a sketch of the proof; the details can be found in Appendix B.2. As in Proposition 4,
we use Hoeffding's inequality:
P( f 2
P(h2
i<j − f 2
i,j − h2
P(e1
i − e1
j − e1
P(e1
i<j > 1) ≤ 2e−2M 2
1,
i,j > 1) ≤ 2e−2M 2
1,
i > 1) ≤ 2e−2M 2
1,
j > 1) ≤ 2e−2M 2
1.
We use this to bound above Vij:
Vij ≤ Vij
(cid:34)
(cid:35)
1 +
1
f 2
i<j
+ 1
1 + N (e1
h2
i,j + N e1
i + e1
j )
i e1
j
+ o(1)
By bounding below the denominators and bounding above the numerator, we finally obtain:
Vij − Vij ≤ 1
4N
pmins2(1 − pmax)2d + o(1).
19
Therefore, by union bound, and by choosing 1
obtain:
With M = 1
mins2
2
p2
at least 1 − δ
V
N 2 .
16N 2
2(1−pmax)4d
2 log(3N )−log(δ)
2
4N
pmins2(1−pmax)2d = V , and setting 2e−2M 2
3N 2 , we
samples, we can guarantee Vij − Vij ≤ V with probability
1 = δ
Indeed, let ∆ =(cid:0)s2
Lemma 7. Let ∆ =(cid:0)s2
Once we have estimated Vij with precision V , estimating pij is unfortunately still not an easy task.
−(s2
2(Vij s2−Vjis0) , which means
that ∆ has to be positive for this quantity to be defined. However, for general values of Vij and Vji, ∆
can be negative. We therefore use the framework of constrained optimization to bound ∆ away from 0.
(cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). We have pij =
(cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). We have:
0 − s2
0−s2
2)+
√
∆
0 − s2
2
2
∆ ≥ (s2
0 − s2
2)2 (1 − pmax)2
1 + p2
max
.
Proof. We find the lower bound on ∆ by reformulating the problem as a constrained optimization problem,
and introducing the corresponding Lagrangian multipliers. The details can be found in Appendix B.1.
Now that we have established this bound on ∆, we can give the sample complexity needed to estimate
pij.
Proposition 8. Assuming we can estimate Vij within precision V , then we can estimate pij within
precision = 6V (1+p2
max)
0−s2
(s2
2)2(1−pmax)2 .
Proof. This is a simple derivation which can be found in Appendix B.2.
We finally piece everything together, and use a union bound on all the pij to obtain the final sample
complexity of our algorithm for learning the weights of general bounded-degree graphs.
Theorem 7. In the limited-noise setting, with probability at least 1−δ, with M = O(cid:16) e4pmax(d+1)
N 2
2 log(cid:0) N
δ
(cid:1)(cid:17)
p2
mins2
2(s2
0−s2
2)4
samples, we can learn the weights of any bounded-degree graph up to precision epsilon.
Proof. We obtain the desired bound by combining Proposition 7 and Proposition 8. See details in
Appendix B.2.
Once again, if we assume pmax ∼ 1
Corollary 3. In the limited-noise setting, with probability at least 1−δ, if pmax ∼ 1
can learn the weights of any bounded-degree graph up to precision epsilon with M = O(cid:16)
d and pmin constant, we obtain the following sample complexity:
d and pmin constant, we
2 log(cid:0) N
N 2
δ
(cid:1)(cid:17)
1
0−s2
s2
2(s2
2)4
samples.
4 General graphs
In the limited-noise setting, we notice that nothing prevents us from using the algorithm for learning
bounded-degree weights for general graph. This proves this problem is solvable for any graph, and any
noise distribution. As explained in Section 1.2, this is not an obvious result. However, if we do not
assume pmax ∼ 1
Theorem 8. In the limited-noise setting, with probability at least 1−δ, it is possible to learn all the weights
of any graph, for any noise distribution, with finite (but potentially exponential) sample complexity.
N , the sample complexity is now exponential.
20
5 Discussion and Future work
In this paper, we presented the first results to learn the edges of a graph from noisy times of infection.
We showed we learn the structure of any bidirectional tree or any bounded-degree graph (note that not
all trees are bounded-degree graphs) with optimal sample complexity (up to log-factors).
However, our results are not tight for learning the weights of bidirectional trees or bounded-degree
In the no-noise setting, [29] proves this can be achieved with O(d2N log(N )) for graphs of
graphs.
maximum degree d with correlation decay. Our results have sample complexity O(N 2 log(N )) without
any assumption of correlation decay. It is an open problem to understand whether it is possible to achieve
a sample complexity of O(d2N log(N )) in the limited-noise setting, and whether assuming correlation
decay is necessary to obtain such a result.
Moreover, for learning the weights of a general bounded-degree graph, we only use cascades of size 1
or 2. If we are given an infinite number of cascades of size bigger than 2, our current algorithm cannot
learn the weights of the graph. Future work could develop an algorithm without such a weakness.
All our results for learning the weights of the edges are in the limited-noise setting. Whether or not it
is possible to learn the noise in the extreme-noise setting is an other question of interest for future work.
Finally, we have made no restriction on the distribution of the noise we add, other than it is finite.
It would be interesting to study whether stronger restrictions on the noise (for instance Gaussian noise)
would lead to stronger results. It would also be interesting to allow infinite noise, and develop algorithms
which are robust to errors in the infection status of a node (our current algorithms can return wrong
graph structure with only one adversarially chosen false positive).
21
References
[1] Bruno Abrahao, Flavio Chierichetti, Robert Kleinberg, and Alessandro Panconesi. Trace complexity
of network inference. Proceedings of the 19th ACM SIGKDD international conference on Knowledge
discovery and data mining - KDD '13, page 491, 2013.
[2] Ery Arias-castro, Emmanuel J Cand`es, and Arnaud Durand. Detection of an anomalous cluster in
a network. The Annals of Statistics, 39(1):278 -- 304, 2011.
[3] Ery Arias-castro and S T Nov. Detecting a Path of Correlations in a Network. pages 1 -- 12.
[4] Daniel Bernoulli and Sally Blower. An attempt at a new analysis of the mortality caused by smallpox
and of the advantages of inoculation to prevent it. Reviews in medical virology, 14:275 -- 288, 2004.
[5] A. Cayley. A theorem on trees. In Collected Mathematical Papers Vol. 13, pages 26 -- 28. Cambridge
University Press, 1897.
[6] Justin Cheng, Lada A. Adamic, P. Alex Dow, Jon Kleinberg, and Jure Leskovec. Can Cascades be
Predicted? In Proceedings of the 23rd international conference on World wide web (WWW' 14),
2014.
[7] Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio Scala, Guido Caldarelli,
H. Eugene Stanley, and Walter Quattrociocchi. The spreading of misinformation online. Proceedings
of the National Academy of Sciences, page 201517441, 2016.
[8] A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum Likelihood from Incomplete Data via the
EM Algorithm. Journal ofthe Royal Statistical Society, 39(1):1 -- 38, 1977.
[9] Kimon Drakopoulos, Asuman Ozdaglar, and John N. Tsitsiklis. An efficient curing policy for epi-
demics on graphs. arXiv preprint arXiv:1407.2241, (December):1 -- 10, 2014.
[10] Kimon Drakopoulos, Asuman Ozdaglar, and John N. Tsitsiklis. A lower bound on the performance
of dynamic curing policies for epidemics on graphs. (978):3560 -- 3567, 2015.
[11] Giulia Fanti, Peter Kairouz, Sewoong Oh, Kannan Ramchandran, and Pramod Viswanath. Rumor
source obfuscation on irregular trees. In Proceedings of the 2016 ACM SIGMETRICS International
Conference on Measurement and Modeling of Computer Science (SIGMETRICS' 16 ), pages 153 --
164. ACM, 2016.
[12] Giulia Fanti, Peter Kairouz, Sewoong Oh, Kannan Ramchandran, and Pramod Viswanath. Hiding
the Rumor Source. IEEE Transactions on Information Theory, 63(10):6679 -- 6713, 2017.
[13] Giulia Fanti, Peter Kairouz, Sewoong Oh, and Pramod Viswanath. Spy vs. Spy: Rumor Source
Obfuscation. Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement
and Modeling of Computer Systems (SIGMETRICS' 14), pages 271 -- 284, 2015.
[14] Mehrdad Farajtabar, Jiachen Yang, Xiaojing Ye, Huan Xu, Rakshit Trivedi, Elias Khalil, Shuang
Li, Le Song, and Hongyuan Zha. Fake News Mitigation via Point Process Based Intervention. In
Proceedings of the 34th International Conference on Machine Learning (ICML' 17), 2017.
[15] Ken Goldberg, Theresa Roeder, Dhruv Gupta, and Chris Perkins. Eigentaste: A Constant Time
Collaborative Filtering Algorithm. Information Retrieval, 4(2):133 -- 151, 2001.
[16] Manuel Gomez-rodriguez, Jure Leskovec, and Andreas Krause. Inferring Networks of Diffusion and
Influence. In ACM Transactions on Knowledge Discovery from Data (TKDD' 12), volume 5, 2012.
[17] Manuel Gomez-Rodriguez, Jure Leskovec, and Bernhard Scholkopf. Structure and Dynamics of
Information Pathways in Online Media. In 6th International Conference on Web Search and Data
Mining (WSDM 2013), 2013.
22
[18] Jessica Hoffmann and Constantine Caramanis. The Cost of Uncertainty in Curing Epidemics. Pro-
ceedings of the ACM on Measurement and Analysis of Computing Systems (SIGMETRICS' 18),
2(2):11 -- 13, 2018.
[19] Tomoharu Iwata, Amar Shah, and Zoubin Ghahramani. Discovering Latent Influence in Online
Social Activities via Shared Cascade Poisson Processes. In Proceedings of the 19th ACM SIGKDD
international conference on Knowledge discovery and data mining (KDD' 13), 2013.
[20] David Kempe, Jon Kleinberg, and ´Eva Tardos. Maximizing the spread of influence through a social
network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery
and data mining - KDD '03, 2003.
[21] Justin Khim and Po-Ling Loh. Permutation Tests for Infection Graphs. pages 1 -- 28, 2017.
[22] Justin Khim and Po-Ling Loh. A theory of maximum likelihood for weighted infection graphs. pages
1 -- 47, 2018.
[23] Jeongyeol Kwon, Wei Qian, Constantine Caramanis, Yudong Chen, and Damek Davis. Global
Convergence of the EM Algorithm for Mixtures of Two Component Linear Regression. XX:1 -- 57,
2019.
[24] Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie
Glance. Cost-effective Outbreak Detection in Networks. Proceedings of the 13th ACM SIGKDD
international conference on Knowledge discovery and data mining (KDD '07), page 420, 2007.
[25] Eli A. Meirom, Chris Milling, Constantine Caramanis, Shie Mannor, Ariel Orda, and Sanjay Shakkot-
tai. Localized epidemic detection in networks with overwhelming noise. pages 1 -- 27, 2014.
[26] Chris Milling, Constantine Caramanis, Shie Mannor, and Sanjay Shakkottai. Network Foren-
sics : Random Infection vs Spreading Epidemic.
In Proceedings of the 12th ACM SIGMET-
RICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer
Systems (SIGMETRICS' 12), 2012.
[27] Chris Milling, Constantine Caramanis, Shie Mannor, and Sanjay Shakkottai. Local detection of
infections in heterogeneous networks. Proceedings - IEEE INFOCOM, 26:1517 -- 1525, 2015.
[28] Seth Myers, Chenguang Zhu, and Jure Leskovec. Information Diffusion and External Influence in
Networks. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery
and data mining (KDD' 12), pages 33 -- 41, 2012.
[29] Praneeth Netrapalli and Sujay Sanghavi. Learning the Graph of Epidemic Cascades. In Proceedings
of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement
and Modeling of Computer Systems (SIGMETRICS' 12), pages 211 -- 222, 2012.
[30] M. E. J. Newman. Networks: An Introduction, volume 23. 2014.
[31] Devavrat Shah and Tauhid Zaman. Detecting sources of computer viruses in networks: theory and
experiment. In ACM SIGMETRICS Performance Evaluation Review, volume 38, pages 203 -- 214.
ACM, 2010.
[32] Devavrat Shah and Tauhid Zaman. Rumors in a Network : Who ' s the Culprit ? IEEE Transactions
on information theory, 57(8):1 -- 43, 2010.
[33] Devavrat Shah and Tauhid Zaman. Rumor centrality: a universal source detector. In ACM SIG-
METRICS Performance Evaluation Review, volume 40, pages 199 -- 210. ACM, 2012.
[34] Sam Spencer and R Srikant. On the impossibility of localizing multiple rumor sources in a line graph.
ACM SIGMETRICS Performance Evaluation Review, 43(2):66 -- 68, 2015.
23
[35] Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, and Chee Wei Tan. Rumor source detection with
multiple observations: Fundamental limits and algorithms. In ACM SIGMETRICS Performance
Evaluation Review, volume 42, pages 1 -- 13. ACM, 2014.
[36] Liang Wu and Huan Liu. Tracing Fake-News Footprints: Characterizing Social Media Messages by
How They Propagate. In (WSDM 2018) The 11th ACM International Conference on Web Search
and Data Mining, 2018.
[37] Ali Zarezade, Ali Khodadadi, Mehrdad Farajtabar, Hamid R Rabiee, and Hongyuan Zha. Correlated
Cascades : Compete or Cooperate. In Proceedings of the Thirty-First AAAI Conference on Artificial
Intelligence (AAAI-17), pages 238 -- 244, 2017.
[38] Qingyuan Zhao, Murat A. Erdogdu, Hera Y. He, Anand Rajaraman, and Jure Leskovec. SEISMIC:
A Self-Exciting Point Process Model for Predicting Tweet Popularity. Proceedings of the 21th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '15 ), 2015.
24
A Bidirectional tree
We include here the full calculations for learning the weights of the bidirectional tree.
Proposition 9. If we know (i, j) is an edge in the original tree, then the probability of infection along
this edge is given by:
pij =
gi,Cj · (s2
fi<j · s0 − fj<i · s2
0 − s2
2) + fi<j · s0 − fj<i · s2
.
Proof. According to Lemma 3, we have:
fi<j = PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2
gi,Cj = PCj(→ i) · (1 − pij)
fj<i = PCi(→ j) · pji · s0 + PCj(→ i) · pij · s2
gj,Ci = PCi(→ j) · (1 − pji).
We have 4 second-order equations, with 4 unknowns: pij, pji, PCj(→ i) and PCi(→ j). We solve it:
fi<j + fj<i = (PCj(→ i) · pij + PCi(→ j) · pji) · (s0 + s2)
fi<j − fj<i = (PCj(→ i) · pij − PCi(→ j) · pji) · (s0 − s2)
(cid:18) fi<j + fj<i
(cid:19)
=⇒ PCj(→ i) · pij =
fi<j − fj<i
s0 − s2
2
=
s0 + s2
0 − s2
s2
1
+
2
fi<j · s0 − fj<i · s2
PCj(→ i) = gi,Cj + PCj(→ i) · pij
0 − s2
s2
PCj(→ i) · pij
PCj(→ i)
fi<j · s0 − fj<i · s2
gi,Cj · (s2
0 − s2
fi<j · s0 − fj<i · s2
=⇒ pij =
= gi,Cj +
pij =
2
2) + fi<j · s0 − fj<i · s2
.
samples, with probability at least 1 − δ, we
Lemma 8. With M = N 2
have:
2 log(cid:0) 6
δ
(cid:1) ((s2
0−s2
2+s0+s2)pmax+s0+s2)2
2)2
0−s2
(s2
pij − pij ≤ .
Proof. Using Hoeffding's inequality:
P( fi<j − fi<j > 1) ≤ 2e−2M 2
1,
P( fj<i − fj<i > 1) ≤ 2e−2M 2
1,
P(gi,Cj − gi,Cj > 1) ≤ 2e−2M 2
1.
(cid:1), we have that with probability at least 1 − δ, all the following hold:
log(cid:0) 6
δ
Choosing M = 1
2
1
fi<j − fi<j ≤ 1,
fj<i − fj<i ≤ 1,
gi,Cj − gi,Cj ≤ 1.
25
Hence, with probability at least 1 − δ, we have:
2) + (fi<j − 1) · s0 − (fj<i + 1) · s2
0 − s2
2 + s0 + s2)
pij =
≤
=
fi<j · s0 − fj<i · s2
gi,Cj · (s2
0 − s2
(gi,Cj − 1) · (s2
0 − s2
gi,Cj · (s2
1 −
2) + fi<j · s0 − fj<i · s2
(fi<j + 1) · s0 − (fj<i − 1) · s2
0 − s2
fi<j · s0 − fj<i · s2 + 1(s0 + s2)
2) + fi<j · s0 − fj<i · s2 − 1(s2
1
0−s2
2)+fi<j·s0−fj<i·s2
1(s2
0−s2
2+s0+s2)
·(s2
g
= pij
+ 1
i,Cj
(cid:32)
gi,Cj · (s2
0 − s2
= pij
+ 1
1 +
gi,Cj · (s2
gi,Cj · (s2
0 − s2
0 − s2
(s2
gi,Cj · (s2
0 − s2
0 − s2
gi,Cj · (s2
+ 1
(cid:33)
s0 + s2
+ o(1)
s0 + s2
0 − s2
2) + fi<j · s0 − fj<i · s2
2 + s0 + s2)
2) + fi<j · s0 − fj<i · s2
1(s2
0 − s2
2) + fi<j · s0 − fj<i · s2
2 + s0 + s2)pmax
2) + fi<j · s0 − fj<i · s2
2) + fi<j · s0 − fj<i · s2
s0 + s2
+ o(1)
+ o(1).
pij − pij ≤ 1
Using the results from Lemma 3, we have:
fi<j = PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2,
gi,Cj = PCj(→ i) · (1 − pij).
We use it to simplify the denominator:
denominator = gi,Cj · (s2
=
0 − s2
(cid:17) · (s2
2) + fi<j · s0 − fj<i · s2
(cid:16)PCj(→ i) · (1 − pij)
(cid:16)PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2
−(cid:16)PCi(→ j) · pji · s0 + PCj(→ i) · pij · s2
0 − s2
2)
+
(cid:17) · s0
(cid:17)
s2
0 − s2
2)
= PCj(→ i) · (s2
≥ s2
0 − s2
N
2
.
Plugging back above:
pij − pij ≤ 1
0 − s2
(s2
gi,Cj · (s2
0 − s2
0 − s2
gi,Cj · (s2
0 − s2
(s2
2 + s0 + s2)pmax
2 + s0 + s2)pmax
2) + fi<j · s0 − fj<i · s2
2) + fi<j · s0 − fj<i · s2
s0 + s2
+ 1
≤ 1N
0 − s2
s2
2
+ 1N
s0 + s2
0 − s2
s2
2
+ o(1).
+ o(1)
By symmetry, we obtain:
pij − pij ≤ 1N
0 − s2
(s2
2 + s0 + s2)pmax + s0 + s2
+ o(1).
0 − s2
s2
2
26
2 log(cid:0) 6
δ
0−s2
(s2
(cid:1) ((s2
By choosing 1 =
N
With M = N 2
pij ≤ .
samples, with probability at least 1 − δ, we have pij −
0−s2
s2
2
2+s0+s2)pmax+s0+s2
0−s2
2+s0+s2)pmax+s0+s2)2
0−s2
(s2
2)2
, we therefore have:
B Bounded-degree graphs
B.1 Solving the system
Lemma 9. Let ∆ =(cid:0)s2
(cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). We have:
0 − s2
2
∆ ≥ (s2
0 − s2
2)2 (1 − pmax)2
1 + p2
max
.
Proof. Finding a lower bound for ∆ can be achieved through minimizing ∆, or maximizing (Vjis2 −
Vijs0)(Vijs2 − Vjis0). We want to solve:
maximize
Vij ,Vji
(Vjis2 − Vijs0)(Vijs2 − Vjis0)
,
,
subject to Vij =
pijs0 + pjis2
1 + pijpji
pjis0 + pijs2
1 + pijpji
Vji =
pij ≥ 0,
pmax − pij ≥ 0,
pji ≥ 0,
pmax − pji ≥ 0.
To do so, we introduce Lagrangian multipliers. By replacing Vij and Vji with their actual value, the
optimization problem above only has affine constraints, so it satisfies the linearity constraint qualification
for the Karush-Kuhn-Tucker conditions. In other words, all the partial derivatives of the Lagrangian are
equal to 0 for an optimal point.
L = L(Vij, Vji, pij, pji, λ1, λ2, µ1, µ2, µ3, µ4)
= (Vjis2 − Vijs0)(Vijs2 − Vjis0)
− λ1(vij(1 + pijpji) − pijs0 + pjis2)
− λ2(vji(1 + pijpji) − pjis0 + pijs2)
− µ1pij − µ2(pmax − pij)
− µ3pji − µ4(pmax − pji).
We calculate the gradients of L.
∂L
∂Vij
∂L
∂Vji
∂L
∂pij
∂L
∂pji
= Vji(s2
0 + s2
= Vij(s2
0 + s2
2) − 2Vijs0s2 − λ1(1 + pijpji),
2) − 2Vjis0s2 − λ2(1 + pijpji),
= −λ1(Vijpji − s0) − λ2(Vjipji − s2) − µ1 + µ2,
= −λ1(Vijpij − s2) − λ2(Vjipij − s0) − µ3 + µ4.
27
From now on, we find the set X 0 of points for which all the partial derivatives are null. We know the
solution of the maximization problem is the point of X 0 which maximizes the objective function.
Let us assume an interior point solution exists. For this point, all the gradients of L are equal to 0.
Since it is an interior point, we also have µ1 = µ2 = µ3 = µ4 = 0 by complementary slackness. Solving
this system, we obtain:
λ1 = (s2
λ2 = (s2
0 − s2
2)
0 − s2
2)
pjis0 − pijs2
(1 + pijpji)2 ,
pijs0 − pjis2
(1 + pijpji)2 .
∂pij
= 0 becomes pijpji(1 − pji) = 0. However, this is impossible
Plugging this in above, the condition ∂L
for an interior point, since 0 < pij, pji < pmax < 1. Therefore, the extrema of ∆ are attained when at
least one constraint is active.
We notice that if the conditions pij = 0 or pji = 0 are active, then (Vjis2 − Vijs0)(Vijs2 − Vjis0) = 0.
Let us suppose (without loss of generality, by symmetry of the problem) that we have pij = pmax. The
objective function is then increasing in pji. Therefore, ∆ is minimized when pij = pji = pmax, which
implies vij = Vji = pmax(s0+s2)
. In this case:
1+p2
max
(cid:19)2
∆ ≥ (s2
≥ (s2
≥ (s2
≥ (s2
(cid:18) pmax(s0 + s2)
ij(s0 − s2)2
(cid:21)
2)2 − 4V 2
0 − s2
(cid:20)
2)2 − 4
0 − s2
0 − s2
2)2
2)2 (1 − pmax)2
0 − s2
1 − 4
1 + p2
pmax
1 + p2
max
max
.
1 + p2
max
(s0 − s2)2
This expression is always positive, which is what we wanted.
Theorem 9. For any graph, for any noise distribution having finite values, we can learn the weights of
all the edges of the graph. In particular, we can compute a quantity which converges to the true weight
of each edge:
(cid:113)
2( Vjis2 − Vijs0)
2)2 − 4( Vjis2 − Vijs0)( Vijs2 − Vjis0)
.
0 − s2
(s2
pij =
0 − s2
(s2
2) +
Proof.
:=
pji =
We can plug this in Vji:
Vij →M→∞ Vij
pij · s0 + pji · s2
1 + pij · pji
Vij − pij · s0
s2 − Vij · pij
1 + pij · pji
Vij − pij · s0
s2 − Vij · pij
After some shuffling around, we obtain the second-degree equation:
(cid:20)
1 + pij · Vij − pij · s0
s2 − Vij · pij
Vjis2 − Vijs0 +(cid:0)s2
pji · s0 + pij · s2
(cid:21)
(cid:1) pij + (Vijs2 − Vjis0) p2
Vji =
0 − s2
Vji
=
2
· s0 + pij · s2
ij = 0
28
and pji = 1
q1
0 − s2
We recall that by definition, s0 ≥ s2. We also notice that if pij = q1 and pji = q2 is a pair of solutions of
this system, then pij = 1
forms the other pair of solution, which implies there is uniqueness
q2
of solutions in [0, pmax]. Since the real probabilities of infection satisfy this system, we also know the
solution exists. Let ∆ =(cid:0)s2
−(cid:0)s2
(cid:0)s2
(cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). The only solution of this system in
(cid:1) +
(cid:1)2 −(cid:0)s2
(cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0)
√
∆
2(Vijs2 − Vjis0)
0 − s2
[0, pmax] is:
0 − s2
0 − s2
pij =
2
2
2
2
(cid:16)
0 − s2
(s2
2) +
(cid:17)
√
∆
=
=
2(Vjis0 − Vijs2)
√
2(Vjis2 − Vijs0)
0 − s2
(s2
∆
2) +
B.2 Sample complexity
Proposition 10. As the number of cascades M goes to infinity, the estimators below tend to the following
limit:
(pij + pji)
(1 − pik)(1 − pjk)
(pij · s0 + pji · s2)
(1 − pik)(1 − pjk)
i,j →M→∞
h2
i<j →M→∞
f 2
i →M→∞
e1
1
N
1
N
1
N
(1 − pij)
(cid:89)
k(cid:54)=i,j
(cid:89)
(cid:89)
k(cid:54)=i,j
k(cid:54)=i,j
(1 − pik)
Proof. Using the law of large numbers:
i<j →M→∞ E[ f 2
f 2
(cid:89)
(cid:89)
k(cid:54)=i,j
pij
=
i<j]
= P(i source, infects j, no other infections, delay 0)
+ P(j source, infects i, no other infections, delay 2)
1
N
(1 − pjk) · s0
(1 − pik)
+
pji
(1 − pjk)
1
N
(pij · s0 + pji · s2)
k(cid:54)=i,j
(1 − pik) · s2
(1 − pik)(1 − pjk).
k(cid:54)=i,j
(cid:89)
(cid:89)
(cid:89)
k(cid:54)=i,j
k(cid:54)=i,j
=
1
N
In the same vein, we have:
i,j →M→∞ E[h2
h2
i,j]
= P(i source, infects j, no other infections)
+ P(j source, infects i, no other infections)
1
N
(1 − pik)(1 − pjk)
(pij + pji)
=
(cid:89)
k(cid:54)=i,j
i →M→∞ E[e1
e1
i ]
29
= P(i source, no other infections)
(cid:89)
=
=
1
N
1
N
(1 − pik)
k(cid:54)=i
(1 − pij)
(cid:89)
k(cid:54)=i,j
(1 − pik).
Proposition 11. With probability 1 − δ
N 2 , with M = samples, we can estimate Vij with precision V .
Proof. As in Proposition 4, we use Hoeffding's inequality:
P( f 2
P(h2
i<j − f 2
i,j − h2
i − e1
P(e1
P(e1
j − e1
i<j > 1) ≤ 2e−2M 2
1,
i,j > 1) ≤ 2e−2M 2
1,
i > 1) ≤ 2e−2M 2
1,
j > 1) ≤ 2e−2M 2
1.
We use this to bound above Vij:
Vij =
≤
= Vij
1 +
We bound below the denominators:
1
f 2
i<j
+ 1
1 + N (e1
h2
i,j + N e1
i + e1
j )
i e1
j
f 2
i<j
i,j + N · e1
h2
i · e1
j
f 2
i<j + 1
i,j + 1 + N · (e1
h2
(cid:34)
1 + 1
f 2
i<j
1+N 1(e1
i,j +N e1
h2
1 +
i +e1
j )
i e1
j
= Vij
i + 1) · (e1
j + 1)
(cid:35)
+ o(1)
i<j ≥ 1
f 2
N
(pijs0 + pjis2)(1 − pmax)2d
≥ pmins2
j ≥ 1
i e1
N
≥ 1
N
(1 − pmax)2d
N
(1 + pijpji)(1 − pmax)2d
(1 − pmax)2d
h2
i,j + N e1
We bound above the numerator:
N (e1
i + e1
i ) = N
(1 − pik) +
(1 − pjk)
1
(cid:18) 1
N
N
(cid:89)
k(cid:54)=i
1
N
+
(cid:19)
≤ N
≤ 2.
1
f 2
i<j
+ 1
1 + N (e1
h2
i,j + N e1
i + e1
j )
i e1
j
30
(cid:89)
k(cid:54)=j
1
N
(cid:35)
+ o(1)
Plugging in above:
(cid:34)
Vij = Vij
1 +
(cid:20)
1 +
≤ Vij
Using Vij ≤ 1, and by symmetry:
(cid:21)
+ o(1)
.
Vij − Vij = 1
pmins2
1
N (1 − pmax)2d +
(cid:20)
N
(1 − pmax)2d
1(1 + 2)
1
N (1 − pmax)2d
(cid:21)
(cid:20) 1 + 3pmins2
pmins2
+ 3
1
(cid:21)
=≤ 1
≤ 1
N
(1 − pmax)2d
pmins2(1 − pmax)2d + o(1).
pmins2
4N
+ o(1)
+ o(1)
Therefore, by union bound, and by choosing 1
obtain:
With M = 1
mins2
2
p2
at least 1 − δ
V
N 2 .
16N 2
2(1−pmax)4d
2 log(3N )−log(δ)
2
4N
pmins2(1−pmax)2d = V , and setting 2e−2M 2
3N 2 , we
samples, we can guarantee Vij − Vij ≤ V with probability
1 = δ
Proposition 12. Assuming we can estimate Vij within precision V , then we can estimate pij within
precision = 6V (1+p2
Proof. If we know Vij − Vij < V and Vji − Vji < V :
2)2(1−pmax)2 .
0−s2
(s2
max)
2( Vjis2 − Vijs0)
2)2 − 4( Vjis2 − Vijs0)( Vijs2 − Vjis0)
≤
pij =
0 − s2
(s2
0 − s2
(s2
2) +
2(Vjis2 − Vijs0) + 2V (s0 + s2)
(cid:113)
2)2 +(cid:112)∆ − 4V (s0 + s2)2(Vij + Vji)
We recall s0 + s2 ≤ 1, Vij ≤ 1, pij ≤ 1, and 1 + p2
∆(cid:112)1 − 8 V
pij ≤ 2(Vjis2 − Vijs0) + 2V
(cid:16)
1 +
+
0 − s2
(s2
0 − s2
(s2
≤ pij
2)2 +
(cid:17)
√
√
√
∆
4V
0 − s2
(s2
∆
2)2 +
∆
.
max ≤ ∆ ≤ 1 (Lemma 7). Hence:
2V
0 − s2
2)2 +
(s2
√
∆
+ o(V )
≤ pij +
6V
∆
.
max)
0−s2
(s2
2)2(1−pmax)2 .
By symmetry, and using the bound on ∆ stated above, we conclude that if we know Vij and Vji up to
precision V , we know pij up to precision = 6V (1+p2
Theorem 10. In the limited-noise setting, with probability at least 1−δ, with M = O(cid:16) e4pmax (d+1)
p2
mins2
samples, we can learn the weights of any bounded-degree graph up to precision epsilon.
Proof. With probability at least 1 − δ
2 log(3N )−log(δ)
M = 1
2
V
least 1 − δ
samples, we can guarantee Vij − Vij ≤ V with probability at
0−s2
6(1+p2
2)2(1−pmax)2 . This gives us a sample complexity of:
p2
mins2
N 2 samples, knowing 1
V
16N 2
2(1−pmax)4d
N 2 , using
0−s2
max)
2(s2
(s2
2)4
N 2
=
2
2 log(cid:0) N
δ
(cid:1)(cid:17)
(cid:20)
(cid:21)2
(cid:18) 9N 2
(cid:19)
4
pmins2
log
δ
M ≥
18
2(s2
0 − s2
2)4(1 − pmax)4(d+1)
N 2
31
≥ 1152 · e4pmax(d+1)
(cid:18) e4pmax(d+1)
0 − s2
mins2
p2
2)4
= O
2(s2
mins2
p2
2(s2
0 − s2
2)4
N 2
2 log
N 2
2 log
(cid:18) 9N 2
(cid:19)
(cid:18) N
(cid:19)(cid:19)
δ
.
δ
32
|
1510.06124 | 3 | 1510 | 2015-10-26T18:31:03 | Hierarchy of knowledge translation: from health problems to ad-hoc drug design | [
"cs.SI",
"cs.DL"
] | An innovative approach to analyze the complexity of translating novel molecular entities and nanomaterials into pharmaceutical alternatives (i.e., knowledge translation, KT) is discussed. First, some key concepts on the organization and translation of the biomedical knowledge (paradigms, homophily, power law distributions, hierarchy, modularity, and research fronts) are reviewed. Then, we propose a model for the knowledge translation (KT) in Drug Discovery that considers the complexity of interdisciplinary communication. Specifically, we address two highly relevant aspects: 1) A successful KT requires the emergence of organized bodies of inter-and transdisciplinary research, and 2) The hierarchical and modular topological organization of these bodies of knowledge. We focused on a set of previously-published studies on KT which rely on a combination of network analysis and computer-assisted analysis of the contents of scientific literature and patents. The selected studies provide a duo of complementary perspectives: the demand of knowledge (cervical cancer and Ebola hemorrhagic fever) and the supply of knowledge (liposomes and nanoparticles to treat cancer and the paradigmatic Doxil, the first nanodrug to be approved). | cs.SI | cs | Hierarchy of knowledge translation: from health problems to ad-hoc drug design
David Fajardo
Doctorado en Ciencias Medicas y de la Salud
Universidad Nacional Autonoma de Mexico
Victor M. Castano
Centro de Fisica Aplicada y Tecnologia Avanzada
Universidad Nacional Autonoma de Mexico
Abstract
An innovative approach to analyze the complexity of translating novel molecular entities
and nanomaterials into pharmaceutical alternatives (i.e., knowledge translation, KT) is
discussed. First, some key concepts on the organization and translation of the biomedical
knowledge (paradigms, homophily, power law distributions, hierarchy, modularity, and
research fronts) are reviewed. Then, we propose a model for the knowledge translation
(KT) in Drug Discovery that considers the complexity of interdisciplinary communication.
Specifically, we address two highly relevant aspects: 1) A successful KT requires the
emergence of organized bodies of inter-and transdisciplinary research, and 2) The
hierarchical and modular topological organization of these bodies of knowledge. We
focused on a set of previously-published studies on KT which rely on a combination of
network analysis and computer-assisted analysis of the contents of scientific literature and
patents. The selected studies provide a duo of complementary perspectives: the demand
of knowledge (cervical cancer and Ebola hemorrhagic fever) and the supply of knowledge
(liposomes and nanoparticles to treat cancer and the paradigmatic Doxil, the first nano-
drug to be approved).
Keywords: Biomedical knowledge, translational hubs, trading zones, scientific cultures.
1. Introduction
“From bench to bedside” is the motto of Translational Science (TS).[1] The fundamental idea behind TS is
ultimately to translate the basic science discoveries into a better health status for the population.[2]
Particularly, TS in Drug Discovery consists in transforming the knowledge on biomolecular entities -like small
molecules, nucleic acids or proteins- and their interactions into drug therapies.[3] This translation of
biomolecular knowledge into therapies is becoming an increasingly difficult and complex task. A productivity
crisis in pharmaceutical research and development (R&D) has been extensively reported.[4] This crisis
consists, among other things, of a decline in the number of New Molecular Entities approved, and an
increase of the attrition of R&D projects, development times and R&D expenditures.[4] According to
Pammolli, Magazzini and Riccaboni, the explanation of this innovation crisis is that the R&D efforts are
concentrated in areas with a potential of very high sales per year but with the lowest probability of success.
[4] These areas with a low probability of success are aimed to develop new drugs through unexploited
biomolecular mechanism to treat complex diseases like cancer and obesity.[4] These innovation trends could
be boosting the increase in size and complexity of biomedical literature, making it difficult to translate the
basic knowledge in innovations.
The difficulty of translating the biomedical knowledge into treatments also could be observed in the
unbalance between the huge quantity of published papers and the shortage of new approved drugs.[5]
Moreover, the increasing complexity of the biomedical information could be tackling the construction of
meaningful ideas and their transformation into innovations. That is, knowledge translation in Drug Discovery
is becoming a big data problem.[6, 7] In previous investigations, we have shown how the combination of
biomedical-bioinformatics and scientometrics could be useful to handle the complexity of biomedical
knowledge and its translation into innovations.[8-11] These two fields have different approaches on the
information. On the one hand, biomedical bioinformatics processes, organizes, structures, integrates and
represents data in order to obtain meaningful and useful information that could be used, for example, to
discover new drugs, make medical decisions or improve health care quality.[12] On the other hand,
scientometrics focuses on quantifying the communication of scientific information.[13] Differently, our
approach focuses on the communication of biomedical information among researchers and simultaneously
organizes, structures and represents the communicated information using bioinformatics tools.[8-11]
Particularly, knowledge translation is understood as a communication process between the basic and the
clinical research levels.[14] In this process, a new interdisciplinary or translational language emerges.[14]
We propose that the translational language and the intellectual community that produce it are both
fundamentally necessary for the transformation of the huge mass of data obtained from the experimental
basic research into the longed pharmaceutical treatments. Therefore, this new approach pays special
attention to the organization, structure and representation of the knowledge. The bioinformatics component
of our research strategy allows us to analyze the emergence of this new interdisciplinary language.
In this paper, we extensively discuss this new approach. In the second section, key concepts like scientific
cultures, some network properties and interdisciplinary communication are briefly reviewed. In the section 3,
a model for KT in Drug Discovery as a complex process of interdisciplinary communication is presented. In
section 4, we will discuss four previously studied instances of knowledge translation processes. Two of these
studies analyze the knowledge translation process of the research on specific health problems: cervical
cancer[8] and Ebola[11]. The other two studies analyze this process since the perspective of the R&D of
medical technologies. One study compares the NT process in two types of nanotechnologies to treat cancer:
liposomes versus metal nanoparticles.[9] The other study focuses in the development of Doxil,[10] the first
approved nanodrug.[15]
2. A brief review of some key concepts to the study of KT in Drug Discovery
2.1 Paradigms as scientific cultures
As defined by Thomas Kuhn, a paradigm is a scientific achievement that have two characteristics: 1) It is so
relevant that a community of adherents is organized around it and 2) It leave an important quantity of
unsolved problems to be worked by this community.[16] Importantly, the paradigms set a system of
standards for scientific practices to be followed by the members of a particular scientific community.[16]
Moreover, the paradigmatic standards determine what is to be observed, how the observations should be
performed, how questions should be asked and how the results should be interpreted.[16] The kuhnian
paradigm is a polysemic concept. It includes simultaneously the achievement, the standards and the
community.[17]
Paradigms are particular types of intellectual cultures[17] and, importantly, they are associated with
specialized language.[18] These specific languages determine the way the information is communicated,
presented and interpreted inside a community of researchers. [18] Moreover, knowledge translation can be
understood as a communication process where a new interdisciplinary language is built.[14] That is, scientific
languages represent a coherent system of meanings, commitments and grammar rules that defines the
membership in the communities. When two or more scientific cultures interact with each other, a sub-system
of communication must be established, i.e., a trading zone.[17] These sub-systems are territories that belong
to neither of the interacting communities but allow the exchange of concepts, methodologies, tools and
evidence.[17] So, trading zones would allow the interdisciplinary communication without the need to altering
the fundamentals of each culture.
Paradigms are important for the study of KT in drug discovery because they determine the way that NT
actually takes place. For example, the discovery of the human papillomavirus (HPV) as the necessary cause
of cervical cancer led the NT process toward the development of vaccines and HPV tests[8]. This example is
discussed more extensively in section 4.
2.2. Key concepts: Homophily, power laws, hierarchy, modularity and research fronts in literature
networks
Scientific journals are still the most important media of communication for the scientific community. The
papers published in these journals build a complex citation network that shows both the organization and
evolution of the scientific community and the knowledge itself.[19] That is why the analysis of literature
networks is fundamental to the understanding of the knowledge translation process. Similarly, networks of
patents provide relevant information about the development of technologies.[20] In this sub-section some
relevant properties of these kinds of complex literature networks are briefly reviewed. The review of these
properties is aimed to introduce the conceptual basis of the research fronts which are understood as the
convergence of clusters of papers, specialized community of researchers and jargon. Research fronts are
particularly important to the analysis of NT as a communication process, as it is discussed below.
Homophily is the trend of certain nodes (the objects represented in a network: persons, proteins, papers,
etc) to preferentially establish connections with others nodes of similar features.[21] People tend to build
relationship almost exclusively with people that are economically, socially and culturally akin.[21] Scientific
literature and scientist coauthor networks are not different. Scientists preferentially collaborate with
colleagues that belong to the same scientific culture.[22] Papers normally cite other manuscripts with very
similar content. Importantly, according to McPherson, Smith-Lovin and Cook “The pervasive fact of
homophily means that cultural, behavioral, genetic, or material information that flows through networks will
tend to be localized. Homophily implies that distance in terms of social characteristics translates into network
distance”.[21] Therefore, homophily is the fundamental property that allows us to map the KT process. That
is, basic and clinical research tends to be located in a well defined regions in the citation networks.[8-11, 23]
Translational research would occupy an in-between topological position in the network connecting the basic
with the clinical research.[8-11, 23] Similarly, papers that are in the same observation scale (molecular,
cellular, organism, population) tend to stick together.[11] Moreover, it is completely feasible to identify
research communities that work on common problems with similar approaches using network analysis tools
like those based in the Newman's modularity.[8-11, 20]
The distribution of citations and information among the papers and patents follows a power law function
(were a variable is the power of other).[24] In the case of citations, a power law distribution implies that a
very few number of papers (or patents) receive a huge quantity of citation and the most of manuscripts are
few or never cited. In the case of information, the power law distribution means that there are few ideas,
methodologies or scientific achievements that are constantly mentioned in the scientific literature and a huge
diversity of new ideas, methodologies or results that are poorly mentioned in the literature.[24] The power
law distribution of citations and information has important methodological implications to the analysis of the
KT as a communication process. The analysis of top cited (or with the highest degree) papers and their
citation network can provide the most relevant information about how a research area is organized and
evolves and how the research levels are inter-communicated.[8-11, 19 20, 23, 25-27] Some authors
arbitrarily choose the 45 or 100 most frequently cited papers.[25, 26] While others authors perform the main
path analysis to identify the putative path with the broadest flow of information.[27] In our previous research,
we have chosen the 20% most frequently cited papers. This quantity of top cited papers guarantees to get
the most of the communication process through the citation networks and the most of the communicated
information.
Moreover, the power law distribution of citations and information in the scientific literature (including patents)
are strongly related to the idea of paradigms. Generally, the most cited papers are related to 1)
methodologies and research tools that establish the standards of scientific practices of the research
areas[28] and 2) the scientific achievement that comprise the paradigmatic explanation of a problem.[19]
Therefore, the network of top cited papers in a particular research area is strongly related to its paradigmatic
research structure.
Modularity is another important property of complex networks that refers to the strength of the division of a
network in modules or clusters.[29] Clusters (modules) are groups of nodes highly connected each other but
poorly connected to those nodes that belong to other groups.[29] Interestingly, modularity and homophily are
related: the nodes in a cluster share some properties and information that are not common to the nodes
belonging to other clusters. That is, clusters are functional, meaningful and identifiable parts of the network.
For example, metabolic networks are divided in modules related to different pathways like carbohydrate
metabolism or amino-acid metabolism.[30] Moreover, modules of papers (research fronts) are related to
communities of researchers that share in some measure common research interests, objects of study, jargon
and standards of scientific practices.[31-32] That is, research fronts could be related to certain scientific
cultures or sub-cultures.
Importantly, a culture focused in a very specific object of study could be embedded in a particular paradigm
(a broader culture) and a paradigm in turn could be part of a research style (a very general way of practicing
science), forming a hierarchy. In this regard, a useful concept is the network hierarchy proposed by Albert,
Ravasz, and Barabási to explain the coexistence of modularity and the power law distribution of links in
complex networks.[33] This model consists of assembling of network modules in larger modules that are in
turn forming bigger modules and so on.[33] However, the way that modules are assembled is restricted
according a scaling law wherein the clustering coefficient of a node is inversely proportional to its degree
(number of links).[33] That is, modules are inter-communicated by nodes with a very high degree and a small
clustering coefficient.[33] These classes of nodes are named hubs. By combining hierarchy and homophily a
model of interdisciplinary communication can be glimpsed. In this model, the scientific cultures embodied in
research fronts or clusters of research fronts are connected by interdisciplinary hubs. We above mentioned
that homophily means that the knowledge that flows along the literature networks is located. Therefore, the
knowledge that pass through the hubs does not belonged to any of the cultures. Instead, a negotiation
process (trading zones) between the cultures would take pace in these hubs. This process is discussed in
the following section.
2.3 The KT inside and outside the biomedical field
Our approach considers three levels of KT. The first level communicates the biomedical knowledge with the
clinical knowledge. These are two completely distinct scientific cultures. The biomedical knowledge has a
strong focus on the diseases and its argumentation is accumulative (like building blocks) while clinical
knowledge is centered on the patient and its argumentation is competitive (For example, to establish which
would be the most suitable health intervention for a particular case).[34] The second level of KT
communicates the constituent disciplines of the biomedical knowledge. Five major disciplines have been
proposed to make up the biomedical field: Epidemiology, clinical trials, diagnosis (includes screening),
therapy development and pathogenesis.[34] This proposal has been partially supported by an analysis of the
co-citation network of the 100 top most cited papers on cancer. This analysis showed that the leading cancer
research is organized in six clusters: namely, epidemiology, clinical trials, diagnosis, molecular etiology,
microarrays and targeted therapies.[23] Our previous studies on the structure of cervical cancer and Ebola
research show a similar disciplinary division as we describe below.
A third level of KT occurs in the development of specific treatments. At this scale of observation the KT is the
connection among the stages of invention (wherein the scientific and technological basis of a product are
established), innovation (i.e., the development of a new treatment) and imitation (the development of
products strongly based in the original).
The KT in Drug Discovery (the transformation of chemical substances into drug therapies) particularly under
the paradigm of the rational design, is a process that fundamentally takes place inside the biomedical field.
That is, in order to get a newly approved drug in the market, the knowledge on the substances must go
through four of these major disciplines of the biomedical science, from basic knowledge of the causes and
mechanisms of diseases (etiology and pathogenesis), to the development of drug therapies or tools for
diagnosis or screening. Then, the Investigacional New Drug should be evaluated in the different phases of
clinical trials in order to get the approval. Finally, it is necessary to evaluate the impact of the new treatment
(also, diagnosis tools) in the population level (epidemiology).
3. A model of KT as a communication process among research fronts
Two are the central elements of the proposed model of KT: Research fronts and translational hubs.
Research fronts are identifiable by clustering the networks of scientific literature.[31, 32] They are related to
scientific cultures like biomedical disciplines ( epidemiology, therapy development, pathogenesis, etc.),
therapeutic approaches (gene therapy, induced hyperthermia, drug therapy) or communities working on the
development of a specific product.[8, 9, 11, 19, 23] Moreover, clustering can identify the stages of invention,
innovation and imitation.[10] Importantly, these research fronts are hierarchically organized similarly to the
Russian dolls (Figure 1). That is, at the highest level there are the clinical knowledge and the biomedical
knowledge. Inside of the biomedical knowledge there are located the fundamental biomedical disciplines like
molecular etiology, diagnosis, therapy development or diagnosis. In turn, the molecular etiology can be
organized in small communities aimed to the study of specific molecular mechanism. Also, inside of the drug
development discipline could be found different therapeutic approaches. Finally, within a specific therapeutic
approach or inside of the development of a product line it is possible to identify communities of inventors,
innovators and imitators.
Translational hubs are regions in the literature network that connect the research fronts at different scales
(Figure 1). These regions are highly hierarchical and because of the homophily they contain a sort of a mix of
the information contained by the communicated fronts. However, the dynamics inside the translational hub
are much more complex. Translational hubs are the topological location of the trading zones, which implies
the emergence of a transdisciplinary language and a negotiation process. When two or more research fronts
(scientific cultures) interact each other, they interchange terms, data, arguments, tools, etc. The
interchanged objects are frequently used and understood differently by the giver and the receiver research
fronts according to their respective discursive structures. This interchange of atomized elements -and
commonly alienated of their original meanings- is what define the multidisciplinary collaboration among
research fronts. On the other hand, the emergence of any language requires an hierarchical articulation of
the communicated elements. [35] That is, the interchanged elements are combined to form more
sophisticated concepts, and then arguments or conceptual relationships, and so on until a new
interdisciplinary narrative and language is built. Moreover, the construction of a new interdisciplinary
language implies a negotiation process among the scientific cultures to establish what elements are to be
shared and how the conceptual relationship, the argumentation and the methodologies should be articulated.
[17] The importance of the negotiation process for the KT is that the former partially deters what molecular
mechanism or pathological process will inform the development of therapies; what therapeutic approach is
going to be tested in the clinical trials, or what screening tools will be developed.
In the next sections the two key elements of the proposed model of KT (research fronts and translational
hubs) are illustrated through the revision of five studied cases.[8-11] This instances represent different levels
in the knowledge hierarchy: 1) cervical cancer research and Ebola research as examples at the biomedical
knowledge level); 2) liposomes and metal nanoparticles to treat cancer as examples of therapy
development), and 3) liposomal doxorubicin as an example of a sub-system of products.
There are some variations in the methodology used to study the previously mentioned instances, particularly
between the study on the KT process in cervical cancer research and the others. However, this approach is
consistent in the next four essential aspects: 1) A citation network model of the top cited papers is built, 2) in
order to map the distribution of basic, translational and clinical papers in the model the proportion of clinical
terms versus basic terms is calculated for every paper, 3) a clustering analysis is performed in order to
identify the research fronts, and 4) The content of each identified cluster is analyzed.
The methodology produces a map of the research on a specific health problem, discipline or the
development of a certain drug. This map identifies the main research fronts (scientific cultures or sub-
cultures) and the structural relationships among them. Importantly, this model identifies where and how the
KT process takes place.
4. Knowledge translation since the perspective of the biomedical knowledge of health problems
4.1 The context of Ebola and cervical cancer
Cervical cancer and Ebola represent two opposite classes of diseases: the chronic diseases (that persist
over time) and the acute diseases (rapid onset, a short course, or both) respectively. This is important for the
study of knowledge translation because the treatment of chronic disease over the time would require a
deeper and more complex knowledge on the patient in comparison to the acute diseases. However, cervical
cancer and Ebola share some features as health problems. First, both diseases mainly affect unprotected
population in developing countries.[35, 36] Secondly, the affected persons are racially stigmatized in the
case of Ebola fever[37, 38] and a there is a sexist stigma in the case of cervical cancer patients who
commonly are irrationally accused of sexual misconduct.[39] The stigmas and the unprotected condition of
the patients could be negatively impacting the development of a diversity of strategies to prevent or treat
these diseases.[8, 11]
4.2 The structure of KT in cervical cancer research and Ebola research
The structure of the knowledge on these two health problems is simpler than the general proposed model
depicted in the figure 1 (Compare fig. 1 with fig. 2). That is, not all the biomedical disciplines are enough
developed to be identified as research fronts.[8, 11] Probably, it is due to their context, which is similar to the
situation of the neglected diseases.
A clear division between the biomedical (disease centered) knowledge and the clinical (patient centered)
knowledge is observed in cervical cancer research.[8] Furthermore, there is a very poor communication
(inter-citation) between these two fundamental research styles.[8] Moreover, the biomedical knowledge on
cervical cancer comprises mainly three disciplines, namely, molecular etiology, epidemiology and screening.
[8]
The translational hub is fundamental for the structure of cervical cancer research. This hub communicates
the molecular ethology of the disease with the epidemiology and the development of screening tolls (Fig 2).
[8] But more importantly, this hub is intrinsically related to the research community that discovered that some
variants of the human papillomavirus (HPV) are the necessary cause of the cervical cancer.[8]
On the other hand, there is not an identifiable body of clinical knowledge on Ebola.[11] Probably, this is due
to the extreme acute and lethal nature of the disease not providing chance to produce knowledge on the ill
patient.[11] Interestingly, the structure of biomedical Ebola research is highly reductionist.[11] That is, the
molecular etilogy of the disease is represented by three research fronts specialized in three respective viral
proteins: VP35, VP40 and the glycoprotein.[11] As a matter of fact, the research on the viral glycoprotein is
the biggest front and it strongly influence the development of therapies.[11] The reductionism in Ebola
research could be partially explained by a combination of its social context with the fact that Ebola research
is strongly militarized and affected by a national security approach in the United States.[11] The general
structure of Ebola research is schematically represented in Figure 2. Besides the fronts focused in viral
proteins there are fronts related to the disciplines of pathogenesis, epidemiology and therapy development.
[11] The translational hub in Ebola research is located in the interaction among the glycoprotein research
front, pathogenesis and drug development.[11] This hub is fundamentally aimed to the development of
immunotherapies targeting the viral glycoprotein.[11]
5. Knowledge translation since the perspective of the therapy development
5.1 Liposomes and metal nanostructures to treat cancer
Liposomes and metal nanostructures are relevant examples of nanoscale technologies aimed to treat
cancer. Liposomes are nanoscopic bubbles of lipid bilayer.[40] While, metal nanostructures (MN) are a
plethora of different metal (mainly gold) nanoscale particles like nanorods, nanosell or nanocage.[41]
Liposomes are broadly versatile drug delivery systems that help to avoid the harmful side effects of drugs
and increase the accumulation in the target tissue.[40] They can be combined with small drugs, antibodies or
nucleic acids.[40] On the other hand, the extraordinary optical properties of MN in terms of light absorption,
light scattering and fluorescence allow their use in imaging and photothermal therapy (the destruction of
cancerous tissues by heating with light) to treat cancer.[41]
Importantly, these two types of cancer nanotechnologies are related to different explanatory models of
cancer. Liposomes are comparatively more akin to the dominant paradigm of cancer as a diseases caused
by an accumulative malfunctioning of the molecular machinery of the cells. That is, liposomes tend to be
integrated in therapeutic strategies intended to impact or take advantage of the biomolecular dynamic of the
cancerous cells. On the other hand, MN are relatively more independent of the biomolecular paradigm of
cancer and more close to an explanation of cancer as a disruption in the structure of the tissues. That is,
what is important in the use of MN is to reach the cancerous tissues and to physically destroy them. The
affinity to different explanatory models of cancer could affect the KT process in these two cancer
nanotechnologies being MN a much more radical technology than liposomes.
5.2 The structure of KT in these two types of cancer nanotechnologies
The research on liposomes and cancer is organized in six meaningful research fronts.[9] Two of the research
fronts are focused on the combination of liposomes with doxorubicin (a small molecule), one of these front is
aimed to the development of the drug while the other front consists of clinical trials testing the liposomal
doxorubicin.[9] The other research fronts are related to different therapeutic approaches: gene therapy,
induced hyperthemia, small interfering RNA, and drug therapy.[9] Moreover, the KT in liposomes and cancer
research only occurs for liposomal doxorubicin while the other therapeutic approaches are still basic
research.[9] This is strongly related to the development of Doxil (pegylated liposomal doxorubicin) which was
the first nanodrug approved by the Food and Drug Administration of the United States.[9]
On the other hand, MN and cancer research do not display a KT process, i.e., it is sill basic research.[9]
Also, the research on this cancer nanotechnology is not clustered, i.e., it consists of a single research front.
[9] The differences in terms of structure and knowledge translation between liposomes and MN applied to
cancer could be explained by two factors. First, MN represent a more radical invention in comparison with
liposomes with would be relatively a more incremental or conservative technology.[9] Second, liposomes are
a complementary technology that can be combined with different class of objects while MN are themselves
the therapeutic element.[40]
6 Knowledge translation at the scale of a sub-system of products: the liposomal doxorubicin
formulations
The liposomal doxorobucin formulations (LDF) represent an example of a sub-system of products. That is a
set of products that follow a dominant design, i.e., a set of core features that are established as de facto
standards.[42] A design becomes dominant when its features are so appealing that attract an important
segment of the market and force the competitors to imitate the design.[42] In this case Doxil (PEGylated
liposomal doxorubicin) is the dominant design for this type of formulations.[10] Importantly, LDF is also a
subset of liposomes and cancer research. Therefore, the map of LDF research is the zoom in view of the two
research fronts related to doxorubicin in the map of liposomes and cancer research above discussed.
The network model showed that LDF research is organized in fronts related to communities of inventors,
innovators and imitators.[10] There was identified a research front of basic research wherein the
technological and scientific basis of this type of formulations were established (the invention stage).[10] A
second front is related to the research community that developed Doxil (the innovation stage) and it is
connected to a third research front of clinical trials.[10] This clinical trials were aimed to firstly obtain the FDA
approval to treat the Kaposi sarcoma and secondly to extend the use of Doxil to treat other cancers.[10]
Following these fronts there are others that are related to 1) the combination of Doxil with others
therapies[10] and 2) the improvement of liposomal doxorubucin formulation by mean of the use of
thermosensitive liposomes and antibodies.[10] This last follower fronts constitute the imitation stage.
The front related to the development of Doxil represents the translational hub that connects the basic
research (invention stage) with the clinical trials.[10] Interestingly, the innovators constitute an international
community of collaborators aimed to integrate three different technological solutions: 1) nano-sized
liposomes, 2) Use of pH or ammonium ion gradients for loading of the drug in the nanoliposomes, ans 3) the
stealthness technology in order to avoid the reticuloendothelial system.[10, 15]
7. Conclusions
In this manuscript we propose an alternative to the linear model (the pipeline model, see [1]) of KT. Our
model considers that KT is a hierarchical multiscale phenomenon that can be traced through a combination
of network analysis and content analysis (text mining plus the study of the distribution of Medical Heading
Subjects and Gene Ontology terms). Clustering analysis can identify research front at different scales
ranging from research styles (biomedical knowledge and clinical knowledge) to molecular mechanism or a
systems of products like the liposomal doxorubicin formulations. Moreover, KT can be located at specific
region of the network model, namely translational hubs. We provided a few examples of KT at different
observation scales. However, further research is required. Particularly, we consider that analysis the
structure of KT in big health problems like cancers, obesity, or depression at different scales (health
problems, biomedical disciplines, therapeutic strategies and so on) can provide fundamental information to a
cleared understanding of KT as a complex communication process.
Conflict of interest
The authors confirm that this article content has no conflict of interest.
Acknowledgment
David Fajardo-Ortiz is partially supported by the CONACYT PhD scholarship.
Figure 1. Hierarchical model of the knowledge translation. Each rounded rectangle represent a research
front. They are hierarchically organized in four levels (L1 to L4). The Clinical knowledge and the biomedical
knowledge are at the highest level of the organization of knowledge (L1). Inside the biomedical knowledge
(L2) there are six of the main biomedical disciplines: Clinical trials, epidemiology, molecular etiology,
pathogenesis, screening-diagnosis and therapy development. At the level 3 there are research fronts that
could be specialized in certain molecular mechanisms or in specific therapeutic approaches. Inside a
therapeutic approach (L4) it is possible to identify communities of inventors, innovators and imitators. The
ovals with the TH acronym represent the translational hubs.
Figure 2. Structure of the KT in cervical cancer research and Ebola research.
References
1. Drolet BC, Lorenzi NM. Translational research: understanding the continuum from bench to bedside.
Transl Res. 2011 Jan;157(1):1-5. doi: 10.1016/j.trsl.2010.10.002. Epub 2010 Nov 13.
2. Kon AA. The Clinical and Translational Science Award (CTSA) Consortium and the translational
research model. Am J Bioeth. 2008 Mar;8(3):58-60; discussion W1-3. Doi:
10.1080/15265160802109389.
3. Nijhara R, Balakrishnan K. Bringing nanomedicines to market: Regulatory challenges, opportunities,
and uncertainties. Nanomedicine 2006; 2(2): 127-36.
4. Pammolli F, Magazzini L, Riccaboni M. The productivity crisis in pharmaceutical R&D. Nat Rev Drug
Discov 2011; 10(6): 428-38.
5. Venditto VJ, Szoka FC Jr. Cancer nanomedicines: so many papers and so few drugs! Adv Drug
Deliv Rev. 2013 Jan;65(1):80-8. doi: 10.1016/j.addr.2012.09.038. Epub 2012 Oct 1.
6. Chute CG, Ullman-Cullere M, Wood GM, Lin SM, He M, Pathak J. Some experiences and
opportunities for big data in translational research. Genet Med. 2013 Oct;15(10):802-9. doi:
10.1038/gim.2013.121. Epub 2013 Sep 5.
7. Holzinger A, Dehmer M, Jurisica I. Knowledge Discovery and interactive Data Mining in
Bioinformatics--State-of-the-Art, future challenges and research directions. BMC Bioinformatics.
2014;15 Suppl 6:I1. doi: 10.1186/1471-2105-15-S6-I1. Epub 2014 May 16.
8. Fajardo-Ortiz D, Ochoa H, García L, Castaño V. [Translation of knowledge on cervical cancer: is
there a gap between research on causes and research on patient care?]. Cad Saude Publica. 2014
Feb;30(2):415-26. doi: 10.1590/0102-311X00168512. Spanish.
9. Fajardo-Ortiz D, Duran L, Moreno L, Ochoa H, Castaño VM. Liposomes versus metallic
nanostructures: differences in the process of knowledge translation in cancer. Int J Nanomedicine.
2014 May 26;9:2627-34. doi: 10.2147/IJN.S62315. ECollection 2014.
10. Fajardo-Ortiz D, Duran L, Moreno L, Ochoa H, Castaño VM. Mapping knowledge translation and
innovation processes in Cancer Drug Development: the case of liposomal doxorubicin. J Transl Med.
2014 Sep 3;12:227. doi: 10.1186/s12967-014-0227-9.
11. Fajardo-Ortiz D, Ortega-Sánchez-de-Tagle J, Castaño VM. Hegemonic structure of basic, clinical
and patented knowledge on Ebola research: a US army reductionist initiative. J Transl Med. 2015
Apr 19;13:124. doi: 10.1186/s12967-015-0496-y.
12. Merelli I, Pérez-Sánchez H, Gesing S, D'Agostino D. Managing, analysing, and integrating big data
in medical bioinformatics: open problems and future perspectives. Biomed Res Int.
2014;2014:134023. doi: 10.1155/2014/134023. Epub 2014 Sep 1.
13. Leydesdorff L. The challenge of scientometrics: The development, measurement, and self-
organization of scientific communications. Universal-Publishers, 2001.
14. Stevenson DK, Shaw GM, Wise PH, Norton ME, Druzin ML, Valantine HA, McFarland DA; March of
Dimes Prematurity Research Center at Stanford University School of Medicine. Transdisciplinary
translational science and the case of preterm birth. J Perinatol. 2013 Apr;33(4):251-8. doi:
10.1038/jp.2012.133. Epub 2012 Oct 18.
15. Barenholz Y. Doxil® — The first FDA-approved nano-drug: Lessons learned. J Control Release.
2012 Jun 10;160(2):117-34. doi: 10.1016/j.jconrel.2012.03.020. Epub 2012 Mar 29.
16. Kuhn T. The Structure of Scientific Revolutions. University of Chicago Press. 1962.
17. Winther R. Evo-Devo as a trading zone. In Conceptual Change in Biology; Love A Ed., Springer
Netherlands, 2015; pp. 459-482.
18. Kagan J. The three cultures: Natural sciences, social sciences, and the humanities in the 21st
century. Cambridge University Press, 2009.
19. Chaomei C, Cribbin T, Macredie R, Morar S. Visualizing and tracking the growth of competing
paradigms: Two case studies. Journal of the American Society for Information Science and
Technology. 2002; 53(8): 678-689.
20. Fajardo-Ortiz, David, and Víctor M Castano. Patenting Networking and Knowledge Translation in
Liposomes for Cancer Therapy. Recent Patents on Nanomedicine 2014;4(2): 121-128.
21. McPherson M, Smith-Lovin L, Cook J. Birds of a feather: Homophily in social networks. Annual
review of sociology. 2001; 415-444.
22. Ding Y. Scientific collaboration and endorsement: Network analysis of coauthorship and citation
networks.J Informetr. 2011 Jan 1;5(1):187-203
23. Jones DS, Cambrosio A, Mogoutov A. Detection and characterization of translational research in
cancer and cardiovascular medicine. J Transl Med. 2011 May 11;9:57. doi: 10.1186/1479-5876-9-57.
24. Clauset, Aaron, Cosma Rohilla Shalizi, and Mark EJ Newman. Power-law distributions in empirical
data. SIAM review. 2009; 51(4): 661-703.
25. Bhavnani SK, Wilson C.S Information scattering. Encyclopedia of Library and Information Sciences.
2010; 2564-2569. DOI: 10.1081/E-ELIS3-120043255.
26. Baltussen A, Kindler CH. Citation classics in critical care medicine. Intensive Care Med. 2004
May;30(5):902-10. Epub 2004 Feb 24.
27. Hennessey K, Afshar K, Macneily AE. The top 100 cited articles in urology.Can Urol Assoc J. 2009
Aug;3(4):293-302.
28. Van Noorden R, Maher B, Nuzzo R. The top 100 papers. Nature. 2014 Oct 30;514(7524):550-3. doi:
10.1038/514550a.
29. Newman ME. Fast algorithm for detecting community structure in networks. Phys Rev E Stat Nonlin
Soft Matter Phys. 2004 Jun;69(6 Pt 2):066133. Epub 2004 Jun 18.
30. Guimerà R, Nunes Amaral LA. Functional cartography of complex metabolic networks. Nature. 2005
Feb 24;433(7028):895-900.
31. Anegón F, Contreras E, Corrochano M. Research fronts in library and information science in Spain
(1985–1994). Scientometrics. 1998; 42(2):229-246.
32. Shibata N, Kajikawa Y, Takeda Y, Matsushima K. Detecting emerging research fronts based on
topological measures in citation networks of scientific publications. Technovation. 2008;28(11):758-
775.
33. Ravasz E, Barabási AL. Hierarchical organization in complex networks. Phys Rev E Stat Nonlin Soft
Matter Phys. 2003 Feb;67(2 Pt 2):026112. Epub 2003 Feb 14.
34. Nederbragt H. The biomedical disciplines and the structure of biomedical and clinical knowledge.
Theor Med Bioeth. 2000 Nov;21(6):553-66.
35. Gakidou E, Nordhagen S, Obermeyer Z. Coverage of cervical cancer screening in 57 countries: low
average levels and large inequalities. PLoS Med. 2008 Jun 17;5(6):e132. doi:
10.1371/journal.pmed.0050132.
36. MacNeil A, Rollin PE. Ebola and Marburg hemorrhagic fevers: neglected tropical diseases? PLoS
Negl Trop Dis. 2012;6(6), e1546. Doi:10.1371/ journal.pntd.0001546. Epub 2012 Jun 26.
37. Colhoun D. How xenophobia is driving the Ebola narrative. Columbia J Rev. 2015. Available at
http://www.cjr.org/behind_the_news/racialized_ebola_narrative.php?page=all.
38. Murdocca C. When Ebola came to Canada: Race and the making of the respectable body. Atlantis.
2003;27(2):24–31.
39. Braun V, Gavey N. “Bad girls” And “Good girls”? sexuality and cervical cancer. In Women's studies
international forum. 1999; 22(2):203-213.
40. Samad A, Sultana Y, Aqil M. Liposomal drug delivery systems: an update review. Curr Drug Deliv.
2007 Oct;4(4):297-305.
41. Huang X, Jain PK, El-Sayed IH, El-Sayed MA. Gold nanoparticles: interesting optical properties and
recent applications in cancer diagnostics and therapy. Nanomedicine (Lond). 2007 Oct;2(5):681-93.
42. Murmann J. Frenken K. Toward a systematic framework for research on dominant designs,
technological innovations, and industrial change. Research Policy. 2006;35(7):925-952.
|
1912.07403 | 1 | 1912 | 2019-12-16T14:31:54 | REM beyond dyads: relational hyperevent models for multi-actor interaction networks | [
"cs.SI",
"stat.AP"
] | We introduce relational hyperevent models (RHEM) as a generalization of relational event models to events occurring on hyperedges involving any number of actors. RHEM can specify time-varying event rates for the full space of directed or undirected hyperedges and can be applied to model, among others, meetings, team assembly, team performance, or multi-actor communication. We illustrate the newly proposed model on two empirical hyperevent networks about meetings of government ministers and co-authoring of scientific papers. | cs.SI | cs |
REM beyond dyads: relational hyperevent models for multi-actor
interaction networks∗
Jurgen Lerner
University of Konstanz
Mark Tranmer
University of Glasgow
[email protected]
[email protected]
John Mowbray
University of Glasgow
Marian-Gabriel Hancean
University of Bucharest
[email protected]
[email protected]
Abstract
We introduce relational hyperevent models (RHEM) as a generalization of relational event models
to events occurring on hyperedges involving any number of actors. RHEM can specify time-varying
event rates for the full space of directed or undirected hyperedges and can be applied to model, among
others, meetings, team assembly, team performance, or multi-actor communication. We illustrate the
newly proposed model on two empirical hyperevent networks about meetings of government ministers
and co-authoring of scientific papers.
Keywords: social network analysis, statistical network models, dynamic networks, hypergraphs, rela-
tional hyperevent models, team assembly, team performance
1 Introduction
Relational event models (REM) (Butts 2008; Brandes et al. 2009; Lerner et al. 2013a; Stadtfeld and Block
2017) are a general framework for modeling networks of time stamped interaction events. REM specify time-
varying event rates associated with dyads comprising a source (the sender of the event) and a target (the
receiver of the event). The source and target nodes are often "elementary" units representing, for instance,
individuals or objects but can also represent predefined subsets of elementary nodes (Butts 2008), such as
a whole school class which may receive broadcast messages from the teacher (DuBois et al. 2013). Yet, in
many situations interaction events can occur on arbitrary subsets of nodes, that is, on hyperedges rather
than on edges with exactly two endpoints (Kim et al. 2018). For instance, meetings may involve any number
of persons, scientific papers may be written by any number of authors, emails may be sent to any number
of recipients. Treating such hyperedges as collections of independent (dyadic) edges is invalid in general
(Chodrow 2019).
The predominant approach to model the rate (or probability) of directed or undirected hyperevents seems
to be to specify dyadic event rates and let hyperedges assemble as a function of these dyadic event rates
(Guimera et al. 2005; Kim et al. 2018). This approach could overestimate or underestimate the true event
rates associated with hyperedges involving more than two nodes. For instance, Alice may frequently send
emails to her friend Bob and may also send many emails to her boss Charlie; yet the probability that Alice
sends the same email to both, Bob and Charlie, may be close to zero. Such higher-order dependencies cannot
be expressed by models restricted to specifying dyadic event rates.
∗We thank participants of the EUSN Satellite Meeting on Relational Event Models, 6 -- 7 September 2019, ETH Zurich for
helpful comments on a preliminary version of RHEM. We acknowledge financial support from Deutsche Forschungsgemeinschaft
(DFG Grant Nr. LE 2237/2-1), Economic and Social Research Council (grant number ES/R009236/1), and Executive Agency
for Higher Education, Research, Development and Innovation Funding (UEFISCDI grant, code PN-III-1.1-TE-2016-0362).
1
To overcome limitations of previous models, this paper makes the following methodological contributions:
1. We propose relational hyperevent models (RHEM) as a general framework for networks of undirected
and directed relational hyperevents. RHEM, which are defined as a straightforward generalization of
REM, can specify event rates on the full space of all possible hyperedges.
2. We apply well-established approximation methods to overcome the prohibitive runtime for evaluating
the full likelihood function, which grows exponentially in the number of nodes. By doing so we
succeed in reliably estimating RHEM parameters from a co-authoring network comprising hundreds of
thousands of nodes and hyperevents.
3. We propose and discuss a range of hyperedge statistics that characterize how arbitrary subsets of
nodes are embedded into the network of past events and that shape the rate of future hyperevents.
These hyperedge statistics express hypothetical effects in hyperevent networks which can be tested
with empirical data.
4. We discuss differences between models that condition on the observed size of hyperevents and models
that control for the size of hyperevents. Moreover, we propose a restriction of RHEM to repeated
events and discuss why this restriction seems necessary and appropriate when modeling extremely
sparse hyperevent networks.
5. We illustratively apply RHEM to two empirical hyperevent networks -- where events represent meetings
and co-authored papers, respectively -- and make suggestions for best practices in modeling relational
hyperevent networks of varying size.
6. We propose relational outcome models (ROM) which explain outcome of relational hyperevents (rather
than the occurrence of events) and apply them to model team performance in a co-authoring network.
RHEM are introduced in Sect. 2, applied to empirical data on meetings in Sect. 3 and to co-author
networks in Sect. 4. We discuss methodological insights in Sect. 5 and further related work in Sect. 5.1. We
end with concluding remarks and an outline of future work.
2 Relational hyperevent models (RHEM)
2.1 Background and notation: hypergraphs and relational hyperevents
As a generalization of graphs, hypergraphs contain hyperedges which can connect any number of nodes; see,
e. g., Bretto (2013) for a general treatment of hypergraphs. We recall that an undirected hypergraph is a
pair G = (V, H), where V is a finite set of nodes and H ⊆ 2V = P(V ) = {V (cid:48) ⊆ V } is a set of undirected
hyperedges. An undirected hyperedge h ⊆ V is a set of any number of nodes from V and the size or cardinality
of an undirected hyperedge h ∈ H, denoted by h, is its number of elements. An undirected, loopless graph
can be seen as an undirected hypergraph in which every hyperedge has size two.
A directed hypergraph is a triple G = (U, V, H), where U and V are finite sets of nodes (which may be
identical) and H ⊆ 2U × 2V is a set of directed hyperedges. Each directed hyperedge is a pair h = (a, b) ∈ H
where a ⊆ U is a set of any number of source nodes and b ⊆ V is a set of any number of target nodes. A
directed hyperedge is a loop if its set of sources has a non-empty intersection with its set of targets. The
size or cardinality of a directed hyperedge h = (a, b) is the pair of integers h = (a,b) giving the number
of sources and the number of targets, respectively. A directed graph can be seen as a directed hypergraph
in which every hyperedge has size (1, 1).
Given a set of nodes V , an undirected hyperevent is a tuple
where he ⊆ V is an undirected hyperedge giving the participants of the event, te is the time of the event, xe
is the type and/or weight of the event, and ye is a relational outcome of the event. Types, weights, and/or
e = (he, te, xe, ye) ,
2
relational outcome may be absent in some settings. The difference between xe and ye lies purely in the time
order: the type xe may have an influence on the occurrence of the event, whereas the relational outcome ye
is a result of the event. To illustrate this, assume that we are given hyperevents representing teams of actors
jointly performing a given task. In this setting, the type of an event could be the type of the task which
can determine that the event is more likely to occur on one set of participants than on another (actors may
have a preference to perform certain types of tasks). In the same setting, an example of a relational outcome
would be given by the success or performance of the team work. The success cannot have an influence on
team assembly (that is, on the hyperedge of the event) since the success is unknown at the time when team
members are selected. Conversely, the team selection (that is, the hyperedge of the event) can have an
influence on the success as some teams may have a higher performance than others. We further note that
the relational outcome of an event at time t may have an influence on the selection of the hyperedge of a
future event occurring at time t(cid:48) > t since, for instance, actors may be inclined to collaborate with others
that have a history of prior success.
The definition of directed hyperevents is very similar: given two sets of nodes U and V (which may be
identical), a directed hyperevent is a tuple
e = (he, te, xe, ye) ,
where he = (ae, be) is a directed hyperedge with ae ⊆ U and be ⊆ V giving the sources and targets of the
event, te is the time of the event, xe is the type and/or weight of the event, and ye is a relational outcome
of the event.
The size or cardinality of a hyperevent is the size of the underlying hyperedge. The size of hyperevents
may be constrained in some application settings. For instance, email communication events typically have
exactly one sender and an unconstrained number of receivers.
A set of nodes h(cid:48) is called a sub-hyperedge of an undirected hyperedge h if h(cid:48) is a subset of h, that is,
if h(cid:48) ⊆ h. A pair of sets of nodes h(cid:48) = (a(cid:48), b(cid:48)) is called a sub-hyperedge of a directed hyperedge h = (a, b)
if a(cid:48) ⊆ a and b(cid:48) ⊆ b. We denote the set of all sub-hyperedges of a (directed or undirected) hyperedge h
by Sub(h),1 the set of all sub-hyperedges of size k of an undirected hyperedge h by Sub(k)(h), and the set
of all sub-hyperedges of size (k, l) of a directed hyperedge h by Sub(k,l)(h). Sub-hyperedges are important
for specifying RHEM because if a hyperevent occurs on some hyperedge h, then the actors in every sub-
hyperedge h(cid:48) ⊂ h experience a common event (although not exclusively), which in turn may influence the
probability that h(cid:48) is included in the hyperedge of a future event -- potentially with other co-participants.
2.2 General model specification
Let E = (e1, . . . , eN ) be a sequence of (undirected or directed) hyperevents, given in non-decreasing order
in time. We propose two types of model frameworks for specifying the probability (density) of E: the first
framework, which is a straightforward generalization of REM (Butts 2008), explains the occurrence of events
and the second explains the relational outcome. We defer the description of relational outcome models to
Sect. 2.8 and introduce in this section models explaining the occurrence of hyperevents. The definition of the
model framework is almost identical for directed and undirected hyperevents; however, differences become
more pronounced when we define concrete statistics for hyperevents.
For a time point t let Rt denote the risk set that is the set of hyperedges on which a hyperevent could
happen at time t. For instance, the risk set may contain all subsets of a given set of nodes. Let G[E; t] denote
the network of past events (Brandes et al. 2009) at time t which is a function of E<t = {e ∈ E ; te < t} that
is of all events that happen strictly before t (and potentially exogenously given covariates).
For a hyperedge h ∈ Rt and a point in time t, let T be the random variable for the time of the next event
on h. The event rate (also denoted as hazard rate or intensity) on h at time t, given the network of past
1For an undirected hyperedge h, we might also use the established notation for the power set P(h) or 2h, i. e., the set of
all subsets of h. We prefer to denote sub-hyperedges by Sub(h) since it provides a unified notation for undirected and directed
hyperedges.
3
events is defined by
λ(h; t; G[E; t]) = lim
∆t→0
P rob(t ≤ T ≤ t + ∆t t ≤ T ; G[E; t])
∆t
.
(1)
The probability (density) of the sequence of hyperevents E can be speficied in various ways. In this paper
we specify the likelihood function based on the Cox proportional hazard model (Cox 1972) -- corresponding to
the "ordinal" model of Butts (2008) -- which explains relative event rates. Several alternatives for modeling
time-to-event data exist (Lawless 2003).
Following the Cox proportional hazard model, we decompose the event rate λ into a time-varying base-
line rate λ0(t), which is the same for all hyperedges, and a relative event rate λ1(h; t; θ; G[E; t]) which is
proportional to the probability that the event at time t occurs on the hyperedge h, rather than on any other
hyperedge in the risk set:
λ(h; t; θ; G[E; t]) = λ0(t) · λ1(h; t; θ; G[E; t]) ,
λ1(h; t; θ; G[E; t]) = exp (θ · s(h; t; G[E; t])) .
(2)
(3)
In the equations above, s(h; t; G[E; t]) is a vector of statistics characterizing how the hyperedge h is embedded
into the network of past events and θ is a vector of parameters. The baseline rate λ0 is typically left
unspecified, or estimated by non-parametric methods, and the partial likelihood based on the observed event
sequence E is
(cid:89)
e∈E
(cid:80)
L(θ) =
λ1(he; te; θ; G[E; te])
h∈Rte
λ1(h; te; θ; G[E; te])
.
(4)
We emphasize how close this framework for relational hyperevents is to REM (Butts 2008; Perry and
Wolfe 2013; Vu et al. 2015). Virtually the only difference is that separate event rates are specified for all
hyperedges in the risk set, that is, potentially for all subsets of a given set of nodes. This difference, however,
has strong implications for the computational complexity to evaluate the likelihood function and for the
range of possibilities to define statistics for hyperedges.
2.3 Model estimation and case-control sampling
Given the values of the statistics s(h; te; G[E; te]) for all elements of the risk sets Rte at the event times te,
maximum likelihood estimates for Eq. (4) can be computed with standard statistical software, such as the
R survival package2 (Therneau and Grambsch 2013). The problem in doing so is the prohibitive size of
the risk set which scales exponentially with the number of nodes. In our first empirical case study presented
in Sect. 3 we analyze data on some 800 meeting events potentially involving any subset of a fixed set of 23
persons. The risk set size is 223 ≈ 8 million which might still be manageable -- although the computational
effort seems excessive for such a small network. In the second case study presented in Sect. 4, we analyze
data on more than 300 000 papers (corresponding to hyperevents) written by authors from a pool of more
than 500 000 researchers. The maximum number of authors per paper is 100, which was chosen as a limit.
Even with the limit on the size of hyperedges, we get a prohibitive risk set size of more than(cid:0)500 000
(cid:1) subsets.
The problem arising from the size of the risk set is much more severe for relational hyperevent models
than for REM. In the latter, the risk set grows quadratically in the number of nodes which might already
result in an infeasible runtime for larger networks. Butts (2008) proposed to mitigate such problems by
sampling from the risk set, Vu et al. (2015) applied case-control sampling (Borgan et al. 1995) in which for
each event ("case") a fixed number of "controls" (non-events from the risk set) are sampled, Lerner and
Lomi (2019) performed an experimental reliability study of case-control sampling in the estimation of dyadic
REM, found that models can be fitted to data with a risk set size of more than 30 trillion, and proposed to
experimentally assess the parameter variability by repeated sampling.
100
2https://CRAN.R-project.org/package=survival
4
Encouraged by these results, we propose to also apply case-control sampling when estimating relational
hyperevent models. Note that the risk set size of our first empirical study is much smaller than the one
considered in Lerner and Lomi (2019) but the size in the second study is larger by a huge factor.
For a fixed number m of controls per event, we consider for each event e ∈ E a sampled risk set Rte which
contains the hyperedge he plus m additional hyperedges uniformly and independently drawn at random from
Rte without replacement. The sampled likelihood L is obtained by replacing the full risk sets in Eq. (4) by
the sampled risk sets:
L(θ) =
λ1(he; te; θ; G[E; te])
h∈ Rte
λ1(h; te; θ; G[E; te])
.
(5)
(cid:89)
e∈E
(cid:80)
Lerner and Lomi (2019) propose to additionally sample from the observed events, which can be a strategy
to scale models to even more events.
2.4 Network effects
Network effects are specified via hyperedge statistics which are real-valued functions characterizing how
hyperedges at a given time t are embedded into the network of past events G[E; t]. These statistics are used
in the specification of the relative event rate in Eq. (3) and therefore determine the distribution of future
events. Possibilities to define hyperedge statistics are abundant. In the following we describe in a modular
way (1) how past events and/or exogenous covariates are aggregated into hyperedge attributes and (2) how
hyperevent statistics are defined as a function of hyperedge attributes. Many variants exist for each step
which often can be freely combined.
2.4.1 Hyperedge attributes
For an undirected hypergraph with an underlying node set V , a hyperedge attribute is a partial function
att: Sub(V ) → R defined on hyperedges among the nodes from V . For a directed hypergraph with an
underlying set U of possible senders and a set V of possible receivers, a hyperedge attribute is a partial
function att: Sub((U, V )) → R defined on hyperedges connecting some or all senders from U to some or all
receivers from V . Hyperedge attributes are partial functions since they may be defined only on a subset of
these hyperedges, for instance, only on hyperedges of a given size.
Hyperedge attributes encode the state of the network of past events G[E; t] at a given time t. They
can be functions of exogenously given covariates or can be functions of past events. For the latter kind we
mention two types of hyperedge attributes that are particularly important and whose definition is identical
for undirected and directed hyperevents.
Hyperedge activity gives for a hyperedge h and a point in time t the number of hyperevents on h that
happen strictly before t.
hyperedge.activity(h; t; E) =
χ(h = he) .
(The function χ(·) is the indicator function that is one if the argument is true and zero else.)
(cid:88)
e∈E<t
(cid:88)
e∈E<t
Hyperedge degree gives for a hyperedge h and a point in time t the number of hyperevents on any
superset of h that happen strictly before t.
hyperedge.degree(h; t; E) =
χ(h ⊆ he) .
(6)
For instance, for a one-element hyperedge h = {v}, with v ∈ V , the hyperedge degree at time t is the number
of past hyperevents in which v participated. For a two-element hyperedge h = {u, v}, with u, v ∈ V , the
hyperedge degree at time t is the number of past hyperevents in which u and v co-participated. In general,
for a set of nodes h ⊆ V , the hyperedge degree at time t is the number of past hyperevents in which all
5
nodes from h co-participated. Statistics based on the hyperedge degree operationalize effects in which events
are partially repeated in the sense that some, but not necessarily all, co-participants of past events jointly
experience future events, potentially with other co-participants.
The difference between hyperedge activity and hyperedge degree is that hyperedge activity requires past
hyperevents to happen exactly on the focal hyperedge h, without any further participants outside of h. In
contrast, the definition of hyperedge degree counts past hyperevents in which all participants of the focal
hyperedge h co-participated, but allows that these hyperevents involved further participants outside h.
Variations. Rather than summing up the number of past hyperevents, hyperedge attributes may also take
into account (functions of) the type, weight, or relational outcome of past events, may be dichotomized, or
may decay the contribution of past events over time, similar as this has been suggested for dyadic events
(Lerner et al. 2013a). A further variant for the hyperedge degree involves down-weighting co-participation
in large events. For example, for two actors u and v, the experience to co-participate in an event h might
be stronger if h is small (since then it is a rather "exclusive" event) than if h is large (in which case u and
v might not even be aware that they co-participate in the same event). Down-weighting the impact of large
events on the hyperedge degree can, for instance, be done by dividing the terms in Eq. (6) by the size of the
hyperedge he.
2.4.2 Hyperedge statistics
The relative event rate in Eq. (3) has been specified as a parametric function of hyperedge statistics
s(h; t; G[E; t]), characterizing how the hyperedge h is embedded into the network of past events G[E; t].
In the following, we define a list of hyperedge statistics, most of which are inspired by related statistics
which are typically used in REM (Butts 2008; Brandes et al. 2009; Lerner et al. 2013a; Stadtfeld and Block
2017).
Hyperedge size. For undirected hyperedges, the statistic size gives the number of participants.
size(h; t; G[E; t]) = h .
For a directed hyperedge h = (a, b), the size is characterized by two values, the number of sources and the
number of targets.
num.sources(h; t; G[E; t]) = a
num.targets(h; t; G[E; t]) = b .
If the risk sets Rt contain hyperedges of varying size (for instance, all hyperedges among a given set of
nodes), the size of hyperedges often has a very strong impact on the event rate and therefore it is important
to control for the effect of size. In our first empirical application, presented in Sect. 3, we find a curvilinear,
U-shaped effect of size on the event rate: small hyperevents but also large hyperevents are over-represented
while events occuring on hyperedges of intermediate size are relatively rare. Such a U-shaped effect can be
specified by including the size and the squared size in the model statistics. Hyperedge size is one of the few
hyperedge statistics that have no related statistic in dyadic REM.
Repetition models the tendency to repeat hyperevents involving the identical set of participants (or
identical sets of sources and targets, respectively) and is formally defined by
repetition(h; t; G[E; t]) = hyperedge.activity(h; t; E) .
The definition is identical for undirected and directed hyperevents.
6
In the case of undirected hyperevents, sub-repetition of order p models the
Sub-repetition (undirected).
tendency of sets of p nodes to repeatedly experience joint events, potentially within larger sets of participants.
It is formally defined by
sub-repetition(p)(h; t; G[E; t]) =
(cid:1) (cid:88)
h(cid:48)∈Sub(p)
1(cid:0)h
p
hyperedge.degree(h(cid:48); t; E) .
(h)
The statistic as defined above takes the average hyperedge degree over all sub-hyperedges h(cid:48) ⊆ h of size p.
For p = 1 it gives the average number of previous hyperevents involving the individual participants of h, for
p = 2 it gives the average number of previous joint events of all dyads among the participants of h, for p = 3
it considers previous joint events of all triads contained in h, and so on.
The definition above counts a past hyperevent e occurring on a hyperedge he as often as there are p-
Rather than the average we might also use other functions to aggregate values on all sub-hyperedges,
such as the minimum, maximum, sum, or standard deviation. For instance, taking the standard deviation
would give the dispersion of the hyperedge degree over the sub-hyperedges of h.
(cid:1) times. This may put too much weight on
element subsets of the intersection he ∩ h, that is, precisely(cid:0)he∩h
(cid:88)
hyperevents having large intersections with the focal hyperedge h. An alternative definition of sub-repetition
-- denoted by shared prior events of order p -- is to count past hyperevents only once if their intersection with
h has at least p elements; in formulas:
p
shared.prior.events(p)(h; t; G[E; t]) =
χ(he ∩ h ≥ p) .
e∈E<t
Variations of this alternative definition can take type, weight, or relational outcome of past events into
account, may decay the impact of past events over time, or may normalize the statistic by the size of the
hyperedge h.
Sub-repetition (directed).
In the case of directed hyperevents, sub-repetition of order (p, q) models the
tendency of a set of p sources (potentially together with other source nodes) to repeatedly send events to a
set of q targets (and potentially other target nodes). For a hyperedge h = (a, b), it is formally defined by
(cid:0)a
(cid:1) ·(cid:0)b
1
p
q
(cid:1) (cid:88)
h(cid:48)∈Sub(p,q)
hyperedge.degree(h(cid:48); t; E) .
(h)
sub-repetition(p,q)(h; t; G[E; t]) =
This statistic takes the average hyperedge degree over all sub-hyperedges h(cid:48) ⊆ h of size (p, q). That is, it
takes the average over the combinations of all subsets a(cid:48) ⊆ a of p sources with all subsets b(cid:48) ⊆ b of q targets.
As in the undirected case, we might also use other functions to aggregate values on all sub-hyperedges, such
as the minimum, maximum, sum, or standard deviation, or we might count shared prior events of order
(p, q) only once.
General sub-hyperedge characteristics. We note that the approach to aggregate values over all sub-
hyperedges (or all sub-hyperedges of a given size) is not restricted to hyperedge degrees but can be applied
to any hyperedge attribute, irrespective of whether this attribute represents exogenous covariates or is a
function of past events. For instance, assuming that we are given node-level attributes -- that is, attributes
defined on hyperedges of size one -- representing, for instance, age or past performance of actors, we can
characterize a hyperedge by the average (or any other function of) attribute values of its participants.
Reciprocation models, in the case of directed hyperevents, the tendency to reciprocate events, that is,
the tendency that the former set of targets becomes the set of sources, sending events directed to the former
set of sources. For a directed hyperedge h = (a, b) reciprocation is formally defined by
reciprocation(h; t; G[E; t]) = hyperedge.activity((b, a); t; E) .
7
Reciprocation is only defined in one-mode hyperevent networks, where the set of potential sources is identical
with the set of potential targets. The same comment applies also to the other variants of reciprocation defined
below.
Sub-reciprocation.
In the case of directed hyperevents, sub-reciprocation of order (p, q) models the ten-
dency of sets a(cid:48) of p former sources to receive events from sets b(cid:48) of q former targets to which the nodes
from a(cid:48) (potentially together with other sources) have previously sent events (potentially within larger sets
of targets). For a directed hyperedge h = (a, b), it is formally defined by
(cid:0)b
(cid:1) ·(cid:0)a
1
p
q
(cid:1) (cid:88)
h(cid:48)∈Sub(p,q)
hyperedge.degree(h(cid:48); t; E) .
((b,a))
sub-reciprocation(p,q)(h; t; G[E; t]) =
This statistic takes the average hyperedge degree over all sub-hyperedges h(cid:48) ⊆ (b, a) of size (p, q) of the
reverse hyperedge (b, a).
We note that the parameters p or q in directed sub-repetition or sub-reciprocation can also be zero.
Concretely, sub-repetition(p,0) models a generalized repetition effect in which the same set of p nodes re-
peatedly initiates events towards any set of targets and sub-repetition(0,q) models a generalized repetition
effect in which the same set of q nodes repeatedly receives events from any set of sources. Similarly,
sub-reciprocation(p,0) models a generalized reciprocation effect in which a set of p nodes that have jointly
sent events to any set of targets receives common events from any set of sources and sub-reciprocation(0,q)
models a generalized reciprocation effect in which a set of q nodes that have received common events from
any set of sources jointly sends events to any set of targets.
Switch reciprocation.
In the case of directed hyperevents, switch reciprocation is related to -- but more
permitting than -- reciprocation. Switch reciprocation models patterns in which a part of former targets
become sources and send events to former sources and former targets. Switch reciprocation is characterized
by a number l giving the number of nodes switching the role of source and target. Switch reciprocation is
typical, for instance, in email communication where the "reply-to-all" functionality enables one former target
(i. e., an actor among the receivers of a past email) to send an email to the former source (sender of that past
email) and to all the other targets. This reply-to-all pattern is captured by switch reciprocation of order 1.
For a positive integer l, we first define the operator switch(l) mapping a directed hyperedge h = (a, b) to
the set of all hyperedges obtained from h by interchanging l elements from a with l elements from b. For
simplicity we define switch reciprocation only for loopless hypergraphs. Formally the operator switch(l) is
defined by
(cid:26)
switch(l)(h) =
h(cid:48) = (a(cid:48), b(cid:48)) ; ∃a(cid:48)(cid:48) ∈
, b(cid:48)(cid:48) ∈
(cid:18)a
(cid:19)
(cid:0)a
(cid:1) ·(cid:0)b
1
l
l
l
: a(cid:48) = a ∪ b(cid:48)(cid:48) \ a(cid:48)(cid:48) ∧ b(cid:48) = b ∪ a(cid:48)(cid:48) \ b(cid:48)(cid:48)(cid:27)
(cid:18)b
(cid:19)
(cid:1) · (cid:88)
hyperedge.degree(h(cid:48); t; E) .
l
h(cid:48)∈switch(l)
(h)
Switch reciprocation of order l is formally defined by
switch-reciprocation(l)(h; t; G[E; t]) =
Closure (undirected). Triadic closure refers to patterns in which events on a hyperedge h depend on
previous events in which subsets of the nodes in h have co-participated with common third actors. Triadic
closure in hyperevent networks is characterized by a triple of positive integers (p, q, l) where p and q give the
sizes of two disjoint subsets h1, h2 ⊂ h and l gives the size of a set of nodes V (cid:48) ⊂ V \ (h1 ∪ h2) which may
(but does not have to) be disjoint from h and with which nodes in h1 and in h2 co-participated in common
events. For a triple of positive integers (p, q, l) and an undirected hyperedge h from a given set of nodes V ,
we define the operator Sub(p,q,l)(h) by
Sub(p,q,l)(h) = {(h1, h2, V (cid:48))
;
h1 = p, h2 = q, V (cid:48) = l, h1, h2 ⊂ h, V (cid:48) ⊂ V,
h1 ∩ h2 = h1 ∩ V (cid:48) = h2 ∩ V (cid:48) = ∅}
8
Closure of order (p, q, l) is formally defined by
closure(p,q,l)(h; t; G[E; t]) =
(cid:1) ·(cid:0)h−p
(cid:1) ·(cid:0)V −(p+q)
(cid:0)h
(cid:88)
1
p
q
l
(cid:1) ×
min[h.deg(h1 ∪ V (cid:48); t; E), h.deg(h2 ∪ V (cid:48); t; E)] ,
where we write h.deg as an abbreviation for hyperedge.degree.
(h1,h2,V (cid:48))∈Sub(p,q,l)
(h)
Closure (directed). Closure in directed hyperevent networks is similar but has more variants. As in
the case of dyadic relational events, we can distinguish the four variants: transitive closure, cyclic closure,
shared senders, and shared receivers. Due to the simple observation that there are no triangles in two-mode
networks, we define triadic closure in directed hyperevent networks only for one-mode networks where the set
of potential senders U is equal to the set of potential receivers V and, for simplicity, we restrict the definition
to loopless hypergraphs. For a triple of positive integers (p, q, l) and a directed hyperedge h = (a, b) from a
given set of nodes V , we define the operator Sub(p,q,l)(h) by
Sub(p,q,l)(h) = {(a(cid:48), b(cid:48), V (cid:48))
;
a(cid:48) = p, b(cid:48) = q, V (cid:48) = l, a(cid:48) ⊆ a, b(cid:48) ⊆ b, V (cid:48) ⊂ V,
a(cid:48) ∩ V (cid:48) = b(cid:48) ∩ V (cid:48) = ∅}
The four variants of triadic closure are formally defined by:
min[h.deg((a(cid:48), V (cid:48)); t; E), h.deg((V (cid:48), b(cid:48)); t; E)]
min[h.deg((V (cid:48), a(cid:48)); t; E), h.deg((b(cid:48), V (cid:48)); t; E)]
min[h.deg((a(cid:48), V (cid:48)); t; E), h.deg((b(cid:48), V (cid:48)); t; E)]
transitive.closure(p,q,l)(h; t; G[E; t]) =
cyclic.closure(p,q,l)(h; t; G[E; t]) =
shared.receivers(p,q,l)(h; t; G[E; t]) =
shared.senders(p,q,l)(h; t; G[E; t]) =
(cid:0)a
p
(cid:0)a
p
(cid:0)a
p
(cid:0)a
p
(a(cid:48),b(cid:48),V (cid:48))∈Sub(p,q,l)
q
q
1
1
(h)
(cid:1) ·(cid:0)b
(cid:1) ·(cid:0)V −(p+q)
(cid:1) ×
(cid:88)
(cid:1) ·(cid:0)V −(p+q)
(cid:1) ·(cid:0)b
(cid:1) ×
(cid:88)
(cid:1) ·(cid:0)b
(cid:1) ·(cid:0)V −(p+q)
(cid:1) ×
(cid:88)
(cid:1) ·(cid:0)b
(cid:1) ·(cid:0)V −(p+q)
(cid:1) ×
(cid:88)
(h)
(h)
1
1
q
q
l
l
l
l
(a(cid:48),b(cid:48),V (cid:48))∈Sub(p,q,l)
(a(cid:48),b(cid:48),V (cid:48))∈Sub(p,q,l)
min[h.deg((V (cid:48), a(cid:48)); t; E), h.deg((V (cid:48), b(cid:48)); t; E)]
(a(cid:48),b(cid:48),V (cid:48))∈Sub(p,q,l)
(h)
2.5 Dependencies implied by statistics
Different hyperedge statistics imply dependencies among subsets of different order. To illustrate this for the
statistics sub-repetition and repetition, assume that, in the context of a co-author network, there are three
different groups, each containing three actors, denoted by {Ai, Bi, Ci} for i = 1, 2, 3. Moreover, assume
that each of the three actors in Group 1 has published two single-author papers, that the actors in Group 2
have published three pairwise co-authored papers (that is, three papers authored by {A2, B2}, {A2, C2},
9
and {B2, C2}, respectively), and that the third group has jointly published one three-author paper and, in
addition, each of its actors has published one single-author paper.
Given these histories of past interaction, the future event rate to publish a joint three-author paper for
the three hyperedges {A1, B1, C1}, {A2, B2, C2}, {A3, B3, C3} depends on which hyperedge statistics are
included in the model. A first model depending only on sub-repetition of order one would assign the same
rate to all three hyperedges. After all, each of the nine actors has published two previous papers and, thus,
has the same degree (that is, the same number of previous events). This model would miss that the authors of
Group 2 and Group 3 have collaborated before, but those of Group 1 did not. A second model depending on
sub-repetition of order one and sub-repetition of order two would recognize the difference between Group 1
and Group 2 (the actors of Group 1 have never collaborated before, but those of Group 2 did) but would fail
to distinguish between Group 2 and Group 3 in which each single author has authored the same number of
papers (namely two) and each pair of authors has co-authored the same number of papers (namely one). A
third model depending on sub-repetition of order one, two, and three could also distinguish between Group 2
and Group 3, since the hyperedge {A3, B3, C3} has experienced a common event before but the hyperedge
{A2, B2, C2} did not. Finally, a fourth model depending only on the repetition statistic could assign different
event rates to the third group {A3, B3, C3} than to Groups 1 and 2 (since Group 3 previously experienced a
common event, but Groups 1 and 2 did not) but could not distinguish between {A1, B1, C1} and {A2, B2, C2}
(since neither of these two hyperedges experienced any previous event.
p ≥ 3 introduce dependencies that cannot be expressed in models specifying only dyadic event rates.
The discussion above also illustrates that the statistic repetition and the statistics sub-repetition of order
2.6 Conditioning on hyperedge size
As it will become apparent in the empirical applications, sequences of observed hyperevents often have a
very different distribution of hyperedge sizes than hyperedges randomly sampled from the set of all subsets.
As a consequence of this, the hyperedge size often has a very strong impact on event rates and model fit.
Seen from a different angle, defining the risk sets Rt to be the entire set of all hyperedges among a given set
of nodes returns an abundance of hyperedges that have an unrealistic size.
For these reasons, it might be a valuable alternative to restrict the risk sets associated with observed
events e to those hyperedges having the same size as e. In other words, we also consider models that condition
on the size of the observed hyperedges. It turns out in our empirical analysis that models conditioning on
the event size can produce different findings than unconstrained models. We will discuss in Sect. 3 how these
different results can be interpreted with respect to each other.
2.7 New events vs. repeated events
The probability that a hyperedge h experiences any event is typically by many orders of magnitude smaller
than the conditional probability that h experiences a repeated event, given that there has been at least one
event on h before. Especially in larger networks, the marginal probability of new events is negligible compared
to the conditional probability of repeated events. This observation, which is rooted in the enormous size of
the risk set, can lead to numerical instability when estimating the effect of the repetition statistic -- but it
also raises the conceptual question whether "first events" (that is, events happening on a hyperedge that has
never experienced any event before) are influenced by the same network effects than repeated events. For
these reasons, we consider the alternative to analyze first events on any hyperedge by a different model than
repeated events. We note that repeated events, that is, events occurring on a hyperedge that has experienced
at least one event before, is not the only possibility to identify a subset from the risk set that has a much
higher event rate than the average rate over the unconstrained risk set. Another possibility would be, for
instance, to consider only those hyperedges in which all subsets of a given order (such as, all pairs of nodes)
experienced at least one event before, potentially within a larger set of participants. We discuss the rationale
for modeling new events and repeated events separately in more detail in Sects. 4 and 5.
10
2.8 Relational outcome models
Relational outcome models (ROM) explain the outcome ye of a relational hyperevent e = (he, te, xe, ye),
given that the event e occurs. In settings in which hyperevents represent tasks solved by teams, a relational
outcome can measure, for instance, the performance of the team on this given task. In many settings, the
basic model for the outcome variable falls into the family of generalized linear models (GLM). For instance, a
numeric success indicator might be modeled by linear regression or a binary indicator distinguishing between
success and failure might be modeled by logistic regression. With this in mind, ROM seem to add little
over the basic statistical toolbox. However, the contribution of ROM is that -- in contrast to GLM -- they
can cope with certain forms of non-independence among observations. For instance, the success probability
of a given hyperedge h (that is, of a given team of actors) at a hyperevent at time t is likely to depend on
prior success of the same team h -- but is also likely to depend on prior success of the individual actors in
h, on prior shared success of dyads or triads of actors in h, and so on. ROM can model relational outcome
dependent on the history of previous events, in the same way as RHEM model event rates dependent on the
history of previous events,
We assume that we have chosen a distribution f (y) for the variable y giving relational outcomes of
hyperevents. ROM specify the likelihood of an observed sequence of relational events E, by assuming
conditional independence of relational outcomes, given the network of previous events:
(cid:89)
e∈E
L(θ) =
f (ye he; te; xe; θ; G[E; te]) .
(7)
The distribution f (ye he; te; xe; θ; G[E; te]) is specified as a function of parameters θ and statistics that are
functions of the network of past events G[E; te], as the ones defined in Sect. 2.4.2.
3 Case study I: Meetings
The first empirical case study that we consider in this paper is about a sequence of meeting events involving
any number of participants from a relatively small set of actors.
3.1 Setting and data
The data for this case study are sourced from the engagement diaries of former UK Prime Minister (PM)
Margaret Thatcher (Margaret Thatcher Foundation 2019). Diary entries list the dates, times, and partici-
pants of scheduled meetings undertaken by the PM on a day-to-day basis. Here, we focus on the hyperevents
(i. e., meetings) involving one, several, or all cabinet ministers (n = 23) between 5th May 1979 and 31st De-
cember 1980 -- i. e., the beginning of Thatcher's first term as PM.3 Although other actors often participated
in these meetings, they were removed from the data in order to focus explicitly on the PM's interactions
with cabinet colleagues.
In total we analyze 886 meeting events, which are listed by the minute and do not overlap. As the PM
was present at each of the meetings -- and therefore her participation rate does not vary -- the underlying
hyperedges comprise only of cabinet ministers, excluding the PM. Accordingly, event sizes range from 1 to
23. The size distribution of observed hyperevents -- and that of the non-event hyperedges sampled from
the unconstrained risk set -- is given in Fig. 1. This shows that small events and large events are over-
represented, while events of intermediate size are relatively rare -- especially when compared to the high
frequency of intermediate hyperedge sizes in the risk set. Note that the binomial distribution f (k) = (cid:0)n
(cid:1)
assumes a maximum at the integer k closest to n/2. There are no types, weights, or relational outcome
variables associated with these meeting events.
k
3The official cabinet contained 21 ministers. However, Michael Jopling (Chief Whip) and Norman Fowler (Minister for
Transport) participated in weekly cabinet meetings during the time period in focus, and their presence is represented in the
data.
11
Figure 1: PM meetings data. Histogram of sizes of observed hyperevents (top) and histogram of sizes of
sampled non-event hyperedges (bottom).
12
hyperedge size of observed eventshyperedge sizeFrequency05101520250200400600hyperedge size of sampled controlshyperedge sizeFrequency0510152025040010003.2 Model specification
When analyzing data from the first case study we want to tackle three issues which are mostly of method-
ological interest to increase our understanding of RHEM: (1) to find out whether there is any higher-order
dependence in emprical hyperevent data (compare the discussion in Sect. 2.5), (2) to assess the impact of the
hyperedge size (or functions of it) on the event rate, and (3) to compare models considering unconstrained
risk sets with models conditioning on the observed event sizes.
To tackle these questions we first estimate a family of twelve models obtained by systematically adding
the following types of hyperedge statistics in the Cox-proportional hazard models given in Eq. (5). We
consider models with and without the repetition statistic and with and without the two statistics giving
the size of the hyperedge and the squared size of the hyperedge. (Note that Fig. 1 suggests a curvilinear,
U-shaped effect of event size on event rates, which might be reproduced by considering a polynomial of order
two of the hyperedge size.) For each of the four resulting combinations, we consider a family of three models
successively including sub-repetition of order one, two, and three, respectively. Results of these models are
reported in Table 1. Besides the estimated parameters, their standard errors, and significance levels, we also
report the AIC as a measure of model fit (recall that lower AIC points to better model fit).
We estimate a second family of six different models that condition on the size of observed hyperevents,
as it has been discussed in Sect. 2.6. That is, the risk set associated with an observed hyperevent e = (he, te)
is defined to be Sub(he)(Vte ), that is the set of all subsets of size he of the set of actors Vte , where the
latter set comprises all cabinet ministers participating in any event at or before te. When we condition on
the size of the observed hyperevent, we cannot use hyperedge size (or any function of it) as an explanatory
variable since it is identical for the event and all associated non-event hyperedges. We therefore consider six
models, with and without the repetition statistic and successively including sub-repetition of order one, two,
and three, respectively. Results of these models are reported in Table 2.
3.3 Results
Unconstrained risk set. Table 1 reports estimated models considering the unconstrained risk set. Dis-
cussing first the model fit indicator (AIC), we find that including the size and squared size of hyperevents
brings the biggest improvement in model fit, followed by the improvements implied by the repetition statistic.
The model fit assesses how well the model can distinguish between events and non-events from the set of
observations, in the sense that "better" models assign higher rates to event hyperedges and lower rates to
non-event hyperedges. Looking at Fig. 1 it seems very plausible that the size and squared size of hyperedges
serve this purpose very well: an observation with a size close to the minimum or close to the maximum
is more likely to be an event, while an observation with a size close to the median is more likely to be a
non-event. This makes it plausible why including the two statistics dependent on size improve the AIC to
such a large extent. The parameter associated with the square of the hyperedge size is positive (pointing to
a U-shaped quadratic function that takes larger values at the extremes) and the parameter associated with
the size of the hyperedge is negative -- shifting the minimum of this polynomial to the positive numbers.
Including the repetition statistic brings the second-largest improvement to the model fit. The parameter
associated with repetition is consistently positive, so that the event rate on a hyperedge h is typically
higher the more previous events happened on the identical hyperedge h. In particular, we consistently find
higher-order dependence -- going beyond purely dyadic event rates -- among hyperevents.
The effect of sub-repetition of order one is consistently positive, implying that actors that have been
more active in the past (i. e., that have participated in more events) are more likely to be included among
the participants of the next event. From another point of view, a hyperedge has a higher event rate if it is
composed of participants that have been more active before.
Adding sub-repetition of order two or three on top of the other effects has an inconsistent effect on model
fit and yields parameters that strongly depend on whether or not repetition or the statistics dependent on
event size are included. Considering the block of the first three models we find that adding sub-repetition of
order two and three to models not controlling for repetition or event size brings a modest improvement in the
model fit. Parameters associated with sub-repetition of order two and three are negative in models neither
13
3.77 (0.15)∗∗∗
2789.68
4.13 (0.43)∗∗∗
23.12 (1.74)∗∗∗
675.59
10.02 (0.51)∗∗∗
10.60 (0.49)∗∗∗
−5.08 (0.27)∗∗∗ −2.63 (0.40)∗∗∗
−2.18 (0.30)∗∗∗
1723.40
6.21 (0.84)∗∗∗
−1.93 (0.61)∗∗
19.47 (1.97)∗∗∗
1646.03
8.77 (1.65)∗∗∗
3.88 (1.90)∗
−8.18 (1.38)∗∗∗
13.98 (1.79)∗∗∗
665.56
511.42
repetition.order.1
repetition.order.2
repetition.order.3
AIC
repetition.order.1
repetition.order.2
repetition.order.3
repetition
AIC
repetition.order.1
repetition.order.2
repetition.order.3
meeting.size
meeting.size.squared
AIC
repetition.order.1
repetition.order.2
repetition.order.3
repetition
meeting.size
meeting.size.squared
AIC
∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05
8.22 (0.77)∗∗∗
8.40 (1.52)∗∗∗
−0.09 (0.72)
7.21 (1.49)∗∗∗
−1.35 (0.62)∗
1.91 (0.53)∗∗∗
−1.56 (0.17)∗∗∗ −1.56 (0.18)∗∗∗ −1.68 (0.19)∗∗∗
1.72 (0.16)∗∗∗
1.67 (0.15)∗∗∗
1.67 (0.15)∗∗∗
214.79
216.78
209.21
5.99 (1.42)∗∗∗
9.81 (3.04)∗∗
−2.29 (2.42)
−0.49 (1.34)
4.59 (0.97)∗∗∗
4.38 (0.87)∗∗∗
−2.18 (0.34)∗∗∗ −2.24 (0.35)∗∗∗ −2.23 (0.35)∗∗∗
1.11 (0.16)∗∗∗
1.13 (0.16)∗∗∗
9.47 (2.88)∗∗∗
−2.50 (2.00)
4.54 (0.95)∗∗∗
1.14 (0.16)∗∗∗
99.76
100.28
102.11
Table 1: PM meetings data analyzed by RHEM with unconstrained event size. All models have been
estimated on 886 events and 9,727 observations. (Note that the number of observations is the number of
events plus the number of sampled non-event hyperedges.)
14
repetition.order.1
repetition.order.2
repetition.order.3
AIC
repetition.order.1
repetition.order.2
repetition.order.3
repetition
AIC
∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05
3350.83
0.85 (0.09)∗∗∗
1.24 (0.06)∗∗∗
0.29 (0.05)∗∗∗
3324.65
0.92 (0.06)∗∗∗
2.14 (0.16)∗∗∗
3083.56
0.19 (0.11)
2.24 (0.16)∗∗∗
0.50 (0.06)∗∗∗
0.93 (0.06)∗∗∗
0.98 (0.16)∗∗∗
2.17 (0.27)∗∗∗
3000.43
0.37 (0.11)∗∗∗
1.32 (0.18)∗∗∗
1.82 (0.28)∗∗∗
0.38 (0.07)∗∗∗
3019.10
2967.39
Table 2: PM meetings data analyzed by conditional-size RHEM. All models have been estimated on 886
events and 8,961 observations.
controlling for hyperedge size nor for repetition. We claim that these negative parameters are spurious effects
that result from the failure to control for hyperedge size. Indeed, we find that 483 events (that is more than
half of all events) have a hyperedge size equal to one. If a hyperedge has a non-zero value in sub-repetition
of order two or three, it is a signal that this hyperedge cannot have size one. Thus it cannot be among those
observations that have the the highest event rates -- explaining why sub-repetition of order two or three has
a seemingly negative effect on event rates in models not controling for event size.
We conclude that if sizes of observed events and sizes of sampled non-event hyperedges have different
distributions -- as those shown in Fig. 1 -- relational hyperevent models necessarily have to control for
hyperedge size. Failure to do so may lead to spurious results due to correlations of explanatory variables
with (functions of) hyperedge size.
We further find that, once we control for repetition, size, and square size of hyperedges, sub-repetition
of order two and three have no significant effect on event rates and including them actually decreases model
fit. The model with the highest model fit is the one with AIC=99.76, including sub-repetition of order one
(i. e., past activity of individual participants), repetition (i. e., past activity of the exact same hyperedge),
size of hyperedges, and squared size of hyperedges. The event rate on a given hyperedge h is higher if the
size of h is either close to the minimum or close to the maximum, if the actors in h participated individually
in many previous events, and/or if the exact same hyperedge experienced many previous events. On top of
these effects, the number of previous shared events of dyads or triads contained in h has no further effect on
the event rate.
We may wonder whether the quadratic function of hyperedge size captures the effect of size on event
rates sufficiently well. We experimented with estimating fixed effects for all possible meeting sizes. This,
however, resulted in a non-convergent model due to the fact that some possible meeting sizes are not realized
by any event in our empirical data. We leave it to future work to develop more sophisticated models for the
effect of size on event rates.
Conditional-size models. One way to circumvent the question how to best control for the effect of hyper-
edge size is to consider the observed sizes as given (rather than random) and model event rates conditional
on these event sizes, as it has been discussed in Sect. 2.6. That is, conditional size models define the risk set
associated with an observed hyperevent e = (he, te) to be the set of all subsets of size he of the set of actors
Vte . Table 2 reports findings on these kind of models (in which we do not have to -- and actually cannot --
control for the effect of hyperedge size).
In conditional-size models we find that the effects of all statistics are very consistent across models and
every statistic improves the model fit when added to any baseline model. The best-fitting model, thus, is
the model including repetition and sub-repetition of order one, two, and three. This model suggests that
the event rate on a given hyperedge h -- compared to other hyperedges of the same size as h -- is typically
higher if (1) the members of h individually participated in many previous events, (2) each pair composed of
15
two members of h co-participated dyadwise in many common previous events, (3) each triad composed of
three members of h co-participated triadwise in many common previous events, and (4) all members of h
co-participated in many common previous events, without any further participants. In particular, we find
higher-order dependence in hyperevents also with conditional-size models.
How can we interpret the partially different findings resulting from unconstrained models and conditional-
size models? One way to find an interpretation is to assume hypothetical modifications of an hyperedge h --
transforming it into a hyperedge h(cid:48) -- and discuss by which factor the event rate on h(cid:48) is different from the
event rate on h, according to the fitted model. For the unconstrained models we may compare any possible
hyperedge h(cid:48) with h. For instance, h(cid:48) may result from adding any number of actors to h, from removing
any number of actors to h, or from combinations of adding and removing actors. We may for instance,
consider how the event rate changes when we add a single new participant, or a set of new participants,
to h. In conditional-size models only transformations that leave the number of participants unchanged are
allowed. Thus, we may for instance consider how the event rate changes when we add a new participant
v (cid:54)∈ h to the hyperedge h, at the expense of another actor v(cid:48) ∈ h that is removed at the same time as v
is added. Similarly we may consider how the event rate changes when we add a set of k new actors to the
hyperedge h at the expense of removing another set of k actors from h. Thus, conditional-size models take
the point of view that individual actors -- or sets of actors of the same size -- compete for participation in
events. Specifically, assume that an actor v (cid:54)∈ h has more previous common events with other members of
the hyperedge h than another actor v(cid:48) ∈ h. The conditional-size models reported in Table 2 suggest that the
hyperedge h∪{v}\{v(cid:48)} (containing v instead of v(cid:48)) has a higher event rate than the hyperedge h (containing
v(cid:48) instead of v). That is, actor v has a higher probability to experience a common event with the other
participants of h than actor v(cid:48). If the other participants of h were the ones deciding about the composition
of the next event, they would be inclined to include v at the expense of v(cid:48). The interpretation of the revealed
effects in unconstrained models is more ambiguous since not only substitution of (sets of) actors by others
are allowed but also modifications that increase or decrease hyperevent sizes. Thus, the validity of effects
revealed by unconstrained models hinges on the assumption that the effect of hyperedge size on event rates
is perfectly captured by the model. Failure to control for size effects can lead to spurious findings.
We observe that model fit indicators of models not constraining hyperedge size are much lower than
those of the conditional-size models. We emphasize, however, that it would be invalid to conclude that
unconstrained models are "better" models than conditional-size models in any sense. Model fit indicators
such as the AIC can compare different models estimated on the same data -- but it is invalid to compare the
AIC of two models that have been estimated on different data. (Note that conditional-size models are indeed
estimated on different data since the non-event hyperedges associated with every observed hyperevent are
drawn from a restricted set.) The reason why unconstrained models achieve a lower AIC is that the task to
identify events (or non-events) out of all given observations is much simpler when we do not condition on the
size of hyperedges. As discussed above, in unconstrained models we can apply the very simple but effective
criterion that observations whose size is close to the minimum or close to the maximum are more likely to be
events while observations with intermediate hyperedge sizes are more likely to be non-events. From another
point of view, the non-events in unconstrained models have a totally implausible distribution of event sizes,
as is apparent from Fig. 1, and can therefore be assigned low event rates, leading to good model fit. This
simple criterion no longer works for conditional-size models, where events and sampled non-events have the
identical distribution of hyperedge sizes by design. From another point of view, the non-events resulting
from conditional-size models have a very plausible distribution of hyperedge sizes and are therefore harder
to recognize as non-events.
4 Case study II: Team assembly and team performance in co-
author networks
The second empirical case study that we consider analyzes a co-author network. Hyperevents correspond
to published papers, where the underlying hyperedge is given by the set of authors and the event time is
16
Figure 2: Histogram of sizes of observed hyperevents in the co-author data. Hyperevent size is the number
of authors of published papers.
the year of publication. In this data we have a relational outcome variable associated with events giving the
(normalized) number of citations received by the respective paper. We analyze processes explaining team
assembly (i. e., which authors tend to publish papers together) and team performance (i. e., what is the
impact of papers published by different teams). Previous work has analyzed team assembly (Guimera et al.
2005) and team performance (Ahmadpoor and Jones 2019) in publication networks with different methods.
4.1 Setting and data
We have data on 315 238 scientific papers among 523 152 authors published from 1965 to 2019. The papers
have been chosen by selecting from the set of EU-based researchers publishing in the social sciences the
1,200 that are most productive in terms of the number of publications ("seed authors"). Then we included
all papers of these 1,200 seed authors and all papers published by any of their co-authors -- including those
papers published by co-authors without any of the seed authors. We restrict the number of authors of any
paper to 100 (if a paper exceeds this limit, we consider only the first 100 authors). With this cut-off, the
average number of authors per paper is 7.95 and the average number of papers per author is 4.79. The
histogram of the number of authors per paper (that is, of the hyperevent size) is given in Fig. 2 which
suggests that small events have a distribution of hyperedge sizes resembling a binomial distribution but
also that large events are over-represented and few events have sizes far exceeding the average. Thus, the
distribution of event sizes seems to be a mixture of binomial with a heavy-tailed distribution.
Hyperevents in this data have an associated relational outcome which is the number of citations that the
paper has received by the time of data collection in 2019. The number of citations is heavily right-skewed
with a median of eight, a mean equal to 25.7, maximum of 10 687, and standard deviation equal to 87.7. We
normalize this count by subtracting the average number of citations of papers published in the same year.
The resulting performance, thus, gives the excess number of citations. It is a positive number if the paper
attracted more citations than the average paper published in the same year and it is negative if it attracted
less citations than expected, given the year of publication. Citing papers may be published at any time until
the time of data collection. In this case study, we consider the excess number of citations as an indication of
performance of the team of authors and assume that this performance (that is, the quality or excellence of
the paper) is transparent to other actors in the year following the publication of the paper so that it might,
for instance, influence team selection of papers published afterwards. We leave a more refined model which
considers also the timing of citations to future work.
Publication data, as the example we consider in this case study, usually comes with a relative coarse
17
Histogram of number of authorsnumber of authorsFrequency02040608010002000040000time granularity given by the year. Thus, necessarily many events happen simultaneously, that is, they have
the same time stamp. In this case study we assume that simultaneous events are conditionally independent
of each other, given the history of previous events. Thus, event rates (or relational outcome variables) on
given hyperedges may depend on previous events on the same or other hyperedges, but are assumed to be
conditionally independent of the occurrence or non-occurrence of simultaneous events. Previous work has
shown that the validity of the assumption of conditional independence in periodically observed dynamic
networks depends on the spacing of observation times (Lerner et al. 2013b). We leave it to future work to
develop a model that can cope with mutual dependence among simultaneous events.
4.2 Model specification
In this case study we are interested in effects explaining team assembly and team performance. More
specifically, we first want to analyze how team assembly depends on familiarity and prior performance on
various levels. Among the familiarity effects we test whether actors have the tendency to repeat collaboration
dyadwise, triadwise, or within the identical team. Dependence on prior performance would induce actors to
seek collaboration with others who individually performed well in the past, or with whom they have a history
of prior shared success -- dyadwise, triadwise, or within the identical team. Secondly, within the family of
relational outcome models, we seek to explain team performance (that is, the excess number of citations
received by papers) by familiarity and prior performance on various levels. In particular, we are interested
in whether effects explaining team assembly and team performance are "consistent" in the sense that actors
have a preference to collaborate within teams that are likely to produce high-impact work. Team assembly
is modeled with Cox-proportional hazard models given in Eq. (5) and team performance is modeled with
relational outcome models given in Eq. (7) where the distribution f of team performance is chosen to be the
normal distribution, leading to linear regression (that is, ordinary least squares).
Statistics operationalizing assumed effects of familiarity on team assembly and team performance are
identical with the effects considered in the previous case study on meetings: repetition, sub-repetition of
order one, two, and three, as well as the hyperedge size (though in the co-author model we do not use the
square of the hyperedge size). Statistics operationalizing assumed effects of prior (shared) performance on
team assembly and team performance are similar but take relational outcome (that is, excess number of
citations) of previous events into account. Specifically, we define two attributes for hyperedges h. The first
measures aggregated performance resulting from previous events occuring on the identical hyperedge:
hyperedge.performance(h; t; E) =
ye · χ(h = he) ,
where ye is the relational outcome of the hyperevent e and χ(·) is the indicator function that is one if the
argument is true and zero else. The second attribute measures performance resulting from previous events
occuring on any hyperedge containing h:
sub-hyperedge.performance(h; t; E) =
Based on these attributes, we define the statistic
ye · χ(h ⊆ he) .
prior.hyperedge.success(h; t; G[E; t]) =
hyperedge.performance(h; t; E)
hyperedge.activity(h; t; E)
,
to assess the average prior success of events occuring on the identical hyperedge and for p = 1, 2, 3 we define
(cid:88)
e∈E<t
(cid:88)
e∈E<t
prior.sub-hyperedge.success(p)(h; t; G[E; t]) =
(cid:80)
(cid:80)
h(cid:48)∈Sub(p)
(h)
h(cid:48)∈Sub(p)
sub-hyperedge.performance(h(cid:48); t; E)
hyperedge.degree(h(cid:48); t; E)
(h)
,
to assess the average prior success of events in which all members of any sub-hyperedge of order p (and
potentially further actors) jointly participated.4
4We resolve 0
0 = 0 in both definitions.
18
In this much larger network, we do not consider unconstrained models that sample from the full space
of hyperedges of all possible sizes.
Indeed, such models would produce samples of non-events that have
hyperedge sizes by many orders of magnitude larger than that of observed events. (A random hyperedge
drawn uniformly from all subsets of the set of authors would have on average more than 250 000 participants.
Thus, the full risk set would have an absurd distribution of hyperedge sizes which is totally different from
the distribution of observed event sizes.) We explore two model variants whose risk sets have a plausible
distribution of event sizes: (1) conditional-size models, which have been already applied in the previous case
study in Sect. 3 and (2) models analyzing only repeated events and therefore restrict the risk set at time t to
those hyperedges that have experienced at least one event before t. The second type of models, restricting
the analysis to repeated events, is complemented by conditional-size models restricted to first events, that
is, restricted to events occurring on hyperedges that have never experienced an event before.
as zero compared to the more than (cid:0)500 000
100
The need to analyze first events and repeated events separately, becomes apparent from a preliminary,
exploratory analysis.
If we try to fit conditional-size models that include the repetition statistic to all
events (first events and repeated events) we typically make the experience that model estimation does not
converge and that during the course of the estimation the repetition parameter diverges towards infinity. This
observation becomes understandable when we look at some characteristics of the co-author data. We find that
about 11.6% of all events are repeated events, that is they occur on hyperedges h with repetition(h; t; E) > 0.
From another point of view, even though the repeated events are not distributed uniformly, a hyperedge
that has experienced at least one event has a non-negligible probability to experience another event in the
future. On the other hand, a randomly chosen hyperedge of moderately large size that has never experienced
an event before has a probability numerically indistinguishable from zero to ever experience any event in
the future. For instance, the total number of hyperevents (which is about 300 000) is numerically as good
(cid:1) hyperedges of size 100. Thus, the simple binary indicator
χ(repetition(h; t; E) > 0) increases the event rate on hyperedges by a factor that is numerically as good as
infinity -- which is why model estimation either does not converge or, if it converges, is very unreliable and
typically has a high variability over different samples. This problem seems to be related with -- but is much
more severe than -- the unreliability of estimating the repetition parameter in large dyadic event networks
reported in Lerner and Lomi (2019). We recall that the risk set size in the hyperevent network considered
in this section is by orders of magnitude larger than the risk set size considered in Lerner and Lomi (2019).
We emphasize that the issue sketched in the preceding paragraph is not just a technical problem of model
estimation, but rather points to a conceptual problem. Even if we were given unlimited computational power,
could compute the full likelihood function without case-control sampling given in Eq. (4), and could represent
numbers with arbitrarily many digits, the rate-increase implied by χ(repetition(h; t; E) > 0) would still be
practically as good as infinity and could potentially mask or distort other -- much weaker, but still significant
and relevant -- effects in hyperevent networks. Based on our current limited experience with RHEM, it seems
that we have to accept that first events and repeated events are generated by different processes and therefore
have to be analyzed by separate models in networks whose size exceeds a moderate number of nodes.
4.3 Results
Team assembly. Table 3 reports estimated parameters of models explaining team assembly, that is, the
relative event rate on hyperedges. As discussed above, we estimate two separate models, one explaining
first events on any hyperedge and the second explaining repeated events. The first model does not include
the statistics repetition and past performance of the exact hyperedge (since these statistics are constantly
zero on all instances considered in this model) and does not include the number of authors (since the model
conditions on the size of observed hyperevents). To construct the sampled likelihood given in Eq. (5), we
sample one control (non-event hyperedge) for every observed event. Following recommendations from Lerner
and Lomi (2019) we repeat sampling ten times and fit models separately to the different samples. Findings
are very reliable across samples in the sense that all parameters that are significantly different from zero in
Table 3 have the identical sign across all ten samples.
We find that in most cases actors have a tendency to repeat established collaboration, that is, to choose
In particular, the rate of first events (that is,
familiar actors as team members for future publications.
19
repetition.order.1
repetition.order.2
repetition.order.3
repetition
prior.sub-hyperedge.success.order.1
prior.sub-hyperedge.success.order.2
prior.sub-hyperedge.success.order.3
prior.hyperedge.success
number.of.authors
AIC
Num. events
Num. obs.
∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05
Repeated events
First events (conditional size)
0.371 (0.001)∗∗∗ −0.060 (0.007)∗∗∗
0.039 (0.006)∗∗∗
0.058 (0.001)∗∗∗
−0.004 (0.001)∗∗
0.087 (0.005)∗∗∗
0.099 (0.004)∗∗∗
−0.223 (0.004)∗∗∗ −0.132 (0.009)∗∗∗
0.035 (0.012)∗∗
0.028 (0.001)∗∗∗
0.040 (0.001)∗∗∗
0.016 (0.008)
0.006 (0.009)
−2.169 (0.027)∗∗∗
570139.996
36,708
63,860
5558056.916
278,527
566,601
Table 3: Estimated parameters of RHEM modeling the relative rate of co-author events (that is, publication
rates) on hyperedges. Left: analysis restricted to first events, that is, events whose exact hyperedge has
never experienced an event before. Risk set associated with event e are all hyperedges of the same size as he
that have never experienced an event before. Right: analysis restricted to repeated events, that is, events
whose exact hyperedge has experienced at least one previous event. The risk set associated with event e
contains all hyperedges that have experienced an event before te.
publications whose authors have never published a paper with the identical set of authors before) on a
hyperedge h typically gets higher with the average number of previous publications of all individual authors
in h and the average number of dyadwise co-authored papers of all pairs of authors in h but it typically
decreases with the average number of triadwise co-authored papers of all triads of authors in h (although
the latter effect is rather small). When analyzing repeated events (that is, publications whose authors have
published at least one paper with the identical set of authors before), we find that the rate of repeated events
on a hyperedge h typically gets higher with growing numbers of dyadwise and triadwise co-authored papers
and also gets higher with a growing number of previous papers involving the identical set of authors h. In
contrast, we find that the average number of previous publications of all individual authors in h tends to
decrease the rate of repeated events. Thus, actors seem to have a preference for repeating collaboration with
familiar others, but -- controlling for these patterns -- there seems to be a saturation effect on individual
publication activity. When analyzing repeated events, we find that larger hyperedges (that is, hyperedges
with more authors) have smaller publication rates -- controlling for all other effects.
Regarding the effect of prior success (received citations of previously published papers) on publication
rates, we find that the publication rate on a hyperedge h decreases with growing average prior success of
the individual members of h in both models (that is, for first events and repeated events). Thus, previously
successful authors seem to publish less in the future -- controlling for all other effects. In contrast to this
pattern, we find that the rate of first events on hyperedges h tends to increase with prior dyadwise and
triadwise shared success, while the rate of repeated events is only increased by prior dyadwise shared success
but not significantly influenced by prior triadwises shared success. The effect of prior shared success of the
hyperedge h is also not significant for the publication rate on the identical hyperedge h.
Team performance. How do the same characteristics that influence team assembly (publication rates
on hyperedges) impact the performance of future publications? Table 4 reports estimated parameters of
relational outcome models that explain the performance (excess number of citations of papers, given the
year of publication) by the same statistics used in models for team assembly.
We find (with few exceptions) a rather consistent pattern that the number of citations of a published
paper typically gets larger with growing prior success of individual authors as well as with growing prior
20
(Intercept)
repetition.order.1
repetition.order.2
repetition.order.3
repetition
prior.sub-hyperedge.success.order.1
prior.sub-hyperedge.success.order.2
prior.sub-hyperedge.success.order.3
prior.hyperedge.success
number.of.authors
R2
Adj. R2
Num. obs.
RMSE
∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05
First events
Repeated events
−8.033 (0.311)∗∗∗
1.059 (0.163)∗∗∗
−0.389 (0.205)
1.646 (0.375)∗∗∗
−1.116 (0.441)∗
1.151 (0.321)∗∗∗
−4.757 (0.299)∗∗∗
1.520 (0.363)∗∗∗
0.529 (0.355)
7.214 (0.185)∗∗∗
0.130 (0.436)
28.176 (0.630)∗∗∗
4.940 (0.236)∗∗∗
9.013 (0.221)∗∗∗ −12.166 (0.430)∗∗∗
17.901 (0.468)∗∗∗
−0.923 (0.326)∗∗
8.276 (0.184)∗∗∗
0.274
0.051
0.051
0.274
36,708
278,527
59.663
86.159
Table 4: Modeling the relational outcome ("success") of co-authored papers, that is, the difference between
the number of citations of the paper and the expected number of citations, given the year of publication.
Left: analysis restricted to first events, that is, events whose exact hyperedge has never experienced an event
before. Right: analysis restricted to repeated events, that is, events whose exact hyperedge has experienced
at least one previous event.
shared success of dyads, triads, and the identical team of authors. An exception is the negative effect of
triadwise prior shared success on the success of repeated events; prior performance of individual authors
is non-significant for the success of repeated events.
In contrast to prior (shared) success, familiarity of
authors seems to have a less consistent impact on publication success. The previous number of publications
of individual members of the hyperedge tends to increase the number of received citations of repeated events
but is insignificant for the success of first events. The number of previously dyadwise co-authored papers
has a positive effect on the expected success of first events but a negative effect on the success of repeated
events. This pattern is reversed for the effect of triadic familiarity. In the model for repeated events we find
that the number of previous publications of the identical team of authors has no significant impact on team
performance. The number of authors of a paper (that is, the team size) positively impacts the success of
first events but is slightly negative for the success of repeated events.
In summary, team assembly seems to be mostly explained by familiarity so that the event rate on
a hyperedge h tends to be higher if the participants of h have collaborated before.
In contrast, team
performance seems to be mostly explained by prior shared success of participants. Models discussed in this
section also reveal higher-order dependence in empirical co-author networks which cannot be modeled by
purely dyadic publication rates.
5 Discussion
In this section we first discuss general methodological insight derived from the two empirical case studies
and then provide a detailed discussion of previous work that is most related to our model in Sect. 5.1.
From a high-level view, RHEM that model the rate of hyperevents compare hyperedges experiencing
events at given points in time ("cases") with hyperedges from the risk set that could potentially have
experienced an event at that time but did not ("controls," "alternatives," or "non-events"); see for instance
Eq. (5). Models seek to distinguish the event hyperedges from the alternative hyperedges by assigning high
event rates to the former and low event rates to the latter. A recurrent insight from the empirical case
studies -- which also seems to point to a major challenge in further developing and understanding RHEM --
21
is the importance of defining plausible alternative hyperedges for observed events. One of the most crucial
aspects influencing the plausibility that hyperedges might experience events -- although not the only one --
is their size.
Our first case study revealed that models that neither constrain the size of alternative hyperedges nor
control for the effect of size on event rates (such as the first three models reported in Table 1) are completely
useless. The distribution of hyperedge size in the unconstrained risk set is extremely different from that of
the observed events (compare Fig. 1). Failure to control for the effect of size on the event rate can lead to
spurious effects for any statistic correlating with (functions of) size. In the first case study we considered
two model variants to deal with the effect of hyperedge size: (1) including size and the squared size among
the model statistics (which was motivated by the observed U-shaped distribution of the size of observed
events) and (2) conditioning on hyperedge size, that is, comparing each hyperedge experiencing an event
only with alternatives of the same size. The empirical case study from Sect. 3 could not answer conclusively
which of the two possibilities is preferable in general. However, in the given study, conditional-size models
produced more consistent results and also turned out to be interpretable in a more straightforward way. In
general, analysts face a trade-off between constraining the risk set not enough and constraining it too much.
An unconstrained risk set could yield implausible alternative hyperedges while a risk set that is too heavily
constrained might lead to models conditioning on some aspects of hyperevents that in reality result from an
endogenous process (for example, hyperedge size results from the choice to include actors in hyperevents).
The second case study revealed that conditioning on hyperedge size might still be insufficient in larger
hyperevent networks. Indeed, given many actors nearly every randomly drawn hyperedge is an "implausible"
alternative candidate for the next hyperevent (see the discussion in Sect. 4.2). In such models we can often
find very simple criteria (such as the property of having previously experienced at least one event) that
increase the event rate on hyperedges by factors which are numerically indistinguishable from infinity. Based
on our current limited experience with RHEM, we recommend to partition the whole population of hyperedges
along such criteria that have a dramatic (and typically obvious) effect on event rates. In the concrete case
study from Sect. 4, we specify separate models for first events (considering hyperedges that have never
experienced any event before) and for repeated events (considering hyperedges that have experienced at least
one event before). In general, other criteria might additionally be used to split the population of hyperedges
into more homogeneous subsets. Such criteria might, for instance, distinguish hyperedges in which every
pair of actors have experienced at least one common event, hyperedges in which every pair of actors have
co-participated in an event with at least one common other third actor, or hyperedges that are homogeneous
with respect to an exogenously given covariate, e. g., institutional affiliation.
5.1 Related work
In this section we discuss some of the most-related previous work in detail. In particular, we emphasize
differences between models proposed in previous work and RHEM.
Guimera et al. (2005) propose a model in which teams consisting of any number of actors -- representing
for instance, the set of co-authors of a scientific paper -- are randomly assembled by including team members
one by one. The probability of an actor A to be included in team T can depend (1) on characteristics of the
actor A, such as being an incumbent or a newcomer and (2) on the existence of previous collaboration of A
with actors who have previously been selected into the growing team T . Thus, this model can incorporate
dyadic dependence, but no higher-order dependence. For instance, assume a situation in which actor A has
frequently collaborated with actors B and C, but never with both together -- perhaps because A's papers
co-authored with B are from a different area than A's papers co-authored with C. In this situation we could
expect an increased probability that teams contain the dyad {A, B} and an increased probability that teams
contain the dyad {A, C} -- but at the same time a decreased probability that a team contains the triad
{A, B, C}. Such a higher-order dependence, however, cannot be specified in the model from Guimera et al.
(2005). Indeed, in their model B and C would both be more likely to be in a team with A and thus -- by
chance alone -- the triad {A, B, C} would be over-represented.
Butts (2008) discussed the possibility to represent several senders or receivers by new dummy nodes
representing sets of actors: 'To treat simultaneous joint action by multiple senders and/or receivers, we simply
22
create one or more "virtual" senders and/or receivers that represent subsets of the original sender/receiver
set.' (Butts 2008, p.159). Examples of such virtual receivers include "broadcast" actors representing, for
instance, a whole school class which may receive broadcast messages from the teacher (DuBois et al. 2013).
It is easy to see that the strategy to represent sets of senders or receivers by dummy nodes is only possible
for a limited number of predefined sets of actors. Creating these dummy nodes for all subsets would result
in a prohibitively huge graph with an exponential number of nodes in which most nodes never participate
in any event. Moreover, the inclusion relation among these virtual nodes representing subsets would have to
be incorporated somehow in the model. Indeed if some set of actors S receives a message then all subsets
S(cid:48) ⊂ S are also receiving that message -- which may influence the future rate of events to or from S(cid:48).
Kim et al. (2018) propose the hyperedge event model (HEM) for directed events that have exactly one
sender but can have any number of receivers (or conversely any number of senders and exactly one receiver).
Their model specifies for every possible sender-receiver pair (i, j) an intensity function λij. These dyadic
intensity functions then stochastically determine (1) who is the sender of the next event and (2) which is
the set of receivers, given the chosen sender. The difference to the RHEM proposed in our paper is that in
the model from Kim et al. (2018) the intensities are defined for dyads, while RHEM can define intensities
(event rates) for hyperedges of any size. Assume, for instance, that A has often send emails to B and to C
in the past, but never the same email to B and C -- perhaps because B is a work colleague of A but C is a
friend. Due to many past events, the dyadic intensities λAB and λAC would be high and, in the model from
Kim et al. (2018), by chance alone, B and C would have an increased probability to be in the receiver set of
an email send by A -- although in reality they would have a very low probability to jointly receive the same
email from A.
Related work from the area of machine learning. Machine learning considers the task of subset
prediction (or sequential subset prediction) which seems to be strongly related to modeling hyperevents.
Subset prediction seeks to predict, for instance, baskets of items that a particular customer is likely to select
in the next purchase. We note that prediction (which is a common objective in machine learning) is a
different goal than explanation (Breiman et al. 2001; Shmueli 2010). Data modeling often seeks to identify
and/or test effects that explain aspects of the data. (For instance, in this paper we want to assess if and
how prior shared success impacts team assembly in co-authoring networks.) Machine learning, on the other
hand, typically seeks to predict data out-of-sample, such as "which basket of items will a customer most
likely buy in the future." The number of parameters in models applied in machine learning is typically by
several orders of magnitude larger than in explanatory modeling and models applied in machine learning
often use dedicated estimation techniques that prevent overfitting. The resulting models perform more like
"black boxes": they make good predictions but do not reveal specific effects in the data generating process.
RHEM proposed in this paper have been designed with the goal of explaining data (rather than predicting
data) in mind. Having these differences in mind, we overview related work on subset predictions since the
two areas might nevertheless learn from each other.
Benson et al. (2018a) propose a model in which the "utility" of a subset is composed of (1) the sum of
the utilities of the individual items of the subset plus an additional "corrective" utility, positive or negative,
which may be specified for a given budget of k subsets. Thus, this model can in principle express dependence
of arbitrarily high order -- but only for a predefined set of subsets.
Benson et al. (2018b) propose a model to predict the next set in a sequence of sets. To predict the next
set Sk+1, given the preceding sets S1, . . . , Sk, their model conditions on the size of the next set and takes
the union of random subsets of the preceding sets Si for i = 1, . . . , k until the newly constructed set is of
the given size. When selecting subsets of the preceding sets Si, i = 1, . . . , k, the more recent sets typically
have a higher probability to be partially repeated. More precisely, they propose to select a subset of the set
Si with probability proportional to a "recency weight" wk−i+1, where these recency weights are learned to
maximize predictive performance. The model from Benson et al. (2018b) can express dependencies of event
rates on subset of any order and is -- from a certain point of view -- related to RHEM specified by including
sub-repetition of any feasible order. Differences include that free parameters in such a RHEM are associated
with subset size, while parameters in the model from Benson et al. (2018b) are associated with lags in the
23
sequence of sets.
6 Conclusion and future work
In this paper, we introduce relational hyperevent models (RHEM) as a generalization of relational event
models (REM) to multi-actor interaction. RHEM can specify event rates on the full space of directed or
undirected hyperedges involving any number of actors. We illustratively apply RHEM in two empirical case
studies on meetings of government ministers and co-authored scientific papers. These case studies provide
evidence for dependencies in hyperevent networks that cannot be modeled by purely dyadic event rates
but that involve hyperedges of higher order. Besides RHEM explaining event rates on hyperedges, we also
define relational outcome models (ROM) explaining outcome or success resulting from given hyperevents.
For instance, in a study of co-author networks, RHEM can analyze team assembly, explaining which teams
of authors publish together, and ROM can analyze team performance, explaining the impact of published
papers.
The computational intractability of the full likelihood function, which scales exponentially in the number
of nodes, can be tackled by applying established sampling techniques. Applying case-control sampling, we
succeeded in reliably estimating RHEM parameters from a network comprising hundreds of thousands of
nodes and hyperevents.
From a high-level view, RHEM compare hyperedges experiencing events at given points in time ("cases")
with hyperedges from the risk set that could potentially have experienced an event at that time but did
not ("controls," "alternatives," or "non-events"). Models seek to distinguish the event hyperedges from the
alternative hyperedges by assigning high event rates to the former and low event rates to the latter. One
of the major challenges in the future development of RHEM is to find appropriate definitions for plausible
alternative hyperedges for observed events. Considering the full unconstrained risk set of all hyperedges of
any size leads to "straw man" alternatives which are completely different from any event hyperedge and
can easily be recognized as non-events by the simplest of models. A minimal requirement seems to be that
models control for -- or condition upon -- the size of hyperedges. In larger networks, however, conditioning
on hyperedge size might still be insufficient to produce plausible alternatives. The set of all hyperedges
of a given size is often extremely inhomogeneous with respect to event rates. Simple indicators, like the
criterion whether a hyperedge has experienced any previous event, imply an increase in the event rate which
is practically or numerically as good as infinity. Such extremely strong (and typically fairly obvious) effects
could potentially mask or distort other effects of interest. Moreover, it is likely that different network effects
explain events on such incomparable instances. In this paper, we therefore suggest to split the population
of hyperedges along indicators that have an extreme impact on the event rate. For instance, we suggest to
specify and fit separate models for new events and for repeated events. Future work is needed to better
understand, and/or find alternative ways to cope with, extreme inhomogeneity over the space of hyperedges.
Another avenue for future work is to better understand hyperedge statistics and the interpretation of
associated parameters. Hyperedge statistics proposed in this paper are inspired by statistics commonly ap-
plied in the specification of REM, such as repetition, reciprocation, degree effects, triadic closure, or covariate
effects. However, possibilities to define hyperedge statistics are much more numerous since many statistics
can be parameterized by the order of subsets involved in their definition. Some families of statistics, such as
sub-repetition of various order, are nested and interrelated by design which renders the joint interpretation of
associated parameters difficult. More experience in applying and interpreting RHEM in different application
settings is needed.
References
Ahmadpoor, M. and Jones, B. F. (2019), "Decoding team and individual impact in science and invention,"
Proceedings of the National Academy of Sciences, 201812341.
24
Benson, A. R., Kumar, R., and Tomkins, A. (2018a), "A discrete choice model for subset selection," in
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, ACM, pp.
37 -- 45.
Benson, A. R., Kumar, R., and Tomkins, A. (2018b), "Sequences of sets," in Proceedings of the 24th ACM
SIGKDD International Conference on Knowledge Discovery & Data Mining, ACM, pp. 1148 -- 1157.
Borgan, Ø., Goldstein, L., and Langholz, B. (1995), "Methods for the analysis of sampled cohort data in the
Cox proportional hazards model," The Annals of Statistics, 1749 -- 1778.
Brandes, U., Lerner, J., and Snijders, T. A. (2009), "Networks Evolving Step by Step: Statistical Analy-
sis of Dyadic Event Data," in Proc. 2009 Intl. Conf. Advances in Social Network Analysis and Mining
(ASONAM), IEEE, pp. 200 -- 205.
Breiman, L. et al. (2001), "Statistical modeling: The two cultures," Statistical science, 16, 199 -- 231.
Bretto, A. (2013), Hypergraph theory, Cham: Springer.
Butts, C. T. (2008), "A relational event framework for social action," Sociological Methodology, 38, 155 -- 200.
Chodrow, P. S. (2019), "Configuration Models of Random Hypergraphs and their Applications," arXiv
preprint arXiv:1902.09302.
Cox, D. (1972), "Regression Models and Life-Tables," Journal of the Royal Statistical Society. Series B
(Methodological), 34, 87 -- 22.
DuBois, C., Butts, C. T., McFarland, D., and Smyth, P. (2013), "Hierarchical models for relational event
sequences," Journal of Mathematical Psychology, 57, 297 -- 309.
Guimera, R., Uzzi, B., Spiro, J., and Amaral, L. A. N. (2005), "Team assembly mechanisms determine
collaboration network structure and team performance," Science, 308, 697 -- 702.
Kim, B., Schein, A., Desmarais, B. A., and Wallach, H. (2018), "The Hyperedge Event Model," arXiv
preprint arXiv:1807.08225.
Lawless, J. F. (2003), Statistical Models and Methods for Lifetime Data, Wiley.
Lerner, J., Bussmann, M., Snijders, T. A., and Brandes, U. (2013a), "Modeling Frequency and Type of
Interaction in Event Networks," Corvinus Journal of Sociology and Social Policy, 4, 3 -- 32.
Lerner, J., Indlekofer, N., Nick, B., and Brandes, U. (2013b), "Conditional independence in dynamic net-
works," Journal of Mathematical Psychology, 57, 275 -- 283.
Lerner, J. and Lomi, A. (2019), "Reliability of relational event model estimates under sampling: how to
fit a relational event model to 360 million dyadic events," Network Science, (to appear) available online:
https://doi.org/10.1017/nws.2019.57.
Margaret Thatcher Foundation (2019), Large scale document archive, retrieved from https://www.
margaretthatcher.org/archive.
Perry, P. O. and Wolfe, P. J. (2013), "Point process modelling for directed interaction networks," Journal of
the Royal Statistical Society: Series B (Statistical Methodology), 75, 821 -- 849.
Shmueli, G. (2010), "To explain or to predict?" Statistical science, 25, 289 -- 310.
Stadtfeld, C. and Block, P. (2017), "Interactions, Actors, and Time: Dynamic Network Actor Models for
Relational Events," Sociological Science, 4, 318 -- 352.
25
Therneau, T. M. and Grambsch, P. M. (2013), Modeling survival data: extending the Cox model, Springer
Science & Business Media.
Vu, D., Pattison, P., and Robins, G. (2015), "Relational event models for social learning in MOOCs," Social
Networks, 43, 121 -- 135.
26
|
1609.04880 | 2 | 1609 | 2016-10-16T19:28:53 | Die-out Probability in SIS Epidemic Processes on Networks | [
"cs.SI",
"physics.data-an",
"physics.soc-ph"
] | An accurate approximate formula of the die-out probability in a SIS epidemic process on a network is proposed. The formula contains only three essential parameters: the largest eigenvalue of the adjacency matrix of the network, the effective infection rate of the virus, and the initial number of infected nodes in the network. The die-out probability formula is compared with the exact die-out probability in complete graphs, Erd\H{o}s-R\'enyi graphs, and a power-law graph. Furthermore, as an example, the formula is applied to the $N$-Intertwined Mean-Field Approximation, to explicitly incorporate the die-out. | cs.SI | cs |
Die-out Probability in SIS Epidemic Processes
on Networks
Qiang Liu and Piet Van Mieghem
Abstract An accurate approximate formula of the die-out probability in a SIS epi-
demic process on a network is proposed. The formula contains only three essential
parameters: the largest eigenvalue of the adjacency matrix of the network, the ef-
fective infection rate of the virus, and the initial number of infected nodes in the
network. The die-out probability formula is compared with the exact die-out proba-
bility in complete graphs, Erdos-R´enyi graphs, and a power-law graph. Furthermore,
as an example, the formula is applied to the N-Intertwined Mean-Field Approxima-
tion, to explicitly incorporate the die-out.
1 Introduction
The SIS epidemic process models spreading phenomena of information or viruses
on networks [7]. In a network, each node has two states: susceptible and infected.
A Bernoulli random variable X j(t) ∈ {0,1} denotes the state of each node, where
X j(t) = 0 means that node j is susceptible and X j(t) = 1 indicates that node j is
infected at time t. An infected node can infect its susceptible neighbors with a in-
fection rate b by changing the susceptible neighbor nodes into infected nodes, and
each infected node is cured and becomes a susceptible node with a curing rate d . If
the infection and curing processes are Poisson processes, the SIS epidemic model
is Markovian, where the sojourn times in the infected and susceptible state are ex-
ponentially distributed. The governing equation of a node j in the Markovian SIS
epidemic process in an unweighted and undirected network with N nodes, repre-
sented by an N × N symmetric adjacency matrix A, is [10, p. 449]
Faculty of Electrical Engineering, Mathematics and Computer Science
Delft University of Technology, P.O Box 5031, 2600 GA Delft, The Netherlands
e-mail: {Q.L.Liu, P.F.A.VanMieghem}@TuDelft.nl
1
2
Qiang Liu and Piet Van Mieghem
dE[X j(t)]
dt
= −d E[X j(t)] + b
N(cid:229)
k=1
ak jE[Xk(t)] − b
N(cid:229)
k=1
ak jE[X j(t)Xk(t)]
(1)
The epidemic threshold t c of the SIS epidemic process implies that, if the effec-
tive infection rate t = b /d > t c, the virus will spread over the network for a very
long time, and if t < t c, the number of infected nodes decreases exponentially fast
after sufficiently long time [7, 11]. There is an approximate value [14] and lower
c = 1/l 1, where l 1 is the largest
bound [13] of the epidemic threshold t c > t (1)
eigenvalue of the adjacency matrix A. In this paper, the threshold t (1)
is referred
c
to as the N-Intertwined Mean Field Approximation (NIMFA) threshold, where the
superscript (1) in t (1)
refers to the fact that NIMFA is a first order mean-field ap-
c
proximation [13].
The structure of this paper is organized as follows. Section 2 introduces the re-
lation between the prevalence (2) and the average fraction of infected nodes con-
ditioned to the survival of the virus. Clearly, the virus die-out probability plays a
key role. Section 3 proposes an accurate approximate formula (6) for the die-out
probability in the metastable state of the SIS epidemic process. Figure 1 and Fig. 2
demonstrate the accuracy and the limitation of (6) in complete graphs, Erdos-R´enyi
graphs, and power-law graphs. Finally, we apply formula (6) to correct the NIMFA
prevalence (8) as shown in Fig. 3.
2 The Prevalence and the Die-out Probability
The prevalence y(t) of a SIS epidemic process is the expected fraction of infected
nodes at time t,
(cid:229) N
y(t) = E[S(t)]
(2)
where S(t) = 1
j=1 X j(t) is the fraction of infected nodes. The prevalence in the
N
exact Markovian epidemic process after infinitely long time tends to zero, where the
absorbing state is reached. Before the virus dies out, virus may exist in networks
for a very long time [2, 9]. In the metastable state, the prevalence y(t) changes very
slowly and there is a balance between the infection and curing processes. We con-
fine ourselves to the time region [0,tmax] that the prevalence y(tmax) 6= 0, and the
prevalence is approximately equal at every time t ∈ [tm,tmax], where tm is the time
that the SIS process reaches metastable state. However, for one realization of the
epidemic process, we cannot expect that the fraction of infected nodes oscillates
around the level of the prevalence y(t) with time t, because the prevalence y(t) is
the average over all possible realizations including the die-out realizations. In real
observed diseases, the virus has not died out yet, so that the fraction of infected pop-
ulation is positive. So, there are actually two kinds of average: the average over all
possible realizations (prevalence), and the average over the realizations conditioned
to the survival of the virus. To prevent confusion, the faction of infected nodes un-
der the condition that the virus survives at time t is denoted by a random variable
Die-out Probability in SIS Epidemic Processes on Networks
3
S(t) in this paper. Consequently, we have Pr[ S(t) = i/N] = Pr[S(t) = i/NS(t) 6= 0]
for S(t) ∈ {1/N,2/N, · · · ,1} while S(t) ∈ {0,1/N,2/N, · · · ,1}. The removal of the
absorbing state [3] or the assumption that the virus survives is associated with the
quasi-stationarity or metastability of the SIS process [8]. The expectation of S(t) of
an epidemic process in a network with N nodes is
E[ S(t)] =
N(cid:229)
i=1
i
N
Pr[ S(t)] =
N(cid:229)
i=1
i
N
With the definition of the conditinal probability,
Pr(cid:20) S(t) =
i
N(cid:12)(cid:12)(cid:12)(cid:12)
S(t) 6= 0(cid:21) =
=
i
S(t) 6= 0(cid:21)
Pr(cid:20) S(t) =
N(cid:12)(cid:12)(cid:12)(cid:12)
Pr(cid:2)(cid:8)S(t) = i
N(cid:9) ∩ {S(t) 6= 0}(cid:3)
Pr(cid:2)S(t) = i
N(cid:3)
provided i > 0
Pr[S(t) 6= 0]
Pr [S(t) 6= 0]
we have
E[ S(t)] =
1
Pr[S(t) 6= 0]
N(cid:229)
i=0
i
N
Pr(cid:20)S(t) =
i
N(cid:21) =
E[S(t)]
Pr[S(t) 6= 0]
Since Pr[S(t) 6= 0] = 1 − Pr[S(t) = 0], the prevalence can be written as
y(t) = y(t) (1 − Pr[S(t) = 0])
(3)
where y(t) = E[ S(t)]. Equation (3) shows the relation between the prevalence y(t)
and the average fraction y(t) of infected nodes under the condition that the virus
survives, where the die-out probability Pr[S(t) = 0] is essential. Both the prevalence
y(t) and the virus die-out probability Pr[S(t) = 0] are difficult to compute analyti-
cally in general graphs.
The Markovian SIS epidemic process on the complete graph KN is a birth-and-
death process [3, 10]. The states {0,1, · · · ,N} of the birth-and-death process are the
number of infected nodes, where 0 is the absorbing state or overall-healthy state.
Therefore, the die-out probability Pr[S(t) = 0] can be obtained by solving the birth-
and-death process,
= sT (t)Q
(4)
(cid:0)s′(t)(cid:1)T
where Q is the infinitesimal generator of the birth-and-death Markov chain, and
sT (t) = [s0(t), · · · ,sN(t)] is the state probability vector with each element si(t) =
Pr[S(t) = i/N] for 0 ≤ i ≤ N, and s0(t) = Pr[S(t) = 0].
The die-out probability Pr[S(t) = 0] of SIS epidemic process in complete graphs
also equals the gambler's ruin probability [10, p. 231] as shown in the Appendix,
m n =
j!t j
(cid:229) N−n−1
j=0
j=0 j!t j
(cid:229) N−1
(5)
4
Qiang Liu and Piet Van Mieghem
Different from solving (4), Eq. (5) only applies to the metastable state and cannot
be used to calculate the die-out probability at an arbitrary time t. As demonstrated
in the Appendix, Eq.(5) upper bounds the actual die-out probability, because (5)
assumes that the virus wins only when it infects all N nodes in a finite time before
dying out.
3 The Die-out Probability: an Accurate Approximation
Apart from solving (4) or employing the gambler's ruin formula (5), in this sec-
tion we propose a novel approximate formula of the virus die-out probability in the
metastable state.
We assume that the prevalence y(t) is approximately constant in the metastable
state. Relation (3) then indicates that the die-out probability is also approximately
constant. In the metastable state, we then find that the virus die-out probability in a
sufficiently large graph is approximately
Pr[S(tm) = 0] ≈
1
xn , with x ≥ 1
(6)
where S(tm) denotes the fraction of infected nodes of the SIS epidemic process in the
metastable reached at time tm, x = t /t (1)
c = l 1t is the normalized effective infection
rate of the virus, and n is the number of initially infected nodes. The situation x < 1
is not considered, because the infection rate is below the threshold and the SIS
process dies out before reaching the metastable state. In addition, 1/x > 1 cannot
represent a probability. As the first order NIMFA threshold t (1)
c = 1/l 1 is a lower
bound of the actual threshold t c, the prevalence y(t) decreases exponentially fast for
sufficiently large time [11] when x ≤ 1, and the virus die-out probability tends to 1.
Also, the accuracy of formula (6) is related to the accuracy of the NIMFA threshold
c = 1/l 1. For example, if the effective infection rate is below the real threshold
t (1)
and t (1)
c < t < t c, formula 1/xn < 1, but the virus dies out within finite time with
the probability tending to 1. In the Appendix, an analytically approach to (6) from
the gambler's ruin probability (5) in complete graphs is presented.
By introducing the normalized effective infection rate x = t /t (1)
1 into (6),
the network topology -- the largest eigenvalue of the adjacency matrix l 1 -- is re-
flected. Formula (6) is simple, and only three essential parameters are involved: the
spectral radius l 1, the virus spreading ability t , and the initially infected number
of nodes n. If a few nodes are infected and the infection rate is above the thresh-
old x > 1, then formula (6), which is equivalent to Pr[S(tm) = 0] ≈ e−n logx, shows
that the network will experience a disease outbreak, because the die-out probability
decreases exponentially fast with n above the epidemic threshold (logx > 0).
c = tl
In the sequel, we compare (6) and the die-out probability Pr[S(t) = 0] obtained
via simulations. The curing rate of all the calculations and simulations below is
d = 1.
Die-out Probability in SIS Epidemic Processes on Networks
5
3.1 Complete Graphs
After solving the epidemic process (4) in the complete graph K126 with effective
infection rate t = 0.016, Fig. 1(a) shows the prevalence y(t) and the die-out prob-
ability Pr[S(t) = 0] as an example. The metastable state is reached approximately
at time t = 10 and hereafter, and the prevalence y(t) keeps steady. Also, the die-
out probability Pr[S(t) = 0] becomes approximate constant earlier from t = 5. The
prevalence y(t) decreases slowly to 0 after an infinitely long time [2, 9], and corre-
spondingly, the die-out probability increases to 1. At t = 45 in the metastable state,
the number of die-out realizations of the SIS epidemic simulation and the solution
of the Markov chain Eq. (4) are recorded and shown in Fig. 1(b), 1(c), and 1(d).
The simulation results in Fig. 1(b) and 1(c) are obtained by the SSIS simulator [1]
which applies a Gillespie-like algorithm [4], and 106 realizations of the Markovian
epidemic process are simulated. By counting the number of realizations which have
zero infected nodes at t = 45, the die-out probability is obtained.
Figure 1(b) and 1(c) illustrate that, our simulation results match with the compu-
tation of the birth-and-death process (4). To avoid redundancy, we omit the simula-
tion results in Fig. 1(d). From Fig. 1(b), the die-out probability at t = 45 is approxi-
mately 1 corresponding to formula (6), when the normalized effective infection rate
x = 1. Also, if x = 1, the infection rate is below the threshold, and no matter how
many nodes are infected initially, the prevalence y(t) decreases exponentially fast
for sufficiently large time. The mean-field approximations are usually not accurate
around threshold [6], which is also verified by Eq. (3) when x = 1 and the die-out
probability Pr[S(tm) = 0] = 1. For a different number of initially infected nodes n,
Fig. 1 shows that the virus die-out probabilities converge to the concise formula
(6) fast with the network size N. Furthermore, the larger the normalized effective
infection rate x is, the faster the probabilities convergence towards (6).
3.2 General Graphs
For general graphs, it is infeasible to obtain the virus die-out probability by solving
the differential equations of Markov chain, because the number of equations is 2N.
However, it is still possible to obtain the virus die-out probability efficiently by
simulation. We construct three Erdos-R´enyi (ER) graphs Gp(N) with the network
size N = 100 and the link generation probability p = 0.9, 0.5, and 0.1, respectively.
The epidemic process is simulated on the ER graphs by randomly choosing the
initially infected nodes. For every normalized infection rate x and every number of
initially infected nodes n, 104 realizations are simulated. Fig. 2(a), 2(b), and 2(c)
give the the comparison between the die-out probabilities and formula (6) for the
number of initially infected nodes n = 1,2,3. Formula (6) is accurate in the general
ER graphs, especially when the normalized effective infection rate x is large. The
accuracy of formula (6) decreases with decreasing link generation probability p in
ER graphs Gp(N).
6
y
t
i
l
i
b
a
b
o
r
p
t
u
o
-
e
i
d
s
u
r
i
v
e
h
t
d
n
a
e
c
n
e
l
a
v
e
r
P
0.5
0.4
0.3
0.2
0.1
0.0
0
Slowly decreases to 0
Complete graph K126
the normalized effective spreading rate x=2
Virus die-out probability
Prevalence
Slowly increases to 1
Qiang Liu and Piet Van Mieghem
x=1
Complete graph, 1 node infected initially
Solution of Markov chain equation
Simulation
x=1.5
x=2
x=3
x=4
1/xn=1/1.5
1/xn=1/4
1/xn=1/2
1/xn=1/3
y
t
i
l
i
b
a
b
o
r
p
t
u
o
-
e
i
d
s
u
r
i
V
1.0
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
10
Normalized time (when d=1 )
20
30
40
50
20
40
100
Number of nodes N in complete graphs
80
60
120
(a) The virus die-out probability and the
prevalence of epidemic process in complete
graph K126. Initially 3 nodes are infected. This
figure shows a clearly metastable state region.
Complete graph, 2 nodes infected initially
Solution of Markov chain equation
Simulation
x=1.5
1/xn=1/22
1/xn=1/1.52
1/xn=1/32
1/xn=1/42
x=2
x=3
x=4
y
t
i
l
i
b
a
b
o
r
p
t
u
o
-
e
i
d
s
u
r
i
V
1.0
0.8
0.6
0.4
0.2
0.0
(b) The die-out probabilities from simulation
of the SIS epidemic process and calculation
of the birth-and-death process are shown with
1 initially infected node. With the increase of
network size N, the die-out probabilities con-
verge to the simple formula: 1/xn.
Complete graphs, 3 nodes infected initially
Solution of Markov chain equation
x=1.5
1/xn=1/1.53
1/xn=1/23
1/xn=1/33
x=3
x=2
x=4
1/xn=1/43
y
t
i
l
i
b
a
b
o
r
p
t
u
o
-
e
i
d
s
u
r
i
V
1.0
0.8
0.6
0.4
0.2
0.0
40
20
Number of nodes N in complete graphs
100
80
60
120
20
40
60
80
100
120
Number of nodes N in complete graph
(c) With 2 nodes infected initially, this figure
verifies (6) as Fig. 1(b) with simulation and
calculation results.
(d) With 3 nodes infected initially, this figure
shows the calculation results of (4) as Fig. 1(b)
and 1(c).
Fig. 1 The virus die-out probability in complete graphs.
The die-out probability of the SIS epidemic process in a power-law graph is
presented in Fig. 2(d) with 105 realizations, and formula (6) shows its limitation.
The power law graph has N = 1000 nodes, and the degree distribution is Pr[k] ∼
k−2.6. Fig. 2(d) exhibits that the die-out probability is almost 1 when the normalized
effective rate is around 2, which also indicates that the real epidemic threshold in
the power-law graph is much larger than the NIMFA threshold 1/l 1. The inaccuracy
of formula (6) is affected by the inaccuracy of the NIMFA threshold as mentioned
above.
The simulations seem to indicate that formula (6) is always smaller than the ac-
tual die-out probability, which may be attributed to the fact that the NIMFA thresh-
old always lower bounds the actual threshold in any network.
Die-out Probability in SIS Epidemic Processes on Networks
7
y
t
i
l
i
b
a
b
o
r
p
t
u
o
-
e
i
D
0.8
0.6
0.4
0.2
ER graph with link generating probability 0.9
Die-out probability
Formuale 1/xn
1 node
2 nodes
1.0
0.8
0.6
0.4
0.2
y
t
i
l
i
b
a
b
o
r
p
t
u
o
-
e
i
D
ER graph with link generating probability 0.5
Die-out probability
Formuale 1/xn
1 node
2 nodes
3 nodes
3 nodes
1.5
2.0
2.5
3.0
3.5
4.0
1.5
2.0
2.5
3.0
3.5
4.0
Normalized effective infection rate x
Normalized effective infection rate x
(a) The virus die-out probability of the SIS
epidemic process in an ER graph with the link
generation probability 0.9. The virus spreads
starts from 1, 2, or 3 nodes initially.
(b) The die-out probability of the SIS epi-
demic process in another ER graph with the
link generation probability 0.5.
1.0
0.8
0.6
0.4
0.2
y
t
i
l
i
b
a
b
o
r
p
t
u
o
-
e
i
D
ER graph with link generating probability 0.1
Die-out probability
Formuale 1/xn
1 node
2 nodes
3 nodes
1.5
2.0
2.5
3.0
3.5
4.0
Normalized effective infection rate x
(c) The die-out probability of the SIS epi-
demic process in another ER graph with the
link generation probability only 0.1.
y
t
i
l
i
b
a
b
o
r
p
t
u
o
-
e
i
D
1.0
0.8
0.6
0.4
0.2
0.0
2
the number of initially infected
nodes increses from 1 to 3
Power-law graph, Pr[k]~k-2.6
Die-out probability
Formula 1/xn
4
6
8
10
12
14
Normalized effective infection rate x
(d) The die-out probability of the SIS epi-
demic process in a power-law graph.
Fig. 2 The virus die-out probability in ER graphs and a power-law graph with different number of
initially infected nodes.
3.3 NIMFA: Corrected for Die-out
The mean-field approximation methods are usually not accurate when the initial
number of infected nodes is small, because the prevalence obtained by mean-field
approximations will generally converge to fixed value due to the existence a steady
state, no matter what the initial condition is. When a small number of nodes is
initially infected, the die-out probability is relatively large. In this section, we will
discuss the accuracy of NIMFA as an example. Previously, the accuracy of NIMFA
has been studied from a network topology viewpoint [12], but in this section, we
focus on the influence of the initial condition.
NIMFA [13] reduces the computation complexity of a Markovian epidemic pro-
cess by assuming independency between the state X j(t) of node j and the state Xk(t)
of node k, which closes the governing Eq. (1)
8
Qiang Liu and Piet Van Mieghem
dv j(t)
dt
= −d v j(t) + b
N(cid:229)
k=1
ak jvk(t) − b
N(cid:229)
k=1
ak jv j(t)vk(t)
(7)
where v j(t) denotes the NIMFA infection probability of node j at time t. The
NIMFA prevalence is similarly derived as
y(1)(t) =
1
N
N(cid:229)
j=1
v j(t)
(8)
The NIMFA prevalence y(1)(t) decreases exponentially fast to 0 when the infection
rate is below the NIMFA threshold t ≤ t (1)
. If the initial condition y(1)(0) 6= 0,
c
the NIMFA prevalence y(1)(t) converges to a non-zero value when t > t (1)
, which
c
is proved in [5]. Thus, NIMFA is conditioned to the case where the virus in the
epidemic process will not die-out, and the absorbing state is removed when y(1)(0) 6=
0. Based on (6), we propose an approximate virus surviving probability function at
the time t as
f (t) = 1 −
1
xn +
1
xn e−l 1t
(9)
Equation (9) is motivated as follows. At time t = 0 and y(1)(t) 6= 0, the virus surviv-
ing probability is 1 and f (0) = 1, because a curing event happens with zero proba-
bility, when the time interval is 0. Next, simulations seem to indicate that the virus
die-out probability decreases exponentially fast to 1/xn in metastable state with a
rate l 1.
To incorporate the die-out, the NIMFA prevalence can be corrected by applying
(3)
y(t) ≈ y(1)(t) f (t)
(10)
Figure 3 presents the prevalence and the approximation (10) of the SIS epidemic
process in the complete graph K50 and the random generated ER graph in Sec 3.2.
Starting from one or two infected nodes, NIMFA fails to predict the prevalence. The
steady state of NIMFA is independent of the initial conditions. Fortunately, (10)
seems a good approximation at the initial stage of the SIS epidemic process.
4 Conclusion
In this paper, we discuss the virus die-out probability, which is the probability that
the SIS Markovian epidemic process reaches the absorbing state. The importance of
the virus die-out probability lies in that it connects the virus spreading phenomena
omitting die-out and the exact Markovian model with an absorbing state. Further-
more, we propose an approximate formula (6) of the virus die-out probability, which
only contains three essential parameters: the largest eigenvalue of adjacency matrix
l 1 (the topology parameter), the effective infection rate t (the spreading ability pa-
rameter), and the number of initially infected node n (the initial condition parame-
Die-out Probability in SIS Epidemic Processes on Networks
9
e
c
n
e
l
a
v
e
r
P
0.8
0.6
0.4
0.2
0.0
0
2 nodes
1 node
ER graph N=50 l 1=20.8521
Prevalence y(t)
NIMFA Prevalence y(1)(t)
y(1)(t)*f(t)
1
2
3
4
Normalized time t
(a) SIS epidemic process in ER graph with net-
work size N = 50. The effective infection rate is
t = 0.25
e
c
n
e
l
a
v
e
r
P
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
2 nodes
1 node
Complete graph K50
Prevalence y(t)
NIMFA prevalence y(1)(t)
y(1)(t)*f(t)
0
1
2
3
4
5
6
7
Normalized time t
(b) SIS epidemic in complete graph K50 with ef-
fective infection rate t = 0.06
Fig. 3 Comparison of NIMFA and the prevalence. The normalized time is the time scale when the
curing rate d = 1 and the prevalence is obtained by averaging 106 realizations.
ter). If a few nodes are infected, then formula (6) indicates that the virus will almost
surely cause a disease outbreak when the infection rate is above the threshold, irre-
spective of the network size N. However, the accuracy of formula (6) also depends
on the accuracy of the NIMFA epidemic threshold 1/l 1. Based on formula (6), an
approximate virus surviving probability function (9) is proposed. We also discuss
the correction for NIMFA.
Acknowledgements Q. Liu would like to thank the support from China Scholarship Council.
Appendix
In the gambler's ruin problem, the goal of the virus is to infect a certain number of
nodes and to successfully reach the metastable state. If the virus cannot achieve the
goal, the virus loses the game and dies out in the network. The analytic solution of
the gambler's ruin probability of a birth-and-process, which gives the probability m n
that the virus dies out before infecting all N nodes in a finite time starting from an
arbitrary number of infected nodes n, equals [10, p. 231],
m n =
(cid:229) N−1
k=n
1 + (cid:229) N−1
k=1
k
m=1
k
m=1
1
(N−m)t
1
(N−m)t
(11)
First, we evaluate the expression (11). Since
(cid:213)
(cid:213)
10
Qiang Liu and Piet Van Mieghem
k(cid:213)
m=1
1
(N − m)t =
(N − k − 1)!
(N − 1)!
1
t k
1
we have that
N−1
k(cid:213)
k=n
m=1
1
(N − m)t =
N−1
k=n
(N − k − 1)!
t k
(N − 1)!
Let j = N − k − 1, then 0 ≤ j ≤ N − n − 1 so that a change of variable results in
N−1
k=n
(N − k − 1)!
t k
1
t N−1
=
N−n−1
j!t j
j=0
Combining all yields (5), it is
m n =
j!t j
(cid:229) N−n−1
j=0
j=0 j!t j =
(cid:229) N−1
pN−n−1 (t )
pN−1 (t )
j!z j
which is a fraction of two polynomials of the type pm (z) = (cid:229) m
j=0 j!z j = 1 + z +
2!z2 + · · ·+m!zm with positive coefficients (all derivatives are positive). Thus, pm (z)
is rapidly increasing for z > 0 and possible real zeros are negative.
The ratio
( j−1)!z j−1 = jz of two consecutive terms in the polynomial pm (z) in-
dicates that, if jz > 1 holds for all 1 ≤ j ≤ m, the terms are increasing, while if
jz < 1 for all j, the terms are decreasing. Hence, if jt < 1 for all 1 ≤ j ≤ N − 1,
which is satisfied if t < 1
N−1 , then the terms in pN−1 (t ) as well as in pN−n−1 (t )
are decreasing and both pN−1 (t ) and pN−n−1 (t ) tend to each other so that m n → 1.
In the other case, for t > 1
N−1 and for sufficiently large N, the polynomial pN−1 (z)
will be dominated by the largest term and m n is approximately equal to
m n ≈
=
(N − n − 1)!t N−n−1
(N − 1)!t N−1
((N − 1)t )n(cid:0)1 − 1
If n << N, then we arrive at formula (6)
N−1(cid:1)(cid:0)1 − 2
N−1(cid:1) · · ·(cid:0)1 − n−1
N−1(cid:1)
=
(N − n − 1)!
(N − 1)!
1
t n =
1
1
(N − 1)(N − 2). . . (N − n)
1
t n
m n ≈
1
((N − 1)t )n
because x =
t
t (1)
c
= l 1t = (N − 1)t for the complete graph KN as l 1 (KN) = N − 1.
(cid:229)
(cid:229)
(cid:229)
(cid:229)
Die-out Probability in SIS Epidemic Processes on Networks
11
References
1. van de Bovenkamp, R.: Epidemic processes on complex networks: modelling, simulation and
algorithms. Ph.D. thesis, Delft University of Technology, The Netherlands (2015)
2. van de Bovenkamp, R., Van Mieghem, P.: Survival
time of the Susceptible-Infected-
Susceptible infection process on a graph. Physical Review E 92(3), 032,806 (2015). DOI
10.1103/PhysRevE.92.032806
3. Cator, E., Van Mieghem, P.: Susceptible-Infected-Susceptible epidemics on the complete
graph and the star graph: exact analysis. Physical Review E 87(1), 012,811 (2013). DOI
10.1103/PhysRevE.87.012811
4. Gillespie, D.T.: Exact stochastic simulation of coupled chemical reactions. The Journal of
Physical Chemistry 81(25), 2340 -- 2361 (1977). DOI 10.1021/j100540a008
5. Khanafer, A., Baar, T., Gharesifard, B.: Stability properties of infected networks with low
In: 2014 American Control Conference, pp. 3579 -- 3584 (2014). DOI
curing rates.
10.1109/ACC.2014.6859418
6. Li, C., van de Bovenkamp, R., Van Mieghem, P.: Susceptible-infected-susceptible model: A
comparison of N-intertwined and heterogeneous mean-field approximations. Physical Review
E 86(2), 026,116 (2012). DOI 10.1103/PhysRevE.86.026116
7. Pastor-Satorras, R., Castellano, C., Van Mieghem, P., Vespignani, A.: Epidemic processes
DOI
Reviews of Modern Physics 87(3), 925 -- 979 (2015).
in complex networks.
10.1103/RevModPhys.87.925
8. Sander, R.S., Costa, G.S., Ferreira, S.C.: Sampling methods for the quasistationary regime of
epidemic processes on regular and complex networks. arXiv:1606.00036 (2016)
9. Van Mieghem, P.: Decay towards the overall-healthy state in SIS epidemics on networks.
arXiv:1310.3980 (2013). ArXiv: 1310.3980
10. Van Mieghem, P.: Performance analysis of complex networks and systems. Cambridge Uni-
versity Press, Cambridge (2014)
11. Van Mieghem, P.: Approximate formula and bounds for the time-varying susceptible-infected-
Physical Review E 93(5), 052,312 (2016). DOI
susceptible prevalence in networks.
10.1103/PhysRevE.93.052312
12. Van Mieghem, P., van de Bovenkamp, R.: Accuracy criterion for the mean-field approximation
in susceptible-infected-susceptible epidemics on networks. Physical Review E 91(3), 032,812
(2015). DOI 10.1103/PhysRevE.91.032812
13. Van Mieghem, P., Omic, J., Kooij, R.: Virus Spread in Networks. IEEE/ACM Transactions on
Networking 17(1), 1 -- 14 (2009). DOI 10.1109/TNET.2008.925623
14. Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: an
In: 22nd International Symposium on Reliable Distributed Systems,
eigenvalue viewpoint.
2003. Proceedings, pp. 25 -- 34 (2003). DOI 10.1109/RELDIS.2003.1238052
|
1902.07432 | 1 | 1902 | 2019-02-20T07:26:55 | Seed Selection and Social Coupon Allocation for Redemption Maximization in Online Social Networks | [
"cs.SI"
] | Online social networks have become the medium for efficient viral marketing exploiting social influence in information diffusion. However, the emerging application Social Coupon (SC) incorporating social referral into coupons cannot be efficiently solved by previous researches which do not take into account the effect of SC allocation. The number of allocated SCs restricts the number of influenced friends for each user. In the paper, we investigate not only the seed selection problem but also the effect of SC allocation for optimizing the redemption rate which represents the efficiency of SC allocation. Accordingly, we formulate a problem named Seed Selection and SC allocation for Redemption Maximization (S3CRM) and prove the hardness of S3CRM. We design an effective algorithm with a performance guarantee, called Seed Selection and Social Coupon allocation algorithm. For S3CRM, we introduce the notion of marginal redemption to evaluate the efficiency of investment in seeds and SCs. Moreover, for a balanced investment, we develop a new graph structure called guaranteed path, to explore the opportunity to optimize the redemption rate. Finally, we perform a comprehensive evaluation on our proposed algorithm with various baselines. The results validate our ideas and show the effectiveness of the proposed algorithm over baselines. | cs.SI | cs | Seed Selection and Social Coupon Allocation for
Redemption Maximization in Online Social
Networks
Tung-Chun Chang∗‡, Yishuo Shi†, De-Nian Yang† and Wen-Tsuen Chen‡
∗Research Center for Information Technology Innovation, Academia Sinica, Taiwan
†Institute of Information Science, Academia Sinica, Taiwan
‡Department of Computer Science, National Tsing Hua University, Taiwan
9
1
0
2
b
e
F
0
2
]
I
S
.
s
c
[
1
v
2
3
4
7
0
.
2
0
9
1
:
v
i
X
r
a
Email: [email protected], [email protected], [email protected], [email protected]
Abstract -- Online social networks have become the medium for
efficient viral marketing exploiting social influence in information
diffusion. However, the emerging application Social Coupon (SC)
incorporating social referral into coupons cannot be efficiently
solved by previous researches which do not take into account the
effect of SC allocation. The number of allocated SCs restricts
the number of influenced friends for each user. In the paper,
we investigate not only the seed selection problem but also
the effect of SC allocation for optimizing the redemption rate
which represents the efficiency of SC allocation. Accordingly, we
formulate a problem named Seed Selection and SC allocation for
Redemption Maximization (S3CRM) and prove the hardness of
S3CRM. We design an effective algorithm with a performance
guarantee, called Seed Selection and Social Coupon allocation
algorithm. For S3CRM, we introduce the notion of marginal
redemption to evaluate the efficiency of investment in seeds
and SCs. Moreover, for a balanced investment, we develop a
new graph structure called guaranteed path, to explore the
opportunity to optimize the redemption rate. Finally, we perform
a comprehensive evaluation on our proposed algorithm with
various baselines. The results validate our ideas and show the
effectiveness of the proposed algorithm over baselines.
I. INTRODUCTION
Online social networks (OSNs), e.g., Facebook, Twitter,
have fostered efficient diffusion of information and advertise-
ment. Social influence [1] is the cornerstone of viral marketing
and draws a wide spectrum of research, such as influence
maximization (IM) [2] -- [16] (identifying the k seed users for
maximizing the total influence spread) and profit maximization
(PM) [17] -- [23] (maximizing the total benefit from influ-
enced users subtracted by the total expense). Recently, Social
Coupon (SC) [24], [25], emerges to incorporate social referral
into coupons [24], [25]. Real examples include Dropbox1,
which offers free space to a user that shares cost-effective deals
to Facebook friends. The user will acquire 500 MB free space
after any friend accepts the deal (up to 16 GB for each user).
Airbnb2 allows users to invite their Facebook friends to sign up
and completes the first trip, whereas $29 and $18 travel credits
will be rewarded to the invitee and the inviter (up to $5000 for
each user), respectively. Similarly, Booking.com3 encourages
social referral (up to 10 friends for each user). To efficiently
facilitate SC, new start-up companies (e.g., ReferralCandy and
Extole4) develop a customized SC system for e-commerce
websites of clients. However, SC has drawn much less research
attention, and currently the efficiency of SC is usually low
(0.8% and 15.9% for offline and online SC), because resources
are not properly allocated to valuable users [26].
The research of IM blossoms from Kempe et al. [2] that
introduced the basic formulation, propagation models and the
corresponding approximation algorithm, and many follow-up
studies improve the efficiency for massive social networks
[3] -- [16]. PM [17] -- [23] addresses the trade-off between the
seed cost and the benefit of influenced users. However, SC
is different to IM and PM due to the following reasons. 1)
For SC, not only the seeds but also the internal nodes in
an influence spread are required to be selected and allocated
resources. In contrast, IM and PM target on only the seeds. 2)
For SC, each internal node is associated with an SC constraint,
which limits the maximum number of friends that can be
referred and receive SC (i.e.,
influenced by SC and then
redeem it). For example, at most 32 (16 GB/500 MB) friends
can receive SC from each Dropbox user. On the contrary,
each internal node in IM and PM can influence an arbitrary
number of friends since no resource is allocated. Therefore,
the shape of a spread can be controlled more precisely by SC
(e.g., broader or deeper) by carefully selecting internal nodes
and allocating different resources to each of them. Moreover,
each internal node is more inclined to be activated due to the
reward from social referral.
In this paper, therefore, we make the first attempt to explore
seed selection with SC allocation. Simultaneously selecting
and allocating resources to both seeds and internal nodes raise
the following new research challenges. The first one is a benefit
and total cost trade-off between the benefit of influenced users
and the total cost of seeds and SCs. Unlike previous works,
SC needs to allocate difference resources to activate seeds
1https://www.dropbox.com/referrals
2https://www.airbnb.com/invite, https://www.airbnb.com/help/article/2269/
airbnb-referral-program-terms-and-conditions
3https://www.booking.com/content/referral-faq.en-gb.html
4https://www.referralcandy.com, https://www.extole.com
directly and internal nodes through SCs. It is important to
carefully examine the benefit of activating users by SCs or
delegating them as seeds. The second one is investment trade-
off between the investment in seeds and internal nodes due
to a limited budget. Seeds start the influence spread while
internal nodes sustain it, and the activation of seeds is usually
more expensive. Thus, it is important to carefully allocate the
resource to derive an efficient spread. The third one is SC
allocation trade-off between allocating SCs to users near seeds
and users with high benefit but far from seeds. Allocating SCs
to users near seeds can strengthen the influence spread from
its root, i.e., increase the number of expected redeemed SCs,
while allocating SCs to high benefit users can improve the
efficiency of the investment.
To address the above challenges, we formulate a new
optimization problem, named Seed Selection and SC alloca-
tion for Redemption Maximization (S3CRM). In contrast to
selecting only seeds to maximize the influence [2] -- [16] or
profit [17] -- [23], S3CRM aims to select seeds and internal
nodes and allocate SCs to users such that the redemption rate
is maximized. The redemption rate is the ratio of the expected
benefit of influenced users to the total cost (i.e., the sum of
seed cost and SC cost). It is important to choose a proper seed
set and internal nodes to start and shape the influence spread.
Moreover, it is crucial to balance the investment in seeds and
SCs, and meanwhile the total cost must be ensured within the
investment budget.
We first prove the NP-hardness for S3CRM and then devise
an approximation algorithm, named Seed Selection and SC
allocation Algorithm (S3CA). For the benefit and total cost
trade-off, S3CA introduces marginal redemption to measure
the extra benefit obtained by activating a seed or allocating
an SC. For investment trade-off, S3CA deploys the resource
by iteratively investing a new seed or an SC to an acti-
vated user with the highest marginal redemption to balance
the investment in seeds and SCs. For SC allocation trade-
off, S3CA first constructs guaranteed paths to identify all
possibly influenced inactive users for each seed under the
budget constraint. Moreover, S3CA introduces amelioration
index and deterioration index to evaluate the improvement and
deterioration of the maneuver of the previous deployed SCs
to optimize the redemption rate. Finally, we evaluate S3CA
with real datasets, and the simulation results show that S3CA
can effectively improve the redemption rate up to 30 times
comparing to the baselines.
The rest of this paper is organized as follows. Section II
reviews the related works. The problem formulation and the
hardness analysis are given in Section III. We present the
algorithm design in Section IV, and the performance analysis
is described in Section V. The experimental results are shown
in Section VI. Finally, Section VII concludes this paper.
II. RELATED WORK
Influence maximization focuses on the pinpoint of the k
most influential users in an OSN, and the identified users
are delegated to start the influence propagation. The studies
of influence maximization blossom from Kempe et al. [2]
introducing the basic formulation and propagation models.
Furthermore, submodularity exhibits when the influence dif-
fuses with the models, and thus they proposed a (1 − 1/e) --
approximation algorithm. After the algorithm is proposed,
many studies followed up to improve the efficiency [3] -- [16]
for massive OSNs. However, these works are not applicable
to the SC scenario since they consider only seed selection
without the SC allocation of internal nodes.
Tang et al. [17] state that the optimal profit cannot be
derived from influence maximization since the influential users
are probably expensive for activation, which results in a trade-
off between the expense and the benefit of propagation. Thus
profit maximization emerges, and profit is defined as the ben-
efit from influenced users subtracted by the cost of activating
seeds in [17]. Tang et al. [18] take the cost of activating non-
seed users into consideration, which is a constant number for
each user. However, it is not applicable to the SC scenario
where the cost of non-seed users depends on the number
of their allocated SCs. Zhu et al. [19] and Zhang et al.
[20] find the profits of activating users for the competitive
environment and multiple products, respectively. Khan et al.
[21] formulated a revenue maximization problem from the
perspective of the host of OSNs. Furthermore, Lu et al. [22]
and Zhu et al. [23] maximize the profit, where people are
not influenced unless the price meets their expectation. These
works [19] -- [23] are complementary to S3CRM.
III. OSN MODEL AND PROBLEM FORMULATION
For the SC scenario, independent cascade (IC) model5 [2] is
extended by imposing an SC constraint to each user as follows.
The influence propagation starts from the selected seeds, and
then the seeds switch to the active state and try to activate
their friends with the influence probability. Moreover, for each
vi ∈ V , the maximum number of activated friends is restricted
by the SC constraint (i.e., no more than ki). The activation
starts from the friend with the highest to the lowest influence
probability, since in reality the friend with the highest influence
probability is most likely to redeem the SC. Each user can be
activated only once, and the activation process stops when no
more user can be activated.
For convenience, we have summarized all notations in
Table I. The definitions of notations are explained as fol-
lows. Users V of the OSN and their relationships E form
a weighted directed graph G = {V, E}, where each edge
e(i, j) ∈ E between vi and vj ∈ V has a weight P (e(i, j)),
and b(vi), cseed(vi), and csc(vi) are the benefit, seed cost,
and SC cost of vi, respectively. ki ∈ [0,N (vi)] ∈ N is
the SC constraint for each vi, where N (vi) is the number
of vi's friends. Moreover, S and I are the seed set and
the internal node set, respectively. K(I) = {ki∀vi ∈ I}
is the SC allocation. Let Cseed(S) be the total cost of S.
vi∈I,vj∈N (vi) E[ki, csc(vj)], where vj
is vi's friend with the j-th highest influence probability and
Let Csc(K(I)) = (cid:80)
5Since the SC is usually redeemed solely, the linear threshold is not suitable.
TABLE I
NOTATIONS OF S3CRM AND S3CA
is formulated as follows.
)
Notation in Problem
N (vi)
cseed(vi), csc(vi), b(vi)
ki ∈ [0, N (vi)] ∈ N
S ⊂ V , I ⊂ V
K(I) = {ki∀vi ∈ I}
Cseed(S), Csc(K(I))
E[Ki, csc(vj )]
B(S, K(I))
E[S, K(I), b(vi)]
Binv
Notation in Algorithm
τ vi,γi
S, I
g(s, vi)
U l
s
K(I) (cs,vl
i
Ia(g(s, vi))
m (M)
∆vj (k)
Id(∆vj (k))
βm,M∗
g(s,vi) (B,C)
δK
bM
j
Bm,M
g(s,vi) (Cm,M
g(s,vi))
Notation in Proof
V k
b
cref , Copt
C1 (C2)
Csort
eref (ec)
b0 (c0)
e∗
t
O(M )
(cM
j )
Definition
number of vi's friends (out-neighbors)
seed cost, SC cost, benefit of vi
SC constraint of vi
seed set, internal node set
SC allocation
total seed cost, expected SC cost of K(I)
expected SC cost (vi distributes an SC to vj)
expected benefit of the influence propagation
expected benefit of vi with S and K(I)
investment budget
Definition
MR of selecting vi as seed (allocate coupon)
the GP from seed s to user vi
l-th level set of visited siblings from seed s
SC allocation (cost) for each g(s, vl
i)
marginal ratio of g(s, vi)
single (set) maneuver operation
retrieve k SCs from vj
ratio of benefit loss to retrieved SC cost
the maneuver (benefit,cost) gap
difference of total allocated SCs number
denote the benefit (cost) gain based on M
benefit (cost) gap after m maneuver operation
Definition
top k highest influence users in Vb
reference cost, optimal cost set
the first (second) largest cost in Copt
sorted cost set from the smallest to the largest
reference (corresponding candidate) edge set
ratio of benefit (cost) variation of users.
maximum benefit edge of OP T
time of evaluating the expected benefit
E[ki, csc(vj)] is the expected SC cost to distribute an SC to
vj. If j ≤ ki, E[ki, csc(vj)] = csc(vj)P (e(i, j)); otherwise
j > ki, E[ki, csc(vj)] = csc(vj)P (e(i, j))P ( ¯ki) , where
P ( ¯ki) is the probability that at most ki − 1 friends vj ∈
(cid:80)
N (vi), j < j success to redeem the SC. Let B(S, K(I)) =
vi∈I E[S, K(I), b(vi)] be the expected benefit of the in-
fluence propagation, where E[S, K(I), b(vi)] is the expected
benefit of vi with the seed set S and SC allocation K(I).
Finally, the investment budget is Binv.
Consider Dropbox as an example. Users distribute SCs (post
the invite link) to their Facebook friends. Once a friend vi
receives the SC (installs Dropbox through the link), 500 MB
of free space is rewarded (i.e., csc(vi)). For each vi ∈ V , the
maximum number of friends receiving the reward is restricted
by the number of allocated SCs (i.e., ki = 32).
S3CRM problem:
Given an OSN, a propagation model, and the benefit, SC
cost, and seed cost for each user, S3CRM is to identify of
a seed set S, the internal node set I, and the SC allocation
K(I), to maximize the redemption rate, which is the ratio of
the benefit from activated users to the sum of seed costs and
SC costs, under an investment budget constraint Binv. S3CRM
arg max
S⊂V,I⊂V,K(I)
B(S, K(I))
Cseed(S) + Csc(K(I))
,
(1a)
subject to
Cseed(S) + Csc(K(I)) ≤ Binv.
(1b)
The redemption rate has been widely adopted as an effective
measure for coupons in marketing research [25], [26], because
the redemption rate considers not only the total benefit but
also the marginal benefit of the budget (e.g., the additional
benefit to spend the last 10% budget). Considering a simple
example G = (V, E) with two vertices, where V = {u, v},
E = ∅, and Binv = 1. For the two users, coupon costs are
cseed(u) = and cseed(v) = 1 − , and the benefit for them
are 1 − and , respectively, where is an arbitrarily small
constant. The maximum benefit is 1 by selecting both vertices,
but the maximum redemption rate is 1−
by choosing only u
as the seed. User v is not selected since the additional benefit
generated by choosing v is tiny, but a large budget (i.e., 1− )
is required. Therefore, the redemption rate is widely adopted
by marketing research to achieve the best performance/cost
ratio.
Special cases: We first give two commonly used coupon
strategies, and then we show the strategies and IM are special
cases of S3CRM as follows. 1) Limited coupon strategy is
applied by Dropbox, Airbnb, Booking.com, etc., where ki of
each user is an identical constant number, e.g., ki = 32 with
Dropbox. Thus, it is a special case of S3CRM with a prede-
termined SC allocation K(I), which selects only seeds under
the remaining budget (i.e., Binv − Csc( K(I))). 2) Unlimited
coupon strategy allocates unlimited SCs to users, which im-
plies that the SC cost is marginal (i.e., csc(vi) = 0, ∀vi ∈ V ),
and is adopted by Uber6, Lyft7, and Hotel.com8. Thus, it is a
special case of S3CRM, which is arg maxS⊂V
Cseed(S), such
that Cseed(S) ≤ Binv. Since the SC constraint is removed,
the propagation model reduces to the IC model. Similarly, IM
is a special case of S3CRM with the SC cost equals to 0 and
the SC constraint is unlimited for each user (detail later).
Comparison example: Fig. 1 compares IM, PM, and S3CRM
with the default parameters (not presented in the figure) as
follows. For each user vi, both cseed(vi) and csc(vi) are 1,
and b(vi) = 3. The investment budget Binv is 3.5. Moreover,
for the results, the users allocated with SCs and the users
within the influence spread are marked in yellow and green,
respectively. Since IM and PM do not consider SC allocation,
unlimited coupon strategy is applied. For simplicity, we restrict
the example of selecting only one seed and allocating two SCs.
Fig. 1(a) shows the result of IM applying unlimited coupon
strategy. For selecting v3 as a seed (i.e., k3 = N (v3) = 2),
the expected benefit is 3 + 3∗ 0.7 + 3∗ 0.5 = 6.6 and the total
B(S)
6https://help.uber.com/h/27ecd6af-4929-4c53-a81c-f9fbf2432fd4
7http://get.lyft.com/invites
8https://refer.hotels.com/friends/us?traffic source=mWebHP
i ∈ Vb and va
b ∈ Va, let b(vb
i ∈ Vb, vb
i connects to only the counterpart va
S3CRM. The special case is given as follows. For the OSN
G = {V, E}, the set of users V = {vu ∪ Va ∪ Vb} includes an
unique user vu and two identical set of users Va and Vb. For
i ∈ Va
each user vb
with the weight of 1. Let V k
b denote the set of users in Vb, who
have the top k highest influence. The unique user vu connects
to each user in V k
b with a weight of 1. The seed cost of vu is k
while the seed costs of users in Va and Vb are arbitrarily large,
i ∈
and thus vu is the only candidate of seed. For each user vb
i ) = ε, where ε is an arbitrarily small constant. For
Vb, let csc(vb
i ∈ Va, let csc(va
i ) = 0 which implies that if the
each user va
counterpart vb
i is activated by vu, it is activated simultaneously,
and then the influence spread of users in Va is unlimited by
the SC constraint (reduces to the IC model). Let b(vu) = ε,
and for each user vb
i ) = 0 and
i ) = 1, respectively. Moreover, let Binv = k + kε, which
b(va
implies that the seed vu can be allocated with at most k SCs.
For the solution of the special case, the seed set S = {vu}
and the internal node set I = {vu ∪ Va ∪ V k
b }, where vu is
allocated with k SCs (i.e., ku = k) while the users in Va have
no SC constraints. Thus, the expected benefit is not less than ε
(i.e., benefit of the seed b(vu)) and the total cost ranges from
k to k + kε (i.e., from seed cost of vu to Binv). Furthermore,
the special case can be reduced to IM as follows. Given a IM
with the OSN G(cid:48) = {V (cid:48), E(cid:48)}, where V (cid:48) = {Va ∪ V k
b } and E(cid:48)
is the set of edges between users in V (cid:48), and the seed size of k.
For any feasible solution of the special case (i.e., S and I), V k
b
is a feasible solution of the IM problem. On the other hand,
let V denote the seed set selected by solving the IM problem.
For any feasible solution of the IM problem, V = V k
b since
vu connects the top k influential users, and thus we can derive
a feasible solution of the special case.
For the objective function, the expected benefit derived from
the IM problem is slightly less than the expected benefit from
the special case by ε, which is negligible. Likewise, the total
cost of the special case is approximately equal to k (i.e.,
k + kε ≈ k) since the SC cost of users in Vb is negligible.
Therefore, the special case can be reduced to IM. Furthermore,
IM is as hard as maximum k -- cover problem by the reduction
that setting all influence probability to 1 of IM. Hence, S3CRM
is as hard as the maximum k -- cover problem and the hardness
is 1 − 1/e + ε [27].
IV. ALGORITHM DESIGN
To effectively solve S3CRM, we design an approximation
algorithm, namely Seed Selection and SC allocation Algorithm
(S3CA). In contrast to IM [2] -- [16] and PM [17] -- [23] focusing
on solely seed selection and ignoring the SC allocation,
S3CA introduces the notion of Marginal Redemption (MR)
to prioritize the investment in seeds and allocating SCs to
users. For each user, MR represents the ratio of the expected
benefit gain to the expected cost gain after activated as a
seed or allocated with an extra SC, and therefore a user with
a larger MR receives the investment (seed or SC) first. To
address the investment trade-off, S3CA deploys the investment
Fig. 1. A simple example comparing three different methods. (a) Result of
IM with unlimited coupon strategy. (b) Result of PM with unlimited coupon
strategy. (c) Result of S3CRM.
cost is Cseed(v3) + Csc(k3) = 1.5 + (1 ∗ 0.7 + 1 ∗ 0.5) = 2.7.
For v1 and v2 as a seed,
the expected benefits are 6.15
and 4.68, and the total costs are 2.05 and 2.1, respectively.
Thus IM allocates two SCs to the selected seed v3 with the
maximum expected benefit (i.e., 6.6) and the redemption rate
is 6.6/2.7 = 2.45. Fig. 1(b) is the result of PM applying
unlimited coupon strategy. For v1 as a seed, the profit is
derived by the expected benefit minus the seed cost (i.e.,
(3 + 3 ∗ 0.55 + 3 ∗ 0.5) − 1 = 5.15). For v2 and v3 as a
seed, the profit are 3.68 and 5.1, respectively, and the total
costs are the same as IM. Thus, PM allocates two SCs to the
selected seed v1, which results in the maximum profit, and the
redemption rate is 6.15/2.05 = 3.
Fig. 1(c) shows the result of S3CRM. For selecting v1 as
a seed, the remaining budget (i.e., Binv − cseed(v1) = 2.5)
is invested with three cases as follows: 1) Allocating two
SCs to v1. The expected benefit and the total cost are
3 + 3∗ 0.55 + 3∗ 0.5 = 6.15 and 1 + (1∗ 0.55 + 1∗ 0.5) = 2.05,
respectively, and the redemption rate is 6.15/2.05 = 3. 2)
Allocating one SC to each of v1 and v2. The expected benefit
and the total cost are 5.46 and 1.975, respectively. Note
that, since k1 = 1, the probability of activating v2 becomes
(1 − 0.55) ∗ 0.5 (i.e., v4 fails to redeem the SC) and we call
e(1, 2) a dependent edge (marked in red) while others indepen-
dent edge. Thus, the redemption rate is 5.46/1.98 = 2.76. 3)
Allocating one SC to each of v1 and v4. The expected benefit
is 8.295 and the total cost is 2.675, and thus the redemption
rate is 8.295/2.675 = 3.1. The allocation process iteratively
calculates the redemption rate by assuming users as seeds.
The final result is selecting seed v1 and allocating SCs by
{k1 = 1, k4 = 1} with the maximum redemption rate 3.1.
Fig. 1 shows that S3CRM derives the best redemption rate
by carefully examining all possible combinations of seeds and
SC allocation. Note that though cseed(v4) = cseed(v5) > Binv
(i.e., v4 and v5 never become a seed), S3CRM can reap the
highest benefit among users (i.e., b(v5)) through allocating an
SC to v4 while IM and PM fail to activate v5.
Theorem 1. S3CRM is NP-hard and can not be approximated
within 1 − 1/e + ε, where ε is an arbitrarily small constant.
Proof. We first give a special case of S3CRM, and then prove
that it can be reduced to IM, which derives the hardness of
Fig. 2. Reduction of S3CRM to IM
by carefully examining the MR for three strategies as follows:
1) broadening the current influence spread, 2) deepening the
current influence spread, and 3) initiating a new source (seed)
of the influence spread.
To address the SC allocation trade-off, S3CA introduces
the notion of Guaranteed Path (GP) to identify the users
with high benefit but receiving no resources (not activated)
from the previous deployment. For each user in a GP, the
SCs are always sufficient for distribution to ensure the highest
activation probability (i.e., no dependent edge) and improve
the redemption rate. To evaluate the possible improvement
for each GP, S3CA introduces Amelioration Index (AI) and
Deterioration Index (DI), which are the ratio of improved and
decreased expected benefit to the allocated and retrieved SC
cost. Then, S3CA can maneuver the investment in SCs to
optimize the redemption rate by examining AI and DI.
S3CA includes three phases: 1) Investment Deployment
(ID), 2) Guaranteed Paths Identification (GPI), and 3) SC
Maneuver (SCM). For the investment trade-off, ID exploits
MR to iteratively deploy the investment by adopting the
strategy with the highest MR. GPI continues to identify the
GPs of inactive users with high benefit. Based on the derived
GPs, SCM carefully examines the opportunity to maneuver the
SCs allocated to users in the ID phase to create a new spread,
such that the redemption rate is optimized.
A. Algorithm Description
1) Investment Deployment (ID): ID first deploys the invest-
ment in seeds and internal nodes under the investment budget
by three strategies as follows: 1) activating the source (seed)
of a new influence spread, 2) allocating an SC to a user to
broaden the current influence spread; meanwhile, enhancing
the influence probability by changing an edge from dependent
to independent (e.g., by allocating an SC to v1 in Fig. 1(c),
the influence probability improves 27.5%), and 3) allocating
an SC to the user in the end of the current influence spread to
deepen the spread. Nonetheless, previous works (IM [2] -- [16]
and PM [17] -- [23]) includes no such subtle manipulations of
influence spreads.
S3CA introduces pivot source for the evaluation of invest-
ment in seeds and SCs, which is derived as follows. For each
user, ID calculates the MR (detailed later) of the nodes selected
Fig. 3. Results of the example of ID. (a) Iteration 1. (b) Iteration 2. (c)
Iteration 3. (d) Iteration 4.
as a seed or allocated with an SC after becoming a seed
(i.e., updating Ki to 1), and it then iteratively applies the
one with the maximum positive MR. Once a user is selected,
it is included in a priority queue Q (sorted by redemption
rate). Moreover, when an SC is allocated to a seed in Q, the
redemption rate is updated. The process stops when all MR
becomes negative or all users are included in Q. Afterward, vi
is popped from Q as the initial of the influence spread, and it
is then included to the candidate seed set S and the candidate
internal node set I (if Ki = 1). Moreover, { S, I, K( I)} is
included in the candidate deployment D. ID further pops vp
from Q as the pivot source for the comparison of the MR of
allocating an SC to users.
For the investment trade-off, ID iteratively examines the
MR of allocating an SC to users (strategy 2 and 3) and the
redemption rate of the pivot source vp (strategy 1). If the user
vi has the maximum MR larger than the redemption rate of vp,
ID invests an SC in vi (i.e., increases Ki by 1) and includes
vi in I if vi /∈ I; otherwise, ID initiates a new source vp and
includes vp in S and I, and it pops the next pivot source from
Q. In each iteration, D includes the current deployment { S,
I, K( I)}. The process stops when the total cost exceeds the
investment budget Binv, and the final deployment of ID is
D∗ ∈ D with the highest redemption rate. Specifically, let γi
denote the binary variable (initialized as 1) indicating that if a
user vi is selected as seed for the first time, γi = 1; otherwise,
γi = 0. If γi = 1, MR of selecting vi as a seed is defined as
= B( S∪vi,K( I))−B( S,K( I))
τ vi,γi
; otherwise, MR of allocating
Cseed( S∪vi)−Cseed( S)
S, I
= B( S,K( I∪vi))−B( S,K( I))
an SC to vi is defined as τ vi,γi
.
Csc(K( I∪vi))−Csc(K( I))
S, I
Note that when vi ∈ I, K( I ∪ vi) is different from K( I)
since Ki is increased by 1.
Example 1. Fig. 3 presents an example of ID with the input
setting as follows. For each user vi, b(vi) = csc(vi) = 1,
and cseed(vi) ≈ ∞ except that cseed(v1) ≈ 0. The dependent
edges are marked in red. Since the only possible seed is v1,
the queue Q contains only v1, and the influence starts from
v1 allocated with an SC. The expected benefit and cost are
approximately 1 + (1 ∗ 0.6 + 1 ∗ (1 − 0.6) ∗ 0.4) = 1.76 and
0 + 1∗ 0.6 + 1∗ (1− 0.6)∗ 0.4 = 0.76, respectively. In the first
iteration, the expected benefit gains of allocating an SC to v1
(K1 = 2), v2 (K1 = 1, K2 = 1), and v3 (K1 = 1, K3 = 1)
are (1 + 1∗ 0.6 + 1∗ 0.4)− 1.76 = 0.24, (1 + 1∗ 0.6 + 1∗ (1−
0.6)∗0.4+1∗0.6∗0.5+1∗0.6∗(1−0.5)∗0.4)−1.76) = 0.42,
1 + 1∗ 0.6 + 1∗ (1− 0.6)∗ 0.4 + 1∗ (1− 0.6)∗ 0.4∗ 0.8 + 1∗
(1 − 0.6) ∗ 0.4 ∗ (1 − 0.8) ∗ 0.7) − 1.76 = 0.15, respectively.
Moreover, the expected cost gains of allocating an SC to v1
(K1 = 2), v2 (K1 = 1, K2 = 1), and v3 (K1 = 1, K3 = 1)
are (1 ∗ 0.6 + 1 ∗ 0.4) − 0.76 = 0.24, (1 ∗ 0.6 + 1 ∗ (1 −
0.6) ∗ 0.4 + 1 ∗ 0.5 + 1 ∗ (1 − 0.5) ∗ 0.4) − 0.76 = 0.7, and
(1 ∗ 0.6 + 1 ∗ (1 − 0.6) ∗ 0.4 + 1 ∗ 0.8 + 1 ∗ (1 − 0.8) ∗ 0.7) −
0.76 = 0.94, respectively. Thus, MR of allocating an SC to v1
(K1 = 2), v2 (K1 = 1, K2 = 1), and v3 (K1 = 1, K3 = 1)
are 0.24/0.24 = 1, 0.42/0.7 = 0.6, and 0.15/0.94 = 0.16,
respectively, and the SC is allocated to v1 with the maximum
MR. Fig. 3(a) shows the result of the first iteration and the
result of the following iterations are shown in Fig. 3.
Fig. 3 presents the subtle manipulation of the influence
spread by S3CA with the investment
in seeds and SCs,
which cannot be accomplished by previous works [2] -- [23].
IM [2] -- [16] selects the most influential user v3 as the seed.
However, the seed cost cseed(v3) is not considered and can be
arbitrarily large. Although PM [17] -- [23] takes the seed cost
into consideration, it cannot decide the user (e.g., v2 or v3
in Fig. 3(a)) to allocate SCs (even applying existing coupon
strategies), and it may result in a miserable redemption rate.
2) Guaranteed Paths Identification (GPI): For the SC allo-
cation trade-off, GPI constructs the Guaranteed Paths (GP) to
identify the inactive but possibly influenced users based on the
result of ID D∗ = {S∗, I∗, K(I∗)}. For each seed s ∈ S∗,
the possibly influenced inactive users are restrained by the
remaining budget (i.e., subtracting the investment budget by
the seed cost). Moreover, for the GP to a possibly influenced
inactive user, all edges are independent edges to guarantee the
highest influence probability. Nonetheless, existing strategies
like unlimited and limited coupon strategies cannot identify
these users, and it thereby tends to influence those with high
benefits.
For each seed s ∈ S∗, GPI constructs the GP g(s, vi) from
s to each possibly influenced inactive user vi as follows. GPI
first marks s as visited, and it then traverses the descendants
of s in DFS manner. For each visited node, the traversal
starts from its child with the highest to the lowest influence
probability. When a user vi
is visited, GPI includes the
following nodes in a temporary set g, including the visited
siblings of both vi and vi's ascendants. It then sets c as the
total expected SC cost of all users in g. If c ≤ Binv−cseed(s),
1) g(s, vi) is set to g with a guaranteed cost cs,vi = c, 2) for
each user vj in g, Kj is set to the number of visited children
(i.e., each user could receive an SC), 3) it updates the expected
benefit bs,vi, and 4) GPI proceeds to traverse vi's children.
Otherwise, GPI stops traversing vi's children and unvisited
siblings (i.e., siblings with influence probability lower than
vi's), and it traverses back to the next sibling of vi's parent
(i.e., the sibling next to vi's parent in the descending order of
influence probability). The process stops when no more user
can be visited (i.e., c > Binv − cseed(s)).
More specifically, for each user vl
in the l-th level, let
i
U l
s denote the set of visited siblings in the l-th level before
visiting vl
i by the traversal starting from a seed s. A guaranteed
Fig. 4. Examples of guaranteed paths. (a) g(v1, v7). (b) g(v1, v13). (c)
g(v1, v15)
.
is g(s, vl
i
the path). For each node,
i) = {vj∀vj ∈ U l
i), let K(I) = { Kj∀vj ∈ g(s, vl
s, l ≤ l}.
path from s to vl
i)} denote
i
For each g(s, vl
its SC allocation, where Kj is the SC constraint of vj in
i). Moreover, Kj equals to the number of vj's visited
g(s, vl
= Csc( K(I)) (i.e.,
children, and the guaranteed cost is cs,vl
the expected SC cost that each user in g(s, vl
i) could receive
an SC).
Example 2. Fig. 4 presents three examples of GP, and
the GPs are marked in blue and yellow
the users of
(end of
the children on the
left side has a higher influence probability. In Fig. 4(a),
g(v1, v7) = {v1, v2, v4, v5, v6, v7}, and Fig. 4(b) and 4(c)
present g(v1, v13) and g(v1, v15), respectively. Moreover, the
expected benefit of a GP involves not only the visited users
but also the users connected by the dependent edges (marked
in green). GP is a novel structure specially designed for the
SC environment, which is not included in the previous works
[2] -- [23]. GP can identify the possibly influenced inactive users
with high benefits and then guide the influence spread for
reaping the benefits. However, existing coupon strategies (lim-
ited and unlimited) cannot obtain the benefits since they either
apply over-simplified methods or ignore the SC allocation.
3) SC Maneuver (SCM): To optimize the redemption rate,
SCM examines the opportunity to maneuver the allocated
SCs (i.e., K(I∗)) for creating new spreads based on the
derived GPs P. SCM introduces Amelioration Index (AI) and
Deterioration Index (DI) to evaluate the amelioration and the
deterioration of redemption rate by allocating and retrieving
SCs, respectively. For each g(s, vi) ∈ P, AI Ia(g(s, vi)) is the
ratio of the expected benefit gains Ba(g(s, vi)) to the expected
SC cost of the allocated SCs Ca(g(s, vi)). For retrieving k SCs
from vj, DI Id(∆vj (k)) is the ratio of the expected benefit loss
to the expected SC cost of the retrieved SCs. Let m and M
denote a maneuver operation and a set of maneuver operations
(detailed later). To evaluate the efficiency of maneuvering
SCs, SCM introduces Maneuver Gap (MG) βm,M
g(s,vi) which is
the ratio of the benefit gap to the cost gap. The benefit gap
Bm,M
g(s,vi) and the cost gap C m,M
g(s,vi) are the difference between
the expected benefit gain and the expected SC cost before and
after including m in M. Equipped with the above notions,
S3CA can examine the improvement of creating each GP,
the debasement of redemption rate by retrieving SCs, and
the efficiency of maneuvering SCs, whereas these fine-grained
operations are not considered in the previous works [2] -- [23].
i ∈K K j
i ∈K K j
∀K∈M∗,∀Kj
∀K∈M∗,∀Kj
When (cid:80)
i vi, vj ∈ V } (e.g., K j
neuvered SCs(cid:80)
SCM calculates Ia(g(s, vi)) for each g(s, vi) ∈ P. From
the largest to the smallest Ia(g(s, vi)), if 1) its guaranteed cost
cs,vi does not exceed the total invested SC cost Csc(K(I∗))
and 2) vi cannot be activated by D∗ (Kp ∈ K(I∗) = 0, where
vp is vi's parent), SCM then determines whether to create
g(s, vi) as follows. Let vi∗ and δK denote the nearest possibly
activated ascendant of vi by D∗ and the difference between
the total number of SCs allocated in g(s, vi) and g(s, vi∗ ),
respectively. Let M∗ denote the set of maneuver operations,
where a maneuver operation m includes a DI Id(∆vj (k)),
maneuver mapping K = {K j
i = 3
represents maneuvering 3 SCs from vj to vi), the index of the
last user with SCs maneuvered. If the total number of the ma-
i < δK, SCM calculates the
DIs of all vj ∈ I∗ and derives a set of corresponding maneuver
operations M. From the maneuver operation m ∈ M with the
smallest to the largest DI Id(∆vj (k)), if Id(∆vj (k)) < βm,M∗
and the redemption rate is improved by K ∈ m, SCM includes
m in M∗ and proceeds to find the next maneuver operation. If
Id(∆vj (k)) ≥ βm,M∗
g(s,vi) or the redemption rate is not improved,
SCM skips this GP and proceeds to examine the next GP.
i = δK, g(s, vi) is created based
on M∗. The process ends after all GPs in P are examined.
SCM evaluates the DIs and derives the set of corresponding
maneuver operations as follows. Let Kj and Kj denote vj's
SC allocation of K(I∗) and g(s, vi), respectively. For each
vj ∈ I∗, if it has spare SCs for creating g(s, vi) (i.e., Kj >
Kj), SCM calculates DIs by retrieving all possible numbers k
of SCs (1 ≤ k ≤ Kj− Kj), as opposite to the derivation of MR
(i.e., retrieving instead of adding SCs). Let i∗ denote the index
of user whom SCM maneuvers SCs to, which starts from the
nearest possibly activated ascendant of vi. Let S denote the
M∗ (i.e., (cid:80)
sum of SCs already maneuvered to v i∗ according to the current
i∗, where K is the union of all K ∈ M∗).
SCM builds the maneuver mapping K by splitting the k SCs
to v i∗ and his descendants starting from v i∗. First, SCM sets
i∗ = K i∗−(K i∗ +S) (the number of SCs required for filling
K j
v i∗'s SC allocation to K i∗) if k is large enough. Otherwise,
i∗ = k. Then if the total cost after retrieving K j
K j
i∗ SCs of vj
i∗ is included in K. If the number
to v i∗ is less than Binv, K j
of remaining SCs ∆k > 0, SCM moves to the next target
(i.e., set i∗ to the index of v i∗'s child with SCs in g(s, vi)).
When the mapping of k SCs are determined (i.e., ∆k = 0),
the maneuver operation {Id(∆vj (k)),K, i∗} is included in the
candidate maneuver operation set M. The process stops when
all possible vj are examined.
j∈ K K
j
g(s,vi)
Fig. 5. Example of a maneuver operation. (a) K1 = 2, K2 = 2, and K3 = 1.
(b) g(v1, v15). (c) g(v1, v4)
the result of Fig. 3(d) attached with two high benefit (50 for
each) but inactive users v14 and v15 with low SC costs. Fig.
5(b) is g(v1, v15) with bv1,v15 = 10.41 and cv1,v15 = 2.66,
whereas Fig. 5(c) presents g(v1, v4) with bv1,v4 = 2.18
and cv1,v4 = 1.46. The largest AI is Im(g(v1, v15)) =
Bm(g(v1, v15))/Cm(g(v1, v15)) = 8.23/1.2 = 6.86, and the
cost of g(v1, v15) is less than the total cost derived from ID
(i.e., 2.66 < 2.84). In the first iteration, the sorted DIs are
Id(∆v3 (1)) = 0.38/0.94 = 0.4, Id(∆v2 (1)) = 0.12/0.2 =
0.6, and Id(∆v1 (1)) = 0.47/0.24 = 1.94, and thus the
only SC of v3 is maneuvered to v4. Then, in the second
iteration, the sorted DIs, are Id(∆v2 (1)) = 0.12/0.2 = 0.6 and
Id(∆v1 (1)) = 0.24/0.24 = 1, and an SC of v2 is maneuvered
to v8. Finally, in the last iteration, an SC is maneuvered
from v1 to v8, and the redemption rate is improved by
380% (i.e., 3.91/1.03 = 3.8). By carefully examining AI,
DI, and MG, S3CA further optimizes the redemption rate
by reaping the high benefits of users guided by GPs. S3CA
shapes the influence spread according to the features of users,
which cannot be accomplished by the previous works [2] -- [23]
applying any existing coupon strategies.
Algorithm 1 presents the pseudo-code of S3CA with three
phases: 1) Investment Deployment (ID) (Line 1 -- 24), 2) Guar-
anteed Paths Identification (GPI) (Line 25 -- 34), and 3) SC
Maneuver (SCM) (Line 35 -- 48). Specifically, ID first identifies
the pivot source by iteratively selecting a user vi with the
maximum positive marginal redemption (MR) and adding it
to a queue Q prioritized by redemption rate (Line 4 -- 7). Then,
the initial seed is popped from Q as the initial investment
deployment D, and the pivot source vp is popped from Q to
compare the MR of users not in Q (Line 9). Subsequently,
ID deploys the investment by iteratively examining the MR of
each user and the redemption rate of vp (Line 10 -- 23). Three
strategies are applied to broaden and deepen the influence
(Line 12 -- 15, Line 16 -- 19) by allocating an SC to vi ∈ I,
vi /∈ I, and then activate a new seed (Line 20 -- 21). The user
with the maximum value of MR or redemption rate is invested
by an SC or assigned as a seed.
Moreover, the guaranteed paths GPs are identified by the
GPI procedure (Alg. 2) in a Depth-First Search manner. On
and cM
j
Specifically, for each g(s, vi), let vj denote vi's nearest ac-
tivated ascendant and its AI Ia(g(s, vi)) = Ba(g(s,vi))
Ca(g(s,vi)) , where
Ba(g(s, vi)) = bs,vi − bs,vj and Ca(g(s, vi)) = cs,vi − cs,vj .
Let bM
denote the benefit gain and cost gain by
j
maneuvering SCs to vj and its descendant according to M,
respectively. The benefit gap and the cost gap are defined as
g(s,vi) = bm∪M
Bm,M
Example 3. Fig. 5 presents an example of SCM. Fig. 5(a) is
g(s,vi) = cm∪M
and C m,M
− cM
j .
− bM
j
j
j
, i ← i
τ ← R, i ← p
for all vi ∈ I do
> R and Cseed( S) + Csc(∆K( I)) ≤ Binv
> τ and Cseed(vi) + Csc({Ki = 1}) ≤ Binv
τ ← 0, i ← ∅
for all vi ∈ V do
if τ vi,γi
S, I
then τ ← τ vi,γi
S, I
if γi = 1 then γi ← 0, push vi to Q
otherwise Ki ← 1, V ← V \ vi
R ← redemption rate of vp with Kp
∆K( I) ← increase Ki in K( I) by 1, γi ← 0
if τ vi,γi
S, I
then R ← τ vi,γi
S, I
Algorithm 1 Seed Selection and SC allocation Algorithm
1: Initialize a priority queue Q, γi = 1, ∀vi ∈ V , V ← V
2: while V (cid:54)= ∅ and there exists a positive MR do
3:
4:
5:
6:
7:
8:
9: vi ← pop Q, D ← { S ← vi, I ← vi, K( I) ← Ki}, vp ← pop Q,
10: while Q (cid:54)= ∅ and there exists a positive MR do
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24: D∗ ∈ D with the maximum redemption rate, P ← ∅
25: P ← call GPI procedure (Alg. 2) with input {G, D∗, Binv}
P
26: Sort Ia(g(s, vi)) in descending order: I 1
a ; vp is vi's parent
27: for I n
28:
29:
30:
31:
32:
33:
a (g(s, vi)), n = 1 to P do
if cs,vi ≤ Csc(K(I∗)) and Kp ∈ K(I∗) = 0 then
vi∗ ← the nearest possibly activated ascendant of vi
M∗ ← {0, K = ∅, i∗}
∀K∈M∗,∀Kj
if i = p and Cseed( S ∪ vp) + Csc(K( I ∪ vp)) ≤ Binv
then S ← S ∪ i, I ← I ∪ i, update K( I), vp ← pop Q
else I ← I ∪ i, update K( I)
D ← D ∪ { S, I, K( I)}
∆ I ← I ∪ vi, K(∆ I) ← K( I) ∪ Ki = 1, γi ← 0
if τ vi,γi
S,∆ I
then R ← τ vi,γi
S,∆ I
vj∈g(s,vi) Kj −(cid:80)
> R and Cseed( S) + Csc(K(∆ I)) ≤ Binv
for all vi /∈ I and vi ∈ V is influenced do
δK ←(cid:80)
while(cid:80)
vj∈g(s,vi∗ ) Kj
i ∈K Kj
i < δK do
a,· · · ,I
a, I 2
, i ← i
, i ← i
M ← call DIMD procedure (Alg. 3) with input {G, D∗,
g(s, vi), M∗}
for m = {Id(∆vj (k)), K, i∗} ∈ M in ascending order
according to Id(∆vj (k)) do
if Id(∆vj (k)) < βm,M∗
then M∗ ← M∗ ∪ m, i∗ ← i∗, break for-loop
if All Id(∆vj (k)) > βm,M∗
then Skip this GP, proceed to the next GP
g(s,vi) and redemption rate increases
g(s,vi) or redemption rate decreases
Update D∗ according to M∗
34:
35:
36:
37:
38:
39:
the same level, GPI traverses users in ascending order of their
influence probabilities (Line 25). In Alg. 2, GPI traverses from
each seed s in S∗ to find GPs g(s, vi) to each vi, where g(s, vi)
is the set of the visited siblings of both vi and vi's ascendants
(Line 6). When GPI visits vi, if g(s, vi)'s cost (total SC cost of
users in g(s, vi)) is smaller than the budget, g(s, vi) is included
in a GP set P. Otherwise, GPI stops traversing vi's children
and unvisited siblings, and it traverses back to the next sibling
of vi's parent. The process stops when no more user can be
visited (Line 7 -- 10).
Finally, SCM determines whether to create each g(s, vi) ∈
P based on the Amelioration Index (AI) Ia(g(s, vi)), which
is the ratio of the expected benefit gain to the expected SC
cost (Line 27 -- 39). SCM examines Ia(g(s, vi)) in descending
order and checks the Deterioration Index (DI) Id(∆vj (k)) of
each influenced user vj, which is the ratio of the expected
benefit loss to the expected SC cost by retrieved ∆vj (k) SCs,
s ← ∅, visited[vi] ← f alse, ∀i
Algorithm 2 Guaranteed Paths Identification (GPI)
Input: G = {V, E}, D∗ = {S∗, I∗, K(I∗)}, and Binv
Output: P
1: for all s ∈ S∗ do
Push s in stack Ψ, U li
2:
while Ψ (cid:54)= ∅ do
3:
vi ← pop Ψ
4:
if visited[vi] = f alse then
5:
g ← {vi} ∪ {vj∀vj ∈ U
6:
if c ≤ Binv − cseed(s) then
7:
8:
9:
10:
s , ∀lj ≤ li}, c ←(cid:80)
s ∪ vi, bs,vi ←(cid:80)
visited[vi] ← true, g(s, vi) ← g, cs,vi ← c
s ← U li
U li
P ← P ∪ {g(s, vi), cs,vi , bs,vi}, push vj ∈ N (vi) in Ψ
ascendant order of p(i, j)
vj∈g csc(vj )
vj∈g b(vj )
lj
Algorithm 3 Derivation of DI and Maneuver Operation
(DIMD)
Input: G = {V, E}, D∗ = {S∗, I∗, K(I∗)}, g(s, vi), and M∗
Output: M
1: M ← ∅, i∗ ← i∗ of the last attached element of M∗
2: for all vj ∈ I∗ do
if Kj > Kj then
3:
4:
5:
6:
7:
∆K(I∗) ← K(I∗) with Kj decreased by k
Id(∆vj (k)) ← B(S∗,K(I∗))−B(S∗,∆K(I∗))
mapping in M∗, S ←(cid:80)
Csc(S∗,K(I∗))−Csc(S∗,∆K(I∗))
K ← ∅, ∆k ← k, i∗ ← i∗, K ← union of all maneuver
for k = 1 to Kj − Kj do
j
i∗
while K i∗ + S < K i∗ and ∆k > 0 do
j∈ K K
if K i∗ − (K i∗ + S) < ∆k
i∗ ← K i∗ − (K i∗ + S), ∆k ← ∆k − Kj
then Kj
i∗
if K i∗ − (K i∗ + S) = ∆k
i∗ ← ∆k, ∆k ← 0
then Kj
if the total cost after retrieving Kj
i∗ SCs from vj to v i∗ is
less than Binv
i∗ . 1) If ∆k (cid:54)= 0, i∗ ← the descendant
then K ← K ∪ Kj
of v i∗ with SCs in g(s, vi). 2) If ∆k = 0, M ← M ∪
{Id(∆vj (k)), K, i∗}
Else Break the while-loop
8:
9:
10:
11:
12:
13:
14:
15:
according to the DIMD procedure (Line 33). Specifically, in
the DIMD procedure (Alg. 3), let Kj and Kj denote vj's SC
allocation of K(I∗) and g(s, vi), respectively. For each vj ∈
I∗, if it has spare SCs for creating g(s, vi) (i.e., Kj > Kj),
DIMD calculates DIs by retrieving all possible numbers k of
SCs (1 ≤ k ≤ Kj − Kj) (Line 2 -- 15). SCM sets K j
i∗, which
is the number of maneuvered SCs from vj to the target user
v i∗, depending on ∆k (Line 9 -- 12). Subsequently, if the total
cost after retrieving K j
i∗ SCs of vj to v i∗ is less than Binv,
i∗ is included in K. Then, if the number of remaining SCs
K j
∆k > 0, SCM moves to the next target. Otherwise ∆k =
0, the maneuver operation {Id(∆vj (k)),K, i∗} is included in
the candidate maneuver operation set M (Line 13 -- 14). DIMD
stops when all possible vj are examined and returns to Alg.
1. DIMD returns all possible influenced users to retrieve SCs
for maneuvering SCs to reduce the redemption loss. Besides,
a set of the maneuver operations M, which records the detail
of retrieve/maneuver SCs, are performed. Based on M, SCM
decides whether to create g(s, vi) to optimize the redemption
rate (Line 34 -- 38). Then, the final investment deployment D∗
is updated (Line 39).
V. PERFORMANCE ANALYSIS
In the following, we first prove that the expected benefit
B(S, K(I)) is a non-submodular function and derive the
reference edges based on Observation 1, which finds the
relation between the optimal solution (OP T ) and the pivot
sources derived from ID in Sec. IV. We analyze B(S, K(I))
to keep a certain level of submodularity. Subsequently, we
c − ε)-approximation algorithm,
prove that S3CA is a (1− e− 1
where c is a constant.
Lemma 1. For the S3CRM problem, the expected benefit func-
tion is non-submodular, and the cost functions are modular.
Proof. For ease of description, we transform S3CRM to an
edge selection problem as follows. We first add a virtual
node t to the OSN G = {V, E}, which connects to all
vertices in V . For selecting each seed s, it is transformed
to select the edge e(t, s) and assign its weight (influence
probability) to 1, whereas for each non-seed user, the weight
is 0. The propagation begins from t, and then t activates the
selected seeds with their seed costs. Second, similar to [2], we
conduct the analysis on an implemented deterministic graph
G(cid:48). For each user vi, the SC allocation (i.e., assigning Ki)
is transformed to selecting the out-edges (friends) iteratively
from the one with the highest influence probability in G(cid:48). The
expected benefit is updated based on the influence propagation
of the selected edges and the selection process stops when the
total cost exceeds Binv. Thus, the problem is transformed to
arg maxE(cid:48)⊂E
B(E(cid:48))
C(E(cid:48)) , where E(cid:48) is the selected edges.
For each edge e(i, j), we call it a live edge if vi successfully
activates vj; otherwise, we call it a pseudo-live edge. For each
live edge, there must exist one path from the virtual node,
where all edges are live, and thus we call it a live path. Let
E1 and E2 denote any two set of selected edges, where E1 ⊆
E2 ⊆ E. We prove that the expected benefit function B(e) is
non-submodular by including each edge e ∈ E \ E2 in both
E1 and E2 with three cases as follows. 1) e is pseudo-live
after being included in both E1 and E2. We have B(E2∪ e)−
B(E2) = B(E1 ∪ e) − B(E1) = 0 since no user becomes
active (i.e., no benefit gain). 2) e is live after being included
in both E2 and E1, which implies that e is either attached to
a live path existing in both E2 and E1 or the cause to a path
turning to live. For the first case, B(E2∪e)−B(E2) ≤ B(E1∪
e)− B(E1), whereas for the latter one, B(E2 ∪ e)− B(E2) ≥
B(E1∪ e)− B(E1). 3) e is live after being included in E2 but
pseudo-live in E1, which implies that e is attached to a live
path existing in E2 but not in E1. Thus, B(E2∪e)−B(E2) ≥
B(E1 ∪ e) − B(E1).
For each selected edge e(i, j), its cost is cseed(j)P (e(i, j))
or csc(j)P (e(i, j)), when vi
is the virtual node or user,
respectively. Note that, G(cid:48) includes no dependent edge since
P (e(i, j)) is determined, and thus the cost of non-selected
edges is 0. The total cost function C(e) is the sum of the
cost of the selected edges. Let E1 and E2 denote any two set
of selected edges, where E1 ⊆ E2 ⊆ E. By including each
edge e ∈ E \ E2 in both E1 and E2, C(E2 ∪ e) − C(E2) =
C(E1 ∪ e) − C(E1) = C(e), and thus the cost function C is
modular.
Observation 1. Given a reference cost cref , any set of costs
that includes cref and a cost higher than cref , or two identical
costs of cref , is not the set of costs of the optimal solution
Copt.
Let C1 and C2 denote the first and second largest costs in
Copt. Note that the cost includes the seed cost and the SC
cost since we conduct the analysis on the transformed edge
selection problem. Moreover, let Csort denote the sorted costs
(from the smallest to the largest), which has E(cid:48) elements
(E(cid:48) is the number of edges of the transformed problem). For
each cost in Csort as the reference cost cref , we assume it
is C1 with the following properties: 1) if C1 = C2, any set
contains cref and a cost higher than cref is not Copt, and 2)
if C1 > C2, any set containing two elements of cref is not
Copt.
Based on Observation 1, we can derive the reference edge
set eref similar to the pivot source as follows. First, we
initialize a candidate set of reference edges e = ∅. For each
cost in Csort as the reference cost cref , let Ct = {c∀c ≤
cref ∈ Csort or ∀c < cref ∈ Csort} denote the target set
of costs, which corresponds to the assumptions C1 = C2
(i.e, ∀c ≤ cref ) and C1 > C2 (i.e., ∀c < cref ). Then the
set of edges within Ct with the first two highest MRs are
selected iteratively and included in e. Finally, the edge set in
e with the highest redemption rate is selected as eref . Note that
eref contains either two edges from the virtual node or one
path from the virtual node, which corresponds to selecting two
seeds or a seed allocated with an SC in S3CRM, respectively.
Lemma 2. Within the space C∗
t strictly contains OP T , where
cref = C1. if the corresponding candidate edge set ec has
C(ec) ≥ C0
C(OP T ) , where C0 ≤ 1 is a constant, then the
B(ec)
result of S3CA is always no less than (1−)C0
C(OP T ) , where
is an arbitrary constant.
B(OP T )
B(OP T )
B(OP T )
C(eref ) ≥ C0
Proof. We adopt eref as the connection between the result of
S3CA, ec, and OPT. First, the relation between ec and OPT is
proved to find the relation between eref and OPT. Then, we
prove the relation between S3CA and eref and subsequently
the one between S3CA and OPT.
First, we prove that B(eref )
C(OP T ) as follows.
Because the set of costs of the optimal solution Copt never
resides in Csort \ Ct for each cref based on Observation 1,
we derive the reference edges eref from the target cost sets
Ct of all reference costs cref , where Copt must exist. When
cref = C1, C∗
t is the smallest space containing Copt, and its
corresponding candidate edges ec is derived as the edges with
the first two highest MRs are included in e. Moreover, eref
has the highest redemption rate among all edge sets in e (i.e.,
C(OP T ) , where C0 ≤ 1
C(eref ) ≥ B(ec)
B(eref )
is a constant, then B(eref )
C(ec) ). Thus, if B(ec)
C(eref ) ≥ C0
C(ec) ≥ C0
B(OP T )
B(OP T )
C(OP T ) .
Note that B(eref )
C(eref ) can be derived easily since eref contains
at most two edges. However, for S3CA, the calculation of
the expected benefit B(S, K(I)) is more difficult due to the
influence propagation [2]. Hence, following previous works,
B(S, K(I)) can be obtained approximately by sampling meth-
ods, such as Monte Carlo [2] and reverse greedy [15]. More
specifically, it first tosses a coin for each edge with the given
influence probability to generate a graph. The users reachable
from the seed set by the paths with the allocated coupons will
be activated. Note that if a user vi is allocated with more
than ki coupons with the corresponding ki living edges after
tossing coins, it will only receive the former ki coupons from
the incident edges with the largest influence probability. The
accuracy of estimating B(S, K(I)) increases as the number of
sampling increases, and an arbitrarily close approximation can
be obtained, and thus the estimation is (1 − ) -- approximated.
Finally, we find the relationship between the result of S3CA
and OPT as follows. For the pivot source identification in Sec.
IV, all users are assumed as a seed and included in the priority
queue Q. For each user as a seed, the MR after activation and
the MR of allocation with an SC after activation are examined.
S3CA invests a seed or an SC with the highest positive MR
iteratively, and the user is included in Q (with one SC or
not). The first two elements of Q are popped out as the initial
influence spread and the pivot source. Let s1 and s2 denote
the first two elements of Q. Let eu
2) denote the
edges from the virtual node and the ones to the activated child
by s1 (s2), respectively. The result of S3CA is at least as large
as (1−) B({eu
2})
2}) , since S3CA ensures an improvement
C({eu
in each movement (i.e., ID, GPI, and SCM) with an estimated
bias of B(S, K(I)), i.e., (1 − ).
2 ) and ed
1 (eu
1 ,eu
1 ,eu
1 ,ed
1 ,ed
2 ,ed
2 ,ed
1 (ed
Let e1
ref and e2
two highest MRs. Furthermore, e1
ref denote the two edges of eref , which
ref and
have the first
ref are iteratively selected in the same way of selecting
e2
2}, and thus e1
{eu
2}.
1 , ed
2 , ed
Therefore, B({eu
C(eref ) , implying that the result
C({eu
of S3CA is always no less than (1 − )C0
ref and e2
2})
2}) ≥ B(eref )
ref ∈ {eu
1 ,eu
1 ,eu
1 ,ed
1 ,ed
2 ,ed
2 ,ed
2 , ed
1 , ed
1, eu
1, eu
B(OP T )
C(OP T ) .
After analyzing the relations among the result of S3CA,
redemption rate of eref , and the redemption rate of ec, we
further analyze the relation between the redemption rate of
OP T and ec. Since the expected benefit function is non-
submodular according to Lemma 1, we first derive an upper
bound of the expected benefit function and then find the
approximation ratio of S3CA as follows.
Let Xj denote the result of ec in the j-th iteration, where
min(b(vj )) , ∀vi, vj ∈ V , denotes the
j = 0, 1, 2, and b0 = max(b(vi))
ratio of the maximum benefit to the minimum benefit of users.
Let e∗
t denote the selected edge with the maximum benefit of
OP T . By assuming OP T \ X1 = e∗
k, we have the
following lemma.
Lemma 3. There exists a decomposition of OP T in some
i })−
order such that for j = 0, 1,(cid:80)k
i=1(B(Xj ∪{e∗
1 ∪···∪ e∗
2,··· , e∗
1, e∗
(cid:80)k
i=1 B(e∗
t ).
i−1}) ≤ b0
1 ∪ ··· ∪ e∗
B(Xj ∪ {e∗
Proof. Since the influence spread starts from the virtual node
of the transformed problem, it is intuitive that OP T forms a
connected graph rooted at the virtual node; otherwise, there
is no gain of redemption rate. Similarly, ec is also a rooted
connected graph. Thus, for OP T , there exhibits an order of
edges becoming live from the root, which is denoted as Yi =
i }, where the activation begins from 1 to i. Let
{e∗
k} by the activation order from 1
Y = OP T \ X1 = {e∗
i })− B(X1∪
to k. For any i = 1,··· , k, B(X1∪{e∗
i=1(B(X1∪
{e∗
i ) ≤ b0B(e∗
{e∗
1 ∪···∪ e∗
i=1 b0B(e∗
t ).
For j = 0 (i.e., X0), we can derive the same result following
the same analysis; therefore, the lemma is proved.
t ). Hence,(cid:80)k
i−1}) ≤(cid:80)k
i−1}) ≤ B(e∗
i })− B(X1∪{e∗
1∪···∪e∗
1 ∪···∪ e∗
1 ∪ ··· ∪ e∗
1∪···∪ e∗
1 ∪ ...e∗
Although the expected benefit function is non-submodular,
let c0 =
with the upper bound derived by Lemma 3,
max(cseed(vi)∪csc(vi))
min(cseed(vj )∪csc(vj )) , ∀vi, vj ∈ V denote the ratio of the
maximum cost to the minimum cost of users, the performance
bound of S3CA is derived as follows.
− 1
Theorem 2. S3CA is a (1 − e
b0c0 − ) -- approximation
algorithm for the S3CRM.
i−1})
1 ∪ ··· ∪ e∗
i }) − B(X1 ∪ {e∗
1 ∪
Proof. Since the expected benefit function is monotone in-
creasing, by the decomposition Lemma 3, we have
B(OP T ) ≤ B(X1 ∪ (OP T \ X1))
··· ∪ e∗
≤ B(X1) + b0
= B(X1) + b0
= B(X1) + b0
= B(X1) +(cid:80)k
i=1(B(X1 ∪ {e∗
(cid:80)k
(cid:80)k
i=1 e∗
(cid:80)k
i=1(B(X1 ∪ e∗
(cid:80)k
(cid:80)k
(cid:80)k
t )− C(X1)).
By iteratively selecting the edges with the maximum MR,
t ) − C(X1)) ≤
t ) − C(X1)) ≤
i )−C(X1)) ≤
t )−B(X1)
t )−C(X1) (C(X1 ∪ e∗
B(X1∪e∗
t )−B(X1)
t )−C(X1) (C(X1 ∪ e∗
C(X1∪e∗
B(X1∪x2)−B(X1)
C(X1∪x2)−C(X1) (C(X1 ∪ e∗
B(X1∪x2)−B(X1)
C(X1∪x2)−C(X1) c0(C(X1∪e∗
t ) − B(X1))
B(X1∪e∗
C(X1∪e∗
B(X1) + b0
B(X1) + b0
B(X1)+b0
B(X1) + b0c0
i=1
B(X2)−B(X1)
C(X2)−C(X1) C(OP T ).
The last inequality holds since C is a linear function. Thus,
B(OP T ) − B(X1) ≤ b0c0
B(X2) − B(X1)
C(X2) − C(X1)
C(OP T ).
(2)
t
i=1
i=1
i=1
By applying the same analysis on X0,
B(OP T ) − B(X0) ≤ b0c0
B(X1) − B(X0)
C(X1) − C(X0)
C(OP T ).
(3)
Let δi = B(OP T ) − B(Xi) and αi = b0c0C(OP T )
C(Xi)−C(Xi−1). By
Inequalities 2 and 3,
δ2
δ1
≤ (1 − 1
α2
),
δ1
δ0
≤ (1 − 1
α1
),
and
respectively.
By multiplying the left hand and right hand of the above
two inequalities separately,
δ2 = B(OP T ) − B(X2)
≤ (1 − C(X2) − C(X1)
≤ e
b0c0C(OP T )
b0c0 C(OP T ) × e
− C(X2)−C(X1)
)(1 − C(X1) − C(X0)
b0c0C(OP T )
− C(X1 )−C(X0)
b0c0C(OP T ) B(OP T )
)B(OP T )
− C(X2 )
b0 c0C(OP T ) B(OP T ).
= e
Thus,
B(X2) ≥ (1 − e
− C(X2 )
b0 c0C(OP T ) )B(OP T ),
− C(X2)
b0c0 C(OP T ) )
b0c0C(OP T )
≥ (1 − e
which implies
B(X2)
C(X2)
Since (1 − e−x)x−1 is monotone decreasing in x ≤ 1
b0c0C(OP T ) ≤ 1
≥ (1 − e
B(X2)
C(X2)
b0c0C(OP T )
− C(X2)
b0c0C(OP T ) )
C(X2)
,
b0c0
C(X2)
B(OP T )
C(X2)
b0c0C(OP T )
B(OP T )
b0c0C(OP T )
.
and
b0c0
≥ (1 − e
− 1
b0c0 )
B(OP T )
C(OP T )
.
Finally, since X2 = ec,
B(ec)
C(ec)
≥ (1 − e
− 1
b0 c0 )
B(OP T )
C(OP T )
.
let
− 1
Hence, due to the estimation bias (Lemma 2), S3CA is a
(1− )(1− e
b0c0 ) -- approximation algorithm for S3CRM. For
− 1
simplicity, we combine the ratio as (1 − e
b0 c0 − ), where
is an arbitrarily small constant. Furthermore, when b0 and c0
are both bounded (i.e., 1), S3CA is a constant approximation
algorithm for S3CRM.
Time complexity. For the weighted directed graph G =
{V, E},
V and E denote the number of users and
edges, respectively. The time complexity of the ID phase
is O(M (V + E)) since it first takes O(2MV ) time to
construct the priority queue Q, and it then invests the budget
in SCs and seeds by examining the MR of allocating an SC or
activating a seed in O(ME) and O(MV ) time, respectively.
Note that both the size of coupon allocation and seed set
are bounded by the budget. The time complexity of the GPI
phase is O(MV (V + E)) since for each seed, the GPs
are identified by a DFS-based traversal in O(V + E) time,
where the size of seed set is bounded by the budget. The time
complexity of the SCM phase is O(MV E) because for
each derived GP, the DIs are derived by retrieving SCs from
each inactive user vj that is possibly to be influenced, whereas
the number of GP is bounded by V , and the DIs are bounded
by E. Moreover, the size of DIs is bounded by the vertex
induced graph of GP. Therefore, the overall time complexity
is O(ME) + O(MV E) + O(MV E) = O(MV E)
and correlated to the size of the OSN. In particular, the time
O(M ) of evaluating the expected benefit can be speeded up
by Monte Carlo [2] and reverse greedy methods [15].
VI. EXPERIMENT
A. Experiment Setup
We compare S3CA with IM [2] -- [16] and PM [17] -- [23]
in four OSNs, i.e., Facebook, Epinions, Google+ [28], and
Douban [29], with the detailed setting in Table II. Since IM
and PM are not designed for SC, two real coupon strategies are
adopted as follows. 1) Limited coupon strategy is provided by
Dropbox, Airbnb, Booking.com, etc., where the SC constraint
is specified by a constant k, i.e., Ki = k, ∀vi ∈ V . 2)
Unlimited coupon strategy is provided by Uber, Lyft, and
Hotels.com, etc., where the SC constraint of each user is
specified by the number of friends, i.e., Ki = N (vi), ∀vi ∈ V .
For the limited coupon strategy, the SC constraint of each
user is set
to 32 according to Dropbox. We denote IM-
U (PM-U) and IM-L (PM-L) as IM with unlimited coupon
strategy and limited coupon strategy, respectively. For IM-U
and IM-L, the seed size is set to V
2n for n = 0, 1,··· , 10
[17], and the seed size resulting in the maximum influence is
selected as the result. The default setting of the IM algorithm
follows the previous work [17]. Moreover, we design a two-
stage heuristic algorithm, IM-S. The first stage employs the
existing IM algorithm [17]. The second stage connects every
two seeds with the shortest paths, where the weight of each
edge e(i, j) is 1 − P (e(i, j)) (i.e., an edge with a higher
influence probability having a smaller weight). Afterward, IM-
S uniformly distributes SCs to the users in the paths such that
the overall seed cost and SC cost satisfy the investment budget
constraint.
The influence propagates under the extended IC model [2]
as described in Sec. III. Following [3], [6], [8], [9], [14],
[15], [17], [18], for each edge e(i, j), the influence probability
P (e(i, j)) is set to the reciprocal of vj's in-degree. We adopt
the normal benefit setting [17], i.e., for each user, the benefit is
randomly generated by a normal distribution N (µ, σ), where
µ and σ are the mean and standard deviation, respectively.
For each user, the seed cost is proportional to the number
of her friends (out-degree) [17]. Moreover, the uniform SC
cost follows the real coupon strategies from Dropbox and
Hotels.com. To evaluate the effect of different benefits and
(cid:80)
(cid:80)
SC costs, we control the ratio λ of the total benefit to the
vi∈V b(vi)
total SC cost, where λ =
vi∈V csc(vi). Moreover, the effect
of different seed costs and benefits is examined by controlling
the ratio κ of the total seed cost to the total benefit, where
. For all OSNs, the default setting of λ
κ =
and κ are 1 and 10, respectively. We evaluate 1) the redemption
rate, 2) total benefit, 3) the ratio of the total selected seed cost
to total allocated SC cost (seed-SC rate), and 4) the average
maximum hop number from seeds, by changing 1) Binv, 2)
coupon strategies of baseline algorithms, 3) λ, and 4) κ. Each
simulation result is averaged over 1000 samples.
(cid:80)∀vi∈V cseed(vi)
(cid:80)∀vi∈V b(vi)
B. Simulation Results
Fig. 6 compares the investment efficiency of IM-U, PM-U,
IM-L, PM-L, IM-S, and S3CA, in the datasets of Table II.
The results are similar for most datasets. Due to the space
DATASETS AND THE CORRESPONDING ARGUMENTS
TABLE II
Dataset
Nodes
Edges
Binv
µ, σ
Facebook
4K
88K
10K
10, 2
Epinions
76K
509K
50K
20, 4
Google+
108K
13.7M
200K
50, 10
Douban
5.5M
86M
1M
100, 20
constraint, we present the results of Douban and Facebook.
First, the impact on both redemption rate and total benefit
from different
investment budgets Binv is investigated in
Fig. 6(a) -- (b). The results manifest that S3CA achieves the
highest redemption rate and total benefit since it maximizes
the total expected benefit while reducing the total cost. In
Fig. 6(a), though the redemption rate of S3CA sustains in a
certain level as Binv increasing, Fig. 6(b) shows that the total
benefit increases when Binv increases. Note that the total cost
approximately equals to Binv for all algorithms in all settings
and thereby is not presented in this section. Fig. 6 presents the
results of IM-S. The redemption rate and total benefit of IM-S
improve in Fig. 6(a) and (b) with a larger investment budget,
but IM-S acquires much smaller redemption rate and benefit
compared with other approaches, because it only distributes
SCs to the users on the shortest paths and thereby fails to
obtain the benefits outside the paths. In Fig. 6(c) and (d), IM-
S improves with a larger λ, which is the ratio of total benefit
to total SC cost of users, because it is able to acquire a higher
benefit from each SC with a higher λ. Fig. 6(e) and (f) manifest
that IM-S incurs more running time (sometimes higher than
S3CA) as the budget grows, because more shortest paths
spanning an increasing number of seeds become candidates
for SC distribution.
Fig. 7 investigates the impacts on the seed-SC rate with
different Binv, λ, and κ, in different datasets, and the results
show that S3CA carefully balances the investment in seeds
and SCs according to different parameters. In Fig. 7(a) -- (b),
S3CA increases the investment in seeds (i.e., the seed-SC
rate increases) while Binv increasing. With the generous in
investment, more seeds can be deployed for more influential
sources. In Fig. 7(c) -- (d), the benefit of each user increases
while the SC cost is fixed, which implies that the benefit
per unit of investment also increases. Thus, for the seeds, the
benefit surpasses its seed cost and the benefit of allocating an
SC to other non-seed users, S3CA decides to invest more in
seeds. Moreover, the seed-SC rate of baseline algorithms has
negligible changes in Fig. 7(a) -- (d) since they do not consider
the SC allocation. In Fig. 7(e) -- (f), for different κ, all baseline
algorithms increase the investment in seeds since the seed
cost increases as κ increasing. However, S3CA decreases the
investment in seeds while the seed cost (κ) increases and
invests more in SCs to optimize the redemption rate. Thus,
S3CA is capable of balancing the investment in seeds and
SCs according to different budgets, λ, and κ.
Table III and IV show the average farthest hop from seeds
and the average running time, respectively. Table III shows
that S3CA can deepen the influence spread by allocating SCs
Fig. 6.
Investment efficiency. (a) Redemption rate with different investment
budgets in Douban. (b) Total benefit with different investment budgets in
Douban. (c) Redemption rate with different λ in Douban. (d) Redemption
rate with different λ in Facebook. (e) Running time with Binv = 2M. (f)
Running time with Binv = 3M
and the average farthest hops ranging from 2.046 to 3.355.
However, for the baseline algorithms,
the average farthest
hops reside between 1 to 1.939. Thus, the results manifest
the effectiveness of S3CA to disseminate SCs to a wider area
in OSNs. Moreover, the running time is listed in Table IV.
Since S3CA activates the seeds and allocates the SCs under
the investment budget, the running time is closely related to
the investment budget. Thus, the running time is proportional
to the investment budget and less related to the size of OSN,
which is shown in Table IV.
C. Case Study
We have incorporated real SC policies provided by Airbnb
and Booking.com on the real dataset in Table II. We have
employed the adoption model [30] for each user to find the
users that accept SCs. We have adopted real gross margin
to set the benefit according to the accounting research [31].
We have used the real datasets of social networks in [29].
More specifically, the SC costs are 50 and 100, and the SC
allocations are 100 and 10 according to Airbnb and Book-
ing.com, respectively. Since Booking.com has not revealed its
SC cost, here we refer to the one in Hotels.com to assign the
SC cost. Moreover, the adoption model [30], which quantifies
the probability of users adopting a coupon, is to uniformly
Fig. 8. Case study with different gross margin. (a) Redemption rate of Airbnb.
(b) Seed-SC cost of Airbnb. (c) Redemption rate of Hotels.com. (d) Seed-SC
cost of Hotels.com.
TABLE III
AVERAGE FARTHEST HOPS FROM SEEDS
Dataset
Facebook
Epinions
Google+
Douban
IM-U
1.958
1.381
1.724
1.014
IM-L
1.000
1.000
1.000
1.000
PM-U
1.872
1.120
1.723
1.002
PM-L
1.004
1.002
1.000
1.001
S3CA
3.579
3.363
2.690
3.134
algorithms, Fig. 10(a) shows that S3CA is closer to the
optimal solution, and the redemption rates of some baseline
algorithms are even smaller than the worst-case bounds of
S3CA, which are derived from the optimal solutions multiplied
by the approximation ratio. Fig. 10(b) shows that all solutions
returned by S3CA are above the worst-case bound, indicating
that the approximation ratio holds for the empirical cases.
To test the scalability, we first adopt PPGG [32] to generate
large Facebook-like synthetic networks. Fig. 9 presents the
running time and the explored ratio (i.e., the ratio of the
number of explored nodes of S3CA to the network size)
with different network sizes and investment budgets. Fig. 9(a)
indicates that the running time becomes larger as the network
size grows, but the explored ratio decreases under a fixed
budget in Fig. 9(b) (i.e., S3CA stops exploring new nodes
when the budget is run out). In contrast, Fig. 9(c) and (d)
indicate that both the running time and explored ratio become
larger as the investment budget increases, since S3CA in this
case is required to examine more candidates for the efficient
distribution of SCs.
VII. CONCLUSION
To the best of our knowledge, this paper makes the first
attempt to explore the seed selection with SC allocation under
a limited investment budget. We formulate a novel optimiza-
tion problem S3CRM and design an approximation algorithm
S3CA to optimize the redemption rate in social coupon sce-
nario. S3CA first deploys the investment in seeds and social
coupons by carefully examining the marginal redemption of
Fig. 7. Seed-SC rate. (a) Different investment budgets in Facebook. (b)
Different investment budgets in Epinions. (c) Different λ in Facebook. (d)
Different λ in Google+. (e) Different κ in Facebook. (f) Different κ in Douban.
b(vi)
csc, csc, c2
√
sc and
select 85%, 10%, and 5% of users with 3
√
all normalized by 3
sc. For the benefit setting,
csc + csc + c2
we adopt the gross margin for SCs from accounting research
[31], which is defined as b(vi)−csc(vi)
∗ 100 (%) for each vi.
Fig. 8 presents the new results with the above setting.
The redemption rate increases with a larger gross margin
in Fig. 8(a) due to more benefits generated from each user.
The redemption rate of Booking.com in Fig. 8(c) is higher
because Airbnb has higher SC allocation, but more SCs are
not redeemed by users. Therefore, fewer users are influenced
and activated. Moreover, for PM-L and PM-U, the redemption
rate increases with 60% gross margin in Fig. 8(c), because the
benefit is sustained, but some seeds can be discarded to reduce
the cost as shown in Fig. 8(d). S3CA achieves the highest
redemption rate with different gross margins in Airbnb and
Booking.com, since in addition to finding influential seeds,
S3CA obtains more benefits with guaranteed paths, which
connect and influence high-benefit users by SCs.
D. Performance of S3CA
To validate the approximation ratio, we have compared
S3CA with the optimal solution obtained by computation-
intensive exhaustive search in small networks with 150 nodes
generated by PPGG [32].9 We change the gross margin for
SCs from accounting research [31]. Compared with other
9The input parameters for PPGG are 1) 11 patterns, 2) support of 1000,
3) clustering coefficient of 0.6394, and 4) power-law parameter η = 1.7 and
2.5.
TABLE IV
AVERAGE RUNNING TIME OF S3CA
Binv (K)
Facebook (seconds)
Binv (K)
Epinions (seconds)
Binv (M)
Douban (seconds)
Binv (K)
6
1.02
30
6.51
0.6
121.94
60
8
2.24
40
10.80
0.8
174.05
80
10
3.65
50
15.20
1
242.12
100
1059.93
12
5.49
60
20.66
1.2
304.05
120
14
7.70
70
26.52
1.4
378.45
140
Google+ (seconds)
821.29
928.76
1130.95
1282.55
Fig. 9. Scalability experiments. (a) Running time with different network size.
(b) Explored ratio with different network size. (c) Running time with different
investment budgets. (d) Explored ratio with different investment budgets.
Fig. 10. Performance of S3CA. (a) Average results of baselines, S3CA, OPT,
and worst-case. (b) All results of S3CA, OPT, and worst-case.
three strategies which are deepening the influence spread,
broadening the influence spread, and initiating another start
of the influence spread. S3CA then identifies the guaranteed
paths to explore the opportunity to optimize the redemption
rate by maneuvering the social coupons. After obtaining the
guaranteed paths, S3CA further examines the amelioration
index and the deterioration index of the amelioration and
the deterioration by maneuvering social coupons to users and
retrieving social coupons from users, respectively. Finally,
S3CA optimizes the redemption rate by maneuvering the SCs
from the users with lower deterioration indices to the users
with higher amelioration index. Simulation results show that
S3CA can effectively improve the investment efficiency up to
30 times of the results of the baseline algorithms.
REFERENCES
[1] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. Kramer, C. Marlow, J. E.
Settle, and J. H. Fowler, "A 61-Million-Person Experiment in Social
Influence and Political Mobilization," Nature, vol. 489, no. 7415, p. 295,
2012.
[2] D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the Spread of
Influence through a Social Network," KDD, 2003.
[3] W. Chen, C. Wang, and Y. Wang, "Scalable Influence Maximization for
Prevalent Viral Marketing in Large-Scale Social Networks," KDD, 2010.
[4] W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in
social networks," KDD, 2009.
[5] A. Goyal, F. Bonchi, and L. V. Lakshmanan, "A Data-Based Approach
to Social Influence Maximization," VLDB, 2011.
[6] K. Jung, W. Heo, and W. Chen, "IRIE: Scalable and Robust Influence
Maximization in Social Networks," ICDM, 2012.
[7] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and
N. Glance, "Cost-Effective Outbreak Detection in Networks," KDD,
2007.
[8] H. T. Nguyen, T. N. Dinh, and M. T. Thai, "Cost-Aware Targeted Viral
Marketing in Billion-Scale Networks," INFOCOM, 2016.
[9] H. T. Nguyen, M. T. Thai, and T. N. Dinh, "Stop-and-Stare: Optimal
Sampling Algorithms for Viral Marketing in Billion-Scale Networks,"
in SIGMOD, 2016.
[10] N. Ohsaka, T. Akiba, Y. Yoshida, and K.-i. Kawarabayashi, "Fast
and Accurate Influence Maximization on Large Networks with Pruned
Monte-Carlo Simulations.," in AAAI, 2014.
[11] G. Song, X. Zhou, Y. Wang, and K. Xie, "Influence Maximization on
Large-Scale Mobile Social Network: A Divide-and-Conquer Method,"
TPDS, vol. 26, no. 5, pp. 1379 -- 1392, 2015.
[12] J. Tang, X. Tang, X. Xiao, and J. Yuan, "Online Processing Algorithms
for Influence Maximization," in SIGMOD, 2018.
[13] J. Tang, X. Tang, and J. Yuan, "Influence Maximization Meets Efficiency
and Effectiveness: A Hop-Based Approach," in ASONAM, 2017.
[14] Y. Tang, Y. Shi, and X. Xiao, "Influence Maximization in Near-Linear
Time: A Martingale Approach," SIGMOD, 2015.
[15] Y. Tang, X. Xiao, and Y. Shi, "Influence Maximization: Near-optimal
Time Complexity Meets Practical Efficiency," SIGMOD, 2014.
[16] C. Zhou, P. Zhang, J. Guo, X. Zhu, and L. Guo, "UBLF: An Upper
Bound Based Approach to Discover Influential Nodes in Social Net-
works," ICDM, 2013.
[17] J. Tang, X. Tang, and J. Yuan, "Profit Maximization for Viral Marketing
in Online Social Networks: Algorithms and Analysis," TKDE, vol. 30,
no. 6, pp. 1095 -- 1108, 2018.
[18] J. Tang, X. Tang, and J. Yuan, "Towards Profit Maximization for Online
Social Network Providers," INFOCOM, 2018.
[19] Y. Zhu and D. Li, "Host Profit Maximization for Competitive Viral
Marketing in Billion-Scale Networks," INFOCOM, 2018.
[20] H. Zhang, H. Zhang, A. Kuhnle, and M. T. Thai, "Profit Maximization
for Multiple Products in Online Social Networks," INFOCOM, 2016.
[21] A. Khan, B. Zehnder, and D. Kossmann, "Revenue Maximization by
Viral Marketing: A Social Network Host's Perspective," in ICDE, 2016.
[22] W. Lu and L. V. Lakshmanan, "Profit Maximization Over Social
Networks," ICDM, 2012.
[23] Y. Zhu, Z. Lu, Y. Bi, W. Wu, Y. Jiang, and D. Li, "Influence and Profit:
Two Sides of the Coin," ICDM, 2013.
[24] http://www.businessinsider.com/the-secret-sauce-behind-social-
coupons-and-why-it-works-2012-7.
[25] S. Hanson and H. Yuan, "Friends with Benefits: Social Coupons as a
Strategy to Enhance Customers Social Empowerment," Journal of the
Academy of Marketing Science, pp. 1 -- 20, 2017.
[26] K. Jung and B. Y. Lee, "Online vs. Offline Coupon Redemption
Behaviors," The International Business & Economics Research Journal,
vol. 9, no. 12, p. 23, 2010.
[27] U. Feige, "A Threshold of ln n for Approximating Set Cover," Journal
of the ACM, vol. 45, pp. 634 -- 652, July 1998.
[28] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network
dataset collection." http://snap.stanford.edu/data, June 2014.
[29] H.-J. Hung, H.-H. Shuai, D.-N. Yang, L.-H. Huang, W.-C. Lee, J. Pei,
and M.-S. Chen, "When Social Influence Meets Item Inference," KDD,
2016.
[30] S. Tang, "Stochastic Coupon Probing in Social Networks," in CIKM,
2018.
[31] D. E. Kieso, J. J. Weygandt, and T. D. Warfield, Intermediate Account-
ing: IFRS Edition, vol. 2. John Wiley & Sons, 2010.
[32] H.-H. Shuai, D.-N. Yang, S. Y. Philip, C.-Y. Shen, and M.-S. Chen, "On
Pattern Preserving Graph Generation," in ICDM, 2013.
|
1412.4299 | 2 | 1412 | 2015-06-18T16:50:56 | Reciprocity in Social Networks with Capacity Constraints | [
"cs.SI",
"physics.soc-ph"
] | Directed links -- representing asymmetric social ties or interactions (e.g., "follower-followee") -- arise naturally in many social networks and other complex networks, giving rise to directed graphs (or digraphs) as basic topological models for these networks. Reciprocity, defined for a digraph as the percentage of edges with a reciprocal edge, is a key metric that has been used in the literature to compare different directed networks and provide "hints" about their structural properties: for example, are reciprocal edges generated randomly by chance or are there other processes driving their generation? In this paper we study the problem of maximizing achievable reciprocity for an ensemble of digraphs with the same prescribed in- and out-degree sequences. We show that the maximum reciprocity hinges crucially on the in- and out-degree sequences, which may be intuitively interpreted as constraints on some "social capacities" of nodes and impose fundamental limits on achievable reciprocity. We show that it is NP-complete to decide the achievability of a simple upper bound on maximum reciprocity, and provide conditions for achieving it. We demonstrate that many real networks exhibit reciprocities surprisingly close to the upper bound, which implies that users in these social networks are in a sense more "social" than suggested by the empirical reciprocity alone in that they are more willing to reciprocate, subject to their "social capacity" constraints. We find some surprising linear relationships between empirical reciprocity and the bound. We also show that a particular type of small network motifs that we call 3-paths are the major source of loss in reciprocity for real networks. | cs.SI | cs |
Reciprocity in Social Networks with Capacity Constraints
Bo Jiang
College of Information and
Computer Sciences
University of Massachusetts
[email protected]
Amherst MA, USA
Zhi-Li Zhang
Department of Computer
Science and Engineering
University of Minnesota
Minneapolis MN, USA
[email protected]
Don Towsley
College of Information and
Computer Sciences
University of Massachusetts
[email protected]
Amherst MA, USA
ABSTRACT
Directed links -- representing asymmetric social ties or inter-
actions (e.g., "follower-followee") -- arise naturally in many
social networks and other complex networks, giving rise to
directed graphs (or digraphs) as basic topological models for
these networks. Reciprocity, defined for a digraph as the per-
centage of edges with a reciprocal edge, is a key metric that
has been used in the literature to compare different directed
networks and provide "hints" about their structural proper-
ties: for example, are reciprocal edges generated randomly
by chance or are there other processes driving their gener-
ation? In this paper we study the problem of maximizing
achievable reciprocity for an ensemble of digraphs with the
same prescribed in- and out-degree sequences. We show that
the maximum reciprocity hinges crucially on the in- and out-
degree sequences, which may be intuitively interpreted as
constraints on some "social capacities" of nodes and impose
fundamental limits on achievable reciprocity. We show that
it is NP-complete to decide the achievability of a simple up-
per bound on maximum reciprocity, and provide conditions
for achieving it. We demonstrate that many real networks
exhibit reciprocities surprisingly close to the upper bound,
which implies that users in these social networks are in a
sense more "social" than suggested by the empirical reci-
procity alone in that they are more willing to reciprocate,
subject to their "social capacity" constraints. We find some
surprising linear relationships between empirical reciprocity
and the bound. We also show that a particular type of small
network motifs that we call 3-paths are the major source of
loss in reciprocity for real networks.
Categories and Subject Descriptors
G.2.2 [Graph Theory]: Network problems; H.2.8 [Database
Applications]: Data mining
Keywords
reciprocity; degree sequence; directed graph; social network
.
1.
INTRODUCTION
Many complex networks are naturally directed, which en-
dows them with nontrivial structural properties not shared
by undirected networks. One such property that has been
widely studied is reciprocity, which is classically defined as
the fraction of edges that are reciprocated, i.e. paired with
an edge of the opposite direction. Nontrivial patterns of
reciprocity can reveal possible mechanisms of social, biolog-
ical or other nature that systematically act as organizing
principles shaping the observed network topology [6]. Pre-
vious work shows that reciprocity plays an important role
in many information networks such as email networks [16],
the World Wide Web [2] and Wikipedia [29, 28]. It is also
shown that major online social networks that are directed
in nature, such as Twitter[10, 12], Google+[14], Flickr [15,
4], LiveJournal [25, 15, 7], and YouTube [15], all exhibit a
nontrivial amount of reciprocity.
When we try to interpret observed values of reciprocity,
we are faced with the problem of assessing the significance
of the observation. For instance, the Swedish Wikipedia has
reciprocity of 21%. How significant is this? This question is
often answered by comparing measured values with the ex-
pected value of some null model. One commonly used null
model is a random graph with the same number of nodes and
edges [16]. An alternative is a random graph with specified
degree sequence, as the specific degree sequence is expected
to affect reciprocity [26]. Networks are then classified as re-
ciprocal or anti-reciprocal according to whether the observed
reciprocity is larger or smaller than the expected value [6].
Significant deviation from the expected values suggests the
existence of some underlying organizational mechanism at
work. For our example of Swedish Wikipedia, the expected
reciprocities in both random null models are almost zero,
so the Swedish Wikipedia is classified as a reciprocal net-
Informative as this might be, comparison with ex-
work.
pected values is not the whole story.
Is 21% a significant
deviation from 0? Can we say that the tendency to recip-
rocate is strong in this network? The answer might de-
pend on the eye of the beholder. However, if we know for
some reason the maximum possible reciprocity is only 28%,
then we may safely conclude that 21% is indeed a significant
amount of reciprocity. On the other hand, if the maximum
is 90%, we might conclude that 21% is not as significant as
suggested by the comparison with random null models. In
general, knowledge of the extremal values can give a better
idea about where the observation lies in the entire spectrum,
which can potentially change our conclusion about the sig-
nificance level of the observation.
Since real social networks often exhibit reciprocities larger
than those associated with the random null models, we con-
cern ourselves only with the maximum achievable reciprocity
in this work. As in the random null models, we may want
to retain certain key structural features of the real network
when we maximize reciprocity. The particular feature that
we choose to preserve in this work is the joint in- and out-
degree sequence, which is a confounding factor in the study
of reciprocity [26]. In real networks, in- and out-degrees of-
ten serve as proxies for some kind of capacities of the corre-
sponding node. For example, in a file sharing network where
edges represent transfers from file sources to downloaders,
the in-degree of a node can reflect the available network
bandwidth and the out-degree the amount of resource. In a
social network where edges point from followers to followees,
the in-degree of a node can reflect its fame and popularity
and the out-degree its budget of attention. Quite often these
capacity constraints are too important to be ignored in the
network under consideration. By preserving the degree se-
quence, we honor these capacity constraints, thus controlling
these confounding factors.
Motivated by the above considerations, we study the prob-
lem of maximizing reciprocity subject to prescribed joint in-
and out-degree constraints. This paper makes the following
contributions.
• We formulate the maximum reciprocity problem and
prove its NP-hardness. We provide an upper bound
on reciprocity and conditions for achieving the bound.
• We show that empirical reciprocity is surprisingly close
to the upper bound in a wide range of real networks.
We also find surprisingly strong linear relationships be-
tween empirical reciprocity and the upper bound.
• We identify some suboptimal network motifs and show
that a particular type of small motif called 3-paths is
the major cause for suboptimality in real networks.
The rest of the paper is organized as follows. Section 2 in-
troduces the maximum reciprocity problem. Section 3 proves
the NP-hardness of the problem, and provides a simple up-
per bound for maximum reciprocity. Section 4 identifies pat-
terns of maximum digraphs and provides a greedy algorithm
for eliminating suboptimal motifs. Section 5 conducts some
empirical study of real networks and Section 6 concludes the
paper.
2. GRAPHIC SEQUENCES AND MAXIMUM
RECIPROCITY PROBLEM
In this section, we first introduce the notion of a graphic
sequence for undirected graphs and then a graphic bi-sequence
for directed graphs or digraphs for short, which will be used
in the theoretical analysis of Section 3. We then formulate
the maximum reciprocity problem. Throughout the rest of
the paper, a graph, directed or not, always means a sim-
ple graph, i.e. no self-loops or multiple edges are allowed.
We will use the terms node and vertex interchangeably. For
directed graphs, an edge always means a directed edge.
2.1 Graphic Sequence and Bi-sequence
For an undirected graph G = (V, E), the degree dG(v) of a
node v is the number of edges incident to v. Associated with
every graph G is its degree sequence d = {dG(v) : v ∈ V }.
However, not every sequence of nonnegative integers can be
realized as the degree sequence of a graph. When it is real-
izable, the sequence is called graphic. More precisely, a se-
quence of nonnegative integers d = (d1, d2, . . . , dn) is called
graphic if there exists a graph G with nodes v1, v2, . . . , vn
such that dG(vi) = di for i = 1, 2, . . . , n. The following
classical theorem of Erdos and Gallai characterizes graphic
sequences.
Theorem 1
(Erdos-Gallai). A sequence of nonneg-
ative integers d1 ≥ d2 ≥ ··· ≥ dn is graphic if and only if
∑n
∑
i=1
i=1 di is even and
k
di ≤ k(k − 1) +
n
∑i=k+1
min{di, k},
for k = 1, 2, . . . , n.
The graphicality of a sequence can be tested in linear time
using the Erdos-Gallai theorem [9].
For a digraph G = (V, E), a node has both an in-degree
and an out-degree. The in-degree d−G(v) of a node v is the
number of directed edges coming into v, and the out-degree
d+
G(v) is the number of directed edges going out of v. Associ-
ated with every digraph G is a bi-sequence (d+, d−), where
G(v) : v ∈ V } is the out-degree sequence and d− =
d+ = {d+
{d−G(v) : v ∈ V } is the in-degree sequence. As in the undi-
rected case, not every bi-sequence of nonnegative integers
can be realized by a digraph. A bi-sequence of nonnegative
n ), (d−1 , d−2 , . . . , d−n )} is
integers (d+, d−) = {(d+
called graphic if there exists a digraph G with nodes v1,
i and d−G(vi) = d−i
v2, . . . , vn such that d+
for
i = 1, 2, . . . , n. The Fulkerson-Chen-Anstee theorem char-
acterizes graphic bi-sequences.
G(vi) = d+
2 , . . . , d+
1 , d+
(Fulkerson-Chen-Anstee). A bi-sequence
Theorem 2
1 , . . . , d+
{(d+
graphic if and only if∑n
n ), (d−1 , . . . , d−n )} with d+
i =∑n
∑
min{d−i , k − 1} +
∑
1 ≥ d+
i=1 d−i and
∑i=k+1
d+
i ≤
i=1 d+
i=1
i=1
k
k
n
min{d−i , k},
2 ≥ ··· ≥ d+
n is
for k = 1, 2, . . . , n.
2.2 Maximum Reciprocity Problem
In this subsection, we formulate the maximum reciprocity
problem. For notational simplicity, we henceforth make no
distinction between a graph (digraph) and its edge set when
no confusion arises.
Given a digraph G, let Gs be the symmetric subgraph of
G, i.e. (i, j) ∈ Gs if and only if both (i, j) ∈ G and (j, i) ∈ G.
The reciprocated edges of a digraph G are precisely those
of Gs. Thus the number ρ(G) of reciprocated edges in G is
given by ρ(G) = Gs, and the reciprocity of G is r(G) :=
ρ(G)/G. Note that we use G to denote the number of
edges in G and each pair of reciprocal edges contributes two
to ρ(G).
Given a graphic bi-sequence (d+, d−), let G(d+, d−) de-
note the nonempty set of graphs that have (d+, d−) as their
degree bi-sequence. Since the total number of edges is fixed
for a given graphic bi-sequence, maximizing r(G) is the same
as maximizing ρ(G). The maximum reciprocity problem is
then to find a digraph G in G(d+, d−) with maximum ρ(G),
i.e.
maximize ρ(G)
subject to G ∈ G(d+, d−).
Proposition 1. The number of reciprocated edges in any
digraph with a given degree bi-sequence cannot exceed the
total balanced degree, i.e.
ρ(d+, d−) ≤ β(d+, d−).
A necessary condition for equality is that both d+ ∧ d− and
d+ ∨ d− be graphic.
Proof. Let G ∈ G(d+, d−) be a maximum digraph. Note
that the number of reciprocated edges going out of a node
G(v) ∧ d−G(v). The desired bound is obtained
v is at most d+
by summing over v.
If equality holds, then Gs and Gu, when viewed as undi-
rected graphs, have respective degree sequences d+∧d− and
d+ ∨ d−. Thus both d+ ∧ d− and d+ ∨ d− are graphic.
Note that it is possible that neither d+ ∧ d− nor d+ ∨ d−
is graphic. In fact, one sequence can fail to be graphic inde-
pendent of whether the other is graphic or not, as illustrated
by the following examples, where graphic bi-sequences are
shown along with the corresponding maximum digraphs.
Example 1. In Figure 1, neither the min sequence d+∧d−
nor the max sequence d+ ∨ d− is graphic, since they both
have odd sums. Here ρ(d+, d−) = 2 < β(d+, d−) = 3.
1
2
3
4
5
i
1
2
3
4
5
(d+
i , d−i )
(1, 0)
i ∧ d−i
d+
0
i ∨ d−i
d+
1
(1, 1)
(0, 2)
(2, 1)
(1, 1)
1
0
1
1
1
2
2
1
Figure 1: Graphic bi-sequence with non-graphic max and
min sequences.
Example 2. In Figure 2, the min sequence d+ ∧ d− is
graphic, while the max sequence d+ ∨ d− is not. No reci-
procity is allowed by this bi-sequence, i.e. ρ(d+, d−) = 0,
while the upper bound gives β(d+, d−) = 2n, so the gap
can be arbitrarily large. The only unbalanced nodes s and r
have very large unbalanced degrees that cannot be absorbed
by themselves, as a consequence of which some, in fact all,
balanced degrees have to be used for absorbing unbalanced
degrees rather than forming reciprocal edges.
Example 3. In Figure 3, the max sequence d+ ∨ d− is
graphic, while the min sequence d+ ∧ d− is not. As in Ex-
ample 2, no reciprocity is allowed here, i.e. ρ(d+, d−), while
the upper bound is β(d+, d−) = 2n. The situation is, how-
ever, the opposite. Node 0 has too large a balanced degree
relative to the number of nodes with nonzero balanced de-
grees, which is one here. Thus some of the balanced degrees
have to be absorbed by the unbalanced degrees.
The common pattern in Examples 2 and 3 is that there are
a small number of nodes with extremely large degrees. In the
social network context, these nodes correspond to celebrities
We denote the maximum value by ρ(d+, d−) and refer to a
digraph G with ρ(G) = ρ(d+, d−) as a maximum reciprocity
digraph or maximum digraph for short.
2.3 Some Notations
We collect here some notations for later reference. Let G
denote a generic digraph.
• Let Ga be the anti-symmetric subgraph of G, i.e. (i, j) ∈
Ga if and only if (i, j) ∈ G but (j, i) /∈ G. Note that
G = Gs + Ga and Gs ∩ Ga = ∅, i.e. G is the edge
disjoint union of Gs and Ga.
• Let Gu be the undirected graph obtained by sym-
metrizing G, i.e. (i, j) ∈ Gu if either (i, j) ∈ G or
(j, i) ∈ G.
Let (d+, d−) be a graphic bi-sequence.
• The min sequence is
d+ ∧ d− = (d+
1 ∧ d−1 , d+
2 ∧ d−2 , . . . , d+
n ∧ d−n ),
where a ∧ b = min{a, b}.
• The max sequence is
d+ ∨ d− = (d+
1 ∨ d−1 , d+
2 ∨ d−2 , . . . , d+
n ∨ d−n ),
where a ∨ b = max{a, b}.
• The total number of edges is
ε(d+, d−) =∑i
β(d+, d−) =∑i
d+
i =∑i
d−i .
i ∧ d−i ,
d+
which is the total variation distance between d+ and
d−. Note that ε(d+, d−) = β(d+, d−) + ν(d+, d−).
3. HARDNESS ANALYSIS AND BOUNDS
In this section, we first provide an upper bound for the
maximum number of reciprocated edges allowed by a graphic
bi-sequence. We then prove that the maximum reciprocity
problem is NP-hard by showing that it is NP-complete to
decide the achievability of the upper bound. Some sufficient
conditions for achieving the upper bound are then provided.
3.1 Upper Bound for Reciprocity
In this subsection, we first establish a simple upper bound
on the maximum number of reciprocal edges in terms of the
total imbalance of the graphic bi-sequence, along with neces-
sary conditions for achieving this upper bound. Some exam-
ples are provided to illustrate how the necessary conditions
may fail and that they are not sufficient, which provides
insight into why the bound is not always tight.
which is the ℓ1-norm of the min sequence.
i − d−i ,
d+
∑
i
1 2
• The total unbalanced degree is
ν(d+, d−) =
• The total balanced degree is
r
0
1
2
n−1
n
i
i , d−i )
(d+
0 ∼ ⌊n/2⌋
(n − i, i)
⌈n/2⌉ ∼ n (n − i, i)
i ∧ d−i
d+
i
n − i
i ∨ d−i
d+
n − i
i
Figure 4: Insufficiency of necessary condition.
Proof. Note that the problem is the same as the exis-
tence problem of a digraph G ∈ G(d+, d−) with ρ(G) =
β(d+, d−). This problem is in NP, since given a digraph G,
we can verify whether ρ(G) = β(d+, d−) in polynomial time.
To show that the problem is NP-hard, we adapt the proof
of Lemma 5 in [5] by reduction from the 3-color tomography
problem, which is shown to be NP-hard therein.
Recall that the 3-color tomography problem is as follows.
Given nonnegative integral vectors rw, rb ∈ Nn, and sw, sb ∈
Nm that satisfy
i ≤ m,
for 1 ≤ i ≤ n, 1 ≤ j ≤ m,
j ≤ n,
rw
i + rb
sw
j + sb
and
n
∑
i=1
rc
i =
m
∑
j=1
sc
j,
for c ∈ {w, b},
decide if (rw, rb, sw, sb) is feasible, i.e. there exists a matrix
M with entries in {w, b, g} such that
rc
i = {j : Mij = c},
for c ∈ {w, b}.
Let (rw, rb, sw, sb) be an n × m instance of the 3-color
sc
j = {i : Mij = c},
tomography problem. For 1 ≤ i ≤ n and 1 ≤ j ≤ m, let
d+
i = rw
d−i = rw
i + rb
i + n − 1,
i + n − 1,
n+j = sw
d+
j ,
d−n+j = sw
j + sb
j.
(1)
i=1 rw
i .
Now we show that (rw, rb, sw, sb) is feasible if and only
if (d+, d−) is graphic and ρ(d+, d−) = β(d+, d−), where
β(d+, d−) = n(n − 1) + 2∑n
First assume that M is a solution to the 3-color tomog-
raphy instance. We construct a digraph G as follows. For
1 ≤ i ≤ n and 1 ≤ j ≤ m, let Wij = 1 if Mij = w, and
Bij = 1 if Mij = b. Let J be an n × n matrix with all
off-diagonal entries equal to 1 and diagonal entries equal to
0. Let the adjacency matrix of G be
( J W + B
0 ) .
W T
It is straightforward to verify that G ∈ G(d+, d−) and ρ(G) =
β(d+, d−).
For the reverse direction, assume that (d+, d−) is graphic
and ρ(d+, d−) = β(d+, d−). Then there exists a digraph
G ∈ ρ(d+, d−) with ρ(G) = β(d+, d−). Divide the adja-
cency matrix of G into the following block form
G =(G11 G12
G21 G22) .
i
s
(d+
i , d−i )
(2n, 0)
i ∧ d−i
d+
0
i ∨ d−i
d+
2n
1 ∼ 2n
r
(1, 1)
(0, 2n)
1
0
1
2n
Figure 2: Graphic bi-sequence with graphic min sequence
but non-graphic max sequence.
s1
s2
r1
r2
0
s2n
r2n
i
s1 ∼ s2n
r1 ∼ r2n
0
(d+
i , d−i )
(1, 0)
i ∧ d−i
d+
0
i ∨ d−i
d+
1
(0, 1)
(2n, 2n)
0
2n
1
2n
Figure 3: Graphic bi-sequence with graphic max sequence
but non-graphic min sequence.
(node r in Figure 2), information aggregators (node s in
Figure 2), or middlemen (node 0 in Figure 3). These large
degree nodes often incur inevitable reduction of reciprocity
from the upper bound.
The next example shows that the necessary condition in
Proposition 1 is not sufficient.
i , d+
Example 4. For the bi-sequence (d+
i ) = (n − i, i), i =
0, 1, . . . , n, the upper bound is β(d+, d−) = ⌊n/2⌋ · ⌈n/2⌉.
When n is a multiple of 4, both the max sequence d+ ∨
d− and the min sequence d+ ∧ d− are graphic. However,
ρ(d+, d−) = 0, as the only digraph in G(d+, d−), of which
(i, j) is an edge if and only if i < j, has zero reciprocity; see
Figure 4.
3.2 Proof of NP-hardness
We saw in the previous subsection that the upper bound
may not be achievable. Unfortunately, the next theorem
shows that it is NP-complete to decide whether the upper
bound is achievable, which means the maximum reciprocity
problem is NP-hard.
Theorem 3. The decision problem whether ρ(d+, d−) =
β(d+, d−) is NP-complete.
1 2
2n
s
n+i, which, by (1), evaluates
k=1 G(k, j) and
d+
i=1 d+
where G11 is n × n and G22 is m × m.
Let Φ =∑n
to n(n − 1). On the other hand, d−j = ∑n+m
n+i =∑n+m
∑
j=1 d−j −∑m
∑
k=1 G(n + i, k), so
G11(i, j) −
∑
∑
Φ =
j=1
j=1
i=1
i=1
m
m
n
n
G22(i, j) ≤ n(n − 1) = Φ,
where the inequality follows from the facts that G11(i, j) ≤
1, G11(i, i) = 0 and G22(i, j) ≥ 0. Since the equality holds,
we must have G11 = J and G22 = 0. Thus
ρ(G) = n(n − 1) + 2
≤ n(n − 1) + 2
= n(n − 1) + 2
n
n
i=1
∑
∑
∑
j=1
i=1
m
G12(i, j)G21(j, i)
G21(j, i)
m
j=1
∑
∑
j=1
m
n+j = β(d+, d−) = ρ(G).
d+
Since the equality holds, G12(i, j) ≥ G21(j, i). Thus G12 =
W + B and G21 = W T for some (0, 1)-matrices W and B.
Let Mij = w if W (i, j) = 1, and Mij = b if Bij = 1. Then
M is a solution to the 3-color tomography instance.
Since the graphicality of (d+, d−) can be tested in quadratic
time using the Fulkerson-Chen-Anstee theorem, the above
reduction then shows that it is NP-hard to decide whether
ρ(d+, d−) = β(d+, d−).
3.3 Sufficient Conditions for Achieving Bound
Given the hardness of the maximum reciprocity problem,
we provide some sufficient conditions for achieving the upper
bound in Proposition 1. We start with the following slightly
more general theorem, which may potentially be used to
lower bound ρ(d+, d−).
Theorem 4. Suppose that d0 is a graphic sequence such
that the residual bi-sequence (d+−d0, d−−d0) is also graphic.
If ∆ < √δn +(δ − 1
2 − δ, where n = V0, ∆ =
∨i∈V0
i ), with
V0 = {i : d+
i + d−i − d0
i + d−i − d0
(d+
(d+
i ∨ d−i > 0}, then ρ(d+, d−) ≥ 2∑i d0
2)2 + 3
i ) and δ = ∧i∈V0
This theorem is analogous to Theorem 2.2 in [3], which
deals with packing two graphic sequences for undirected
graphs. Theorem 4 deals with packing a graphic sequence
d0 for undirected graphs and a graphic bi-sequence (d+ −
d0, d− − d0) for digraphs. The proof closely follows that of
Theorem 2.2 in [3] and can be found in [11].
Applying Theorem 4 with d0 = d+ ∧ d−, we obtain the
following sufficient conditions for achieving the upper bound
in Proposition 1.
i .
Corollary 1. ρ(d+, d−) = β(d+, d−) if the following
conditions hold,
(1). d+∧d− and (d+−d+∧d−, d−−d+∧d−) are graphic;
2 − δ, where n = V0, ∆ =
i ∨ d−i ), with V0 =
(d+
(2). ∆ < √δn +(δ − 1
2)2 + 3
i ∨ d−i ) and δ = ∧i∈V0
(d+
i ∨ d−i > 0}.
∨i∈V0
{i : d+
Note that ∆ is the maximum of either the in- or out-
degrees. Putting an upper bound on ∆ rules out extremely
large degrees, which are the trouble makers in the examples
of Section 3.1. However, in most real networks, we have δ =
1, so the sufficient condition essentially requires ∆ < √n,
which, unfortunately, usually fails to hold. In fact, it fails
for most networks studied in Section 5.
4. PATTERNS IN MAXIMUM DIGRAPHS
In this section, we identify some structural patterns of
maximum digraphs, or equivalently, the associated subop-
timal structures that contribute to the loss in reciprocity
not imposed by the degree bi-sequence. We first look at
some small suboptimal motifs and provide a greedy algo-
rithm to eliminate them. We then show some more compli-
cated structural patterns of maximum digraphs and demon-
strate how they can help us pin down the maximum digraphs
in some special cases. Omitted proofs can be found in [11].
Throughout this section, a cycle or a path always refers
to a directed cycle or directed path, i.e. the edges must be
all in the same direction as we follow the cycle or path. We
also require that the edges be distinct. On the other hand,
the vertices are not necessarily distinct. When the vertices
are distinct, we say the path or cycle is elementary.
4.1 Small Suboptimal Motifs
In this subsection, we focus on a particular type of small
motifs that we call 3-paths, the nonexistence of which also
guarantees the nonexistence of many larger scale subopti-
mal structures. As we will see in Section 5, elimination of
such suboptimal motifs brings reciprocity close to the corre-
sponding upper bound for a variety of real world networks.
Given a digraph G, we call an elementary path of length 3,
π = (v0, v1, v2, v3), a 3-path if (vi, vi+1) ∈ Ga for i = 0, 1, 2,
i.e., π consists entirely of unreciprocated edges. We further
classify 3-paths into the following four types according to
the connectivity between v0 and v3 (Figure 5),
(I). (v0, v3) /∈ Gu, i.e. there is no edge between v0 and v3;
(II). (v0, v3) ∈ Gs;
(III). (v3, v0) ∈ Ga, i.e. (v0, v1, v2, v3, v0) is a 4-cycle;
(IV). (v0, v3) ∈ Ga.
As shown in Figure 5, 3-paths of Types I, II and III
are suboptimal and can be rewired locally to increase reci-
procity. We say a digraph is 3-path optimal
if it has no
3-path of Type I, II or III. Note that when viewed as a
transformation on Ga, the rewiring procedure in Figure 5
simply eliminates 4-cycles (Type III), and replaces open 3-
paths by a shortcut from its first vertex to its last vertex if
such a shortcut does not yet exist (Types I and II). Thus
each rewiring increases the number of reciprocated edges by
either 2 or 4, and we have the following
Lemma 1. A maximum digraph is 3-path optimal.
Given a digraph G, we can greedily rewire all 3-paths to
get a lower bound on the maximum reciprocity allowed by
the degree bi-sequence of G. The resulting greedy algorithm
is shown in Algorithm 1. Lemma 2 guarantees that Algo-
rithm 1 eliminates all 3-paths of Types I, II and III.
v0
×
v3
v1
×
v2
(b) Type II.
v0
v3
v1
v2
gorithm 1. Let G denote a 3-path optimal digraph through-
out this subsection.
Lemma 3 shows that the unreciprocated edges of a 3-path
optimal digraph cannot form any elementary path of odd
length without a shortcut. As a result, for any two vertices
u and v, either there is no path from u to v in Ga, or there
is such a path of length at most 2.
Lemma 3. If π = (v0, v1, . . . , v2p+1) is an elementary path
of odd length in Ga, then (v0, v2p+1) ∈ Ga.
Lemma 4 shows that the anti-symmetric subgraph of a
3-path optimal digraph is almost cycle free. We can obtain
a directed acyclic graph from it by removing an edge from
each 3-cycle.
(d) Type IV.
Lemma 4. The only possible cycles in Ga are 3-cycles,
and any two of them must be vertex disjoint.
v1
v2
v1
v2
× ×
× ×
v0
v3
v0
v3
(a) Type I.
(c) Type III.
Figure 5: Different types of 3-paths with corresponding
rewirings. The edges marked by red crosses are to be rewired
into the dashed green edges.
Algorithm 1 GreedyRewire
Input: G = (V, E)
1: S ← V
2: while S = ∅ do
pick v0 ∈ S
3:
if ∃ non-Type IV 3-path π = (v0, v1, v2, v3) then
4:
5:
6:
7:
8:
9:
10: end while
11: return G
G ← Rewire(π)
S ← S ∪ {v1, v2}
S ← S − {v0}
end if
else
Lemma 2. Algorithm 1 returns a 3-path optimal digraph.
Note that depending on how v0 and π are picked, Al-
gorithm 1 can return different 3-path optimal graphs. Al-
though there is no theoretical guarantee, we will see in Sec-
tion 5 that reciprocities of 3-path optimal digraphs returned
by Algorithm 1 are very close to the corresponding upper
bounds and hence close to the maxima as well. The next
subsection shows that 3-path optimality precludes many other
suboptimal structures, which partially explains why Algo-
rithm 1 works pretty well in practice.
4.2 Properties of Maximum Digraphs
In this subsection, we consider additional suboptimal struc-
tures that are more complicated than 3-paths. Some of these
structures are automatically eliminated by Algorithm 1, while
others require extra attention. We will state the results as
properties of maximum digraphs. Any violation of the stated
properties yields a suboptimal structure.
4.2.1 3-path optimal digraphs
We first consider some properties of 3-path optimal di-
graphs, which, by Lemma 1, are also properties of maxi-
mum digraphs. All these properties involve only unrecip-
rocated edges. Note that any suboptimal structures that
violate these properties are automatically eliminated by Al-
Although 3-path optimality does not preclude 3-cycles,
they are unlikely to exist in 3-path optimal graphs obtained
from real world networks using Algorithm 1, as Lemma 5
requires that the vertices of a 3-cycle in such graphs have
exactly the same connectivity to every vertex outside the 3-
cycle, which is extremely unlikely, especially in large graphs.
Lemma 5. For a 3-cycle C in Ga and any vertex v not
in C, either there is no path in Ga that connects v and C,
or there is an edge of Ga between v and each vertex of C,
all in the same direction.
4.2.2 Maximum digraphs
In this subsection, we consider some properties of maxi-
mum digraphs that are not direct consequences of 3-path op-
timality. The associated suboptimal structures may be left
intact by Algorithm 1 and require extra attention. Through-
out this subsection, let G⋆ denote a maximum digraph with
a given bi-sequence (d+, d−),
i.e. G⋆ ∈ G(d+, d−) and
ρ(G⋆) = ρ(d+, d−).
We know from Lemma 4 that large cycles involving only
unreciprocated edges are suboptimal structures, but certain
cycles of even length that contains reciprocated edges are
also suboptimal. In particular, we have the following
Lemma 6. Let C be an even cycle in H ∈ G(d+, d−). If
any two edges in C ∩ Hs are separated by an odd number of
edges in C, then there exists H′ ∈ G(d+, d−) with ρ(H′) =
ρ(H) + Ca − 2Ca ∩ Hs, where Ca is the anti-symmetric
part of C, i.e. Ca = {(i, j) ∈ C : (j, i) /∈ C}.
Note that C ∩ Ha ⊂ Ca, but it is not necessarily true that
Ca = C ∩ Ha. The two edges (3, 4) and (5, 0) in Figure 6(a)
are in Ca but not in C ∩ Ha. Any cycle satisfying the condi-
tions in Lemma 6 is suboptimal if it has more anti-symmetric
edges than symmetric ones. The cycles (0, 1, 2, 3, 4, 5, 0) in
Figure 6(a) and (0, 1, 2, 0, 5, 3, 4, 5, 0) in Figure 6(b) are two
such examples. Note that these two cycles are not automat-
ically eliminated by Algorithm 1.
Lemma 7 specifies how multiple 3-cycles should be con-
nected in maximum digraphs.
If we collapse each 3-cycle
into a single vertex by contracting its edges, the subgraph
of G⋆
a induced by these vertices will have the structure in
Figure 4. Therefore, while the existence of multiple 3-cycles
is already very unlikely in 3-path optimal digraphs, it is even
less likely in maximum digraphs with degree bi-sequences of
real world networks.
Proposition 2 shows that when the bi-sequence is perfectly
balanced, the maximum digraph achieves perfect or near-
perfect reciprocity. Therefore, any unfulfilled reciprocity
must be due to the lack of effort to form reciprocal edges
rather than due to the fundamental limit imposed by the
bi-sequence itself.
Proposition 2. Suppose (d+, d−) is perfectly balanced,
i.e. ν(d+, d−) = 0.
(1). If ε(d+, d−) is even, then ρ(d+, d−) = ε(d+, d−).
(2). If ε(d+, d−) is odd, then ρ(d+, d−) = ε(d+, d−) − 3,
and G⋆
a consists of a 3-cycle.
i = d−i
Proof. Since ν(d+, d−) = 0, we have d+
for all i.
Thus any edge of G⋆
a must be contained in a cycle of length
at least 3 in G⋆
a. By Lemma 4, the length of such a cycle is
exactly 3. By Lemma 7, there is at most one such cycle in
G⋆
a is either empty or a 3-cycle. Since ρ(G⋆) must
be even, the former case corresponds to even ε(d+, d−) and
the latter odd ε(d+, d−).
a. Thus G⋆
The next proposition shows that when the bi-sequence is
slightly unbalanced, the number of possible values of ρ(d+, d−)
increases. This sheds some light on why the maximum reci-
procity problem is so difficult. As the total unbalanced de-
gree increases, the number of possibilities is expected to ex-
plode.
Proposition 3. Suppose (d+, d−) is slightly unbalanced
1 = 1.
0 − d−0 = 1 and d−1 − d+
with ν(d+, d−) = 1, d+
(1). If ε(d+, d−) is even, then the gap ε(d+, d−)−ρ(d+, d−)
is either 2 or 4. When the gap is 2, the two edges in
G⋆
a form a 2-path from 0 to 1. When the gap is 4, G⋆
a
is the vertex disjoint union of {(0, 1)} and a 3-cycle.
(2). If ε(d+, d−) is odd, then the gap ε(d+, d−)−ρ(d+, d−)
a = {(0, 1)}.
a is the vertex disjoint union of
is either 1 or 5. When the gap is 1, G⋆
When the gap is 5, G⋆
a 2-path from 0 to 1 and a 3-cycle.
Proof. Note that there must be a path from 0 to 1 in
G⋆
a. Let π be the shortest path from 0 to 1 in G⋆
a. All
edges in G⋆
a − π, if there is any, must be contained in a
cycle in G⋆
a. By Lemma 4, G⋆
a can only have 3-cycles. If G⋆
a
had more than one 3-cycles, Lemma 7 would require that
there be at least 9 edges in G⋆
a that are not contained in
any cycle, all of which must be in π. Lemma 3 shows that
π has either one or two edges. Therefore, G⋆
a − π is either
empty or has one 3-cycle. By Lemma 5, π and the 3-cycle,
if there is one, must be vertex disjoint. Since π ∈ {1, 2},
a − π ∈ {0, 3}, it follows that ε(d+, d−) − ρ(G⋆) =
and G⋆
G⋆
a − π ≤ 2 + 3 = 5. Note that ρ(G⋆) is
even. If ε(d+, d−) is even, then ε(d+, d−) − ρ(G⋆) is equal
to π = 2 or α(G⋆) = π + Ga − π = 1 + 3 = 4.
If
ε(d+, d−) is odd, then ε(d+, d−)− ρ(G⋆) is equal to π = 1
or π + G⋆
a − π = 2 + 3 = 5.
a = π + G⋆
2
3
× ×
1
4
(b)
0
××
5
2
3
× ×
1
4
(a)
0
×
5
Figure 6: Suboptimal even cycle with reciprocated edges.
Reciprocity can be increased by rewiring edges marked by
red crosses into the dashed green edges.
Lemma 7. The set of all distinct 3-cycles of G⋆
a can be
linearly ordered as C0, C1, . . . , Cm such that there are 9 edges
of G⋆
a going from Ci to Cj for all 0 ≤ i < j ≤ m.
The next lemma complements Lemma 3 by specifying con-
nection patterns of elementary paths of even length.
Lemma 8. Let π = (v0, v1, . . . , v2p) be an elementary path
of even length 2p ≥ 4 in G⋆
a, E0 = {(v2i, v2j) : i = j} and
a, then G⋆
E1 = {(v2i−1, v2j−1) : i = j}. If (v0, v2p) /∈ G⋆
either has all the edges in E0 but none in E1, or vice versa.
Figure 7 shows both possibilities for an elementary path
of length 4. The shortcuts required by Lemma 3 are also
shown. The red dashed edges represent those that cannot
coexist with the green edges in a maximum digraph. Some
suboptimal structures that violate Lemma 8 cannot be au-
tomatically eliminated by Algorithm 1. For example, if the
pair of edges between the vertices 0 and 2 are missing from
Figure 7(a), the resulting suboptimal digraph will be left
intact by Algorithm 1.
0
1
2
3
4
(a) E0 ⊂ G⋆, E1 ∩ G⋆ = ∅.
0
1
2
3
4
(b) E1 ⊂ G⋆, E0 ∩ G⋆ = ∅.
Figure 7: Patterns of even paths in maximum digraphs..
Each undirected solid edge represents a pair of reciprocated
edges in G⋆. Each dashed edge represents a pair of edges
that are both missing in G⋆.
4.3 Some Examples
In this subsection, we illustrate how the structural pat-
terns of the previous subsection may be used to pin down
the maximum digraph in some special cases. Here G⋆ always
denotes a maximum digraph.
It is easy to come up with examples where the gaps are 1
and 2, respectively. The next examples shows that the other
two cases are also possible.
Example 5. Let (d+, d−) = {(1, 3, 2, 2, 2), (0, 4, 2, 2, 2)}.
Figure 8(a) shows a realization G of this bi-sequence, where
each undirected edge represents a pair of edges in opposite
directions. Note that ρ(G) = ε(d+, d−) − 4. We claim that
ρ(G) = ρ(d+, d−). If not, then ρ(G⋆) = ε(d+, d−) − 2 by
Proposition 3, and the two edges in G⋆
a form a 2-path π
from a to b. Since c, d, e have the same in- and out-degrees
and hence are equivalent, we may assume without loss of
generality that π = (a, c, b). Thus G⋆
a − π is symmetric and
corresponds to a simple graph with degree sequence d =
{0, 3, 1, 2, 2}. There is only one simple graph with this degree
sequence, which is shown by the black edges in Figure 8(b).
When we superimpose π and G⋆
a − π, there are two edges
from (c, b), and hence G⋆ /∈ G(d+, d−), a contradiction.
a
b
c
d
e
a
c
b
d
e
(a) G.
(b) π and G⋆
a − π.
Figure 8: Example 5.
Example 6. Let (d+, d−) = {(1, 0, 4, 2, 2, 2), (0, 1, 4, 2, 2, 2)}.
Figure 9 shows a realization G of this bi-sequence, where
each undirected edge represents a pair of edges in opposite
directions. Note that ρ(G) = ε(d+, d−) − 5. Since the se-
quence d+∧d− = {0, 0, 4, 2, 2, 2} is not graphic, Proposition
1 shows that ρ(d+, d−) < β(d+, d−) = ε(d+, d−)− 1. Thus
Proposition 3 yields ρ(G) = ρ(d+, d−).
In fact, G is the
only element of G(d+, d−).
a
b
c
d
e
f
Figure 9: Example 6.
5. EMPIRICAL STUDY
In this section, we conduct an empirical analysis of real
networks by comparing the observed values of reciprocity
against the upper bounds. We also look at the lower bounds
on maximum reciprocities given by Algorithm 1.
5.1 Datasets
The networks that we analyze include major online social
networks (OSN) that are directed in nature [15, 12, 8, 24,
13]. For the purpose of comparison, we have also included
other types of networks: biological networks [20, 21, 18, 23,
19, 27], communication networks [13], product co-purchasing
networks [13], web graphs [13], Wikipedias [1], software call
graphs [22, 17], and P2P networks [13]. All the datasets
except for Wikipedias are already converted into graph rep-
resentations by other researchers and the descriptions for the
datasets can be found at the cited sources. For Wikipedias,
each node represents a page. Only article pages, i.e. pages
with namespace ID 0, are included. Pages that redirect to
the same page are represented as a single node correspond-
ing to the destination page. There is an edge from node A
to node B if there is at least one hyperlink from page A to
page B. Multiple edges and self-loops are discarded.
5.2 Empirical Reciprocity vs. Upper Bound
Figure 10: Scatter plot of empirical reciprocity versus upper
bound. Regression line was fitted without data points for
biological, P2P and software call networks.
Figure 10 shows the scatter plot of empirical reciproci-
ties against the corresponding upper bounds. Here the up-
per bound is normalized by the number of edges, i.e., it is
the ratio β(d+, d−)/ε(d+, d−). Note that the reciprocity
values vary widely, ranging from 0 for the peer-to-peer net-
work Gnutella to 90% for the online social network Slashdot.
There is even a fair amount of variation within the cate-
gories of biological, social and Wikipedia networks. In gen-
eral, social networks and Wikipedia networks tend to have
high reciprocity, while software call networks tend to have
low reciprocity. Note the strong linear correlation between
empirical reciprocity and the upper bound. This is a bit sur-
prising, especially for the social networks, in view of the large
variations in reciprocity. Related to Figure 10 is the scatter
plot in Figure 11 of number of reciprocated edges against the
unnormalized bound β(d+, d−). There the linear relation-
ship in log-log scale is even more apparent, with biological
networks being also around the regression line. These linear
relationships suggest that there might exist some universal
mechanism that works across different domains.
Despite the wide variation in reciprocity, the ratio between
the empirical reciprocity and the normalized upper bound
has a much narrower range as shown by the box plots for
the ratios in Figure 12.
Note that the ratios are close to zero for the P2P network
Gnutella and software call graphs. The Gnutella exhibits
zero reciprocity, far away from the upper bounds, which are
above 30%. This is probably because Gnutella implements
an indirect reciprocity mechanism. The low reciprocity for
software call graphs is not surprising, as software codes are
usually designed to work in a hierarchical manner. The case
for biological networks are more complicated, as the four
biological networks considered here are actually of quite dif-
ferent natures. For example, the C. Elegan neural network
and the mouse cortex network are both neural networks,
but the former is at the neuron level while the latter is at
a coarser level of cortical regions. One can speculate that
y=1.1x-0.21
biological
communication
co-purchase
social
web
wikipedia
software call
p2p
Slashdot0811
Slashdot0902
YouTube
LiveJournal1
LiveJournal
mouse-cortex
Chinese
Flickr
Korean
Pokec
Italian
Polish
NotreDame
Portuguese
Russian
English
ego-Twitter
French
Japanese
Epinions1
German
Twitter
C.Elegan
protein-interaction
Dutch
Google+
Google
Stanford
email-EuAll
BerkStan
Swedish
ego-Google+
wiki-Talk
yeast
AT
0
StackOF
0.2
Spanish
wiki-Vote
0.4
0.6
upper bound
0.8
1
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
reciprocity
ples include the web graphs, the Swedish Wikipedia and the
Google+ network, whose reciprocities are not very high in
absolute value but quite high relative to the bound. This
suggests that when we study these networks, it might be
more meaningful to ask the question why there is such large
imbalance in degrees than to ask the question why the ten-
dency to reciprocate is low.
5.3 Reciprocity of 3-path Optimal Digraphs
In this subsection, we look at 3-path optimal digraphs
returned by Algorithm 1. Note that the reciprocity of such a
digraph provides a lower bound on the maximum reciprocity
of the corresponding degree bi-sequence.
Figure 13 shows the scatter plot of the reciprocities of the
3-path optimal digraphs against the corresponding upper
bounds. Note that the reciprocities of 3-path optimal di-
graphs are very close to the upper bounds, which means that
the maximum reciprocities are also very close to the upper
bounds. Therefore, for the degree bi-sequences of those real
networks, the fundamental limit that they impose on reci-
procity is largely summarized by the upper bounds, and the
major source of loss in reciprocity is the existence of 3-paths
of Types I, II and III. Thus in practice Algorithm 1 usu-
ally suffices for approximating maximum reciprocities and
we do not need to worry much about the more complicated
suboptimal structures in Section 4.2.2.
Figure 11: Scatter plot of number of reciprocated edges ver-
sus upper bound. Regression line was fitted in log scale,
without data points for software call networks.
Figure 12: Box plot of reciprocity-bound ratio for different
network categories.
both the low reciprocity in C. Elegan neural network and
the high reciprocity in the mouse cortex network are due to
biological reasons. However, we do not know if this behavior
is a norm or an exception due to the lack of data for similar
networks.
In all categories other than biological, software call and
P2P networks, the ratios are above 50% with only three ex-
ceptions: the wiki-Vote network, the Stack Overflow Q&A
network, and the Spanish Wikipedia. Although we have
classified the Stack Overflow Q&A network as a social net-
work, it differs from typical social networks. The low reci-
procity suggests that there is a hierarchy of expertise. What
is more interesting is the wiki-Vote network and the Spanish
Wikipedia, as their behaviors deviate from those of other
networks of the same category, which suggests that there
might be something unusual about them that is worthy of
scientific study. Apart from the three outliers, all other
networks in these categories actually achieve a significant
fraction of the possible reciprocity suggested by the upper
bound. This means that modulo the degree constraints, the
tendency to reciprocate is much stronger than the empirical
reciprocity alone might have suggested. Prominent exam-
Figure 13: Scatter plot of reciprocity of the 3-path optimal
digraph returned by Algorithm 1 versus upper bound.
Finally, recall from Section 4.2.1 that the existence of 3-
cycles in a 3-path optimal digraph requires some specific
structures. These structures are usually too special to occur
in practice, so 3-cycles are unlikely to exist in 3-path optimal
digraphs. This is indeed the case for most of the 3-path opti-
mal digraphs obtained from the real networks studied here,
the anti-symmetric parts of which turn out to be acyclic.
6. CONCLUSION
In this work, we showed that the maximum reciprocity
problem is NP-hard. We provided a partial characteriza-
tion of networks with maximum reciprocity and a greedy
algorithm to eliminate suboptimal motifs. We also provided
an upper bound on reciprocity along with necessary condi-
tions and sufficient conditions for achieving the bound. We
y=0.14x1.09
biological
communication
co-purchase
social
web
wikipedia
software call
Stackoverflow
103
105
upper bound
107
109
108
106
104
102
# reciprocated edges
100
101
Spanish
wiki-Vote
Stackoverflow
Bio Com CoP Soc Web Wiki Call P2P
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
reciprocity-bound ratio
y=x
biological
communication
co-purchase
social
web
wikipedia
software call
p2p
0
0.2
0.4
0.6
upper bound
0.8
1
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
reciprocity from GreedyRewire
demonstrated that the bound is surprisingly close to the
observed reciprocity in a wide range of real networks, which
suggests that the tendency to form reciprocal edges might be
much stronger than the observed reciprocity indicates. We
found surprising linear relationships between empirical re-
ciprocities and the corresponding upper bounds. We showed
that a particular type of suboptimal motif called 3-paths is
the major source of loss in reciprocity in these networks.
Acknowledgements
This work was supported in part by DoD ARO MURI Award
W911NF-12-1-0385, NSF grants CNS-1065133, CNS-1117536,
CNS-1411636, and DTRA grants HDTRA1-09-1-0050 and
HDTRA1-14-1-0040.
7. REFERENCES
[1] http://dumps.wikimedia.org/.
[2] R. Albert, H. Jeong, and A.-L. Barab´asi. Internet:
Diameter of the world-wide web. Nature,
401(6749):130 -- 131, 1999.
[3] A. H. Busch, M. J. Ferrara, S. G. Hartke, M. S.
Jacobson, H. Kaul, and D. B. West. Packing of graphic
n-tuples. Journal of Graph Theory, 70(1):29 -- 39, 2012.
[4] M. Cha, A. Mislove, and K. P. Gummadi. A
measurement-driven analysis of information
propagation in the flickr social network. In Proc.
WWW'09, pages 721 -- 730, 2009.
[5] C. Durr, F. Guinez, and M. Matamala. Reconstructing
3-colored grids from horizontal and vertical
projections is NP-hard. In Algorithms-ESA 2009, page
776787. Springer, 2009.
[6] D. Garlaschelli and M. I. Loffredo. Patterns of link
reciprocity in directed networks. Phys. Rev. Lett.,
93:268701, Dec 2004.
[7] A. Gaudeul and C. Peroni. Reciprocal attention and
norm of reciprocity in blogging networks. Technical
report, Jena Economic Research Papers, 2010.
[8] R. Gonzalez, R. Cuevas, R. Motamedi, R. Rejaie, and
A. Cuevas. Google+ or Google-?: Dissecting the
evolution of the new OSN in its first year. In Proc.
WWW'13, pages 483 -- 494, 2013.
[9] A. Iv´anyi and L. Lucz. Erdos-Gallai test in linear
time. Combinatorica, 2011.
[10] A. Java, X. Song, T. Finin, and B. Tseng. Why we
twitter: Understanding microblogging usage and
communities. In Proc. WebKDD/SNA-KDD'07, pages
56 -- 65, 2007.
[11] B. Jiang, Z.-L. Zhang, and D. Towsley. Reciprocity in
social networks with capacity constraints. Technical
Report UM-CS-2015-013, UMass Amherst, 2015.
[12] H. Kwak, C. Lee, H. Park, and S. Moon. What is
twitter, a social network or a news media? In Proc.
WWW'10, pages 591 -- 600, 2010.
[13] J. Leskovec and A. Krevl. SNAP Datasets: Stanford
large network dataset collection.
http://snap.stanford.edu/data, June 2014.
[14] G. Magno, G. Comarela, D. Saez-Trumper, M. Cha,
and V. Almeida. New kid on the block: Exploring the
Google+ social graph. In Proc. IMC'12, pages 159 -- 170,
2012.
[15] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel,
and B. Bhattacharjee. Measurement and analysis of
online social networks. In Proc. IMC'07, pages 29 -- 42,
2007.
[16] M. E. J. Newman, S. Forrest, and J. Balthrop. Email
networks and the spread of computer viruses. Phys.
Rev. E, 66:035101, Sep 2002.
[17] Y. Qu, Q. Zheng, T. Liu, J. Li, and X. Guan. In-depth
measurement and analysis on densification power law
of software execution. In Proc. WETSoM'14, pages
55 -- 58. ACM, 2014.
[18] M. C. Teixeira, P. T. Monteiro, J. F. Guerreiro, J. P.
Gon¸calves, N. P. Mira, S. C. dos Santos, T. R.
Cabrito, M. Palma, C. Costa, A. P. Francisco, et al.
The YEASTRACT database: an upgraded
information system for the analysis of gene and
genomic transcription regulation in Saccharomyces
cerevisiae. Nucleic Acids Research,
43(D1):D161 -- D166, 2014.
[19] A. Vinayagam, U. Stelzl, R. Foulle, S. Plassmann,
M. Zenkner, J. Timm, H. E. Assmus, M. A.
Andrade-Navarro, and E. E. Wanker. A directed
protein interaction network for investigating
intracellular signal transduction. Science signaling,
4(189):rs8, 2011.
[20] D. J. Watts and S. H. Strogatz. Collective dynamics of
'small-world' networks. Nature, 393(6684):440 -- 442,
1998.
[21] J. G. White, E. Southgate, J. N. Thomson, and
S. Brenner. The structure of the nervous system of the
nematode caenorhabditis elegans. Phil. Trans. R. Soc.
Lond, 314(1165):1 -- 340, 1986.
[22] K.-K. Yan, G. Fang, N. Bhardwaj, R. P. Alexander,
and M. Gerstein. Comparing genomes to computer
operating systems in terms of the topology and
evolution of their regulatory control networks. PNAS,
107(20):9186 -- 9191, 2010.
[23] A. Yilmaz, M. K. Mejia-Guerra, K. Kurz, X. Liang,
L. Welch, and E. Grotewold. AGRIS: Arabidopsis
Gene Regulatory Information Server, an update.
Nucleic Acids Research, 39(suppl 1):D1118 -- D1122,
2011.
[24] A. T. T. Ying. Mining challenge 2015: Comparing and
combining different information sources on the stack
overflow data set. In MSR'15, 2015.
[25] P. Zakharov. Structure of LiveJournal social network.
In Proc. SPIE, volume 6601, pages 660109 -- 660109 -- 8.
International Society for Optics and Photonics, 2007.
[26] G. Zamora-L´opez, V. Zlati´c, C. Zhou, H. Stefanci´c,
and J. Kurths. Reciprocity of networks with degree
correlations and arbitrary degree sequences. Phys.
Rev. E, 77:016106, Jan 2008.
[27] B. Zingg, H. Hintiryan, L. Gou, M. Y. Song, M. Bay,
M. S. Bienkowski, N. N. Foster, S. Yamashita,
I. Bowman, A. W. Toga, et al. Neural networks of the
mouse neocortex. Cell, 156(5):1096 -- 1111, 2014.
[28] V. Zlati´c and H. Stefanci´c. Model of wikipedia growth
based on information exchange via reciprocal arcs.
Europhysics Letters, 93(5):58005, 2011.
[29] V. Zlati´c, M. Bozicevi´c, H. Stefanci´c, and M. Domazet.
Wikipedias: Collaborative web-based encyclopedias as
complex networks. Phys. Rev. E, 74:016115, Jul 2006.
|
1601.05527 | 1 | 1601 | 2016-01-21T07:09:21 | Single- and Multi-level Network Sparsification by Algebraic Distance | [
"cs.SI",
"cs.DC",
"cs.DS"
] | Network sparsification methods play an important role in modern network analysis when fast estimation of computationally expensive properties (such as the diameter, centrality indices, and paths) is required. We propose a method of network sparsification that preserves a wide range of structural properties. Depending on the analysis goals, the method allows to distinguish between local and global range edges that can be filtered out during the sparsification. First we rank edges by their algebraic distances and then we sample them. We also introduce a multilevel framework for sparsification that can be used to control the sparsification process at various coarse-grained resolutions. Based primarily on the matrix-vector multiplications, our method is easily parallelized for different architectures. | cs.SI | cs | Single- and Multi-level Network Sparsification by Algebraic Distance
Emmanuel John∗
Ilya Safro†
August 16, 2018
6
1
0
2
n
a
J
1
2
]
I
S
.
s
c
[
1
v
7
2
5
5
0
.
1
0
6
1
:
v
i
X
r
a
Abstract
Network sparsification methods play an important role in modern network analysis when fast
estimation of computationally expensive properties (such as the diameter, centrality indices, and
paths) is required. We propose a method of network sparsification that preserves a wide range
of structural properties. Depending on the analysis goals, the method allows to distinguish
between local and global range edges that can be filtered out during the sparsification. First
we rank edges by their algebraic distances and then we sample them. We also introduce a
multilevel framework for sparsification that can be used to control the sparsification process at
various coarse-grained resolutions. Based primarily on the matrix-vector multiplications, our
method is easily parallelized for different architectures.
Keywords: Networks, Sparsification, Multilevel Methods, Software, Scalable Algo-
rithm
1 Introduction
Networks are an abstract model of the relationships between discrete objects. Examples include
networks of genes, consumers and generators in the power grid, and networks of friendships or
followers in social communities. In order to study real world networks, they are often represented
as graphs, where the vertices represent the objects and edges model the relationship or interaction
between them. Modeling networks this way facilitates the analysis and understanding of many
different structural properties of the underlying complex system. Several powerful software packages
such as SNAP [23], Pajek[11], NetworkIt [39], NetworkX [13], and Gephi [4] have been developed
to provide this capability. However, many complex networks are massive in size. For example,
Facebook users post about 3.2 billion likes and comments each day [1], Twitter has more than 190
million users and about 65 million tweets are posted each day [43], and the human gene network
contain several million edges [29]. Although, modeling and understanding these networks is very
important in many application domains, the massive size of the network makes it often impractical
to perform network analysis on the entire dataset.
In sparsification methods, we aim to select a representative sample of the corresponding graph
such that some properties of the original graph are preserved. In other words, central to sparsifi-
cation is the idea that if an algorithm depends on or computes the properties that are preserved in
the sparsified graph, we can expect that the results will be similar for the original graph [15] while
the algorithm will perform much faster on the sparsified graph. Sampling is broadly being carried
∗School of Computing, Clemson University, Clemson, SC [email protected]
†School of Computing, Clemson University, Clemson, SC [email protected]
1
out in real world networks. Most network analytics consider just a sample in time of the networks
under study which is usually the result of data collection limitations [1]. Thus, it is important to
understand and develop scalable methods for sampling massive networks.
There are several motivating examples for network sparsification. One obvious example is in the
domain of visualization. It is often computationally intensive to render huge graphs on a computer
screen as well it is hard to visually analyze such graphs. Sparsification helps to visualize a sample of
the graph that reveals structural properties that would have been difficult to visualize and visually
analyze in the original graph [21, 35]. The computational difficulty of visualization often arises
from its objective, which requires solving a computational optimization problem [16, 2]. Another
broad application is the reduction in the cost of computational network analysis. In computing
the betweenness centrality of every node in a massive network, for example, by prioritizing what
edges should be retained and what should be removed, it is possible to improve the running time
of the algorithms at a very minimal cost in optimality [3]. Thirdly, graph sparsification can be
applied to revealing hidden populations which are hard for researchers to find by just looking
at the entire population. For example, Salganik et. al showed that when trying to sample the
population of injection drug dealers, it is difficult to sample directly as this population is hidden
and so specialized sampling algorithms are needed [34]. Methods applied usually involve starting
out with a sample of the desired population and using that as a seed for revealing the other members
of the sample population [15]. Existing methods include snowball sampling [14, 12] and respondent
driven sampling [34]. In addition, in the case where there is an incomplete data, sampling can be
used to estimate properties of the original graph. This is particularly useful in dynamic graphs
[40], graph streaming algorithms [1] and collective classification [33].
There are several approaches to sampling a large graph while preserving the desired properties.
An example involves formulating a mathematical programming problem to minimize the distance
between the sparse graph and the original graph [15]. However, such approaches are often quite
complex and running them might be costlier than running the algorithm on the larger graph.
Spectral approximation algorithms also exist [38]. However, those algorithms are not very fast as
well and often infeasible for large graphs [15] as they often involve hidden constants and require
convergence in eigen-problems. The more common approaches are (1) vertex sampling, which
involves selecting a number of vertices from the original graph and retaining the vertex-induced
subgraph, and (2) edge sampling, which involves the selection of edges and corresponding edge-
induced subgraph. Other variations of edge and vertex sampling have been developed (see [15] for
a full survey). In our method we focus on the edge sampling and also preserve the nodes from the
original graph. In order to achieve this, we ensure that every node has at least one incident edge
in the sparsified graph.
1.1 Strength of Connectivity in Sparsification
If the properties to be preserved are known beforehand, then, in many cases, it is possible to deter-
mine what kind of edges are important to preserve those properties and which ones are redundant.
Thus, the sampling transformation can then be designed with the objective of retaining those edges.
A general framework for sparsification involves: (1) ranking the edges and assigning each edge an
edge score; and (2) sampling edges based on their scores [15]. Scoring edges provides a motiva-
tion for rating the strength of connection between two vertices. In particular, this is extremely
important in weighted networks, where the weights can be approximate, noisy or even completely
missing. Different types of the connection strength have been proposed for scoring edges. We refer
2
the reader to [24] for a brief survey on the sparsification-relevant types of connectivity strength.
The most relevant to our work is a cohort of spectral methods widely used in theoretical computer
science to sparsify dense graphs such that some spectral properties are preserved. These are usually
cut-based properties that are formulated using Cheeger inequality. For example, Spielman et al.
introduced the edge effective resistance [36]. The effective resistance is computed using the linear
system solver [37] which runs in O(mlog15n) time which can be time consuming to be feasible.
Another example is the vectorized PageRank [10]. Various interpretations of the diffusion have
been proposed and analyzed [19, 41] for graph kernels. However, these methods usually suffer from
impractical complexity.
Another relevant class of methods is based on the Jaccard index in which a similarity between
two vertices is measured by computing the overlap in their neighborhoods. In [35], Satuluri et.
al rated edges according to the local similarity sim(i, j) = Ni ∩ Nj/Ni ∪ Nj, where Ni is the
neighborhood of node i. This method was designed for clustering objectives assuming that nodes
with larger shared neighborhoods are likely to belong to the same cluster. A global similarity
threshold is then chosen for which edges are filtered. The authors also introduced a method for
local sparsification in which they rate and filter edges per node by selecting the top de
i edges ranked
by their similarity score, where e ∈ (0, 1). Their method ensures that there is at least one edge per
node after sparsification. We explore this property in our method. This sparsification technique can
be computationally expensive since it requires counting the number of triangles an edge is a part of.
The authors, however, provided an approximation for computing the similarity. Based on the work
of Satuluri et al. [35], local degree method favors the retention of high degree nodes - also known
as hub nodes [24]. As in the local similarity, for each node, they include edges to the top de
i nodes.
However, edges are sorted according to the degree of their neighbors in descending order. The
main idea of this method is to keep edges in sparsified graph that leads to nodes with high degree.
Additionally, vertex connectivity can be measured by the betweenness centrality, the shortest path
length, the weight of substructures (such as spanning rooted forests, routes, overlapping paths that
connect two vertices [8]) and algebraic distance [9] which we will discuss in Section 3.
1.2 Our Contribution
We introduce two methods for complex network sparsification that distinguish between strong and
weak connectivity through neighborhoods of limited distance from the endpoints of edges. In some
networks (such as those that include geospatial information), these types of connections can be
interpreted as long- and short-range connections while in other (such as social networks) as inner-
and outer-community connections.
In both methods the sampling is based on the connectivity
measured by the algebraic distance between nodes [9].
It generalizes the idea of methods that
estimate the Jaccard coefficient for more distant neighborhoods through limited application of lazy
random-walks (also known as algebraic distance [9]). In the first method (the single level approach)
we demonstrate multiple settings of filtering local and global connections with the sampling similar
to [35]. In the second method we propose a multilevel algorithm that combines the single level
approach with the multilevel framework [28] to sparsify graphs at different coarse-grained resolu-
tions. We provide a robust method that can be tuned to preserve different network properties that
are important in a variety of applications. The multi- and single level methods can both be used
to either preserve the global structure or the local structure. We also discuss how our method
can be parallelized and show the ruining time in OpenMP implementation. Evaluation of methods
is demonstrated through comparison of several network properties with those measured on the
3
original network. The proposed methods are implemented and available at [18].
2 Preliminaries
We denote the graph underlying a given network by G = (V, E, w), where V is a set of vertices,
E is a set of edges, and w : E → R≥0 is a weighting function on E that represents the strength
of connectivity between two vertices. The graph is undirected, containing no self-loops and multi-
edges. For each node i ∈ V we define its degree by di and its neighbors by Ni. The clustering
coefficient is a measure of the probability that neighbors of a node are connected to each other
[27]. Consequently, it is a measure of the degree to which nodes in a network tend to cluster [43].
The clustering coefficient of a node i is defined as ci = λi/τi, where λi is the number of triangle
subgraphs i participates in, and τi = di(di − 1)/2, i.e., the number of triples. The clustering
coefficient of a graph G is defined as
(cid:88)
i∈V (cid:48)
CG =
1
V (cid:48)
ci,
(1)
where V (cid:48) = {i ∈ V di > 1}. The diameter of a graph is defined as the maximum distance
shortest path among all pairs of vertices in G from the same connected component. The result-
ing sparsified networks are compared with the original network using following properties: degree
distribution, clustering coefficient, number of connected components1, diameter, betweenness cen-
trality, PageRank centrality, and modularity [27]. We will use the Spearman Rank Correlation
Coefficient (ρ) that is a measure of the correlation between two distributions.
It is defined as
i )/(n(n2 − 1)), where pi = xi − yi, and xi and yi are the ranks computed from the
ρ = 1 − (6(cid:80) p2
scores Xi and Yi.
3 Algebraic distance
In order to determine the strength of connection of edges for the purpose of sparsification, we use
the algebraic distance introduced in [28, 9]. The algebraic distance of an edge ij (denoted by δij)
is interpreted as locally converged iterative process that propagates the weighted average of values
from Ni and Nj initialized by random numbers [9]. This expresses the strength of connectivity
between two nodes through their local neighborhoods. The process is essentially a Jacobi over-
relaxation (JOR) or a lazy random walk with limited number of steps (see Algorithm 1). The
algebraic distance was successfully used in several algebraic multigrid algorithms [25, 7] and in
multilevel algorithms for discrete optimization on graphs (such as the minimum linear arrangement
[28], and graph partitioning [32]) to reduce the order of interpolation that results in a sparsified
coarse system.
Other stationary iterative relaxations can also be applied in a similar setting but since JOR
is implicitly parallelizable using matrix-vector multiplications, we prefer to use it instead of other
relaxations (such as Gauss-Seidel) that converge faster. Optionally, the algebraic distance can also
be normalized by the square-root of the product of the weighted degrees of the two nodes to reduce
extremely high strength of connection between hub nodes.
1In many existing sparsification methods, the number of connected components is preserved "artificially", i.e.,
even if the edge is marked for deletion, it is not deleted if it increases the number of connected components. Here we
do not restrict our algorithms with such requirement.
4
Algorithm 1 Algebraic distance implementation: ComputeAlgDist
1: Input: Parameter α (in our experiments α = 1/2)
2: ∀ij ∈ E Rij = 0
3: for r = 0, 1, 2, ... do
∀i ∈ V x(0)
for k = 0, 1, 2, ... do
i ← rand(−0.5, 0.5)
5:
4:
(cid:80)
(cid:80)
j∈Ni
wijx(k−1)
j∈Ni
j
wij
∀i ∈ V x(k)
i ← αx(k−1)
i
+ (1 − α)
6:
7:
8:
end for
Rescale x back to (−0.5, 0.5)
∀ij ∈ E Rij = Rij + (xi − xj)2
9:
10: end for
11: return ∀ij ∈ E δij ←
12: ∀ij ∈ E δij ← δij(cid:112)di ∗ dj
1(cid:112)Rij +
(cid:46) the number of test vectors r is small
(cid:46) the number of JOR iterations k is small
(cid:46) is sufficiently small
(cid:46) optional normalization
The algebraic distance will serve as the main criterion for choosing edges for sparsification in
the algorithms below. Because it helps to distinguish between so called short- and long-range
connections [9], we will use it to demonstrate different types of sparsification in which local and
global properties are preserved correspondingly to the types of algebraic distances that we choose.
The short-range connections (large values of δij) will be called δ-strong. The long-range connections
(small values of δij) will be called δ-weak.
4 Single-level sparsification
In the single-level approach we demonstrate three types of sparsification in which we filter δ-weak,
δ-strong edges and their mixture. In all of these cases, first, for each edge in the graph, we compute
the algebraic distance. Then, for each node i, we sample the top de
i neighbors ranked by their
algebraic distances, where e ∈ [0, 1]. In this approach it is possible to sample for local or global
structure preservation or a combination of both. To preserve the global structure, we select de
i
weakest connections and add them to the sparse graph (see Figure 1c). Similarly, de
i strongest
connections are preserved to emphasize the importance of a local structure in the sparse graphs
(see Figure 1b).
5
(a) Original network
(b) Sparsified network
by eliminating δ-weak
connections
(c) Sparsified network
by eliminating δ-strong
connections
Figure 1: An example of a small network with 3 dense clusters and sparse cuts between them (a). Sparsification of
δ-weak connections will result in network presented in (b). Sparsification of δ-strong connections is presented in (c).
Algorithm 2 Single-level sparsification: Sparsify(G)
1: Input: Sparsification parameter e, Graph G
2: Output: Sparsified graph Gsparse
3: Gsparse ← empty graph
4: ComputeAlgebraicDistances(G)
5: for i ∈ V do
6:
Sort Ni by δij in ascending (or descending) order
Add top de
i edges to Gsparse
7:
8: end for
9: return Gsparse
It is also possible to partially preserve both global and local structures with a slight change in
the algorithm, namely, by distributing the algebraic distances into bins, and sampling the edges
from all bins.
In order, to distribute the algebraic distances into bins, we define the bin width
, and the number of bins k = (max δij − min δij)/h, where σ is the standard deviation of
h = 3.5∗σ
algebraic distances.
3√
di
Algorithm 3 Single-level sparsification with binning: SparsifyB(G)
1: Input: Sparsification parameter e, Graph G
2: Output: Sparsified graph Gsparse
3: Gsparse ← empty graph
4: ComputeAlgebraicDistances(G)
5: for i ∈ V do
6:
Distribute Ni into bins, each bin corresponds to edges ...
Randomly select bins and edges up to de
i to Gsparse
7:
8: end for
9: return Gsparse
6
5 Multilevel sparsification
The multilevel approach [6, 42] can be applied as a general framework for many different numerical
methods. Most real-world instances are not completely random, i.e., a particular similarity or
dependence between variables exists and, thus, can partially be detected to reduce their number
in complex computations. Here we introduce and advocate the use of multilevel approach as a
general purpose framework for network sparsification. In the heart of the proposed method lies
an idea to sparsify the network at multiple scales of coarseness which, in contrast to most existing
sparsification methods that sample single edges, will allow to sample clusters of edges of different
sizes and δ-weakness.
It is known that the topology of many complex networks is hierarchical (or multiscale) and,
thus, often might be self-dissimilar across scales [17, 44, 5, 26]. In such hierarchical representations,
groups of nodes are aggregated into communities, which automatically bundles edges into coarse
connections. Bundling the edges at different scales of coarseness will introduce different levels of
δ-weakness for such coarse connections which may or may not be required to be sparsified for the
required analysis. For example, in the analysis of a social network, we may want to visualize only
a certain type of edges that connect dense communities of small sizes, while connections between
large communities and local inner connections are out of the scope. In the proposed framework,
this can be achieved by creating a hierarchy of coarse representations, and sparsifying at those
levels that do not correspond to the desired communities. To create a multilevel framework we use
the algebraic multigrid (AMG) aggregation strategy that was introduced in [31]. For simplicity,
we do not split fine nodes across the aggregates (like in some optimization problems [31, 32]) but
instead cover the graph with star-like structures and coarsen them. For the completeness of paper
we briefly repeat the main components of the coarsening algorithm.
Given an original graph G, in the multilevel framework we recursively construct a hierarchy of
decreasing size coarse graphs G0 = G, G1, ..., Gl. The original graph is gradually coarsened into
the smaller graphs until the small enough graph Gl is reached. The sparsification algorithm is then
run on the coarsest level and the results (i.e., edges to eliminate for sparsification) are inherited by
the finer graph and the uncoarsening continues until G0 is reached. In most cases, our discussion is
focused on fine-to-coarse and coarse-to-fine transformations of graphs and solutions, respectively.
For this purpose, we denote the fine and coarse level graphs by Gf = (Vf , Ef ), and Gc = (Vc, Ec),
respectively. At each level, after sparsifying edges inherited from Gc, Algorithm 1 is applied to
recompute algebraic distance on Gf .
The Coarsening We begin with selecting a dominating set of seed nodes C ⊂ Vf that will serve
as centers of future coarse nodes in Vc. Setting initially F = Vf and C = ∅, the selection is done
by traversal of F and moving to C such nodes that are not strongly coupled to those that are
already in C. At each step F ∪ C = Vf is preserved, and at the end the size of Vc is known, namely,
Vc = C. After C is selected, nodes in F = V \ C are distributed to their aggregates according to
the restriction operator P ∈ {0, 1}Vf×C, where
(cid:19)
δij(cid:80)
k∈C
δik
(2)
1
1
0
PiJ =
(cid:18)
if i ∈ F, J = Ic
argmaxj∈C
if i ∈ C, J = Ic(i)
otherwise,
7
Algorithm 4 Multilevel sparsification of graph: MLSparsify
1: Input: fine graph Gf = (Vf , Ef ), vector of sparsification ratios
2: Output: sparse graph Gs
3: function ML(Gf )
4:
f = (Vf , Es
f )
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16: end function
17: return Gs
f
ComputeAlgDist(Gf )
if Vf is small enough then
f ← SparsifyB(Gf )
Es
else
createSeeds(Gf )
Compute P
Gc ← (Lc = P T Lf P )
c ← MLSparsify(Gc)
Gs
f ← Uncoarsen(Gs
Gs
c)
ComputeAlgDist(Gs
f )
f ← SparsifyB(Gs
Gs
f )
end if
(cid:46) Sparsify coarse edges
(cid:46) Coarsening: seeds
(cid:46) Coarsening: restriction operator
(cid:46) Coarsening: coarse graph
(cid:46) Recursive call to sparsify the next coarser level
(cid:46) Sparsification of edges inherited from coarse level
(cid:46) Algebraic distances are recomputed
(cid:46) Sparsification of current level edges
and Ic(j) returns an index of coarse node J that corresponds to j ∈ C. Then, the Galerkin
coarsening creates a coarse graph Laplacian Lc = P T Lf P , where Lf is the Laplacian of Gf .
Coarsest Level At the coarsest level, we sparsify the edges by using the single-level Algorithm
(3). These edges correspond to bundles of edge chains at the fine levels that connect the most
distant regions in a graph, so if the goal is to preserve the global structure, the user should avoid
of sparsification at deep coarse levels.
Uncoarsening We initialize the solution (sparsification) of Gf by uncoarsening the edges sparsi-
fied in Gc. When the order of interpolation in the multilevel algorithm equals 1 (i.e., there is only
one non-zero entry per row in P , see Eq. 2), each coarse edge IJ ∈ Ec can bundle at most two types
of edges in Ef , namely, at most one edge that connect two seeds I−1
(J), and possibly
multiple edges pq ∈ Ef such that PpI−1
(J) = 1. If IJ is sparsified at the coarse
level, then edges of both types are sparsified at the fine level. After initialization of the fine level,
we recompute algebraic distances to update the information about connectivity in the sparsified
fine graph, and, then, more edges may or may not be sparsified at the fine level depending on the
parameter settings. Full multilevel cycle is presented in Algorithm 4. Example of full multilevel
cycle on a Facebook network (see fb-uf in Table 1) is shown in Figure 2.
(I) = 1, and PqI−1
(I) and I−1
c
c
c
c
6 Computational Results
Implementation and Evaluation We provide C++ implementation for both the single- and
multilevel algorithms in [18]. For the comparison of original and sparsified networks, we employed
methods implemented in NetworKit [39]. We experimented with varying degrees of sparsification,
taking values of e ranging from 0.1 to 0.9 (see Section 4). All numerical properties for the comparison
8
Figure 2: Complete Sparsification V-Cycle
are the averages over 10 runs with different random seeds for each parameter setting. The following
parameter were used in computation of algebraic distance: R = 10, k = 40, and α = 0.5. Their
robustness is discussed in [9]. In addition, for the single-level algorithm (3), we provide two sets of
results for each graph, namely, with and without the normalization (see last step in Algorithm 1)
of algebraic distance. In each case we experimented with sparsification of weak edges, strong edges
and mixture of both.
In the multilevel algorithm (4), we experimented with sparsifying at the coarsest, middle and
the finest levels. In our experiments, we split the number of levels in the multilevel algorithm into
3 equal segments, and choose a parameter, level-span which determine how many levels in each
segment gets sparsified. We then sparsify one segment at a time and observe the corresponding
network properties. For example, for a graph with 6 levels, with a level-span of 2, to sparsify the
coarsest levels only we use the following parameter configuration: (0.3, 0.3,−1,−1,−1,−1), where
a setting of −1 indicates no sparsification occurs at this level. Similarly, the middle and finest
levels can be sparsified using (−1,−1, 0.3, 0.3,−1,−1), and (−1,−1,−1,−1, 0.3, 0.3) configuration
settings respectively. However, in our implementation, users can specify any combination of settings
for different levels. The sparisification ratio (ratio of number edges in the sparse graph to the number
of edges in the original graph), is kept between 20% to 40% for each stage in order to make the
results comparable. For the purpose of our study, we maintain a level span of 3.
Datasets We experiment with 18 real-world networks (see Table 1), which for the purpose of our
study we grouped into two groups of social networks, one group of citation networks (CIT) and one
group of biological networks (BIO). We split the social networks into 2 groups (SN1, and SN2) -
one consisting of Facebook networks, Livejournal and Google+ (general purpose social networks),
and the other consisting other consisting of Flickr, Buzznet, Foursquare, Catster, Blogcatalog and
Livemocha. The graphs were retrieved from the NetworkRepository [30], the Koblenz [20], and the
SNAP [22] collections. The size of the networks range between 1 million to 34 million edges.
9
CoarseningUncoarseningLevel 0Level 1Level d Level d-1 Level d-2 . . .Original networkSparsified networkTable 1: Benchmark graphs
Group
Social
Networks 1
(SN1)
Biological
Networks
(BIO)
Social
Networks 2
(SN2)
Citation
Networks
(CIT)
Graph
fb-indiana
fb-texas84
fb-uf
fb-penn94
livejournal
google-plus
human-gene1
human-gene2
Mouse
flickr
buzznet
foursquare
catster
blogcatalog
livemocha
ca-cit-Hepth
cit-patent
codblp
V
29.7K
36.4K
35.1K
41.5K
E
1.3M
1,6M
1.5M
14M
27.9M
107.6K 12.2M
12M
9M
4M
22K
14K
14.5M
43K
105K
2.3M
101.2K 2.8M
639K
3.2M
149.7K 5.4M
88.8K
2.1M
104.1K 2.2M
22.9K
2.6M
3.7M 16.5M
540.5K 15.2M
min deg. max deg.
avg degree
1
1
1
1
1
1
1
1
1
7
1
1
1
1
1
1
1
1
1.4K
6.3K
8.2K
4.4K
2.7K
20.1K
7.9K
7.2K
8K
5.4K
64.3K
106.2
80.6K
9.4K
3K
11.9K
793
3.3K
87
87
83
65
13
227.4
1.1K
1.3K
670
43.7
54
10
72
47
42
233.38
8.75
56
Methods of Comparison We studied various levels of sparsification while comparing the follow-
ing properties of the sparse graph Gs, to those in the original graph Go. The single value properties
are: (a) Diameter - We measure the ratio of the diameter in Go to the new diameter in Gs (in
plots "orig diameter/diameter"); (b) Number of connected components - we measure the ra-
tio of the number of connected components in Gs to that in Go (in plots "comp/orig comp"); (c)
Modularity - we measure the ratio of modularity in Gs to that of Go (in plots "mod/orig mod",
Networkit [39] provides an implementation of the Louvain method). Certain network properties are
represented better by their distributions over the nodes. In order to accurately compare the dis-
tributions, we use the Spearman rank correlation coefficient. This effectively, reveals how different
the sparse graph is from the original in the context of these properties where a correlation value of
1 means they are perfectly correlated and correlation value of 0 means no correlation. The follow-
ing distributions are compared using the Spearman rank: (a) Node betweeenness centrality; (b)
PageRank centrality; (c) Degree distribution; and (d) Clustering coefficient distribution
(ci). The method changes slightly in comparing node betweenness centrality. Considering that the
cost of computing betweenness for large graphs is very expensive, we make use of an approximate
method provided by Networkit. However, to ensure accuracy we compute this 10 times and take
average of the positional rankings and then compute the Spearman rank correlation.
6.1 Single-level Algorithm
The single-level algorithm was tested with both unnormalized and normalized algebraic distances.
The results for unnormalized algebraic distance are presented in Figures 3, 4, 5, and 6 for groups
SN1, SN2, CIT, and BIO, respectively.
(The results for the normalized algebraic distance can
be found in Appendix A.) In each figure, 3 columns, and 7 rows of plots are presented.
In all
4 figures: (a) each column corresponds to the type of filtering, i.e., to the types of edges that
retain after sparsification; (b) each row corresponds to the type of comparison. Each plot contains
several colored curves that correspond to the respective graphs (see vertical legend). One point
10
in each curve corresponds to an average of the measured comparison method over 10 runs for
the corresponding edge ratio in each. The x- and y-axes correspond to the sparsification ratio and
method of comparison, respectively. In the y-axis of betweenness, PageRank, degree, and clustering
coefficient distribution centralities, the Spearman rank is denoted by ρ. For example, we examine
the behavior of the degrees in social network Google+ in SN1 when δ-strong edges retain after
sparsification. In Figure 3, we find a row "Degree centrality" (row 3). The results for retaining
δ-strong edges are found in the third column. The black curve corresponds to Google+, where each
point is an average of 10 runs.
Note: Most curves do not reach a visible zero of the x-axis. This is because the sparsification is
interrupted when the number of edges becomes less than the number of nodes.
δ-weak edges Plots labelled as δ-weak (column 1) are results obtained by retaining only weak
edges, when δ-weak edges are preferred during sparsification (i.e, δ-strong edges are deleted). In this
type of sparsification, we expect that sparsification of the local structure will mostly dominate the
sparsification of the global structure. Indeed, we observe that properties (such as the betweenness
centrality, diameter, and the number of components) that heavily depend on usually limited number
of long-range weak connections are well preserved.
δ-strong Plots labelled as δ-strong (column 3) are results obtained by retaining δ-strong edges
and removing δ-weak edges. By preferring δ-strong edges during sparsification, we attempt to
preserve properties that depends on the local structure of the graph. Such properties as clustering
coefficient, pagerank and degree centrality survive sparsification better when this method is used.
In particular, we can observe that the clustering coefficient (which is in many cases the reason for
a strong community structure) is preserved at the level of ≈ 75% in SN1 when 70% of edges are
removed (instead of ≈ 40% for δ-weak sparsification). A similar phenomena is observed in BIO. It
is interesting to note that in SN2, in comparison to the δ-weak sparsification, the changes in the
clustering coefficient are not significant.
Mixture sparsification In plots labelled as mixed, we maintain a balance between the δ-weak
and δ-strong types of sparsification by preferring ensuring that both are sparsified. For such prop-
erties as the betweenness centrality, PageRank and degree centrality, the results are better for up
to 20% sparsification ratio when compared to selecting either weak or strong edges. For such prop-
erties as the clustering coefficient, modularity, diameter and connected components, retaining both
weak and strong edges provides results that is in between that produced by weak or strong edges
sparsification.
11
δ-weak
Mixture
δ-strong
s
s
e
n
n
e
e
w
t
e
B
y
t
i
l
a
r
t
n
e
C
g
n
i
r
e
t
s
u
l
C
t
n
e
i
c
ffi
e
o
C
n
o
i
t
u
b
i
r
t
s
i
D
y
t
i
l
a
r
t
n
e
C
e
e
r
g
e
D
r
e
t
e
m
a
i
D
s
t
n
e
n
o
p
m
o
C
y
t
i
r
a
l
u
d
o
M
k
n
a
r
e
g
a
P
Figure 3: Social Networks 1
12
fb-indianafb-uffb-texas84fb-penn94gpluslj0.20.40.60.81.0Edgeratio0.9850.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.9920.9940.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.9800.9850.9900.9951.0001.005ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.920.940.960.981.00ρ0.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.550.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.550.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0Origdiameter/diameter0.20.40.60.81.0Edgeratio020406080100120comp/origcomp0.20.40.60.81.0Edgeratio0200400600800100012001400comp/origcomp0.20.40.60.81.0Edgeratio05000100001500020000250003000035000comp/origcomp0.20.40.60.81.0Edgeratio0.70.80.91.01.11.21.31.41.51.6mod/origmod0.20.40.60.81.0Edgeratio0.91.01.11.21.31.41.51.6mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.2mod/origmod0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.900.920.940.960.981.00ρ0.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρδ-weak
Mixture
δ-strong
s
s
e
n
n
e
e
w
t
e
B
y
t
i
l
a
r
t
n
e
C
g
n
i
r
e
t
s
u
C
l
t
n
e
i
c
ffi
e
o
C
n
o
i
t
u
b
i
r
t
s
i
D
y
t
i
l
a
r
t
n
e
C
e
e
r
g
e
D
r
e
t
e
m
a
i
D
s
t
n
e
n
o
p
m
o
C
y
t
i
r
a
l
u
d
o
M
k
n
a
r
e
g
a
P
Figure 4: Social Networks 2
13
flickrfoursquarecatsterbuzznetblogcataloglivemocha0.20.40.60.81.0Edgeratio0.9960.9981.000ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.9970.9980.9991.000ρ0.20.40.60.81.0Edgeratio0.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.30.40.50.60.70.80.91.0Edgeratio0.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio1.001.021.041.061.081.101.12comp/origcomp0.20.30.40.50.60.70.80.91.0Edgeratio1.001.051.101.151.20comp/origcomp0.20.40.60.81.0Edgeratio020040060080010001200comp/origcomp0.20.40.60.81.0Edgeratio0.60.81.01.21.41.61.82.02.2mod/origmod0.20.30.40.50.60.70.80.91.0Edgeratio1.01.21.41.61.8mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.42.6mod/origmod0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρδ-weak
Mixture
δ-strong
s
s
e
n
n
e
e
w
t
e
B
y
t
i
l
a
r
t
n
e
C
g
n
i
r
e
t
s
u
C
l
t
n
e
i
c
ffi
e
o
C
n
o
i
t
u
b
i
r
t
s
i
D
y
t
i
l
a
r
t
n
e
C
e
e
r
g
e
D
r
e
t
e
m
a
i
D
s
t
n
e
n
o
p
m
o
C
y
t
i
r
a
l
u
d
o
M
k
n
a
r
e
g
a
P
Figure 5: Citation Networks
14
ca-cit-Hepthcodblpcit-patent0.20.40.60.81.0Edgeratio0.9850.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.960.970.980.991.00ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.750.800.850.900.951.001.05Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio050100150200250300350comp/origcomp0.20.40.60.81.0Edgeratio0102030405060708090comp/origcomp0.20.40.60.81.0Edgeratio02000400060008000100001200014000comp/origcomp0.20.40.60.81.0Edgeratio0.81.01.21.41.61.8mod/origmod0.20.40.60.81.0Edgeratio0.91.01.11.21.31.41.51.61.7mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.4mod/origmod0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρδ-weak
Mixture
δ-strong
s
s
e
n
n
e
e
w
t
e
B
y
t
i
l
a
r
t
n
e
C
g
n
i
r
e
t
s
u
C
l
t
n
e
i
c
ffi
e
o
C
n
o
i
t
u
b
i
r
t
s
i
D
y
t
i
l
a
r
t
n
e
C
e
e
r
g
e
D
r
e
t
e
m
a
i
D
s
t
n
e
n
o
p
m
o
C
y
t
i
r
a
l
u
d
o
M
k
n
a
r
e
g
a
P
Figure 6: Biological Networks
15
human1human2mouse0.00.20.40.60.81.0Edgeratio0.980.991.00ρ0.20.40.60.81.0Edgeratio0.9900.9951.000ρ0.00.20.40.60.81.0Edgeratio0.950.960.970.980.991.00ρ0.00.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.00.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.00.20.40.60.81.0Edgeratio0.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.950.960.970.980.991.00ρ0.00.20.40.60.81.0Edgeratio0.70.80.91.0ρ0.00.20.40.60.81.0Edgeratio0.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.750.800.850.900.951.001.05Origdiameter/diameter0.00.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.00.20.40.60.81.0Edgeratio1.001.011.021.031.041.05comp/origcomp0.20.40.60.81.0Edgeratio1.0001.0051.0101.0151.0201.025comp/origcomp0.00.20.40.60.81.0Edgeratio1.001.051.101.151.201.25comp/origcomp0.00.20.40.60.81.0Edgeratio0.81.01.21.41.61.82.02.2mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.4mod/origmod0.00.20.40.60.81.0Edgeratio1.01.52.02.53.0mod/origmod0.00.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.920.940.960.981.00ρ0.00.20.40.60.81.0Edgeratio0.70.80.91.0ρComparing with Local Degree In the introduction, we mentioned the Local Degree method
(LD) [24] which favors the retention of edges participating in hubs (nodes with high degree). In
order to compare our method to LD, we ran the single level algorithm for retaining weak edges,
strong edges and a mixture of both on the Google+ graph (google-plus in Table 1). Same set
of network properties discussed earlier in this section were used for comparison. For betweenness
centrality, degree centrality, local clustering coefficient and PageRank, we plot the Spearman rank
correlation against the edge ratio. Figure 7 shows the plots of δ-weak, δ-strong, mixed and local
degree(LD) for each property. The results are similar for betweenness centrality, degree centrality
and PageRank. However, for such properties as modularity and clustering coefficient, the algebraic
distance performs better than LD especially when sparsification is aggressive. The δ-weak sparsifi-
cation preserves the diameter slightly bettern than LD while the δ-strong method did not perform
well on it and on the number of components. We note that the LD method was comprehensively
studied on the Facebook networks only. Four Facebook networks in SN1 demonstrate similar per-
formance with both methods. The Google+ network has exceptionally high clustering coefficient
(0.52 vs. 0.23 in Facebook networks) and smaller diameter (6 vs. 8 in Facebook networks) which
are more difficult to preserve if the method does not distinguish between local- and global-range
connections.
Betweenness Centrality
Clustering Coefficient
Distribution
Degree Centrality
Diameter
Connected Components
Modularity
PageRank
Figure 7: Comparison of LD and single-level algebraic distance methods.
16
WeakMixedStrongLD0.20.40.60.81.0Edgeratio0.9940.9950.9960.9970.9980.9991.000⇢0.20.40.60.81.0Edgeratio 0.20.00.20.40.60.81.0⇢0.20.40.60.81.0Edgeratio0.860.880.900.920.940.960.981.00⇢0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio12345678comp/origcomp0.20.40.60.81.0Edgeratio0.40.50.60.70.80.91.0mod/origmod0.20.40.60.81.0Edgeratio0.800.850.900.951.00⇢6.2 Multi-Level Results
The purpose of the multilevel approach is to extend the general sparsification framework to enable
highly controllable sparsification of bundles of edges at multiple coarse-grained resolutions. Similar
to the single-level experiments, we group the networks into 4 groups. Tables 2, 3, 4, and 5 show
the results of the multilevel algorithm for sets SN1, SN2, BIO and CIT, respectively. The 4 major
column sections in the aforementioned tables consists of the graph name, the levels' configuration
for which sparsifcation is tested, the number of edges at each setting, and the network properties
that we study. The properties column consist of the following properties: a) CC - clustering
coefficient b) D - Diameter of the graph, c) Q - Modularity of the graph, d) Γ - the number of
components in the network, e) BCρ - Spearman rank correlation for betweenness centrality, f) P Rρ
- Spearman rank correlation of Pagerank, g) DCρ - Spearman rank correlation of degree centrality,
and h) CCρ - Spearman rank correlation of the clustering coefficient. Correlation here represents
the correlation between the original graph and the sparse graph. The "Level" column contains the
sparsification settings at different levels, where G0 represents the original graph, G1 is the graph
with sparsification only at the coarsest levels, G2 is the graph with sparsification only at the middle
levels and G3 represents the graph with sparsification at the fine levels. In order to keep the results
comparable, we keep the sparsification ratio between 20% to 40%. The sparsification parameter is
obtained by a binary search fitting algorithm. Note that we do not compare the sparse graphs (G1,
G2, G3) to themselves but only with the fine graph G0. The parameter setting of a coarsening was
similar to one described in [28] with interpolation order 1.
Graph Name Level
flickr
buzznet
foursquare
catster
blog-catalog
livemocha
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
E
CC
2.3M
0.09
921.0K 0.15
496.1K 0.12
634.9K 0.04
2.8M
0.25
713.8K 0.26
919.3K 0.21
666.6K 0.1
0.22
3.2M
1.1M
0.17
765.9K 0.19
0.04
1.1M
5.4M
0.41
0.31
1.3M
0.26
1.7M
0.27
1.5M
2.1M
0.46
423.9K 0.41
570.8K 0.26
566.1K 0.18
2.2M
0.06
636.9K 0.04
869.1K 0.04
556.7K 0.02
D
9.0
35.0
18.0
25.0
5.0
11.0
18.0
16.0
4.0
36.0
47.0
14.0
10.0
15.0
11.0
14.0
9.0
14.0
11.0
12.0
6.0
12.0
10.0
11.0
Q
0.67
0.91
0.84
0.55
0.31
0.5
0.3
0.29
0.41
0.94
0.94
0.57
0.39
0.69
0.37
0.29
0.32
0.67
0.27
0.23
0.36
0.45
0.29
0.29
Properties
BCρ
Γ
1.0
83
1.0
144
1.0
134
1.0
5.8K
1.0
1
1.0
1
1.0
12
1.0
239
1.0
1
1.0
18
366
1.0
10.0K 1.0
281
1.0
1.0
293
1.0
360
1.0
1.1K
1
1.0
1.0
1
1.0
9
1.0
391
1.0
1
3
1.0
1.0
8
1.4K
1.0
P Rρ DCρ CCρ
1.0
0.6
0.71
0.64
1.0
0.82
0.83
0.75
1.0
0.74
0.49
0.36
1.0
0.59
0.86
0.76
1.0
0.81
0.85
0.7
1.0
0.89
0.9
0.77
1.0
0.62
0.73
0.77
1.0
0.91
0.94
0.89
1.0
0.88
0.78
0.74
1.0
0.59
0.87
0.84
1.0
0.87
0.89
0.83
1.0
0.91
0.91
0.88
1.0
0.78
0.8
0.74
1.0
0.6
0.6
0.28
1.0
0.87
0.79
0.73
1.0
0.39
0.63
0.4
1.0
0.47
0.44
0.29
1.0
0.48
0.49
0.38
Table 3: Multiscale results for social networks 2(SN2) graphs
17
Graph Name Level
fb-indiana
fb-texas84
fb-uf
fb-penn94
livejournal
gplus
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
E
0.2
CC D
1.3M
0.21
361.4K 0.31
349.8K 0.14
402.7K 0.04
1.6M
374.7K 0.29
574.8K 0.13
521.9K 0.05
1.5M
0.22
423.4K 0.24
425.1K 0.16
418.9K 0.05
1.4M
0.22
351.7K 0.33
463.4K 0.16
365.6K 0.04
34.7M 0.35
13.6M 0.47
13.4M 0.39
8.2M
0.02
12.2M 0.52
0.54
3.6M
3.0M
0.42
0.15
3.3M
8.0
13.0
10.0
12.0
7.0
16.0
9.0
12.0
8.0
12.0
11.0
11.0
8.0
16.0
11.0
14.0
21.0
72.0
42.0
30.0
6.0
14.0
12.0
19.0
Properties
BCρ P Rρ DCρ CCρ
Γ
1.0
1
1.0
18
0.99
8
0.99
37
1.0
1
1.0
16
0.99
5
1.0
29
1.0
1
0.99
3
1.0
15
1.0
57
1.0
1
1.0
16
1.0
23
1.0
122
1.0
1
1.0
1.7K
1.0
7.1K
316.9K 1.0
1.0
1
1.0
15
18
1.0
1.0
905
1.0
0.64
0.57
0.03
1.0
0.57
0.66
0.08
1.0
0.58
0.6
-0.01
1.0
0.57
0.6
-0.09
1.0
0.75
0.76
0.37
1.0
0.59
0.57
-0.26
1.0
0.84
0.89
0.93
1.0
0.86
0.94
0.94
1.0
0.88
0.9
0.92
1.0
0.85
0.89
0.89
1.0
0.85
0.91
0.67
1.0
0.91
0.9
0.79
1.0
0.83
0.89
0.95
1.0
0.82
0.94
0.96
1.0
0.88
0.9
0.95
1.0
0.8
0.9
0.92
1.0
0.81
0.87
0.73
1.0
0.9
0.88
0.88
Q
0.45
0.93
0.34
0.3
0.38
0.92
0.31
0.24
0.44
0.61
0.37
0.27
0.48
0.95
0.38
0.3
0.75
1.0
0.8
0.72
0.47
0.89
0.38
0.26
Table 2: Multiscale results for social networks 1 (SN1) graphs
Graph Name
Level
bio-human-gene1
bio-human-gene2
bio-mouse-gene
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
E
CC
12.3M 0.63
0.66
2.8M
0.33
4.0M
0.06
3.9M
9.0M
0.66
0.67
2.4M
0.64
3.1M
2.5M
0.62
14.5M 0.53
4.6M
4.1M
4.1M
0.6
0.28
0.06
D
8.0
18.0
9.0
11.0
7.0
7.0
26.0
39.0
12.0
21.0
13.0
14.0
Q
0.38
0.8
0.39
0.33
0.31
0.74
0.52
0.42
0.62
0.89
0.56
0.52
Properties
Γ
17
19
22
78
2
15
14
66
97
105
132
400
BCρ
1.0
0.99
0.99
0.99
1.0
1.0
0.98
0.93
1.0
0.99
1.0
1.0
P Rρ DCρ CCρ
1.0
0.9
0.91
0.89
1.0
0.87
0.87
0.88
1.0
0.94
0.93
0.91
1.0
0.74
0.71
0.21
1.0
0.74
0.74
0.64
1.0
0.72
0.65
0.08
1.0
0.95
0.91
0.93
1.0
0.86
0.88
0.87
1.0
0.95
0.94
0.95
Table 4: Multiscale results for biological (BIO) networks
18
Graph Name Level
E
ca-cit-Hepth
cit-patent
codblp
G0
G1
G2
G3
G0
G1
G2
G3
G0
G1
G2
G3
CC
0.61
2.4M
487.5K 0.7
875.3K 0.49
722.2K 0.21
16.5M 0.09
0.16
5.8M
3.4M
0.13
5.0M
0.01
15.2M 0.82
0.91
5.3M
3.4M
0.81
0.5
4.7M
D
9.0
18.0
13.0
16.0
26.0
61.0
57.0
39.0
23.0
30.0
32.0
29.0
Q
0.41
0.93
0.37
0.25
0.81
0.93
0.97
0.84
0.84
0.98
0.97
0.84
Properties
BCρ
Γ
1.0
74
0.99
86
0.99
111
0.99
279
1.0
3.6K
43.8K
1.0
631.4K 1.0
235.5K 1.0
1.0
1
1.0
20.1K
44.3K
1.0
1.0
29.1K
P Rρ DCρ CCρ
1.0
0.84
0.91
0.83
1.0
0.79
0.58
0.68
1.0
0.55
0.27
0.51
1.0
0.75
0.81
-0.04
1.0
0.73
0.59
0.54
1.0
0.68
0.62
0.38
1.0
0.84
0.94
0.95
1.0
0.78
0.64
0.74
1.0
0.78
0.63
0.82
Table 5: Multiscale results for citation (CIT) networks
6.3 Running time
Figures 8(a-b) show the running time of both single- and multi-level algorithms for varying spar-
sification ratios. Each point in the plot represents the number of edges in the graph versus the
runtime in seconds averaged over three runs. The coefficient of determination, R2, shows how well
the regression line fits the model. An R2 of 0 indicates the line does not fit the data and an R2 of 1
indicates the line perfectly fits the data. The results show that both algorithms scales linearly with
the number of edges in the graph. As mentioned earlier, this is important as it defeats the purpose
of sparsification if the algorithm is slow. The experiments were performed in a Linux environment
on a multicore compute server with 64 Intel Xeon cores and 64 GB of memory.
a) Single-level
b) Multi-level
Figure 8: Running time of sparsification.
19
0100200300400500600Averageruntime0.00.51.01.52.02.53.03.54.0NumberofEdges×107R2=0.96020040060080010001200Averageruntime0.00.51.01.52.02.53.03.54.0NumberofEdges×107R2=0.986.4 Parallelization
Parallelization of the single-level algorithm does not require redesigning it. There are two compu-
tationally intensive parts of our method that gain from parallelization. One is the computation of
the algebraic distance and the other the deletion of edges. Because of the implicitly parallel nature
of the Jacobi over-relaxation, we are able to parallelize it by using OpenMP's shared data, multiple
thread model. Since vector updates are independent, this method is highly efficient, creating speed
gains of more than 50% with only 8 threads as seen in Figure 9. Figure 9 shows the benchmark
results of parallelizing the algebraic distance computation where y-axis represents the average run-
time averaged over 3 runs and x-axis represents the number of threads. We tested with number of
threads ranging from 1 to 64 on 4 networks, namely, fb-uf, human-gene1, cit-patent, and catster.
The experiments were performed in a Linux environment on a multicore compute server with 64
Intel Xeon cores and 64 GB of memory.
Figure 9: Running time in shared memory model.
7 Conclusions
In this study we introduced single- and multi-level methods of network sparsification by algebraic
distance. While many sparsification methods exist, most of them target certain properties without
distinguishing short- and long-range connections that is the main goal of our method. We showed
that by enabling different filtering capabilities, sparsification can be tuned to preserve either global
or local structure or a combination of both. In addition to preserving a host of graph properties, we
believe that the development of the multilevel sparsification framework can serve as a foundation
for future work in that direction in which a variety of sparsification criteria (such as the algebraic
distance) can be incorporated into it.
20
102030405060NumberofThreads46810121416AverageRuntimefb-uf102030405060NumberofThreads50100150200250300350AverageRuntimecit-patent102030405060NumberofThreads30405060708090100110AverageRuntimehuman-gene1102030405060NumberofThreads152025303540455055AverageRuntimecatsterA Normalized Sparsification
We experimented with the single-level algorithm that employ normalized algebraic distances (see
line 15 of Algorithm 1). The purpose of this normalization is to decrease the strength of connection
expressed in the algebraic distance between hubs. The normalization results show that normalizing
the algebraic distance further improves properties that are sensitive to the existence of weak edges.
Example are diameter and connected components. As seen in the plots for diameter (see δ-weak
column in Figures 10, 11, 12, and 13), the minimum edge ratio before the diameter deteriorates
is further improved. Similarly for the number of components the number of components for the
smallest sparse graph is reduced and some case kept constant as seen in δ-weak column in Figures
10, 11, 12, and 13). Such properties as local clustering coefficient, degree centrality, and PageRank
that do not depend on global edges are relatively unaffected.
21
δ-weak
Mixture
δ-strong
s
s
e
n
n
e
e
w
t
e
B
y
t
i
l
a
r
t
n
e
C
g
n
i
r
e
t
s
u
C
l
t
n
e
i
c
ffi
e
o
C
n
o
i
t
u
b
i
r
t
s
i
D
y
t
i
l
a
r
t
n
e
C
e
e
r
g
e
D
r
e
t
e
m
a
i
D
s
t
n
e
n
o
p
m
o
C
y
t
i
r
a
l
u
d
o
M
k
n
a
r
e
g
a
P
Figure 10: Social Networks 1
22
fb-indianafb-uffb-texas84fb-penn94gpluslj0.20.40.60.81.0Edgeratio0.9850.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.9920.9940.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.9850.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.50.60.70.80.91.01.1Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio1.01.52.02.53.03.54.04.55.05.5comp/origcomp0.20.40.60.81.0Edgeratio0500100015002000comp/origcomp0.20.40.60.81.0Edgeratio05000100001500020000250003000035000comp/origcomp0.20.40.60.81.0Edgeratio0.60.70.80.91.01.11.21.31.41.5mod/origmod0.20.40.60.81.0Edgeratio1.01.11.21.31.41.51.6mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.0mod/origmod0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρδ-weak
Mixture
δ-strong
s
s
e
n
n
e
e
w
t
e
B
y
t
i
l
a
r
t
n
e
C
g
n
i
r
e
t
s
u
C
l
t
n
e
i
c
ffi
e
o
C
n
o
i
t
u
b
i
r
t
s
i
D
y
t
i
l
a
r
t
n
e
C
e
e
r
g
e
D
r
e
t
e
m
a
i
D
s
t
n
e
n
o
p
m
o
C
y
t
i
r
a
l
u
d
o
M
k
n
a
r
e
g
a
P
Figure 11: Social Networks 2
23
flickrfoursquarecatsterbuzznetblogcataloglivemocha0.20.40.60.81.0Edgeratio0.9970.9980.9991.000ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.9970.9980.9991.000ρ0.20.40.60.81.0Edgeratio0.9940.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.750.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.550.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.30.40.50.60.70.80.91.0Edgeratio0.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio0.940.960.981.001.021.041.06comp/origcomp0.20.30.40.50.60.70.80.91.0Edgeratio1.01.11.21.31.41.51.61.71.81.9comp/origcomp0.20.40.60.81.0Edgeratio02004006008001000comp/origcomp0.20.40.60.81.0Edgeratio0.60.81.01.21.41.61.82.02.2mod/origmod0.20.30.40.50.60.70.80.91.0Edgeratio1.01.21.41.61.8mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.4mod/origmod0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.750.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio0.40.60.81.01.2ρδ-weak
Mixture
δ-strong
s
s
e
n
n
e
e
w
t
e
B
y
t
i
l
a
r
t
n
e
C
g
n
i
r
e
t
s
u
C
l
t
n
e
i
c
ffi
e
o
C
n
o
i
t
u
b
i
r
t
s
i
D
y
t
i
l
a
r
t
n
e
C
e
e
r
g
e
D
r
e
t
e
m
a
i
D
s
t
n
e
n
o
p
m
o
C
y
t
i
r
a
l
u
d
o
M
k
n
a
r
e
g
a
P
Figure 12: Citation Networks
24
ca-cit-Hepthcodblpcit-patent0.20.40.60.81.0Edgeratio0.9920.9940.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.980.991.00ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.820.840.860.880.900.920.940.960.981.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio051015202530354045comp/origcomp0.20.40.60.81.0Edgeratio020406080100120comp/origcomp0.20.40.60.81.0Edgeratio020004000600080001000012000comp/origcomp0.20.40.60.81.0Edgeratio0.81.01.21.41.6mod/origmod0.20.40.60.81.0Edgeratio0.91.01.11.21.31.41.51.61.7mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.2mod/origmod0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρδ-weak
Mixture
δ-strong
s
s
e
n
n
e
e
w
t
e
B
y
t
i
l
a
r
t
n
e
C
g
n
i
r
e
t
s
u
C
l
t
n
e
i
c
ffi
e
o
C
n
o
i
t
u
b
i
r
t
s
i
D
y
t
i
l
a
r
t
n
e
C
e
e
r
g
e
D
r
e
t
e
m
a
i
D
s
t
n
e
n
o
p
m
o
C
y
t
i
r
a
l
u
d
o
M
k
n
a
r
e
g
a
P
Figure 13: Biological Networks
25
human1human2mouse0.00.20.40.60.81.0Edgeratio0.9800.9850.9900.9951.0001.005ρ0.20.40.60.81.0Edgeratio0.9900.9951.000ρ0.00.20.40.60.81.0Edgeratio0.970.980.991.00ρ0.00.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.00.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.00.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.920.940.960.981.00ρ0.00.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.00.20.40.60.81.0Edgeratio0.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.750.800.850.900.951.001.05Origdiameter/diameter0.00.20.40.60.81.0Edgeratio0.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.00.20.40.60.81.0Edgeratio0.940.960.981.001.021.041.06comp/origcomp0.20.40.60.81.0Edgeratio1.0001.0051.0101.0151.0201.0251.0301.035comp/origcomp0.00.20.40.60.81.0Edgeratio1.001.051.101.151.201.251.30comp/origcomp0.00.20.40.60.81.0Edgeratio0.60.81.01.21.41.61.82.02.2mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.4mod/origmod0.00.20.40.60.81.0Edgeratio1.01.52.02.53.0mod/origmod0.00.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.900.920.940.960.981.00ρ0.00.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρReferences
[1] Nesreen K. Ahmed, Jennifer Neville, and Ramana Kompella. Network sampling: From static
to streaming graphs. ACM Trans. Knowl. Discov. Data, 8(2):7:1 -- 7:56, jun 2013.
[2] David Auber. Tulipa huge graph visualization framework. In Graph Drawing Software, pages
105 -- 126. Springer, 2004.
[3] David A Bader, Shiva Kintali, Kamesh Madduri, and Milena Mihail. Approximating between-
ness centrality. In Algorithms and Models for the Web-Graph, pages 124 -- 137. Springer, 2007.
[4] Mathieu Bastian, Sebastien Heymann, Mathieu Jacomy, et al. Gephi: an open source software
for exploring and manipulating networks. ICWSM, 8:361 -- 362, 2009.
[5] P. M. Binder. Frustration in complexity. Science, 322:323, 2008.
[6] A. Brandt and D. Ron. Chapter 1 : Multigrid solvers and multilevel optimization strategies.
In J. Cong and J. R. Shinnerl, editors, Multilevel Optimization and VLSICAD. Kluwer, 2003.
[7] Achi Brandt, James J. Brannick, Karsten Kahl, and Irene Livshits. Bootstrap AMG. SIAM
J. Scientific Computing, 33(2):612 -- 632, 2011.
[8] Pavel Chebotarev and Elena Shamis. On proximity measures for graph vertices. arXiv preprint
math/0602073, 2006.
[9] Jie Chen and Ilya Safro. Algebraic distance on graphs. SIAM Journal on Scientific Computing,
33(6):3468 -- 3490, 2011.
[10] Fan Chung, Wenbo Zhao, and Mark Kempton. Ranking and sparsifying a connection graph.
Internet Mathematics, 10(1-2):87 -- 115, 2014.
[11] Wouter De Nooy, Andrej Mrvar, and Vladimir Batagelj. Exploratory social network analysis
with Pajek, volume 27. Cambridge University Press, 2011.
[12] Leo A Goodman. Snowball sampling. The annals of mathematical statistics, pages 148 -- 170,
1961.
[13] Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. Exploring network structure, dynam-
ics, and function using NetworkX. In Proceedings of the 7th Python in Science Conference
(SciPy2008), pages 11 -- 15, Pasadena, CA USA, August 2008.
[14] M. S. Handcock and K. J. Gile. On the Concept of Snowball Sampling. ArXiv e-prints, 2011.
[15] Pili Hu and Wing Cheong Lau. A survey and taxonomy of graph sampling. CoRR,
abs/1308.5865, 2013.
[16] Yifan Hu. Efficient, high-quality force-directed graph drawing. Mathematica Journal, 10(1):37 --
71, 2005.
[17] S. Itzkovitz, R. Levitt, N. Kashtan, R. Milo, M. Itzkovitz, and U. Alon. Coarse-graining and
self-dissimilarity of complex networks. Physical Review E, 71(1):016127, 2005.
26
[18] Emmanuel John and Ilya Safro. Network sparsification by algebraic distance.
https:
//github.com/emmanuj/ml-sparsifier, 2015 -- 2016.
[19] Risi Imre Kondor and John Lafferty. Diffusion kernels on graphs and other discrete structures.
In Proceedings of the 19th international conference on machine learning, pages 315 -- 322, 2002.
[20] J´erome Kunegis. Konect: The koblenz network collection. In Proceedings of the 22Nd Inter-
national Conference on World Wide Web, WWW '13 Companion, pages 1343 -- 1350, Republic
and Canton of Geneva, Switzerland, 2013. International World Wide Web Conferences Steering
Committee.
[21] Maciej Kurant, Minas Gjoka, Yan Wang, Zack W. Almquist, Carter T. Butts, and Athina
Markopoulou. Coarse-grained topology estimation via graph sampling. CoRR, abs/1105.5488,
2011.
[22] Jure Leskovec and Andrej Krevl. SNAP Datasets: Stanford large network dataset collection.
http://snap.stanford.edu/data, June 2014.
[23] Jure Leskovec and Rok Sosic. SNAP: A general purpose network analysis and graph mining
library in C++. http://snap.stanford.edu/snap, June 2014.
[24] Gerd Lindner, Christian L. Staudt, Michael Hamann, Henning Meyerhenke, and Dorothea
Wagner. Structure-preserving sparsification of social networks.
In Proceedings of the 2015
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
2015, ASONAM '15, pages 448 -- 454, New York, NY, USA, 2015. ACM.
[25] Oren E Livne and Achi Brandt. Lean algebraic multigrid (lamg): Fast graph laplacian linear
solver. SIAM Journal on Scientific Computing, 34(4):B499 -- B522, 2012.
[26] Enys Mones, Lilla Vicsek, and Tamas Vicsek. Hierarchy measure for complex networks. PLoS
ONE, 7(3):e33799, 03 2012.
[27] M. E. J. Newman. Networks, An Introduction. Oxford University Press, 2010.
[28] Dorit Ron, Ilya Safro, and Achi Brandt. Relaxation-based coarsening and multiscale graph
organization. Multiscale Modeling & Simulation, 9(1):407 -- 423, 2011.
[29] Ryan A. Rossi and Nesreen K. Ahmed. bio-human-gene1 - biological networks, 2013.
[30] Ryan A. Rossi and Nesreen K. Ahmed. The network data repository with interactive graph
analytics and visualization. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial
Intelligence, 2015.
[31] I. Safro, D. Ron, and A. Brandt. Graph minimum linear arrangement by multilevel weighted
edge contractions. Journal of Algorithms, 60(1):24 -- 41, 2006.
[32] Ilya Safro, Peter Sanders, and Christian Schulz. Advanced coarsening schemes for graph
partitioning. Journal of Experimental Algorithmics (JEA), 19:2 -- 2, 2015.
[33] Tanwistha Saha, Huzefa Rangwala, and Carlotta Domeniconi. Sparsification and sampling of
networks for collective classification. In Social Computing, Behavioral-Cultural Modeling and
Prediction, pages 293 -- 302. Springer, 2013.
27
[34] Matthew J Salganik and Douglas D Heckathorn. Sampling and estimation in hidden popula-
tions using respondent-driven sampling. Sociological methodology, 34(1):193 -- 240, 2004.
[35] Venu Satuluri, Srinivasan Parthasarathy, and Yiye Ruan. Local graph sparsification for scalable
clustering. In Proceedings of the 2011 ACM SIGMOD International Conference on Manage-
ment of data, pages 721 -- 732. ACM, 2011.
[36] Daniel A Spielman and Nikhil Srivastava. Graph sparsification by effective resistances. SIAM
Journal on Computing, 40(6):1913 -- 1926, 2011.
[37] Daniel A Spielman and Shang-Hua Teng. Nearly-linear time algorithms for graph partitioning,
graph sparsification, and solving linear systems. In Proceedings of the thirty-sixth annual ACM
symposium on Theory of computing, pages 81 -- 90. ACM, 2004.
[38] Daniel A Spielman and Shang-Hua Teng. Spectral sparsification of graphs. SIAM Journal on
Computing, 40(4):981 -- 1025, 2011.
[39] Christian Staudt, Aleksejs Sazonovs, and Henning Meyerhenke. Networkit: An interactive tool
suite for high-performance network analysis. CoRR, abs/1403.3005, 2014.
[40] D. Stutzbach, R. Rejaie, N. Duffield, S. Sen, and W. Willinger. Sampling techniques for
large, dynamic graphs. In INFOCOM 2006. 25th IEEE International Conference on Computer
Communications. Proceedings, pages 1 -- 6, April 2006.
[41] Arthur D Szlam, Mauro Maggioni, and Ronald R Coifman. Regularization on graphs with
function-adapted diffusion processes. The Journal of Machine Learning Research, 9:1711 --
1739, 2008.
[42] C. Walshaw. Multilevel refinement for combinatorial optimisation problems. Annals Oper.
Res., 131:325 -- 372, 2004.
[43] Tianyi Wang, Yang Chen, Zengbin Zhang, Tianyin Xu, Long Jin, Pan Hui, Beixing Deng, and
Xing Li. Understanding graph sampling algorithms for social network analysis. In Distributed
Computing Systems Workshops (ICDCSW), 2011 31st International Conference on, pages
123 -- 128. IEEE, 2011.
[44] D.H. Wolpert and W. Macready. Using self-dissimilarity to quantify complexity. Complexity,
12(3):77 -- 85, 2007.
28
|
1211.6086 | 2 | 1211 | 2012-12-05T23:12:05 | Finding influential users of an online health community: a new metric based on sentiment influence | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | What characterizes influential users in online health communities (OHCs)? We hypothesize that (1) the emotional support received by OHC members can be assessed from their sentiment ex-pressed in online interactions, and (2) such assessments can help to identify influential OHC members. Through text mining and sentiment analysis of users' online interactions, we propose a novel metric that directly measures a user's ability to affect the sentiment of others. Using dataset from an OHC, we demonstrate that this metric is highly effective in identifying influential users. In addition, combining the metric with other traditional measures further improves the identification of influential users. This study can facilitate online community management and advance our understanding of social influence in OHCs. | cs.SI | cs | Working paper
Finding influential users of an online health community:
a new metric based on sentiment influence
Kang Zhao1,2, Greta Greer3, Baojun Qiu2,4, Prasenjit Mitra2, Kenneth Portier3, and John Yen2
1 University of Iowa, S224 PBB, Iowa City, IA [email protected].
2 College of Information Sciences and Technology, The Pennsylvania State University, University Park,
PA 16802. {pmitra, jyen}@ist.psu.edu.
3 American Cancer Society, 250 Williams Street NW, Atlanta, GA, 30303. {greta.greer, ken-
neth.portier}@cancer.org.
4 eBay Inc. 2065 Hamilton Ave, San Jose, CA 95125. [email protected].
Abstract
What characterizes influential users in online health communities (OHCs)? We hypothesize that
(1) the emotional support received by OHC members can be assessed from their sentiment ex-
pressed in online interactions, and (2) such assessments can help to identify influential OHC
members. Through text mining and sentiment analysis of users’ online interactions, we propose a
novel metric that directly measures a user’s ability to affect the sentiment of others. Using da-
taset from an OHC, we demonstrate that this metric is highly effective in identifying influential
users. In addition, combining the metric with other traditional measures further improves the
identification of influential users. This study can facilitate online community management and
advance our understanding of social influence in OHCs.
This research is supported by American Cancer Society and the Pennsylvania State University. Kang Zhao and
Baojun Qiu conducted part of this research during their doctoral studies at the Pennsylvania State University.
1. Introduction
As more and more people use the Internet to satisfy their health-related needs, many of them
seek support through participation in an online health community (OHC) where they interact
with peers facing similar health problems. According to a study by the Pew Research Center,
80% of adult Internet users in the U.S. use Internet for health-related purposes. Among them,
34% reads about health-related experiences or comments from others (1) and 5% of all Internet
users participated in an OHC (2). Obtaining psychosocial support is one of the key benefits of
the participation in OHC (3, 4). The effectiveness and proper functioning of these communities
may be affected by the presence and activities of influential users (IUs), who provide psychoso-
cial supports to other members of the community and have “the power or capacity of causing an
effect in indirect or intangible ways” (5). However, an influential user may disappear from an
OHC due to his/her health condition (e.g., recurrent cancer), which can present major challenges
for the OHC. Hence, the identification of current and emerging influential users can help to im-
prove the sustainability of OHCs.
We propose a novel approach to IU identification based on the assumption that through their
online activities influential OHC users are able to affect the emotion of other community mem-
bers. Hence, we aim at identifying IUs in an OHC by (1) measuring the effect of inter-personal
influence, (2) identifying key contributors to the influence in threaded discussions, and (3) ag-
gregating a person’s contribution to social influence in the community. The proposed approach
utilizes individual OHC users’ sentiment dynamics and develops a new metric based on sent i-
ment influence. This approach is applied to data from the online forum of a peer-support com-
munity sponsored by the American Cancer Society, the Cancer Survivors Network (CSN
http://csn.cancer.org). The dataset used contains 48,779 threaded discussions with more than
468,000 posts from 27,173 de-identified users over a 10-year period ending in October, 2010.
Each thread starts with an initial post, which is published by the thread originator and followed
by responding replies from other users (respondents). In many cases, the thread will contain ad-
ditional posts from the originator (self-replies).
2. The Proposed Approach
2.1 Sentiment Analysis.
In an OHC, user emotions cannot be directly observed, but the sentiment of their posts can re-
flect their emotions at the time of posting. Manually labeling sentiment for so many posts is not
feasible. Instead, our previous research designed an algorithm to detect the sentiment of posts
automatically and classify texts into positive or negative sentiment classes (6). To calibrate the
classification algorithm, we manually label 298 randomly selected posts as belonging to positive
or negative sentiment classes. Examples of initial posts and responding posts with negative and
positive sentiment are shown in Table 1.
Negative
sentiment
Table 1. Examples of posts in CSN and their sentiment classes.
Initial post My mom became resistant to chemo after 7 treatments and now the trial
drug is no longer working :(, ...
Reply
I feel really sorry for that. I know how painful it is…
Initial post Hooray! The tumor is gone according to my doctor! …
…, I love the way you think, ..., hope is crucial and no one can deny that a
Reply
cure may be right around the corner!!!
Positive
sentiment
Next, we extract several lexical and style features from the content of each post, including the
number of words with positive sentiment (e.g., “happy” and “joy”) and negative sentiment (e.g.,
“disappointed” and “painful”), the number of Internet slang (e.g., “LOL” and “:-)”), the numbers
of question marks and exclamation marks, etc. These features are chosen because they can dif-
ferentiate posts with positive sentiment and others with negative sentiment. For instance, a post
that expresses negative sentiment often contains many words with negative sentiment. Finally,
machine-learning-based classifiers are trained based on these manually labeled posts (with cross
validations). The ultimate goal is having a classifier that is able to assign to each post the correct
sentiment labeled by human experts.
Of the several classifiers we tried, AdaBoost (7) with regression trees as weak learners has the
best sentiment classification performance (8). The classifier achieves an accuracy of 79.2%,
meaning that the classifier can correctly determine sentiment labels for about 80% of the 298
manually labeled posts. This performance is in line with other sentiment analysis of various do-
mains that have reported accuracy rates ranging from 66% to 84% (6, 9). Then, this sentiment
classification model is applied to all unlabeled posts, producing a sentiment label for each. Spe-
cifically, for each post pi, the sentiment classification model estimates a sentiment posterior
probability, Pr(c=pospi), which measures how likely it is that the post belongs to the positive
sentiment class given its post characteristics. If P r(c=pospi)>0.5, post pi is labeled as positive;
otherwise, it is labeled as negative. Figure 1 illustrates the process of sentiment classification for
posts. Materials and Methods S1 includes more detailed descriptions of our sentiment classifica-
tion approaches.
2.2 The new metric.
Given the assigned sentiment of all the posts in the OHC, we utilize the sentiment dynamics
within threads to develop a metric that reflects each user’s ability to influence others’ sentiments.
Thread originators often start a thread to seek support from the community on a health-related
issue. Replies from other users exert some level of influence on the originator’s feeling on the
issue, so that sentiment of the originator’s subsequent self-replies in the thread may change.
From such sentiment change, we derive a measure of how influential responding users are.
Fig1. The process of sentiment classification for posts in the OHC.
If a thread does not receive any responding reply, presumably the thread originator does not re-
ceive support from the community with respect to that thread. If the thread originator does not
post any reply in a thread she started (i.e., a self-reply), we cannot measure her change of senti-
ment on the issue discussed in this thread. Among the 48,779 threads, only 23,000 threads have
at least one responding reply, and contain at least one self-reply from the thread originator. By
comparing a thread originator’s sentiment in the initial post with her sentiment in subsequent
self-replies, it is possible to measure the influence from thread respondents.
Fig.2. Sentiment change of thread originators by number of posts. A point represents the aver-
age sentiment of thread originators’ n-th posts in threads they initiated. As the 2nd post from the
originator is the 1st self-reply, the 2nd data point from the left-hand side denotes the average sen-
timent of originators' first self-replies.
Fig.3. Change in originators’ sentiment as a function of the average sentiment of responding re-
plies.
As Figure 2 illustrates, sentiment of thread originators, on average, changes within threads they
initiated. The most significant change in average sentiment occurs between their initial posts and
their first self-replies. Their sentiment does not change much between their first self-reply and
subsequent posts in the same thread. For our analysis, the sentiment of originators’ self-replies is
simply averaged as SF=
, where si refers to one of the N self-replies from the
thread originator. Similarly, the sentiment of responding replies is averaged as SR=
1()/NriiPcpossN, where rj is one of the M responding replies in the thread. Then the sentiment
change indicator for a thread originator is computed as ΔPr= SF-S0, where S0 =Pr(c=posp0) is the
sentiment from the initial post of the thread. Plotting ΔPr against SR (Figure 3) demonstrates that
ΔPr tends to have higher values as SR increases. While the curve does demonstrate some non-
linearity, the Pearson correlation coefficient between ΔPr and SR is 0.96 (P-value≤0.0001).
We conclude that the more positive the sentiment of responding replies, the greater the positive
change in the originator’s sentiment. While this finding only establishes association, it does lend
support to our thesis that the sentiment of thread respondents can impact that of originators. The
analysis also establishes that social support from respondents generally influences thread origina-
tors in a positive way. After at least one responding reply is received, about 75% of all the
thread originators who started with negative sentiment expressed positive subsequent sentiment;
among those who started with positive sentiment, 85% stayed positive in their subsequent senti-
ment. Figure 4 shows the distribution of ΔPr for originators who start a thread with a post that has
negative sentiment. 7.9% of them have ΔPr < 0. The average ΔPr is 0.1359 and a t-test concludes
that ΔPr is significantly greater than 0.
Having demonstrated that the sentiment of respondents has an impact on the change in sentiment
of the thread initiator, we return to the issue of identifying influential users. We posit that influ-
ential users post greater numbers of influential responses and use the number of influential re-
sponding replies (IRR) as a metric of influence. An IRR is a responding reply that is able to a f-
fect the sentiment of posts by the thread originator. While all responding rep lies in a thread may
alter the sentiment of originators’ self-replies, we only consider responding replies that are pub-
1()/MrjjPcposrMlished before an originators’ first self-reply within the thread. The rationale for this is twofold.
First, a thread originator’s sentiment often changes significantly between the initial post and the
first self-reply, but it only changes little afterwards (See Figure 2). Hence, responses in a thread
before the originator posts again are more likely to be influential than other responses. Second,
the temporal intervals between initial posts and first self-replies have a median value of 17 hours,
with two-thirds of them below 24 hours. The cumulative distributions of temporal intervals be-
tween initial posts and the first/last self-reply (Figure 5) shows that threads can sometimes last
quite a long time with the originator often keeping the conversation going with multiple self-
replies. Thus by focusing on those early responses, we can further increase the probability that an
originator’s sentiment change is actually due to the responding replies and not due to other
events happening offline, such as changes in their physical conditions, personal support from
friends and acquaintances, or approaching holidays.
Fig.4. the distribution of ΔPr for originators who start a thread with a post that has negative sen-
timent
Fig. 5. Cumulative distribution of the intervals between initial posts and their first/last self-replies.
Operationally, an IRR moves the thread originator’s sentiment in the direction of the reply’s sen-
timent (positive or negative). If an IRR rj brings in positive sentiment to a thread (i.e., our sen-
timent classifier assigns Pr(c=posrj)>0.5 for post rj), the originator’s sentiment in the first self-
reply (s1) should become more positive compared to that in the initial post (p0), i.e.,
Pr(c=poss1)>Pr(c=posp0); if rj contains negative sentiment (i.e., Pr(c=posrj)<0.5), the origina-
tor’s sentiment in the first self-reply should become more negative than it was in the initial post,
i.e., Pr(c=poss1)<Pr(c=posp0). If there are multiple IRRs between the initial post and the first
self-reply, all are considered to be contributory to the originator’s sentiment change. This is
analogous to the aggregation of influence from multiple actors in the threshold model (10, 11),
even though thresholds that represent individual differences on the ease of being influenced are
not explicit in the definition of IRR. Formally, a responding reply rj in the thread started by ini-
tial post p0 is an IRR if and only if the following two conditions are met:
Condition 1: T(p0)<T(rj)< T(s1), where T(p) is the publishing time of post p.
Condition 2: Pr(c=posrj)>0.5, if Pr(c=poss1)>Pr(c=posp0)
or Pr(c=posrj)<0.5, if Pr(c=poss1)<Pr(c=posp0);
Please note that the metric considers responding replies that bring both positive and negative
sentiment to thread originators. There are at least two reasons to consider negative influences on
sentiments. First, in some contexts, it is not always appropriate to publish responding replies
with positive sentiment. For example, if a thread reports the death of a community member, in-
fluential users may show their sympathy in the thread that may deepen the sadness of the origina-
tor (We examined threads where IRRs had negative sentiment impacts on thread originators. A
preliminary lexical search found that 13% of the initial posts contain words or expressions relat-
ed to death. Please refer to Material and Methods S3 for details). Responding replies like this can
also be supportive in this special context and do not necessarily have a negative impact on the
community. Second, a small number of the influential users may feel so passionate about an
opinion that they, while contributing to the emotion support of some members, could annoy
those who do not agree with their opinions. Distinguishing different types of negative sentiment
influence and finding IUs whose activities may have negative impacts on the whole community
is beyond the scope of this research.
In general, the number of IRRs posted by a user is a reflection of the individual’s engagement in
and contribution to the community, promptness in providing support, and more importantly, the
level of influence that this user can exert on others. These are all important characteristics of in-
fluential users in the OHC.
3. Evaluation
One is able to rank users according to their numbers of IRRs--the higher the number of IRRs is,
the more likely they are influential users. Validation of the ranking requires an independently
derived and ranked list of OHC influential users. Unfortunately, while it is easy to label users
whose activity levels are very low as non-influential users, identifying a true influential user re-
quires good knowledge of each user’s history of activities and of other users’ reactions to their
posts over an extended period of time. With the help of domain experts, in this case the CSN
community manager and two staff members who monitor forum content on a full-time basis, 41
community members (referred to as IU List-1) are nominated as influential users. Ranking of
List-1 is not performed because these experts do not think that it is feasible to do so reliably for
such a high number of users1.
Although List-1 comes from subjective evaluations and does not include all the IUs in the com-
munity, it provides a starting point for evaluating the utility of using IRR to identify IUs. Be-
cause we do not know all the IUs in the community, we cannot directly use traditional metrics,
such as precision and recall, to measure the performance of our approach. Instead, we evaluate
our ranking using Top-K recalls (also known as Recall@K): we check how many of the 41 nom-
inated influential users in List-1 can be ranked within top K (with various K values) by our new
IRR metric. If n of them are ranked within top K, then the Top-K recall is n/41. The higher the
Top-K recall for a ranking metric, the better the performance of the metric. Table 2 also lists the
Top-K recalls of various user rankings by traditional metrics, including contribution metrics and
network centralities (Here we use a post-reply network, where there is an edge pointing from us-
er A to user B if A published a responding reply in a thread started by B). Intuitively, higher K
values lead to higher Top-K recalls. More importantly, the performance of our new IRR metric is
better than that of all other metrics for top-50 recall, top-100 recall, and top-150 recall.
1 Note that in information retrieval and search engine evaluation, only relevance judgments are sought and
not totally ordered ranks because of the same reason.
Table 2. Compare the Top-K recall from various single-metric user rankings (using IU List-1).
K=150
K=100
K=50
Metric
0.585
0.439
0.342
Total number of threads initiated
0.781
0.707
0.415
Total number of posts
In-degree in the post-reply network
0.317
0.512
0.610
0.780
0.659
0.390
Out-degree in the post-reply network
0.488
0.366
0.293
Betweenness in the post-reply network
0.732
0.561
0.390
PageRank in the post-reply network
Early replies within 24 hours
0.487
0.707
0.781
0.805
0.732
0.512
Total number of IRRs
Table 3. Compare the performance of the IRR ranking and an ensemble classifier (using both IU
List-1 and List-2)2.
IRR Ranking
The original ensemble
classifier
The new ensemble clas-
sifier with IRR
K=50
Recall
(max =0.397)
0.349
0.278
Precision
0.880
0.700
K=100
Recall
(max =0.794)
0.627
Precision Recall
0.790
0.762
K=150
Precision
(max=0.840)
0.640
0.532
0.670
0.698
0.587
0.373
0.940
0.579
0.730
1.000
0.840
How does the performance of the IRR metric compare to the combined power of traditional met-
rics? Our early work developed several classifiers (12) that can be used to also identify IUs.
These classifiers utilized 68 user features that measured users’ contributions in various ways
(e.g., the numbers of posts and active days), network centralities (e.g., degree, betweenness, and
PageRank), and post content (e.g., the frequency of words with positive/negative sentiment in a
user’s posts). The best performing classifier utilized an ensemble random-forest model built on
outcomes from other individual classifiers fitted to the same online community. Materials and
Methods S2 includes more information about the ensemble classifier. To assess the precision of
this ensemble classifier, domain experts reviewed a new list of users that were ranked within the
top 150 by the classifier but were not included in List-1. Using criteria similar to those that gen-
2 Note that there are 85+41=126 influential users when we combine List-1 and List-2. As 126>100>50,
the maximum possible values for Top-50 and Top-100 recalls are not 1. For instance, even though the top
50 users are all influential ones, the maximum possible Top-50 recall is only 50/126=0.397. Similarly, the
maximum Top-100 recall is 100/126=0.794; the maximum Top-150 precision is 126/150=0.84.
erated IU List-1, domain experts endorsed an additional 85 influential users (referred to as IU
List-2). The longer list of IUs endorsed by domain experts enables better comparison between
our IRR ranking and the classifier.
Surprisingly, as Table 3 shows, the performance of our IRR ranking is better than that of the
classifier in both Top-K recalls and precisions, even though the IRR ranking only uses one metric
and the other classifier uses 60 features. In addition to recall, the high precision of our metric is
very useful. For example, the Top-50 precision is 0.880, meaning that 88% of the top 50 users
are indeed influential ones.
To test the validity of the IRR metric, we also conduct sensitivity analysis. The sentiment class
label of a post is the basis for finding IRRs in the OHC. Originally, a classification threshold of
Pr(c=pospi)=0.5 is used to determine the sentiment of posts, with those above 0.5 being classi-
fied as having positive sentiment. Then is the new IRR metric robust when we pick different
threshold values for sentiment classification? We vary the classification threshold values from
0.3 to 0.7 and count each user’s number of IRRs again. It turns out that the IRR metric is very
robust against such threshold changes. Users’ numbers of IRRs based on different threshold val-
ues are still highly correlated with correlation coefficients higher than 0.998 (see Table 4). In
other words, despite of the changing threshold values, a user with many IRRs still is a high-IRR
user, and vice versa. Consequently, the IRR ranking maintains consistent performance in identi-
fying influential users when different threshold values are used (see Table 5).
To further improve the identification of influential users and illustrate the synergistic benefit of
our new metric, we also incorporate the IRR metric as a new feature into the original ensemble
classifier. The IRR-enhanced classifier performs much better than the previous one (See the last
row in Table 3). Its strong performance in Top-50 recall and precision are especially desirable
for finding members with very high influence in the OHC. The new classifier’s perfect Top-150
recall means that it could find all of the nominated and endorsed influential users within top 150.
The imperfect top-150 precision is also acceptable because the combined list with 126 IUs (from
IU List-1 and List-2) still may not include all influential users in the OHC.
Table 4. Correlation coefficients for the numbers of IRRs with different thresholds values for
sentiment classification.
Threshold values
Pr(c=pospi)=0.5 vs Pr(c=pospi)=0.3
Pr(c=pospi)=0.5 vs Pr(c=pospi)=0.4
Pr(c=pospi)=0.5 vs Pr(c=pospi)=0.6
Pr(c=pospi)=0.5 vs Pr(c=pospi)=0.7
Correlation coefficient (p-value)
0.9985 (0.0000)
0.9986 (0.0000)
0.9995 (0.0000)
0.9985 (0.0000)
Threshold values for
sentiment classification
Precision
Precision Recall
Table 5. Performance of IRR ranking with different thresholds values for sentiment classifica-
tion. (using both IU List-1 and List-2).
K=50
Recall
(max =0.397)
0.349
0.349
0.349
0.349
0.349
K=100
Recall
(max =0.794)
0.627
0.610
0.603
0.603
0.603
Pr(c=pospi)=0.5
Pr(c=pospi)=0.3
Pr(c=pospi)=0.4
Pr(c=pospi)=0.6
Pr(c=pospi)=0.7
K=150
Precision
(max=0.840)
0.640
0.633
0.637
0.637
0.640
0.790
0.770
0.760
0.760
0.760
0.762
0.754
0.746
0.754
0.762
0.880
0.880
0.880
0.880
0.880
4. Related work
Classic social network theories regarding IUs can be classified into two categories: (1) structure-
based centrality metrics, and (2) influence models. Structure-based centrality metrics assess the
degree of importance of a node based on the position of the node in a social network. Major cen-
trality measures include betweenness centrality (13). degree centrality (14), closeness centrality
(15), and Pagerank in a directed network, in which the rank of a node is determined by the rank
of those with a link pointing to that node (16). These theories and their extensions have been
widely adopted in the analysis of many social networks. The second category of social network
theories regarding influential users characterizes the dynamics of social influence using a diffu-
sion model such as the threshold model, the independent cascade model, and their variants and
extensions (17, 18). Influential users can then be identified through maximizing the effect of so-
cial influence based on these (19).
The emergence of online communities (20), where users often interact through open discussions,
provides important opportunities for using novel computational social science approaches (21,
22) to identify influential users from large-scale social networks. In addition to the structure of
users’ social networks, online communities also capture detailed information of users’ online in-
teractions (e.g., the amount, content and time of interactions) that are typically not available in
other types of social networks. Research that tries to identify IUs in these communities not only
considers network-level centralities, but also incorporates individual users’ behaviors and contri-
butions. For example, in online communities that feature contagion or diffusion phenomena, as
seen in Twitter or more generally with online viral spreading, researchers used randomized ex-
periments and statistical analysis to find out each individual’s influence based on attributes of the
individual and the dyadic relationship (23). In an online Q&A community, the difference in
knowledge between question-askers and answerers has been used to find experts (24), a type of
influential users. Analyses of the blogosphere have utilized blogger contributions (e.g. , the num-
ber and length of posts) and reader activities (e.g., posting comments to a blog) to assess the in-
fluence of a blogger (25).
Meanwhile, social contacts are known to influence health-related behaviors and emotions in in-
dividuals (26-28). Provision of emotional support is a key component of OHCs, especially
OHCs that cater to individuals with serious medical conditions, such as cancer. Individuals with
serious medical conditions often experience stress and anxiety especially around the time of first
diagnosis and during treatment (29). However, this important function of OHCs has not been re-
flected in the literature of IU identification.
5. Discussions
This research develops a novel metric that can identify influential users in OHCs. It focuses on
the sentimental effect of inter-personal influence on individuals and directly measures an OHC
member’s ability to influence others’ sentiment. This research has important implications for
building an active, supportive, and sustainable OHC. For instance, early identification of IUs in
an OHC provides community managers an opportunity to publicly recognize their contributions
by awarding them prestigious status (e.g., presenting virtual badges of honor) and to encourage
other members’ participation in the OHC. Also, OHC managers can guide emerging community
IUs to assume greater leadership roles and thereby assure consistent, strong peer leadership. This
is especially valuable to OHCs, in which influential users are sometimes lost as a result of
health-related factors that limit or preclude their continued involvement in the community. The
analysis of influential users using IRR illustrated here can also be applied to the study of online
social networking sites, such as those focused on product reviews or political opinions, where
sentiment is a major part of community interactions.
The proposed metric for influential users is significant not only because it has been shown to be
effective for identifying influential users from a large community with a long history, but also
because it provides fundamentally new insights into understanding the nature of social influence
at multiple scales. The concept of “influential post” introduces, for the first time, a fundamenta l
element of social influence at the inter-personal level. The concept is intrinsically multi-scale,
because it is based on the alignment of a responding reply’s sentiment (inter-personal level) with
the direction of the sentiment change of the thread originator at the individual level. The concept
of “influential post” also compliments the previous emphasis on analyzing “relationship” net-
works with a fundamentally new perspective that analyzes the conversation of actual social in-
teractions in which influence takes place. This new perspective is especially suitable for analyz-
ing influence in online communities, in which interactions emerge and evolve among people
previously unconnected. We believe that this new metric will provide an important basis for ad-
vancing our understandings about influence, human behaviors, and the dynamics of online com-
munities. For instance, longitudinal studies about influential posts can be useful for studying the
dynamic patterns of user engagement in online communities.
As has been the case with other studies of online social influence, our approach is limited in that
only inter-personal influence through online interactions is examined. As previously mentioned,
the sentiment in a user’s post may also be influenced by offline issues. We have tried to elimi-
nate as much offline influence as possible by focusing on the sentiment effect of prompt replies
to thread originators. To achieve a complete understanding of influence in an OHC, researchers
need to capture and analyze members’ offline activities and characteristics. This can then be
combined with a more fine-grained text analysis of their posts.
We have mentioned earlier in this paper that another limitation of this work is that it does not
distinguish healthy negative sentiment influences (e.g., sadness due to the death of a community
member) from those that are not healthy for the community (e.g., opinions that are so strong that
can annoy certain community members). Such a distinction, which requires a more fine-grained
analysis of the content of the threads, can contribute to the identification of IUs who can have
negative impacts on the community. This, we believe, is an important area for future research.
Last, in addition to emotional support, we want to measure one’s influence in online activities
that aim at providing information support. We are also interested gauging one’s influence in
threads that that do not receive any self-reply.
6. Materials and Methods
6.1 Features and performance for sentiment analysis for posts.
From posts in the forum, we extract lexical and stylish features for training sentiment models.
Table S1 summarizes these features. Pos and Neg represent the numbers of positive and negative
words (and emoticons) respectively. The lists of words’ sentiment are based on those introduced
by Hu and Liu (30), and the positive and negative emoticon lists are collected from Internet. We
found that many posts in CSN forum mention names, e.g., UserIDx, I love the way you think, as
shown in Table 1. Wondering whether name mention has a relationship with sentiment, we in-
troduce NameMention as a feature that counts the occurrences of de-identified names in a post.
We also introduce Slang as a feature to check whether the numbers of slang in a post correlate
with its sentiment. PosStrength and NegStrength are two features indicate the strength of positive
and negative sentiment respectively. Introduced by Thelwall et al.(31), they not only consider
whether a word is in positive or negative lists, but also consider the strength (e.g., “very good”
and “good!!!” are more positive than “good”).
is
the
number
of
Neg
Slang
NameMention
Table S1. Features for the sentiment analysis of forum posts.
Definition
Feature
The number of words in a post
PostLength
NumOfPos/PostLength, where NumOfPos is the number of
Pos
words/emoticons with positive sentiment.
NumOfNeg/PostLength, where NumOfNeg
words/emoticons with positive sentiment.
NumOfName/PostLength, where NumOfName is the number of names
mentioned.
NumOfSlang/PostLength, where NumOfSlang is the number of Internet
slangs
Positive sentiment strength from the SentiStrength Package.
PosStrength
Negative sentiment strength from the SentiStrength Package.
NegStrength
PosVsNeg
(NumOfPos+1)/(NumOfNeg+1)
PosVsNegStrength PosStrength/NegStrength
Sentence
The number of sentences
The average length of words
AvgWordLen
QuestionMarks
The number of question marks
ExclamationMarks The number of exclamations
Table S2. Best performance from classifiers.
ROC Area
Classifier
AdaBoost
0.832
0.832
Logistic regression
0.816
LogitBoost
0.802
BayesNet
Bagging
0.794
0.785
Neural networks
0.782
Decision tree
SVM
0.658
Classification accuracy
79.2%
77.5%
76.8%
74.2%
73.5%
73.8%
77.2%
75.2%
We try 8 different types of classifiers including AdaBoost, LogitBoost, Bagging, SVM, logistic
regression, Neural Networks, BayesNet, and decision trees. All combinations of the features are
considered for each type of model to find the features set which achieves the best performance.
Both classification accuracy and ROC area are used as metrics because they have different focus
on measurement. Classification accuracy measures the percentage of correctly classified instanc-
es. ROC area calculates the area under the receiver operating characteristic (ROC) curve, which
plots the true positive rate vs. false positive rate for a binary classifier system as the discrimina-
tion threshold of the classifier varies. ROC curve can measure the ability of a classifier to pro-
duce good relative instance scores, and is insensitive to changes in class distribution. Table S2
summarizes the results of different models based on their best feature sets (10-fold cross-
validation). AdaBoost (regression trees are used as weak learners) achieves the best ROC Area
(0.832) as well as the best classification accuracy (79.2%). In contrast, the ROC area and accura-
cy of an AdaBoost using all features in Table S1 are even lower--0.813 and 75.2% respectively
(too many features may have caused over-fitting).
Contribution
features
Table S3. Summary of basic features for each community member.
Group
Features
Number of one’s initial posts (i.e., posts that start threads)
Number of one’s replies to others (i.e., following posts)
Number of threads that one contributed post(s) to
Number of other users’ posts published after one’s post in the same thread
Avg. response delay between one’s post and the next post by others in the same thread (in
minutes)
Total length of one’s post (in bytes)
Avg. length of one’s post (in bytes)
Avg. content length of one’s top 30 longest posts (in bytes)
Number of one’s active days (one published at least 1 post in an active day)
Time span of one’s activity (from first active day to the last)
Avg. number of posts per active day
Avg. number of posts per day during one’s time span of activity
One’s in-degree and out-degree in the post-reply network
One’s betweenness centrality in the post-reply network
One’s PageRank in the post-reply network
Avg. percentage of words w/ positive sentiment in one’s posts
Avg. percentage of words w/ negative sentiment in one’s posts
Avg. percentage of Internet slangs/emoticons in one’s posts
Avg. percentage of words w/ strong emotion in one’s posts
Ratio between the numbers of words w/ positive and negative words in one’s posts
Topical diversity (Shannon entropy and log energy of topic distribution in a user’s posts)
Network
features
Semantic
features
6.2 The classification approach to identify influential users.
To identify influential users from the OHC, we extract three groups of basic features for each
user: contribution, network, and semantic features. Contribution features, as the name implies,
measure a user’s direct contribution to the forum, such as number of discussion threads (topics)
initiated and replies posted, number of days the user has actively posted, length of the user’s
post, etc. Network features reflect users’ centrality (e.g. in/out-degree and betweenness) in a
post-reply network, where there is an edge pointing from user A to user B if user A replied a
thread started by user B. Semantic features reflect positive or negative sentiment, emotional
strength, diversity of topical coverage (utilizing Latent-Dirichlet Allocation), etc. of a user’s
posts. Table S3 summarizes these basic features. On the basis of these basic features, we also
take advantage of the sub-community structure of the social network among community mem-
bers to generate new neighborhood-based and cluster-based features, which help to improve the
performance of our classifiers.
Table S4. Performance of various classifiers for identifying IUs.
Classifier
Naïve Bayesian
Logistic Regression
Random Forest
One-class SVM
Two-class SVM
The ensemble classifier (based on random forest)
Top-150 Recall
0.796
0.706
0.779
0.781
0.739
0.854
We apply 5 classifiers, Naïve Bayesian, Logistic Regression, and Random Forest, one -class
SVM, and two-class SVM, to classify community members into IUs and non-IUs using 10-fold
cross-validation. Top-150 recalls (evaluated with IU List-1) obtained from the 5 classifiers range
from 0.706 to 0.796 (see Table S4).
Ensemble methods are used to further improve the classification. For each user, a classifier gives
a classification result, either as a probability or a binary value to denote whether the user is con-
sidered a leader. We then fed each user’s five classification results from the five individual clas-
sifiers to an ensemble classifier. Among many ensemble methods, the ensemble classifier based
on Random Forest achieves the best performance: an average top-150 recall (evaluated with IU
List-1) of 0.854 (see Table S4).
6.3 The list of words and expressions related to death.
This list was picked from “List of expressions related to death” at Wikipedia 3 and “Death and
general words relating to death” at the MacMillan Dictionary Thesaurus4 .
"pass away", "passing away", "passed away", "funeral", "die", "dying", "death", "memorial", "is
gone", "was gone", "at rest", "final summons", "room temperature", "at peace", "in peace", "be-
yond the grave", "beyond the veil", "over the big ridge", "the last roundup", "the great majority",
"the ultimate sacrifice", "a last bow", "last breath", "bereavement", "demise", "obituar".
2.
3.
4.
5.
6.
References:
Fox S (2011) The Social Life of Health Information, 2011. (Pew Research Center's Internet &
1.
American Life Project).
Chou WY, Hunt YM, Beckjord EB, Moser RP, & Hesse BW (2009) Social media use in the
United States: implications for health communication. J Med Internet Res 11(4).
Rodgers S & Chen Q (2005) Internet Community Group Participation: Psychosocial Benefits for
Women with Breast Cancer. Journal of Computer-Mediated Communication 10(4):00-00.
Kim E, et al. (2012) The process and effect of supportive message expression and reception in
online breast cancer support groups. Psycho-Oncology 21(5):531-540.
Merriam-Webster.com (2011) influnce.
Pang B & Lee L (2008) Opinion Mining and Sentiment Analysis. Foundations and Trends in
Information Retrieval 2(1-2):1-135.
Freund Y & Schapire R (1995) A desicion-theoretic generalization of on-line learning and an
application to boosting. Computational Learning Theory-Lecture Notes in Computer Science, ed
Vitányi P (Springer Berlin / Heidelberg), Vol 904, pp 23-37.
Qiu B, et al. (2011) Get Online Support, Feel Better -- Sentiment Analysis and Dynamics in an
Online Cancer Survivor Community. Proceedings of the Third IEEE Third International
Confernece on Social Computing (SocialCom'11), pp 274-281.
Liu B (2006) Web Data Mining: Exploring Hyperlinks, Contents and Usage Data (Springer) p
532.
Granovetter M (1978) Threshold Models of Collective Behavior. The American Journal of
Sociology 83(6):1420-1443.
Valente TW (1996) Network models of the diffusion of innovations. Computational &
Mathematical Organization Theory 2(2):163-164.
Zhao K, et al. (2011) Identifying Leaders in an Online Cancer Survivor Community. Proceedings
of the 21st Annual Workshop on Information Technologies and Systems (WITS'11), pp 115-120.
Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40:35-41.
10.
11.
12.
13.
7.
8.
9.
3 http://en.wikipedia.org/wiki/List_of_expressions_related_to_death
4 http://www.macmillandictionary.com/thesaurus-category/american/Death-and-general-words-relating-to-death
18.
19.
21.
22.
14.
15.
16.
Albert R, Jeong H, & Barabasi AL (2000) Error and attack tolerance of complex networks.
Nature 406(6794):378-382.
Cobb NK, Graham AL, & Abrams DB (2010) Social Network Structure of a Large Online
Community for Smoking Cessation. Am. J. Public Health 100(7):1282-1289.
Brin S & Page L (1998) The anatomy of a large-scale hypertextual Web search engine. Computer
networks and ISDN systems 30(1-7):107-117.
17. Watts D (2002) A simple model of global cascades on random networks. Proceedings of the
National Academy of Sciences of the United States of America 99(9):5766-5771.
Goldenberg J, Libai B, & Muller E (2001) Talk of the network: A complex systems look at the
underlying process of word-of-mouth. Marketing Letters 12(3):211-223.
Kempe D, Kleinberg J, & Tardos E (2003) Maximizing the spread of influence through a social
network. Proceedings of the ninth ACM SIGKDD international conference on Knowledge
discovery and data mining, (ACM), pp 137-146.
20. Wellman B (1999) Net surfers don't ride alone: Virtual communities as communities.
Communities in cyberspace, eds Smith MA & Kollock P (Routledge), pp 167-194.
Lazer D, et al. (2009) Life in the network: the coming age of computational social science.
Science 323(5915):721-723.
Keegan B, Ahmed MA, Williams D, Srivastava J, & Contractor N (2011) Sic Transit Gloria
Mundi Virtuali? Promise and Peril in the Computational Social Science of Clandestine
Organizing. Proceedings of the ACM WebSci'11, pp 1-8.
Aral S & Walker D (2012) Identifying Influential and Susceptible Members of Social Networks.
Science 337(6092):337-341.
Zhang J, Ackerman MS, & Adamic L (2007) Expertise networks in online communities: structure
and algorithms. Proceedings of the 16th international conference on World Wide Web, (ACM),
pp 221-230.
Agarwal N, Liu H, Tang L, & Yu PS (2008) Identifying the influential bloggers in a community.
Proceedings of the International Conference on Web Search and Web Data Mining, (ACM), pp
207-218.
Centola D (2010) The Spread of Behavior in an Online Social Network Experiment. Science
329(5996):1194-1197.
Fowler JH & Christakis NA (2008) Dynamic spread of happiness in a large social network:
longitudinal analysis over 20 years in the Framingham Heart Study. BMJ 337(a2338):1-9.
Centola D (2011) An Experimental Study of Homophily in the Adoption of Health Behavior.
Science 334(6060):1269-1272.
Barraclough J (1999) Cancer and Emotion: A Practical Guide to Psycho-oncology (Wiley) 3rd
Ed.
Hu M & Liu B (2004) Mining and summarizing customer reviews. Proceedings of the tenth ACM
SIGKDD international conference on Knowledge discovery and data mining (KDD'04), (ACM,
1014073), pp 168-177.
Thelwall M, Buckley K, Paltoglou G, Cai D, & Kappas A (2010) Sentiment in short strength
detection informal text. Journal of the American Society for Information Science and Technology
61(12):2544-2558.
31.
23.
24.
25.
26.
27.
28.
29.
30.
|
1102.5063 | 3 | 1102 | 2012-03-04T01:31:30 | Topology Discovery of Sparse Random Graphs With Few Participants | [
"cs.SI",
"physics.soc-ph",
"stat.ME"
] | We consider the task of topology discovery of sparse random graphs using end-to-end random measurements (e.g., delay) between a subset of nodes, referred to as the participants. The rest of the nodes are hidden, and do not provide any information for topology discovery. We consider topology discovery under two routing models: (a) the participants exchange messages along the shortest paths and obtain end-to-end measurements, and (b) additionally, the participants exchange messages along the second shortest path. For scenario (a), our proposed algorithm results in a sub-linear edit-distance guarantee using a sub-linear number of uniformly selected participants. For scenario (b), we obtain a much stronger result, and show that we can achieve consistent reconstruction when a sub-linear number of uniformly selected nodes participate. This implies that accurate discovery of sparse random graphs is tractable using an extremely small number of participants. We finally obtain a lower bound on the number of participants required by any algorithm to reconstruct the original random graph up to a given edit distance. We also demonstrate that while consistent discovery is tractable for sparse random graphs using a small number of participants, in general, there are graphs which cannot be discovered by any algorithm even with a significant number of participants, and with the availability of end-to-end information along all the paths between the participants. | cs.SI | cs |
Topology Discovery of Sparse Random Graphs
With Few Participants∗
Animashree Anandkumar†, Avinatan Hassidim‡and Jonathan Kelner§
May 23, 2018
Abstract
We consider the task of topology discovery of sparse random graphs using end-to-end random
measurements (e.g., delay) between a subset of nodes, referred to as the participants. The rest of
the nodes are hidden, and do not provide any information for topology discovery. We consider
topology discovery under two routing models: (a) the participants exchange messages along
the shortest paths and obtain end-to-end measurements, and (b) additionally, the participants
exchange messages along the second shortest path. For scenario (a), our proposed algorithm
results in a sub-linear edit-distance guarantee using a sub-linear number of uniformly selected
participants. For scenario (b), we obtain a much stronger result, and show that we can achieve
consistent reconstruction when a sub-linear number of uniformly selected nodes participate.
This implies that accurate discovery of sparse random graphs is tractable using an extremely
small number of participants. We finally obtain a lower bound on the number of participants
required by any algorithm to reconstruct the original random graph up to a given edit distance.
We also demonstrate that while consistent discovery is tractable for sparse random graphs using
a small number of participants, in general, there are graphs which cannot be discovered by any
algorithm even with a significant number of participants, and with the availability of end-to-end
information along all the paths between the participants.
Keywords: Topology Discovery, Sparse Random Graphs, End-to-end Measurements, Hidden Nodes,
Quartet Tests.
1
Introduction
Inference of global characteristics of large networks using limited local information is an important
and a challenging task. The discovery of the underlying network topology is one of the main
goals of network inference, and its knowledge is crucial for many applications. For instance, in
communication networks, many network monitoring applications rely on the knowledge of the
routing topology, e.g., to evaluate the resilience of the network to failures [2, 3]; for network traffic
∗A shorter version appears in [1]. This version is scheduled to appear in Journal on Random Structures and
Algorithms.
†A. Anandkumar is with the Center for Pervasive Communications and Computing, Electrical Engineering and
Computer Science Dept., University of California, Irvine, USA 92697. Email: [email protected]
‡A. Hassidim is with Google Research, Tel Aviv, Israel. Email: [email protected]
§J. Kelner is with the Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Tech-
nology, Cambridge MA 02139. Email: [email protected]
1
prediction [4, 5] and monitoring [6], anomaly detection [7], or to infer the sources of viruses and
rumors in the network [8]. In the context of social networks, the knowledge of topology is useful
for inferring many characteristics such as identification of hierarchy and community structure [9],
prediction of information flow [10, 11], or to evaluate the possibility of information leakage from
anonymized social networks [12].
Traditionally, inference of routing topology in communication networks has relied on tools such
as traceroute and mtrace [13] to generate path information between a subset of nodes. However,
these tools require cooperation of intermediate nodes or routers to generate messages using the
Internal Control Message Protocol (ICMP). Increasingly, today many routers block traceroute
requests due to privacy and security concerns [14, 15], there by making inference of topology using
traceroute inaccurate. Moreover, traceroute requests are not scalable for large networks, and cannot
discover layer-2 switches and MPLS (Multi-protocol Label Switching) paths, which are increasingly
being deployed [16].
The alternative approach for topology discovery is the approach of network tomography. Here,
topology inference is carried out from end-to-end packet probing measurements (e.g., delay) be-
tween a subset of nodes, without the need for cooperation between the intermediate (i.e., non-
participating) nodes in the network. Due to its flexibility, such approaches are gaining increasing
popularity (see Section 1.2 for details).
The approach of topology discovery using end-to-end measurements is also applicable in the
context of social networks. In many social networks, some nodes may be unwilling to participate or
cooperate with other nodes for discovering the network topology, and there may be many hidden
nodes in "hard to reach" places of the network, e.g., populations of drug users, and so on. Moreover,
in many networks, there may be a cost to probing nodes for information, e.g., when there is a cash
reward offered for filling out surveys. For such networks, it is desirable to design algorithms which
can discover the overall network topology using small fraction of participants who are willing to
provide information for topology discovery.
There are many challenges to topology discovery. The algorithms need to be computationally
efficient and provide accurate reconstruction using a small fraction of participating nodes. Moreover,
inference of large topologies is a task of high-dimensional learning [17]. In such scenarios, typically,
only a small number of end-to-end measurements are available relative to the size of the network to
be inferred. It is desirable to have algorithms with low sample complexity (see Definition 3), where
the number of measurements required to achieve a certain level of accuracy scales favorably with
the network size.
It is indeed not tractable to achieve all the above objectives for discovery of general network
topologies using an arbitrary set of participants. There are fundamental identifiability issues,
and in general, no algorithm will be able to discover the underlying topology. We demonstrate
this phenomenon in Section 8.2, where we construct a small network with a significant fraction
of participants which suffers from non-identifiability.
Instead, it is desirable to design topology
discovery algorithms which have guaranteed performance for certain classes of graphs.
We consider the class of Erdos-R´enyi random graphs [18]. These are perhaps the simplest as well
as the most well-studied class of random graphs. Such random graphs can provide a reasonable
explanation for peer-to-peer networks [19] and social networks [20]. We address the following
issues in this paper: can we discover random graphs using a small fraction of participating nodes,
selected uniformly at random? can we design efficient algorithms with low sample complexity
and with provable performance guarantees? what kinds of end-to-end measurements between the
2
participants are useful for topology discovery? finally, given a set of participants, is there a lower
bound on the error (edit distance) of topology discovery that is achievable by any algorithm? Our
work addresses these questions and also provides insights into many complex issues involved in
topology discovery.
1.1 Summary of Contributions
We consider the problem of topology discovery of sparse random graphs using a uniformly selected
set of participants. Our contributions in this paper are three fold. First, we design an algorithm
with provable performance guarantees, when only minimal end-to-end information between the
participants is available. Second, we consider the scenario with additional information, and design
a discovery algorithm with much better reconstruction guarantees. Third, we provide a lower
bound on the edit distance of the reconstructed graph by any algorithm, for a given number of
participants. Our analysis shows that random graphs can be discovered accurately and efficiently
using an extremely small number of participants.
We consider reconstruction of the giant component of the sparse random graph up to its minimal
representation, where there are no redundant hidden nodes (see Section 3.1). Our end-to-end
measurement model consists of random samples (e.g., delay) along the shortest paths between the
participants. Using these samples, we design the first random-discovery algorithm, referred to as
the RGD1 algorithm, which performs local tests over small groups of participating nodes (known
as the quartet tests), and iteratively merges them with the previously constructed structure. Such
tests are known to be accurate for tree topologies [21], but have not been previously analyzed
for random-graph topologies. We provide a sub-linear edit-distance guarantee (in the number of
nodes) under RGD1 when there are roughly n5/6 participants, where n is the number of nodes in
the network. The algorithm is also simple to implement, and is computationally efficient.
We then extend the algorithm to the scenario where additionally, there are end-to-end measure-
ments available along the second shortest paths between the participating nodes. Such information
is available since nodes typically maintain information about alternative routing paths, should the
shortest path fail. In this scenario, our algorithm RGD2, has a drastic improvement in accuracy
under the same set of participating nodes. Specifically, we demonstrate that consistent discovery
can be achieved under RGD2 algorithm when there are roughly n11/12 number of participants, where
n is the network size. Thus, we can achieve accurate topology discovery of random graphs using
an extremely small number of participants. For both our algorithms, the sample complexity is
poly-logarithmic in the network size, meaning that the number of end-to-end measurement samples
needs to scale poly-logarithmically in the network size to obtain the stated edit-distance guarantees.
Our analysis in this paper thus reveals that sparse random graphs can be efficiently discovered
using a small number of participants. Our algorithms exploit the locally tree-like property of random
graphs [18], meaning that these graphs contain a small number of short cycles. This enables us to
provide performance guarantees for quartet tests which are known to be accurate for tree topologies,
and this is done by carefully controlling the distances used by the quartet tests. At the same time,
we exploit the presence of cycles in random graphs to obtain much better guarantees than in the
case of tree topologies. In other words, while tree topologies require participation of at least half the
number of nodes (i.e., the leaves) for accurate discovery, random-graph topologies can be accurately
discovered using a sub-linear number of participants.
Finally, we provide lower bounds on the reconstruction error under any algorithm for a given
number of participants. Specifically, we show that if less than roughly √n nodes participate in
3
topology discovery, reconstruction is impossible under any algorithm, where n is the network size.
We also discuss topology discovery in general networks, and demonstrate identifiability issues in-
volved in the discovery process. We construct a small network with a significant fraction of nodes
as participants which cannot be reconstructed using end-to-end information on all possible paths
between the participants. This is in contrast to random graphs, where consistent and efficient
topology discovery is possible using a small number of participants.
To the best of our knowledge, this is the first work to undertake a systematic study of random-
graph discovery using end-to-end measurements between a subset of nodes. Although we limit
ourselves to the study of random graphs, our algorithms are based on the locally tree-like property,
and are thus equally applicable for discovering other locally tree-like graphs such as the d-regular
graphs and the scale-free graphs; the latter class is known to be a good model for social networks [20,
22] and peer-to-peer networks [19]. Indeed more sophisticated and general models for networks have
been developed [23–25], but we defer their study for future work.
1.2 Related Work
Network tomography has been extensively studied in the past and various heuristics and algorithms
have been proposed along with experimental results on real data. For instance, the area of mapping
the internet topology is very rich and extensive, e.g., see [4,26–32]. In the context of social networks,
the work in [33] considers prediction of positive and negative links, the work in [34] considers
inferring networks of diffusion and influence and the work in [35] considers inferring latent social
networks through spread of contagions. A wide range of network tomography solutions have been
proposed for general networks. See [36] for a survey.
Topology discovery is an important component of network tomography. There have been several
theoretical developments on this topic. The work in [37] provides hardness results for topology
discovery under various settings. Topology discovery under availability of different kinds of queries
have been previously considered, such as:
(i) Shortest-path query, where a query to a node returns all the shortest paths (i.e., list of nodes in
the path) from that node to all other nodes [38]. This is the strongest of all queries. These queries
can be implemented by using Traceroute on Internet.
In [38], the combinatorial-optimization
problem of selecting the smallest subset of nodes for such queries to estimate the network topology
is formulated. The work in [39] considers discovery of random graphs using such queries. The bias
of using traceroute sampling on power-law graphs is studied in [40], and weighted random walk
sampling is considered in [41].
(ii) Distance query, where a query to a node returns all the shortest-path distances (instead of the
complete list of nodes) from that node to any other node in the network [39]. These queries are
available for instance, in Peer-to-Peer networks through the Ping/Pong protocol. This problem
is related to the landmark placement, and the optimization problem of having smallest number
of landmarks is known as the metric dimension of the graph [42]. The work in [43] considers
reconstruction of tree topologies using shortest-path queries.
(iii) Edge-based queries: There are several types of edge queries such as detection query, which
answer whether there is an edge between two selected nodes, or counting query, which returns
number of edges in a selected subgraph [44,45], or a cross-additive query, which returns the number
of edges crossing between two disjoint sets of vertices [46].
However, all the above queries assume that all the nodes (with labels) are known a priori, and
that there are no hidden (unlabeled) nodes in the network. Moreover, most of the above works
4
consider unweighted graphs, which are not suitable when end-to-end delay (or other weighted)
information is available for topology discovery. As previously discussed, the above queries assume
extensive information is available from the queried objects, and this may not be feasible in many
networks.
Topology discovery using end-to-end delays between a subset of nodes (henceforth, referred
to as participating nodes), has been previously studied for tree topologies using unicast traffic
in [16,21,47] and multicast traffic [48]. The algorithms are inspired by phylogenetic tree algorithms.
See [49] for a thorough review. Most of these algorithms are based on a series of local tests known as
the quartet-based distance tests. Our algorithms are inspired by, and are based on quartet methods.
However, these algorithms were previously applied only to tree topologies, and here, we show how
algorithms based on similar ideas can provide accurate reconstruction for a much broader class of
locally-tree like graphs such as the sparse random graphs. Recent works also incorporate additional
information from temporal dynamics [50] or consider causal models for networks [51, 52], while our
work does not consider these effects.
2 System Model
Notation
For any two functions f (n), g(n), f (n) = O(g(n)) if there exists a constant M such that f (n) ≤
M g(n) for all n ≥ n0 for some fixed n0 ∈ N. Similarly, f (n) = Ω(g(n)) if there exists a constant M′
such that f (n) ≥ M′g(n) for all n ≥ n0 for some fixed n0 ∈ N, and f (n) = Θ(g(n)) if f (n) = Ω(g(n))
and f (n) = O(g(n)). Also, f (n) = o(g(n)) when f (n)/g(n) → 0 and f (n) = ω(g(n)) when
f (n)/g(n) → ∞ as n → ∞. We use notation O(g(n)) = O(g(n)poly log n). Let I[A] denote
indicator of an event A.
Let Gn denote a random graph with probability measure P. Let Q be a graph property (such
as being connected). We say that the property Q for a sequence of random graphs {Gn}n∈N holds
asymptotically almost surely (a.a.s.) if,
lim
n→∞
P(Gn satisfies Q) = 1.
Equivalently, the property Q holds for almost every (a.e.) graph Gn.
For a graph G, let C(l; G) denote the set of (generalized) cycles1 of length less than l in graph G.
For a vertex v, let Deg(v) denote its degree and for an edge e, let Deg(e) denote the total number
of edges connected to either of its endpoints (but not counting the edge e). Let BR(v) denote the
set of nodes within hop distance R from a node v and ΓR(v) is the set of nodes exactly at hop
distance R. The definition is extended to an edge, by considering union of sets of the endpoints of
edge. Denote the shortest path (with least number of hops) between two nodes i, j as Path(i, j; G)
and the second shortest path as Path2(i, j; G). Denote the number of H-subgraphs in G, i.e., the
number of subgraphs in G corresponding to H, as NH;G.
2.1 Random Graphs
We assume that the unknown network topology is drawn from the ensemble of Erdos-R´enyi random
graphs [18]. This random graph model is arguably the simplest as well the most well-studied model.
1A generalized cycle of length l is a connected graph of l nodes with l edges (i.e., can be a union of a path and a
cycle). In this paper, a cycle refers to a generalized cycle unless otherwise mentioned.
5
Denote the random graph as Gn ∈ G(n, c/n), for c < ∞, where n is the number of nodes and each
edge occurs uniformly with probability c/n. This implies a constant average degree of c for each
node, and this regime is also known as the "sparse" regime of random graphs.
It is well known that sparse random graphs exhibit a phase transition with respect to the
number of components. When c > 1, there is a giant component containing Θ(n) nodes, while all
the other components have size Θ(log n) [53, Ch. 11]. This regime is known as the super-critical
regime. On the other hand, when c < 1, there is no giant component and all components have size
Θ(log n). This regime is known as the sub-critical regime.
We consider discovery of a random graph in the super-critical regime (c > 1). This is the regime
of interest, since most real-world networks are well connected rather than having large number
of extremely small components. Moreover, the presence of a giant component ensures that the
topology can be discovered even with a small fraction of random participants. This is because the
participants will most likely belong the giant component, and can thus exchange messages between
each other to discover the unknown topology. We limit ourselves to the topology discovery of the
giant component in the random graph, and denote the giant component as Gn, unless otherwise
mentioned.
2.2 Participation Model
For the given unknown graph topology Gn = (Wn, En) over Wn = {1, . . . , n} nodes, let Vn ⊂ Wn be
the set of participating nodes which exchange messages amongst each other by routing them along
the graph. Let ρn := Vnn denote the fraction of participating nodes. It is desirable to have small
ρn and still reconstruct the unknown topology. We assume that the nodes decide to participate
uniformly at random. This ensures that information about all parts of the graph can be obtained,
thereby making graph reconstruction feasible. We consider the regime, where Vn = n1−ǫ, for some
ǫ > 0, meaning that extremely small number of nodes participate in discovering the topology.
Let Hn := Wn \ Vn be the set of hidden nodes. The hidden nodes only forward the messages
without altering them, and do not provide any additional information for topology discovery. The
presence of hidden nodes thus needs to be inferred, as part of our goal of discovering the unknown
graph topology.
2.3 Delay Model
The messages exchanged between the participating nodes experience delays along the links in the
route. The participating nodes measure the end-to-end delays2 between message transmissions and
receptions. We consider the challenging scenario that only this end-to-end delay information is
available for topology discovery.
Let m be the number of messages exchanged between each pair of participating nodes i, j ∈ Vn.
Denote the m samples of end-to-end delays computed from these messages as
Dm
i,j := [Di,j(1), Di,j (2), . . . , Di,j(m)]T .
We assume that the routes taken by the m messages are fixed, and we discuss the routing model
in the subsequent section. On the other hand, these messages experience different delays along
2Our algorithms work under any additive metric defined on the graph such as link utilization or link loss [16],
although the sample complexity, i.e., the number of samples required to accurately estimate the metrics, does indeed
depend on the metric under consideration.
6
each link3 which are drawn identically and independently (i.i.d) from some distribution, described
below.
Let De denote the random delay along a link e ∈ Gn (in either direction). We assume that the
delays De1 and De2 along any two links e1, e2 ∈ Gn are independent. The delays are additive along
any route, i.e., the end-to-end delay along a route R(i, j) between two participants i, j ∈ Vn is
DR(i,j) := Xe∈R(i,j)
De.
(1)
Further, the family of delay distributions are regular and bounded, as in [21].
The delay distributions {De}e∈En and the graph topology Gn are both unknown, and need to
be estimated using messages between participating nodes. We exploit the additivity assumption in
(1) to obtain efficient topology discovery algorithms.
2.4 Routing Model
The end-to-end delays between the participating nodes thus depends on the routes taken by the
messages. We assume that the messages between any two participants are routed along the shortest
path with the lowest number of hops. On the other hand, the nodes cannot select the path with
the least delay since the delays along the individual links are unknown and are also different for
different messages.
We also consider another scenario, where the participants are able to additionally route messages
along the second shortest path. This is a reasonable assumption, since in practice, nodes typically
maintain information about the shortest path and an alternative path, should the shortest path fail.
The nodes can forward messages along the shortest and the second shortest paths with different
headers, so that the destinations can distinguish the two messages and compute the end-to-end
delays along the two paths. We will show that this additional information vastly improves the
accuracy of topology discovery. These two scenarios are formally defined below.
Scenario 1 (Shortest Path Delays): Each pair of participating nodes i, j ∈ Vn exchange m
messages along the shortest path in Gn, where the shortest path4 is with respect to the number of
hops. Denote the vector of m end-to-end delays as Dm
i,j.
Scenario 2 (Shortest Path and Second Shortest Path Delays): Each pair of participating
nodes i, j ∈ Vn exchange m messages along the shortest path as well as m messages along the
i,j.
second shortest path. The vector of m samples along the second shortest path is denoted by eDm
3 Reconstruction Guarantees
3.1 Minimal Representation
Our goal is to discover the unknown graph topology using the end-to-end delay information between
the participating nodes. However, there can be multiple topologies which explain equally well the
end-to-end delays between the participants. This inherent ambiguity in topology discovery with
hidden nodes has been previously pointed out in the context of latent tree models [54].
3The independence assumption implies that we consider unicast traffic rather than multicast traffic considered in
many other works, e.g., in [48].
4If the shortest path between two nodes is not unique, assume that the node pairs randomly pick one of the paths
and use it for all the messages.
7
(a) A non-minimal graph
(b) Minimal representation
Figure 1: In the above figures, the shaded nodes are participants while the rest are hidden. In the
minimal representation of a graph, hidden nodes with degree two and less (the highlighted hidden
nodes) are merged with their neighbors. See Procedure 1 for details.
Procedure 1 Gn := Minimal(Gn; Vn) is the minimal representation of Gn′ given set of participating
nodes Vn.
Input: Graph Gn′, set of participating nodes Vn, and set of hidden nodes Hn.
Initialize Gn = Gn, n ← n′.
while ∃h ∈ Gn ∩ Hn with Deg(h) ≤ 2 do
Remove h from Gn if Deg(h) ≤ 1.
Contract all h with Deg(h) = 2 in Gn.
Decrement n accordingly.
end while
There is an equivalence class of topologies with different sets of hidden nodes which generate
the same end-to-end delay distributions between the participating nodes. We refer to the topology
with the least number of hidden nodes in this equivalence class as the minimal representation. Such
a minimal representation does not have redundant hidden nodes. For example, in Fig.1, the graph
and its minimal representation are shown. In Procedure 1, we characterize the relationship between
a graph and its minimal representation, given a set of participants. The minimal representation
is obtained by iteratively removing redundant hidden nodes (degree two and less) from the graph,
i.e., in the first iteration, redundant hidden nodes are removed and the resulting graph is again
inspected for the presence of hidden nodes. For example, in Fig.1, the highlighted hidden nodes
are redundant and are thus merged with their neighbors to obtain the minimal representation.
Any algorithm can only reconstruct the unknown topology up to its minimal representation us-
ing only end-to-end delay information between the participating nodes. In sparse random graphs,
only a small (but a linear) number of nodes are removed in the minimal representation, and this
number decreases with the average degree c. It thus suffices to reconstruct the minimal represen-
tation of the original topology, and our goal is to accomplish it using small fraction of participants.
We assume that the delay distributions on the edges of the minimal representation {De}e∈ eGn
have
bounded variances {l(e)}e∈ eGn
satisfying
0 < f ≤ l(e) ≤ g < ∞,
∀ e ∈ eGn.
(2)
8
3.2 Performance Measures
We now define performance measures for topology discovery algorithms. It is desirable to have an
algorithm which outputs a graph structure which is close to the original graph structure. However,
the reconstructed graph cannot be directly compared with the original graph since the hidden nodes
introduced in the reconstructed graph are unlabeled and may correspond to different hidden nodes
in the original graph. To this end, we require the notion of edit distance defined below.
Definition 1 (Edit Distance) Let F, G be two graphs5 with adjacency matrices AF , AG, and let
V be the set of labeled vertices in both the graphs (with identical labels). Then the edit distance
between F, G is defined as
∆(F, G; V ) := min
π AF − π(AG)1,
where π is any permutation on the unlabeled nodes while keeping the labeled nodes fixed.
In other words, the edit distance is the minimum number of entries that are different in AF and in
any permutation of AG over the unlabeled nodes. In our context, the labeled nodes correspond to
the participating nodes while the unlabeled nodes correspond to hidden nodes.
Our goal is to output a graph with small edit distance with respect to the minimal representation
of the original graph. Ideally, we would like the edit distance to decay as we obtain more delay
samples and this is the notion of consistency.
tent if it asymptotically recovers the minimal representation of the unknown topology, i.e.,
Definition 2 (Consistency) Denote bGn({Dm
ples between the participating nodes Vn. A graph estimator bGn({Dm
i,j}i,j∈Vn), Gn; Vn) > 0] = 0.
P[∆(bG({Dm
lim
m→∞
i,j}i,j∈Vn) as the estimated graph using m delay sam-
i,j}i,j∈Vn) is structurally consis-
The above definition assumes that the network size n is fixed while the number of samples m
goes to infinity. A more challenging setting where both the network size and the number of samples
grow is known as the setting of high-dimensional inference [17]. In this setting, we are interested in
estimating large network structures using a small number of delay samples. We will consider this
setting for topology discovery in this paper. Indeed in practice, we have large network structures
but can obtain only few end-to-end delay samples with respect to the size of the network. This is
formalized using the notion of sample complexity defined below for our setting.
(3)
Definition 3 (Sample Complexity) If the number of samples is m = Ω(f (n)), for some func-
tion f , such that the estimator bGn({Dm
P[∆(bG({Dm
m,n→∞
m=Ω(f (n))
lim
i,j}i,j∈Vn) satisfies
i,j}i,j∈Vn), Gn; Vn) = O(g(n))] = 0,
for some function g(n), then the estimator bGn is said to have sample complexity of Ω(f (n)) for
achieving an edit distance of O(g(n)).
Thus, our goal is to discover topology in high-dimensional regime, and design a graph estimator
that requires a small number of delay samples, and output a graph with a small edit distance.
5We consider inexact graph matching where the unlabeled nodes can be unmatched. This is done by adding
required number of isolated unlabeled nodes in the other graph, and considering the modified adjacency matrices [55].
9
4 Preliminaries
We now discuss some simple concepts which will be incorporated into our topology discovery
algorithms.
4.1 Delay Variance Estimation
In our setting, topology discovery is based on the end-to-end delays between the participating
nodes. Recall that in Section 2.3, we assume general delay distributions on the edges with bounded
variances. Our topology discovery algorithms will be based solely on the estimated variances using
the end-to-end delay samples.
We use the standard unbiased estimator for variances [56].
where ¯Dm
i,j is the sample mean delay
blm(i, j) :=
1
m − 1
mXk=1
(Di,j(k) − ¯Dm
i,j)2,
¯Dm
i,j :=
1
m
mXk=1
Di,j(k).
(4)
(5)
Note that we do not use an estimator specifically tailored for a parametric delay distribution, and
hence, the above estimator yields unbiased estimates for any delay distribution.
Our proposed algorithms for topology discovery require only the estimated delay variances
{bl(i, j)}i,j∈V as inputs. Indeed, more information is available in the delay samples Dm. For instance,
in [21], the higher-order moments of the delay distribution are estimated using the delay samples
and this provides an estimate for the delay distribution. However, we see that for our goal of
topology discovery, the estimated end-to-end delay variances suffice and yield good performance.
Recall that {l(i, j)}i,j∈V denotes the true end-to-end delay variances and that from (1), the
variances are additive along any path in the graph. We will henceforth refer to the variances
as "distances" between the nodes and the estimated variances as "estimated distances". This
abstraction also implies that our algorithms will work under input of estimates of any additive
metrics.
4.2 Quartet Tests
We first recap the so-called quartet tests, which are building blocks of many algorithms for dis-
covering phylogenetic-tree topologies with hidden nodes [54, 57–59]. The definition of a quartet is
given below. See Fig.2.
Definition 4 (Quartet or Four-Point Condition) The pairwise distances {l(i, j)}i,j∈{a,b,u,v} for
the configuration in Fig.2 satisfy
l(a, u) + l(b, v) = l(b, u) + l(a, v),
(6)
and the configuration is denoted by Q(abuv).
10
PSfrag replacements
a
a
b
h1
h2
u
v
Figure 2: Quartet Q(abuv). See (6) and (8).
In the literature on tree reconstruction, instead of (6), an inequality test is usually employed
since it is more robust, given by,
l(a, b) + l(u, v) < min(l(a, u) + l(b, v), l(b, u) + l(a, v)).
(7)
However, we use the equality test in (6), since it is also useful in detecting cycles present in random
graphs.
In practice, we only have access to distance estimates and we relax the equality constraint in
(6) to a threshold test, and this is known as the quartet test. Thus, the quartet test is local test
between tuples of four nodes. For the quartet Q = (abuv), let e denote the middle edge of the
quartet6, i.e., the edge which joins a vertex on the shortest path between a and b to a vertex on
the shortest path between u and v (Note that the edge can have zero length if the hidden nodes
connecting a, b and u, v are the same.). The estimated length of the middle edge (h1, h2) between
hidden nodes h1 and h2 is given by
2bl(h1, h2) =bl(a, u) +bl(b, v) −bl(a, b) −bl(u, v).
(8)
Similarly, all other edge lengths of the quartet can be calculated through the set of linear equations
which are based on the fact that the end-to-end lengths in a quartet are the sum of edge lengths
along the respective paths.
Many phylogenetic-tree reconstruction algorithms proceed by iteratively merging quartets to
obtain a tree topology. See [60] for details. We employ the quartet test for random graph discovery
but it additionally incorporates the presence of cycles. Moreover, we introduce modifications under
scenario 2, as outlined in Section 5.2, where second shortest path distances are available in addition
to the shortest path distances between the participating nodes.
5 Proposed Algorithms
5.1 Scenario 1
We propose the algorithm RGD1 for discovering random graphs under scenario 1, as outlined in
Section 2.4, where only shortest path distance estimates are available between the participating
nodes. The idea behind RGD1 is similar to the classical phylogenetic-tree reconstruction algorithms
based on quartet tests [54, 58]. However, the effect of cycles on such tests needs to analyzed, and
is carried out in Section 6.1. The algorithm is summarized in Algorithm 2.
6Such a middle edge always exists, by allowing for zero length edges, and such trivial edges are contracted later
in the algorithm.
11
The algorithm recursively runs the quartet tests over the set of participating nodes. The
algorithm limits to testing only "short quartets" between nearby participating nodes. Intuitively,
this is done to avoid testing quartets on short cycles, since in such scenarios, the quartet tests may
fail to reconstruct the graph accurately. Since the random graphs are locally-tree like and contain a
small number of short cycles, limiting to short quartets enables us to avoid most of the cycles. The
idea of short quartets has been used before (e.g.
in [58]) but for a different goal of obtaining low
sample complexity algorithm for phylogenetic-tree reconstruction. We carry out a detailed analysis
on the effect of cycles on quartet tests in Section 6.1.
In algorithm RGD1, we consider short quartets, where all the estimated distances between the
quartet end points are at most Rg + τ , where g is the upper bound on the (exact) edge lengths in
the original graph, as assumed in (2). Thus, R′ := Rg/f is the maximum number of hops between
the end points of a short quartet, where f is the lower bound on the edge lengths. We refer to
R′ as the diameter of the quartet. This needs to be chosen carefully to balance the following two
events: encountering short cycles and ensuring that most hidden edges (with at least one hidden
end point) are part of short quartets. The parameter τ is chosen to relax the bound, since we have
distance estimates, computed using samples, rather than exact distances between the participating
nodes. The short quartets are listed in arbitrary order in Q.
The algorithm attempts to merge the quartets in Q, one at a time, with the previously con-
needs to be done in such a scenario; or the quartet may be merged without creating new cycles.
merge Q(abuv), additional testing needs to be carried out. Firstly, if it is a short cycle (of length
less than 2Rg + τ ), then the algorithm cannot be guaranteed to merge Q(abuv) accurately and it is
listed as a bad quartet. Secondly, if it is not a short cycle, the algorithm needs to infer the joining
structed graph bGn using procedure QuartetMerge. There are different possibilities during this
process. The quartet under consideration, say Q(abuv), may be already satisfied in bGn: nothing
This is carried out using procedure TreeMerge. Alternatively, if a cycle needs to be created in bGn to
points between the existing paths in bGn and the new path to be created. This is carried out using
quartets in W without creating new cycles in bGn, and then attempts to merge Q(abuv) by using
existing hidden nodes in the paths to create a new (long) cycle and checking if it conflicts with the
distances on quartets in W. There is a tolerance of ǫ′ for checking distance conflicts. In the end,
any edge smaller than a threshold ǫ are contracted, for some chosen constant ǫ < f , where f is the
lower bound on the edge lengths of the original graph.
procedure CycleMerge and entails the presence of "witnesses" W ⊂ Q, which are (remaining) short
quartets whose nodes are within distance 2R from a, b, u, v. The algorithm attempts to merge the
The quartets that fail to be merged using the above procedure are listed as bad quartets.
These set of quartets cannot be guaranteed to be merged accurately. Any post-processing heuristic
can be used to attempt the merging of these bad quartets. Our analysis accounts for these bad
quartets towards contributing to the edit distance between the reconstructed graph and the minimal
representation of the original graph. The above algorithm is similar in spirit to quartet merging
algorithm proposed in [58], but with the crucial addition of CycleMerge procedure to handle the
presence of cycles.
5.2 Scenario 2
We now consider scenario 2, as outlined in Section 2.4, where second shortest path distance esti-
mates are available in addition to shortest path distance estimates between the participating nodes.
We propose RGD2 algorithm for this case, which is summarized in Algorithm 3.
12
tance Estimates.
edge lengths and parameters R, τ, ǫ, ǫ′ > 0.
Initialize list of short quartets: Q = {Q(abuv) : max
Algorithm 2 RGD1({bl(i, j)}i,j∈Vn ; R, g, τ, ǫ, ǫ′) for Topology Discovery Using Shortest-Path Dis-
Input: Distance estimates between the participating nodes {bl(i, j)}i,j∈Vn , upper bound g on exact
i,j∈{a,b,u,v}bl(i, j) < Rg + τ}, list of bad quartets
Qbad = ∅ and reconstructed graph bGn = (Vn,∅).
[bGn, Fail] ← QuartetMerge(bGn, Q(abuv),Q,{bl(i, j)}i,j∈Vn ; ǫ, ǫ′).
while Q 6= ∅ do
Q(abuv) ← Pop(Q).
Q ← Q \ {Q(abuv)}.
if Fail then
Qbad ← Qbad ∪ {Q(abuv)}.
end if
end while
Use any heuristic to merge bad quartets in Qbad.
The algorithm RGD2 is an extension of RGD1, where we use the second shortest distances
in the quartet tests, in addition to the shortest distances. For each tuple of participating nodes
a, b, u, v ∈ Vn, the quartet test in (6) is carried out for all possible combinations of shortest and
second shortest distances; only short quartets are retained, where all the distances used for quartet
test are less than the specified threshold (which is the same as in RGD1). If the same quartet is
formed using different combinations of shortest and second shortest distances, only the quartet with
the shorter middle edge, computed using (8), is retained. We clarify the reason behind this rule
and give examples on when this can occur in Section 6.1. As before, all these quartets are merged
with previously constructed graph using procedure QuartetMerge, but with a minor difference that
the path lengths need to be checked since there may be multiple paths between participating nodes
with different lengths. The performance analysis for RGD2 is carried out in Section 6.3.
6 Analysis Under Exact Distances
We now undertake performance analysis for the proposed topology discovery algorithms RGD1 and
RGD2. In this section, for simplicity, we first analyze the performance assuming that exact distances
between the participating nodes are input to the algorithms. Analysis when distance estimates are
input to the algorithms is considered in Section 7.
6.1 Effect of Cycles on Quartet Tests
We now analyze the effect of cycles on quartet tests. Recall that the quartet test is the inequality
test in (6), and if this inequality test is satisfied, internal edge lengths of the quartet are computed,
and they are added to the output using procedure QuartetMerge. The quartet test in (6) is based
on the assumption that the shortest paths between the four nodes {a, b, u, v} in the quartet are
along the paths on the quartet.
Thus, the outcome of the quartet test is incorrect only when some shortest path between
{a, b, u, v} is outside the quartet. We refer to such quartets as "bad quartets". There are two
13
and Second Shortest-Path Distance Estimates.
bound g on exact edge lengths and parameters R, τ, ǫ, ǫ′ > 0.
Initialize list of short quartets: Q = {Q(abuv) : max
Algorithm 3 RGD2({bl(i, j),bl2(i, j)}i,j∈Vn ; R, g, τ, ǫ, ǫ′) for Topology Discovery Using Shortest-Path
Input: Shortest-path and second shortest-path distance estimates {bl(i, j),bl2(i, j)}i,j∈Vn upper
i,j∈{a,b,u,v}bl(i, j) < Rg + τ}, list of bad quartets
Qbad = ∅ and reconstructed graph bGn = (Vn,∅).
[bGn, Fail] ← QuartetMerge(bGn, Q(abuv),Q,{bl(i, j),bl2(i, j)}i,j∈Vn ; ǫ, ǫ′).
while Q 6= ∅ do
Q(abuv) ← Pop(Q).
Q ← Q \ {Q(abuv)}.
if Fail then
Qbad ← Qbad ∪ {Q(abuv)}.
end if
PSfrag replacements
a
end while
Use any heuristic to merge bad quartets in Qbad.
a
b
w
h3h4
h1
u
y
h2
x
z
v
CycleMerge Procedure. In order to create a new path between h1 and h2 (shown using dotted lines
according to length specified by quartet Q(abuv)), the quartet Q(wxyz) is used as a witness to
Figure 3: An example on the use of witnesses for creating new paths in the existing graph bG in
verify if h3 and h4 are the joining points of the existing path in bG with the new path.
possible outcomes for bad quartets (a) the procedure QuartetMerge detects inconsistencies in the
set of linear equations, used to compute the internal distances in the quartet, and does not merge
the quartet, or (b) the procedure QuartetMerge does not detect inconsistencies, and thus merges a
fake quartet with wrong internal edge lengths. Both these outcomes result in reconstruction error.
The examples of both the cases are given in Fig.5. Note that the set of linear equations used
by the procedure QuartetMerge for computing the internal edge-lengths in the quartet consist of
5 variables and 6 equations (corresponding to the 6 known edge-lengths between the quartet end-
points). Additionally, there is an equality constraint that l(a, u)+l(b, v) = l(a, v)+l(b, u). The case
in Fig.5a does not satisfy this equality constraint7, since the cycle is in the middle of the quartet,
and thus the procedure QuartetMerge does not merge this quartet. On the other hand, for the case
in Fig.5b, the equality constraint is satisfied, since the cycle is on the same side of the quartet,
and in this case, the procedure QuartetMerge merges the quartet, but with wrong edge lengths, as
shown in Fig.5c.
Thus, bad quartets lead to reconstruction error. The number of bad quartets can be bounded
7There exist pathological cases of equal distances where configurations of the form in Fig.5a will satisfy equality
constraint. Such scenarios do not occur in a.e. random graph.
14
path lengths.
Fail ← False.
Procedure 4 QuartetMerge(bGn, Q(abuv)),Q,{bl(i, j), [bl2(i, j)]}i,j∈Vn ; ǫ, ǫ′) for merging a new quar-
tet Q(abuv) with current structure bGn.
Input: Current graph bG, candidate quartet Q(abuv), remaining short quartets Q, shortest dis-
tance estimates between the participating nodes {bl(i, j)}i,j∈Vn and optionally second shortest
distances {bl2(i, j)}i,j∈Vn , threshold ǫ for contracting short edges and tolerance ǫ′ for comparing
if For each i, j ∈ {a, b, u, v}, bl(i, j; bG) −bl(i, j; Q) < ǫ′ (All paths already present in bG) then
else if For each i, j ∈ {a, b, u, v}, either bl(i, j; bG) −bl(i, j; Q) < ǫ′ orbl(i, j; bG) = ∞ (Either the
paths agree or the path does not exist in bG) then
bGn ← TreeMerge(bGn, Q(abuv), ǫ′), Fail ← False. (Merge quartet without creating cycles).
else if ∃ i, j ∈ {a, b, u, v} such thatbl(i, j; bG) +bl(i, j; Q) < 2Rg + τ (A merge would create a short
if Second shortest distances {bl2(i, j)}i,j∈Vn , are available then
Use second shortest distances between a, b, u, v to infer the join points in bG. If the points
are consistently found, add quartet Q(abuv) to bG and output Fail ← False. Else output
Fail ← True. (Report failure due to inconsistent distances).
Fail ← True. (Report failure due to presence of a short cycle).
cycle) then
else
end if
else
[bGn, Fail] ← CycleMerge(bGn, Q(abuv),Q,{bl(i, j), [bl2(i, j)]}i,j∈Vn , [{bl2(i, j)}i,j∈Vn ]; ǫ′). (Attempt
to merge quartet by creating a new long cycle and querying witnesses, if no witnesses are
present, create a new path, else if witnesses are contradictory output fail).
end if
Contract any edge (with at least one hidden end point) with length < ǫ.
as follows:
in a bad quartet, the middle edge of the quartet is part of a (generalized) cycle of
length less than 2R′, where R′ := Rg/f is the maximum number of hops between the endpoints of
a short quartet, as discussed in Section 5.1. In addition, the bad quartets also affect the merging
of quartets using CycleMerge procedure when they are called upon to serve as witnesses. Thus, we
also need to consider quartets which are part of slightly longer cycles. See Appendix B for details.
The number of such bad quartets can be bounded for random graphs leading to reconstruction
guarantees for RGD1 algorithm.
For the RGD2 algorithm where second shortest path distances are additionally available, bad
quartets do not adversely affect performance. We argue that a quartet is correctly recognized as
long as the paths on the quartet correspond to either the shortest or the second shortest paths
(between the quartet endpoints).
In such a scenario, some combination of shortest and second
shortest path distances exists which accurately reconstructs the quartet and the RGD2 algorithm
finds all such combinations. Moreover, fake quartets are detected since they produce a longer
middle edge than the true quartet. This is because the cycle shortens the distance between end
points on its side (in Fig.5b, this corresponds to {a, b} and note that the middle edge in Fig.5c is
longer than the true edge length).
Thus, a quartet is correctly reconstructed under RGD2 when the paths on the quartet consist of
15
without creating cycles.
Assign h as h2.
end if
Assign h as h1.
end if
tolerance ǫ′ for comparing path lengths.
Procedure 5 TreeMerge(bGn, Q(abuv)); ǫ′) for merging a new quartet with current structure bGn
Input: Current graph bG, candidate quartet Q(abuv) with hidden nodes h1, h2 (See Fig.2), and
if There exists hidden node in bG such that bl(i, h; bG) −bl(i, h1; Q) < ǫ′ for i = a, b then
if There exists hidden node in bG such that bl(i, h; bG) −bl(i, h2; Q) < ǫ′ for i = u, v then
Connect paths in bG according to Q which are missing as follows:
If both h1 and h2 are assigned in bG, connect h1 and h2 in bG and assign lengthbl(h1, h2; Q) if they
are not already connected in bG.
If say h1 is assigned and the path between a and h1 exists in bG but not between b and h1, let
l ← minw 0.5(bl(w, b) +bl(h1, b; Q) −bl(h1, w; bG) over all w ∈ bG such that bl(w, b) < Rg + τ .
l <bl(h1, b; Q), split pathbl(h1, w; bG), add new hidden node h3 such thatbl(h3, w; bG) =bl(b, w) − l
the lengths in Q. Otherwise, also add new paths to bG.
and attach b to h3 with length l; otherwise create a new path between h1 and b. Similarly split
the other paths if present or create new paths.
If the paths exist but not the hidden nodes, split the paths and add hidden nodes according to
PSfrag replacements
a
If
a
u
h1
h2
b
v
Figure 4: A bad quartet: l(a, b) < l(a, h1) + l(b, h1). Since the maximum number of hops between
{a, b, u, v} is R′ := Rg/f , and one of the shortest paths is not along the quartet, the middle edge
(h1, h2) is part of a generalized cycle of (hop) length less than 2R′. Such quartets are detected by
the RGD1 algorithm.
shortest or second shortest paths. We finally use the locally tree-like property of random graphs to
establish that this occurs in almost every graph if the quartet diameter R′ is small enough. Thus,
we obtain stronger reconstruction guarantees for RGD2 algorithm.
6.2 Analysis of RGD1
We now provide edit distance guarantees for RGD1 under appropriate choice of maximum quartet
diameter R′ := Rg/f . We analyze the edit distance by counting the number of hidden edges (with
at least one hidden end point) which are not recovered correctly under RGD1. A hidden edge is not
recovered when one of the following two events occur: (a) it is not part of a short quartet (b) it is
part of a bad short quartet. A large value of the quartet diameter R′ decreases the likelihood of
event (a), while it increases the likelihood of event (b), i.e., we are likely to encounter more cycles
as R′ is increased. For a fixed value of R′, we analyze the likelihood of these two events and obtain
16
using short quartets "near" to a, b, u, v. Also use second shortest distances if available and they
are less than 2Rg + τ ).
for Each Q(wxyz) ∈ W do
Procedure 6 CycleMerge(bGn, Q(abuv)),Q,{bl(i, j)}i,j∈Vn ; ǫ′) for merging a new quartet with cur-
rent structure bGn by creating cycles.
Input: Current graph bG, candidate quartet Q(abuv) with hidden nodes h1, h2 (See Fig.2), re-
maining short quartets Q, shortest distance estimates {bl(i, j)}i,j∈Vn and optionally second short-
est distance estimates {bl2(i, j)}i,j∈Vn and tolerance ǫ′ for comparing path lengths.
W ← {Q(ijkl) : Q(ijkl) ∈ Q,∪x,y∈{i,j,k,l,a,b,u,v}bl(x, y) < 2Rg + τ}. (Find potential witnesses by
if For i, j ∈ {w, x, y, z}, either bl(i, j; bG) −bl(i, j; Q) < ǫ′ orbl(i, j; bG) = ∞ (Either the paths
agree in the two graphs or the path does not exist in bG) then
bGn ← TreeMerge(bGn, Q(wxyz), ǫ′), Fail ← False. (Merge all quartets in W which do not
To create new paths in bG according to Q(abuv), consider all hidden nodes on paths in bG as
If the witnesses are absent or contradictory, output Fail ← True. Else, add the new path to bG
candidates for positions where the paths split. Query the quartet corresponding to these hidden
nodes for verification. (See Fig.3 for an example).
create cycles).
end if
end for
and output Fail ← False.
the bound on edit distance stated below.
Assume that the algorithm RGD1 chooses parameter R as
where
Rmin ≤ R ≤ Rmax,
Rmin := 2
log 9 log n
(√c−1)2
log 3
, Rmax :=
6 log n
5 log c
.
Let the fraction of participating nodes be ρn = n−β, such that
implying that γ > 2β, where
Similarly, define µ as
R−Rmin
2
ρnc
= ω(1),
γ :=
log c
log n
(R − Rmin).
µ := R
log c
ξ(c)
log n
,
(9)
(10)
(11)
(12)
(13)
where ξ(c) is a function that depends on the average degree c of the original Erdos-R´enyi random
graph, and is given by
ξ(c) := 1 − e−c − ce−c − 0.5c2e−c.
(14)
Recall that f and g are the bounds on edge lengths according to (2). We have the following result.
17
PSfrag replacements
PSfrag replacements
a
a
PSfrag replacements
a
a
b
h1
h2
u
v
a
b
h1
h2
u
v
a
1.5
h1
1.5
b
h2
1.5
u
1
1
v
(a) Bad Quartet Where Test Fails.
(b) Bad Quartet Where Test Suc-
ceeds.
(c) Reconstructed Quartet for (b).
Figure 5: Two possible outcomes for bad quartets in (a) and (b). Assume all unit-length edges.
In (a), the procedure QuartetMerge fails and quartet is not declared, while in (b), it succeeds but
leads to wrong edge estimates, as shown in (c).
Theorem 1 (Edit Distance Under RGD1) The algorithm RGD1 recovers the minimal represen-
tation eGn of the giant component of a.e. graph Gn ∼ G(n, c/n) with edit distance
∆(bGn,eGn; Vn) = O(n5µg/f−4β).
(15)
Remarks:
(i) Thus, an edit-distance guarantee can be provided under RGD1 when the parameter R is chosen
according to the constraints mentioned above. A sufficient condition to achieve a sub-linear edit
distance above under homogeneous edge lengths (f = g) is when
10β(1 + δ)
log c
ξ(c)
log c − 4β < 1,
(16)
for some constant δ > 0. When c → ∞, we have ξ(c) → 1 and in this regime, we have that β < 1/6.
5
In other words, approximately n
6 nodes need to participate to achieve a sub-linear edit distance
under RGD1.
(ii) When the ratio of the bounds on the edge lengths g/f is small (i.e., the edge lengths are nearly
homogeneous), the edit-distance guarantee in (15) improves, for a fixed ρ. This is because we can
control the hop lengths of the selected quartets more effectively in this case.
(iii) The dominant event leading to the edit-distance bound in (15) is the presence of bad quartets
due to short cycles in the random graph. In subsequent section, we show that RGD2 algorithm
effectively handles this event using the second shortest path distances.
Proof Ideas:
The proof is based on the error events that can cause the quartet tests to fail. The first error
event is that an edge which does not occur as a middle edge of a short quartet, meaning that there
are not enough participating nodes within distance R/2 from it. The second error event is that an
edge occurs as a middle edge of a bad quartet, meaning that it is close to a short cycle or it has bad
quartets as witnesses. We analyze the probability of these events and the resulting edit distance
due to these events.
6.3 Analysis of RGD2
We now provide edit distance guarantees for RGD2 algorithm. The analysis is on the lines of the
previous section, but we instead analyze the presence of overlapping cycles, as noted in Section 6.1.
18
There are no overlapping short cycles in a random graph, and thus, we can provide a much stronger
reconstruction guarantee for the RGD2 algorithm, compared to the RGD1 algorithm. We have the
following result.
Theorem 2 (Edit Distance Under RGD2) Under the assumptions of Theorem 1, the algorithm
RGD2 recovers the minimal representation eGn of the giant component of a.e. graph Gn ∼ G(n, c/n)
with edit distance
The above result immediately implies that consistent recovery of the minimal representation is
possible when there are enough number of participating nodes. We state the result formally below.
∆(bGn,eGn; Vn) = O(n8µg/f−4β−1).
(17)
Corollary 1 (Consistency Under RGD2) The algorithm RGD2 consistently recovers the mini-
mal representation Gn of the giant component of a.e. graph Gn ∼ G(n, c/n), when the parameter
R and the fraction of participating nodes ρ satisfy
or equivalently
f
ξ(c)(cid:19) 8Rg
(cid:18) c
ρ4 = o(n),
R−Rmin
2
c
ρ = ω(1),
8µg
f − 4β < 1,
γ > 2β.
Remarks:
(i) From the above constraints, we see that consistent topology recovery is feasible. Thus, for
homogeneous edge lengths (f = g), as c → ∞ and the number of participants is more than n11/12,
RGD2 consistently recovers the topology. Thus, a sub-linear number of participants suffice to
recover the minimal representation consistently.
(ii) Thus, the availability of second shortest distances makes consistent topology discovery possible
with a sub-linear number of participating nodes, while consistent recovery is not tractable under
RGD1 using only shortest-path distances between a sub-linear number of participants.
Proof Ideas:
The proof is on similar lines as in Theorem 1, but with modified error events that cause the
quartet tests to fail. As before, the first error event is that an edge which does not occur as a middle
edge of a short quartet. The second error event is now that an edge is close to two overlapping
short cycles instead of being close to a single short cycle. This event does not occur in random
graphs for sufficiently short lengths, and thus, we see a drastic improvement in edit distance.
7 Analysis Under Samples
We have so far analyzed the performance of RGD1 and RGD2 algorithms when exact distances (i.e.,
delay variances) are input to the algorithm. We now analyze the scenario when instead only delay
samples are available and estimated variances are input to the algorithm.
We show that the proposed algorithms have low sample complexity, meaning they require slow
scaling of number of samples compared to the network size to achieved guaranteed performance.
The result is given below.
19
Theorem 3 (Sample Complexity) The edit distance guarantees under RGD1 and RGD2 algo-
rithms, as stated in Theorem 1 and Theorem 2, are achieved under input of estimated delay vari-
ances, if the number of delay samples satisfies
m = Ω(poly(log n)).
(18)
Thus, the sample complexity of RGD1 and RGD2 algorithms is poly(log n).
In other words,
the size of the network n can grow much faster than the number of delay samples m, and we can
still obtain good estimates of the network. This implies with m = Ω(poly(log n)) samples, we can
consistently discover the topology under RGD2 algorithm, given sufficient fraction of participating
nodes.
Proof Ideas:
The proof follows from Azuma-Hoeffding inequality for concentration of individual variance
estimates, as in [21, Proposition 1], and then consider the union bound over various events.
8 Converse Results & Discussion
8.1 Fraction of Participating Nodes
We have so far provided edit distance guarantees for the proposed topology discovery algorithms.
In this section, we provide a lower bound on the fraction of participating nodes required for any
algorithm to recover the original graph up to a certain edit distance guarantee.
We can obtain a meaningful lower bound only when the specified edit distance is lower than
the edit distance between a given graph and an independent realizations of the random graph.
Otherwise, the edit distance guarantee could be realized by a random construction of the output
graph. To this end, we first prove a lower bound on the edit distance between any fixed graph and
an independent realization of the random graph.
Let D(G; δ) denote the set of all graphs which have edit distance of at most δ from G
D(G; δ) := {F : ∆(F, G;∅) < δ}.
(19)
Lemma 1 (Lower Bound on Edit Distance) Almost every random graph Gn ∼ G(n, c/n) has
an edit distance at least (0.5c − 1)n from any given graph Fn.
Proof:
First, we have for any graph Fn
edges and the size of B is
and we use the bound that(cid:0)N
since we can permute the n vertices and change at most δn entries in the adjacency matrix AF
k )k3k. Let B denote the set of graphs having exactly cn
2(cid:19) ≥ (
)cn/2 = (
)cn/2.
n
c
We can now bound the probability that a random graph Gn ∼ G(n, c/n) belongs to set D(Fn; δn)
for any given graph Fn is
(20)
2
2
δn(cid:19) < n(δ+1)n3δn,
D(Fn; δn) ≤ n! ·(cid:18) n2
k(cid:1) ≤ N k
k! ≤ ( N
B =(cid:18) n2
n2
cn
2
cn
P[Gn ∈ D(Fn; δn)] ≤
P[Gn ∈ D(Fn; δn)]
P[Gn ∈ B]
20
D(Fn; δn) max
g∈D(Fn;δn)
P[Gn = g]
≤
B min
g∈B
≤ D(Fn; δn)
(a)
B
P[Gn = g]
= n(δ+1−c/2)n3δn,
where inequality (a) is due to the fact that ming∈B P[Gn = g] ≥ maxg∈S(Fn) P[Gn = g] (i.e., the
mode of the binomial distribution). Hence, P[Gn ∈ D(Fn; δn)] decays to zero as n → ∞, when
δ < 0.5c − 1.
Thus, for any given graph, a random graph does not have edit distance less than (0.5c−1)n from
it. It is thus reasonable to expect for any graph reconstruction algorithm to achieve an edit distance
less than (0.5c − 1)n, since otherwise, a random choice of the output graph could achieve the same
edit distance. We now provide a lower bound on the fraction of the participating nodes such that
no algorithm can reconstruct the original graph up to an edit distance less than (0.5c − 1)n.
Theorem 4 (Lower Bound) For Gn ∼ G(n, c/n) and any set of participants Vn, for any graph
estimator bGn using (exact) shortest path distances between the participating node pairs, we have
✷
P[∆(bGn, Gn; V ) > δn] → 1, when
V 2 < M n(0.5c − δ − 1)
log log n
log n
,
(21)
for a small enough constant M > 0 and any δ < (0.5c − 1).
Thus, no algorithm can reconstruct Gn up to edit distance δn, for δ < 0.5c− 1, if the number of
participating nodes is below a certain threshold. From Lemma 1, almost every random graph has an
edit distance greater than (0.5c − 1)n from a given graph. Thus, when the number of participating
nodes is below a certain threshold, accurate reconstruction by any algorithm is impossible.
Remarks:
(i) The lower bound does not require that the participating nodes are chosen uniformly and holds
for any set of participating nodes of given cardinality.
(ii) The lower bound is analogous to a strong converse in information theory [61] since it says that
the probability of edit distance being more a certain quantity goes to one (not just bounded away
from zero).
(iii) The result is valid even for the scenario where second shortest path distances are used since
the maximum second shortest path distance is also O(log n).
(iv) We have earlier shown that our algorithms RGD1 and RGD2 have good performance under a
sub-linear number of participants. Closing the gaps in the exponents between lower bound and
achievability is of interest.
Proof Ideas:
The proof is based on information-theoretic covering type argument, where cover the range of
the estimator with random graphs of high likelihood. Using bounds on binomial distribution, we
obtain the desired lower bound.
8.2 Non-Identifiability of General Topologies
Our proposed algorithms require the knowledge of shortest and second shortest path distances.
Performance analysis reveals that the knowledge of second shortest path can greatly improve the
21
PSfrag replacements
a
h1
h2
a
u
b
v
w
PSfrag replacements
h1
h2
a
u
b
v
w
Figure 6: Example of two graphs with unit lengths where nodes a, b, u, v, w are participating.
Even under all path length information between the participating nodes, the two graphs cannot be
distinguished.
accuracy of topology discovery for random graphs. We now address the question if this can be
accomplished in general.
To this end, we provide a counter-example in Fig.6, where a significant fraction of nodes are par-
ticipating, and we are given distances along all the paths between the participants; yet, the topology
cannot be correctly identified by any algorithm. This reveals a fundamental non-identifiability of
general topologies using only a subset of participating nodes.
8.3 Relationship to Phylogenetic Trees
We note some key differences between the phylogenetic-tree model [49] and the additive delay model
employed in this paper. In phylogenetic trees, sequences of extant species are available, and the
unknown phylogenetic tree is to be inferred from these sequences. The phylogenetic-tree models
the series of mutations occurring as the tree progresses and new species are formed. Efficient
algorithms with low sample complexity have been proposed for phylogenetic-tree reconstruction,
e.g., in [58, 62].
In the phylogenetic-tree model, the correlations along the phylogenetic tree decay exponentially
with the number of hops. This implies that long-range correlations (between nodes which are
far away) are "hard" to estimate, and require large number of samples (compared to the size of
the tree) to find an accurate estimate. However, under the delay model, the delays are additive
along the edges, and even long-range delays can be shown to be "easy" to estimate. Hence, the
delay model does not require the more sophisticated techniques developed for phylogenetic-tree
reconstruction (e.g., [62]), in order to achieve low sample complexity. However, the presence of
cycles complicates the analysis for delay-based reconstruction of random graphs. Moreover, we
developed algorithms when additional information is available in the form of second shortest-path
distances. Such information cannot be obtained from phylogenetic data. We demonstrated that this
additional information leads to drastic improvement in the accuracy of random-graph discovery.
9 Conclusion
In this paper, we considered discovery of sparse random graph topologies using a sub-linear number
of uniformly selected participants. We proposed local quartet-based algorithms which exploit the
locally tree-like property of sparse random graphs. We first showed that a sub-linear edit-distance
guarantee can be obtained using end-to-end measurements along the shortest paths between a
22
sub-linear number of participants. We then considered the scenario where additionally, second
shortest-path measurements are available, and showed that consistent topology recovery is feasible
using only a sub-linear number of participants. Finally, we establish a lower bound on the edit
distance achieved by any algorithm for a given number of participants. Our algorithms are simple
to implement, computationally efficient and have low sample complexity.
There are many interesting directions to explore. Our algorithms require the knowledge of the
bounds on the delay variances (i.e., edge lengths), and algorithms which remove these requirements
can be explored. Our algorithms are applicable for other locally tree-like graphs as well, while
the actual performance indeed depends on the model employed. Exploring how the reconstruction
performance changes with the graph model is of interest. In many networks, such as peer-to-peer
networks, there is a high churn rate and the nodes join and leave the networks, and it is of interest to
extend our algorithms to such scenarios. Moreover, we have provided reconstruction guarantees in
terms of edit distance with respect to the minimal representation, and plan to analyze reconstruction
of other graph-theoretic measures such as the degree distribution, centrality measures, and so on.
While we have assumed uniform sampling, other strategies (e.g., random walks) need to analyzed.
We plan to implement the developed algorithms developed on real-world data.
Acknowledgements
The authors thank the anonymous reviewers for comments which significantly improved this paper.
The first author is supported in part by the setup funds at UCI and the AFOSR Award FA9550-
10-1-0310.
A Properties of Random Graphs
We first note the number of cycles in random graphs.
Lemma 2 (Cycles in Erdos-R´enyi Random Graphs) In Gn ∼ G(n, c
n ), the expected number
of cycles of lengths l is O(cl). Moreover, the number of two overlapping cycles of length l, denoted
by Hl, satisfies
E[NHl] = O(n−1c2l+1).
(22)
for δ > 0.
Thus, there are a.a.s. no overlapping cycles of length less than (1−δ) log n
2 log c
Proof:
argument, the expected number of cycles is given by
The proof is along the lines of [18, Cor. 4.9], but we specialize it for cycles. By counting
E[NC(l)] =(cid:18)n
l(cid:19) l!
2l(cid:16) c
n(cid:17)l
= O(cl).
Let number of vertices in H, be v(Hl) = s with l < s ≤ 2l. Note that the number of edges
Hl ≥ s + 1 to be overlapping cycles. Hence,
E[NHl] ≤(cid:18)n
s(cid:19)(s!)(cid:16) c
n(cid:17)s+1
= O(n−1cs+1),
and we obtain the desired result.
✷
23
Since we are dealing with the minimal representative eGn obtained by contracting nodes of
degree < 3 in the original random graph Gn′, we need to derive its distribution. First note that
n = Θ(n′) a.a.s., where n′ is the number of nodes in the original graph. On lines of [63, Lemma 4.4]
and [63, Lemma 5.1], conditioned on n nodes in the minimal representative, the resulting graph is
Erdos-R´enyi, conditioned on the event that the minimum degree is at least three and denote this
distribution as G′(n, c
We now obtain a lower bound on the size of the neighborhood in l hops in G′(n, c/n). Let Γl(i)
n ). We have the following result.
denote the set of nodes at graph distance l from node i in G′(n, c
n ).
Lemma 3 (Neighborhood in G′(n, c
at least 1 − o(1/n),
n )) For each node i in graph eGn ∼ G′(n, c
1
n ), with probability
for all l0 ≤ l ≤ 3 log n
5 log c , where
Γl(i) ≥
(√c − 1)2 cl−l0 log n,
log 9 log n
(√c−1)2
log 3
.
l0 ≤
Moreover, the number of two overlapping cycles of length l, denoted by Hl, satisfies
E′[NHl] = O(cid:18) n−1c2l+1
ξ(c)l (cid:19) .
Let E′[NCl] denote the expected number of cycles of length l in random graph G′(n, c/n)
Proof:
and let E[NCl] denote the corresponding number in Erdos-R´enyi random graph G(n, c/n). Let Λn(l)
denote the event that all given l nodes have degree at least three in G(n, c/n), and let Φn(l) denote
the event that all given l nodes have degree at least three in G(n, c/n) and have edges only to nodes
other than the given l nodes. Thus, we have that
E′[NCl] = E[NClΛ(l)] =
E[NCl1Λ(l)]
P[Λ(l)] ≤
E[NCl]
P[Λ(l)]
= O (cid:18) c
ξ(c)(cid:19)l! ,
24
Proof:
minimum degree of three. Let l0 denote the first time when
The proof is along the lines of [64, Lemma 6] but with modification to account for the
Γl0(i) ≥
9 log n
(√c − 1)2 .
(25)
Since the minimum degree is at least three, l0 is given by (24). The rest of the proof proceeds along
the lines of [64, Lemma 6].
✷
We now provide bounds on the number cycles in G′(n, c
Lemma 4 (Cycles in G′(n, c
n ), the expected number of cycles of lengths l is
n ). Let
ξ(c) := 1 − e−c − ce−c − 0.5c2e−c.
n )) In eGn ∼ G′(n, c
E′[NCl] = O (cid:18) c
ξ(c)(cid:19)l! .
(23)
(24)
(26)
(27)
(28)
where 1 denotes indicator event and
P[Λn(l)] ≥ P[Φn(l)] = (P[Φn(1)])l n→∞= ξ(c)l,
(29)
where the last result is from the fact that the asymptotic degree distribution of a node is the Poisson
distribution. Similarly we have the other result on number of overlapping cycles.
✷
B Proof of Theorem 1
To prove the reconstruction guarantees for RGD1 algorithm, we first characterize "good" events
which lead to accurate addition of edges in each step of RGD1 algorithm. We then bound the
number of "bad" events which leads to an edit distance guarantee between the reconstructed graph
bG by RGD1 algorithm (under exact distances) and the minimal representation of the original graph
eG.
Recall in Section 6.1, we introduced the concept of bad quartets, where a middle hidden node
is part of a cycle of length less than 2R′ hops in the original graph Gn, where R′ = Rg/f . Such
quartets have wrong edge lengths or are not discovered. We weaken the criterion for bad quartets
as those, where a middle hidden node is part of a (generalized) cycle of length less than 3R′ hops.
We note that this suffices to guarantee the presence of good witnesses which leads to accurate
merging of the quartet under consideration. We prove this fact below.
Lemma 5 (Correctness of RGD1 for good quartets) Given a minimal representation eG and
a set of observed nodes V , conditioned on the event that every edge in eG is part of a short quartet
(with edge lengths less than Rg + τ ), each short quartet is successfully and accurately merged by
RGD1 when its middle hidden node is not part of a (generalized) cycle of length less than 3R′ hops.
Proof:
The proof proceeds by induction on the steps of RGD1. Initially the graph is empty and
(i.e., either the hidden nodes and paths are not yet added, or if there are added are correct).
If TreeMerge procedure is called by RGD1 algorithm in this step, it is accurate since it correctly
since the quartet added is good, it is correct. At any step, assume that the graph bG is accurate
Let Q(abuv) be the quartet to be merged with bG and let h1 and h2 be its two hidden nodes.
adds the quartet Q(abuv) to bG. If CycleMerge procedure is called instead, the quartet Q(abuv)
is accurately merged if the join points between the existing paths in bG and the new paths to be
created are correct. Note that the distance between hidden nodes h1 and h2 to be added and the
join points to be inferred is at most R′ hops. Since each of the join points is part of the short
quartet, these short quartets are part of the witness set W. If the witness quartets are not part of
cycles of length less than 2R′ hops, then they are guaranteed to be of the correct length and the
join points for Q(abuv) are correctly discovered. This implies that the middle nodes in Q(abuv)
is accurate upon merging Q(abuv). This implies the correctness of RGD1 at each step and thus,
the above statement holds.
are required to be not part of generalized short cycles of length less than 3R′. Thus, the graph bG
Thus, the above result implies that the errors occur due to the following events: let E1(e; eGn, Vn)
denote the event that the edge e is not a middle edge in any short quartet. Let E2(v; eGn, Vn) denote
the event that the node v is the middle node of a bad short quartet, and let Kv denote the number
of such bad short quartets (with participating nodes as end points and v as one of the middle
✷
25
nodes). The edit distance satisfies
∆(bGn,eGn; Vn) ≤ Xv∈ eGn
(Deg(v; eGn) + 6Kv) I[E2(v)] + 2n2 Xe∈Gn
I[E1(e)].
(30)
This is because under event E2(v), v is the middle node of a bad quartet, either it is not recon-
structed, in which case, it contributes an edit distance of at most Deg(v), or the bad quartet is
reconstructed with wrong edge lengths. In this case, it amounts to adding three wrong edges and
not reconstructing the three correct edges. Thus, the edit distance is at most 6Kv, where Kv is the
number of bad quartets having v as a middle node under this event. For event E1(e), where there
is no short quartet containing e as a middle edge, we use the trivial bound on the edit distance as
2n2.
For the event E1(e), we have
since E c
endpoints of e. We now have
1(e; Gn, Vn)] = {Vn ∩ BR/2(v1;eGn) ≥ 2}∩{Vn ∩ BR/2(v2; eGn) ≥ 2}, where v1 and v2 are the
P[E1(e; Gn, Vn)] ≤ 2 max
v∈V
P[Vn ∩ BR/2(v; eGn) < 2],
PhVn ∩ BR/2(v; eGn) < 2(cid:12)(cid:12)(cid:12)BR/2(v; eGn) ≥ ki ≤ (1 − ρ)k(cid:18)1 +
ρ
1 − ρ(cid:19) .
We have a lower bound on BR/2(v; eGn) from Lemma 3. Hence, for
where Rmin and Rmax are given by (10), with probability 1 − o(n−1), we have
Rmin ≤ R ≤ Rmax,
for some constant δ > 0. Thus,
BR/2(v) ≥ (1 − δ)c(R−Rmin)/2,
P[V ∩ BR/2(v) < 2] ≤ (1 − ρ)(1−δ)c(R−Rmin )/2
(1 +
ρ
1 − ρ
).
(31)
(32)
For the second event E2, that the edge v is a part of a bad quartet, this occurs when it is part
of a (generalized) cycle of length less than 3R′,
where R′ = Rg/f = γg log n
f log c . We have from Lemma 4,
The number of bad short quartets Kv satisfies
P[E2(v; eGn, Vn)] = P[v ∈ C(3R′;eGn)],
ξ(c)(cid:19)3R′! .
P[e ∈ C(3R′; eGn)] = O (cid:18) c
Kv = O(ρ4c2R′
),
26
since Kv ≤ Vn ∩ BR′/2(v; eGn)4 and
E[Vn ∩ BR′/2(v; eGn)] ≤ ρ(cid:18) c
ξ(c)(cid:19)R′/2
,
and using Chernoff bounds, we have Vn ∩ BR′/2(v; Gn) = O(ρ(c/ξ(c))R′ /2) with probability 1 −
o(n−1).
Thus, the expected edit distance is
E[∆(bGn, eGn; Vn)] = O(n4(1 − ρ)(1−δ)c(R−Rmin )/2
+ O (cid:18) c
ξ(c)(cid:19)5R′
ρ4! .
)
(33)
Let ρn = n−β. We have
(1 − ρ)Θ(c(R−Rmin)/2) = O(exp[−nγ/2−β]),
when γ > 2β and γ := log c
O(n5µg/f−4β), and is the dominant error event. Thus, the expected edit distance is
log n (R − Rmin). When (c/ξ(c))R′
= nµg/f , the second term in (33) is
By Markov inequality, we have the result.
E[∆(bGn, eGn; Vn)] = O(n5µg/f−4β ).
C Proof of Theorem 2
The proof follows the lines of proof of Theorem 1. It is easy to note that each step of RGD2 succeeds
and accurately merges a candidate quartet Q(abuv) when the quartet has at most one (generalized)
cycle of length less than 3R′. This is because in this case, the join points of the quartet Q(abuv)
in bG can be inferred using shortest and second shortest paths. As in Theorem 1, we require that
all edges be part of short quartets. Thus, We again have error events E1 and E2 which lead to a
bound on edit distance (30). As before, let E1(v; eGn, Vn) denote the event that the node v is not
a middle node in any short quartet and E2(v) is the event that the node v is the middle node of a
bad short quartet. However, now, the definition of a bad quartet is different: it occurs only when
node v part of at least two overlapping generalized cycles, both of length less than 3R′, and denote
such structures as H3R′.
The analysis for E1 is same as in proof of Theorem 1. For E2, from Lemma 4, we have,
P[v ∈ H3R′] = O(n−2(
Thus, the expected edit distance is
c
ξ(c)
)6R′
).
E[∆(bGn, eGn; Vn)] = O(n(1 − ρ)c(R−Rmin)/2
+ O(n−1(
)8R′
ρ4).
c
ξ(c)
)
Thus, we have the desired result.
27
D Proof of Theorem 3
The proof follows the lines of sample complexity results in [21]. From [21, Proposition 1], we have
concentration bounds for delays (distances) under m samples as
P[blm(i, j) − l(i, j) > ǫ] ≤ 2 exp[−
mǫ2
M R3 ],
for any ǫ > 0, some constant M > 0, and for all i, j ∈ Vn. Taking union bound over all node pairs,
we see that when m = Ω(poly(log n)), we have concentration of all the distances and we have the
desired result.
E Proof of Theorem 4
We use a covering argument for obtaining the lower bound, inspired by [65, Thm. 1]. For recon-
structed graph bG using shortest path distances between O(V (G)2/2) node pairs, the range R(bG)
of the estimator is bounded by
R(bG) ≤ (Diam(G))V (G)2/2,
since the delay variances on the edges are assumed to be known exactly, and the shortest path can
Thus, using (19) and (20),
For the original graph G ∼ G(n, c/n), we have the required probability
range from 1 to Diam(G). For G ∼ G(n, c/n), the diameter8 is O(log n) w.h.p. Let S(bG; δn) denote
all the graphs which are within edit distance of δn of the graphs in range R(bG)
S(bG; δn) := {F : ∆(F, G′) ≤ δn, for some G′ ∈ R(bG)}.
S(bG; δn) ≤ [G′∈R( bG)
D(G′; δn) ≤ R(bG)n(δ+1)n3δn.
P[∆(bG, G; V ) > δn] = Xg∈S c
+Xg∈S
≥ Xg∈S c
= Xg∈S c
= 1 −Xg∈S
P[∆(bG, g; V )] > δn]P(G = g)
P[∆(bG, g; V )] > δn]P(Gn = g)
P[∆(bG, g; V ) > δn]P(Gn = g)
P(Gn = g),
P(Gn = g)
(34)
(a)
(b)
8The diameter of G(n, c
n ) is C(c) log n [66], where C(c) = 1
log c + 2
c + O( log c
c2 ) as c → ∞.
28
where equality (a) is due to the fact that P[∆(bG, g; V ) > δn] = 1 for all g ∈ S c and (b) is due
toPg∈S
P(G = g) +Pg∈S c P(G = g) = 1. From (34), it suffices to provide an asymptotic upper
2(cid:1)} denote the number of
bound for the term Υ :=Pg∈S
edges in the graph g ∈ Gn. Then,
P(G = g). Furthermore, let eg ∈ {1, . . . ,(cid:0)n
P(G = g) =(cid:16) c
n(cid:17)eg(cid:16)1 −
n(cid:17)(n
2)−eg
c
.
We have the general result that for graphs g1, g2 ∈ Gn
Define
We obtain
Thus,
eg1 ≤ eg2 ⇒ P(G = g1) ≥ P(G = g2).
z := min(l ∈ N :
z ≤ O(V 2 log log n
log n
lXk=1(cid:18)(cid:0)n
2(cid:1)k (cid:19) ≥ S)
) + 0.5n(δ + 1) + o(1).
(35)
(36)
(37)
c
≤
P(G = g)
n(cid:17)k(cid:16)1 −
Υ :=Xg∈S
zXk=0(cid:18)(cid:0)n
≤ exp(cid:20)−
where inequality (a) follows from the fact that Pr(Bin(N, q) ≤ k) ≤ exp(− 2
with the identifications N =(cid:0)n
from (a) that if V 2 < M n(0.5c − δ − 1) log n
and we obtain the required result.
2(cid:1)k (cid:19)(cid:16) c
nc(cid:16)0.5n(0.5c − δ − 1) − O(cid:0)V 2 log log n
2(cid:1), q = c/n and k = z, and that (cid:0)n
n(cid:17)(n
2)−k
log n
(a)
4
(cid:1) − o(1)(cid:17)2(cid:21)
N q (N q− k)2) for k ≤ N q
2(cid:1) ≥ (n/2)2. Finally, we observe
log log n for small enough M > 0, then Υ → 0 as n → ∞
References
[1] A. Anandkumar, A. Hassidim, and J. Kelner, "Topology Discovery of Sparse Random Graphs
With Few Participants," in Proc. of ACM SIGMETRICS, June 2011.
[2] S. Kandula, D. Katabi, and J. Vasseur, "Shrink: A Tool for Failure Diagnosis in IP Networks,"
in Proc. of ACM SIGCOMM Workshop on Mining network data, Philadelphia, PA, Aug. 2005.
[3] A. Motter and Y. Lai, "Cascade-based Attacks on Complex Networks," APS Physical Review
E, vol. 66, no. 6, pp. 65–102, 2002.
[4] B. Eriksson, P. Barford, R. Nowak, and M. Crovella, "Learning Network Structure from Passive
Measurements," in Proc. of the ACM SIGCOMM conference on Internet measurement, Kyoto,
Japan, Aug. 2007.
29
[5] Y. Vardi, "Network Tomography: Estimating Source-Destination Traffic Intensities from Link
Data." J. of the American Statistical Association, vol. 91, no. 433, 1996.
[6] A. Anandkumar, C. Bisdikian, and D. Agrawal, "Tracking in a Spaghetti Bowl: Monitoring
Transactions Using Footprints," in Proc. of ACM SIGMETRICS, Annapolis, Maryland, USA,
June 2008.
[7] D. Alderson, H. Chang, M. Roughan, S. Uhlig, and W. Willinger, "The many facets of internet
topology and traffic," AIMS J. on Networks and Heterogeneous Media, vol. 1, no. 4, p. 569,
2006.
[8] D. Shah and T. Zaman, "Detecting Sources of Computer Viruses in Networks: Theory and
Experiment," in Proc. of ACM Sigmetrics, New York, NY, June 2010.
[9] S. Fortunato, "Community Detection in Graphs," Physics Reports, 2009.
[10] F. Wu, B. Huberman, L. Adamic, and J. Tyler, "Information Flow in Social Groups," Physica
A: Statistical and Theoretical Physics, vol. 337, no. 1-2, pp. 327–335, 2004.
[11] D. Acemoglu, A. Ozdaglar, and A. ParandehGheibi, "Spread of (mis) information in social
networks," Games and Economic Behavior, 2010.
[12] L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore Art Thou r3579x?: Anonymized Social
Networks, Hidden Patterns, and Structural Steganography," in Proc. of ACM Intl. Conf. on
World Wide Web, Banff, Canada, May 2007.
[13] "mtrace– Print multicast path." ftp://ftp.parc.xerox.com/pub/net-research/ipmulti.
[14] M. Gunes and K. Sarac, "Resolving anonymous routers in Internet topology measurement
studies," in Proc. of IEEE INFOCOM, 2008, pp. 1076–1084.
[15] B. Yao, R. Viswanathan, F. Chang, and D. Waddington, "Topology inference in the presence
of anonymous routers," in Proc. of IEEE INFOCOM, 2003.
[16] J. Ni, H. Xie, S. Tatikonda, and Y. Yang, "Efficient and dynamic routing topology inference
from end-to-end measurements," Networking, IEEE/ACM Transactions on, vol. 18, no. 1, pp.
123–135, 2010.
[17] M. Wainwright and M. Jordan, "Graphical Models, Exponential Families, and Variational
Inference," Foundations and Trends in Machine Learning, vol. 1, no. 1-2, pp. 1–305, 2008.
[18] B. Bollob´as, Random Graphs. Academic Press, 1985.
[19] M. Jovanovi´c, F. Annexstein, and K. Berman, "Modeling peer-to-peer network topologies
through small-world models and power laws," in TELFOR, 2001.
[20] M. Newman, D. Watts, and S. Strogatz, "Random graph models of social networks," Proc. of
the National Academy of Sciences of the United States of America, vol. 99, no. Suppl 1, 2002.
[21] S. Bhamidi, R. Rajagopal, and S. Roch, "Network Delay Inference from Additive Metrics," To
appear in Random Structures and Algorithms, on Arxiv, 2010.
30
[22] A. Barab´asi and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, pp.
509–512, 1999.
[23] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani, "Kronecker
graphs: An approach to modeling networks," J. of Machine Learning Research, vol. 11, pp.
985–1042, 2010.
[24] J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney, "Statistical properties of community
structure in large social and information networks," in Proc. of WWW, 2008, pp. 695–704.
[25] A. Clauset, C. Moore, and M. Newman, "Hierarchical structure and the prediction of missing
links in networks," Nature, vol. 453, no. 7191, pp. 98–101, 2008.
[26] "Internet Mapping Project," http://www.cheswick.com/ches/map/.
[27] "The Skitter Project," http://www.caida.org/tools/measurement/skitter/.
[28] "Cooperative Analysis for Internet Data Analysis, (CAIDA)," http://www.caida.org/tools/.
[29] R. Govindan and H. Tangmunarunkit, "Heuristics for Internet Map Discovery," in IEEE IN-
FOCOM, Tel-Aviv, Israel, June 2000.
[30] N. Spring, R. Mahajan, D. Wetherall, and T. Anderson, "Measuring ISP Topologies with
Rocketfuel," IEEE/ACM Tran. on networking, vol. 12, no. 1, pp. 2–16, 2004.
[31] Y. Shavitt and E. Shir, "DIMES: Let the internet measure itself," ACM SIGCOMM Computer
Communication Review, vol. 35, no. 5, p. 74, 2005.
[32] Y. He, G. Siganos, and M. Faloutsos, "Internet Topology," in Encyclopedia of Complexity and
Systems Science, R. Meyers, Ed. Springer, 2009, pp. 4930–4947.
[33] J. Leskovec, D. Huttenlocher, and J. Kleinberg, "Predicting Positive and Negative Links in
Online Social Networks," in ACM WWW Intl. Conf. on World Wide Web, 2010.
[34] M. Gomez-Rodriguez, J. Leskovec, and A. Krause, "Inferring Networks of Diffusion and Influ-
ence," in Proc. of the ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining,
2010.
[35] S. Myers and J. Leskovec, "On the Convexity of Latent Social Network Inference," in Proc. of
NIPS, 2010.
[36] R. Castro, M. Coates, G. Liang, R. Nowak, and B. Yu, "Network Tomography: Recent Devel-
opments," Stat. Sc., vol. 19, pp. 499–517, 2004.
[37] F. Chung, M. Garrett, R. Graham, and D. Shallcross, "Distance realization problems with
applications to Internet tomography," J. of Comp. and Sys. Sc., vol. 63, no. 3, pp. 432–448,
2001.
[38] Z. Beerliova, F. Eberhard, T. Erlebach, A. Hall, M. Hoffmann, M. Mihal ak, and L. Ram,
"Network Discovery and Verification," IEEE Journal on Selected Areas in Communications,
vol. 24, no. 12, p. 2168, 2006.
31
[39] T. Erlebach, A. Hall, and M. Mihal'ak, "Approximate Discovery of Random Graphs," Lecture
Notes in Computer Science, vol. 4665, p. 82, 2007.
[40] D. Achlioptas, A. Clauset, D. Kempe, and C. Moore, "On the bias of traceroute sampling: Or,
power-law degree distributions in regular graphs," J. ACM, vol. 56, no. 4, 2009.
[41] M. Kurant, M. Gjoka, C. T. Butts, and A. Markopoulou, "Walking on a Graph with a Mag-
nifying Glass," in Proceedings of ACM SIGMETRICS '11, San Jose, CA, June 2011.
[42] S. Khuller, B. Raghavachari, and A. Rosenfeld, "Landmarks in graphs," Discrete Appl. Math.,
vol. 70, no. 3, pp. 217–229, 1996.
[43] L. Reyzin and N. Srivastava, "On the longest path algorithm for reconstructing trees from
distance matrices," Information Processing Letters, vol. 101, no. 3, pp. 98–100, 2007.
[44] --, "Learning and verifying graphs using queries with a focus on edge counting," Lecture
Notes in Computer Science, vol. 4754, p. 285, 2007.
[45] H. Mazzawi, "Optimally Reconstructing Weighted Graphs Using Queries," in Symposium on
Discrete Algorithms, 2010, pp. 608–615.
[46] S. Choi and J. Kim, "Optimal query complexity bounds for finding graphs," in Proc. of annual
ACM symposium on Theory of computing, 2008, pp. 749–758.
[47] M. Shih and A. Hero, "Unicast inference of network link delay distributions from edge mea-
surements," in Proc. of IEEE ICASSP, vol. 6, 2002, pp. 3421–3424.
[48] N. Duffield, J. Horowitz, F. Presti, and D. Towsley, "Multicast topology inference from end-
to-end measurements," Advances in Performance Analysis, vol. 3, pp. 207–226, 2000.
[49] R. Durbin, S. R. Eddy, A. Krogh, and G. Mitchison, Biological Sequence Analysis: Probabilistic
Models of Proteins and Nucleic Acids. Cambridge Univ. Press, 1999.
[50] M. Gomez-Rodriguez, E. Balduzzi, M. DE, and B. Scholkopf, "Uncovering the temporal dy-
namics of diffusion networks," in Intl. Conf. on Machine Learning, Bellevue, WA, 2011.
[51] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila, "Finding effectors in social networks," in
Proc. of ACM SIGKDD, 2010, pp. 1059–1068.
[52] T. Snowsill, N. Fyson, T. De Bie, and N. Cristianini, "Refining causality: who copied from
whom?" in Proc. of ACM SIGKDD, 2011, pp. 466–474.
[53] N. Alon and J. Spencer, The probabilistic method. Wiley-Interscience, 2000.
[54] J. Pearl, Probabilistic Reasoning in Intelligent Systems-Networks of Plausible Inference. Mor-
gan Kaufmann, 1988.
[55] G. Bunke et al., "Inexact graph matching for structural pattern recognition," Pattern Recog-
nition Letters, vol. 1, no. 4, pp. 245–253, 1983.
[56] E. Lehmann, Theory of Point Estimation. New York, NY: Chapman & Hall, 1991.
32
[57] H.-J. Bandelth and A. Dress, "Reconstructing the shape of a tree from observed dissimilarity
data," Adv. Appl. Math, vol. 7, pp. 309–43, 1986.
[58] P. L. Erdos, L. A. Sz´ekely, M. A. Steel, and T. J. Warnow, "A few logs suffice to build (almost)
all trees: Part ii," Theoretical Computer Science, vol. 221, pp. 153–184, 1999.
[59] T. Jiang, P. E. Kearney, and M. Li, "A polynomial-time approximation scheme for inferring
evolutionary trees from quartet topologies and its application," SIAM J. Comput., vol. 30,
no. 6, pp. 1942–1961, 2001.
[60] R. Durbin, S. R. Eddy, A. Krogh, and G. Mitchison, Biological Sequence Analysis: Probabilistic
Models of Proteins and Nucleic Acids. Cambridge Univ. Press, 1999.
[61] T. Cover and J. Thomas, Elements of Information Theory. John Wiley & Sons, Inc., 2006.
[62] C. Daskalakis, E. Mossel, and S. Roch, "Optimal phylogenetic reconstruction," in STOC '06:
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing, 2006, pp.
159–168.
[63] I. Benjamini, G. Kozma, and N. Wormald, "The mixing time of the giant component of a
random graph," Arxiv preprint, 2006.
[64] F. Chung and L. Lu, "The diameter of sparse random graphs," Advances in Applied Mathe-
matics, vol. 26, no. 4, pp. 257–279, 2001.
[65] G. Bresler, E. Mossel, and A. Sly, "Reconstruction of Markov Random Fields from Samples:
Some Observations and Algorithms," in Intl. workshop APPROX Approximation, Randomiza-
tion and Combinatorial Optimization. Springer, 2008, pp. 343–356.
[66] D. Fernholz and V. Ramachandran, "The diameter of sparse random graphs," Random Struc-
tures and Algorithms, vol. 31, no. 4, pp. 482–516, 2007.
33
|
1805.10391 | 2 | 1805 | 2018-11-23T09:04:13 | Estimating Shell-Index in a Graph with Local Information | [
"cs.SI",
"physics.soc-ph"
] | For network scientists, it has always been an interesting problem to identify the influential nodes in a given network. The k-shell decomposition method is a widely used method which assigns a shell-index value to each node based on its influential power. The k-shell method requires the global information of the network to compute the shell-index of a node that is infeasible for large-scale real-world dynamic networks. In this work, we propose a method to estimate the shell-index of a node using its local information. We also propose hill-climbing based approach to hit the top-ranked nodes in a small number of steps. We further discuss a method to estimate the rank of a node based on the proposed estimator. | cs.SI | cs |
Estimating Shell-Index in a Graph with Local
Information
Akrati Saxena*
S. R. S. Iyengar*
[email protected]
[email protected]
*Department of Computer Science and Engineering,
Indian Institute of Technology Ropar, India
Abstract
For network scientists, it has always been an interesting problem
to identify the influential nodes in a given network. The k-shell de-
composition method is a widely used method which assigns a shell-
index value to each node based on its influential power. The k-shell
method requires the global information of the network to compute
the shell-index of a node that is infeasible for large-scale real-world
dynamic networks.
In this work, we propose a method to estimate
the shell-index of a node using its local information. We also propose
hill-climbing based approach to hit the top-ranked nodes in a small
number of steps. We further discuss a method to estimate the rank of
a node based on the proposed estimator.
1
Introduction
In real-world networks, hierarchical organization of networks gives rise to
the core-periphery structure. The concept of the core-periphery structure
was first proposed by Borgatti and Everett [1] in 2000. The core is a densely
connected nucleus of the network that is surrounded by sparsely connected
periphery nodes. Core nodes are highly connected with each other and also
highly connected with periphery nodes. Authors also proposed a method to
detect the core-periphery structure based on the adjacency matrix division,
such that the number of edges is maximum among core nodes that is preceded
1
by the number of edges between core and periphery, and periphery nodes have
very less number of edges among themselves. The complexity of the proposed
matrix division method is very high, and so, it is infeasible for large-size real-
world networks. Carmi et al. employed the k-shell decomposition algorithm
first time to study the core-periphery structure in the Internet network and
classified the network into three categories [2].
The k-shell decomposition method was proposed by Seidman and it is
a well-known method in social network analysis to identify the tightly knit
group of influential core nodes in unweighted networks [3]. This algorithm
works by recursively pruning the nodes from lower degree to higher degree.
First, we recursively remove all nodes of degree 1, until there is no node of
degree 1. All these nodes are assigned shell-index ks = 1. In the next step, we
remove all nodes of degree 2 if any. While pruning the degree 2 nodes, new
nodes having degree 2 or less can be generated and will also be removed in the
same iteration. All these nodes will be assigned shell-index ks = 2. Similarly,
nodes of degree 3, 4, 5, ... are pruned step by step. When we remove nodes
of degree k, if there appears any node of degree less than k, it will also be
removed in the same step. All these nodes are assigned shell-index k. This
method thus divides the entire network into shells and assigns a shell-index
to each node. The shell-index increases as we move from the periphery to the
core and the higher shell-index represents the higher coreness. The innermost
shell has the highest shell-index kmax and is called the core of the network.
Batagelj and Zaversnik proposed an order O(m) algorithm to compute the
coreness of all nodes, where m is the total number of edges in the network [4].
Many studies have shown that core nodes are highly influential nodes in a
network. In the entire discussion, influential nodes refer to the nodes having
the higher spreading power. Kitsak et al. [5] showed that information spreads
faster if the spreading is started from a core node rather than a periphery
node. Saxena et al. showed the importance of core nodes in information
diffusion on networks with meso-scale structures [6]. The results conclude
that the information becomes viral once it hits the core nodes and spreads
into multiple communities through the core. Pei and Maske studied the
correlation of various centrality measures with the influential power of the
nodes on real-world networks and observed that shell-index is an effective
centrality measure to identify the most influential nodes [7, 8].
Shell-index is a widely used method to compute the influential power of
a node, but it has its disadvantages. Firstly, to compute the shell-index of
a node using the k-shell decomposition method, we need the entire network,
2
which is infeasible for large-scale dynamic networks. Secondly, the k-shell
method assigns the same index values to many nodes which actually might
have different influential power, as shown in [9 -- 11].
In this work, we show that the shell-index value of a node can be estimated
using its h2 − index which can be computed using the local neighborhood
information of the node. We study the correlation of shell-index and h2 −
index with the spreading power of a node and observe that the h2 − index
has good correlation with the spreading power and can be used in real-world
networks to identify the influential nodes. We further show that the h2 −
index has better monotonicity than the shell-index.
In most of the real-world applications, we only need to identify top in-
fluential nodes to spread the information without having the global informa-
tion of the network. We implement hill-climbing based algorithms using the
proposed shell-index estimator to identify the top-ranked nodes in a small
number of steps. The detailed algorithm and results are discussed in Sec-
tion 5. Next, we propose a heuristic method to estimate the influential rank
of a node without computing the index value of all the nodes. The proposed
method is discussed in Section 6.
The main contributions of the work are as follows.
1. Discuss a method to compute the shell-index of a node using the shell-
index value of its neighbors.
2. Propose an estimator for the shell-index value of a node.
3. Hill-climbing based methods to identify top-ranked nodes using the
proposed estimator.
4. A heuristic method to estimate the percentile rank of a node based on
the proposed estimator.
The rest of this paper is organized as follows. In Section 2, we discuss the
related literature. Section 3 covers the preliminary definitions. In Section 4,
we discuss the estimation of shell-index using h2 − index and experimental
results. In Section 5, we discuss hill-climbing based approaches to identify the
top-ranked nodes and their simulation on real-world networks. In Section 6,
we discuss a heuristic method to estimate the percentile rank of a node.
Section 7 concludes the paper with future directions.
3
2 Related Work
In recent years, the problem of identifying influential nodes has attracted
researchers from different areas like computer science, epidemiology, biology,
statistics, etc. Researchers have defined various centrality measures to com-
pute the importance of a node based on its characteristics and the given
application context. These centrality measures can be categorized as local
centrality measures and global centrality measures. Centrality measures that
can be computed using local neighborhood information of the node are called
local centrality measures like degree centrality [12], h-index [13], semi-local
centrality [14] etc. The centrality measures that require the entire network
for their computation are called global centrality measures like closeness [15],
betweenness [16], eigenvector [17], shell-index [3], PageRank [18] etc. The
computational complexity of global centrality measures is very high, and it
depends on the network size.
The use of a specific centrality measure to identify important nodes is
highly application dependent. Recently Kitsak et al. showed that shell-index
is highly correlated with the spreading power of a node [5]. These results
have been supported by many other studies that show that the core nodes
are highly influential and the information flows into multiple communities
through the core [6, 19].
Initially, the k-shell decomposition method was defined for undirected
unweighted networks, but recently it has been extended to different types
of networks. Garas et al. extended the k-shell method to identify the core-
periphery structure in weighted networks [20]. They defined the weighted
degree that considers both the degree as well as the weights of the con-
nected edges. Then, the weighted degree is used while applying the k-shell
decomposition method. Eidsaa et al. also proposed a method to identify the
core-periphery structure in weighted networks where they only consider the
strength of the nodes while pruning the nodes in each iteration [21]. This
method is known as s-shell decomposition method or strength decomposition
method. Wei et al. proposed an edge-weighting k-shell method where they
consider both the degree as well as the edge-weights, and the edge weight is
computed by adding the degree of its two endpoints [22]. The importance of
both of these parameters can be set using a tuning parameter which varies
from 0 to 1.
Researchers have shown that the shell-index can be efficiently used to
identify the influential nodes in a network [5,19]. However, the k-shell method
4
assigns the same index values to many nodes which actually might have dif-
ferent influential power [9 -- 11]. Zeng et al. modified the k-shell decomposition
method and proposed a mixed degree decomposition (MDD) method which
considers both the residual degree and the exhausted degree of the nodes
while assigning them index values [11]. Liu et al. proposed an improved
ranking method that considers both the shell-index of the node and its dis-
tance with the highest shell-index nodes [23]. The proposed method com-
putes the shortest distance of all nodes with the highest shell-index nodes, so,
it has high computational complexity. Liu et al. showed that in real-world
networks some core-like groups are formed which are not true-core [24]. The
nodes in these groups are tightly connected with each other but have very few
links outside. Based on this observation, the authors filtered out redundant
links which have low diffusion power but supports non-pure core groups to be
formed, and then apply k-shell decomposition method. Authors show that
the coreness computed on this new graph is a better measure of influential
power and it is highly correlated with the spreading power computed using
SIR model in the original graph.
Researchers have also proposed hybrid centrality measures by combining
the shell-index with other centrality measures. Hou et al.
introduced the
concept of all-around score to find influential nodes [25]. All-around score
(cid:113)(cid:107)d(cid:107)2 + (cid:107)CB(cid:107)2 + (cid:107)ks(cid:107)2, where d is the
of a node is defined as, Score =
degree, CB is the betweenness centrality, and ks is the shell-index of the
node. The degree takes care of local connectivity of the node, betweenness
takes care of shortest paths that represent global information, and shell-
index represents the position of the node with respect to the center. The
total time complexity of the complete process is O(n · m), as it depends on
the complexity of betweenness centrality that has the highest complexity.
Basaras et al. proposed a hybrid centrality measure based on degree and
shell-index and showed that it works better than the traditional shell-index
[26]. Bae and Kim proposed a method where the centrality value of a node
is computed based on the shell-index value of its neighbors; it thus considers
both degree and shell-index value of the nodes [27]. The results show that
the proposed method outperforms other methods in scale-free networks with
community structure. Tatti and Gionis proposed a graph decomposition
method that considers both the connectivity as well as the local density while
the k-shell decomposition method only considers the connectivity of the nodes
[28]. The running time of the proposed algorithm is O(n2 · m). They further
5
proposed a linear-time algorithm that computes a factor-2 approximation of
the optimal decomposition value. All the discussed centrality measures have
better monotonicity, but they require global information of the network to
be computed; and so, they are not favorable in large-scale networks.
bounded by 1 +(cid:80)
Real-world networks are highly dynamic, and it is infeasible to re-compute
the shell-index of each node for every single change in the network. Li et al.
proposed a method to update the shell-index value of the affected nodes,
whenever a new edge is added or deleted from the network [29]. Jakma
et al. proposed the first continuous, distributed method to compute shell-
index in dynamic graphs [30]. Pechlivanidou et al. proposed a distributed
algorithm based on MapReduce to compute the k-shell of the graph [31].
Montresor et al. proposed an algorithm to apply the k-shell method on live
distributed systems [32]. The execution time of the proposed algorithm is
u∈V [d(u) − ks(u)], and it gives 80 percent reduction in the
execution time on the considered real-world networks. Dasari et al. proposed
a k-shell decomposition algorithm called ParK that reduces the number of
random access calls and the size of the working set while computing the shell-
index in larger graphs [33]. They further proposed a faster algorithm which
involves parallel execution to compute the k-shell in larger graphs. Sariyuce
et al. proposed the first incremental k-shell decomposition algorithms for
streaming networks [34]. The proposed method has million times speed-up
than the original k-shell method on a network having 16 million nodes. Lu et
al. explored the relationship between the degree, h-index [13], and coreness
of a node [35]. They showed that the h-index family of a node converges to
the coreness of the node.
K-shell method has been widely used in literature to study different net-
works. Catini et al. used shell-index to identify clusters in PubMed scientific
publications [36]. To identify the clusters, a graph is created where the nodes
are the publications, and there is an edge between two nodes if the distance
between the locations of the corresponding researchers is less than the thresh-
old. In the experiments, authors have taken the threshold 1 km. Based on
the k-shell decomposition, authors categorized the cities into monocore and
multicore. Later on, the journal impact factors are used to quantify the qual-
ity of research of each core. Results show that k-shell decomposition method
can be used to identify the research hub clusters.
Core-periphery structure has been studied in the wide variety of networks,
such as financial network [37, 38], human-brain network [39, 40], nervous sys-
tem of C. elegans worm [41], blog networks [42], scientific publication net-
6
work [36], collaboration network [43, 44], protein interaction networks [45],
communication network of software development team [46 -- 49], hollywood
collaboration network [50], language network [51], YouTube social interac-
tion network [52], metabolic networks [53], etc. Karwa et al. proposed a
method to generate all graphs for a given shell-index sequence [54].
In one of our works, we studied the properties of the core like its size and
density [55]. We further studied how the core is evolved with time and how
the core nodes acquire a specific position in the network. We observed that
making more connections with the existing core nodes help a node to shift
into the core regardless of the total number of connections. Based on our
observations, we proposed evolving models for both unweighted and weighted
networks having community and core-periphery structure. We further stud-
ied the core-periphery structure in multilayered terrorist networks [56, 57]
and proposed an evolving model to generate synthetic multilayered networks
having similar characteristics [58].
With time the size of real-world networks is increasing exponentially, so,
it is infeasible to collect the entire network to study its global properties.
Researchers have focussed to propose fast and efficient methods to identify
influential nodes and their ranking in the given network [59]. Saxena et al.
have proposed methods to estimate the degree rank of a node using power-
law degree distribution [60, 61] and sampling techniques [62 -- 64]. In [65, 66],
authors proposed heuristic methods to fast estimate the closeness rank of
a node.
In this work, we will discuss a heuristic method to estimate the
influential rank of a node using local information.
3 Preliminaries
3.1 H-Index
The h-index of a node u (h − index(u)) is h if h of its neighbors have degree
at least h and there is no subset of h+1 neighbors where each node belonging
to that subset has the degree at least h + 1.
The h2 − index of a node u (h2 − index(u)) is computed by taking its
h − index based on the h − index of its neighbors and not their degrees.
Note: The h-index of a list l (h− index(l)) is h if h is the highest number
such that h entries of the list are equal to or greater than h.
7
3.2 SIR Model
We use the Susceptible-Infected-Recovered (SIR) spreading model to simu-
late the spreading process on real-world networks and compute the spreading
power of each node. In the SIR model, a node can be in three possible states:
1. S (susceptible), 2. I (infected), and 3. R (recovered). Initially, all nodes are
in the susceptible mode except one, which is infected and will start spreading
the infection in the network. The infected node will infect each of its suscep-
tible neighbors with infection probability (λ). If the neighbor gets infected,
its status is changed to Infected. Once an infected node contacts all of its
neighbors to infect them, its status is changed to Recovered with probability
µ. For generality, we set µ = 1. Recovered nodes will neither be infected
anymore nor infect others, and they remain Recovered until the spreading
stops.
Initially, we infect a single node, and all other nodes are susceptible.
Then the infection starts spreading from the seed node to the others through
links. The spreading process stops when there is no infected node in the
network. The number of recovered nodes is considered the spreading power
or spreading capability of the original node. We execute the SIR model 100
times from each node and take the average of the spreading power to compute
the final spreading power of the node. The infection probability is taken as
λ > λc, where λc = (cid:104)d(cid:105) /((cid:104)d2(cid:105) − (cid:104)d(cid:105)) is the epidemic threshold computed
using mean-field theory, where d represents the degree of the node [67].
4 Section 1: Shell-Index Estimation
In this section, we discuss a method to estimate the shell-index using local
neighborhood information.
Theorem 1. The shell-index of a node u can be computed as ks(u) = h −
index(ks(v)∀v ∈ ngh(u)), where ngh(u) is the set of the neighbors of node
u.
Proof. Let's assume that h-index of (ks(v)∀v ∈ ngh(u)) is h then there are
at least h nodes having shell-index equal to or greater than h as per the
definition of h-index.
Now, we will see how the shell-index of a node u will be decided in the
k-shell decomposition method. In the k-shell decomposition method, in ith
8
iteration all those nodes are removed who have exactly i connections with
the nodes having the shell-index i or greater than i. Thus, the node u will
be removed in hth iteration as h of its neighbors have shell-index h or greater
than h. This is nothing but the h−index of node u based on the shell-indices
of its neighbors as defined above.
Next, we explain Theorem 1 using examples. The first example is shown
in Figure 1(a) where node u has eight neighbors having shell-indices 1, 2, 3,
3, 4, 6, 8, and 10. Now, we will see how the shell-index of node u will be
determined during the k-shell decomposition method. All the iterations are
shown in Figure 1. In the 1st iteration, first of its neighbors will be removed
and node u will be left with seven connections with the nodes having the
shell-indices greater than 1, so, the node u will not be removed in the first
iteration.
In the 2nd iteration, its second neighbor will be removed as it
has shell-index 2, but still, the node u has six connections with the higher
shells, so, it will not be removed. In the third iteration, its third and fourth
neighbors will be removed as both of these neighbors have shell-index 3. The
node u still has four connections with the higher shells, so it will not be
removed. In the fourth iteration, 5th of its neighbors having shell-index 4
will be removed, and now the node u has only three connections with the
higher shells, so, as per the k-shell decomposition method, node u will also
be removed in the fourth iteration. So, the shell-index of node u is 4 that is
nothing but the h − index of the shell-indices of its neighbors.
Similarly, in Figure 2, node u has degree 7, and the shell-indices of its
neighbors are 1, 2, 2, 3, 3, 3, and 5. Now in the 1st iteration of the k-shell
decomposition method, 1st of its neighbors will be removed. Node u still has
six connections with the higher shells, so, it will not be removed. In the 2nd
iteration, second and third of its neighbors will be removed and node u still
has four connections with the higher shells, so, it will not be removed. In the
3rd iteration, 4th, 5th, and 6th of its neighbors will be removed. Node u now
has only one connection with the higher shells, so, it will also be removed in
the same iteration. Thus, it has shell-index 3.
In Figure 3, node u has degree 6 and the shell-indexes of its neighbors
are 10, 11, 11, 13, 15, and 25. In 1st, 2nd, ..., 5th iteration, the node u will
not be removed as it has six connections with the higher shells. In the 6th
iteration, node u will be removed, so, the shell-index of node u is 6, i.e., the
h-index of the shell-indices of its neighbors.
9
(a) Initial subgraph having all connections
of node u
(b) After Iteration 1
(c) After Iteration 2
(d) After Iteration 3
Figure 1: Example 1: Estimate shell-index of node u while applying k-shell
decomposition algorithm
Figure 2: Example 2: A subgraph of a network to explain shell-index com-
putation using shell-indices of neighbors
10
Figure 3: Example 3: A subgraph of a network to explain shell-index com-
putation using shell-indices of neighbors
Shell-Index Estimation
Using Theorem 1, the shell-index of a node can be estimated if the shell-
indices of its neighbors are known. However, in real life applications, the
shell-indices of the neighbors will not be known. We know that the shell-
index of a node is bounded above by its degree, ks(v) ≤ d(v). So, to estimate
the shell-index of node u, we can consider the degree of its neighbors in place
of their shell-index. This is nothing but the h − index of node u as defined
in Section 3.1. To further improve the estimation, we consider the h− index
of its neighbors as ks(v) ≤ h − index(v) ≤ d(v) and this is nothing but the
h2 − index of the node. Thus the shell-index of a node can be estimated
using its h2 − index. Next, we will study the performance of the proposed
estimator in real-world networks.
Pseudo-code for the proposed method is given in Algorithm 1, where
ngh(u) is the list of the neighbors of node u. The proposed estimator can
be further improved if we compute the h3 − index of the node, however, in
the Results section, we show that h2 − index itself is a good estimator. It
can be computed faster and requires less neighborhood information than to
compute the h3 − index of the node.
Algorithm 1 Compute h2 − index(G, u)
Take a list ngh hindex, ngh hindex = [ ]
for each v in ngh(u) do
add h − index(v) in ngh hindex
end for
Return h − index(ngh hindex)
11
4.1 Results and Discussion
We study the performance of h2 − index versus shell-index on the following
real-world networks.
Datasets
1. Astro-Ph: This is the co-authorship network of ArXiv's Astrophysics
(Astro-ph) publications where authors are represented by nodes, and
there is an edge between two nodes if the corresponding authors have
published together [68]. It contains 14845 nodes and 119652 edges.
2. Buzznet: Buzznet is a subgraph extracted from a social networking
site that is used to share the photo, journal, and video [69]. It consists
of 101163 nodes and 2763066 edges.
3. Cond-Mat: This is the co-authorship network of ArXiv's condensed
matter section [68]. This dataset covers all papers from January 1993
to April 2003 (124 months). It contains 13861 nodes and 44619 edges.
4. DBLP: This is a coauthorship network extracted from DBLP com-
puter science bibliography, where an edge denotes that the authors
have common publications [70]. This network contains 317080 nodes
and 1049866 edges.
5. Digg: This friendship network was extracted from Digg website in
2009 [71]. It contains 261489 nodes and 1536577 edges.
6. Enron: This network is the email communication network of the em-
ployees of Enron organization from 1999 to 2003 [72]. Nodes of the
network are email addresses, and there is an edge between two nodes
if they have communicated at least once. The dataset has 84384 nodes
and 295889 edges.
7. Facebook: This dataset is an induced subgraph of Facebook [73],
where users are represented by nodes and friendships are represented
by edges. It contains 63392 nodes and 816831 edges.
8. FB-Wall: This is a network where nodes represent Facebook users,
and there is an edge between two users if any one of them posts on the
12
Facebook-wall of another user [73]. It contains 43953 nodes and 182384
edges.
9. Foursquare: Foursquare is a location-based social networking software
for mobile devices that can be accessed using GPS. This dataset is an
induced subgraph of friendships of Foursquare [69]. It contains 639014
nodes and 3214985 edges.
10. Gowalla: This friendship network is extracted from a location-based
social network called, Gowalla [74]. Gowalla was used to share the
locations among its users. It contains 196591 nodes and 950327 edges.
The experimental results are shown in Table 1. First, we compute the
monotonicity of shell-index and h2 − index. Ideally, if a node has influen-
tial power different from other nodes, it should be assigned a different index
value. In the k-shell decomposition method, all the nodes which are pruned
at one level are assigned the same shell-index value. Researchers have shown
that they can have different influential power and should have been assigned
different values [9 -- 11]. A better centrality measure should assign the same
index value to fewer nodes and allocate more unique values. This charac-
teristic of the measure can be captured using the monotonicity [27]. This is
defined as,
(cid:16)
1 − (cid:80)
(cid:17)2
M (R) =
r∈R nr(nr−1)
n(n−1)
where R denotes the ranking values of all the nodes based on any given
centrality measure, n represents the size of R, i.e., the number of nodes in
our case, and nr represents the number of nodes having rank r. If all nodes
have the same rank, the monotonicity (M ) of the ranking is 0, and it is not a
valid ranking measure. If each node has a unique rank then the monotonicity
(M ) is 1. Results in Table 1 show that the monotonicity of h2 − index is
either the same or slightly better than the shell-index.
Next, we study the correlation of shell-index and h2 − index with the
spreading power of the node. The spreading power of a node is computed
by executing the SIR model (SIR model is defined in Section 3.2) 100 times
and taking the average of its spreading powers. In experiments, the infection
probability λ is taken as λ = (cid:104)d(cid:105) /((cid:104)d2(cid:105)−(cid:104)d(cid:105))+0.01. To study the correlation,
we compute Kendall's Tau (τ ), Pearson (r), and Spearman (ρ) correlation
13
coefficients. Results in Table 1 show that the correlation of h2 − index with
the spreading power is either as good as the correlation of shell-index with
the spreading power or better.
We further study how the correlation of shell-index and h2 − index with
the spreading power changes as we vary the infection probability. Results
are shown in Figure 4 for Astro-physics collaboration network and FB-wall
social interaction network. The epidemic threshold value (λc) for Astro-Ph
and FB-Wall network is 0.02 and 0.04 respectively, so, the considered range
of the infection probability is taken 0.05 − 0.14, i.e., greater than the λc for
both the networks. The results show that h2 − index has a good correlation
with varying infection probabilities.
We thus conclude that the h2 − index is a better centrality measure and
a good estimator of the shell-index in real-world networks. h2 − index has
an advantage over shell-index that it is a local centrality measure and can be
computed for a node using local neighborhood information without gathering
the entire network.
14
Table 1: Performance of Shell-Index (ks) and h2 − index using monotonicity and SIR spreading model
h2 − Index Kendall Pearson Spearman Kendall Pearson Spearman
h2 − index vs. SIR
Monotonicity
ks vs. SIR
Network
Ref Nodes
Edges
1
5
Astro-Ph
Buzznet
Cond-Mat
DBLP
Digg
Enron
Facebook
Fb-Wall
Foursquare
Gowalla
[68]
[69]
[68]
[70]
[71]
[72]
[73]
[73]
[69]
[74]
14845
101163
13861
317080
261489
84384
63392
43953
639014
196591
119652
2763066
44619
1049866
1536577
295889
816831
182384
3214985
950327
ks
0.89
0.93
0.75
0.74
0.45
0.30
0.91
0.76
0.50
0.73
0.89
0.93
0.76
0.75
0.45
0.30
0.91
0.77
0.50
0.74
0.51
0.21
0.55
0.49
0.48
0.45
0.49
0.62
0.54
0.59
0.67
0.28
0.69
0.61
0.60
0.58
0.64
0.75
0.66
0.71
0.67
0.30
0.69
0.61
0.59
0.55
0.65
0.76
0.65
0.72
0.52
0.21
0.56
0.49
0.48
0.45
0.49
0.62
0.54
0.59
0.67
0.28
0.70
0.62
0.60
0.58
0.64
0.75
0.66
0.71
0.68
0.30
0.70
0.62
0.59
0.55
0.65
0.76
0.65
0.72
5 Section 2: Hill-Climbing based approach to
Identify Top-Ranked Nodes
In many real-life applications, we need to identify top influential nodes to
spread the information faster. For example, if a marketing company wants to
provide free samples of their products, they would like to find out influential
people in the network who can help them in popularizing their product.
Similarly, if someone wants to spread a virus using the Internet network, she
would like to find out and infect a node having the highest spreading power.
In large-scale networks, it is infeasible to collect the entire network to
identify the top influential nodes. This motivates us to propose local infor-
mation based methods for identifying top nodes without having the global
information like network size, average degree, the highest h2 − index of the
network, and so on. Researchers have proposed various sampling-based meth-
ods to estimate global properties of the network like network size [75], global
clustering coefficient [76], average degree [77], degree distribution of the net-
work [78], and so on.
In this work, we have shown that the influential power of a node can be
computed using its h2 − index, i.e. a local measure. For a given node, even
if we compute its h2 − index locally, we do not know how influential this
node is in the entire network, and whether this node belongs to the highest
influential nodes or not. In [79], Gupta et al. proposed Hill-Climbing based
methods that can be used to hit the highest shell-index nodes faster in a
network. In the proposed method, a random walker starts from a periphery
node and move to one of its neighbors having the highest shell-index until
a top node is found. The proposed method cannot be applied in practice
as the shell-index is a global centrality measure, but the results showed that
the proposed hill climbing walk hit the top nodes in a very small number of
steps.
In this work, we have shown that the influential power of a node can
be computed using its h2 − index, i.e., a local measure. We modify the
proposed methods to identify the node having the highest h2 − index in
In rest of the discussion, the top-ranked nodes refer to the
the network.
nodes having the highest h2 − index in the network. The algorithm is called
IndexBasedHillClimbing(G, u, k, maxindex), and its pseudo code is given
in Algorithm 2. The inputs of the algorithm are G, u, k, and maxindex
where G is the given network, u is the seed node from which the crawler
16
(a) Astro-Ph Collaboration Network
(b) FB-Wall Social Interaction Network
Figure 4: The correlation of shell-Index and h2 − index with the spreading
power for varying infection probability on a. Astro-Ph and b. FB-Wall
network
17
starts crawling the network, k is the repeat-count that shows how many
times the crawler will restart the walk from a randomly chosen neighbor
of the current node if it is stuck to a local maxima, and maxindex is the
maximum h2 − index in the given network. A node is called local maxima if
its h2−index is higher than all of its neighbors. The nodes having the highest
h2 − index in the network are called global maxima. For the clarification, a
local maxima can also be the global maxima.
The algorithm works in the following manner. The crawler starts from
the given node u, and it moves to one of its neighbors that has not been
visited before and has the highest h2 − index. The crawler keeps moving
until it hits the local maxima. If this node has the highest h2 − index, the
algorithm exits, else, the crawler jumps to one of its non-visited neighbors
uniformly at random, and the repeat-count is increased by one. The same
procedure is repeated until the highest h2 − index node is identified or the
repeat-count reaches its maximum value. If the algorithm reaches to maxi-
mum repeat-count without finding out the highest h2−index node, it returns
"The algorithm is failed to find out the top-ranked node." In Algorithm 2,
ngh(u) represents a set of all neighbors of node u. randomchoice(set) func-
tion returns a random element from the given set.
The proposed method is further modified as shown in Algorithm 3 named
In this method,
IndexAndDegreeBasedHillClimbing(G, u, k, maxindex).
the crawler will move to one of the highest degree nodes among the non-
visited neighbors having the highest h2 − index. Beside this, there is one
more change; once the algorithm stuck to local maxima, the crawler moves
to one of its non-visited neighbors having the highest degree.
Intuitively
it seems that the highest degree node will have a high probability to be
connected with the top-ranked nodes, and so, this algorithm will work faster
and better than the first one.
Discussion
We implement the proposed methods on real-world networks, and the results
are shown in Table 2. In the experiments, the algorithm is executed from
all non top-ranked nodes (the nodes not having the highest h2 − index),
and the number of steps taken to hit a top-ranked node are averaged to
compute the average number of steps. In experiments, the value of repeat-
count (k) is set to 50. In Table 2, the average and the standard deviation of
the number of steps are shown in Avg(steps) and Std(steps) columns. The
18
Algorithm 2 IndexBasedHillClimbing(G, u, k, maxindex)
Take a list visited nodes and visited nodes = [ ]
num of steps = 0
repeat count = 0
current node = u
next node = u
add u in visited nodes
f lag = T rue
while f lag == T rue do
for each v in ngh(current node) do
if h2−index(v) ≥ h2−index(next node) and v /∈ visited nodes then
next node = v
end if
end for
if next node == current node then
if h2 − index(next node) == maxindex then
else if repeat count < k then
f lag = F alse
next node = randomchoice({v v ∈ ngh(current node) and v /∈
visited nodes})
repeat count = repeat count + 1
else
Print "The algorithm is failed to find out the top-ranked node."
f lag = F alse
end if
end if
if f lag == T rue then
add next node in visited nodes
current node = next node
num of steps = num of steps + 1
end if
end while
Return h2 − index(current node)
19
Algorithm 3 IndexAndDegreeBasedHillClimbing(G, u, k, maxindex)
Take a list visited nodes and visited nodes = [ ]
num of steps = 0
repeat count = 0
current node = u
next node = u
add u in visited nodes
f lag = T rue
while f lag == T rue do
for each v in ngh(current node) do
if h2−index(v) ≥ h2−index(next node) and v /∈ visited nodes then
next node = v
end if
end for
for each v in ngh(current node) do
if h2 − index(v) == h2 − index(next node) and deg(v) ≥
deg(next node) and v /∈ visited nodes then
next node = v
end if
end for
if next node == current node then
if h2 − index(next node) == maxindex then
f lag = F alse
else if repeat count < k then
for each v in ngh(current node) do
if deg(v) ≥ deg(next node) and v /∈ visited nodes then
next node = v
end if
end for
repeat count = repeat count + 1
else
Print "The algorithm is failed to find out the top-ranked node."
f lag = F alse
end if
end if
if f lag == T rue then
add next node in visited nodes
current node = next node
num of steps = num of steps + 1
end if
20
end while
Return h2 − index(current node)
Avg(count) shows the average of the number of repeat-count that algorithm
takes when it is stuck to a local maxima. The Algo F ailed(%) shows how
many times the algorithm has not succeeded to hit the top-ranked node in
the given repeat-count. The algorithm might succeed if we increase the value
of repeat-count.
The results show that on an average, a top-ranked node can be reached in
very few steps (3-213 in the considered datasets), and the average value of the
repeat-count is 0-10. The algorithm is failed in very few cases for the repeat-
count 50. In the case of IndexAndDegreeBasedHillClimbing(G, u, k, maxindex)
algorithm, the average number of steps and the average repeat-count is re-
duced but the probability of failing the algorithm is increased in the given
repeat-count as the crawler always moves to higher degree nodes and ends
up following the same path that leads to the local maxima. In DBLP net-
work, the probability of failure is much higher when we apply degree based
hill-climbing approach as the algorithm is mostly stuck to a local maxima
due to following the same route and not able to hit the global maxima in the
given repeat-count. This highly depends on the network structure and not
on its size.
When we apply these algorithms in practice, we do not know the highest
h2 − index (maxindex), the algorithms, therefore, will have to be repeated
few more times to make sure that the node returned by the algorithm is
the actual global maxima and not the local maxima. The results show that
a smaller value of repeat − count will suffice the purpose. To increase the
efficiency, the crawlers can be started from a few randomly chosen nodes to
avoid the local maxima and hit the top-ranked nodes with a high probability.
The proposed methods can be further improved by only computing the
h2 − index of the neighbors that can be considered for the next step of the
crawler instead of computing the h2 − index of all of its neighbors. A node
having the degree lower than the h2 − index of the current node cannot have
the h2 − index higher than the current node, so, all such neighbors can be
discarded. This further fastens up the proposed method.
We also observe that in all considered real-world networks, the induced
subgraph of all the top-ranked nodes (the highest h2 − index nodes) is con-
nected. So, once we hit one top node, all top nodes can be identified. All
these nodes can be used to spread the information faster in the network.
21
2:
Table
IndexAndDegreeBasedHillClimbing algorithms
Network
IndexBasedHillClimbing
Results
Nodes
for
IndexBasedHillClimbing
and
Avg
Std
Avg
Algo
IndexAndDegreeBasedHillClimbing
Avg
Algo
Avg
Std
(steps)
(steps)
(count) F ailed(%)
(steps)
(steps)
(count) F ailed(%)
Astro-Ph
Buzznet
Cond-Mat
DBLP
Digg
Enron
Facebook
FB-Wall
Foursquare
Gowalla
14845
101163
13861
317080
261489
84384
63392
43953
639014
196591
8.66
3.20
15.55
213.13
4.09
5.08
6.06
9.04
10.84
4.33
9.82
0.69
15.46
84.89
1.50
0.97
1.90
4.48
0.38
4.17
0.37
0.00
2.27
9.79
0.02
0.00
0.30
0.59
0.00
0.15
1.21
0.00
1.39
5.45
0.03
0.00
0.00
0.00
0.00
0.02
5.70
3.20
9.95
118.76
4.03
5.07
5.99
8.65
10.84
3.92
1.40
0.69
4.88
5.34
0.85
0.93
1.80
4.12
0.38
1.32
0.00
0.00
0.18
0.00
0.00
0.00
0.31
0.48
0.00
0.03
3.27
0.00
11.58
79.60
0.15
0.04
0.02
0.04
0.00
0.22
6 Section 3: Rank Estimation of a Node
In this section, we employ structural behavior of h2 − index to propose a
fast rank estimation method. We observe that the curve of percentile rank
versus h2 − index follows a unique pattern in all the considered real-world
networks as shown in Figure 5. The percentile rank of a node is computed as
∗ 100, where n is the network size and R(u)
P ercentileRank(u) = n−R(u)+1
is the rank of node u based on its h2− index value in the given network. The
study of this curve shows the 4-parameter logistic equation to be a best fit.
The equation of the curve is given as,
n
P ercentileRank(u) = a2 +
(cid:16) h2−index(u)
a1 − a2
(cid:17)p ,
x0
1 +
(1)
where a1, a2, x0, and p are parameters, and p denotes slope of the logistic
curve (also called hill's slope).
The plots are shown in Figure 5, where black colored circles depict the
actual percentile rank of the nodes, and the red colored triangles show the
best-fit curve using the 4-parameter logistic equation. The best fit curve is
plotted using scaled Levenberg-Marquardt algorithm [80] with 1000 iterations
and 0.0001 tolerance. It can be concluded from the plots that the logistic
equation can be used to estimate the percentile rank of a node. Once we
estimate the parameters of the equation, the percentile rank of a node can be
22
computed in O(1) time without computing the index values of all the nodes.
This approach is similar to the heuristic method proposed for estimating the
closeness rank of a node.
Estimating Parameters of the Logistic Curve: We estimate the
parameters of the logistic curve by analyzing the curves for different networks.
The estimated value of a parameter x is represented by x(cid:48). In the logistic
curve, a2 is close to the highest rank value, so, it can be estimated as, a(cid:48)
2 =
100. The value of a1 is close to the minimum percentile rank. Using this
observation, we estimate a(cid:48)
1 = 1 and plots show that the estimated curve
is close to the best fit. The value of p is computed by averaging the slopes
of the considered datasets using the estimated value of a1 and a2. Table 3
shows p values using the estimated parameters (a1 = 1 and a2 = 100) and
their average is 1.44, so p(cid:48) = 1.44. x0 is computed using scaled Levenberg-
Marquardt algorithm [80] for implementation, and its better estimator can
be further proposed.
Table 3: Networks versus their p values using the estimated values of a1 and
a2
Network
Astro-Ph
Buzznet
Cond-Mat
DBLP
Digg
p value Network
p value
1.49
1.26
2.44
2.08
0.91
Enron
Facebook
FB-Wall
Foursquare
Gowalla
Average
0.90
1.37
1.56
0.97
1.40
1.44
Discussion
The percentile rank of a node is estimated using equation 1, so,
Estimated P ercentileRank(u) = a(cid:48)
(cid:19)p(cid:48) . The plots for the
2 +
(cid:18)
actual rank, best-fit rank, and estimated rank are shown in Figure 5. To
measure the accuracy of the proposed method, we compute absolute error
(Actual P ercentile Rank−Computed P ercentile Rank) for each h2−index
value and find their average. The average error and standard deviation for
2
1−a(cid:48)
a(cid:48)
x(cid:48)
0
h2−index(u)
1+
23
the estimated rank using the best-fit and estimated parameters are shown in
Table 4. We further compute Kendall's Tau (τ ), Pearson (r), and Spearman
(ρ) correlation coefficients for the actual versus estimated ranks using the
best-fit and estimated parameters. The results are shown in Table 5 with
the values rounded off by two decimal places. The results show that the
logistic curve can be efficiently used to estimate the percentile rank. The
percentile rank can be converted to actual rank if the network size or its
estimated value is known. However, we have considered the percentile rank
as it gives a complete idea about the relative rank of the node.
Table 4: Absolute error for percentile ranking using best-fit and estimated
curve
Estimated
Network
Best-Fit
Avg. Error Std. Dev Avg. Error Std. Dev
Astro-Ph
Buzznet
Cond-Mat
DBLP
Digg
Enron
Facebook
Fb-Wall
Foursquare
Gowalla
0.36
5.73
0.64
0.18
0.36
0.57
6.58
0.65
1.54
0.19
0.28
6.13
0.39
0.14
0.29
0.31
5.62
0.43
1.46
0.12
1.96
1.73
6.92
2.83
0.95
1.48
2.66
2.43
2.02
0.64
1.02
1.91
2.86
2.05
1.31
1.74
1.66
0.88
3.01
0.51
7 Conclusion
In this work, we have shown that h2−index is a good estimator of shell-index
and can be used to identify influential nodes in real-world networks. We also
observed that h2 − index has better monotonicity than the shell-index and
has better correlation with the spreading power of the nodes. We further
proposed hill-climbing based methods to identify the top-ranked nodes. The
results show that a top-ranked node can be found in a small number of
steps. We also observed that the induced subgraph of all the top-ranked
nodes is connected and once we find one top node, all the top nodes can be
identified. A mathematical bound for estimating the number of steps to hit
24
(a) Astro-Ph
(b) Buzznet
(c) Cond-Mat
(d) DBLP
(e) Digg
(f) Enron
(g) Facebook
(h) FB-Wall
25
(i) Foursquare
(j) Gowalla
Figure 5: Percentile Rank versus h2 − index
Table 5: Correlation coefficients for percentile ranking using best-fit and
estimated curve
Estimated
Network
Best-Fit
Kendall Pearson Spearman Kendall Pearson Spearman
Astro-Ph
Buzznet
Cond-Mat
DBLP
Digg
Enron
Facebook
Fb-Wall
Foursquare
Gowalla
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
0.83
1.00
1.00
0.99
0.99
0.88
1.00
0.96
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
0.99
0.99
0.99
0.94
0.93
0.99
0.99
0.92
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
a top node in a given scale-free network can be further proposed. In the last
section, we discussed a heuristic method to estimate the percentile rank of a
node. The accuracy of the proposed method is computed using the absolute
error and correlation coefficients. One can further propose better methods
for estimating the parameters of the logistic curve which will improve the
accuracy of the rank estimation.
Acknowledgement: Authors would like to thank IIT Ropar HPC com-
mittee for providing the resources for performing the experiments.
References
[1] Stephen P Borgatti and Martin G Everett. Models of core/periphery
structures. Social networks, 21(4):375 -- 395, 2000.
[2] Shai Carmi, Shlomo Havlin, Scott Kirkpatrick, Yuval Shavitt, and Eran
Shir. A model of internet topology using k-shell decomposition. Proceed-
ings of the National Academy of Sciences, 104(27):11150 -- 11154, 2007.
[3] Stephen B Seidman. Network structure and minimum degree. Social
networks, 5(3):269 -- 287, 1983.
26
[4] Vladimir Batagelj and Matjaz Zaversnik. Fast algorithms for deter-
mining (generalized) core groups in social networks. Advances in Data
Analysis and Classification, 5(2):129 -- 145, 2011.
[5] Maksim Kitsak, Lazaros K Gallos, Shlomo Havlin, Fredrik Liljeros, Lev
Muchnik, H Eugene Stanley, and Hern´an A Makse.
Identification of
influential spreaders in complex networks. Nature physics, 6(11):888 --
893, 2010.
[6] Akrati Saxena, SRS Iyengar, and Yayati Gupta. Understanding spread-
ing patterns on social networks based on network topology. In Advances
in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM
International Conference on, pages 1616 -- 1617. IEEE, 2015.
[7] Sen Pei and Hern´an A Makse. Spreading dynamics in complex net-
Journal of Statistical Mechanics: Theory and Experiment,
works.
2013(12):P12002, 2013.
[8] Sen Pei, Lev Muchnik, Jos´e S Andrade Jr, Zhiming Zheng, and Hern´an A
Makse. Searching for superspreaders of information in real-world social
media. Scientific reports, 4:5547, 2014.
[9] Ahmad Zareie and Amir Sheikhahmadi. A hierarchical approach for
influential node ranking in complex social networks. Expert Systems
with Applications, 93:200 -- 211, 2018.
[10] Zhixiao Wang, Ya Zhao, Jingke Xi, and Changjiang Du. Fast rank-
ing influential nodes in complex networks using a k-shell iteration fac-
tor. Physica A: Statistical Mechanics and its Applications, 461:171 -- 181,
2016.
[11] An Zeng and Cheng-Jun Zhang. Ranking spreaders by decomposing
complex networks. Physics Letters A, 377(14):1031 -- 1035, 2013.
[12] Marvin E Shaw. Some effects of unequal distribution of information
upon group performance in various communication nets. Journal of
abnormal and social psychology, 49(4):547 -- 553, 1954.
[13] Jorge E Hirsch. An index to quantify an individual's scientific research
output. Proceedings of the National academy of Sciences of the United
States of America, pages 16569 -- 16572, 2005.
27
[14] Duanbing Chen, Linyuan Lu, Ming-Sheng Shang, Yi-Cheng Zhang, and
Tao Zhou. Identifying influential nodes in complex networks. Physica
a: Statistical mechanics and its applications, 391(4):1777 -- 1787, 2012.
[15] Gert Sabidussi. The centrality index of a graph. Psychometrika,
31(4):581 -- 603, 1966.
[16] Linton C Freeman. A set of measures of centrality based on betweenness.
Sociometry, pages 35 -- 41, 1977.
[17] Karen Stephenson and Marvin Zelen. Rethinking centrality: Methods
and examples. Social Networks, 11(1):1 -- 37, 1989.
[18] Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertex-
tual web search engine in: Seventh international world-wide web con-
ference (www 1998), april 14-18, 1998, brisbane, australia. Brisbane,
Australia, 1998.
[19] Yayati Gupta, Akrati Saxena, Debarati Das, and SRS Iyengar. Modeling
memetics using edge diversity. In Complex Networks VII, pages 187 -- 198.
Springer, 2016.
[20] Antonios Garas, Frank Schweitzer, and Shlomo Havlin. A k-shell de-
composition method for weighted networks. New Journal of Physics,
14(8):083030, 2012.
[21] Marius Eidsaa and Eivind Almaas. s-core network decomposition: A
generalization of k-core analysis to weighted networks. Physical Review
E, 88(6):062819, 2013.
[22] Bo Wei, Jie Liu, Daijun Wei, Cai Gao, and Yong Deng. Weighted
k-shell decomposition for complex networks based on potential edge
weights. Physica A: Statistical Mechanics and its Applications, 420:277 --
283, 2015.
[23] Jian-Guo Liu, Zhuo-Ming Ren, and Qiang Guo. Ranking the spreading
influence in complex networks. Physica A: Statistical Mechanics and its
Applications, 392(18):4154 -- 4159, 2013.
[24] Ying Liu, Ming Tang, Tao Zhou, and Younghae Do.
Improving the
accuracy of the k-shell method by removing redundant links: From a
perspective of spreading dynamics. Scientific reports, 5:13172, 2015.
28
[25] Bonan Hou, Yiping Yao, and Dongsheng Liao. Identifying all-around
nodes for spreading dynamics in complex networks. Physica A: Statis-
tical Mechanics and its Applications, 391(15):4012 -- 4017, 2012.
[26] Pavlos Basaras, Dimitrios Katsaros, and Leandros Tassiulas. Detect-
ing influential spreaders in complex, dynamic networks. Computer,
46(4):0024 -- 29, 2013.
[27] Joonhyun Bae and Sangwook Kim. Identifying and ranking influential
spreaders in complex networks by neighborhood coreness. Physica A:
Statistical Mechanics and its Applications, 395:549 -- 559, 2014.
[28] Nikolaj Tatti and Aristides Gionis. Density-friendly graph decompo-
sition.
In Proceedings of the 24th International Conference on World
Wide Web, pages 1089 -- 1099. International World Wide Web Confer-
ences Steering Committee, 2015.
[29] Rong-Hua Li, Jeffrey Xu Yu, and Rui Mao. Efficient core maintenance in
large dynamic graphs. Knowledge and Data Engineering, IEEE Trans-
actions on, 26(10):2453 -- 2465, 2014.
[30] Paul Jakma, Marcin Orczyk, Colin S Perkins, and Marwan Fayed. Dis-
In Proceedings of
tributed k-core decomposition of dynamic graphs.
the 2012 ACM conference on CoNEXT student workshop, pages 39 -- 40.
ACM, 2012.
[31] Katerina Pechlivanidou, Dimitrios Katsaros, and Leandros Tassiulas.
Mapreduce-based distributed k-shell decomposition for online social net-
works. In Services (SERVICES), 2014 IEEE World Congress on, pages
30 -- 37. IEEE, 2014.
[32] Alberto Montresor, Francesco De Pellegrini, and Daniele Miorandi. Dis-
tributed k-core decomposition. Parallel and Distributed Systems, IEEE
Transactions on, 24(2):288 -- 300, 2013.
[33] Naga Shailaja Dasari, Ranjan Desh, and Mohammad Zubair. Park: An
efficient algorithm for k-core decomposition on multicore processors. In
Big Data (Big Data), 2014 IEEE International Conference on, pages
9 -- 16. IEEE, 2014.
29
[34] Ahmet Erdem Sar´ıyuce, Bugra Gedik, Gabriela Jacques-Silva, Kun-
Lung Wu, and Umit V C¸ atalyurek. Streaming algorithms for k-core
decomposition. Proceedings of the VLDB Endowment, 6(6):433 -- 444,
2013.
[35] Linyuan Lu, Tao Zhou, Qian-Ming Zhang, and H Eugene Stanley. The
h-index of a network node and its relation to degree and coreness. Nature
communications, 7, 2016.
[36] Roberto Catini, Dmytro Karamshuk, Orion Penner, and Massimo Ric-
caboni. Identifying geographic clusters: A network analytic approach.
Research policy, 44(9):1749 -- 1762, 2015.
[37] Daniel Fricke and Thomas Lux. Core -- periphery structure in the
overnight money market: evidence from the e-mid trading platform.
Computational Economics, 45(3):359 -- 395, 2015.
[38] Paolo Barucca and Fabrizio Lillo. Disentangling bipartite and core-
periphery structure in financial networks. Chaos, Solitons & Fractals,
88:244 -- 253, 2016.
[39] Danielle S Bassett, Nicholas F Wymbs, M Puck Rombach, Mason A
Porter, Peter J Mucha, and Scott T Grafton. Task-based core-periphery
organization of human brain dynamics. PLoS computational biology,
9(9):e1003171, 2013.
[40] Hae-Jeong Park and Karl Friston. Structural and functional brain net-
works: from connections to cognition. Science, 342(6158):1238411, 2013.
[41] Nivedita Chatterjee and Sitabhra Sinha. Understanding the mind of a
worm: hierarchical network structure underlying nervous system func-
tion in c. elegans. Progress in brain research, 168:145 -- 153, 2007.
[42] Darko Obradovic and Stephan Baumann. A journey to the core of the bl-
ogosphere. In Social Network Analysis and Mining, 2009. ASONAM'09.
International Conference on Advances in, pages 1 -- 6. IEEE, 2009.
[43] Loet Leydesdorff, Caroline Wagner, Han Woo Park, and Jonathan
International collaboration in science: The global map and
Adams.
the network. arXiv preprint arXiv:1301.0801, 2013.
30
[44] Clark Hu and Pradeep Racherla. Visual representation of knowledge
networks: A social network analysis of hospitality research domain. In-
ternational Journal of Hospitality Management, 27(2):302 -- 312, 2008.
[45] Feng Luo, Bo Li, Xiu-Feng Wan, and Richard H Scheuermann. Core and
periphery structures in protein interaction networks. In Bmc Bioinfor-
matics, volume 10, page S8. BioMed Central, 2009.
[46] Kevin Crowston, Kangning Wei, Qing Li, and James Howison. Core and
periphery in free/libre and open source software team communications.
In System Sciences, 2006. HICSS'06. Proceedings of the 39th Annual
Hawaii International Conference on, volume 6, pages 118a -- 118a. IEEE,
2006.
[47] Chintan Amrit and Jos Van Hillegersberg. Exploring the impact of socio-
technical core-periphery structures in open source software development.
journal of information technology, 25(2):216 -- 229, 2010.
[48] Pankaj Setia, Balaji Rajagopalan, Vallabh Sambamurthy, and Roger
Calantone. How peripheral developers contribute to open-source soft-
ware development. Information Systems Research, 23(1):144 -- 163, 2012.
[49] Marcelo Cataldo and James D Herbsleb. Communication networks in
geographically distributed software development. In Proceedings of the
2008 ACM conference on Computer supported cooperative work, pages
579 -- 588. ACM, 2008.
[50] Gino Cattani, Simone Ferriani, and Paul D Allison. Insiders, outsiders,
and the struggle for consecration in cultural fields: A core-periphery
perspective. American Sociological Review, 79(2):258 -- 281, 2014.
[51] Evelina Fedorenko and Sharon L Thompson-Schill. Reworking the lan-
guage network. Trends in cognitive sciences, 18(3):120 -- 126, 2014.
[52] John C Paolillo. Structure and network in the youtube core. In Hawaii
International Conference on System Sciences, Proceedings of the 41st
Annual, pages 156 -- 156. IEEE, 2008.
[53] Jing Zhao, Guo-Hui Ding, Lin Tao, Hong Yu, Zhong-Hao Yu, Jian-Hua
Luo, Zhi-Wei Cao, and Yi-Xue Li. Modular co-evolution of metabolic
networks. BMC bioinformatics, 8(1):311, 2007.
31
[54] Vishesh Karwa, Michael J Pelsmajer, Sonja Petrovi´c, Despina Stasi,
Dane Wilburne, et al. Statistical models for cores decomposition of an
undirected random graph. Electronic Journal of Statistics, 11(1):1949 --
1982, 2017.
[55] Akrati Saxena and SRS Iyengar. Evolving models for meso-scale struc-
tures. In Communication Systems and Networks (COMSNETS), 2016
8th International Conference on, pages 1 -- 8. IEEE, 2016.
[56] Ralucca Gera, Ryan Miller, Akrati Saxena, Miguel MirandaLopez, and
Scott Warnke. Three is the answer: Combining relationships to analyze
multilayered terrorist networks. In Proceedings of the 2017 IEEE/ACM
International Conference on Advances in Social Networks Analysis and
Mining 2017, pages 868 -- 875. ACM, 2017.
[57] Ryan Miller, Ralucca Gera, Akrati Saxena, and Tanmoy Chakraborty.
Discovering and leveraging communities in dark multi-layered networks
for network disruption. In 2018 IEEE/ACM International Conference
on Advances in Social Networks Analysis and Mining (ASONAM), pages
1152 -- 1159. IEEE, 2018.
[58] Oludare Adeniji, David S Cohick, Ralucca Gera, Victor G Castro, and
Akrati Saxena. A generative model for the layers of terrorist networks.
In Proceedings of the 2017 IEEE/ACM International Conference on Ad-
vances in Social Networks Analysis and Mining 2017, pages 690 -- 697.
ACM, 2017.
[59] Akrati Saxena and SRS Iyengar. Global rank estimation. arXiv preprint
arXiv:1710.11341, 2017.
[60] Akrati Saxena, Vaibhav Malik, and SRS Iyengar. Rank me thou shalln't
compare me. arXiv preprint arXiv:1511.09050, 2015.
[61] Akrati Saxena, Vaibhav Malik, and SRS Iyengar. Estimating the degree
centrality ranking of a node. arXiv preprint arXiv:1511.05732, 2015.
[62] Akrati Saxena, Ralucca Gera, and SRS Iyengar. Observe locally rank
globally. In Proceedings of the 2017 IEEE/ACM International Confer-
ence on Advances in Social Networks Analysis and Mining 2017, pages
139 -- 144. ACM, 2017.
32
[63] Akrati Saxena, Ralucca Gera, and SRS Iyengar. Degree ranking using
local information. arXiv preprint arXiv:1706.01205, 2017.
[64] Akrati Saxena, Ralucca Gera, and SRS Iyengar. Estimating degree rank
in complex networks. Social Network Analysis and Mining, 8(1):42,
2018.
[65] Akrati Saxena, Ralucca Gera, and SRS Iyengar. Fast estimation of
closeness centrality ranking.
In Proceedings of the 2017 IEEE/ACM
International Conference on Advances in Social Networks Analysis and
Mining 2017, pages 80 -- 85. ACM, 2017.
[66] Akrati Saxena, Ralucca Gera, and SRS Iyengar. A faster method to
estimate closeness centrality ranking. arXiv preprint arXiv:1706.02083,
2017.
[67] Claudio Castellano and Romualdo Pastor-Satorras. Thresholds for epi-
demic spreading in networks. Physical review letters, 105(21):218701,
2010.
[68] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. Graph evolution:
Densification and shrinking diameters. ACM Transactions on Knowledge
Discovery from Data (TKDD), 1(1):2, 2007.
[69] R. Zafarani and H. Liu. Social computing data repository at ASU, 2009.
[70] Jaewon Yang and Jure Leskovec. Defining and evaluating network com-
munities based on ground-truth. Knowledge and Information Systems,
42(1):181 -- 213, 2015.
[71] Tad Hogg and Kristina Lerman. Social dynamics of digg. EPJ Data
Science, 1(1):1 -- 26, 2012.
[72] Bryan Klimt and Yiming Yang. The enron corpus: A new dataset for
email classification research. In Machine learning: ECML 2004, pages
217 -- 226. Springer, 2004.
[73] Bimal Viswanath, Alan Mislove, Meeyoung Cha, and Krishna P Gum-
madi. On the evolution of user interaction in facebook. In Proceedings of
the 2nd ACM workshop on Online social networks, pages 37 -- 42. ACM,
2009.
33
[74] Eunjoon Cho, Seth A Myers, and Jure Leskovec. Friendship and mobil-
ity: user movement in location-based social networks. In Proceedings of
the 17th ACM SIGKDD international conference on Knowledge discov-
ery and data mining, pages 1082 -- 1090. ACM, 2011.
[75] Maciej Kurant, Carter T Butts, and Athina Markopoulou. Graph size
estimation. arXiv preprint arXiv:1210.0460, 2012.
[76] Stephen J Hardiman and Liran Katzir. Estimating clustering coeffi-
cients and size of social networks via random walk. In Proceedings of
the 22nd international conference on World Wide Web, pages 539 -- 550.
International World Wide Web Conferences Steering Committee, 2013.
[77] Anirban Dasgupta, Ravi Kumar, and Tamas Sarlos. On estimating the
average degree. In Proceedings of the 23rd international conference on
World wide web, pages 795 -- 806. ACM, 2014.
[78] Bruno Ribeiro and Don Towsley. On the estimation accuracy of degree
In Decision and Control (CDC),
distributions from graph sampling.
2012 IEEE 51st Annual Conference on, pages 5240 -- 5247. IEEE, 2012.
[79] Yayati Gupta, Debarati Das, and SRS Iyengar. Pseudo-cores: The ter-
minus of an intelligent viral meme's trajectory. In Complex Networks
VII, pages 213 -- 226. Springer, 2016.
[80] Jorge J Mor´e. The levenberg-marquardt algorithm: implementation and
theory. In Numerical analysis, pages 105 -- 116. Springer, 1978.
34
|
1910.06052 | 1 | 1910 | 2019-10-14T11:44:06 | Altering control modes of complex networks based on edge removal | [
"cs.SI",
"eess.SY",
"eess.SY",
"physics.soc-ph"
] | Controlling a complex network is of great importance in many applications. The network can be controlled by inputting external control signals through some selected nodes, which are called input nodes. Previous works found that the majority of the nodes in dense networks are either the input nodes or not, which leads to the bimodality in controlling the complex networks. Due to the physical or economic constraints of many real control scenarios, altering the control mode of a network may be critical to many applications. Here we develop a graph-based algorithm to alter the control mode of a network. The main idea is to change the control connectivity of nodes by removing carefully selected edges. We rigorously prove the correctness of our algorithm and evaluate its performance on both synthetic and real networks. The experimental results show that the control mode of a network can be easily changed by removing few selected edges. Our methods provide the ability to design the desired control mode for different control scenarios, which may be useful in many applications. | cs.SI | cs | Altering control modes of complex networks based on edge removal
Xizhe Zhang1,2*, Qian Li1
1 (School of Computer Science and Engineering, Northeastern University, Shenyang, Liaoning, China)
2 (Joint Laboratory of Artificial Intelligence and Precision Medicine of China Medical University and Northeastern
University, Shenyang, Liaoning, China)
Abstract: Controlling a complex network is of great importance in many applications. The network can
be controlled by inputting external control signals through some selected nodes, which are called input
nodes. Previous works found that the majority of the nodes in dense networks are either the input nodes
or not, which leads to the bimodality in controlling the complex networks. Due to the physical or
economic constraints of many real control scenarios, altering the control mode of a network may be
critical to many applications. Here we develop a graph-based algorithm to alter the control mode of a
network. The main idea is to change the control connectivity of nodes by removing carefully selected
edges. We rigorously prove the correctness of our algorithm and evaluate its performance on both
synthetic and real networks. The experimental results show that the control mode of a network can be
easily changed by removing few selected edges. Our methods provide the ability to design the desired
control mode for different control scenarios, which may be useful in many applications.
Keyword: complex network; structural controllability; control modes; edge removal; input nodes
1. Introduction
The control of the complex networked systems is of great importance in many applications. Recent
developments about structural controllability of complex networks1-3 have attracted much attention.
Considerable research efforts have been devoted to analyzing control principle of various real-world
networks. For example, network controllability has been used to analyzing the interbank loan network4,5,
finding the underlying mechanism of human brain network6-8, identifying disease genes9-13 and finding
drug target13-15.
A network is said to be controllable if its state can be controlled from an initial state to a desired
final state in finite time2. The nodes used to input the external control signals are called actuator nodes,
and the actuator nodes that do not share input signals are called driver nodes16-21. The minimum set of
driver nodes is called Minimum Driver nodes Set (MDS). Previous works22 found that the MDS can be
obtained by the maximum matching (the maximum edges set which do not share nodes) of the network.
Based on this framework, Liu et.al18 applied the structural controllability theory to the complex networks
and found that the size of the MDS is closely related to the degree distribution of the networks. Ruths
et.al23,24 further investigated the formation of the MDS and found that MDS is mainly composed of the
source nodes and the sink nodes of the control path. Menichetti et.al25 found the size of the MDS is mainly
determined by the number of the low in-degree nodes, especially those with one or two in-degree.
For most of the real networks, the maximum matching is usually not unique because of their
structural complexity. Therefore, there may exist many MDSs which can fully control the network16,19.
According to the participation of the nodes in all MDSs, a node is called an input node if it appears in at
least one MDS. Otherwise, it is called redundant node. By using above control type of nodes, many works
have been done to investigate the types of nodes in control. For example, input nodes can be used for
identifying critical regulatory genes26, finding cancer-associated genes20, identifying novel disease genes
and potential drug targets9,10,13.
Previous work19 found an interesting bimodality phenomenon in dense networks, which is that the
majority of the nodes must be either input nodes or redundant nodes. This leads to two control modes of
complex networks, centralized and distributed control19. For the networks with centralized control, most
of the nodes are redundant nodes, which means the selection of driver nodes are very limited. For the
networks with distributed control, most of the nodes are input nodes, which suggests that there are many
available options to input the external control signals into the network. Different control modes may have
different practical applications, for example, distributed control mode may improve the resilience to
control the network yet induce potential security risk19. Although our previous work16 provides a method
to alter the control modes by adding edges, we still do not know how to alter the control mode by
removing edges. Therefore, it is of great practical significance to investigate how to design or alter the
control mode of a network.
Here we present an efficient method to alter the control mode of a network by removing edges. The
method we presented here is motived by our previous findings that the input nodes and redundant nodes
are connected by the alternating paths, respectively16. We prove that by altering the control type of few
selected nodes, the control mode of a network can be easily changed. The experimental results on
synthetic and real networks show the efficiency of our algorithm. Comparing other strategies such as
adding edges17 or reversing the direction of edges19, the strategy of removing edges may be more feasible
in many applications. For example, when controlling the biological network such as protein-protein
interaction networks9, it is impractical or difficult to add new interaction between proteins. However,
removing edges can be easily done by inhibiting the signals transmitted between proteins.
2. Structural controllability and maximum matching
Consider a linear time-invariant network G(V, E), its dynamics can be described by the following
equation:
'
( )
x t
=
+
( )
Ax t
( )
Bu t
(1)
where the state vector x(t)=(x1(t), …, xN(t))T denotes the value of N nodes in the network at time t, A is
the transpose of the adjacency matrix of the network, B is the input matrix that defines how control
signals are input to the network, and u(t)=(u1(t), …, uH(t))T represents the H input signals at time t. To
analyze the controllability of the directed network, we need to convert the directed network to an
undirected bipartite graph. The bipartite graph is built by splitting the node set V into two node sets V-
and V+, where a node n in G is converted to two nodes n- and n+ in B. The nodes n- and n+ are, respectively,
connected to the in-edges and out-edges of node n.
Next, we introduce some concepts about maximum matching. A set of edges is called a matching if
no two edges in the matching share common nodes. The edges belong to a matching are called matched
edges. A node is said to be matched if there is a matched edge linked to the node; Otherwise, the node is
unmatched. The unmatched nodes in V+ are called unsaturated nodes, and the unmatched nodes in V- are
called driver nodes. A path is said to be an alternating path if the edges of the path are alternately in and
not in the matching. An alternating path that begins and ends on the unmatched nodes is called
augmenting path. A maximum matching is a matching with the maximum number of edges. According
to the structural controllability theory, for any maximum matching of the network, the set of unmatched
nodes in V- is called Minimum Driver nodes Set (MDS), which can be used to control the network.
Because maximum matching is not unique for most networks, there may exist numerous MDSs in
a network. A node is called an input node if it appears in at least one MDS. Otherwise, we call it as a
redundant node. Figure 1 shows a simple network with its maximum matching and the node
classification. Input nodes and redundant nodes are not evenly distributed in the networks. Previous
works19 found that in some dense networks, the majority of nodes of a network are either input nodes or
redundant nodes. This bifurcation phenomenon leads to two control modes of the networks: centralized
control and distributed control. For networks with distributed control, most of the nodes are input nodes.
For the networks with centralized control, most of the nodes are redundant nodes. Therefore, to alter the
control modes of a network, we need to change the control type of most of the nodes of a network.
Figure.1 A simple network and its node classification. (A). a simple network and one of its maximum
matching (red edges). We show its driver nodes (shaded in blue) and matched nodes (shaded in red); (B).
The bipartite graph of the network. Each node of the original directed network are split into two nodes,
which connected to in and out edges, respectively; (C). Input nodes and redundant nodes of the network.
The blue nodes are redundant nodes, and the green nodes are input nodes. The input nodes {1, 2} can be
reached by driver nodes {3, 7} through alternating paths. The redundant nodes {4, 5, 6} cannot be reached
by any input nodes.
3. From distributed control to centralized control
First, we introduce how to change a network from distributed control to centralized control. This is
equivalent to altering the control type of most of the nodes from input nodes to redundant nodes. Our
previous work16 found that a node is an input node if and only if it can be reached by an alternating path
from a driver node; otherwise, it is a redundant node. Figure 1C give an example of input nodes and their
connectivity. For example, the input nodes 1 and 2 can be reached by driver nodes 3 and 7 through
alternating paths. However, the redundant nodes 4, 5 and 6 cannot be reached by any driver node through
any alternating path. The detailed theorem is as follows:
Property 1: For any MDS D and a driver node n∊D, all nodes of C(n) must be input nodes, where
C(n) is the set of all nodes which can be reached from node n through any alternating path.
Property 2: For any MDS D, if node m cannot be reached by any alternating path start from any
driver node of D, then m must be a redundant node and never appears in any MDS.
Because the input nodes are connected to driver nodes by alternating paths, we can define connected
components based on the alternating path, which are called control components. Based on above
properties, we now present a new theorem for altering a connected component which only contains input
nodes to the component only contains redundant nodes:
contains at least one driver node, all nodes of the set 𝐶"=𝐶−(𝐶∩𝐷) are redundant nodes of network
Theorem 1: For a network G(V, E) and one of its MDS D, consider a control component C, which
Proof: Based on property 1, the input nodes are connected to at least one driver nodes by alternating
paths. Therefore, if we disconnect all the driver nodes from the alternating paths, the input nodes will be
G'(V, E'), where 𝐸"=𝐸−𝑒+,(𝐶∩𝐷).
turned into redundant nodes. The easiest way is to remove all in-edges 𝑒+,(𝐶∩𝐷) of the driver nodes.
Because driver node are unmatched nodes, therefore, all edges of 𝑒+,(𝐶∩𝐷) are unmatched. Therefore,
removing the edges 𝑒+,(𝐶∩𝐷) will not change the maximum matching. For new network G'(V, E'),
any driver node of D cannot reached the nodes set 𝐶"=𝐶−(𝐶∩𝐷) by any alternating paths. Based
on property 2, all node of set 𝐶"=𝐶−(𝐶∩𝐷) are redundant nodes. The proof is complete.
Figure 2 gives an example subgraph of the whole network for altering input nodes to redundant
nodes. By removing the in-edge e(2,5) of driver node 5, the input nodes 3 and 4 of the original network
are changed into redundant nodes in the new network. Because we only remove the unmatched edges
from the network, the MDS D of original network G(V, E) is also an MDS of G'(V, E'). It means that the
control schemes of the network will not change even after changing the control mode of the network. It
is one of the advantages of our algorithm.
Figure 2 Illustration of altering input nodes to redundant nodes. By removing the in-edge of driver node
5, the input nodes 3 and 4 are changed into redundant nodes.
Based on the theorem 1, we designed an efficient algorithm to alter the control mode of a network.
The basic idea of the algorithm is to first find the largest connected component of input nodes based on
alternating paths and disconnected the driver nodes from the connected component. The above idea and
steps are formulated in Algorithm 1 for altering a network from distributed control to centralized control.
Input: Network G(V, E);
Find a maximum matching M of G; let the nodes set without matched in-edges be D;
find all alternating paths start from node i;
let Pi be the set of nodes which have even distance to node i on these alternating paths;
end
Algorithm 1: Altering a network from distributed control to centralized control
1.
2. Output: removed edges set Re
3.
4.
5.
6.
7.
8.
9.
10. end
for each i∈D do
for each pair i≠j do
if 𝑃+∩𝑃1≠∅ then 𝑃+=𝑃1∪𝑃+, 𝑃1=∅;
11. Let the largest nodes set be Pmax and 𝐷4=𝑃567∩𝐷;
𝑅9=𝑅9∪𝑒+,(𝑛+);
for each node ni in Dp do
12.
13.
14. end
15. Output: removed edges set Re.
4. From centralized control to distributed control
Next, we show how to change a network from centralized control to distributed control. This is
equivalent to alter the control type of most nodes from redundant nodes to input nodes. Based on property
2, the redundant nodes cannot be reached by any alternating path start from any driver nodes. Therefore,
to alter the control type of redundant nodes, we need to change some matched nodes to driver nodes.
That can be done by removing carefully selected edges from the alternating paths which start from the
redundant nodes.
The edges of an alternating path are alternately in and not in a maximum matching. If the matching
is maximum, the alternating paths must be connected to at most one unmatched node. Therefore, there
are three possible cases for the alternating paths: case 1 (Figure 3A): alternating path with odd length,
where the path starts with a matched node and end with an unmatched node; case 2 (Figure 3B):
alternating cycles, where the alternating path form a cycle; case 3 (Figure 3C): alternating path with odd
length, where the start and end nodes are both matched;
Figure 3 shows the results when removing a matched edge from an alternating path. For case 1, if
we remove a matched edge, the alternating path will be even length. For case 2, if we remove a matched
edge, the alternating cycle will turn into alternating paths with even length. However, the type of nodes
within the alternating cycle remains unchanged. For case 3, if we remove a matched edge, there will exist
a driver node in the alternating path, which makes all nodes on this path be the input nodes based on
property 1.
Figure 3 Three cases when removing a matched edge from a network. (A). Case 1: alternating paths
with an odd length. If we remove a matched edge, the alternating path will be even length; (B). Case2:
alternating cycles. If we remove a matched edge, the alternating cycle will turn into alternating paths
with even length; (C). Case 3: alternating paths with even length. If we remove a matched edge, there
will exist a driver node in the alternating path, which makes all nodes on this path be the input nodes;
Therefore, to change a network from centralized control to distributed control, we need to first find
the largest connected components of redundant nodes and change the control type of the nodes. The basic
idea is first to break the cycles and remove the unmatched nodes in alternating paths, and change a
matched node to driver node by removing its matched edge. Therefore, the other redundant nodes which
connected by the driver node will be changed to input nodes. The above idea and steps are formulated in
Algorithm 2 for altering a network from centralized control to distributed control.
Algorithm 2: Altering a network from centralized control to distributed control
1.
2. Output: removed edges set Re
3.
4.
5.
6.
7.
find all alternating paths start from node i;
let Pi be the set of nodes which have even distance to node i on these alternating paths;
end
//detach all unmatched nodes from redundant nodes
Find a maximum matching M of G; let the nodes set without matched out-edges be U;
Input: Network G(V, E);
for each i∈U do
for each pair i≠j do
8.
for each node ni in Up do
12.
13.
14. end
if 𝑃+∩𝑃1≠∅, let 𝑃+=𝑃1∪𝑃+, 𝑃1=∅;
11. Find the largest nodes set Pmax; Let 𝑈4=𝑃567∩𝑈;
𝑅9=𝑅9∪𝑒<=>(𝑛+);
for each cj∈Ci do
select one matched edge ej∈cj; 𝑅9=𝑅9∪𝑒1;
for each node n in 𝑃567 do
23. Find the largest nodes set Hk, let its matched edge is ek, let 𝑅9=𝑅9∪𝑒?;
//remove cycles
find all alternating cycles Ci of Pmax;
// remove one matched edge
9.
10. end
15.
16.
17.
18. end
19.
20.
21.
22. end
find all alternating paths start from node n;
let Hi be the set of nodes which have odd distance to node n on these alternating paths;
24. Output: removed edges set Re.
5. Results
To investigate the efficiency of our methods, we constructed a series of networks based on scale-
free network model27. The power exponent of in-degree distribution and out-degree distribution are
γin=γout=3. The average degree <k> is from 5 to 40 with increment 0.1. For each <k>, we generated 100
random instances. Therefore, there are total 35,000 network instances used to evaluate the methods.
First, we computed the percentage of driver nodes ND (Figure 4A), the percentage of input nodes ID
(Figure 4B), the size of the maximum connected component of input nodes (Figure 4C) and the size of
the maximum connected component of redundant nodes (Figure 4D) for each network. With the increase
of the average degree of the networks, we can observe that the percentage of driver nodes monotonically
decreased (Figure.4A), indicating the denser networks are easier controlled. However, the percentage of
input nodes exhibited a bifurcation phenomenon, indicating that for the dense network, most nodes are
either input nodes or redundant nodes (Figure.4B). Furthermore, these nodes are connected by alternating
paths and constitute the large connected components (Figure 4C-4D). Therefore, to alter the control
modes of the network, we only need to change the type of the maximum connected component of nodes.
Figure.4 Percentage of driver nodes and input nodes of Scale-free networks with γin=γout=3. A.
percentage of driver nodes ND versus average degree; B. percentage of input nodes ID versus average
degree; C. percentage of maximum connected component of input nodes versus average degree; D.
percentage of maximum connected component of redundant nodes versus average degree.
Next, we evaluated the performance of our algorithms. Figure.5A shows an example for changing
a network from distributed mode to centralized mode. By removing only 11 edges, almost all input nodes
of the original network are changed to redundant nodes. For more complex networks, our algorithms are
still efficient to change the control modes of the networks. For networks with different average degrees,
we computed the percentage of removed edges and the changed input nodes after removing these edges.
Figure 5B shows that with the increase of k, very few removed edges can significant changed the type of
most input nodes. For example, for dense networks (k>11), only 0.5% removed edges can change the
type of nearly 80% nodes. For sparse networks (k<8), we can still change almost 30% nodes with less
than 8% edges. Note that the number of input nodes of these networks is also small (ID<0.4, Figure 6B),
which means that our algorithm can change many input nodes even in sparse networks. Furthermore, we
evaluated the efficiency of our algorithm by computing the percentage of changed input nodes per
removed edge ΔnD/p. Figure 5C shows that ΔnD/p increases rapidly with the average degree k, which
indicates that it is easier to change the control mode for dense networks. Above results are rooted that in
the dense networks, most nodes are connected by the alternating paths and form a large connected
component (Figure 4C-4D), that means to alter the unmatched nodes of a connected component will also
alter the other nodes of the connected set. Therefore, the larger the connected component is, the easier
networks are changed. For the networks with centralized modes, the results are similar (Figure 6).
Although the algorithm needs more steps to change from centralized control to distributed control, the
resulted are not significantly increased. Therefore, we can also easily change a network from centralized
modes to distributed modes.
Figure 5 Changing a network from distributed control to centralized control. A. an example network
with distributed control. By removing 11 edges (green edges), most nodes are changed to redundant
nodes. B. percentage of removed edges versus percentage of the altered input node. C. number of altered
input nodes per edges. The networks we used are generated by scale-free networks model with degree
exponents γin=γout=3, N=104 and average degree <k>∈[5,25]. For each <k>, we generate 100 networks.
Figure 6 Changing a network from centralized control to distributed control. A. an example network
with distributed control. By removing 4 edges (green edges), most nodes are changed to redundant nodes.
B. percentage of removed edges versus percentage of the altered input node. C. number of altered input
nodes per edges. The networks we used are generated by scale-free networks model with degree
exponents γin=γout=3, N=104 and average degree <k>∈[5,25]. For each <k>, we generate 100 networks.
Next, we evaluated the performance of our algorithms on real networks. These networks are selected
based on their diversity of topological structure, including biological networks, social networks, and
technical networks. For each network, we show its type, name, number of nodes (N) and edges (L),
density of driver nodes nMDS, size and type of the largest connected component CCmax, in which I, R
denote input components and redundant components respectively, the proportion of edges (p) that is
removed from the network to change the type of CCmax and the density of changed input nodes (ΔnD)
after removing edges. The detailed results are listed in Table.1. For networks with the large connected
components, we can change their control modes by removing very few edges. For example, for Amazon
co-purchasing network, only 2% removed edges can change 80% or more input nodes of the network.
However, for some networks with the small connected components, such as s208a, s420a, s838a, it is
hard to change their control types. The reason may root that the size of connected components of these
networks is on average small; therefore altering the maximum connected components is not enough to
change the control mode of the networks. In this case, we need to remove more edges to change the
control mode of the networks.
Table 1. Results for real networks. For each network, we show its type, name, number of nodes (N) and
edges (L), density of driver nodes nMDS, size and type of the largest control component CCmax, in which
I, M denote Input set and Matched set respectively, the proportion of edges (p) that is removed from the
network to change the type of CCmax and the density of changed driver nodes (ΔnD) after removing edges.
Type
Food Web
Name
StMarks
Mangrove
Silwood
Prison inmate
N
54
97
154
67
L
356
1492
370
182
<k>
13.19
nMDS
CCmax
p
ΔnD
24.07%
38.89%(R)
10.39%
62.96%
30.76
22.68%
55.67%(I)
5.63%
34.02%
4.81
75.32%
84.42%(I)
75.14%
14.29%
5.43 13.43%
59.70%(R)
6.59%
64.18%
Trust
Slashdot0902
82168
948464
23.09 4.55%
91.23%(I)
9.27%
86.68%
WikiVote
7115
103689
29.15 66.56%
32.12%(R)
22.69%
25.76%
s208a
s420a
s838a
122
252
512
189
399
819
3.10 23.77%
17.21%(I)
6.35%
3.17 23.41%
9.13%(I)
3.20 23.24%
5.27%(I)
3.51%
2.20%
4.10%
1.98%
0.98%
ArXiv-HepTh
27770
352807
25.41 21.58%
48.96%(R)
4.56%
57.61%
SciMet
Google
p2p-1
p2p-2
p2p-3
3084
10416
6.75
37.48%
52.14%(I)
20.32%
29.83%
875713
5105039
11.66
36.95%
60.80%(I)
4.20%
10.37%
10876
8846
8717
46
39994
31839
31525
7.35 55.20%
90.58%(I)
49.92%
35.85%
7.20 57.78%
90.55%(I)
50.82%
34.69%
7.23 57.74%
91.75%(I)
50.85%
35.41%
879
38.22 4.35%
97.83%(I)
3.53%
93.48%
Electronic
circuits
Citation
Internet
Organizational
Consulting
Social
communication
Product co-
purchasing
Social network
UClonline
1899
20296
21.38 32.33%
79.94%(I)
11.87%
49.55%
Amazon0302
262111
1234877
9.42
3.23%
49.55%(R)
1.41%
74.78%
Amazon0312
400727
3200440
15.97 3.52%
83.61%(R)
0.21%
81.52%
Amazon0505
410236
3356824
16.37 3.62%
91.35%(I)
0.92%
87.78%
Amazon0601
403394
3387388
16.79 2.04%
75.90%(R)
1.33%
90.65%
twitter_combined
81306
1768149
43.49 19.39%
79.40%(I)
3.03%
60.36%
Facebook_0
Facebook_107
Facebook_348
347
1912
572
5038
29.04
5.48%
86.46%(R)
0.04%
81.84%
53498
55.96
45.92%
54.08%(R)
0.00%
53.24%
6384
22.32
61.01%
38.64%(R)
0.03%
38.29%
Finally, we apply our algorithms to human Protein-Protein Interaction (PPI) network. Previous
works28 have found that some redundant nodes of PPI network are related to cancer genes and drug
targets. Altering the control type of these nodes may play an important role in the transition from healthy
to disease states. We used a directed human PPI network29 which contains 6,339 proteins and 34,813
interactions. The PPI network has 3707 input nodes and 2631 redundant nodes, therefore, the control
mode of the network are distributed control. We used algorithm 1 to change the network from distributed
control to centralized control. After removing 11.8% (4108 of 34813) edges, the redundant nodes are
increased from 2631 to 4011, which means the control mode of the new network is centralized control.
The detailed list of removed edges can be found in the supplemental material. Furthermore, by comparing
online databases such as Online Mendelian Inheritance in Man (OMIM) (omim.org), we found that most
of the removed edges are related to disease genes. For example, 48.3% (1986 of 4108) removed edges
have two nodes related to disease genes, and 40.8% (1675 of 4108) edges have one node related to disease
genes. This may provide us a new way to understand the underlying principle of healthy state and disease
state of PPI network.
6. Conclusion
Controlling complex networks is of great importance in many applications. How to change the
control modes of complex networks is important in many real control scenarios. There may exist several
ways to modify the topological structure of complex networks, such as add or remove nodes and edges,
reverse the direction of edges. In many real networks, removing edges may be feasible because it can be
done by simply blocking the signals in the edges.
Here we present a novel algorithm to alter the control mode of a network based on edge removal.
The main idea is to alter the connectivity of nodes in control based on edge removal. One advantage of
our algorithm is that when we alter a network from distributed control to centralized control, the control
schemes of the network will not change. We evaluated the performance of our algorithms in both
synthetic and real networks, the results showed that the control mode of the denser network can be easily
changed by removing very few carefully selected edges. Furthermore, for human Protein-Protein
Interaction (PPI) network, we found that most of the removed edges are related to the disease genes,
which provide us a new way to understand the underlying principle between healthy state and disease
state.
These findings will improve our understanding of the control principles of complex networks and
may be useful in various real control scenarios.
Acknowledgments
Supported by the Natural Science Foundation of China under grant number 60093009, 91546110.
Author Contributions
X.-Z.Z. designed research wrote the paper and analyzed the data. Q.L. performed the experiments.
All authors reviewed the manuscript.
Additional Information
The authors declare no competing financial interests. Correspondence and requests for materials
should be addressed to X.-Z.Z. (Email: [email protected])
References
[1] Lin, C.-T. Structural controllability. IEEE Transactions on Automatic Control 19, 201-208 (1974).
[2] Kalman, R. E. Mathematical description of linear dynamical systems. Journal of the Society for
Industrial and Applied Mathematics, Series A: Control 1, 152-192 (1963).
[3] Luenberger, D. Introduction to dynamic systems: theory, models, and applications.(1979).
[4] Delpini, D. et al. Evolution of controllability in interbank networks. Scientific reports 3, 1626 (2013).
[5] Razakanirina, R. M. & Chopard, B. Risk analysis and controllability of credit market. ESAIM:
Proceedings and Surveys 49, 91-101 (2015).
[6] Kumar, A., Vlachos, I., Aertsen, A. & Boucsein, C. Challenges of understanding brain function by
selective modulation of neuronal subpopulations. Trends in neurosciences 36, 579-586 (2013).
[7] Gu, S. et al. Controllability of structural brain networks. Nature communications 6 (2015).
[8] Tang, E. & Bassett, D. S. Control of Dynamics in Brain Networks. ArXiv preprint 1701.01531 (2017 ).
[9] Wuchty, S. Controllability in protein interaction networks. Proceedings of the National Academy of
Sciences 111, 7156-7160 (2014).
[10] Amand, M. M. S., Tran, K., Radhakrishnan, D., Robinson, A. S. & Ogunnaike, B. A. Controllability
analysis of protein glycosylation in CHO cells. PloS one 9, e87973 (2014).
[11] Zhang, X.-F., Ou-Yang, L., Zhu, Y., Wu, M.-Y. & Dai, D.-Q. Determining minimum set of driver
nodes in protein-protein interaction networks. BMC bioinformatics 16, 146 (2015).
[12] Ishitsuka, M., Akutsu, T. & Nacher, J. C. Critical controllability in proteome-wide protein interaction
network integrating transcriptome. Scientific reports 6 (2016).
[13] Vinayagam, A. et al. Controllability analysis of the directed human protein interaction network
identifies disease genes and drug targets. Proc Natl Acad Sci U S A 113, 4976-4981,
doi:10.1073/pnas.1603992113 (2016).
[14] Asgari, Y., Salehzadeh-Yazdi, A., Schreiber, F. & Masoudi-Nejad, A. Controllability in cancer
metabolic networks according to drug targets as driver nodes. PLoS One 8, e79397 (2013).
[15] Wu, L., Shen, Y., Li, M. & Wu, F.-X. Network output controllability-based method for drug target
identification. IEEE transactions on nanobioscience 14, 184-191 (2015).
[16] Zhang, X., Lv, T. & Pu, Y. Input graph: the hidden geometry in controlling complex networks.
Scientific reports 6 (2016).
[17] Zhang, X., Wang, H. & Lv, T. Efficient target control of complex networks based on preferential
matching. PloS one 12, e0175375 (2017).
[18] Liu, Y.-Y., Slotine, J.-J. & Barabási, A.-L. Controllability of complex networks. Nature 473, 167-
173 (2011).
[19] Jia, T. et al. Emergence of bimodality in controlling complex networks. Nature communications 4
(2013).
[20] Liu, X. & Pan, L. Identifying driver nodes in the human signaling network using structural
controllability analysis. IEEE/ACM Transactions on Computational Biology and Bioinformatics
(TCBB) 12, 467-472 (2015).
[21] Liu, Y.-Y. & Barabási, A.-L. Control principles of complex systems. Reviews of Modern Physics 88,
035006 (2016).
[22] Murota, K. Matrices and matroids for systems analysis. Vol. 20 (Springer Science & Business Media,
(2009).
[23] Ruths, J. & Ruths, D. Control profiles of complex networks. Science 343, 1373-1376 (2014).
[24] Campbell, C., Ruths, J., Ruths, D., Shea, K. & Albert, R. Topological constraints on network control
profiles. Scientific reports 5 (2015).
[25] Menichetti, G., Dall'Asta, L. & Bianconi, G. Network controllability is determined by the density
of low in-degree and out-degree nodes. Physical review letters 113, 078701 (2014).
[26] Ravindran, V., Sunitha, V. & Bagler, G. Identification of critical regulatory genes in cancer signaling
network using controllability analysis. Physica A: Statistical Mechanics and its Applications 474,
134-143 (2017).
[27] Goh, K.-I., Kahng, B. & Kim, D. Universal behavior of load distribution in scale-free networks.
Physical Review Letters 87, 278701 (2001).
[28] A. Vinayagam, T. E. Gibson, H. J. Lee, B. Yilmazel, C. Roesel, Y. Hu, Y. Kwon, A. Sharma, Y. Y.
Liu, N. Perrimon, and A. L. Barabasi, Controllability analysis of the directed human protein
interaction network identifies disease genes and drug targets, Proc Natl Acad Sci U S A, vol. 113, no.
18, pp. 4976-81, May 03, 2016.
[29] A. Vinayagam, U. Stelzl, R. Foulle, S. Plassmann, M. Zenkner, J. Timm, H. E. Assmus, M. A.
Andradenavarro, and E. E. Wanker, A directed protein interaction network for investigating
intracellular signal transduction, Science Signaling, vol. 4, no. 189, pp. rs8-rs8, 2011.
[30] C. Knox, V. Law, T. Jewison, P. Liu, S. Ly, A. Frolkis, A. Pon, K. Banco, C. Mak, and V. Neveu,
DrugBank 3.0: a comprehensive resource for 'omics' research on drugs, Nucleic acids research, vol.
39, no. suppl 1, pp. D1035-D1041, 2011.
|
1907.09668 | 1 | 1907 | 2019-07-23T03:03:11 | Efficient Approximation Algorithms for Adaptive Seed Minimization | [
"cs.SI",
"cs.DS"
] | As a dual problem of influence maximization, the seed minimization problem asks for the minimum number of seed nodes to influence a required number $\eta$ of users in a given social network $G$. Existing algorithms for seed minimization mostly consider the non-adaptive setting, where all seed nodes are selected in one batch without observing how they may influence other users. In this paper, we study seed minimization in the adaptive setting, where the seed nodes are selected in several batches, such that the choice of a batch may exploit information about the actual influence of the previous batches. We propose a novel algorithm, ASTI, which addresses the adaptive seed minimization problem in $O\Big(\frac{\eta \cdot (m+n)}{\varepsilon^2}\ln n \Big)$ expected time and offers an approximation guarantee of $\frac{(\ln \eta+1)^2}{(1 - (1-1/b)^b) (1-1/e)(1-\varepsilon)}$ in expectation, where $\eta$ is the targeted number of influenced nodes, $b$ is size of each seed node batch, and $\varepsilon \in (0, 1)$ is a user-specified parameter. To the best of our knowledge, ASTI is the first algorithm that provides such an approximation guarantee without incurring prohibitive computation overhead. With extensive experiments on a variety of datasets, we demonstrate the effectiveness and efficiency of ASTI over competing methods. | cs.SI | cs |
Efficient Approximation Algorithms for Adaptive
Seed Minimization∗
Jing Tang†
Keke Huang†
Dept. of Ind. Syst. Engg. and Mgmt.
National University of Singapore
School of Comp. Sci. and Engg.
Nanyang Technological University
[email protected]
[email protected]
Xiaokui Xiao
School of Computing
National University of Singapore
[email protected]
Laks V.S. Lakshmanan
Department of Computer Science
University of British Columbia
[email protected]
Xueyan Tang
Engineering
School of Computer Science and
School of Computer Science and
Nanyang Technological University
Nanyang Technological University
[email protected]
[email protected]
Aixin Sun
Engineering
Andrew Lim
Dept. of Ind. Syst. Engg. and Mgmt.
National University of Singapore
[email protected]
ABSTRACT
As a dual problem of influence maximization, the seed min-
imization problem asks for the minimum number of seed
nodes to influence a required number η of users in a given
social network G. Existing algorithms for seed minimiza-
tion mostly consider the non-adaptive setting, where all seed
nodes are selected in one batch without observing how they
may influence other users.
(cid:16) η·(m+n)
(cid:17) expected time and
In this paper, we study seed minimization in the adaptive
setting, where the seed nodes are selected in several batches,
such that the choice of a batch may exploit information about
the actual influence of the previous batches. We propose a
novel algorithm, ASTI, which addresses the adaptive seed
minimization problem in O
ln n
offers an approximation guarantee of
(1−(1−1/b)b)(1−1/e)(1−ε)
in expectation, where η is the targeted number of influenced
nodes, b is size of each seed node batch, and ε ∈ (0, 1) is a
user-specified parameter. To the best of our knowledge, ASTI
is the first algorithm that provides such an approximation
guarantee without incurring prohibitive computation over-
head. With extensive experiments on a variety of datasets,
we demonstrate the effectiveness and efficiency of ASTI over
competing methods.
(ln η+1)2
ε2
∗A short version of the paper appeared in 2019 International Conference
on Management of Data (SIGMOD '19), June 30 -- July 5, 2019, Amsterdam,
Netherlands. ACM, New York, NY, USA, 18 pages. https://doi.org/10.1145/
3299869.3319881
†These authors have contributed equally to this work.
1
CCS CONCEPTS
• Information systems → Data mining; Social advertising;
Social networks; • Theory of computation → Probabilistic
computation; Submodular optimization and polymatroids.
KEYWORDS
Seed Minimization; Sampling; Approximation Algorithm
1 INTRODUCTION
Social networks are becoming increasingly popular for peo-
ple to discuss and share their thoughts and comments to-
wards public topics. Based on the established relations among
individuals, ideas and opinions can be spread over social net-
works via a word-of-mouth effect. To exploit this effect for
advertising, advertisers often provide free samples of their
products to selected social network users, in exchange for
those users to promote those products and create a cascade of
influence to other users. In such a setting, advertisers might
want to know the minimum number of free samples required
to be given away, so as to draw sufficient attention. Goyal et
al. [19] are the first to formulate this problem as a seed min-
imization problem, which asks for the minimum number
of seed nodes (i.e., users who receive free samples) needed
to influence at least a required number η of users, taking
into account the randomness in the influence propagation
process.
Existing work on seed minimization mostly focuses on the
non-adaptive setting [19, 22, 47], which requires that all seed
nodes should be selected in one batch without observing
Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
the actual influence of any node, i.e., no randomness in the
influence propagation process can be removed until all seed
nodes are fixed. As a consequence of the non-adaptiveness,
these solutions may return a seed set that fails to influence
at least η nodes in the actual propagation process, or may
select an excessive number of seed nodes that generate an
actual influence spread much larger than required.
To address the above issues, Vaswani and Laksh-
manan [42] propose to consider seed minimization under the
adaptive setting, where (i) the seed nodes are selected one by
one, and (ii) before selecting the i-th seed node, the actual
influence of the first i −1 seed nodes can be observed, i.e., we
may optimize the choice of the i-th seed node to influence
those users that have not been influenced by the previous
i − 1 seed nodes. Such an adaptive strategy ensures that (i)
the seed set returned always achieves the required number
of influenced users (since the actual influence of each seed
node is known after selection), and (ii) the number of seed
nodes would not be excessive (because we can stop selecting
seed nodes as soon as the targeted influence is achieved). We
note that similar adaptive approaches have also been adopted
by other practical problems, such as influence maximization
[46], sensor placement [2], active learning [10], and object
detection [11].
To our knowledge, the only existing solution for adaptive
seed minimization is by Vaswani and Lakshmanan [42]. As
we discuss in Section 2.4, however, the solution in [42] re-
quires that the expected influence of any seed set should be
estimated with extremely high accuracy, which results in
prohibitive computation overhead. Furthermore, the solution
does not provide any non-trivial approximation guarantee,
due to an ineffective approach used to select each seed node
under the adaptive setting. Therefore, it remains an open
problem to devise efficient approximation algorithms for
adaptive seed minimization.
In this paper, we address the above open problem with
ASTI, a novel framework tailored for adaptive seed mini-
mization. The key idea of ASTI is to adaptively choose the
seed node with the maximum expected truncated influence
spread in each round of seed selection. Specifically, given
a diffusion model M that captures the uncertainty of influ-
ence propagation in G, we consider the set Ω of all possible
realizations, each of which represents a possible scenario
of influence propagation among the nodes in G. For each
possible realization ϕ ∈ Ω, the influence spread of a seed
set S, denoted as Iϕ(S) is the number of nodes influenced
by S, while the truncated influence spread of S is defined
as Γϕ(S) = min{η, Iϕ(S)}. We consider Γϕ(S) instead of Iϕ(S)
because, intuitively, the extra influence spread beyond η is
useless for fulfilling the requirement on influence. (In fact,
as we show in Section 2.4, the extra influence spread may
2
even lead to incorrect choice of seed nodes, and hence, it has
to be ignored.)
When developing algorithms under the ASTI framework,
the key challenge that we face is the design of methods to ac-
curately estimate a seed set S's expected truncated influence
spread over a given set of possible realizations. We show
that existing methods [5, 25, 33, 37, 40, 41] for estimating
un-truncated influence spread cannot be applied in our trun-
cated setting, since they are unable to take into account the
effect of truncation by η. Motivated by this, we propose a
novel sampling method based on the concept of multi-root
reverse reachable (mRR) sets, and prove that our method pro-
vides non-trivial guarantees in terms of the efficiency and
accuracy of truncated influence estimation. Building upon
this sampling method, we develop TRIM, an algorithm for
maximizing truncated influence spread with a provable ap-
proximation guarantee of (1 − 1/e)(1 − ε). We show that
instantiating ASTI using TRIM leads to strong theoretical
guarantees for adaptive seed minimization, and TRIM can be
extended into a batched version TRIM-B that selects a batch
of b nodes in each round, so as to accelerate seed selection.
In summary, we make the following contributions:
• ASTI, a general framework. We analyze the charac-
teristics of adaptive seed minimization, based on which
we propose a general framework ASTI tailored for the
problem.
• mRR-set, a novel sampling method. ASTI requires
accurate estimation of truncated influence spreads, for
which the existing sampling methods are either ineffi-
cient or ineffective. To address this challenge, we pro-
pose a novel sampling method, mRR, which is able to es-
timate the truncated influence spread in a cost-effective
manner.
• TRIM, an efficient algorithm for truncated influ-
ence maximization. A key step of ASTI is to identify
a set of nodes with the maximum expected truncated
influence spread, for which we propose the TRIM algo-
rithm based on mRR-sets. With a rigorous theoretical
analysis, we show that ASTI instantiated by TRIM re-
(ln η+1)2
turns a
(1−1/e)(1−ε)-approximate solution for adaptive
seed minimization with expected time complexity of
• TRIM-B, the batched version of TRIM. For further
performance gain, we extend TRIM into a batched
version TRIM-B that selects seed nodes in a prede-
fined batch size b in each round. ASTI instantiated
by TRIM-B provides an approximation guarantee of
(1−(1−1/b)b)(1−1/e)(1−ε) with the same time complexity as
TRIM.
(ln η+1)2
O(cid:0) η·(m+n)
ε2
ln n(cid:1).
Efficient Approximation Algorithms for Adaptive Seed Minimization
Table 1: Frequently used notations.
Notation
G = (V , E)
n, m
η
I(S), E[I(S)]
Γ(S), E[Γ(S)]
Gi = (Vi , Ei)
ni , mi
ηi
I(S Si−1)
Γ(S Si−1)
Γ(S Si−1)
R, R
ΛR(v)
v∗, v⋄, v◦
OPTi
ϕ, Φ, Ω
π , π∗
Description
a graph G with node set V and edge set E
the number of nodes and edges in G
the threshold for the targeted number of nodes
to be activated
the spread of a seed set S and its expectation
the truncated spread of S and its expectation
the i-th residual graph, where G1 = G
the number of nodes and edges in Gi
the shortfall in activating η nodes in the i-th
round, i.e., ηi = η − (n − ni)
the marginal spread of S on top of Si−1, i.e., the
spread of S in Gi
the marginal truncated spread of S on top of
Si−1, i.e., Γ(S Si−1) = min{I(S Si−1), ηi}
a binary estimator with value ηi if S ∩ R (cid:44) ∅
and 0 otherwise
a random mRR-set and a set of mRR-sets
the number of mRR-sets in R covered by v
the optimal node maximizing ΛR(v), E[ Γ(v
Si−1)], and E[Γ(v Si−1)], respectively
the optimum of E[ Γ(v Si−1)], i.e., OPTi =
maxv E[ Γ(v Si−1)]
a specific realization, a random realization, and
the realization space
a random policy, and an optimal policy
• An extensive set of experiments. We experimentally
evaluate ASTI instantiated by TRIM and TRIM-B against
the state-of-the-art non-adaptive algorithm ATEUC [22],
and show that (i) our solutions are much more effective
in minimizing the number of seed nodes needed and
ensuring that the required influence spread is achieved,
and (ii) our solutions are able to efficiently handle social
networks with millions of nodes and edges.
2 PRELIMINARIES
This section formally defines the problem of adaptive seed
minimization, and reviews the existing solutions. Table 1
summarizes the notations that are frequently used. For ease
of exposition, our discussions focus on the independent cas-
cade (IC) model [27], which is one of the most widely adopted
propagation models in the literature. But we note that our al-
gorithms can be easily extended to other propagation models,
such as the linear threshold model [27] and the topic-aware
models [4].
2.1 Influence Propagation and Realization
Let G be a social network with a node set V and a directed
edge set E, where V = n and E = m. For any edge ⟨u, v⟩ ∈
E, we refer to u as an incoming neighbor of v, and v as an
3
outgoing neighbor of u. Each edge e = ⟨u, v⟩ is associated
with a propagation probability p(e) ∈ (0, 1]. We refer to such
a social network as a probabilistic social network.
Given a node set S ⊆ V , the influence propagation initiated
by S under the independent cascade (IC) model [27] is modeled
as a discrete-time stochastic process as follows. At time slot
t0 (the subscript indicates the index of the time slot), all
nodes in S are activated while all other nodes are inactive.
Suppose that node u is first activated at slot ti, then u has
one chance to activate each outgoing neighbor v with the
probability p(u, v) at slot ti +1, after which u remains active.
This influence propagation process continues until no more
inactive nodes can be activated. As to the linear threshold (LT)
model, it demands that for each node v ∈ G, the propagation
probabilities of all edges ending at v sum up to no more
than 1. With a given node set S, LT model works in a similar
discrete-time stochastic procedure as follows. At time slot
t0, each node v ∈ G is assigned with a threshold λv sampled
uniformly from [0, 1], and only nodes in S are activated. At
time slot ti, we check all inactive node u of its incoming edges
from activated neighbors that if the sum of their propagation
probabilities is no smaller than λu. If it is, then u is activated;
otherwise u remains inactive. This influence propagation
process terminates once there is no further node activated.
Let I(S) be the total number of active nodes in G when the
influence propagation terminates. We refer to S as the seed
set, and I(S) as the spread of S.
Alternatively, the influence propagation process can also
be described by the live edge procedure [27]. Specifically, for
each edge e ∈ E, we independently flip a coin of head proba-
bility p(e) to decide whether the edge e is live or blocked to
generate a sample of influence propagation. All the blocked
edges are removed and the remaining graph is referred to as
a realization of the probabilistic social network G, denoted as
ϕ. Note that there are 2m distinct possible realizations. Let Ω
be the set of all possible realizations (i.e., the sample space)
such that Ω = 2m, and Φ ∼ Ω denote that Φ is a realization
randomly sampled from Ω. Given a realization ϕ ∈ Ω, the
spread of any seed set S ⊆ V under ϕ is the total number of
nodes that are reachable from S, denoted as Iϕ(S). Thus, for
any seed set S, its expected spread E[I(S)] is defined as
E[I(S)] := EΦ∼Ω[IΦ(S)] =
where p(ϕ) is the probability for realization ϕ to occur. In
other words, the expected spread of S is the (weighted) aver-
age spread over all the realizations in Ω.
2.2 Adaptive Seed Minimization
Given a probabilistic social network G = (V , E) and a thresh-
old η ∈ [1, n], the seed minimization problem aims to select a
minimum number of seed nodes to influence at least η nodes.
Iϕ(S) · p(ϕ),
(1)
ϕ∈Ω
Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
(a) A social graph G
(b) A possible realization ϕ
(c) v1 as the first seed
Figure 1: An adaptive seed minimization process.
(d) v3 as the second seed
In the conventional "non-adaptive" setting, seed minimiza-
tion requires selecting a node set S such that E[I(S)] ≥ η,
without any knowledge of realization that would occur in the
actual influence propagation process. As a consequence, the
selected S may influence fewer than η nodes for some realiza-
tions or much more than η nodes for some other realizations,
both of which are undesirable scenarios.
Meanwhile, the adaptive strategy (i.e., a recursive select-
observe-select procedure) has been shown to be more effective
than the non-adaptive (i.e., just select based on model) strat-
egy in many real-world applications [2, 10, 11]. Specifically,
an adaptive strategy first selects a node u from graph G, and
then observes the set of nodes activated by choosing node u
as a seed node. Based on this observation, the strategy would
choose the next node as one that could influence as many
currently inactive nodes as possible. This procedure is carried
out in an recursive manner, until at least η active nodes are
observed.
Figure 1 illustrates the adaptive strategy. Figures 1(a) and
1(b) show a social graph G and one possible realization ϕ
of G, respectively. Let η = 4 and ϕ be the actual realization
of influence propagation (which is unknown apriori). Fig-
ure 1(c) indicates that we first select node v1 (in dark gray) as
a seed node. Note that node v1 influences nodes v4 and v6 (in
light gray), with each bold (resp. dashed) arrow denoting a
successful (resp. failed) step of influence. In addition, the thin
arrows in Figures 1(c) -- 1(d) correspond to influence attempts
which are not yet revealed. Since the number of nodes influ-
enced by v1 is less than η, we continue to select the second
seed node. Figure 1(d) shows that we select v3, which results
in a total of 5 active nodes, reaching the threshold η. Then,
the adaptive seed selection process terminates.
In this paper, we aim to study seed selection strategies
(referred to as policies) for adaptive seed minimization (ASM),
which is formally defined as follows:
Definition 2.1 (Adaptive Seed Minimization). Given a prob-
abilistic social graph G = (V , E) and a threshold η ∈ [1, n],
the adaptive seed minimization problem aims to identify a
policy π that minimizes the expected number of seed nodes
required to achieve an influence spread of at least η on pos-
sible realizations ϕ ∈ Ω, i.e.,
E[S(π , ϕ)] subject to Iϕ(S(π , ϕ)) ≥ η for all ϕ,
min
π
ϕ and E[S(π , ϕ)] =
where S(π , ϕ) is the seed set selected by π under realization
ϕ∈ΩS(π , ϕ) · p(ϕ).
Note that when the propagation probability of every edge
in G is 1, ASM reduces to the deterministic version of seed
minimization, which is shown to be NP-hard [19]. Therefore,
finding an optimal policy for ASM is also NP-hard.
2.3 Truncated Influence Spread
Note that, in ASM, the influence spread in excess of the
threshold η has no value. Accordingly, we introduce the
notion of truncated influence spread as follows.
Γϕ(S) := min{Iϕ(S), η}.
Definition 2.2 (Truncated Influence Spread). Given a seed
set S and a threshold η, the truncated influence spread Γϕ(S)
of S under a realization ϕ is the smaller one between Iϕ(S)
and η, i.e.,
(2)
Recall that ASM requires considering the influence spreads
of nodes when the actual influence of some other nodes has
been observed. Therefore, we also introduce the notion of
marginal truncated influence spread as follows. Let V1 = V
and G1 = G. Let Vi be the subset of nodes that remain inactive
after round (i − 1), Gi be the subgraph of G induced by Vi.
We refer to Gi as the i-th residual graph. For example, in
Figure 1, after round 1, only nodes v2, v3, v5 remain inactive,
so V2 = {v2, v3, v5} and G2 = (V2, E2) denotes the induced
subgraph containing the thin edge ⟨v3, v5⟩.
Let Si be the set of nodes selected as seeds by a policy in
the first i rounds. Similar to the definition of Ω, we denote
Ωi as the set of all possible realizations in the i-th round.
Then, for a node set S ⊆ Vi, we define the marginal spread
Iϕ(S Si−1) as the additional spread that S provides on top of
Si−1 under realization ϕ ∈ Ωi, and define truncated marginal
spread Γϕ(S Si−1) accordingly, i.e.,
and
Iϕ(S Si−1) := Iϕ(S ∪ Si−1) − Iϕ(Si−1),
Γϕ(S Si−1) := Γϕ(S ∪ Si−1) − Γϕ(Si−1).
(3)
(4)
Note that Iϕ(S Si−1) is exactly the influence spread of S in
the residual graph Gi under realization ϕ.
Let ni = Vi be the number of nodes in Gi, i.e., Iϕ(Si−1) =
n − ni nodes have been activated by the end of round i − 1,
based on the partial realization revealed so far. Define ηi =
4
0.90.30.40.60.7v1v2v6v5v4v30.10.5v1v2v6v5v4v30.40.6v1v2v6v5v4v30.10.50.4v1v2v6v5v4v3Efficient Approximation Algorithms for Adaptive Seed Minimization
η−(n−ni). This is the amount by which the policy falls short
of the target η in the beginning of round i. Before reaching
the threshold η, i.e., Γϕ(Si−1) = Iϕ(Si−1) < η, we can rewrite
Γϕ(S Si−1) as
Γϕ(S Si−1) = min{Iϕ(S ∪ Si−1), η} − Iϕ(Si−1)
= min{Iϕ(S Si−1), ηi}.
(5)
Then, Γϕ(S Si−1) can be easily computed in the residual
graph Gi. For brevity, we define Γϕ(v Si−1) := Γϕ({v} Si−1)
for a singleton node set {v}.
Finally, we define the expected marginal truncated spread
∆(v Si−1) as
∆(v Si−1) := EΦ∼Ωi[ΓΦ(v Si−1)].
(6)
In other words, the expected marginal truncated spread of a
node v is defined based on the "lift" in the expected number
of active nodes that v brings on top of previously selected
seeds, over all realizations consistent with what has been
observed in previous rounds.
2.4 Existing Solutions
Golovin and Krause [18] study the adaptive stochastic min-
imum cost coverage problem, which can be regarded as a
variant of ASM in the case where there exists an oracle that
accurately reports the expected marginal truncated spread
for any given seed set. They propose to adopt a greed policy
as follows. First, select the node s1 with the largest expected
truncated spread, i.e., ∆(s1 S0) ≥ ∆(v S0) for all v ∈ V .
Then, observe the actual nodes that are activated by s1 during
the stochastic process, and remove them from G to induce
the residual graph G2. After that, identify the node s2 with
the maximum expected marginal truncated spread ∆(s2 S1)
in the residual graph G2. This process continues, such that
each round selects the node with the largest expected mar-
ginal truncated spread, until we observe that no less than η
nodes have been influenced.
Golovin and Krause [18] show that the above greedy policy
returns a (ln η + 1)2-approximate solution to the optimum.1
This approximation guarantee, however, does not lead to
a practical algorithm for the ASM problem, because (i) it
requires the help from an oracle to exactly identify the node
with the maximum expected marginal truncated spread in
each round, but (ii) computing the exact expected spread of
any node set is #P-hard [7].
Motivated by this observation, Vaswani and Laksh-
manan [42] attempt to extend Golovin and Krause's method
by replacing the oracle with an spread estimator with
bounded errors. In particular, they assume that for any
1Golovin and Krause claim that the approximation guarantee is (ln η + 1)
in an earlier version of their work [17], but point out that the proof has
gaps in a revised version [18]. Whether the logarithmic bound holds is an
interesting open problem.
α
⊥E[I(v S)] ≤ E[I(v S)] ≤ α
node set S, the estimation E[I(v S)] of the marginal gain
E[I(v S)] := E[I(S ∪ {v})] − E[I(S)] should satisfy
⊤E[I(v S)],
(7)
where α⊤/α⊥ denotes the multiplicative error in calculating
the marginal gains. Unfortunately, this requirement on the
spread estimation is so stringent that no existing methods for
influence estimation could fulfill the requirement without in-
curring prohibitive estimation overhead. To explain, suppose
that the expected marginal spread E[I(v S)] of a node v on
top of S is small. In that case, Equation (7) would only allow
a trivial amount of estimation error, which is rather difficult
to achieve by existing methods for spread estimation.
In addition, the algorithm in [42] attempts to select the
node with the largest marginal spread in each round, instead
of the node with the maximum marginal truncated spread.
As a consequence, even when there exists an efficient esti-
mator that provides highly accurate spread estimation, the
algorithm in [42] would still fail to achieve the type of approx-
imation guarantee in [18], which the theoretical analysis in
[18] is based on the notion of truncated spreads. We illustrate
this issue with an example.
Example 2.3. Consider Figure 2(a), which shows a social
graph G with four nodes and four directed edges. The number
on each edge indicates the propagation probability of the
edge. G has four possible realizations ϕ1, ϕ2, ϕ3, and ϕ4 in
total, as shown in Figures 2(b) -- 2(e). Each realization has an
equal probability of 0.25 to happen. Assume that η = 2. Then,
the expected spread of node v1 is E[I(v1)] = 0.25 × (3 + 3 +
4 + 1) = 2.75, which is larger than that of the other three
nodes. Thus, when the vanilla expected spread is adopted as
the measure, node v1 will be selected as the first seed node.
On realizations ϕ1, ϕ2, and ϕ3, v1 is qualified to influence
at least η = 2 users. However, there is a probability of 0.25
that ϕ4 happens, in which case v1 can only influence itself,
and hence, one additional seed node is required. Overall,
2 × 0.25 + 1 × (1 − 0.25) = 1.25 seed nodes are selected in
expectation.
Now observe that the expected truncated spread of nodes
v1, v2, v3, and v4 are 1.75, 2, 2, and 1, respectively. There-
fore, when the expected truncated spread is adopted as the
measure, either v2 or v3 is selected as the first seed node,
which can influence 2 users under all four realizations. This
demonstrates that, for ASM, choosing nodes based on ex-
pected truncated spreads is more effective than that based
□
on vanilla expected spreads.
In recent work [23], Han et al. study the problem of adap-
tive influence maximization, which also considers the adap-
tive setting, but aims to identify a predefined number of k
seed nodes that could influence the maximum number of
users in G in expectation. At the first glance, it may seem
5
Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
(a) A social graph G
(b) Realization ϕ1
(d) Realization ϕ3
Figure 2: A social graph and all of its possible realizations.
(c) Realization ϕ2
(e) Realization ϕ4
Algorithm 1: ASTI(G, η)
Input: an input graph G and a theshlod η.
Output: a seed set S such that Γ(S) = η.
1 initialize S ← ∅, Γ(S) ← 0, i ← 1;
2 repeat
3
4
5
6
select si from Vi such that ∆(si Si−1) ≥ α ∆(v Si−1) for
all v ∈ Vi;
observe the influence of si in Gi;
insert si into S and increase Γ(S) acoordingly;
remove all nodes in Gi that are influenced by si, and
denote the resulting graph as Gi +1;
i ← i + 1;
7
8 until Γ(S) ≥ η;
9 return S;
that we can modify the adaptive influence maximization
algorithms to solve the adaptive seed minimization prob-
lem, in the same way that existing work [19] transforms
non-adaptive influence maximizing algorithms to address
non-adaptive seed minimization. This approach, however,
does not work because the algorithm in [23] is designed
based on vanilla expected marginal spreads. Instead, ASM
requires considering truncated expected marginal spreads,
as we previously discussed. As a consequence, the algorithm
in [23] cannot be adopted in our setting.
3 OUR SOLUTION
3.1 Algorithmic Framework
We propose a general framework, referred to as ASTI, to
address the ASM problem. Algorithm 1 shows the details.
Given a probabilistic social graph G and a threshold η, ASTI
aims to return a seed set S such that Γ(S) ≥ η, where Γ(S) is
the truncated influence spread of S (i.e., the smaller one of
the threshold η and the number of active nodes influenced
by S). In a nutshell, ASTI iteratively (i) selects the node to
maximize the expected marginal truncated spread (Line 3),
(ii) observes the newly influenced nodes (Line 4), and then
(iii) updates the corresponding information (Lines 5 -- 7). The
process stops when at least η nodes are activated (Line 8).
The key step of ASTI is truncated influence maximization
that targets at identifying a node to maximize the expected
marginal truncated spread (Line 3). If an α-approximate solu-
tion for truncated influence maximization is obtained in each
6
round (Line 3), ASTI provides a non-trivial approximation
guarantee, as shown in the following theorem.
Theorem 3.1. Suppose π is an α-approximate greedy policy,
for some α ∈ (0, 1], i.e., for any Gi and v ∈ Vi, it selects a node
si satisfying
(8)
to the opti-
∆(si Si−1) ≥ α ∆(v Si−1).
Then π achieves an approximation ratio of (ln η+1)2
mal adaptive seed minimization policy.
α
The proof2 of Theorem 3.1 is based on adaptive submodu-
lar optimization [18]. Theorem 3.1 requires that the policy
should be an α-approximate greedy one with respect to the
expected marginal truncated spread ∆(v Si−1). The chal-
lenge for designing such an α-approximate greedy policy lies
in how to develop a proper sampling method for estimating
the truncated influence spread.
3.2 Truncated Influence Maximization
According to Theorem 3.1, in order to provide the theoreti-
cal guarantee, the algorithm is supposed to identify a node
whose truncated marginal spread is an α-approximation to
the maximum truncated marginal spread in each round. At a
first glance, it seems that we can utilize Borgs et al.'s reverse
influence sampling method [5]. Unfortunately, in what fol-
lows, we show that Borgs et al.'s sampling method [5] fails
to estimate the truncated influence spread accurately.
Specifically, Borgs et al. [5] propose to generate random
reverse reachable (RR) sets for influence maximization. Com-
pared with the Monte-Carlo simulation [27], RR-sets can
dramatically accelerate the seed selection process while re-
taining the same approximation guarantees for influence
maximization [5]. In particular, a random RR-set of G is gen-
erated by first selecting a node v ∈ V uniformly at random,
and then taking the nodes that can reach v in a random re-
alization. Evidently, a random RR-set is a subgraph of the
corresponding random realization Φ, which is generated by
performing a reverse breadth first search (BFS) on Φ starting
from the random node v. A random RR-set R is an unbiased
spread estimator, i.e., for any seed set S,
E[I(S)] = n · Pr[R ∩ S (cid:44) ∅].
2The formal proofs of all theoretical results are given in Appendix B.
0.5v1v2v4v30.511v1v2v4v3v1v2v4v3v1v2v4v3v1v2v4v3Efficient Approximation Algorithms for Adaptive Seed Minimization
Unfortunately, RR-sets fail to estimate truncated influence
spread accurately. Intuitively, the expectation of this estima-
tor for truncated influence spread of S is
η
n
η · Pr[R ∩ S (cid:44) ∅] =
Iϕ(S) · p(ϕ).
· E[I(S)] =
ϕ∈Ω
Recall that the true expected truncated influence spread is
η
n
E[Γ(S)] =
Γϕ(S) · p(ϕ).
Obviously, for any ϕ ∈ Ω, unless Iϕ(S) = n,
ϕ∈Ω
· Iϕ(S) < min{Iϕ(S), η} = Γϕ(S).
η
n
Specifically, consider the case that Iϕ(S) ≤ η for all ϕ. Then,
this estimator is biased with a discount η/n, which is ex-
tremely inaccurate when η ≪ n. In practice, η is likely to be
a fraction of n, since even a set of ten thousand seed nodes has
been found to influence less than half population on many
datasets [34]. These facts indicate that RR-sets are highly
biased for estimating truncated influence spread. As a con-
sequence, the state-of-the-art algorithms [25, 33, 37, 40, 41]
for influence maximization that utilize RR-sets [5] cannot
provide theoretical guarantees for truncated influence maxi-
mization. In turn, this means that these algorithms cannot
be fashioned to solve ASM with approximation guarantees.
To address this issue, we propose a novel sampling approach
that generates multi-root reverse reachable (mRR) sets which
can estimate the truncated influence spread efficiently and
effectively. The algorithm utilizing mRR-sets is referred to as
TRIM3. We rigorously show that TRIM can provide strong
theoretical guarantees for truncated influence maximization
and thus ASTI instantiated with TRIM is guaranteed to ap-
proximate ASM within a constant ratio.
3.3 Multi-Root Reverse Reachable Set
If we generate n correlated RR-sets such that (i) they start
from n distinct nodes, and (ii) the materialization of each
edge is consistent in all the RR-sets, then merging these RR-
sets (with duplicates removed) as well as the edge statuses
forms a realization sample. Based on this observation, if we
generate k (k < n) correlated RR-sets using the same rule,
then merging them as a k-root RR-set is likely to estimate
the truncated influence spread more accurately compared
against a vanilla RR-set. To explain how multi-root reverse
reachable (mRR) set works, we first introduce its definition.
Definition 3.2 (Random mRR-set). Let Φ be a random re-
alization of G sampled from the realization space and K be
a size-k node set selected uniformly at random from V . A
random mRR-set is the set of nodes in Φ that can reach K.
3TRuncated Influence Maximization.
(That is, for each node v in the mRR-set, there is a directed
path in Φ from v to some node in K.)
By definition, the key difference between an mRR-set and
an RR-set is that the former has multiple roots whereas the
latter has one single root only. Similar to the generation of
RR-sets, a random mRR-set can be generated by:
(1) Choose a set of k nodes K ⊆ V uniformly at random;
(2) Perform a stochastic reverse breadth first search (BFS)
that starts from K and follows the incoming edges of
each node. Insert into R all nodes that are traversed
during the stochastic BFS.
A natural question is how to decide the size of k for trun-
cated spread estimation? The setting of k yields a tradeoff
between efficiency and accuracy in that a larger k provides
more accurate estimation but takes more computational re-
sources. Through the aforementioned analysis of RR-set, we
find that the high-efficiency of RR-set comes from its "bi-
nary" property. In particular, a random RR-set R estimates
the influence spread of any node set S as n if R ∩ S (cid:44) 0, and
as 0 otherwise. To avoid maintaining the edge statuses, our
mRR-set estimator shall retain this binary property. That is,
it estimates the truncated influence spread of S as η if and
only if S intersects this mRR-set, and as 0 otherwise. For a
given k-RR-set R, if a node v ∈ R, then v can reach at least
one of the k starting nodes. Then, its influence spread is
estimated to be at least n/k and thus its estimated truncated
influence spread is at least min{n/k, η}. By setting n/k ≥ η,
the estimated truncated influence spread is η.
On the other hand, to improve the accuracy, k should be
set as large as possible. So we choose k = n/η. However, n/η
is not an integer in general. To address this issue, we adopt a
randomized rounding approach. To generate a mRR-set, we
randomly choose a set K of nodes such that its size k equals
⌊ n
η ⌋ + 1 with probability n
η ⌋ otherwise.
Then, the expectation of k is n/η. However, we note that
η ⌋ + 1, the possible value of the estimated trun-
when k = ⌊ n
cated influence spread is no longer binary (i.e., 0 or η). To
address such a new challenge, we define an estimator Γ(S)
as Γ(S) = η if and only if S ∩ R (cid:44) ∅, and Γ(S) = 0 otherwise.
At the first glance, it seems that the relationship between
E[Γ(S)] and E[ Γ(S)] is unclear. Fortunately, the following
theorem shows that under the above setting of k such that
E[k] = n/η, the ratio of E[ Γ(S)] and E[Γ(S)] is in the range
of [1 − 1/e, 1].
η ⌋, and equals ⌊ n
η − ⌊ n
Theorem 3.3. Let k⊥ = ⌊ n
η ⌋ and r = n/η−k⊥ be the integer
and fractional part of n/η, respectively. For any mRR-set, if we
sample k nodes such that k = k⊥ + 1 with probability r and
k = k⊥ otherwise, then
(1 − 1/e)E[Γ(S)] ≤ E[ Γ(S)] ≤ E[Γ(S)].
(9)
7
Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
Algorithm 2: TRIM(Gi , ε)
Input: Graph Gi and error threshold ε.
Output: A (1 − 1/e)(1 − ε)-approximate solution v∗ for
1 δ ← ε/(cid:0)100(1 − 1/e)(1 − ε)ηi(cid:1), and ε ← 99ε/(100 − ε);
2 θmax ← 2ni(cid:0)(cid:112)ln(6/δ) +(cid:112)ln ni + ln(6/δ)(cid:1)2 · ε−2;
truncated influence maximization.
2/ni;
θ◦ ⌉ + 1;
3 θ◦ ← θmax · ε
4 T ← ⌈log2 θmax
5 a1 ← ln(3T/δ) + ln ni, and a2 ← ln(3T/δ);
6 generate a set R of θ◦ random mRR-sets;
7 for t ← 1 to T do
8
9
10
Λl(v∗) ← ((cid:112)ΛR(v∗) + 2a1/9 −(cid:112)a1/2)2 − a1/18;
Λu(v◦) ← ((cid:112)ΛR(v∗) + a2/2 +(cid:112)a2/2)2;
find v∗ ← arg maxv ∈Vi ΛR(v);
11
12
Λu(v◦) ≥ 1 − ε or t = T then return v∗;
if Λl(v∗)
double the size of R;
ηi
(10)
Theorem 3.3 states that Γ is a biased but sufficiently ac-
curate estimator of the expected truncated influence spread
E[Γ(S)]. In fact, this estimator also works for any residual
graph Gi. Specifically, let Γ(S Si−1) be the estimated trun-
cated spread of S in Gi with respect to ηi, the lowered target
corresponding to graph Gi. Recall that ηi = η − (n − ni). We
have the following corollary.
Corollary 3.4. In the residual graph Gi, let k⊥ = ⌊ ni
⌋
and r = ni/ηi − k⊥ be the integer and fractional part of ni/ηi,
respectively. For each mRR-set, if we sample k nodes such that
k = k⊥ + 1 with probability r and k = k⊥ otherwise, then
(1 − 1/e)E[Γ(S Si−1)] ≤ E[ Γ(S Si−1)] ≤ E[Γ(S Si−1)].
Furthermore, for any two sets S, S′ ⊆ Vi, it holds that
E[Γ(S Si−1)]
E[Γ(S′ Si−1)] ≥ (1 − 1/e) E[ Γ(S Si−1)]
E[ Γ(S′ Si−1)] .
(11)
Now, we can construct a (1 − 1/e)(1 − ε)-approximate
greedy policy using the estimator Γ built upon mRR-sets.
Remark. It is worth pointing out that our randomized round-
ing approach for choosing k is critical for achieving the
above approximation bound. Specifically, if we fix k to be
η ⌋, following the proof methodology of Theorem 3.3, we
⌊ n
may derive that the ratio of E[ Γ(S)] to E[Γ(S)] will be in the
range of [1 − 1/√e, 1]. On the other hand, if we fix k to be
η ⌋ + 1, the ratio of E[ Γ(S)] to E[Γ(S)] will be in the range
⌊ n
of [1 − 1/e, 2]. Both settings yield much coarser bounds than
our setting that uses a smart randomized rounding approach.
3.4 The Design of TRIM
Algorithm 2 presents the details of TRIM that can return a
(1− 1/e)(1− ε)-approximate solution for truncated influence
maximization for any input graph Gi and error threshold ε.
TRIM is similar in spirit to OPIM-C which is the state-of-the-
art algorithm for influence maximization [37]. Specifically,
OPIM-C uses two disjoint groups of random RR-sets, among
which one group is used to derive the solution and the other
is used to verify its quality. We customize TRIM by utilizing
one group of mRR-sets, which would be more efficient for
selecting a singleton seed set as pointed out in [25]. In a
nutshell, TRIM starts from a small number of mRR-sets and
iteratively increases the mRR-set number until a satisfactory
solution is identified. Next, we discuss the details of TRIM.
In the mRR-set sampling stage (Lines 6 and 12), each mRR-
set is started from a random set K of nodes whose size k is
an independent random number. Recall that k is ⌊ ni
⌋ + 1
ηi
⌋ otherwise. Given a set
with probability ni
ηi
R of random mRR-sets, we say that a node v covers a mRR-
set R ∈ R if v ∈ R, and we define the coverage of v in
R, denoted as ΛR(v), as the number of mRR-sets in R that
are covered by v. Based on the mRR-sets generated, TRIM
identifies the node v∗ ∈ Vi that covers the largest number
of mRR-sets in R (Line 8). Let v◦ be the optimal node such
that ∆(v◦ Si−1) = maxv ∈Vi ∆(v Si−1). Then, ΛR(v◦) is
bounded by ΛR(v∗). According to Lemma A.2 in Appendix
A, with high probability, Λl(v∗) (Line 9) is a lower bound on
the expected coverage of v∗ in R, which indicates that
⌋ and ⌊ ni
ηi
− ⌊ ni
ηi
ηi Λl(v∗)
(12)
Similarly, with high probability, Λu(v◦) (Line 10) is an upper
bound on the expected coverage of v◦ in R. Thus,
R
∗ Si−1)].
≤ E[ Γ(v
In addition, by Equation (11) in Corollary 3.4, we know that
∆(v∗ Si−1)
∆(v◦ Si−1) ≥ (1 − 1/e) E[ Γ(v∗ Si−1)]
E[ Γ(v◦ Si−1)] .
(14)
Combining Equations (12) -- (14), we can derive a quantitative
relationship between ∆(v∗ Si−1) and ∆(v◦ Si−1) such that
with high probability
∗ Si−1) ≥ Λl(v∗)
∆(v
◦ Si−1).
Λu(v◦) · (1 − 1/e) · ∆(v
(15)
Therefore, the final guarantee is (1−1/e)Λl(v∗)/Λu(v◦). Note
that in our stopping condition of Λl(v∗)/Λu(v◦) ≥ 1 − ε
(Line 11), we use ε (defined in Line 1) to correct the error on
Equations (12) and (13) (with low failure probability). This
proves the (1−1/e)(1−ε) approximation ratio of ∆(v∗ Si−1).
3.5 Theoretical Analysis
Before we proceed to the theoretical analysis, we first present
the hardness of ASM.
8
ηi Λu(v◦)
R
≥ E[ Γ(v
◦ Si−1)].
(13)
Efficient Approximation Algorithms for Adaptive Seed Minimization
Lemma 3.5. Given a probabilistic social network G = (V , E)
with V = n and a threshold η ∈ [1, n], for any ξ > 0,
adaptive seed minimization cannot be approximated within
a ratio of (1 − ξ) ln η in polynomial time unless NP ⊆
DTIME(nO(log log n)).
Approximation Guarantee. Theorem 3.1 indicates that
any α-approximation greedy policy π could achieve an ap-
proximation ratio of (ln η+1)2
. We examine the potential of
TRIM to serve the role of such a policy. To cope with the ran-
domness of seed selection algorithms (due to sampling), we
use the notion of expected approximation guarantee, which
considers the average case. We first obtain the approximation
ratio of TRIM for each round of seed selection.
α
Lemma 3.6. For the i-th round of seed selection in Gi, TRIM
returns a (1−1/e)(1−ε)-approximate solution to the optimum.4
Combining Theorem 3.1 and Lemma 3.6, we obtain the
approximation guarantee of ASTI.
(cid:1) + ln 6
2 θmax ← 2ni
3 θ◦ ← θmax · b ε
4 T ← ⌈log2 θmax
Algorithm 3: TRIM-B(Gi , ε, b)
Input: Graph Gi, error threshold ε, and batch size b.
Output: A ρb(1 − 1/e)(1 − ε)-approximate solution Sb with
size-b for truncated influence maximization, where
ρb = 1 − (1 − 1/b)b.
1 δ ← ε/(cid:0)100(1 − 1/e)(1 − ε)ηi(cid:1), and ε ← 99ε/(100 − ε);
(cid:113)(cid:0) ln(cid:0)ni
(cid:16)(cid:113)ln 6
(cid:17)2/(b ε
(cid:1)/ρb
(cid:1), and a2 ← ln(3T/δ);
5 a1 ← ln(3T/δ) + ln(cid:0)ni
Λl(Sb) ← ((cid:112)ΛR(Sb) + 2a1/9 −(cid:112)a1/2)2 − a1/18;
b) ← ((cid:112)ΛR(Sb)/ρb + a2/2 +(cid:112)a2/2)2;
6 generate a set R of θ◦ random mRR-sets;
7 for t ← 1 to T do
8
9
10
δ
2/ni;
θ◦ ⌉ + 1;
2);
+
b
b
δ
find Sb ← Greedy(R);
Λu(S◦
if Λl(Sb)
Λu(S◦
double the size of R;
b) ≥ ρb(1 − ε) or t = T then return Sb;
11
12
O(cid:0) OPTi
(cid:1).
mi
Theorem 3.7. ASTI with the instantiation of TRIM achieves
(ln η+1)2
(1−1/e)(1−ε).
an expected approximation ratio of
Time Complexity. The time complexity of TRIM is domi-
nated by the procedure for generating mRR-sets. Intuitively,
this is based on (i) how much time is used for generating a
random mRR-set, and (ii) how many mRR-sets are generated.
In what follows, we show their relationship. In particular,
for the i-th round of seed selection in Gi, let OPTi (resp. v⋄)
be the optimum (resp. optimal node) of E[ Γ(v Si−1)], i.e.,
OPTi = E[ Γ(v⋄ Si−1)] = maxv E[ Γ(v Si−1)]. (Note that
v∗ maximizes ΛR(v), v⋄ maximizes E[ Γ(v Si−1)], and v◦
maximizes ∆(v Si−1).) We first show the expected time used
for generating a random mRR-set in the following lemma.
Lemma 3.8. For the i-th round of seed selection in Gi, the
expected time complexity for generating a random mRR-set is
(cid:1).5
Finally, we provide the expected time complexity of TRIM
ηi
Now, we present the following lemma that gives the ex-
pected number of mRR-sets generated by TRIM. The proof
is similar to that of OPIM-C [37].
Lemma 3.9. For the i-th round of seed selection in Gi, the
expected number of mRR-sets TRIM generated is O(cid:0) ηi ln ni
(cid:1).
achieves an expected time complexity of O(cid:0) mi +ni
poly(ni)(cid:1).
(cid:1). Here, we assume that ε ∈ Ω(cid:0)
5In general, it is O(cid:0) ηi ln(ni/ε)
4Here, α-approximation indicates that E[
∆(v◦Si−1) ,
which is required by Theorem 3.1 for a randomized algorithm through a
detailed check of the proof of Theorem 40 in [18].
Lemma 3.10. For the i-th round of seed selection in Gi, TRIM
ln ni
∆(v∗Si−1)] ≤ 1
α ·
in the following lemma.
ε2OPTi
ε2
ε2OPTi
1
1
1
At the first glance, the expected time complexity of TRIM
is counterintuitive. In particular, the expected root size of
ni/ηi in the i-th round is increasing with i. It seems that the
time complexity of TRIM is more likely to increase with i.
However, Lemma 3.10 just tells us the opposite. This is due
to either the residual graph Gi being reduced significantly
(Lemma 3.8) or the mRR-set size being reduced considerably
(Lemma 3.9). Overall, the time complexity of TRIM in each
round can be independent of the number of initially selected
nodes. There are at most η rounds in total, we can derive the
expected time complexity of ASTI instantiated with TRIM.
Theorem 3.11. ASTI with the instantiation of TRIM has an
expected time complexity of O(cid:0) η·(m+n)
ln n(cid:1).
ε2
4 EXTENSIONS
TRIM selects one node in each round until at least η users
are influenced. Therefore, the seed selection phase in ASTI
instantiated by TRIM can be quite time consuming due to
that the marginal (truncated) spread of a singleton node set
is potentially small which may (i) involve in many rounds
to achieve the target η, and (ii) generate a large number of
mRR-sets for constructing an α-approximate solution in each
round. To mitigate the enormous overhead, we propose a
batched version of TRIM, referred to as TRIM-B6 algorithm,
to accelerate the node selection process of ASTI.
4.1 Batched Version of TRIM
Algorithm 3 shows the details of the TRIM-B algorithm.
TRIM-B generalizes TRIM by selecting a fixed number of
6TRuncated Influence Maximization in the Batched model.
9
Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
b seeds in each round, where b is an input parameter to de-
termine the batch size. Specifically, TRIM-B first generates a
small number of random mRR-sets and then uses a greedy al-
gorithm for maximum coverage [43] to identify a size-b seed
set Sb to cover mRR-sets with an approximation guarantee of
ρb = 1−(1−1/b)b (Line 8). If Sb meets the condition (Line 11),
TRIM-B terminates; otherwise, the number of mRR-sets is
doubled until a qualified Sb is derived. Consequently, the
approximation ratio of TRIM-B is ρb(1 − 1/e)(1 − ε). Note
that when the batch size b is 1, TRIM-B degenerates to TRIM.
The major differences in the design between TRIM-B and
TRIM are as follows. First, in TRIM-B, the definitions of
variables θmax and θ◦ are involved with ρb and b for general-
ization, as shown in Line 2 and Line 3, respectively. Second,
to obtain the upper bound on the coverage of the optimal
in R, the coverage of ΛR(Sb) is divided by ρb
solution S◦
(Line 10). Third, the ratio in the stop condition is updated to
be ρb(1 − ε) (Line 11).
4.2 Theoretical Analysis
The theoretical analysis of TRIM-B can be obtained by gen-
eralizing the properties of TRIM.
Approximation Guarantee. To establish the overall ap-
proximation guarantee, we first analyze the approximation
ratio of TRIM-B in each round of seed selection.
b
Lemma 4.1. For the i-th round of seed selection in Gi, TRIM-
B returns a ρb(1 − 1/e)(1 − ε)-approximate solution, where
ρb = 1 − (1 − 1/b)b.
Combining Theorem 3.1 and Lemma 4.1, we obtain the
approximation guarantee of TRIM-B.
Theorem 4.2. ASTI with the instantiation of TRIM-B
achieves an expected approximation ratio of
(ln η+1)2
ρb(1−1/e)(1−ε).
Remark. Note that there exists a gap between the optimal
policy in the sequential model and the optimal policy in the
batched model, which is known as the adaptivity gap [18].
Adaptivity gap quantifies the performance difference be-
tween the optimal adaptive policy and the optimal non-
adaptive policy. To explain, a size-b seed set is selected as a
batch (b ≥ 1) in TRIM-B without observing the realization of
any seed therein. This selection is an non-adaptive process
compared to that of b = 1 in TRIM. As a consequence, there
exists an adaptivity gap between the two algorithms if the
batch size b > 1. However, to the best of our knowledge, this
adaptivity gap remains unknown in viral marketing applica-
tions, which makes it hard to quantify the difference between
the optimal policy in the sequential model and that in the
batched model. Meanwhile, the existing bound of adaptivity
gap of (1 − 1/e) in [10] is not applicable to adaptive seed
10
(cid:16) ηi ln(ni
(cid:17),
minimization. It holds only if the nodes in social graph G are
independent, which, however, is not true.
Time Complexity. The time complexity of TRIM-B de-
pends on three factors: (i) the time for generating a random
mRR-set, (ii) the number of mRR-sets generated, and (iii) the
time to derive a size-b seed set. The expected time used for
generating a random mRR-set is given in Lemma 3.8. We
now show the number of mRR-sets generated.
ε2
Lemma 4.3. For the i-th round of seed selection in Gi, the
b )
expected number of mRR-sets TRIM-B generates is O
ε2OPTb,i
where OPTb,i denotes the maximum expected truncated spread
among all the size-b seed sets in Gi.
its input [43], i.e.,
On the other hand, the greedy algorithm for identifying
the size-b seed set runs in time linear to the total size of
R∈RR. Meanwhile, the total number
of mRR-sets examined in all the iterations is within twice
of that in the last iteration. According to Wald's equation
[44], the expected time complexity of the greedy procedure
is O(E[R] · E[R]), which is dominated by that for generat-
ing mRR-sets. Consequently, by Lemma 3.8 and Lemma 4.3,
the expected time used in the i-th round of TRIM-B is
O(cid:0) b(mi +ni) ln ni
achieves an expected time complexity of O(cid:0) η·(m+n)
(cid:1). There are at most O(η/b) rounds in total.
ln n(cid:1).
Based on the analysis above, the expected time complexity
of TRIM-B is given in the following theorem.
Theorem 4.4. ASTI with the instantiation of TRIM-B
ε2
5 ADDITIONAL RELATED WORK
In Section 2.4, we have discussed the work [42] most related
to ours. In what follows, we survey other relevant work in
the literature.
Influence maximization, as the dual problem of seed mini-
mization, seeks to identify a set of k seed nodes with the max-
imum expected spread. Domingos and Richardson [14, 35]
are the first to study viral marketing from an algorithmic
perspective. After that, Kempe et al. [27] formulate the influ-
ence maximization problem and propose a greedy algorithm
that returns (1 − 1/e − ϵ)-approximation for several influ-
ence diffusion models, by utilizing Monte Carlo simulations.
Subsequently, there has been a large body of research on
improved algorithms for influence maximization [1, 5, 7 --
9, 12, 13, 16, 20, 21, 25 -- 30, 33, 37 -- 41, 45, 48]. Among them,
some recent work [5, 25, 33, 37, 40, 41] focuses on algorithms
that ensure (1 − 1/e − ε)-approximations by utilizing the re-
verse influence sampling technique [5].
Seed minimization, which has mainly been studied from
the non-adaptive perspective, aims at finding a minimum-
size set of seed nodes to achieve a given threshold of expected
spread. Chen [6] investigates seed minimization under a
Efficient Approximation Algorithms for Adaptive Seed Minimization
Table 2: Dataset details. (K = 103, M = 106)
Type
Avg. deg. LWCC size
Dataset
NetHEPT
Epinions
Youtube
LiveJournal 4.85M 69.0M
m
n
15.2K 31.4K undirected
132K 841K
directed
1.13M 2.99M undirected
directed
4.18
13.4
5.29
28.5
6.80K
119K
1.13M
4.84M
(a) NetHEPT & Youtube
Figure 3: Degree distribution of tested datasets.
(b) Epinions & LiveJournal
variant of the linear threshold model, where each node is as-
signed with a fixed threshold. Chen shows that the problem
cannot be approximated within a ratio of O(2log1−ϵ n) unless
NP ⊆ DTIME(n
polylog(n)) as the expected spread function
under the fixed threshold model is not submodular. After
that, Long and Wong [32] study seed minimization under
the widely used independent cascade and linear threshold
models. Goyal et al. [19] provide a bi-criteria approximation
algorithms for seed minimization. Zhang et al. [47] then
improve the theoretical results by removing the bi-criteria
restriction. However, the requirements of these algorithms
are either impractical or extremely stringent, which makes
these algorithms vastly ineffective in practice. Han et al. [22]
propose the ATEUC algorithm for non-adaptive seed min-
imization by utilizing reverse influence sampling for esti-
mating the spreads of nodes. However, the expected time
complexity of the algorithm is unknown, and its worst-case
time complexity is prohibitively large. As we show in the
experiments, our adaptive algorithm is more effective than
these non-adaptive algorithms in terms of the number of
seed nodes required.
Finally, there is a series of recent work [3, 23, 24, 36, 42]
that focuses on adaptive influence maximization. Recall that,
as analyzed in Section 3.1, to construct approximate solutions
for adaptive seed minimization, some approximation algo-
rithms for truncated influence maximization are required.
However, the algorithms for adaptive influence maximiza-
tion generally target at maximizing the influence spread in
each round, which cannot provide theoretical guarantees for
truncated influence maximization, as we point out in Sec-
tion 3.2. As a consequence, techniques developed for adap-
tive influence maximization are inapplicable to the adaptive
seed minimization problem. In addition, in the case of in-
fluence maximization, going adaptive does not really boost
the spread significantly, as confirmed by the experiments
in [23]. However, it shall be observed in our experiments
that going adaptive provides a substantial advantage for seed
minimization.
6 EXPERIMENTS
This section evaluates the performance of the proposed al-
gorithms against the state of the art. All the experiments are
conducted on a Linux machine with an Intel Xeon 2.6GHz
11
CPU and 64GB RAM. For fair comparison, we first randomly
generate 20 possible realizations for each dataset, and then
measure the performance of each algorithm on those 20
realizations and report the average performance.
6.1 Experimental Setting
Datasets. The experiments are conducted on four datasets,
i.e., NetHEPT, Epinions, Youtube, and LiveJournal. NetHEPT
[8] represents the academic collaboration networks of "High
Energy Physics - Theory" area. The rest of the three are real-
life social networks from [31]. Table 2 summarizes the details
of the four datasets. Note that an undirected edge is trans-
formed into two directed edges. There does exist any isolated
node in the four tested datasets. Furthermore, the number of
nodes in the largest weakly connected component (LWCC)
indicates that nodes are highly interconnected, especially for
the three social networks. As shown in Figure 3, all the four
datasets have a power law degree distribution. The largest
dataset that has been used for adaptive seed minimization in
the literature contains 75k nodes and 500k edges [42], which
is far smaller than LiveJournal. To the best of our knowl-
edge, LiveJournal with millions of nodes and edges is the
largest dataset ever tested in adaptive seed minimization
experiments.
Algorithms. We evaluate six algorithms: ASTI, ASTI-2,
ASTI-4, ASTI-8, AdaptIM and ATEUC [22]. ASTI-b is ASTI
instantiated by TRIM-B with the batch sizes of b. (Note
that ASTI is the version with a batch size of 1.) AdaptIM
is modified from the AdaptIM-1 method proposed in [23]
for the adaptive influence maximization problem. It itera-
tively runs a non-adaptive influence maximization algorithm
(i.e., EPIC [23]) to select the node that maximizes the ex-
pected marginal influence spread on the residual graphs,
until the desired threshold is reached. AdaptIM differs from
our ASTI algorithm in that it greedily selects the node to
maximize the influence spread instead of the truncated influ-
ence spread. The batch size of AdaptIM is set to 1 by default.
As introduced in Section 5, ATEUC is the state of the art for
the non-adaptive seed minimization problem. By comparing
ASTI with ATEUC, we aim to prove the advantage of adaptiv-
ity over non-adaptivity in terms of the effectiveness. Mean-
while, three batched algorithms, i.e., ASTI-2, ASTI-4, ASTI-8,
are compared with both ASTI and ATEUC to study how the
batch size would affect the efficiency and effectiveness. For
10-710-610-510-410-310-210-1100100101102103104105degreefraction of nodesNetHEPTYoutube10-710-610-510-410-310-210-1100100101102103104105degreefraction of nodesEpinionsLiveJournalJing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
(a) NetHEPT
(b) Epinions
Figure 4: Number of seed nodes vs. threshold under the IC model.
(c) Youtube
(d) LiveJournal
AdaptIM, we obtain the source code of AdaptIM-1 from
the authors [23] with some necessary modifications (e.g.,
stop condition). For the other five algorithms, we implement
them in C++ strictly following the algorithm description and
compile them with the same optimization options.
Parameter Settings. In our experiments, all the algorithms
are tested under both the Independent Cascade (IC) model and
the Linear Threshold (LT) model. Following the common set-
ting in the literature [1, 41], we set the approximation param-
eter ε = 0.5 for the five adaptive algorithms. For those param-
eters in ATEUC, we use the values recommended in [22]. For
each dataset, we set the edge probability p(⟨u, v⟩) =
indegv
where indeg
v
The performance metrics measured include the number of
seeds selected and the corresponding running time. To better
understand the performance of the algorithms, we design
the large η setting of the threshold for NetHEPT, Epinions,
= {0.01, 0.05, 0.1, 0.15, 0.2}, where n is
and Youtube, i.e., η
n
the number of nodes in the social network. Observing that
around 2K nodes are required on LiveJournal under the large
η setting which is not convenient for exhibition, we thus use
= {0.01, 0.02, 0.03, 0.04, 0.05}
a tailored small η setting, i.e., η
n
for LiveJournal.
is the in-degree of node v.
1
6.2 Results under the IC model
Seed Size vs. Threshold. Figure 4 reports the number of
seeds selected by the six algorithms for different thresholds
η under the IC model. As can be seen, ASTI selects far fewer
seed nodes than ATEUC does, especially when the threshold
η becomes larger. In general, ATEUC selects around 30% -- 40%
more nodes than ASTI does on all the four datasets. In par-
ticular, with a threshold η/n = 0.2 on dataset Epinions, ASTI
selects 116.95 seed nodes on average while ATEUC needs
193.8 seed nodes (i.e., 65.7% more nodes). For the sake of
clarity, Table 3 shows the exact improvement ratio of ASTI
over ATEUC on the number of seed nodes for the correspond-
ing five thresholds under both the IC and LT model. Note
that there exist many points (indicated by N/A) where the
actual number of nodes activated by the seed set returned by
ATEUC does not reach the required threshold under some
realizations. This is because ATEUC selects a node set S such
12
Table 3: Improvement ratio of ASTI over ATEUC
0.05
0.1
0.15
η/n
0.01
0.2
N/A 40.8% 43.8% 43.0% 43.7%
l NetHEPT
N/A N/A 50.7% N/A 65.7%
Epinions
Youtube
0.0% 24.3% N/A 37.5% 41.7%
LiveJournal N/A 43.0% 34.9% N/A 33.0%
N/A 44.3% 47.5%
N/A N/A
N/A N/A
N/A
N/A
0.0% 39.5% 54.1% N/A 47.9%
N/A
e
d
o
M
C
I
l NetHEPT
Epinions
Youtube
LiveJournal N/A N/A
e
d
o
M
T
L
N/A
N/A
N/A
N/A: ATEUC does not meet the threshold for some realizations.
that E[I(S)] ≥ η but may influence fewer than η nodes under
some realizations, whereas our adaptive algorithms always
ensure that at least η nodes are influenced by the returned
node set under every realization. We shall explore this in
more detail in Section 6.4. These facts support the superiority
of adaptive algorithms over non-adaptive algorithms. We
also observe that the number of nodes selected by Adap-
tIM is close to that of ASTI, which indicates that AdaptIM
is empirically effective in seed minimization. However, it
does not provide any approximation guarantees in terms
of the number of nodes selected. Another interesting obser-
vation is that ASTI-2, ASTI-4, and ASTI-8 slightly increase
the number of seed nodes selected compared with ASTI and
still select nodes far less than ATEUC does for most of the
cases. This confirms that adaptive algorithms by utilizing the
information of partial realizations are more effective than
non-adaptive algorithms.
Running Time vs. Threshold. Figure 5 presents the re-
sults of running time against the threshold under the IC
model. As the results show, ATEUC runs faster than the
other five adaptive algorithms on the four datasets when the
threshold η is large. The main reason is that adaptive algo-
rithms involve multiple rounds of seed selection whereas
only one round is required for non-adaptive algorithms. Ob-
serve that the running time of ATEUC generally decreases
with the increase of the threshold η, unlike the results of
the five adaptive algorithms. The reason lies in the design
of ATEUC. Specifically, ATEUC selects two seed set candi-
dates Su and Sl, which are taken as the upper bound and
lower bound on the number of seed nodes in the optimal
ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM 0 100 200 300 4000.010.050.10.150.2threshold η/nnumber of seed 0 40 80 120 160 2000.010.050.10.150.2threshold η/nnumber of seed 0 40 80 120 160 2000.010.050.10.150.2threshold η/nnumber of seed 0 120 240 360 480 600 7200.010.020.030.040.05threshold η/nnumber of seedEfficient Approximation Algorithms for Adaptive Seed Minimization
(a) NetHEPT
(a) NetHEPT
(b) Epinions
(c) Youtube
Figure 5: Running time vs. threshold under the IC model.
(b) Epinions
(c) Youtube
Figure 6: Number of seed nodes vs. threshold under the LT model.
(d) LiveJournal
(d) LiveJournal
solution. Only when the condition Su ≤ 2Sl is satisfied,
the candidate set Su is returned as the solution; otherwise
ATEUC will continue to refine Su and Sl [22]. The larger
the threshold, the more seed nodes are required, and the
more easily this stop condition is met, which explains the
unique running time pattern of ATEUC. We also observe that
AdaptIM runs around 10 -- 20 times slower than ASTI for all
cases. Particularly, AdaptIM cannot finish within 72 hours
when η/n = 0.05 under the IC model on the LiveJournal
dataset (see Figure 5(d)). This demonstrates that AdaptIM is
significantly inferior to ASTI in terms of computational over-
heads. The reason behind this is that ASTI selects the node
to maximize the expected marginal truncated spread, while
AdaptIM attempts to maximize the expected marginal in-
fluence spread. Specifically, recall that the expected number
of mRR-sets generated by ASTI is proportional to ηi/OPTi.
Meanwhile, the expected number of RR-sets generated by
AdaptIM is proportional to ni/OPT′
is the max-
imum expected marginal influence spread in the i-th round of
seed selection in Gi. For the last few rounds of seed selection,
i ≈ OPTi ≈ ηi ≪ ni, which indicates that the
we have OPT′
number of mRR-sets generated by ASTI is much smaller than
the number of RR-sets generated by AdaptIM. Consequently,
ASTI runs remarkably faster than AdaptIM. As such, ASTI
is more preferable than AdaptIM, as the former provides
significantly better efficiency and approximation guarantees
than the latter, while offering similar empirical effectiveness.
Note that the batched algorithms, i.e., ASTI-2, ASTI-4, and
ASTI-8, reduce the running time significantly, to around 30%,
10%, and 5% of ASTI, which makes them quite competitive
with ATEUC in terms of the efficiency, not to mention Adap-
tIM. In addition, as explained earlier, the terminal condition
, where OPT′
i
i
Su ≤ 2Sl in ATEUC is easier satisfied when the threshold
η is larger, and hence, ATEUC runs faster along with the
increase of η. On the other hand, the running times of the
adaptive algorithms increase with η. Therefore, ASTI-4 and
ASTI-8 outperform ATEUC on datasets Epinions and Youtube
when η is relatively small, but when the threshold η/n = 0.2,
the running times of all three algorithms become similar, as
shown in Figures 5(b) and 5(c). Recall that ASTI-8 selects
far fewer seed nodes than ATEUC does. Therefore, ASTI-8
strikes a good balance between efficiency and effectiveness in
the current setting. We also observe that the running time of
ASTI-8 fluctuates from η/n = 0.01 to η/n = 0.05 on datasets
Epinions and Youtube. This is due to the combined effects
of the threshold and the batch size. In these cases, it needs
no more than 8 nodes to reach the thresholds. Consequently,
ASTI-8 finishes selecting seed nodes within just one round.
However, when η/n increases from 0.01 to 0.05, the root size
of mRR-sets decreases. As a consequence, it takes relatively
less time to generate a random mRR-set in practice, which
leads to the decrease in running time.
6.3 Results under the LT model
Seed Size vs. Threshold. Figure 6 reports the number of
nodes selected by different algorithms under the LT model.
In general, the results show similar trends to those observed
in Figure 4. Similarly, AdaptIM selects a close number of
nodes as ASTI does on the four datasets, with negligible
difference. ATEUC requires around 40% more nodes than the
five adaptive algorithms do. Details are displayed in Table 3.
In addition, we also observe that ASTI-8 selects more nodes
than ATEUC for several settings (e.g., η/n = 0.01 on the
Epionions and Youtube datasets). Through a careful analysis,
13
ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM10-210-11001011021030.010.050.10.150.2threshold η/nrunning time (sec)10-11001011021030.010.050.10.150.2threshold η/nrunning time (sec)10-11001011021031040.010.050.10.150.2threshold η/nrunning time (sec)1011021031041051060.010.020.030.040.05threshold η/nrunning time (sec)ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM 0 100 200 3000.010.050.10.150.2threshold η/nnumber of seed 0 20 40 600.010.050.10.150.2threshold η/nnumber of seed 0 40 80 1200.010.050.10.150.2threshold η/nnumber of seed 0 60 120 180 2400.010.050.10.150.2threshold η/nnumber of seedJing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
(a) NetHEPT
(b) Epinions
Figure 7: Running time vs. threshold under the LT model.
(c) Youtube
(d) LiveJournal
we find that (i) all the algorithms select less nodes under the
LT model than those under the IC model, and (ii) ASTI-8
selects 8 seed nodes in a batch with influence spread much
higher than the requirements. These observations clearly
tell us that there is a tradeoff in the setting of batch size.
Increasing the batch size will speed up the algorithms but
may result in more nodes selected.
Running Time vs. Threshold. Figure 7 shows the results
of running time for different thresholds under the LT model.
The conclusions we summarize for Figure 5 are generally
applicable to Figure 7 as well. The major differences lie in two
aspects: (i) the running time under the LT model is shorter
than that under the IC model under the same setting as it
takes less time to generate a random mRR-set under the
LT model than that under the IC model (as mentioned and
analyzed in previous work [1, 37]), which is consistent with
the results in Figure 6, (ii) ASTI-4 outperforms ATEUC on
Epinions and ASTI-8 outperforms ATEUC on both Epinions
and Youtube for all cases under the LT model. This fact
indicates (i) the batched version of ASTI is more scalable than
ATEUC does, and (ii) when the batch size b is well-calibrated,
ASTI can beat ATEUC in both efficiency and effectiveness.
6.4 Discussions on Spread Distribution
As discussed previously, non-adaptive algorithms may find
solutions with influence spread far away from the require-
ment (i.e., either under-qualified or over-qualified). Figure 8
reports the spread distribution of 20 realizations achieved by
the ASTI and ATEUC algorithms on the NetHEPT dataset
under the IC and LT models, respectively. The solid (red)
line in the figure represents the spread threshold (153) re-
quired. As shown, ATEUC fails to reach the threshold for 5
and 6 realizations under the IC and LT models, respectively,
with corresponding percentages of 25% and 30%. In addi-
tion, for 5 and 6 realizations under the IC and LT models,
respectively, the seed nodes selected by ATEUC produce in-
fluence spread much higher (over 50%) than the requirement.
In contrast, ASTI meets the spread requirement for all the
realizations under both the IC and LT models. Moreover,
the spread produced by ASTI is generally kept close to the
requirement. The spread exceeds the requirement by more
(a) IC model
(b) LT model
Figure 8: Spread for 20 realizations on NetHEPT.
than 50% for only 2 realizations under the LT model. These
two over-qualified exceptions are due to that the last seed
node selected achieves much higher spread than the gap to
reach η, which is rare to happen in practice. These observa-
tions indicate that non-adaptive algorithms are unreliable
for seed minimization.
7 CONCLUSION
This paper studies the problem of adaptive seed minimiza-
tion, and proposes algorithms that provide both strong theo-
retical guarantees and superior empirical effectiveness. Our
approach is based on a novel ASTI framework instantiated by
a truncated influence maximization algorithm TRIM, which
has a provable approximation guarantee. The core of our
TRIM algorithm is an elegant sampling method that gen-
erates random multi-root reverse reachable (mRR) sets for
estimating the truncated influence spread. We also extend
TRIM into its batched version TRIM-B to further improve
the efficiency of seed selection. With extensive experiments
on real data, we show that our solutions considerably outper-
form the state of the art for seed minimization under both
the IC and LT diffusion models.
ACKNOWLEDGMENTS
This research is supported by Singapore National Research
Foundation under grant NRF-RSS2016-004, by Singapore
Ministry of Education Academic Research Fund Tier 2 under
grant MOE2015-T2-2-069, by National University of Singa-
pore under an SUG, by Singapore Ministry of Education Aca-
demic Research Fund Tier 1 under grant MOE2017-T1-002-
024, and by a Discovery grant and a Discovery Accelerator
Supplement grant from the Natural Sciences and Engineering
Research Council of Canada (NSERC).
14
ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM10-210-11001011021030.010.050.10.150.2threshold η/nrunning time (sec)10-210-11001011020.010.050.10.150.2threshold η/nrunning time (sec)10-210-11001011021030.010.050.10.150.2threshold η/nrunning time (sec)10-11001011021031041050.010.020.030.040.05threshold η/nrunning time (sec) 50 100 150 200 250 300 35015101520realization indexspreadASTIATEUC 100 150 200 250 30015101520realization indexspreadASTIATEUCEfficient Approximation Algorithms for Adaptive Seed Minimization
REFERENCES
[1] Akhil Arora, Sainyam Galhotra, and Sayan Ranu. 2017. Debunking the
Myths of Influence Maximization: An In-Depth Benchmarking Study.
In Proc. ACM SIGMOD. 651 -- 666.
[2] Arash Asadpour, Hamid Nazerzadeh, and Amin Saberi. 2008. Stochastic
Submodular Maximization. In Proc. WINE. 477 -- 489.
[3] Ashwinkumar Badanidiyuru, Christos Papadimitriou, Aviad Rubin-
stein, Lior Seeman, and Yaron Singer. 2016. Locally Adaptive Opti-
mization: Adaptive Seeding for Monotone Submodular Functions. In
Proc. SODA. 414 -- 429.
[4] Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2012. Topic-
Aware Social Influence Propagation Models. In Proc. IEEE ICDM. 81 -- 90.
[5] Christian Borgs, Michael Brautbar, Jennifer Chayes, and Brendan
Lucier. 2014. Maximizing Social Influence in Nearly Optimal Time. In
Proc. SODA. 946 -- 957.
[6] Ning Chen. 2009. On the Approximability of Influence in Social Net-
works. SIAM Journal on Discrete Mathematics 23, 3 (2009), 1400 -- 1415.
[7] Wei Chen, Chi Wang, and Yajun Wang. 2010. Scalable Influence Maxi-
mization for Prevalent Viral Marketing in Large-Scale Social Networks.
In Proc. ACM KDD. 1029 -- 1038.
[8] Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient Influence Maxi-
mization in Social Networks. In Proc. ACM KDD. 199 -- 208.
[9] Wei Chen, Yifei Yuan, and Li Zhang. 2010. Scalable Influence Maxi-
mization in Social Networks Under the Linear Threshold Model. In
Proc. IEEE ICDM. 88 -- 97.
[10] Yuxin Chen and Andreas Krause. 2013. Near-optimal Batch Mode
Active Learning and Adaptive Submodular Optimization. In Proc. ICML.
160 -- 168.
[11] Yuxin Chen, Hiroaki Shioi, Cesar Fuentes Montesinos, Lian Pin Koh,
Serge Wich, and Andreas Krause. 2014. Active Detection via Adaptive
Submodularity. In Proc. ICML. 55 -- 63.
[12] Suqi Cheng, Huawei Shen, Junming Huang, Wei Chen, and Xueqi
IMRank: Influence Maximization via Finding Self-
Cheng. 2014.
consistent Ranking. In Proc. ACM SIGIR. 475 -- 484.
[13] Edith Cohen, Daniel Delling, Thomas Pajor, and Renato F. Werneck.
2014. Sketch-Based Influence Maximization and Computation: Scaling
Up with Guarantees. In Proc. ACM CIKM. 629 -- 638.
[14] Pedro Domingos and Matt Richardson. 2001. Mining the Network
Value of Customers. In Proc. ACM KDD. 57 -- 66.
[15] Uriel Feige. 1998. A Threshold of ln n for Approximating Set Cover. J.
ACM 45, 4 (1998), 634 -- 652.
[16] Sainyam Galhotra, Akhil Arora, and Shourya Roy. 2016. Holistic
Influence Maximization: Combining Scalability and Efficiency with
Opinion-Aware Models. In Proc. ACM SIGMOD. 743 -- 758.
[17] Daniel Golovin and Andreas Krause. 2011. Adaptive Submodularity:
Theory and Applications in Active Learning and Stochastic Optimiza-
tion. Journal of Artificial Intelligence Research 42, 1 (2011), 427 -- 486.
[18] Daniel Golovin and Andreas Krause. 2017. Adaptive Submodularity:
Theory and Applications in Active Learning and Stochastic Optimiza-
tion. arXiv preprint, https://arxiv.org/abs/1003.3967.
[19] Amit Goyal, Francesco Bonchi, Laks V.S. Lakshmanan, and Suresh
Venkatasubramanian. 2013. On Minimizing Budget and Time in Influ-
ence Propagation over Social Networks. Social Network Analysis and
Mining 3, 2 (2013), 179 -- 192.
[20] Amit Goyal, Francesco Bonchi, and Laks V. S. Lakshmanan. 2011. A
Data-Based Approach to Social Influence Maximization. Proc. VLDB
Endowment 5, 1 (2011), 73 -- 84.
[21] Amit Goyal, Wei Lu, and Laks V.S. Lakshmanan. 2011. CELF++: Op-
timizing the Greedy Algorithm for Influence Maximization in Social
Networks. In Proc. WWW Companion. 47 -- 48.
[22] Kai Han, Yuntian He, Xiaokui Xiao, Shaojie Tang, Jingxin Xu, and
Liusheng Huang. 2017. Cost-Effective Seed Selection for Online Social
Networks. arXiv preprint, https://arxiv.org/abs/1711.10665.
[23] Kai Han, Keke Huang, Xiaokui Xiao, Jing Tang, Aixin Sun, and Xueyan
Tang. 2018. Efficient Algorithms for Adaptive Influence Maximization.
Proc. VLDB Endowment 11, 9 (2018), 1029 -- 1040.
[24] Thibaut Horel and Yaron Singer. 2015. Scalable Methods for Adaptively
Seeding a Social Network. In Proc. WWW. 441 -- 451.
[25] Keke Huang, Sibo Wang, Glenn Bevilacqua, Xiaokui Xiao, and Laks
V. S. Lakshmanan. 2017. Revisiting the Stop-and-Stare Algorithms for
Influence Maximization. Proc. VLDB Endowment 10, 9 (2017), 913 -- 924.
[26] Kyomin Jung, Wooram Heo, and Wei Chen. 2012. IRIE: Scalable and
Robust Influence Maximization in Social Networks. In Proc. IEEE ICDM.
918 -- 923.
[27] David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the
Spread of Influence Through a Social Network. In Proc. ACM KDD.
137 -- 146.
[28] David Kempe, Jon Kleinberg, and Éva Tardos. 2005. Influential Nodes
in a Diffusion Model for Social Networks. In Proc. ICALP. 1127 -- 1138.
[29] Jinha Kim, Seung-Keol Kim, and Hwanjo Yu. 2013. Scalable and Paral-
lelizable Processing of Influence Maximization for Large-Scale Social
Networks. In Proc. IEEE ICDE. 266 -- 277.
[30] Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos,
Jeanne VanBriesen, and Natalie Glance. 2007. Cost-effective Outbreak
Detection in Networks. In Proc. ACM KDD. 420 -- 429.
[31] Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large
Network Dataset Collection. http://snap.stanford.edu/data.
[32] Cheng Long and Raymond Chi-Wing Wong. 2011. Minimizing Seed
Set for Viral Marketing. In Proc. IEEE ICDM. 427 -- 436.
[33] Hung T. Nguyen, My T. Thai, and Thang N. Dinh. 2016. Stop-and-Stare:
Optimal Sampling Algorithms for Viral Marketing in Billion-Scale
Networks. In Proc. ACM SIGMOD. 695 -- 710.
[34] Hung T. Nguyen, My T. Thai, and Thang N. Dinh. 22 Feb 2017. Stop-
and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-
Scale Networks. arXiv preprint, https://arxiv.org/abs/1605.07990v3.
[35] Matthew Richardson and Pedro Domingos. 2002. Mining Knowledge-
Sharing Sites for Viral Marketing. In Proc. ACM KDD. 61 -- 70.
[36] Lior Seeman and Yaron Singer. 2013. Adaptive Seeding in Social
Networks. In Proc. IEEE FOCS. 459 -- 468.
[37] Jing Tang, Xueyan Tang, Xiaokui Xiao, and Junsong Yuan. 2018. On-
line Processing Algorithms for Influence Maximization. In Proc. ACM
SIGMOD. 991 -- 1005.
[38] Jing Tang, Xueyan Tang, and Junsong Yuan. 2017. Influence Maximiza-
tion Meets Efficiency and Effectiveness: A Hop-Based Approach. In
Proc. IEEE/ACM ASONAM. 64 -- 71.
[39] Jing Tang, Xueyan Tang, and Junsong Yuan. 2018. An Efficient and
Effective Hop-Based Approach for Inluence Maximization in Social
Networks. Social Network Analysis and Mining 8, 10 (2018).
[40] Youze Tang, Yanchen Shi, and Xiaokui Xiao. 2015. Influence Maxi-
mization in Near-Linear Time: A Martingale Approach. In Proc. ACM
SIGMOD. 1539 -- 1554.
[41] Youze Tang, Xiaokui Xiao, and Yanchen Shi. 2014. Influence Maxi-
mization: Near-optimal Time Complexity Meets Practical Efficiency.
In Proc. ACM SIGMOD. 75 -- 86.
[42] Sharan Vaswani and Laks V. S. Lakshmanan. 2016. Adaptive Influence
Maximization in Social Networks: Why Commit when You can Adapt?
arXiv preprint, https://arxiv.org/abs/1604.08171.
[43] Vijay V. Vazirani. 2003. Approximation Algorithms. Springer.
[44] Abraham Wald. 1947. Sequential Analysis. Wiley.
[45] Yu Wang, Gao Cong, Guojie Song, and Kunqing Xie. 2010. Community-
Based Greedy Algorithm for Mining Top-K Influential Nodes in Mobile
Social Networks. In Proc. ACM KDD. 1039 -- 1048.
15
Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
[46] Amulya Yadav, Hau Chan, Albert Xin Jiang, Haifeng Xu, Eric Rice, and
Milind Tambe. 2016. Using Social Networks to Aid Homeless Shelters:
Dynamic Influence Maximization Under Uncertainty. In Proc. AAMAS.
740 -- 748.
[47] Peng Zhang, Wei Chen, Xiaoming Sun, Yajun Wang, and Jialin Zhang.
2014. Minimizing Seed Set Selection with Probabilistic Coverage
Guarantee in a Social Network. In Proc. ACM KDD. 1306 -- 1315.
[48] Chuan Zhou, Peng Zhang, Jing Guo, Xingquan Zhu, and Li Guo. 2013.
UBLF: An Upper Bound Based Approach to Discover Influential Nodes
in Social Networks. In Proc. IEEE ICDM. 907 -- 916.
T
A CONCENTRATION BOUNDS
We show some useful martingale concentration bounds,
i.e., the Chernoff-like bounds [40] and their variants [37].
Lemma A.1 ([40]). Let X1 − E[X1], . . . , XT − E[XT] be a
martingale difference sequence such that Xi ∈ [0, 1] for each
i =1 Xi. If E[Xi] is identical for every i, i.e.,
i. Let ¯X = 1
E[Xi] = E[ ¯X], then for any λ ≥ 0, we have
2
T
Pr[ ¯X > E[ ¯X] + λ] ≤ exp(cid:16) −
Pr[ ¯X < E[ ¯X] − λ] ≤ exp(cid:16) − λ
.
(17)
2E[ ¯X] + 2λ/3
(16)
(cid:17)
(cid:17)
λ
T
,
2
T
2E[ ¯X]
T
Lemma A.2 ([37]). Let X1 − E[X1], . . . , XT − E[XT] be a
martingale difference sequence such that Xi ∈ [0, 1] for each
i =1 Xi. If E[Xi] is identical for every i, i.e.,
i. Let ¯X = 1
E[Xi] = E[ ¯X], then for any λ ≥ 0, we have
T
9 −(cid:113) λ
(cid:16)(cid:113) ¯XT + 2λ
(cid:16)(cid:113) ¯XT + λ
(cid:113) λ
2 +
2
2
(cid:105) ≤ e−λ,
(cid:17)2 − λ
(cid:17)2(cid:105) ≤ e−λ .
18
(18)
(19)
Pr(cid:104)
Pr(cid:104)
E[ ¯X] · T <
E[ ¯X] · T >
B PROOFS
We first introduce the following lemma that is used to prove
Theorem 3.1.
Lemma B.1 ([18]). If function Γ satisfies all the following
conditions:
• there exists Q such that Γϕ(V) = Q for all ϕ;
• Γ is integer-valued;
• Γ is self-certifying;
• Γ is strong adaptive monotone;
• Γ is strong adaptive submodular;
then an α-approximate greedy policy π achieves an approxi-
mation ratio of (ln η+1)2
.
α
Proof of Theorem 3.1. Obviously, Γϕ(V) = η for all ϕ
and Γ is an integer-valued function. Now, we need to prove
16
that for any v ∈ Vi, ϕ, ϕ′ ∈ Ωi, and j ≤ i
Γϕ(Si−1) = Γϕ(V) if and only if Γϕ′(Si−1) = Γϕ′(V),
Γϕ(v Si−1) ≥ 0,
∆(v Sj−1) ≥ ∆(v Si−1),
∆(v Sj−1; Si−1) ≥ ∆(v Si−1),
(20)
(21)
(22)
(23)
where ∆(v Sj−1; Si−1) := EΦ∼Ωi[ΓΦ(v Sj−1)]. Equation (20)
represents self-certifying, Equation (21) describes strong
monotonicity, Equations (22) and (23) capture strong adap-
tive submodularity.
Equation (20) obviously holds, i.e., if Γϕ(Si−1) = Γϕ(V) = η,
we must have Γϕ′(Si−1) = η = Γϕ′(V), and vice versa.
Equation (21) holds naturally as "selecting more nodes
never hurts" the function Γ.
Next, we prove Equation (22). Let ϕi be a realization of Gi
with probability p(ϕi) according to the influence propagation.
Let Ωj(ϕi) be the subset realizations of Ωj that are consistent
with ϕi. That is, for every ϕ ∈ Ωj(ϕi) and every edge e ∈ Ei,
the statuses of e are the same in ϕ and ϕi such that both are
either live or blocked. Then, for any ϕi,
p(ϕ) = p(ϕi).
In addition, for any ϕ ∈ Ωi, let Vϕ(v Si−1) be the set of nodes
activated by v in Gi. Thus, Vϕ(v Si−1) is the spread of v
in Gi under realization ϕ. As a consequence, the marginal
truncated spread of v in Gi under ϕ is
Γϕ(v Si−1) = min{Vϕ(v Si−1), ηi}.
Similarly, for any ϕ ∈ Ωj, we have
Γϕ(v Sj−1) = min{Vϕ(v Sj−1), ηj} ≥ Γϕ(v Si−1),
where the inequality is due to Gi ⊆ Gj and ηi ≤ ηj. There-
fore,
ϕ∈Ωj(ϕi)
ϕ∈Ωj
Γϕ(v Sj−1) · p(ϕ)
∆(v Sj−1) =
≥
=
=
Γϕ(v Si−1) ·
=
Γϕ(v Si−1) · p(ϕ)
Γϕ(v Si−1) · p(ϕi)
ϕ∈Ωj(ϕi)
ϕ∈Ωj
ϕi
ϕi
Γϕ(v Si−1) · p(ϕ)
p(ϕ)
ϕ∈Ωj(ϕi)
ϕi
= ∆(v Si−1).
Finally, we prove Equation (23). For any ϕ ∈ Ωi, we have
Γϕ(v Sj−1) ≥ Γϕ(v Si−1).
Taking the expectation over Φ ∼ Ωi completes the proof. □
Efficient Approximation Algorithms for Adaptive Seed Minimization
Proof of Theorem 3.3. We prove the elementary version
of Equation (9), i.e., for any given realization ϕ,
(1 − 1/e)Γϕ(S) ≤ E[ Γϕ(S)] ≤ Γϕ(S),
Thus, д(x) decreases with x, which indicates that д(x) ≤
д(0) = 0. This implies that f ′(x) ≤ 0. As a consequence,
f (x) ≤ f (1) = η(1 − E[p(1)]) = η(1 − E[(n − k)/n]) = 1,
f (x) ≥ f (η) = 1 − E[p(η)] ≥ 1 − 1/e,
where the last step above follows from the analysis for the
case x ≥ η, by considering the special case x = η.
Hence, the theorem is proved.
□
Proof of Corollary 3.4. Equation (10) follows directly
from Theorem 3.3. By Equation (10),
E[Γ(S Si−1)] ≥ E[ Γ(S Si−1)],
1 − 1/e
E[Γ(S′ Si−1)] ≥
Hence, Equation (11) holds.
E[ Γ(S′ Si−1)] .
1
□
Proof of Lemma 3.5. We consider the special case of the
adaptive seed minimization problem in which the probability
p(e) = 1 for each edge e ∈ E. In this case, for any node
v ∈ V , the set of nodes influenced by v is the set of nodes
that can be reached by v in G, denoting as the cover set Sv.
Thus, for each node v ∈ V , its cover set Sv is deterministic.
As a consequence, the adaptive seed minimization problem
reduces to a set cover problem, i.e., aiming to find as few nodes
as possible to cover at least η nodes. Feige [15] has shown that
no polynomial time algorithm can approximate the optimal
solution of set cover within a ratio of (1−ε) ln η for any ε > 0
unless NP ⊆ DTIME(nO(log log n)). Hence, lemma 3.5 holds on
noting that ASM generalizes set cover.
□
Proof of Lemma 3.6. Let E be the following event:
◦ Si−1)].
∗ Si−1)] ≥ (1 − ε)E[ Γ(v
∗): E[ Γ(v
E(v
u∈Ut
such that
Note that v∗ is the seed node returned by the policy which
is a random variable. Let Ut be the set of possible seed nodes
selected (but not necessarily returned) by TRIM in the t-th
iteration in which each node u ∈ Ut has a probability Pr[u]
Pr[u] = 1, where 1 ≤ t ≤ T . Let U ∗
t denote
the set of random seed nodes returned at the t-th iteration
t ⊆ Ut. Therefore, the event E(v∗) does
of TRIM, where U ∗
not happen only if there exists a node v∗
t at iteration
t ∈ [1,T] satisfying that E(v∗
If TRIM stops at the iteration t = T , according to the
setting of θmax and by [40], we have
t )] ≤ δ/3.
Pr[(t = T) ∧ ¬E(v
∗
(25)
If TRIM stops at the iteration t < T , for any node v ∈ Vi, we
define two events E1(v) and E2(v) as
t ∈ U ∗
t ) does not happen.
ΛR(v) + 2a1/9 −(cid:112)
a1/2(cid:1)2 − a1/18,
ΛR(v) + a2/2 +(cid:112)
a2/2(cid:1)2
E1(v): E[ΛR(v)] ≥(cid:0)(cid:112)
E2(v): E[ΛR(v)] ≤(cid:0)(cid:112)
.
17
where the expectation is only taken over the randomness of
root size K.
Let x = Iϕ(S) denote the number of nodes influenced by S
under ϕ. Let p(x) be the probability that none of the k nodes
sampled can be influenced by S, which is given by
p(x) := Pr[ Γϕ(S) = 0] =(cid:0)n−x
n − x − i
n − i
.
k
k
i =0
k−1
(cid:1)/(cid:0)n
(cid:1) =
E[ Γϕ(S)] = η(cid:0)1 − E[p(x)](cid:1),
η(cid:0)1 − E[p(x)](cid:1)
E[ Γϕ(S)]
Γϕ(S) =
min{x, η}
.
Γϕ(S), with probability p(x),
Then, by the definition of
Γϕ(S) = 0; and with probability 1 − p(x), Γϕ(S) = η. As a
consequence, we have
(24)
where the expectation on the right hand side is taken with
respect to the randomness of k. Let f (x) be the ratio of
E[ Γϕ(S)] to Γϕ(S), which is given by
f (x) :=
=
i =0
i =0
n − k⊥
E[p(x)] = r
n − x − i
n − i
n − x − i
n − i
n − x − i
n − i
Now, we need to prove that 1− 1/e ≤ f (x) ≤ 1. We consider
the following two scenarios: (i) x ≥ η, and (ii) x < η.
(i) x ≥ η: In this case, f (x) = 1− E[p(x)] ≤ 1. Meanwhile,
k⊥
+ (1 − r) k⊥−1
(cid:16)r(n − x − k⊥)
+ (1 − r)(cid:17) k⊥−1
(cid:16)1 − rx
(cid:17) k⊥−1
r .h.s. ≤ e−r x/(n−k⊥) k⊥−1
(ii) x < η: In this case, f (x) = η(cid:0)1 − E[p(x)](cid:1)/x. Take the
e−x/(n−i) ≤ e−(r x/n+k⊥x/n) = e−x/η .
As x ≥ η by assumption, this implies that f (x) ≥ 1 − 1/e.
derivative,
As 1 − y ≤ e−y for any 0 ≤ y ≤ 1, in the above equation,
i =0
n − x − i
n − i
n − k⊥
i =0
i =0
=
.
(cid:0)E[p(x)] − 1 − xE[p
′(x)](cid:1).
′(x) =
f
Let д(x) = p(x)−1− xp′(x). Take the derivative, when x > 0,
η
2
x
д
′(x) − p
′(x) = p
′(x) − xp
′′(x) = −xp
′′(x).
According to the definition of p(x), we can get that
(n − x − i)(n − x − j) ≥ 0.
k−1
k−1
′′(x) =
p(x)
p
i =0
j=0, j(cid:44)i
Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
where E[ΛR(v)] = R · E[ Γ(v Si−1)]/ηi is the expected cov-
erage of v in R. Then, if v is independent of R, by Lemma A.2,
we have
where the expectation is over the randomness of both k and
Φ. In addition, we already know that
E[ηi(1 − p(xv))] = E[ Γ(v Si−1)] ≤ OPTi ,
(30)
,
(26)
(27)
3Tni
.
By a union bound that ensures all the ni nodes satisfying
Equation (26), we have
∗
Pr(cid:2)¬E1(v
Pr[¬E1(u)] · Pr[u]
3T
Pr(cid:2)¬E1(v)(cid:3) ≤ δ
Pr(cid:2)¬E2(v)(cid:3) ≤ δ
t )(cid:3) =
≤
≤
u∈U ∗
u∈Ut
t
u∈Ut
= δ/(3T)
Pr[¬E1(u)] · Pr[u]
δ/(3T) · Pr[u]
Meanwhile, v◦ is independent of R naturally. Thus, together
with the fact that ΛR(v◦) ≤ ΛR(v∗), by Equation (27)
◦)(cid:3) ≤ Pr(cid:2)¬E2(v
◦)(cid:3) ≤ δ/(3T).
Pr(cid:2)E[ΛR(v
◦)] > Λu(v
As a consequence, when TRIM stops at Λl(v∗
if the event E(v∗
events E1(v∗
E(v∗
t )/Λu(v◦) ≥ 1−ε,
t ) does not happen, then at least one of the
t ) and E2(v◦) does not happen. Thus, the event
t ) does not happen for all t < T with probability at most:
Pr
¬E(v
t )
∗
≤ (T − 1)( δ
3T
+ δ
3T
) ≤ 2δ
3 .
(28)
(cid:21)
(cid:20)T−1
t =1
Combining Equations (25) and (28) shows that the event
E(v∗) holds with probability at least 1 − δ. Thus, together
with the Equation (11) in Corollary 3.4, we have
(cid:104)
E
1
∆(v∗ Si−1)
(cid:105) ≤(cid:16)
(1 − 1/e)(1 − ε) + δ · ηi
1
(1 − 1/e)(1 − ε) ·
1 − δ
≤
1
(cid:17) ·
∆(v◦ Si−1) .
1
∆(v◦ Si−1)
Hence, the lemma is proved.
□
Proof of Lemma 3.8. For any node v, v is not visited by
a random mRR-set R if and only if v (cid:60) R. The probability
for not visiting v under a realization ϕ is p(xv), where xv =
Iϕ(v Si−1) is the number of nodes that can be activated by
v in Gi under ϕ. On the other hand, if a node is visited, all
of its incoming edges will be examined. Let indeg
denote
v
the number of v's incoming edges. Then, the expected time
complexity for generating a random mRR-set is
v ∈V
indeg
v · E[1 − p(xv)],
(29)
18
Combining (29) and (30) gives
indeg
v ∈V
Hence, the lemma is proved.
v · E[1 − p(xv)] ≤
(cid:115)
v ∈V
ε2 =
a(2 + 2ε2/3)
E[ΛR(v∗)] ,
Proof of Lemma 3.9. Let ε1 = ε/2 and ε2 be the root of
indeg
v
OPTi
ηi
=
OPTi
ηi
mi .
□
where a = c ln(4niT/δ) for any c ≥ 1 and δ = 1/ni. Let
.
θ
∗ :=
12ηi ln(4niT/δ)
(1 − ε)ε
2OPTi
events E1, E2, E3, E4 as follows:
As ε = O(ε), one can verify that θ∗ = O(cid:0) ηi ln ni
⋄)](cid:9),
∗)](cid:9),
∗)](cid:9).
⋄) ≥ (1 − ε1)E[ΛR(v
∗) ≤ E[ΛR(v
∗) ≥ (1 − ε2) · E[ΛR(v
∗) ≤ (1 + ε2) · E[ΛR(v
E1 =(cid:8)ΛR(v
E2 =(cid:8)ΛR(v
E3 =(cid:8)ΛR(v
E4 =(cid:8)ΛR(v
∗)] + ε1E[ΛR(v
ε2OPTi
(cid:1).7 Define the
⋄)](cid:9),
Then, when a number of R = cθ∗ mRR-sets are gener-
ated, by Lemma A.1, it is easy to verify that any event Ej
(1 ≤ j ≤ 4) does not happen with probability at most
Pr[¬Ej] ≤(cid:0)δ/4(cid:1)c
.
By the union bound, the probability that all the events
E1, E2, E3, E4 happen is at least 1 − δ c.
If the events E1, E2 happen,
E[ΛR(S
⋄)]
⋄)]
∗) − ε1 · E[ΛR(v
⋄) − ε1 · E[ΛR(v
∗)] ≥ ΛR(v
≥ ΛR(v
⋄)] − ε1 · E[ΛR(v
≥ (1 − ε1) · E[ΛR(v
= (1 − ε) · E[ΛR(v
⋄)],
= (1 − ε) · OPTi
R.
⋄)]
Thus, we have
(cid:115)
ε2 =
a(2 + 2ε2/3)
E[ΛR(v∗)] ≤
ηi
(cid:114)(2 + 2ε2/3)ε
2
12
< ε/2.
(31)
In addition, let
Λl := (1 + ε2) · E[ΛR(v
a higher approximation of 0.5 with O(cid:0) ηi ln ni
(cid:1) mRR-sets.
7Without loss of generality, we assume ε ≤ 0.5. If ε > 0.5, TRIM achieves
∗)].
OPTi
Efficient Approximation Algorithms for Adaptive Seed Minimization
According to the definition of ε2, we have
E[ΛR(v
∗)] =(cid:0)(cid:112)
ΛR(v∗) + 2a/9 −(cid:112)
Λl + 2a/9 −(cid:112)
a/2(cid:1)2 − a/18.
a/2(cid:1)2 − a/18 − E[ΛR(v
∗) − E[ΛR(v
∗)]
Λl(v
≥(cid:0)(cid:112)
Since a1 ≤ a, if event E4 happens (i.e., ΛR(v∗) ≤ Λl), then
∗)]
≥ ΛR(v
∗) − Λl .
As a consequence, if event E3 also happens, we have
∗).
∗) − ε2E[ΛR(v
∗) ≥ ΛR(v
ΛR(v
Λl(v
∗)] ≥ 1 − 2ε2
1 − ε2
Similarly, let
Since a2 ≤ a, if event E3 happens (i.e., ΛR(v∗) ≥ Λu), then
∗)].
Λu := (1 − ε2) · E[ΛR(v
According to the definition of ε2, we have
E[ΛR(v
Λu(v◦)
Λu
Λu + a/2 +(cid:112)
∗)] ≥(cid:0)(cid:112)
a/2(cid:1)2
(cid:0)(cid:112)ΛR(v∗) + a/2 +(cid:112)a/2(cid:1)2
.
(1 − ε2) · E[ΛR(v∗)]
ΛR(v∗)
(1 − ε2) · Λu
.
≤
≤
As a consequence, we have
Λu(v
◦) ≤ ΛR(v∗)
1 − ε2
Λl(v∗)
Λu(v◦) ≥ (1 − 2ε2)ΛR(v∗)
Putting it all together of (31), (32) and (33), we have
· 1 − ε2
ΛR(v∗) ≥ 1 − ε.
1 − ε2
.
(33)
Therefore, when a number of cθ∗ mRR-sets are generated,
TRIM does not stop only if at least one of the events in
E1, E2, E3, E4 does not happen, with probability at most δ c.
Let t be the first iteration that the number of mRR-sets
generated by TRIM reaches θ∗ such that 2t−2 · θ◦ < θ∗ and
2t−1 · θ◦ ≥ θ∗. From this iteration onward, the expected
number of mRR-sets further generated is at most
2z · δ
2z
2z−t = 2t−1 · θ◦
θ◦ · 2z−1 · δ
z≥t
∗
∗
z=0
z=0
.
∗
≤ 2θ
≤ 2θ
≤ 4θ
z=0
2−2z +z
2−z
O(cid:0) ηi ln ni
(cid:1).
θ∗ random samples generated. Therefore, the expected num-
ber of random samples generated is less than 5θ∗, which is
ε2OPTi
Hence, the lemma is proved.
□
(32)
Proof of Lemma 3.10. The time complexity of TRIM is
determined by that for generating mRR-sets. By Wald's equa-
tion [44], the expected total time used for generating mRR-
sets equals the expected number of mRR-sets generated,
times the expected time used for generating one mRR-set.
Thus, according to Lemmas 3.8 and 3.9, the expected time
complexity of TRIM is O( mi +ni
□
ε2
ln ni).
Proof of Lemma 4.1. Let S∗ be the seed set returned by
the batched policy with S∗ = b and S◦ be the corresponding
optimal seed set in the i-th round. Let Eb be the following
event:
∗): E[ Γ(S
∗ Si−1)] ≥ ρb(1 − ε)E[ Γ(S
Eb(S
t be the generalized definition of v∗
Let S∗
t in Section 3.5. If S∗
is returned at T -th iteration, based on the setting of T and
by [40], we still have
◦ Si−1)].
Pr[(t = T) ∧ ¬Eb(S
(34)
If TRIM-B stops at the iteration t < T , for any node S ⊆ Vi
obtained by greedy method with S = b, we define two
events Eb,1(S) and Eb2(v) as
t )] ≤ δ/3.
∗
ΛR(S) + 2a1/9 −(cid:112)
ΛR(S)/ρb + a2/2 +(cid:112)
a1/2(cid:1)2 − a1/18,
a2/2(cid:1)2
Eb,1(S) : E[ΛR(S)] ≥(cid:0)(cid:112)
Eb,2(S) : E[ΛR(S)] ≤(cid:0)(cid:112)
.
b
δ
(35)
Based on Lemma A.2, we could have
b
node set, we could immediately have
where E[ΛR(S)] = R · E[ Γ(S Si−1)]/ηi is the expected
coverage of S in R.
Pr(cid:2)¬Eb,1(S)(cid:3) ≤
3T(cid:0)ni
(cid:1) .
Similarly, by union bound for all(cid:0)ni
(cid:1) candidates of size-b
t )(cid:3) ≤ δ/(3T).
Pr(cid:2)¬Eb,1(S
(36)
Let S◦
R be the size-b seed set that could cover largest number
of mRR-sets in R. Since S is derived by Greedy method from
R, by the property of greedy method, we have ΛR(S) ≥
ρb ΛR(S◦
R) ≥ ρb ΛR(S◦). Then ΛR(S)/ρb can be taken as the
upper bound of ΛR(S◦). Similarly, by Lemma A.2, we have
following equation
∗
Pr(cid:2)¬Eb,2(S
◦)(cid:3) ≤ δ/(3T).
(37)
By following the analysis in Section 3.5, we acquire the fact
that event Eb holds with at least 1 − δ probability where
The first inequality is due to 2t−1 · θ◦ < 2θ∗ and δ ≤ 1/2,
and the second inequality is due to −2z + z ≤ −z. If the
algorithm stops before the t-th iteration, there are at most
19
Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim
(a) NetHEPT
(a) NetHEPT
(b) Epinions
(c) Youtube
Figure 9: Spread vs. threshold under the IC model.
(b) Epinions
(c) Youtube
Figure 10: Marginal truncated spread under the IC model.
(d) LiveJournal
(d) LiveJournal
δ = 1/ni. By Corollary 3.4, the expected approximation ratio
of TRIM-B is at least
(1 − δ) · (1 − ε) · ρb · (1 − 1/e) = ρb(1 − 1/e)(1 − ε).
Hence, the lemma is proved.
□
C DISCUSSIONS ON INFLUENCE SPREAD
Figure 9 reports the spread of the tested algorithms under
the IC model (results under the LT model are similar). For the
most parts, all the algorithms achieve a comparable spread
on the four datasets. The major differences lie in η/n = 0.01
on Epinions and Youtube. As observed, ASTI-8 (resp. ATEUC)
achieves the largest (resp. smallest) spread among all algo-
rithms. This is because the batch size b is relatively large
with regard to the small threshold, owing to which the spread
of the 8-size seed set selected by ASTI-8 significantly over-
shoots 0.01n on Epinions and Youtube. Another interesting
observation is that the spread achieved by ATEUC is slightly
larger than each of the other five adaptive algorithms as the
threshold becomes larger (not quite noticeable in the figure).
This is because ATEUC selects considerably more seeds than
the adaptive algorithms do, resulting in a larger spread at the
cost of an excessive number of seeds. This is also supported
by the results in Table 3.
D DISCUSSIONS ON MARGINAL
TRUNCATED SPREAD
To explore the property of the marginal truncated spread,
we record the marginal spread of each seed node selected
by adaptive algorithms under the 20 realizations sampled.
Figures 10 shows the result of each realization with η/n = 0.2
on corresponding datasets (or η/n = 0.05 on the LiveJournal
dataset) under the IC model. (The result under the LT model
is similar.) In general, the marginal spread diminishes along
the index of the seed node, which is consistent with the
property of submodularity as expected. Note that the spread
fluctuation is due to the randomness of the tested realizations,
i.e., in some particular realizations, some seed node selected
later may influence more nodes than some seed node selected
earlier.
20
ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM1021031040.010.050.10.150.2threshold η/nspread1031041050.010.050.10.150.2threshold η/nspread1041051060.010.050.10.150.2threshold η/nspread1041051060.010.020.030.040.05threshold η/nspread 0 40 80 120 160 0 50 100 150 200 250 300seed indexspread 0 20 40 60 80 0 20 40 60 80 100 120 140seed indexspread (102) 0 10 20 30 40 0 30 60 90 120 150seed indexspread (103) 0 10 20 30 0 100 200 300 400 500seed indexspread (103) |
1907.04503 | 1 | 1907 | 2019-07-10T04:13:43 | Pairwise Link Prediction | [
"cs.SI",
"physics.soc-ph"
] | Link prediction is a common problem in network science that transects many disciplines. The goal is to forecast the appearance of new links or to find links missing in the network. Typical methods for link prediction use the topology of the network to predict the most likely future or missing connections between a pair of nodes. However, network evolution is often mediated by higher-order structures involving more than pairs of nodes; for example, cliques on three nodes (also called triangles) are key to the structure of social networks, but the standard link prediction framework does not directly predict these structures. To address this gap, we propose a new link prediction task called "pairwise link prediction" that directly targets the prediction of new triangles, where one is tasked with finding which nodes are most likely to form a triangle with a given edge. We develop two PageRank-based methods for our pairwise link prediction problem and make natural extensions to existing link prediction methods. Our experiments on a variety of networks show that diffusion based methods are less sensitive to the type of graphs used and more consistent in their results. We also show how our pairwise link prediction framework can be used to get better predictions within the context of standard link prediction evaluation. | cs.SI | cs | PA I RW I S E L I N K P R E D I C T I O N
Huda Nassar, Austin R. Benson, David F. Gleich
9
1
0
2
l
u
J
0
1
]
I
S
.
s
c
[
1
v
3
0
5
4
0
.
7
0
9
1
:
v
i
X
r
a
Link prediction is a common problem in network science that transects
many disciplines. The goal is to forecast the appearance of new links or to
find links missing in the network. Typical methods for link prediction use
the topology of the network to predict the most likely future or missing
connections between a pair of nodes. However, network evolution is often
mediated by higher-order structures involving more than pairs of nodes;
for example, cliques on three nodes (also called triangles) are key to the
structure of social networks, but the standard link prediction framework
does not directly predict these structures. To address this gap, we propose
a new link prediction task called "pairwise link prediction" that directly
targets the prediction of new triangles, where one is tasked with finding
which nodes are most likely to form a triangle with a given edge. We
develop two PageRank-based methods for our pairwise link prediction
problem and make natural extensions to existing link prediction methods.
Our experiments on a variety of networks show that diffusion based
methods are less sensitive to the type of graphs used and more consistent
in their results. We also show how our pairwise link prediction framework
can be used to get better predictions within the context of standard link
prediction evaluation.
1 introduction
Networks are a standard tool for data analysis in which links between data points
are the primary object of study. A fundamental problem in network analysis is
link prediction [Liben-Nowell and Kleinberg, 2007; Lü and Zhou, 2011], which is
typically formulated as a problem of identifying pairs of nodes that will either form
a link in the future (when viewing the network as evolving over time) or whose
connection is missing from the data [Clauset et al., 2008]. The link prediction
problem has applications in a variety of domains. For instance, in online social
networks of friendships, predicting that two people will form a connection can be
used for friendship recommendation [Backstrom and Leskovec, 2011]. Similarly,
predicting new links between users and items on platforms such as Amazon and
Netflix can be used for product recommendation [Gomez-Uribe and Hunt, 2015].
And in biology, link prediction is used to identify novel interactions between genes,
diseases, and drugs within interaction networks [Lin et al., 2018]. In the settings
above, the link prediction problem is oriented around -- and evaluated in terms
of -- the identification of pairs of nodes that are likely to be connected. However,
there is mounting evidence that the organization and evolution of networks is
centered around higher-order interactions involving more than two nodes [Milo
et al., 2002; Milo, 2004; Benson et al., 2016, 2018; Lambiotte et al., 2019]. In the
case of social networks, triangles (cliques on three nodes) are extremely common
due to various sociological mechanisms driving triadic closure [Easley et al., 2010;
Holland and Leinhardt, 1977; Granovetter, 1977; Rapoport, 1953]. Methods for
link prediction are indeed motivated by these ideas. For instance, the Jaccard
similarity between the sets of neighbors of two nodes -- a common heuristic for link
prediction [Liben-Nowell and Kleinberg, 2007] -- measures the number of triangles
that would be created if the two nodes are linked, normalized by the total number
1
Huda Nassar, Purdue University
[email protected]
Austin R. Benson, Cornell University
[email protected]
David F. Gleich, Purdue University
[email protected]
of neighbors of the two nodes. Still, such methods are used to make predictions
on pairs of nodes, rather than a prediction on the appearance of the higher-order
structures directly. Here, we develop a framework for directly predicting the
appearance of a higher-order structure. We focus on the case of triangles, which
is one of the simplest higher-order structures while also being critical to social
network analysis. Again, classical link prediction is centered around the following
question: given a node u in the network, which nodes are likely to link to u? This
scenario is illustrated in Figure 1A. Our framing of the problem is similar, but
we instead ask the following: given an edge (u, v) in the network, which nodes
are likely to connect to both u and v? We call this the pairwise link prediction
problem, and it is illustrated in Figure 1B. There are several scenarios where the
pairwise link prediction problem is natural, such as recommending a new friend
to a couple on an online social network, recommending a movie to a couple in a
video site, or predicting an effective drug given a disease-gene pair. We devise two
new algorithms for the pairwise link prediction problem. The first is based on a
variant of seeded (personalized) PageRank that uses multiple seeds, namely, one
seed at each end point of the edge for which we are trying to predict new triadic
connections. The second is based on a PageRank-like iteration that puts more
weight on edges that participate in many triangles. In this sense, the method
reinforces triangles, and we call the method "Triangle Reinforced PageRank"
(TRPR). We compare these algorithms to natural extensions of local similarity
measures that are common in link prediction, such as Jaccard similarity [Liben-
Nowell and Kleinberg, 2007], Adamic-Adar similarity [Adamic and Adar, 2003],
and preferential attachment [Newman, 2001]. For a given edge, each of the above
methods produces a score for the remaining nodes in the graph. We find that our
proposed diffusion based methods are the least sensetive to the graph type and
degree distribution and often produce the top results. We provide code for all the
methods used in this paper in the repository:
https://github.com/nassarhuda/pairseed
2 background and related work
We now briefly review some related work in link prediction and higher-order
structure. As part of this, we will go over methods that we will generalize in
the next section for the pairwise link prediction problem. All of these methods
assign some similarity score between pairs of nodes, where a larger similarity is
indicative of pairs that are likely to connect. For notation, we use Γ(u) to denote
the set of neighbors of node u in the graph.
2.1 LOCAL METHODS
Several approaches to link prediction are based on local information in the graph,
namely a score is assigned to a pair of nodes w and u based on their 1-hop
neighborhoods Γ(w) and Γ(u). One approach that falls under this category stems
from the idea that as Γ(w)∩Γ(u) increases, the chance that u and v are connected
also increases [Newman, 2001]. Here, Γ(w)∩ Γ(u) is the number of triangles that
would be formed if u and v were connected. Often, this number is normalized by
the size of the neighborhoods, which gives rise to the Jaccard similarity between
two nodes w and u:
Γ(w) ∩ Γ(u)
Γ(w) ∪ Γ(u) .
The Adamic -- Adar similarity measure [Adamic and Adar, 2003] is a local score
that assigns similarity between two nodes based on how important their common
neighbors are, where importance is measured by the degree of a given node.
2
FIGURE 1 -- (A) In standard link pre-
diction, we are tasked with finding
nodes that are likely to link to a given
node u. (B) In this paper, we study
pairwise link prediction, where we are
tasked with finding nodes that are
likely to form a triangle with a given
edge (v, w).
ABuvwFormally, the Adamic -- Adar similarity measure between nodes u and v is:
(cid:88)
1
log(Γ(z))
.
z∈Γ(w)∩Γ(u)
A third local method is based on preferential attachment, where nodes are more
likely to connect to established nodes in the network, and, established nodes have
a higher chance to connect to each other [Barabási and Albert, 1999; Newman,
2001]. Using degree as a proxy for how established a node is, the preferential
attachment score between nodes w and u is:
Γ(w) · Γ(u).
2.2 GLOBAL METHODS
Another set of approaches for link prediction are based on aggregating (weighted
or normalized) path counts of varying lengths. In contrast to the local methods
described above, these methods use global information about the entire network.
For example, the Katz similarity counts the number of paths between two nodes,
weighting paths of length-k by βk [Katz, 1953; Liben-Nowell and Kleinberg, 2007].
Another class of global methods are methods based on conservative diffusions such
as PageRank [Page et al., 1999]. Such diffusion methods are typically seeded by a
particular node u, and the similarity of u to all other nodes is given by the amount
of "mass" that diffuses to each other node. We will make use of PageRank-like
methods in the next section.
2.3 HIGHER-ORDER STRUCTURE
Since a network encodes pairwise relationships (edges) between elements (nodes),
the link prediction problem is natural in many cases. Nevertheless, recent studies
have shown that networks evolve through higher-order interactions, i.e., much of
the structure in evolving networks involves interactions between more than just
two nodes [Benson et al., 2018]. Recent research has also introduced the problem
of predicting the time when an edge addition will close a triangle [Dave and
Hasan, 2019]. Furthermore, random graph models constructed from distributions
of triangles have shown to be good fits for real-world data [Eikmeier et al., 2018],
providing additional evidence that triadic relationships are important to the
assembly of networks.
3 methods
We propose several methods for the pairwise link prediction problem. First, we
extend the three local methods described above to measure node-edge similarity.
After, we propose diffusion-based methods akin to seeded PageRank.
3.1 LOCAL SIMILARITY MEASURES FOR PAIRWISE PREDICTION
Our goal here is to extend common local methods for link prediction to the scenario
of pairwise link prediction. In other words, instead of computing similarity between
nodes, we now compute similarity between an edge and a node. To do this, we
simply replace the neighborhood of one node with the neighborhood of an edge.
This requires that we specify what the neighborhood of an edge (u, v) should
capture. We define:
Γ((u, v)) = {node z z is connected to either or both nodes u, and v}
= Γ(u) ∪ Γ(v) \ {u, v}.
Note that this is akin to the boundary of a set of vertices in the graph that is
often used to define the size of a cut, which -- for an edge -- would correspond to
the union of neighborhoods. This definition is contrary to what we use in [Nassar
3
et al., 2019], where we define the neighborhood to be the intersection. Initially, the
intersection of neighborhoods was a natural choice, but in practice the intersection
set is very limiting specially in scenarios when an edge is connected to the rest of
the graph, yet does not participate in any triangles. We should still be able to
make predictions on such edges, and our choice of the union of neighborhoods
handles this.
Using the substitution gives us three similarity measures that will compute
the similarity of an edge to a node.
· Jaccard Similarity (JS).
JS(w, (u, v)) =
Γ(w) ∩ Γ((u, v))
Γ(w) ∪ Γ((u, v))
· Adamic -- Adar (AA).
AA(w, (u, v)) =
(cid:88)
1
logΓ(z)
z∈Γ(w)∩Γ((u,v))
· Preferential Attachment (PA).
PA(w, (u, v)) = Γ(w) · Γ((u, v))
Further, we extend the Jaccard Similarity and Adamic -- Adar measures to account
for a combination of the single link prediction results. We use the maximum value
of the single similarity score of both end points of an edge (u, v) with another
node w, as well as the product of similarity values. We state these measure below.
· Jaccard Similarity.
JS -- MAX(w, (u, v)) = max(JS(w, u), JS(w, v))
JS -- MUL(w, (u, v)) = JS(w, u) · JS(w, v)
· Adamic -- Adar.
AA -- MAX(w, (u, v)) = max(AA(w, u), AA(w, v))
AA -- MUL(w, (u, v)) = AA(w, u) · AA(w, v)
Next, we develop two new methods for pairwise link prediction based on seeded
PageRank, and use a combination of the single seeded PageRank results to
compute a new measure of similarity between an edge and a node.
3.2 PAIR-SEEDED PAGERANK
Seeded PageRank is a foundational concept in network analysis that models a flow
of information in a network to predict links and communities on a network [An-
dersen et al., 2006; Gleich, 2015]. Seeded PageRank models information flow
from the seed node to other nodes in the network via a Markov chain, and the
stationary distribution of the chain provides the scores on the nodes. A high score
on a node is a signal that the node should be connected to the seed node. More
formally, let A be the symmetric adjacency matrix of an undirected graph, and let
P be the column stochastic matrix of a random walk on that graph. Specifically,
P (i, j) = A(i, j)/Γ(j). Let u be the seed node. Then the seeded PageRank scores
are entries of the solution vector x to the linear system (I − αP )x = (1 − α)eu.
Here, eu is the vector of all zeros, except at index u, where eu(u) = 1 (i.e.,
eu is the indicator vector on node u). The parameter α is the probability of
transitioning according to the probability distribution in P and (1 − α) is the
probability of teleporting according to the probability distribution in eu. The
4
entries of x provide similarities between node u and the other nodes and thus can
be used for standard link prediction.
In the same way seeded PageRank predicts the relevance of other nodes in
the network to a single seed node, we propose pair-seeded PageRank to predict
the relevance of nodes to a single edge; with these similarities, we are able to
make predictions for the pairwise link prediction problem. For a given edge (u, v),
pair-seeded PageRank solves the following linear system:
(I − αP )x = (1 − α)eu,v.
In this case, eu,v is the vector of all zeros, except at indices u and v, where
eu,v(u) = eu,v(v) = 1/2. The solution x can be interpreted as the similarity of
each node to the edge (u, v).
We now note that pair-seeded PageRank is equivalent to the sum of single-
seeded PageRank on each of the nodes, up to a scalar multiple. This follows
quickly from linearity of the PageRank problem. To see this, let xu and xv be the
seeded PageRank solutions corresponding to nodes u and v respectively. Then,
Adding the above two equations yields
(I − αP )xu = (1 − α)eu
(I − αP )xv = (1 − α)ev
(I − αP )(xu + xv) = (1 − α)(eu + ev)
(I − αP )(xu + xv) = (1 − α)(2eu,v)
(I − αP )(xu + xv) = (1 − α)eu,v
(I − αP )x = (1 − α)eu,v
1
2
Hence, 2x = xu + xv, and the pair-seeded PageRank solution is equivalent to the
summation of the single seeded PageRank equations, up to scaling. Indeed, this is
a useful and helpful observation as there are many systems designed to estimate
large seeded PageRank values for single-seeds by using highly scalable random
walk methods [Lofgren et al., 2016]. Thus, this technique could be used wherever
a PageRank-style prediction is already employed.
3.3 TRIANGLE REINFORCED PAGERANK (TRPR)
We now propose a PageRank-like method that uses a weighting scheme on edges
based on the number of triangles that contains each edge, which we call Triangle
Reinforced PageRank (TRPR). For an unweighted graph, the PageRank solution
is highly affected by the degree of nodes in the network. Here, we reinforce the
influence of triangles by giving edges participating in many triangles a higher
weight. Figure 2 presents a motivating example for the usefulness of reinforcing
triangles.
To develop our TRPR method, we first introduce a tensor T , that encodes all
triangles in a network:
(cid:40)
T (i, j, k) =
1 if (i, j, k) is a triangle
0 otherwise.
we compute the matrix X = T [x], where X(i, j) = (cid:80)
Again, in our derivation, we assume that the graph is undirected so that T is fully
symmetric in all permutations of indices. A typical way to solve the PageRank
linear system is the power method. With TRPR, we modify the power method
by adding a step that redistributes the weights in the network. Specifically,
k T (i, j, k)x(k), which
measures the relevance of edge (i, j) to the distribution of node scores in the
vector x. We then run an iteration of the power method on a weighted adjacency
5
FIGURE 2 -- Motivating social network
example for the TRPR algorithm. If
all of the friends of the blue couple
know the red node, we want to predict
that the red node must know the blue
couple as well. Running TRPR on the
above example with eu,v as the seed
vector on the blue nodes reveals that
the red node has the third highest
score after the two blue nodes. After
10 iterations of Algorithm 1 with
α = 0.85, the output vector assigns a
score of 0.120 to the red node, 0.062
to the black nodes, and 0.252 to the
blue nodes.
Algorithm 1: TRPR
Input: T , adjacency matrix of undirected graph A, α, eu,v, nb. iterations n
Output: x
x0 = eu,v
for i = 1, 2, . . . , n do
r,s =(cid:80)
k T (r, s, k)xi−1(k)
+ A) # column stochastic
(i)
= T [xi−1] # i.e., X (i)
X
P i = normalize( X
xi = αP ixi−1 + (1 − α)x0
(i)
return xn
matrix X = X + A, where the columns are re-normalized to make the matrix
column stochastic. Algorithm 1 shows the idealized algorithm.
TRPR can be implemented efficiently. Although TRPR involves the
tensor T , we do not need to form it explicitly, and we show an alternative
derivation here. We first unwrap one iteration of TRPR. Let Ai = T [xi−1] + A,
then, at iteration i, we can translate xi = αP ixi−1 + (1 − α)x0 into
xi = α((T [xi−1] + A)D−1
Ai
)xi−1 + (1 − α)x0
where D−1
is a diagonal matrix with the ith diagonal entry being the inverse of
the sum of edge weights connected to node i in Ai (again, we assume a connected
graph so these values are all non-zero). Then,
Ai
xi = αT [xi−1]D−1
Ai
xi−1 + αAD−1
Ai
xi−1 + (1 − α)x0.
Set yi−1 = D−1
Ai
xi−1. Then
xi = αT [xi−1]yi−1 + αAyi−1 + (1 − α)x0.
j
Ai
(cid:80)
zi = (cid:80)
and
The relevant computationally expensive pieces to compute are T [xi−1]yi−1
the entries of D−1
. Both involve the same type of operation. Using the
definition of T [x] we have that the matrix-vector product z = T [x]y has
k T (i, j, k)y(j)x(k). Consequently, if we have any means of iterat-
ing over the triangles of a graph, then we can compute T [x]y for any pair x and
y in a fashion akin to a sparse-matrix-vector product but in runtime proportional
to the number of triangles in the graph.
Ai
Ai
This directly enables us to compute T [xi−1]yi−1
. To compute the entries in
D−1
, note that T [x] is a symmetric matrix because it can be written as a sum
of symmetric matrices (since T is fully symmetric in all permutations). Thus,
the row-sums of Ai are the vertex-degrees we need to build D−1
. Let e be the
vector of all ones; these row sums are computed as Aie = T [xi]e + Ae. Since
A is not changing, we only need to compute the column sums of T [xi]e at each
iteration. Again, we can use an implicit tensor-vector-vector product operation
to compute the column sums. And thus, all operations involving the tensor T are
linear in terms of the number of triangles in the network, and we use a fast routine
to iterate through triangles in a graph. For ease of reuse, we provide the code
for TRPR at https://github.com/nassarhuda/pairseed/blob/master/trpr.jl. We
experimentally validate the running time of TRPR on a preferential attachement
graph while varying the size of the graph. We specifically use the generalized
preferential attachment model [Avin et al., 2015] that generalizes the classical
preferential attachment model [Newman, 2001]. In this experiment we vary the
edge addition probability pe, and allow the node addition probability to be 1 − pe.
Figure 3 shows the running time in seconds and empirically verifies that TRPR is
a fast method when implemented efficiently and thus, is scalable to large graphs.
A weighted version of TRPR. Although TRPR introduces higher weights
to edges participating in many triangles by forming a new adjacency matrix
6
FIGURE 3 -- Time in seconds as we run
TRPR for 10 iterations on generalized
preferential attachement graphs as we
vary the size of the network and the
edge addition probability.
0.50.60.70.80.9edge addition prob100020005000100002000050000100000number of nodes0.20.010.040.120.544.1215.760.030.020.060.160.614.4516.140.010.030.080.20.774.9417.610.020.050.120.31.025.3119.120.020.050.160.391.36.3821.55Algorithm 2: TRPR-Weighted
Input: T , adjacency matrix of undirected graph A, α, eu,v, nb. iterations n
Output: x
x0 = eu,v
for i = 1, 2, . . . , n do
r,s =(cid:80)
(i)
= T [xi−1] # i.e., X (i)
X
γ = sum(A)/sum( X
P i = normalize(γ X
xi = αP ixi−1 + (1 − α)x0
return xn
k T (r, s, k)xi−1(k)
(i)
(i)
)
+ A) # column stochastic
X + A, these weights are often dominated by the weights in the adjacency matrix
A. To give a fair contribution to these edges, we introduce a scalar multiple
to X. A straightforward scalar we choose is γ = sum(A)/sum( X). This scalar
will guarantee that the sum of weights in A and γ X are equal. We present the
idealized algorithm of the weighted version of TRPR in Algorithm 2.
Convergence of TRPR. Convergence of this type of nonlinear system
of equations is theoretically delicate with bounds that are often insufficient
for practice [Benson et al., 2017]. Empirically, we observe that the iterations
converge. However, absent a robust theory, this method is only run for a small
and fixed number of iterations (10). This will produce a unique deterministic and
reproducible set of scores that locally capture the influence of both the graph and
the reinforced triangles. In Figure 4, we show the 1-norm difference decay from
two consecutive iterates from TRPR on 4 datasets used in the experiments section.
Figure 4 shows that the method converges experimentally. Even though the norm
convergence seems to happen after around 100 iterations in these datasets, the
ordering of nodes in these vectors does not change much after a few iterations. We
run another experiment to study the ordering of the nodes from every iteration
and notice that the order does not change much after just a few iterations. In
Figure 5, we show the Spearman's rank correlation coefficient and the Kendall
rank correlation coefficient between two consecutive iterates from TRPR on the
same four graphs used in Figure 4. We notice that after a few iterations (10) the
orderings of the vectors no longer change, and especially the order of the top 100
nodes does not change (solid lines in the plot in Figure 5).
3.4 EXTENSIONS OF SINGLE-SEEDED PAGERANK
We also use the single seeded PageRank solution of each endpoint of the edge we
are interested in predicting links to and produce two more metrics for relating
an edge to a node. Denote xu, and xv to be the seeded PageRank solutions for
nodes u and v respectively. Then, we define MAX and MUL as follows.
MAX(u, v) = max(xu, xv) (element-wise maximum)
MUL(u, v) = xu (cid:12) xv (element-wise multiplication)
4 experimental setup
We now perform a series of experiments on synthetic as well as real-world graphs
from a variety of disciplines, including online social networks, communication
networks, and biological interaction networks. We also include experiments for
static networks as well as a temporal network. For evaluation, we use the Success
Probability (SP) measure, which we define for one experiment as follows:
7
FIGURE 4 -- 1-norm convergence of
TRPR on 4 datasets used in the ex-
periments section. These figures show
that TRPR converges experimentally.
FIGURE 5 -- Spearman's rank correla-
tion coefficient and the Kendall rank
correlation coefficient between two
consecutive iterates from TRPR. The
solid plots show the consecutive cor-
relation values when truncating the
vectors to take the top 100 nodes, and
the dashed lines compare the order-
ings in the full vectors. The vertical
red line represents the 10th iterate.
The text in the figures is the corre-
lation between the 10th iterate and
the 200th iterate. These correlations
support our choice of 10 iterations in
the experiments involving TRPR.
05010015020010151010105100norm differencePP-Pathways1e-4.81e-7.61e-9.21e-10.81e-12.405010015020010151010105100email1e-3.81e-6.51e-9.21e-11.81e-14.4050100150200iteration10151010105100norm differenceGPA1e-3.31e-6.51e-9.31e-12.11e-14.7050100150200iteration10151010105100FB-Penn1e-4.01e-7.01e-9.91e-12.91e-15.801020300.000.250.500.751.00correlation valuePP-PathwaysCorrelation(iter10,iter200)Spearman = 1.0Kendall = 1.0SpearmanKendallSpearman-top100Kendall-top10001020300.000.250.500.751.00emailCorrelation(iter10,iter200)Spearman = 1.0Kendall = 0.99SpearmanKendallSpearman-top100Kendall-top1000102030iteration number0.000.250.500.751.00correlation valueGPACorrelation(iter10,iter200)Spearman = 1.0Kendall = 0.98SpearmanKendallSpearman-top100Kendall-top1000102030iteration number0.000.250.500.751.00FB-PennCorrelation(iter10,iter200)Spearman = 1.0Kendall = 0.98SpearmanKendallSpearman-top100Kendall-top1001 if at least one ground truth node w appears in the top k
predictions for edge (u, v)
0 otherwise.
SP((u, v), k) =
Note that the top k predictions is the set of k nodes that are not connected
to either end point of the seed edge with the highest scores. For our experiments,
we will have training data and validation data, and the ground truth nodes that
should be connected to an edge from the training data can be deduced from the
validation data. For each training dataset, we run 500 random experiments, where
we try to predict links to 500 randomly chosen edges (we call them seed edges).
For each experiment, an SP value (0 or 1) is computed, and the overall score is
the mean value over all the experiments. The main choice for this measure in
contrast to the area under ROC curve (AUC score) measure for instance, is the
small number of nodes that we often want to recover. For a given edge (u, v) in
the training data, the validation data must have the edges (u, w) and (v, w) for w
to be considered a correct ground truth node for recovery. In subsequent sections,
we will see that the number of nodes that satisfy this property in the validation
data is often small (1 in most instances), and thus a measure such as the AUC
score does not fully capture the performance of our methods.
4.1 LEAVE ONE EDGE'S TRIANGLES OUT (LOETO)
The LOETO experiments are akin to the leave-p-out cross validation metric, in
the sense that we will use p edges as a validation set and the remaining edges of
the network as a training set; here, p = (2 × number of nodes that form a triangle
with a randomly chosen edge). An experimental trial in this setting is designed as
follows. Randomly pick an edge in the graph (call it the seed edge) and find all the
wedges (path of length 2) that form a triangle with this edge. Next, drop all these
wedges and place them in the validation set. Figure 6 visualizes this experiment.
The graph used will be the one in panel B of Figure 6 (the grey dashed edges no
longer appear in the network and the goal is to recover the connections with the
green nodes in the graph). We then use the pairwise link prediction methods on
the seed edge, which produces an ordering on the nodes, and given this ordering,
we compute the success probability. Since this method leaves a big portion of the
graph in the training data, we compute its Success Probability with top k = 5.
4.2 HOLD-OUT CROSS VALIDATION
The hold-out cross validation method that keeps a certain percentage of the data
as training set and the remaining set as validation is a standard way of evaluating
the classical link prediction problem. In this setup, for a given network, we remove
30% of the edges and label them as validation data, and use the remaing 70% as
training data to make predictions. Then, for random edges in the training data
(seed edges), we use the pairwise link prediction methods to predict which nodes
will form triangles with each edge that is selected. Again, for a given edge, each
method produces a similarity score on all nodes, and we use the ordering of the
nodes induced by the scores to calculate the Success Probability with top k values
= 5, 25.
We also perform a similar experiment on temporal networks with timestamps
on the edge arrivals. In this scenario, the dropped 30% edges are not chosen
at random. Instead, we split the data into training and test sets based on the
time -- the first 70% of the edges to appear in time are the training data and the
remaining 30% are the test data.
In this set of experiments, we perform one more processing step to guaran-
tee that the network we will use for training is connected. If the network is
disconnected, we extract the largest connected component.
8
FIGURE 6 -- Illustration of the Leave One
Edge's Triangles Out (LOETO) exper-
iment. For a given graph (subfigure
A), randomly pick an edge (red edge
in subfigure B) and remove all edges
that form a triangle with it (dashed
gray lines in subfigure B). Run all
our methods on this new graph. The
nodes to predict are the green nodes.
(A)(B)(C)4.3 SUMMARY OF METHODS AND PARAMETER SETTINGS
Finally, we summarize all of the methods that we use for pairwise link prediction.
· Pairseed: This is our method described in Section 3.2. We use the imple-
mentation from MatrixNetworks.jl [Nassar and Gleich, 2018] with α = 0.85.
This implementation solves the linear system until convergence to machine
precision.
· TRPR: This is our method described in Section 3.3. We use α = 0.85 and
number of iterations n = 10.
· TRPRW: This is the modified weighted version of the TRPR algorithm
described in Section 3.3 as well. We use α = 0.85 and number of iterations
n = 10.
· MUL, MAX: These are the methods from Section 3.4 that extend the
single-seeded PageRank solutions. We use the same implementation used
by Pairseed, with α = 0.85.
· AA, PA, JS: For a seed edge, we compute the generalized Adamic-Adar,
Preferential Attachment, and Jaccard similarity scores, respectively (as
presented in Section 3.1) between the seed edge and all remaining nodes
in the graph.
· AA -- MUL, AA -- MAX, JS -- MUL, JS -- MAX: These are the methods from
Section 3.1, and they use the single node similarity from both endpoints of
a seed edge to compute a new measure of similarity.
5 pairwise link prediction results
In all of the results in this section, we report the success probability from our
predictions over 500 random experiments. We use seven real-world graphs from
different disciplines in this section and give a summary of their statistics in
Table 1. We also use a synthetic graph generated from the generalized preferential
attachment model (GPA) [Avin et al., 2015].
Synthetic graph. Generalized Preferential Attachment (GPA) [Newman,
2001] is a synthetic graph generation model that generalizes the classical preferne-
tial attachment model to allow for the addition of new components at each step
of the algorithm. For our experiments, we generate a graph with 5000 nodes and
allow the event of node addition with probability 1/2, and we allow the event of
edge addition with probability 1/2. The starting graph structure is a clique of
size 5. At each step of the graph generation process, an edge or node is added by
attaching proportionally to the degrees of the existing nodes.
Real world graphs. We use various real world graphs to test our methods
and provide statistics about them in Table 1. Penn94 and Caltech36 are online
social networks from the Facebook100 collection of datasets [Traud et al., 2011].
These two datasets are the biggest and smallest networks in terms of number
of nodes respectively from this collection. Ch-Ch-Miner is a biological network
of drug (chemical) interactions [Wishart et al., 2017; Stanford SNAP Group,
2017]. P-P-Pathways is a biological network of physical interactions between
proteins in humans [Agrawal et al., 2018]. email is an email communication
network [Guimerà et al., 2003]. Finally, CollegeMsg [Panzarasa et al., 2009] and
email-EU [Panzarasa et al., 2009] are temporal networks representing private
messages (CollegeMsg) or emails (email-EU) between users in a network.
Results. We show the results of all methods in Figures 7, 8, 9, and 10.
Overall, we notice that the diffusion methods have more consistency in performance
compared to local measures. For instance, AA-MUL -- which is one of the best
performers on some datasets (P-P-Pathways in top 25 and top 5 metrics) -- drops
9
Ch-Ch-Miner (Bio)
nodes = 1510
edges = 48512
triangles = 569466
median(nodes to predict) = 3
P-P-Pathways (Bio)
nodes = 21521
edges = 338624
triangles = 2394642
median(nodes to predict) = 2
Facebook - Penn94 (social)
nodes = 41536
edges = 1362220
triangles = 7207796
median(nodes to predict) = 2
Facebook - Caltech36 (social)
nodes = 762
edges = 16651
triangles = 119562
median(nodes to predict) = 2
email (communication)
nodes = 1133
edges = 5451
triangles = 5343
median(nodes to predict) = 1
GPA graph (synthetic)
p(node addition) = 0.5
p(edge addition) = 0.5
triangles = 5897
median(nodes to predict) = 1
FIGURE 7 -- Success probability results for the two biological datasets. In both datasets, we
notice that TRPRW outperforms the remaining diffusion type methods and performs best on
the top k predictions metric on the Ch-Ch-Miner dataset. Another method that stands out
in these two datasets is AA-MUL which is the best method in terms of top k predictions in
the P-P-Pathways dataset, with TRPRW performing worse than AA-MUL by around 5% on
the top k measures.
FIGURE 8 -- Success probability results for the two social networks datasets. In both datasets,
we notice that local methods generally outperform diffusion type methods. This is mainly
due to how social networks grow and the influence of neighbors of nodes for making new
connections. Here too, TRPRW outperforms other diffusion type methods and produces
comparable results to the best local methods on the top 25 and LOETO measures.
FIGURE 9 -- Success probability results for the two networks, email and an instance of a GPA
graph. We group these two graphs together because they have a very small number of trian-
gles compared to the other networks. In these datasets TRPRW does not contribute an im-
provement over the other diffusion type methods. In the email network, TRPR performs best
in the top k metric, and TRPRW performs best after the PA method on the GPA graph.
10
top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.860.860.870.860.860.870.570.830.840.890.710.780.630.640.710.610.660.650.280.570.580.650.410.460.940.940.940.930.950.930.750.860.90.920.770.83top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.630.640.630.60.640.650.270.640.640.680.60.660.290.310.50.270.340.50.070.480.470.530.430.50.550.550.610.520.610.690.380.650.680.650.560.57top 5top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.670.670.720.660.670.710.050.70.650.80.680.790.270.280.490.240.340.510.030.510.460.560.440.560.510.520.680.420.670.780.160.80.760.770.730.86top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.760.770.820.760.780.880.480.870.840.90.840.90.480.490.610.480.510.640.190.650.60.690.530.630.950.960.970.950.960.980.80.960.960.970.910.96top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.790.790.730.790.780.780.170.750.750.70.720.690.50.490.440.50.480.530.060.50.50.510.430.470.740.740.690.750.720.790.160.740.730.680.620.61top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.770.760.780.780.730.710.810.510.70.70.260.430.540.540.60.560.50.510.610.330.50.520.120.20.880.880.890.910.870.890.930.520.880.840.350.42TABLE 1 -- Statistics of the real-world datasets used in this paper.
Network name
Penn94
Caltech36
Ch-Ch-Miner
P-P-Pathways
email
CollegeMsg
Email-EU
nodes
41536
762
1510
21521
1133
1899
1005
edges
1362220
16651
48512
338624
5451
13838
32128
triangles
7207796
119562
568466
2394642
5343
14319
105461
type
Social
Social
Biology
Biology
Communication
Temporal
Temporal
CollegeMsg (temporal)
nodes = 1899
edges = 13838
triangles = 14319
median(nodes to predict) = 1
Email-EU (temporal)
nodes = 1005
edges = 32128
triangles = 105461
median(nodes to predict) = 1
FIGURE 10 -- Binary Mean Value results for the two temporal networks, CollegeMsg and Email-
EU. The results on temporal networks are generally worse than the results on static networks,
and this can be an indicator that our methods are stronger in predicting missing links rather
than future links.
to be one of the worst performers in the top 25 metric on the email dataset. PA
is the best performer on the GPA model, but drops to be the worst performer
on all other graphs. In cotrast, TRPRW performs best on the Ch-Ch-Miner and
email datasets but never drops to be one of the worst methods on any of the
datasets. Temporal graphs (CollegeMsg and Email-EU) both suffered from lower
top k scores as compared to static graphs, which suggests that our methods are
possibly stronger in detecting missing links rather than future links. Upon further
investigation on the temporal graphs, we found that most of the top k predictions
were at least two hops away from the seed edges. In the temporal data, these
wedges (length-2 paths) did not close to form triangles and thus the prediction
was incorrect according to the timestamped data. TRPRW seemed to improve
the performance of TRPR in general but did not contribute an improvement on
the email and GPA networks. Upon looking closely at these two networks, we
found that the number of triangles is very small and thus using the unweighted
TRPR version which is close in performance to Pairseed, is more ideal on datasets
that do not contain many triangles.
6 back to standard link prediction
In this section we bring our attention back to the standard link prediction problem
and show how the methods we presented in this paper can also be used to further
enhance standard link prediction. We split our data in the same way to the
previous experiments except that here we use an 80-20 split (often, keeping a
higher percentage of the data in the training set produces higher quality results,
but in the previous section, we needed to generate more data in the validation
set so that we have higher chances of finding paths of length 2 to predict, and
11
top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.160.160.150.160.170.230.140.220.230.220.130.170.070.070.070.070.070.060.070.060.060.060.040.050.50.50.490.50.490.470.450.390.450.460.290.24top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.520.530.540.510.540.580.380.590.590.610.560.60.20.20.260.190.210.270.130.280.270.290.240.280.890.880.880.870.910.950.680.930.940.920.870.9TABLE 2 -- description of methods inspired by pairwise link to perform the standard link predic-
tion task
sum(cid:78)
For a certain node i, aggregate the pair-seeded PageRank results
from all edges adjacent to i. This is equivalent to performing
PageRank with a normalized initial vector valued 1 at the indices
of all the neighbors of i, and degree(i) at index i.
This is similar to the previous approach, but here, we instead take
the element-wise maximum value of the pair-seeded PageRank
vectors.
max•
star-seed+ This is similar to pair-seeded PageRank, except that we start
PageRank with a normalized initial vector valued 1 at the index
of the seed node and all its neighbors.
This uses the same starting vector used by star-seed, but instead,
applies the TRPR algorithm on it.
TRPR(cid:7)
thus we increased the size of the testing data by 10 percent). Then, for the top
100 nodes with the largest degree in the training data, we perform different types
of seeded PageRank diffusion for link prediction on these nodes. This choice of
nodes serves the purpose of identifying nodes that have a higher chance of making
connections in the test data. We measure performance in terms of Area Under
the ROC curve (henceforth, AUC score). Our baseline is single-seeded PageRank.
Our results on pairwise link prediction suggest that multiple seeds with
PageRank-like methods are effective for prediction. Here, we consider four different
multiple-seeding strategies and compare them to single-seeded PageRank for the
classical link prediction problem. We summarize the four new methods in Table 2.
The methods sum, max, and star-seed are motivated by the double seeding idea
used in the previous sections.
We use real-world networks from Section 5, and present our results in Figure 11.
The scatter plots compare the AUC score of the neighborhood-based seeding
methods to the AUC scores from single-seeded PageRank. These results suggest
that neighborhood-based seeding is superior to single-seeded PageRank as a link
prediction method.
7 discussion and future work
Having a reliable link prediction algorithm is a well-studied research topic due
to its utility in many disciplines. Traditional link prediction methods aim to
find pairs of nodes that are likely to form a link. Here, we have studied a
higher-order version of the problem called pairwise link prediction where we
predict nodes that are likely to form a triangle with an edge. We generalized
local link-prediction methods and we developed two PageRank-based methods
for this problem. These PageRank-based methods generally remained consistent
in behavior on a variety of datasets. Using these results as inspiration, we then
developed multiple-seeding strategies for PageRank in classical link prediction,
which outperform their standard single-seeded counterparts.
TRPR (Triangle Reinforced PageRank) is our new principled method for the
task of pairwise link prediction. We demontrated that TRPR is computationally
efficient, and demonstarted the implementation details of TRPR can improve
on the idealized algorithm by taking advantage of a triangle iterator that avoids
building a tensor. We note that highly efficient implementations of our procedures
are possible given their close relationships with traditional PageRank methods.
Scaling to billions of nodes and edges is simply not a problem given current
abilities to compute PageRank (e.g. [Lofgren et al., 2016]), and especially that we
have an existing routine to iterate through triangles in a graph quickly.
12
FIGURE 11 -- Results of standard link prediction experiment on four real-world networks. Each
scatter plot shows the link prediction AUC results of 100 experiments of methods inspired
by our pairwise link prediction proposal with respect to the AUC scores of single-seeded
PageRank. The solid black line is the plot of f (x) = x. Points above the line are cases where
our proposed methods have superior performance to standard single-seeded PageRank. We
see that in most cases the four methods outperform the classical seeded PageRank method.
This study suggests that it is useful to consider a node's neighborhood for the purposes of
seeding for link prediction with PageRank. The values in the legend serve as a summary
performance measure, which is the average distance to the f (x) = x line.
The space of higher-order prediction problems also has limitless sub-structure.
An alternate problem is to predict an edge that is important when given a single
node. In the future, we intend to extend this work to the latter scenario, and
TRPR can be adapted for this purpose.
acknowledgements
Supported by NSF IIS-1422918, IIS-1546488, CCF-1909528, NSF Center for
Science of Information STC, CCF-0939370, NASA, Sloan Foundation, DARPA
SIMPLEX, NSF DMS-1830274, ARO W911NF-19-1-0057, and ARO MURI.
references
[Adamic and Adar, 2003] L. A. Adamic and
E. Adar. Friends and neighbors on the
web. Social Networks, 25 (3), pp. 211 --
230, 2003. Cited on page 2.
partitioning using PageRank vectors. In
2006 47th Annual IEEE Symposium on
Foundations of Computer Science. 2006.
Cited on page 4.
[Agrawal et al., 2018] M. Agrawal, M. Zit-
nik, and J. Leskovec. Large-scale analy-
sis of disease pathways in the human in-
teractome. In Pacific Symposium on Bio-
computing, p. 111. 2018. Cited on page
9.
[Andersen et al., 2006] R. Andersen,
F. Chung, and K. Lang. Local graph
[Avin et al., 2015] C. Avin et al. Core size
and densification in preferential attach-
ment networks.
In International Collo-
quium on Automata, Languages, and Pro-
gramming, pp. 492 -- 503. 2015. Cited on
pages 6 and 9.
[Backstrom and Leskovec, 2011] L. Back-
strom and J. Leskovec. Supervised ran-
dom walks: Predicting and recommending
links in social networks. pp. 635 -- 644. 2011.
Cited on page 1.
[Barabási and Albert, 1999] A.-L. Barabási
and R. Albert. Emergence of scaling in
random networks. Science, 286 (5439), pp.
509 -- 512, 1999. Cited on page 3.
[Benson et al., 2017] A. Benson, D. F. Gle-
ich, and L.-H. Lim. The spacey random
walk: a stochastic process for higher-order
data. SIAM Review, 59 (2), pp. 321 -- 345,
2017. Cited on page 7.
[Benson et al., 2018] A. R. Benson,
13
0.50.60.70.80.50.60.70.80.9Caltech36sum, 0.14max, 0.16starseed, 0.18TRPR, 0.20.4750.5000.5250.5500.5750.6000.6250.50.60.70.80.9Ch-Ch-Minersum, 0.09max, 0.15starseed, 0.25TRPR, 0.280.480.500.520.540.560.580.600.30.40.50.60.70.80.9CollegeMsgsum, 0.04max, 0.03starseed, 0.04TRPR, 0.050.50.60.70.80.90.50.60.70.80.9emailsum, 0.1max, 0.11starseed, 0.14TRPR, 0.14R. Abebe, M. T. Schaub, A. Jadbabaie,
and J. Kleinberg. Simplicial closure and
higher-order link prediction. Proceedings
of the National Academy of Sciences, 2018.
Cited on pages 1 and 3.
[Holland and Leinhardt, 1977] P. W. Hol-
land and S. Leinhardt. A method for
detecting structure in sociometric data. In
Social Networks, pp. 411 -- 432. Elsevier,
1977. Cited on page 1.
[Benson et al., 2016] A. R. Benson, D. F.
Gleich, and J. Leskovec. Higher-order
organization of complex networks. Science,
353 (6295), pp. 163 -- 166, 2016. Cited on
page 1.
[Clauset et al., 2008] A. Clauset, C. Moore,
and M. E. J. Newman. Hierarchical struc-
ture and the prediction of missing links in
networks. Nature, 453, pp. 98 EP -- , 2008.
Cited on page 1.
[Dave and Hasan, 2019] V. Dave and
M. Hasan. Triangle completion time pre-
diction using time-conserving embedding.
ECMLPKDD, 2019. Cited on page 3.
[Easley et al., 2010] D. Easley, J. Klein-
berg, et al. Networks, crowds, and
markets, Cambridge university press Cam-
bridge, 2010. Cited on page 1.
[Eikmeier et al., 2018] N. Eikmeier, A. S. Ra-
mani, and D. F. Gleich. The hyperkron
graph model for higher-order features. In
IEEE International Conference on Data
Mining, ICDM 2018, Singapore, Novem-
ber 17-20, 2018. 2018. Cited on page 3.
[Gleich, 2015] D. F. Gleich. PageRank be-
yond the web. SIAM Review, 57 (3), pp.
321 -- 363, 2015. Cited on page 4.
[Gomez-Uribe and Hunt, 2015] C. A. Gomez-
Uribe and N. Hunt. The netflix rec-
ommender system: Algorithms, business
value, and innovation. ACM Trans. Man-
age. Inf. Syst., 6 (4), pp. 13:1 -- 13:19, 2015.
Cited on page 1.
[Katz, 1953] L. Katz. A new status index
derived from sociometric analysis. Psy-
chometrika, 18 (1), pp. 39 -- 43, 1953. Cited
on page 3.
[Lambiotte et al., 2019] R. Lambiotte,
M. Rosvall, and I. Scholtes. From net-
works to optimal higher-order models of
complex systems. Nature Physics, 15 (4),
pp. 313 -- 320, 2019. Cited on page 1.
[Liben-Nowell and Kleinberg, 2007] D. Liben-
Nowell and J. Kleinberg. The link-
prediction problem for social networks.
Journal of the American Society for In-
formation Science and Technology, 58 (7),
2007. Cited on pages 1, 2, and 3.
[Lin et al., 2018] C.-H. Lin, D. M. Ko-
necki, M. Liu, S. J. Wilson, H. Nas-
sar, A. D. Wilkins, D. F. Gleich, and
O. Lichtarge. Multimodal network dif-
fusion predicts future diseaseâĂŞgeneâĂŞ-
chemical associations. 2018. Cited on page
1.
[Lofgren et al., 2016] P. Lofgren, S. Baner-
jee, and A. Goel. Personalized pagerank
estimation and search: A bidirectional ap-
proach. In Proceedings of the Ninth ACM
International Conference on Web Search
and Data Mining, pp. 163 -- 172. 2016. Cited
on pages 5 and 12.
[Nassar et al., 2019] H. Nassar, A. Benson,
and D. F. Gleich. Pairwise link predic-
tion. ASONAM, 2019. Cited on page 3.
[Nassar and Gleich, 2018] H. Nassar and
https:
D. Gleich. Matrixnetworks.jl.
//github.com/nassarhuda/MatrixNetworks.jl,
2018. Cited on page 9.
[Newman, 2001] M. E. J. Newman. Cluster-
ing and preferential attachment in grow-
ing networks. Phys. Rev. E, 64, p. 025102,
2001. Cited on pages 2, 3, 6, and 9.
[Page et al., 1999] L. Page, S. Brin, R. Mot-
wani, and T. Winograd. The pagerank
citation ranking: Bringing order to the
web. Technical Report 1999-66, Stanford
InfoLab, 1999. Previous number = SIDL-
WP-1999-0120. Cited on page 3.
[Panzarasa et al., 2009] P. Panzarasa, T. Op-
sahl, and K. M. Carley. Patterns and
dynamics of users' behavior and interac-
tion: Network analysis of an online com-
munity. Journal of the American Society
for Information Science and Technology,
60 (5), pp. 911 -- 932, 2009. Cited on page
9.
[Rapoport, 1953] A. Rapoport. Spread of in-
formation through a population with socio-
structural bias: I. assumption of transi-
tivity. The Bulletin of Mathematical Bio-
physics, 15 (4), pp. 523 -- 533, 1953. Cited
on page 1.
[Lü and Zhou, 2011] L. Lü and T. Zhou. Link
prediction in complex networks: A survey.
Physica A: Statistical Mechanics and its
Applications, 390 (6), 2011. Cited on page
1.
[Stanford SNAP Group, 2017] Stanford
SNAP Group. Miner: Gigascale mul-
timodal biological network. https://github.
com/snap-stanford/miner-data, 2017. Cited
on page 9.
[Granovetter, 1977] M. S. Granovetter.
The strength of weak ties. In Social Net-
works, pp. 347 -- 367. Elsevier, 1977. Cited
on page 1.
[Milo, 2004] R. Milo.
Superfamilies of
evolved and designed networks. Science,
303 (5663), pp. 1538 -- 1542, 2004. Cited on
page 1.
[Guimerà et al.,
2003] R. Guimerà,
L. Danon, A. DÃŋaz-Guilera, F. Gi-
ralt, and A. Arenas. Self-similar com-
munity structure in a network of human
interactions. Phys. Rev. E, 68, p. 065103,
2003. Cited on page 9.
S.
[Milo et al., 2002] R. Milo, S. Shen-
Orr,
Itzkovitz, N. Kashtan,
D. Chklovskii, and U. Alon. Network
motifs: Simple building blocks of com-
plex networks. Science, 298 (5594), pp.
824 -- 827, 2002. Cited on page 1.
[Traud et al., 2011] A. L. Traud, P. J.
Social
Mucha, and M. A. Porter.
structure of facebook networks. CoRR,
abs/1102.2166, 2011.
arXiv:1102.2166.
Cited on page 9.
[Wishart et al., 2017] D. S. Wishart et al.
DrugBank 5.0: a major update to the
DrugBank database for 2018. Nucleic
Acids Research, 2017. Cited on page 9.
14
|
1911.06861 | 1 | 1911 | 2019-11-15T20:21:44 | Large-Scale Parallel Matching of Social Network Profiles | [
"cs.SI"
] | A profile matching algorithm takes as input a user profile of one social network and returns, if existing, the profile of the same person in another social network. Such methods have immediate applications in Internet marketing, search, security, and a number of other domains, which is why this topic saw a recent surge in popularity. In this paper, we present a user identity resolution approach that uses minimal supervision and achieves a precision of 0.98 at a recall of 0.54. Furthermore, the method is computationally efficient and easily parallelizable. We show that the method can be used to match Facebook, the most popular social network globally, with VKontakte, the most popular social network among Russian-speaking users. | cs.SI | cs | Large-Scale Parallel Matching of
Social Network Profiles
Alexander Panchenko1, Dmitry Babaev2, and Sergei Obiedkov3
1 TU Darmstadt, FG Language Technology, Darmstadt, Germany
[email protected]
2 Tinkoff Credit Systems Inc., Moscow, Russia
3 National Research University Higher School of Economics, Moscow, Russia
[email protected].
[email protected]
Abstract. A profile matching algorithm takes as input a user profile of
one social network and returns, if existing, the profile of the same person
in another social network. Such methods have immediate applications
in Internet marketing, search, security, and a number of other domains,
which is why this topic saw a recent surge in popularity.
In this paper, we present a user identity resolution approach that uses
minimal supervision and achieves a precision of 0.98 at a recall of 0.54.
Furthermore, the method is computationally efficient and easily paral-
lelizable. We show that the method can be used to match Facebook, the
most popular social network globally, with VKontakte, the most popular
social network among Russian-speaking users.
Keywords: User identify resolution, entity resolution, profile matching, record
linkage, social networks, social network analysis, Facebook, Vkontakte.
1
Introduction
Online social networks enjoy a tremendous success with general public. They
have even become a synonym of the Internet for some users. While there are
clear global leaders in terms of the number of users, such as Facebook4, Twitter5
and LinkedIn6, these big platforms are constantly challenged by a plethora of
niche and/or local social services trying to find their place on the market. For
instance, VKontakte7 is an online social network, similar to Facebook in many
respects, that enjoys a huge popularity among Russian-speaking users.
Current situation leads to the fact that many users are registered in sev-
eral social networks. People use different services in parallel as they provide
complimentary features and user bases. For instance, one common pattern for
4 http://www.facebook.com
5 http://www.twitter.com
6 http://www.linkedin.com
7 http://www.vk.com
9
1
0
2
v
o
N
5
1
]
I
S
.
s
c
[
1
v
1
6
8
6
0
.
1
1
9
1
:
v
i
X
r
a
2
A. Panchenko and D. Babaev and S. Objedkov
Russian-speaking users is to communicate with Russian-speaking peers with help
of Vkontakte and with foreign friends with help of Facebook. Another common
pattern is to use LinkedIn for professional and Facebook for private contacts.
Publicly available user information can help in building the next gener-
ation of personalised web services, such as search, recommendation systems,
targeted marketing, and messaging, to name a few. For instance, Bartunov et
al. [1] suggest to use profile matching to perform automatic contact merging
on mobile phones. Actually, a similar technology is already integrated in the
Android mobile operative system8. On the other hand, profile information may
be subject to de-anonymization attacks, undesirable for a user [2,3,4]. No won-
der several researchers from information retrieval and security communities re-
cently tried to study methods of user profile correlation across online social
networks [5,6,7,8,9,4,10].
As information about a single user can be scattered across different networks,
integration of data from various platforms can lead to a more complete user rep-
resentation. Therefore, in many applications it makes sense to build an integral
profile, featuring information from several sources. In order to do so, it is nec-
essary to perform user identity resolution, i.e., to find the same person across
various networks. In this paper, we propose a simple, yet efficient method for
matching profiles of online social networks.
The contribution of our work is two-fold:
1. We present a new method for matching profiles of social networks. The
method has only four meta-parameters. Unlike most existing approaches (see
Section 2), the method is easily parallelisable and can be used to process the
profiles from an entire social network in a matter of hours. We provide an
open-source implementation of the method.9
2. We present results of the largest matching experiment to date known to us.
While most prior experiments operated on datasets ranging from thousands
to hundreds of thousands of profiles, we performed a match of 3 million
profiles of Facebook (FB) to 90 million profiles of VKontakte (VK), demon-
strating that third parties can perform matching on the scale of entire social
network. To the best of our knowledge, we are the first to present a matching
of FB to VK.
2 Related Work
2.1 Profile Matching
Bartunov et al. [1] developed a probabilistic model that relies on profile attributes
and friendship links. The algorithm was tested on roughly 2 thousand Twitter
users and 9 thousand Facebook users. The method achieves F-measure up to 0.89
(precision of 1.0 and recall of 0.8). However, the this is a local identity resolution
8 https://www.android.com
9 https://github.com/dmitrib/sn-profile-matching
Large-Scale Parallel Matching of Social Network Profiles
3
method, that requires profiles to be ego-networks of the seed user. From the
other hand, in this paper we present a global identity resolution method that
can potentially match any user of one network with any user of another network.
Veldman [6] conducted a set of extensive experiments with profile matching
algorithms. She used profile similarity metrics based on both attributes (name,
email and birth date) and friendship relations. The author performed experi-
ments on 2 thousand profiles of LinkedIn and Hyves social networks.
Malhotra et al. [9] used 30 thousand of paired Twitter and LinkedIn profiles
to train several supervised models based on attributes, such as name, user id
and location. The authors report an F-measure up to 0.98 with precision up to
0.99.
Sironi [5] also used supervised models based on features stemming from sim-
ilarity of profile attributes. This experiment was done on 34 thousand of Face-
book, Twitter and LinkedIn profiles where 2 thousand were paired. Their ap-
proach yields precision and recall around 0.90.
Narayanan and Shmatikov [7] proposed an approach that establishes connec-
tions between users based on their friendship relations. This incremental method
requires a small initial number of matched profiles and access to a graph of friend-
ship links. The authors used the method to match 224 thousand Twitter users
with 3.3 million Flickr users and observed an error rate of 12%.
Balduzzi et al. [2] showed that matching can be done effectively based on
email addresses.
Jain et al. [10] developed a system that takes as input a Twitter account and
finds a corresponding Facebook account. The system relies on profile, content,
self-mention and network-based similarity metrics.
Goga et al. [4] present a comprehensive study on profile matching technology.
The authors try to correlate accounts of Facebook, Twitter, Google+, Flickr, and
MySpace to check a feasibility of a de-anonymization attack. They show that
up to 80% of Twitter, Facebook and Google+ profiles from their ground truth
can be matched with a nearly zero false positive rate. Their matching method
is based on features extracted from user names, locations and pictures unified
with help of a binary classifier taking as input two profiles. Two key differences
of this method from ours are the following. First, Goga et al. [4] perform no
candidate selection. Therefore, in this approach all pairwise comparisons should
be done, which is not efficient if one deals with the entire social network. Second,
this approach uses no features based on friends similarity, which are core of our
approach.
2.2 Name Similarity Matching
Our method heavily relies on name similarity matching. In its simplest form
a name can be considered as a string. There is a large body of literature on
how to define string similarity [11] and use it to extract similar names from a
data set with some works focusing specifically on personal names; see a survey
and experimental comparison in [12]. According to this survey, one of the best
algorithms for approximate name matching is the algorithm from [13], which
4
A. Panchenko and D. Babaev and S. Objedkov
uses a prefix tree to efficiently compute the Levenshtein distance. In [14], three
generations of name matching methods are identified, with only third-generation
methods showing good results in terms of both precision and recall.
3 Dataset
Two social networks were used in our profile matching experiment. One is the
biggest Russian social network VKontakte; the other is Facebook, which is also
very popular among Russian-speaking users.
In our experiments, we used publicly available data from VK and FB. The
matching algorithm is based on name similarity and the friendship relation: each
profile is represented by the first and/or last name of the user and by a list of
names of his or her friends in the social network. No other characterising features
of profiles were used.
3.1 VKontakte
We collected about 90 million VK profiles that set Russia as their current lo-
cation. We gathered first and second name of each user along with list of her
friends using the "users.get" method of the social network API10. Therefore, we
can assume that in our experiment VK friend lists are complete.
3.2 Facebook
We deal with 3 million public Facebook profiles from Russia. User's name can
be obtained via the official API11, but not list of her friends. That is why friend
lists were generated from events displayed in user's feed. Users A and B were
considered as friends if a message "A and B are now friends" appeared in feeds
of A and B. Profile feeds were collected via the "user/feed" method of the FB
API. The problems with this approach is that (1) access to users's feed can be
restricted by privacy settings; (2) one need to download all wall posts to gather
list of friends, which is not always possible due to API restrictions and requires
multiple API calls. Therefore, we should assume that in our experiment FB
friend lists are incomplete.
3.3 Test data
VKontakte provides a field where a used can specify a link to her FB page.
We gathered about 850 thousand known VK-FB profile pairs. However, only
92,488 Facebook users were found in our Facebook dataset out of these 850
thousand profiles. These pairs were used as a ground truth to check correctness
of the matching algorithm. A subset of the test data used in our experiments is
publicly available12.
10 https://vk.com/dev/users.get
11 https://developers.facebook.com/docs/graph-api
12 https://github.com/dmitrib/sn-profile-matching
Large-Scale Parallel Matching of Social Network Profiles
5
3.4 Name romanisation
Names of Russian FB and VK users can be spelled in both Latin and Cyrillic
alphabets i.e. "Alexander Ivanov" or "Aleksandr Ivanov". To enable correct
name matching, all user names in both networks were converted to Latin script
using the Russian-Latin BGN transliteration rules13.
4 Profile matching algorithm
The algorithm consists of three phases:
1. Candidate generation. For each VK profile we retrieve a set of FB profiles
with similar first and second names.
2. Candidate ranking. The candidates are ranked according to similarity of their
friends.
3. Selection of the best candidate. The goal of the final step is to select the best
match from the list of candidates.
Each profile from VK network is processed independently and hence this
operation can be easily parallelised (we rely on MapReduce framework14). It
is possible to perform matching in both directions (VK→FB and FB→VK).
However, all profiles from the target network must be stored at each computa-
tional node. Therefore, direction of matching VK → FB minimises the memory
footprint of such nodes. Below we describe each step of the method in detail.
4.1 Candidate generation
It is computationally inefficient to calculate similarity of each VK profile with
each FB profile. This operation would require about 1.3 · 1020 pairwise compar-
isons. This first step reduces the search space retrieving FB users with names
similar to the input VK profile. Two names are considered similar if the first
letter is the same and the edit distance [14] between names is less than two.
This should be true for both first and last names.
We use an index based on Levenshtein Automata [15] to perform fuzzy match
between a VK user name and all FB user names. In particular, we relied on the
Lucene implementation of this approach15.
However, the edit distance does not provide a complete solution for name
matching, since many first names have several rather different variants, e.g.,
"Robert" and "Bob", or "Mikhail" and "Misha". One way to address this problem
is to use a dictionary of proper names prepared by linguists, e.g., [16], to decide
whether two names are synonyms. However, such dictionaries often skip some
name variants. For example, the entry for the Russian name "Alexander" in [16]
13 http://earth-info.nga.mil/gns/html/romanization.html
14 http://hadoop.apache.org
15 org.apache.lucene.util.automaton.LevenshteinAutomata
6
A. Panchenko and D. Babaev and S. Objedkov
includes "Sanya", but not "Sanek". In addition, they do not include variants based
on similarity with names from other languages: e.g., "Alejandro" is not in the
entry for "Aleksandr" in [16].
Therefore, we decided to build our own dictionary using pairs of profiles
known to belong to the same person. We do this by taking the transitive clo-
sure of the symmetric binary relation over names given by these pairs. Every
two names from the same equivalence class are considered to be synonyms. The
fundamental deficiency of this approach is that, being a variant is not an equiva-
lence relation, since transitivity does not always hold. For example, two different
Russian names, "Alexander" and "Alexey", are often abbreviated as "Alex". With
our approach, this results in declaring "Alexander" and "Alexey" variants of each
other, which they are not. Nevertheless, we let this happen and use shared friends
to disambiguate between persons erroneously declared to have similar names.
Another problem is that some people use totally unrelated first names (such
as "Andrey" and "Vladimir" or even "Max" and "Irina") in different networks. We
solve this problem by removing "strange" pairs based on the number of times
such a pair occurs in the list (unique or infrequent pairs can safely be removed).
The final list of synonym clusters was quickly checked manually.
While candidate generation step greatly reduces search space, a person that
indicated different name or a pseudonym in two social networks will not be
recognised with our approach. From the other hand, in this situation a person is
probably prefers to hide his or her identity and therefore it is more appropriate
to perform no matching for this user at all.
4.2 Candidate ranking
The higher the number of friends with similar names in VK and FB profiles, the
larger the similarity of these profiles. Two friends are considered to be similar if:
-- First two letters of their last names match, and
-- The similarity between their first names and the similarity between their
last names are both greater than thresholds α and β, correspondingly. We
empirically set α to 0.6 and β to 0.8. String similarity sims is calculated as
follows:
sims(si, sj) = 1 − lev(si, sj)
max(si,sj)
,
where lev is edit distance of string si and sj. At this step we use the standard
algorithm for calculation of Levenstein distance16, not Levenstein Automata.
Matching friends with rare names should be weighted higher than a match of
friend with matching friends with common names. Indeed, two unrelated profiles
can easily have several friends with similar common names.
Probability of a user with first name sf and second name ss, provided than
ss
N . Here sf and
these events are independent is P (sf , ss) = P (sf )P (ss) =
sf
N
16 org.apache.lucene.search.spell.LevensteinDistance
Large-Scale Parallel Matching of Social Network Profiles
7
ss are frequencies of respectively first and second names and N is the total
number of profiles. Thus, expectation of name frequency equals to sf·ss
N . In
our approach, contribution of each friend to similarity simp of two profiles pvk
and pf b is inverse of name expectation frequency, but not greater than one:
(cid:88)
simp(pvk, pf b) =
j:sims(sf
i ,sf
j )>α∧sims(ss
i ,ss
j )>β
min(1,
N
sf
j · ss
j ).
Here sf
i and ss
i are first and second names of a VK profile, correspondingly,
while sf
j and ss
j refer to a FB profile.
4.3 Best candidate selection
FB candidates are ranked according to their similarity simp to an input profile
pvk. There are two thresholds the best candidate pf b should pass to match:
-- its score should be higher than the similarity threshold γ:
simp(pvk, pf b) > γ.
-- it should be either the only candidate or score ratio between it and the next
best candidate p(cid:48)
f b should be higher than the ratio threshold δ:
simp(pvk, pf b)
simp(pvk, p(cid:48)
f b)
> δ.
The δ threshold enforces the fact that a VK user has only one account in
FB. On the other hand, one FB profile can be linked with several VK profiles.
Still, in this case only the match with the highest score is kept.
5 Results and Discussion
We performed matching of VKontakte and Facebook profiles (c.f. Table 1) with
the approach described above. Results of the candidate ranking step were saved.
At this point, we conducted a series of experiments varying the similarity thresh-
old γ and the ratio threshold δ. Results of these experiments in terms of precision
and recall with respect to the test collection (see Section 3.3 are presented in
Figure 1. The bold line denotes the best precision at certain level of recall.
Table 1. Statistics of VKontakte and Facebook.
VKontakte Facebook
Number of users in our dataset
89,561,085 2,903,144
Number of Russian-speaking users17 100,000,000 13,000,000
User overlap
88%
29%
8
A. Panchenko and D. Babaev and S. Objedkov
Fig. 1. Precision-recall plot of our matching method. Here we perform a grid search
of two method parameters: profile similarity threshold γ ∈ [1; 4] and profile similarity
ratio threshold δ ∈ [3; 6]. The bold line denotes the best precision at a given recall.
As one may observe, our method yields very good results achieving precision
of 0.97 at recall of 0.58. Furthermore, a configuration of the approach yielding
99% precision recalls roughly 50% of relevant profiles.
In order to perform the final matching of VK and FB we chose a version of
the algorithm that provides precision of 0.98 and recall of 0.54 (see Table 2).
Results were obtained in 4 hours on a Hadoop cluster with 100 nodes of type
m2.xlarge (2 vCPU, 17 GB RAM) on the AWS EC2 cloud18. The mentioned
above configuration of the method mentioned above retrieved 644,334 VK pro-
files of FB users. Thus, we found corresponding VK pages of 22% Facebook users
present in our collection.
While our approach makes only few errors, reaching precision of 0.98, it is not
able to match a significant fraction of 40-50% of user profiles. The key factors
hampering correct retrieval are the following:
-- In our method, we perform fuzzy search with name synonyms that can lead
to semantic drift. For instance, "Maria" is expanded with its alias "Masha".
According to fuzzy search "Masha" and "Misha" are related. But the latter
is a shortcut for "Michael" in Russian.
-- Implementation of the Levenstein Automata used in our experiments re-
trieves candidates with distance lower or equal than two. Thus, people with
long names and surnames can be missed during candidate generation.
17 http://www.comscore.com/Insights/Data-Mine/Which-Sites-Capture-The-Most-Screen-Time-in-Russia
and http://vk.com/about provide statistics on number of Russian-speaking users.
18 http://aws.amazon.com
Large-Scale Parallel Matching of Social Network Profiles
9
Table 2. Matching of user profiles of Facebook and VKontakte social networks. The
upper table presents four main parameters of our profile matching method. The lower
part of the table presents results of the final matching of the two networks.
Value
Parameter
First name similarity threshold, α 0.8
Second name similarity threshold, β 0.6
Profile similarity threshold, γ
Profile ratio threshold, δ
Number of matched profiles
Expected precision
Expected recall
3
5
644,334 (22% of 2,903,144 FB users)
0.98
0.54
-- People often intentionally indicate different names in two social networks or
use different aliases. Our approach is not designed to identify and match
such profiles.
-- First letter mismatch. Different variants of the same name/surname in Rus-
sian can start from different letters. Furthermore, transliteration can lead to
such mismatches as well, e.g. surname "Efimov" can be spelled in Latin as
"Efimov" or "Yefimov".
-- People often use transliterated versions of their names in one network, but
stick to the original Cyrillic versions in the other. The method always works
with transliterated names, but our transliteration can be quite different from
the one done by a user.
-- Due to nature of the friend collection method used, some FB friends can be
absent in our dataset.
In order to improve performance of the method, one would need to tackle
the problems mentioned above.
6 Conclusion
In this paper, we presented a new user identity matching method. Unlike most
previous approaches, our method is able to work on the scale of real online social
networks, such as Facebook, matching tens of millions of users in several hours
on a medium-sized computational cluster. The method yields excellent precision
(up to 98%). At the same time it is able to recall up to 54% of correct matches.
The method was used to perform the most largest-scale matching experi-
ment up to date. We matched 90 millions of VKontakte users with 3 million of
Facebook users.
A prominent direction for the future work, is to use supervised learning in
order to improve candidate ranking. One way pionered by [4] is to use a binary
classifier predicting if two profiles match; profile similarity in this case would be
the confidence of positive class. Learning to rank methods [17] is another way to
10
A. Panchenko and D. Babaev and S. Objedkov
cast profile matching as a supervised problem. The supervised models provide a
convenient framework where name similarity features, used in our method, can
be mixed with attribute-, network-, and image-based features.
Acknowledgements
This research was conducted as part of a project funded by Digital Society
Laboratory LLC. We thank Prof. Chris Biemann and three anonymous reviewers
for their thorough comments that significantly improved quality of this paper.
References
1. Bartunov, S., Korshunov, A., Park, S.T., Ryu, W., Lee, H.: Joint link-attribute
user identity resolution in online social networks. In: Proc. of the Sixth SNA-KDD
Workshop at KDD. (2012)
2. Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing
In: Recent Advances in Intrusion
social networks for automated user profiling.
Detection, Springer (2010) 422 -- 441
3. Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-
anonymize social network users. In: 2010 IEEE Symposium on Security and Privacy
(SP), IEEE (2010) 223 -- 238
4. Goga, O., Perito, D., Lei, H., Teixeira, R., Sommer, R.: Large-scale correlation of
accounts across social networks. Technical report, International Computer Science
Institute (2013)
5. Sironi, G.: Automatic alignment of user identities in heterogeneous social networks.
Master's thesis, Politechnico di Milano, Italy (2012)
6. Veldman, I.: Matching profiles from social network sites: Similarity calculations
with social network support. Master's thesis, University of Twente, Italy (2009)
7. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Security and
Privacy, 2009 30th IEEE Symposium on, IEEE (2009) 173 -- 187
8. Raad, E., Chbeir, R., Dipanda, A.: User profile matching in social networks.
In: 13th International Conference on Network-Based Information Systems (NBiS),
IEEE (2010) 297 -- 304
9. Malhotra, A., Totti, L., Meira Jr, W., Kumaraguru, P., Almeida, V.: Studying
user footprints in different online social networks.
In: Proceedings of the 2012
International Conference on Advances in Social Networks Analysis and Mining
(ASONAM 2012), IEEE Computer Society (2012) 1065 -- 1070
10. Jain, P., Kumaraguru, P., Joshi, A.: @I seek 'fb.me': Identifying users across multi-
ple online social networks. In: Proceedings of the 22nd international conference on
World Wide Web companion, International World Wide Web Conferences Steering
Committee (2013) 1259 -- 1268
11. Boytsov, L.: Indexing methods for approximate dictionary searching: Comparative
analysis. Journal of Experimental Algorithmics (JEA) 16 (2011) 1 -- 1
12. Du, M.: Approximate name matching. NADA, Numerisk Analys och Datalogi,
KTH, Kungliga Tekniska Högskolan. Stockholm: un (2005)
13. Navarro, G., Baeza-Yates, R., Marcelo Azevedo Arcoverde, J.: Matchsimile: a
flexible approximate matching tool for searching proper names. Journal of the
American society for Information Science and Technology 54(1) (2003) 3 -- 15
Large-Scale Parallel Matching of Social Network Profiles
11
14. Lisbach, B., Meyer, V.: Linguistic Identity Matching. Springer Verlag. Heidelberg.
(2013)
15. Schulz, K., Mihov, S.: Fast string correction with Levenshtein-automata. Interna-
tional Journal of Document Analysis and Recognition 5 (2002) 67 -- 85
16. Petrovsky, N.: Dictionary of Russian personal names. http://www.gramota.ru/
slovari/info/petr. M.: In Russian Dictionaries (2000)
17. Trotman, A.: Learning to rank. Information Retrieval 8(3) (2005) 359 -- 381
|
1611.07769 | 3 | 1611 | 2017-02-15T19:40:18 | The many facets of community detection in complex networks | [
"cs.SI",
"physics.data-an",
"physics.soc-ph"
] | Community detection, the decomposition of a graph into essential building blocks, has been a core research topic in network science over the past years. Since a precise notion of what constitutes a community has remained evasive, community detection algorithms have often been compared on benchmark graphs with a particular form of assortative community structure and classified based on the mathematical techniques they employ. However, this comparison can be misleading because apparent similarities in their mathematical machinery can disguise different goals and reasons for why we want to employ community detection in the first place. Here we provide a focused review of these different motivations that underpin community detection. This problem-driven classification is useful in applied network science, where it is important to select an appropriate algorithm for the given purpose. Moreover, highlighting the different facets of community detection also delineates the many lines of research and points out open directions and avenues for future research. | cs.SI | cs |
The many facets of community detection in complex networks
Michael T. Schaub,1, 2, 3, ∗ Jean-Charles Delvenne,2, 4 Martin Rosvall,5, † and Renaud Lambiotte3, ‡
1Institute for Data, Systems, and Society, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
3naXys and Department of Mathematics, University of Namur, B-5000 Namur, Belgium
2ICTEAM, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve, Belgium
4CORE, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve, Belgium§
5Integrated Science Lab, Department of Physics, Umea University, SE-901 87 Umea, Sweden
Community detection, the decomposition of a graph into essential building blocks, has been a
core research topic in network science over the past years. Since a precise notion of what constitutes
a community has remained evasive, community detection algorithms have often been compared on
benchmark graphs with a particular form of assortative community structure and classified based
on the mathematical techniques they employ. However, this comparison can be misleading because
apparent similarities in their mathematical machinery can disguise different goals and reasons for
why we want to employ community detection in the first place. Here we provide a focused review of
these different motivations that underpin community detection. This problem-driven classification
is useful in applied network science, where it is important to select an appropriate algorithm for the
given purpose. Moreover, highlighting the different facets of community detection also delineates
the many lines of research and points out open directions and avenues for future research.
Keywords: community detection, graph partitioning, Modularity; block models
I.
INTRODUCTION
Sparked by the work of Newman and Girvan [1, 2] on
Modularity in Complex Systems, the area of community
detection has become one of the main pillars of network
science research. The promise that we can gain a deeper
understanding of a system by discerning important struc-
tural patterns within a network has spurred a huge num-
ber of studies in this area. However, as has become
abundantly clear by now, this problem has no canoni-
cal solution.
In fact, even a general definition of what
constitutes a community is still lacking. The reasons for
this are not only grounded in the computational diffi-
culties of tackling community detection. Furthermore,
various research areas view community detection from
different perspectives, which the lack of a consistent ter-
minology illustrates:
'network clustering', 'graph parti-
tioning', 'community', 'block' or 'module detection' all
carry slightly different connotations. This jargon barrier
creates confusion as soon as readers and authors have dif-
ferent preconceptions and intuitive notions are not made
explicit.
We argue that community detection should not be con-
sidered as a well-defined problem, but rather as an um-
brella term with many facets. These facets emerge from
different goals and motivations of what it is about the
network that we want to understand or achieve, which
lead to different perspectives on how to formulate the
problem of community detection. Therefore, it is critical
to be aware of these underlying motivations when select-
ing and comparing community detection methods. Thus,
∗ [email protected]; corresponding author
† [email protected]
‡ [email protected]
§ [email protected]
rather than an in-depth discussion of the technical details
of different algorithmic implementations [3–10], here we
focus on the conceptual differences between different per-
spectives on community detection.
By providing a problem-driven classification, however,
we do not argue that the different perspectives are unre-
lated. In fact, in some situations, different mathematical
problem formulations can lead to similar algorithms and
methods, and the different perspectives can offer valu-
able insights. For example, for undirected networks, op-
timizing the objective function Modularity [1], initially
proposed from a clustering perspective, can be inter-
preted both as optimizing a particular stochastic block
model [11] and a particular diffusion process on the net-
works [12], In other situations, however, such relations
are not apparent.
Neither do we argue that there is a particular perspec-
tive that is a priori better suited for any given network.
In fact, no method can consistently perform best on all
kinds of networks [13]. Community detection is an un-
supervised learning task and we cannot know what are
the quantities of interest for the analysis.
Instead, to
understand how useful a particular method is, we must
take into account the context of why the researcher is
interested in the communities [14].
In the following, we unfold different aims underpinning
community detection and discuss how the resulting prob-
lem perspectives relate to various applications. We focus
on four broad perspectives that have served as motivation
for community detection in the literature: (i ) community
detection as minimization of some form of constraint vi-
olation; (ii ) community detection framed as a discretised
analogue of data clustering, in which densely knit groups
of nodes are to be found; (iii ) community detection aim-
ing to identify structurally equivalent nodes in a network,
leading to notions such as stochastic block models; and
(iv ) community detection looking for simplified descrip-
tions of the dynamical flows occurring on the network,
that is, some form of dynamical model reduction (see
Figure 1). While this categorization is not unique, we
believe that it can help clarifying concepts about com-
munity detection and be a guide to using an appropriate
method for a particular purpose.
2
such as (2), or other related objective functions such as
the average or normalized cuts. This can be best seen
when rewriting the above optimzation problem as fol-
lows:
min
f
f T Lf
subject to f ⊥ 1 (cid:107)f(cid:107) =
n
√
(cid:40)−(cid:112)V2/V1
(cid:112)V1/V2
(2)
(3)
(4)
if i ∈ V1
if i ∈ V2
II. MINIMIZING CONSTRAINT VIOLATIONS:
A CUT BASED PERSPECTIVE
where
fi :=
One of the earliest graphs partitioning applications was
in the area of circuit layout and design [4, 15]. This
spurred the development of the now classical Kernighan-
Lin algorithm [16] and the work by Donath and Hoff-
mann [17, 18], who were among the first to suggest the
use of eigenvectors for graph partitioning. For instance,
we might be confronted with a graph which describes
the signal flows between different components of a cir-
cuit. To implement the circuit in an efficient way, our
goal is now to partition the graph into a fixed number of
approximately equally sized groups with a small number
of edges between those groups. The edges that run be-
tween the groups are commonly denoted as the cut. Our
aim is thus to minimize this cut while keeping some kind
of balanced groups, which is an important ingredient in
this context.
To make this more precise let us consider one specific
variant of this scheme, known as ratio cut [19]. Let us
denote the adjacency matrix of an undirected network
with n nodes by A, where Aij = 1 if there is a connection
from node i to node j, and Aij = 0 if the nodes are not
connected. We can now write the problem of optimizing
the ratio cut for a bipartition of all vertices V into two
communities V1 and V2 = V\V1 as follows [19, 20]:
cut(Vi,V\Vi)
(cid:88)
minVi
RatioCut(V1,V2) := minVi
where cut(V1,V2) := (cid:80)
i
i∈V1,j∈V2
(Aij + Aji)/2 is the
sum of the (weighted) edges between the two vertex
sets V1,V2. Related problem formulations also occur in
the context of parallel computations and load schedul-
ing [21, 22], where approximately equally sized portions
of work are to be sent to different processors, while keep-
ing the dependencies between those tasks minimal. Fur-
ther applications include scientific computing [21, 22],
where partitioning algorithms can be used to divide the
coordinate meshes arising in the context of discretizing
and solving partial differential equations. Image segmen-
tation problems may also be phrased in terms of cut-
based measures [20, 23].
Investigating these types of problems, has led to many
important contributions for partitioning graphs, in par-
ticular in relation to spectral methods. The connection
of spectral algorithms to cut-based problem formulations
arises naturally by considering relaxations of the origi-
nal, combinatorially hard discrete optimization problems
Vi
,
(1)
matrix with Dii = (cid:80)
Here the Laplacian matrix of the network has been de-
fined as L = D − A, where D is the diagonal degree
j Aij. We mention here the semi-
nal work of Fiedler [24, 25], who realized already in the
70s that the second smallest eigenvalue of the Laplacian
is associated to the connectivity of the graph, and that
the associated eigenvector can thus be used to compute
spectral bi-partitions. Such spectral ideas led to many in-
fluential algorithms and methods, see, for example, von
Luxburg [20] for a tutorial on spectral algorithms.
In this cut-based problem formulation, there is no
specification as to how the found groups in the parti-
tion should be connected internally. While there is the
implicit constraint that the groups must not split into
groups with an even smaller cut, there is no specification
that the found groups of nodes are densely connected
internally. Indeed, the type of graphs considered in the
context of cut-based partitions are often of a mesh or grid
like form, and for these kind of graphs several guarantees
can be given in terms of the quality of the partitions ob-
tained by spectral algorithms [21]. While such non-dense
groupings emerging from 'non-clique structures' [26] can
also be dynamically relevant (see section V), they are
likely to be missed when employing a community notion
that focuses on finding dense groupings as discussed next.
III. MAXIMIZING INTERNAL DENSITY: THE
CLUSTERING PERSPECTIVE
A different motivation for community detection arises
when considered in the context of data clustering. We
use the term clustering, which itself has been a synonym
for many different things, in the following sense: For a set
of given data points in a possibly high-dimensional space,
the goal here is to partition the points into a number of
groups, such that points within a group are 'close' (or
'similar'); and points in different groups are more distant
to each other. To achieve this goal one often constructs
a proximity or similarity graph between the points and
tries to group nodes together that are closer to each other
than they are to the rest of the graph. This approach
results again in a form of community detection problem
where the closeness between nodes is described by the
presence and weight of the edges between them.
Although minimizing the cut size and maximizing the
internal number of links are closely related, there are dif-
3
(i) The cut based perspective aims at
FIG. 1. Schematic of four different approaches to community detection.
minimising the number of links between modules, independently of their intrinsic structure. (ii) The clustering perspective
produces groups of densely connected modules. (iii) The stochastic equivalence perspective looks for modules in which nodes are
stochastically equivalent, typically as inferred via a generative statistical graph model. (iv ) The dynamical perspective focuses
on the impact of communities on dynamical processes and searches for dynamically relevant coarse grained descriptions.
ferences here contrasting with the cut-based perspective
outlined above, pertaining to the typical constraints and
search space associated with these objective functions.
First, when employing a clustering perspective there is
normally no a priori information as to the number of
groups we are looking for. Second, we do not necessar-
ily require the groups to be balanced in any way, rather
we would like to find an 'optimal' split into densely knit
groups irrespective of their relative sizes.
Unsurprisingly, finding an optimal clustering is again
a computationally hard problem. Further, as Kleinberg
has shown [27], there are no clustering algorithms sat-
isfying a certain set of intuitive properties we might re-
quire from a clustering algorithm in continuous spaces;
and similar problems also arise in the discrete setting for
clustering of graphs [28].
Nevertheless, there exists a large number of methods
that follow a clustering like paradigm and separate the
nodes of a graph into cohesive groups of nodes, often by
optimizing a quality function. An important clustering
metric in this context is the so called conductance [29–
32]. Optimizing the (global) conductance has been ini-
tially introduced as a way to produce a global bi-partition
similarly to the 2-way ratio-cut. However, more lately
this quantity has been successfully employed as a local
quality function to find localized clusters around one or
more seed nodes. Given a set of nodes Vk ⊂ V, a po-
tential community, its local conductance can be written
as:
φ(Vk) :=
where vol(Vk) :=(cid:80)
i∈Vk,j /∈Vk
Aij
min{vol(Vk), vol(V\Vk)} ,
(5)
i∈Vk
j Aij is the total degree of the
nodes in set Vk, commonly termed its volume in analogy
with (continuous) geometric objects. Interestingly, it has
been shown that in specific contexts the conductance can
be a good predictor of some latent group structures in
several real-world applications [33][34].
Moreover, a local perspective on community detection
has two appealing properties: First, the definition of a
cluster does not depend on the global graph structure
(cid:80)
(cid:80)
but only on the relative local density. Second, only a
portion of a graph needs to be accessed, which is advan-
tageous if there are computational constraints (very large
graphs), or we are only interested in a particular subsys-
tem.
In such cases, we would like to avoid having to
apply a method to the whole graph to find, for example,
the cluster containing a particular node in the graph.
The Newman-Girvan Modularity [1, 2] is arguably one
of the most common clustering measures used in the lit-
erature and was originally proposed from the clustering
perspective discussed here. It is a global quality function
and aims to find the community structure of the network
as a whole. Given a partition P = {V1, . . . ,Vk} of a
graph into k groups, the Modularity of P can be written
as:
(cid:20)
k(cid:88)
(cid:88)
q=1
i,j∈Vq
(cid:21)
Aij − didj
2m
,
(6)
1
2m
Q(P) :=
where di = (cid:80)
2m =(cid:80)
j Aij
is the degree of node i and
i di is the total weight of all edges in the graph.
By optimizing the Modularity measure over the space of
all partitions, one aims to identify groups of nodes that
are more densely connected to each other than one would
expect according to a statistical null model of the graph.
This statistical null model is commonly chosen to be the
configuration model with preserved degree sequence.
However, a by-product of this choice of a global null-
model is the tendency of Modularity to balance the size
of the modules in terms of their total connectivity. While
different variants of Modularity aim to account for this
effect [4], this makes Modularity also interpretable as
a trade-off between a cut-based measures and an en-
tropy [12]. In fact, Modularity can be seen as a proxy
for all the perspectives discussed in this article. The op-
timization of Modularity is usually performed by means
of spectral or greedy algorithms [4, 35, 36]. While there
are problems with this approach, such as its resolution
limit [37] and other spurious effects [37–40], the general
idea has triggered development of a plethora of algo-
rithms that follow a similar strategy [4]. Several works
have addressed some of these shortcomings, for instance
by incorporating a resolution parameter, or explicitly ac-
counting for the density inside each group [41, 42].
By grouping similar nodes that link to similar nodes
into communities, we constrain ourselves to finding as-
sortative group structure [10]. Stated differently, if we
ordered the nodes in the network according to the un-
derlying group structure, the adjacency matrix would be
close to block diagonal. While we may also have hier-
archical clusters with clusters of clusters etc., such an
assortative structural organisation might be too restric-
tive if we want to analyse, for example, social networks
or capture the organisation of bipartite networks. If we
aim to define groups based on more general connectiv-
ity patterns, this leads naturally to notions such as the
stochastic equivalence, which we will consider in the next
section.
IV. NODES WITH SIMILAR STRUCTURAL
ROLES AND STOCHASTIC BLOCK MODELS
Within social network analysis, a common goal is to
identify nodes within a network that serve a similar struc-
tural role in terms of their connectivity profile. Accord-
ingly, nodes are similar if they share the same kind of
connection patterns to other nodes. This idea is captured
in notions such as regular equivalence, which states that
nodes are regularly equivalent if they are equally related
to equivalent others [43, 44]. A relaxation of this idea is
stochastic equivalence [45], which means that nodes are
equivalent if they connect to equivalent nodes with equal
probability.
One of the most popular techniques to model and de-
tect such kind of relationship in network data is the use
of stochastic block models (SBMs) [45, 46] and associ-
ated inference techniques. These models have their roots
in the social networks literature [45, 47], and provide a
flexible framework for modelling block structures within
a network. When considering block models, we are inter-
ested in identifying node groups such that nodes within
a community connect to nodes in other communities in
an 'equivalent way' [10].
Consider a network composed of n nodes divided into k
classes. The standard SBM is defined by the set of node
class labels and the affinity matrix Ω. More precisely, the
link probability between two nodes i, j belonging to class
ci and cj is given by:
pij := P(Aij) = Ωcicj .
Under an SBM, nodes within the same class thus have
exactly the same probabilities to connect to nodes of
another class. This is the mathematical formulation of
having stochastically equivalent nodes within each class.
Finding the latent groups of nodes in a network now
amounts to inferring the model parameters that provide
the best fit for the observed network. That is, find the
SBM with the highest likelihood.
4
The standard SBM assumes that the expected degree
of each node is a Poisson binomial random variable (a Bi-
nomial random variable with possibly non-identical suc-
cess probabilities in each trial). Because inferring the
most likely SBM typically results in grouping nodes based
on their degree in empirical networks with broad degree
distributions, it can be advantageous to include a de-
gree correction into the model. In the degree corrected
SBM [48], the probability pij for a link to appear between
two nodes i, j depends both on their class labels ci, cj and
their respective degree parameters di, dj (each entry Aij
might be a Bernoulli or a Poisson random variable such
as in [48]):
pij ∼ didjΩcicj .
Thus, while edges in real-world networks tend to be cor-
related from effects such as triadic closure [4], by con-
struction edges are conditionally independent random
variables in SBMs. Moreover, most common SBMs are
defined for unweighted networks or networks with inte-
ger weights by modelling the network as a multi-graph.
Though there are generalizations [49, 50], this is still an
area comparably less studied.
In contrast to the notions of community considered
above, with stochastic equivalence we are no longer in-
terested in maximising some internal density or minimis-
ing a cut. To see this, consider a bipartite graph that
from a cut- or density-based perspective contains no com-
munities (one may even see bipartite structure as 'anti-
communities'). From the stochastic equivalence perspec-
tive, however, we would say that this graph contains two
groups because nodes in each set only connect to nodes
in the other set.
When adopting an SBM to detect such structural or-
ganisation of the links, we explicitly adopt a statistical
model for the networks. The network is essentially an
instance of an ensemble of possible networks generated
from such a model [51]. This model based approach
comes with several advantages: First, by defining the
model we effectively declare what is signal and what is
noise in the data under the SBM. We can thus provide
a statistical assessment of the observed data with, for
example, p-values under the SBM. In other words, we
can identify patterns that cannot be reasonably explained
from density fluctuations of edges inherent to any reali-
sation of this model. Second, we are, for example, able
to generate new networks from our model with a sim-
ilar group structure, or predict missing edges and im-
pute data. Third, we can make strong statements about
the detectability of groups within a graph. For example,
precise criteria specify when any algorithm can recover
the planted group structure for a graph created by an
SBM [52, 53]. By fitting an SBM to an observed adja-
cency matrix it is possible to recover such a planted group
structure down to its theoretical limit [53, 54]. While
these criteria apply to networks generated with SBMs
and not real networks in general, in which case we do
not know what kind of process created the network [13],
it is nevertheless a remarkable result since it highlights
that there are networks with undetectable block patterns.
Many benchmark graphs proposed in the literature,
such as the commonly used LFR benchmarks [55], can be
seen as specific types of SBMs. Results on these bench-
marks graphs should therefore be interpreted with the
SBM perspective in mind, especially with respect to the
detectability limit. Finally, this model based approach
also offers ways to estimate the number of communities
from the data by some form of model selection, including
hypothesis testing [56], spectral techniques [57, 58], the
minimum description length principle [59], or Bayesian
inference [60].
V. COMMUNITIES AS DYNAMICAL
BUILDING BLOCKS
Let us now consider a fourth alternative motivation for
community detection, focusing on the processes that take
place on the network. All notions of community outlined
above are effectively structural in the sense that they
are mainly concerned with the composition of the graph
itself or its representation as an adjacency matrix, re-
spectively. However, in many cases one of the main goals
of applying tools from network science is to understand
the behavior of a system. While the topology of a system
puts constraints on the dynamics that can take place on
the network, the network topology alone cannot explain
the system behavior. Whence, instead of finding a coarse
grained description of the adjacency matrix, we might be
interested in finding a coarse grained description of the
dynamics acting on top of the network.
Take air traffic as an example. An airline network, with
weighted links connecting cities according to the number
of flights between them, can offer some interesting in-
sights about air traffic. For instance, in the US air traffic
network, Las Vegas and Atlanta form two major hubs.
However, if we instead focus on the passenger flows based
on actual itineraries, the two cities show very different be-
havior: Las Vegas is a tourist destination and typically
the final destination of itineraries, whereas Atlanta is a
transfer hub onto other final destinations [61, 62]. Thus,
these airports play dynamically quite different roles in the
network. Focusing on interconnection patterns alone can
thus give an incomplete picture if we are interested in the
dynamical behavior of a system, for which additional dy-
namical information should be taken into account. Con-
versely, a concentration of edges with high impact on the
dynamics may just arise from a statistical fluctuation, if
the network is seen as a realization of a particular ran-
dom graph model. In this way, structural and dynamical
approaches can offer complementing information.
Flow-based community detection approaches focus on
specifying the modular dynamics on a given, fixed net-
work. Consequently, depending on the dynamics of in-
terest, the modular building blocks may look different.
In general, however, they are blocks of nodes with dif-
5
ferent identities that trap the flow or channel it in spe-
cific directions. That is, they form reduced models of
the dynamics where blocks of nodes are aggregated to
single meta nodes with similar dynamical function with
respect to the rest of the network. In this view, the goal
of community detection is to find effective coarse-grained
system descriptions of how the dynamics take place on
the network structure.
This dynamical take on community detection has pri-
marily focused on modelling the dynamics with Marko-
vian diffusion processes [63–65], though work of topolog-
ical scales and synchronization share the same common
ground [66]. Interestingly, for a simple diffusion dynamics
such as a random walk on an undirected network, which
is essentially determined by the spectral properties of the
network Laplacian, this perspective is tightly connected
with the clustering perspective discussed in section III.
This is because the presence of densely knit groups within
the network can introduce a time-scale separation in the
diffusion dynamics: A random walker traversing the net-
work will initially be trapped for a significant time in-
side a community corresponding to the fast time-scale,
before it can escape and explore the larger network cor-
responding to a slower time-scale. However, already for
directed networks this connection between link density
and dynamical behavior breaks down, even for a simple
diffusion process [26, 63, 65]. This apparent relation-
ship breaks down completely when focusing on longer
pathways, possibly with memory effects in the dynam-
ics [61, 67].
A dynamical perspective is useful especially in appli-
cations in which the network itself is well defined, but
the emergent dynamics are hard to grasp. For instance,
consider the nervous system of the roundworm C. ele-
gans for which there exists a distinct network. A ba-
sic generative network model, such as a Barabasi-Albert
graph or an SBM, might be too simple to capture the
complex architecture of the network, and sampling alter-
native networks from such a model will not create valid
alternative roundworm connectomes. Indeed, some more
complicated network generative models have been pro-
posed to model the structure of the network [68], and
may be used to assess the significance of individual pat-
terns compared to the background of the assumed model.
However, if instead we are interested in assessing the dy-
namical implications of the evolutionary conserved net-
work structure, it may be fruitful to engineer differences
in the actual network and investigate how they affect
the dynamical flows in the system. For instance, one can
replicate experimental node ablations in silico and assess
their dynamical impact [69].
In the dynamical perspective we are typically inter-
ested in how short term dynamics are integrated into long
term behavior of the system and seek a coarse grained de-
scription of the dynamics occurring on a given network.
The network itself represents the true structure, save for
empirical imperfections. This dynamical viewpoint is not
tied to a particular method: for instance, it is possible
to formulate generative statistical models for empirically
observed pathways [62][70]. Compared to some the pre-
vious perspectives, the dynamical viewpoint has received
somewhat less attention and has been confined mainly
to diffusion dynamics. A key challenge is to extend this
perspective to other types of dynamics and link it more
formally to approaches of model order reduction consid-
ered in control theory. In light of the recently growing
interest in control of complex systems, this could help us
better understanding complex systems.
VI. DISCUSSION
Community detection can be viewed through a range
of different lenses. Rather than looking at community
detection as a generic tool that is supposed to work in
a generic context, considering the application in mind is
important when choosing between or comparing different
methods. Each of the perspectives outlined above has its
own particularities, which may or may not be suitable
for the problem of interest.
We emphasize the different perspectives in the follow-
ing example. Given a real-world graph generated by a
possibly complex random assignment of edges, we assume
that we are interested in some particular dynamics taking
place on this graph such as epidemic spreading. We also
assume that the graph is structured such that the dy-
namics exhibit a time-scale separation. If, for instance,
we want to coarse grain an epidemic and identify critical
links that should be controlled to confine the epidemics,
then it does not matter whether or not random fluctua-
tions generated the modules that induces the time-scale
separation. In any case, these modules will be relevant
for the dynamics.
Assume now that the same graph encodes interdepen-
dency of tasks in a load scheduling problem. In such a
circumstance, a cut-based approach will find a relevant
community structure, in that it allows an optimally bal-
anced assignment of tasks to processors that minimises
communication between processors. These communities
may be very different from the ones attached to the epi-
demic spreading. In these two cases, we considered a sin-
gle realisation of the network, and the goal was to extract
useful information about its structure, independently of
the possible mechanisms that generated it.
Let us now consider the same network from a stochastic
equivalence perspective, and assume for simplicity that
the graph is a particular realization of an Erdos-R´enyi
graph. In this case, an approach based on the SBM is
expected to declare that there is no significant pattern to
be found here at all, as the encountered structural vari-
ations can already be explained by random fluctuations
rather than by hidden class labels. Thus, communities
in the SBM picture are defined via the latent variables
within the statistical model of the network structure, and
not via their impact on the behavior of the system. In
this way, different motivations for community detection
6
can find different answers even for the very same network.
In addition to the differences between these perspec-
tives, there are also variations within each perspective.
For instance, distinct plausible generative models such as
the standard SBM or the degree corrected SBM will for
a given graph lead to different inferred community struc-
ture. Similar variations exist in the dynamical paradigm
as well: distinct natural assumptions for the dynamics,
such as dynamics with memory or not, uniform across
nodes or edges, etc., applied to a given graph will lead to
different partitions. Also different balancing criteria, see
section II, or different concepts of high internal density,
see section III, will be valid in different contexts.
As a matter of fact, some of the internal variations
make the perspectives overlap in particular scenarios.
For instance, one can compare all algorithms on simple,
undirected LFR benchmark graphs [55]. However, the
LFR benchmark clearly imposes a density-based notion
of communities. Similarly, for simple undirected net-
works, optimizing Modularity corresponds to the infer-
ence of a particular SBM [11] or may be reinterpreted
as a diffusion process on a graph [12]. Nevertheless,
this overlap of concepts, typically present on unweighted
undirected networks, is only partial, and breaks down,
for example, for directed, weighted networks, or for more
complex dynamics.
VII. CONCLUSIONS
In summary, no general purpose algorithm will ever
serve all applications or data types [13], because each per-
spective emphasizes a particular core aspect: a cut-based
method provides good separation of balanced groups, a
clustering method provides strong cohesiveness of groups
with high internal density, stochastic block models pro-
vide strong similarity of nodes inside a group in terms of
their connectivity profiles, and methods that view com-
munities as dynamical building blocks aim to provide
node groups that influence or are influenced by some dy-
namics in the same way. As more and more diverse types
of data are collected, leading to ever more complex net-
work structures, including directed [8], temporal [71, 72],
multi-layer or multiplex networks [73], the differences be-
tween the perspectives presented here will become even
more striking-the same network might have multiple
valid partitions depending on what question about the
network we are interested in. We might moreover not
only be interested in partitioning the nodes, but also in
partitioning edges [74], or even motifs [75]. Rather than
striving to find a 'best' community-detection algorithm
for a better understanding of complex networks, we ar-
gue for a more careful treatment of what network aspects
that we seek to understand when applying community
detection.
ACKNOWLEDGEMENTS
We thank Aaron Clauset, Leto Peel and Daniel Lar-
remore for fruitful discussions. M.R. was supported by
the Swedish Research Council grant 2012-3729. MTS,
7
JCD, and RL acknowledge support from: FRS-FNRS;
the Belgian Network DYSCO (Dynamical Systems, Con-
trol and Optimisation) funded by the Interuniversity At-
traction Poles Programme initiated by the Belgian State
Science Policy Office; and the ARC (Action de Recherche
Concerte) on Mining and Optimization of Big Data Mod-
els funded by the Wallonia- Brussels Federation.
[1] M. E. J. Newman and M. Girvan, Phys. Rev. E 69,
[26] M. T. Schaub, J.-C. Delvenne, S. N. Yaliraki,
and
026113 (2004).
[2] M. E. J. Newman, Proceedings of the National Academy
of Sciences 103, 8577 (2006).
[3] S. E. Schaeffer, Computer science review 1, 27 (2007).
[4] S. Fortunato, Physics reports 486, 75 (2010).
[5] M. Coscia, F. Giannotti, and D. Pedreschi, Statistical
M. Barahona, PloS one 7, e32210 (2012).
[27] J. M. Kleinberg, in Advances in Neural Information Pro-
cessing Systems 15 , edited by S. Becker, S. Thrun, and
K. Obermayer (MIT Press, 2003) pp. 463–470.
[28] A. Browet, J. M. Hendrickx,
and A. Sarlette,
arXiv:1603.00621 (2016).
Analysis and Data Mining 4, 512 (2011).
[29] R. Kannan, S. Vempala, and A. Vetta, Journal of the
[6] S. Parthasarathy, Y. Ruan, and V. Satuluri, in Social
ACM (JACM) 51, 497 (2004).
network data analytics (Springer, 2011) pp. 79–113.
[7] M. E. Newman, Nature Physics 8, 25 (2012).
[8] F. D. Malliaros and M. Vazirgiannis, Physics Reports
533, 95 (2013).
[30] R. Andersen, F. Chung, and K. Lang, in 2006 47th An-
nual IEEE Symposium on Foundations of Computer Sci-
ence (FOCS'06) (IEEE, 2006) pp. 475–486.
[31] D. A. Spielman and S.-H. Teng, SIAM Journal on Com-
[9] J. Xie, S. Kelley, and B. K. Szymanski, ACM Computing
puting 42, 1 (2013).
Surveys (csur) 45, 43 (2013).
[10] S. Fortunato and D. Hric, Physics Reports 659, 1 (2016),
community detection in networks: A user guide.
[11] M. E. J. Newman, Phys. Rev. E 94, 052315 (2016).
[12] J.-C. Delvenne, M. T. Schaub, S. N. Yaliraki,
and
M. Barahona, in Dynamics On and Of Complex Net-
works, Volume 2 (Springer, 2013) pp. 221–242.
[13] L. Peel, D. B. Larremore,
and A. Clauset,
arXiv:1608.05878 (2016).
[14] U. Von Luxburg, R. C. Williamson, and I. Guyon, in
JMLR Workshop and Conference Proceedings:
ICML
Unsupervised and Transfer Learning, Vol. 27 (2012) pp.
65–80.
[15] C. J. Alpert and A. B. Kahng, Integration, the VLSI
journal 19, 1 (1995).
[32] K. Kloster and D. F. Gleich, in Proceedings of the 20th
ACM SIGKDD international conference on Knowledge
discovery and data mining (ACM, 2014) pp. 1386–1395.
[33] J. Yang and J. Leskovec, Knowledge and Information
Systems 42, 181 (2015).
[34] Let us emphasize here again that this fact does not mean
that conductance is a more meaningful algorithm in any
way, or able to reveal some generic 'ground truth'; see [13]
for an extensive discussion on the relation of meta-data
and structure.
[35] M. E. Newman, Physical review E 74, 036104 (2006).
[36] V. D. Blondel, J.-L. Guillaume, R. Lambiotte,
and
E. Lefebvre, Journal of statistical mechanics: theory and
experiment 2008, P10008 (2008).
[37] S. Fortunato and M. Barth´elemy, Proceedings of the Na-
[16] B. W. Kernighan and S. Lin, Bell system technical jour-
tional Academy of Sciences 104, 36 (2007).
nal 49, 291 (1970).
[38] B. H. Good, Y.-A. de Montjoye, and A. Clauset, Phys.
[17] W. E. Donath and A. J. Hoffman, IBM Technical Disclo-
Rev. E 81, 046106 (2010).
sure Bulletin 15, 938 (1972).
[39] R. Guimera, M. Sales-Pardo, and L. A. N. Amaral, Phys-
[18] W. E. Donath and A. J. Hoffman, IBM Journal of Re-
ical Review E 70, 025101 (2004).
search and Development 17, 420 (1973).
[40] A. Lancichinetti and S. Fortunato, Phys. Rev. E 84,
[19] L. Hagen and A. B. Kahng, IEEE transactions on
computer-aided design of integrated circuits and systems
11, 1074 (1992).
[20] U. Von Luxburg, Statistics and computing 17, 395
(2007).
[21] D. A. Spielman and S.-H. Teng, in Foundations of Com-
puter Science, 1996. Proceedings., 37th Annual Sympo-
sium on (IEEE, 1996) pp. 96–105.
[22] A. Pothen, in Parallel Numerical Algorithms (Springer,
1997) pp. 323–368.
066122 (2011).
[41] M. Chen, K. Kuzmin, and B. K. Szymanski, IEEE Trans-
actions on Computational Social Systems 1, 46 (2014).
[42] M. Chen, T. Nguyen,
arXiv:1507.04308 (2015).
and B. K. Szymanski,
[43] M. G. Everett and S. P. Borgatti, Journal of mathemat-
ical sociology 19, 29 (1994).
[44] R. A. Hanneman and M. Riddle, Introduction to so-
cial network methods (University of California Riverside,
2005).
[23] J. Shi and J. Malik, IEEE Transactions on pattern anal-
[45] P. W. Holland, K. B. Laskey, and S. Leinhardt, Social
ysis and machine intelligence 22, 888 (2000).
networks 5, 109 (1983).
[24] M. Fiedler, Czechoslovak mathematical journal 23, 298
[46] K. Nowicki and T. A. B. Snijders, J. Amer. Statist. Assoc.
(1973).
96, 1077 (2001).
[25] M. Fiedler, Czechoslovak Mathematical Journal 25, 619
[47] C. J. Anderson, S. Wasserman, and K. Faust, Social
(1975).
networks 14, 137 (1992).
8
[48] B. Karrer and M. E. Newman, Physical Review E 83,
016107 (2011).
[49] C. Aicher, A. Z. Jacobs, and A. Clauset, Journal of Com-
plex Networks 3, 221 (2014).
[50] T. P. Peixoto, Physical Review E 92, 042807 (2015).
[51] This ensemble assumption is also reflected in the Mod-
ularity formalism, where the observed network is com-
pared to a null model.
[64] J.-C. Delvenne, S. N. Yaliraki, and M. Barahona, Pro-
ceedings of the National Academy of Sciences 107, 12755
(2010).
[65] R. Lambiotte, J.-C. Delvenne, and M. Barahona, IEEE
Transactions on Network Science and Engineering 1, 76
(2014).
[66] A. Arenas, A. D´ıaz-Guilera, and C. J. P´erez-Vicente,
Phys. Rev. Lett. 96, 114102 (2006).
[52] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a,
[67] V. Salnikov, M. T. Schaub, and R. Lambiotte, Scientific
Phys. Rev. Lett. 107, 065701 (2011).
Reports 6, 23194 (2016).
[53] E. Mossel, J. Neeman,
and A. Sly, arXiv:1311.4115
(2013).
[54] L. Massouli´e, in Proceedings of the 46th Annual ACM
Symposium on Theory of Computing (ACM, 2014) pp.
694–703.
[55] A. Lancichinetti, S. Fortunato, and F. Radicchi, Phys.
Rev. E 78, 046110 (2008).
[56] P. J. Bickel and P. Sarkar, Journal of the Royal Statis-
tical Society: Series B (Statistical Methodology) 78, 253
(2016).
[57] F. Krzakala, C. Moore, E. Mossel, J. Neeman, A. Sly,
L. Zdeborov´a, and P. Zhang, Proceedings of the National
Academy of Sciences 110, 20935 (2013).
[58] A. Saade, F. Krzakala, and L. Zdeborov´a, in Advances
in Neural Information Processing Systems 27 , edited by
Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence,
and K. Q. Weinberger (Curran Associates, Inc., 2014)
pp. 406–414.
[59] T. P. Peixoto, Physical review letters 110, 148701 (2013).
[60] X. Yan, arXiv:1605.07057 (2016).
[61] M. Rosvall, A. V. Esquivel, A. Lancichinetti, J. D. West,
[68] V. Nicosia, P. E. V´ertes, W. R. Schafer, V. Latora, and
E. T. Bullmore, Proceedings of the National Academy of
Sciences 110, 7880 (2013).
[69] K. A. Bacik, M. T. Schaub, M. Beguerisse-Daz, Y. N.
and M. Barahona, PLoS Comput Biol 12, 1
Billeh,
(2016).
[70] Note, however, that whereas the generative approach
in [62] tries to explicitly model the underlying state space
of the trajectories, we may simply be interested in effec-
tively compressing the long term behavior of the system,
which is a somewhat different goal. See, for instance, the
discussion in Ref. [62, 76].
[71] P. Holme and J. Saramaki, Physics reports 519, 97
(2012).
[72] V. Sekara, A. Stopczynski, and S. Lehmann, Proceedings
of the National Academy of Sciences 113, 9977 (2016).
[73] S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Ge-
nio, J. G´omez-Gardenes, M. Romance, I. Sendina-Nadal,
Z. Wang, and M. Zanin, Physics Reports 544, 1 (2014).
[74] Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann, Nature 466,
761 (2010).
and R. Lambiotte, Nature communications 5 (2014).
[75] A. R. Benson, D. F. Gleich, and J. Leskovec, Science
[62] T. P. Peixoto and M. Rosvall, arXiv:1509.04740 (2015).
[63] M. Rosvall and C. T. Bergstrom, Proceedings of the Na-
353, 163 (2016).
[76] C. Persson, L. Bohlin, D. Edler, and M. Rosvall, arXiv
tional Academy of Sciences 105, 1118 (2008).
preprint arXiv:1606.08328 (2016).
|
1207.0561 | 3 | 1207 | 2013-12-31T12:32:02 | Suicide ideation of individuals in online social networks | [
"cs.SI",
"physics.soc-ph"
] | Suicide explains the largest number of death tolls among Japanese adolescents in their twenties and thirties. Suicide is also a major cause of death for adolescents in many other countries. Although social isolation has been implicated to influence the tendency to suicidal behavior, the impact of social isolation on suicide in the context of explicit social networks of individuals is scarcely explored. To address this question, we examined a large data set obtained from a social networking service dominant in Japan. The social network is composed of a set of friendship ties between pairs of users created by mutual endorsement. We carried out the logistic regression to identify users' characteristics, both related and unrelated to social networks, which contribute to suicide ideation. We defined suicide ideation of a user as the membership to at least one active user-defined community related to suicide. We found that the number of communities to which a user belongs to, the intransitivity (i.e., paucity of triangles including the user), and the fraction of suicidal neighbors in the social network, contributed the most to suicide ideation in this order. Other characteristics including the age and gender contributed little to suicide ideation. We also found qualitatively the same results for depressive symptoms. | cs.SI | cs |
1
Suicide ideation of individuals in online social networks
Naoki Masuda1∗, Issei Kurahashi2, Hiroko Onari2
1 Department of Mathematical Informatics, The University of Tokyo, 7-3-1 Hongo,
Bunkyo, Tokyo 113-8656, Japan
2 iAnalysis LLC, 2-2-15 Minamiaoyama, Minato-ku, Tokyo 107-0062, Japan
∗ Email: [email protected]
Abstract
Suicide explains the largest number of death tolls among Japanese adolescents in their twenties and
thirties. Suicide is also a major cause of death for adolescents in many other countries. Although social
isolation has been implicated to influence the tendency to suicidal behavior, the impact of social isolation
on suicide in the context of explicit social networks of individuals is scarcely explored. To address this
question, we examined a large data set obtained from a social networking service dominant in Japan.
The social network is composed of a set of friendship ties between pairs of users created by mutual
endorsement. We carried out the logistic regression to identify users' characteristics, both related and
unrelated to social networks, which contribute to suicide ideation. We defined suicide ideation of a user
as the membership to at least one active user-defined community related to suicide. We found that the
number of communities to which a user belongs to, the intransitivity (i.e., paucity of triangles including
the user), and the fraction of suicidal neighbors in the social network, contributed the most to suicide
ideation in this order. Other characteristics including the age and gender contributed little to suicide
ideation. We also found qualitatively the same results for depressive symptoms.
Introduction
Suicide is a major cause of death in many countries. Japan possesses the highest suicide rate among
the OECD countries in 2009 [1]. In fact, suicide explains the largest number of death cases for Japanese
adolescents in their twenties and thirties [1]. Suicide is also a major cause of death for youths in other
countries including the United States [2].
Since the seminal sociological study by Durkheim in the late nineteenth century [3], suicides have
2
been studied for both sociology interests and public health reasons. In particular, Durkheim and later
scholars pointed out that social isolation, also referred to as the lack of social integration, is a significant
contributor to suicidal behavior [3 -- 6]. Roles of social isolation in inducing other physical and mental
illnesses have also been examined [7]. Conceptual models that inherit Durkheim's idea also claim that
social networks affect general health conditions including tendency to suicide [8 -- 11].
Social network analysis provides a pragmatic method to quantify social isolation [12, 13].
In their
seminal work, Bearman and Moody explicitly studied the relationship between suicidal behavior and
egocentric social networks for American adolescents using data obtained from a national survey (National
Longitudinal Study of Adolescent Health) [14]. They showed that, among many independent variables
including those unrelated to social networks, a small number of friends and a small fraction of triangles
to which an individual belongs significantly contribute to suicide ideation and attempts. A small number
of friends is an intuitive indicator of social isolation. Another study derived from self reports from
Chinese adolescents also supports this idea in a quantitative manner [15]. The paucity of triangles, or
intransitivity [12], also characterizes social isolation [14]. Individuals without triangles are considered to
lack membership to social groups even if they have many friends [16]; social groups are often approximated
by overlapping triangles [17, 18].
Nevertheless, the structure of the Bearman -- Moody study [14] implies that our understanding of
relationships between social networks and suicide is still limited. First, in the survey, a respondent was
allowed to list best five friends of each gender. However, many respondents would generally have more
friends. The imposed upper limit may distort network-related personal quantities such as the number
of friends and triangles. Second, their study was confined inside each school in the sense that only in-
school names are matched. If a respondent X named two out-school friends that were actually friends of
each other, the triangle composed of these three individuals was dismissed from the analysis. Therefore,
the accuracy of the triangle counts in their study may be limited such that the relationship between
intransitivity and suicidal behavior remains elusive.
In the present study, we examine the relationship between social networks and suicide ideation using a
data set obtained from a dominant social networking service (SNS) in Japan, named mixi. Our approach
addresses limitations in the previous study [14]. First, an entire social network of users is available, where
a link between two users represents explicit bidirectional friendship endorsed by both users. Some users
have quite a large number of friends, as in general social networks [13]. Second, for the same reason,
3
we can accurately calculate the number of triangles for each user. An additional feature of the present
data set is that the sample is relatively diverse because anybody can register for free. In contrast, the
respondents were 7 to 12 graders in schools in the Bearman -- Moody study.
A function of mixi relevant to this study is user-defined communities. A community is a group of users
that get together under a common interest, such as hobby, affiliation, or creed. A user-defined community
of mixi is often composed of users that have not known each other beforehand. Although some SNSs have
user-defined communities, and their dynamics were studied [19], major SNSs including Facebook do not
own this type of user-defined communities. We define suicide ideation by the membership of a user to at
least one community related to suicide. Then, we statistically compare users with and without suicide
ideation in terms of users' properties including those related to egocentric networks.
Results
Multivariate logistic regression
We defined the group of users with suicide ideation and the control group of users, as described in
Methods. Table 1 indicates that the difference in the mean of each independent variable (see Methods
for the definition of the independent variables) between the suicide and control groups is significant
(p < 0.001, Student's t-test). We also verified that the distributions of each independent variable are also
significantly different between the two groups (p < 0.0001, Kolmogorov-Smirnov test).
The results obtained from the multivariate logistic regression are summarized in Table 2. The VIF
values (see Methods) are much less than 5 for all the independent variables. The three types of correlation
coefficients between pairs of the independent variables are also sufficiently small (Table 3). On these bases,
we justify the application of the multivariate logistic regression to our data.
The odds ratio (OR) values shown in Table 2 suggest the following. A one-year older user is 1.00463
times more likely to belong to the suicide group than the control group on average. Likewise, being
female, membership to one community, having one friend, an increase in Ci by 0.01, an increase in the
fraction of friends in the suicide group (i.e., homophily variable) by 0.01, and one day of the registration
period make a user 0.821, 1.00733, 0.99790, 0.00930.01 = 0.95, (cid:0)2.22 × 1012(cid:1)0.01
= 1.33, and 0.999383
times more likely to belong to the suicide group, respectively. For all the independent variables, the
95 % confidence intervals of the ORs do not contain unity, and the p-values are small. Therefore, all
4
the independent variables significantly contribute to the regression. In addition, because the AUC (see
Methods) is large (i.e. 0.873), the estimated multivariate logistic model captures much of the variation
in the user's behavior, i.e., whether to belong to the suicide group or not.
Univariate logistic regression
All the independent variables significantly contribute to the multivariate regression probably because of
the large sample size of our data set. Therefore, we carried out the univariate logistic regression between
the dependent variable (i.e., membership to the suicide versus control group) and each independent
variable to better clarify the contribution of each independent variable.
The results obtained from the univariate logistic regression are shown in Table 4. Although the
p-value for each independent variable is small, the AUC value considerably varies between different
independent variables. The ORs for the community number, local clustering coefficient, homophily, and
registration period are consistent between the multivariate and univariate regressions. For example, both
regressions indicate that a user with a large community number tends to belong to the suicide group.
These independent variables also yield large AUC values under the univariate regression.
The community number makes by far the largest contribution among the seven independent vari-
ables. The AUC value obtained from the univariate regression (0.867) is close to that obtained by the
multivariate regression (0.873).
The independent variable with the second largest explanatory power is the local clustering coefficient
(AUC = 0.690). The results are consistent with the previous ones [14]. We stress that we reach this
conclusion using a data set whose full social network is available.
The homophily variable makes the third largest contribution (AUC = 0.643). Although we refer to
this independent variable as homophily (see Methods), the effect of this variable is in fact interpreted as
either homophily or contagion [20, 21]. Nevertheless, the result is consistent with previous claims that
suicide is contagious (for recent accounts, see [6, 22 -- 26]; but see [27] for a critical review) and that other
related states such as depressive symptoms are contagious [28, 29] (but see [30, 31]).
The effect of the age, gender, and degree (i.e., number of friends), on suicide ideation is small, yielding
small AUC values, close to the minimum value 0.5 (Table 4). In addition, the ORs for these variables
are inconsistent between the multivariate and univariate regressions. For example, a female user is more
likely to belong to the suicide group according to the univariate regression and vice versa according to
the multivariate regression. Therefore, we conclude that these three independent variables do not explain
suicide ideation.
The registration period also yields a small AUC value (i.e., 0.545). Therefore, suicide ideation depends
on the community number, local clustering coefficient, and homophily variable not because they commonly
5
depend on the registration period.
Depressive symptoms
Our data set allows us to investigate correlates between users' other characteristics and the independent
variables if the characteristics have corresponding used-defined communities in the SNS. We repeated
the same series of analysis for depressive symptoms, which are suggested to be implicated in suicidal
behavior [5, 22, 32]. A user is defined to own depressive symptoms when the user belongs to at least one
of the seven depression-related communities (Methods).
The statistics of the independent variables for the depression group are compared with those for the
control group in Figures 1, 2, 3, and Table 5. Each independent variable in the depression and control
groups is significantly different in terms of the mean (p < 0.0001, Student's t-test; see Table 5) and
distribution (p < 0.0001, Kolmogorov-Smirnov test).
We applied the multivariate and univariate logistic regressions to identify independent variables that
contribute to depressive symptoms (i.e., membership to the depression group). The control group is the
same as that used for the analysis of suicide ideation. The results are shown in Tables 6 and 7. The VIF
values shown in Table 6 and the correlation coefficient values shown in Table 3 qualify the use of the
multiple logistic regression. The results are qualitatively the same as those for the suicide case.
Discussion
We investigated relationships between suicide ideation and personal characteristics including social net-
work variables using the data obtained from a major SNS in Japan. We found that an increase in the
community number (i.e., the number of user-defined communities to which a user belongs), decrease in the
local clustering coefficient (i.e., local density of triangles, or transitivity), and increase in the homophily
variable (i.e., fraction of neighboring users with suicide ideation) contribute to suicide ideation by the
largest amounts in this order. In addition, the results are qualitatively the same when we replaced suicide
6
ideation by depressive symptoms. Remarkably, the most significant three variables represent online social
behavior of users rather than demographic properties such as the age and gender.
Our result that the age and gender little influence suicide ideation is inconsistent with previous
findings [6]. The weak age effect in our result may be because the majority of registered users is young;
the mean age of the users in the control group is 27.7 years old (Table 1). Nevertheless, we stress that
suicide is a problem particularly among young generations to which a majority of the users belong.
We concluded that the node degree little explains suicide ideation.
In contrast, previous studies
showed that suicidal behavior is less observed for individuals with more friends [14, 15].
It has also
been a long-standing claim that social isolation elicits suicidal behavior [3 -- 6]. As compared to typical
users, some users may spend a lot of time online to gain many ties with other users and belong to many
communities on the SNS. Such a user may be active exclusively online and feel lonely, for example, to be
prone to suicide ideation. Although this is a mere conjecture, such a mechanism would also explain the
strong contribution of the community number to suicide ideation revealed in our analysis. In contrast,
many people nowadays, especially the young, regularly devote much time to online activities including
SNSs [33]. Therefore, the data obtained from SNSs may capture a significant part of users' real lives.
Because mixi enjoys a large number of users and implements the user-defined community as a main
function, its user-defined communities cover virtually all major topics. Therefore, applying the present
methods to other psychiatric illness and symptoms, such as schizophrenia, bipolar disorder, and alcohol
abuse, as well as positive symptoms may be profitable.
Our studies are limited in some aspects. First, we identified suicide ideation with the membership to
a relevant community, but not with suicide attempts or committed suicides. Second, membershipship to
a relevant community may not even imply suicide ideation. Users may enter the suicide group because
they have encountered suicide among their friends or family. Third, our data are a specific sample
of individuals from a general population. This criticism applies to any work that relies on SNS data.
However, it is particularly pertinent when one focuses on individuals' chracteristics (e.g., personality and
attitudes) rather than collective phenomena online (e.g., contagion on SNSs). Although it is beyond
the scope of the current study, quantifying the extent to which our sample accurately represents general
populations remains a future challenge.
7
Methods
Data
Mixi is a major SNS in Japan. It started to operate on March 2004 and enjoys more than 2.7 × 107
registered users as of March 2012. Similar to other known SNSs, users of mixi can participate in various
activities such as making friendship with other users, writing microblogs, sending instant messages to
others, uploading photos, and playing online games. Registration is free. See [34] for a previous study of
the mixi social network.
In mixi, there were more than 4.5 × 106 user-defined communities on various topics as of April 2012.
Users can join a user-defined community if the owner personally permits or the owner allows anybody to
join it.
We identified suicide ideation with the membership of a user to at least one suicidal community.
To define suicidal community, which is sufficiently active, we first selected communities satisfying the
following five criteria: (1) The name included the word "suicide" ("jisatsu" in Japanese), (2) there were
at least 1000 members on November 2, 2011, (3) there were at least 100 comments posted on October,
2011, which were directed to other comments or topics, (4) there were at least three independent topics
on which comments were made on October, 2011, and (5) the condition for admission was made open to
public. Seven communities met these criteria. Then, we excluded one community whose name indicated
that it concentrated on methodologies of committing suicide and two communities whose names indicated
that they encouraged members to live with hopes (one contained the word "want to live", and the other
contained the word "have a fun" in their names; translations by the authors).
As a result, four communities were qualified as suicidal communities. The user statistics of these
communities are shown in Table 8. A user that belongs to at least one suicidal community is defined to
possess suicide ideation. To exclude inactive users, we restricted ourselves to the set of active users. The
active user was defined as users that existed as of January 23, 2012 and logged on to mixi in more than
20 days per month on average from August through December 2011. A similar definition was used in a
previous study of the Facebook social network [35]. We also discarded users with zero or one friend on
mixi because the triangle count described below was undefined for such users. Despite this exclusion, the
remaining data allowed us to examine the effect of social isolation in terms of the degree, i.e., number of
neighbors, because the degree was widely distributed between 2 and 1000. There were 9990 active users
8
with suicide ideation (suicide group).
We statistically compared the users in the suicide group with users without suicide ideation. Because
the number of users was huge, we randomly selected 228949 active users that possessed at least two
friends and belonged to neither of the seven candidates of the suicidal community defined above nor the
ten candidates of the depression-related community defined below. We call this set of users the control
group.
The employees of mixi deleted private information irrelevant to the present study and encrypted the
relevant private information before we analyzed the data. In addition, we conducted all the analysis in
the central office of mixi located in Tokyo using a computer that was not connected to Internet.
Statistical models
The dependent variable that represents the level of suicide ideation is binary, i.e., whether a user belongs
to a suicidal community or not. Therefore, we used univariate and multivariate logistic regressions. To
check the multicollinearity between independent variables to justify the use of the multivariate logistic
regression, we carried out two subsidiary analysis. First, we measured the variance inflation factor (VIF)
for each independent variable (see [36, 37] and references therein). The VIF is the reciprocal of the
fraction of the variance of the independent variable that is not explained by linear combinations of the
other independent variables.
It is recommended that the VIF value for each independent variable is
smaller than 10 (preferably smaller than 5) for the multivariate logistic regression to be valid. Second, we
measured the Pearson, Spearman, and Kendall correlation coefficients between the independent variables.
To quantify the explanatory power of the logistic model, we measured the area under the receiver
operating characteristic curve (AUC) for each fit (e.g., [37]). The receiver operating characteristic curve
is the trajectory of the false positive (i.e., fraction of users in the control group that are mistakenly
classified into the suicide group on the basis of the linear combination of the independent variables) and
the true positive (i.e., fraction of users in the suicide group correctly classified into the suicide group),
when the threshold for classification is varied. The AUC value falls between 0.5 and 1. A large AUC
value indicates that the logistic regression fits well to the data in the sense that users are accurately
classified into suicide and control groups.
9
Independent Variables
We considered seven independent variables. Their univariate statistics for the suicide and control groups
are shown in Table 1.
Demographics. Demographic independent variables include age and gender. Our analysis does not
include ethnic components because most users are Japanese-speaking Japanese; mixi provides services
in Japanese. Other demographic, socioeconomic, and personal characteristic variables such as residence
area, occupation, company/school, and hobby, were not used because they were unreliable. In fact, many
users leave them blank or do not fill them consistently, probably because they do not want to disclose
them.
Community number. The number of user-defined communities that a user belongs to was adopted as
an independent variable. We refer to this quantity as community number. The community number obeys
a long tailed distribution for both suicide and control groups (Figure 1). The mean is quite different
between the two groups (Table 1).
Degree. When a user sends a request to another user and the recipient accepts the request, the pair
of users form an undirected social tie, called Friends. A web of Friends defines a social network of mixi.
We adopted degree as the most basic network-related independent variable. The degree is the number
of neighbors (i.e., Friends), and denoted by ki for user i. The system of mixi allows a user to own at
most degree 1000. As is consistent with the previous analysis of a much smaller data set of mixi [34], the
degree distributions for both groups are long tailed (Figure 2). A small degree is an indicator of social
isolation.
Local clustering coefficient We quantified transitivity, or the density of triangles around a user, by
the local clustering coefficient, denoted by Ci for user i. A directed-link version of the same quantity
was used in the Bearman -- Moody study. For user i having degree ki, there can be maximum ki(ki − 1)/2
triangles that include user i. We defined Ci as the actual number of triangles that included i divided by
ki(ki − 1)/2. Examples are shown in Figure 4. By definition, 0 ≤ Ci ≤ 1. We discarded the users with
ki ≤ 1 because Ci was defined only for users with ki ≥ 2. Ci quantifies the extent to which neighbors
of user i are adjacent to each other [13, 38]. If Ci is large, the user is probably embedded in close-knit
social groups [12,13,38]. A small Ci value is an indicator of social isolation. As in many networks [13], Ci
decreases with ki in both suicide and control groups (Figure 3). The results are consistent with those in
the previous study in which the average Ci obtained without categorizing users is roughly proportional
10
to k−0.6
i
[34]. Therefore, we carefully distinguished the influence of ki and Ci on suicide ideation by
combining univariate and multivariate regressions.
Homophily. Suicide may be a contagious phenomenon (e.g., [6, 22 -- 26]). If so, a user is inclined to
suicide ideation when a neighbor in the social network is. Therefore, we adopted the fraction of neighbors
with suicide ideation as an independent variable. It should be noted that, even if a user with suicide
ideation has relatively many friends with suicide ideation, it does not necessarily imply that suicide is
contagious. Homophily may be a cause of such assortativity.
In this study, we did not attempt to
distinguish the effect of imitation and homophily. The differentiation would require analysis of temporal
data [20,21]. Nevertheless, for a notational reason, we refer to the fraction of neighbors as the homophily
variable.
Registration period. A user that registered to mixi long time ago may be more active and own more
resources in mixi than new users. Such an experienced user may tend to simultaneously have, for example,
a large community number, large degree, and perhaps high activities in various communities including
suicidal ones. To control for this factor, we measured the registration period defined as the number of
days between the registration date and January 23, 2012.
Analysis of depressive symptoms
To define depression-related community, we identified the communities satisfying the five criteria as in
the case of suicidal community, but with the term suicide in the community name replaced by depression
("utsu" in Japanese). There were ten such communities. We excluded three of them because their names
include positive words (let's overcome, resume one's place in society, cure; translations by the authors).
We defined the remaining seven communities, summarized in Table 9, to represent depressive symptoms
of users. The depression group is the set of active users that belongs to at least one depression-related
community listed in Table 9. The depression group contains 24410 users.
Ethics statement
Mixi approved the provision of the data.
Acknowledgments
We thank mixi, Inc.
for providing us with their data and Taro Takaguchi for careful reading of the
11
manuscript.
References
1. Chambers A (2010) Japan: ending the culture of the 'honourable' suicide. The Guardian (3 August
2010).
2. US Bureau of the Census (2012). Statistical abstract of the United States.
3. Durkheim E (1951) Suicide. New York: Free Press.
4. Trout DL (1980) The role of social isolation in suicide. Suicide Life-Threatening Behav 10: 10 -- 23.
5. Joiner Jr TE, Brown JS, Wingate LR (2005) The psychology and neurobiology of suicidal behavior.
Annu Rev Psychol 56: 287 -- 314.
6. Wray M, Colen C, Pescosolido B (2011) The sociology of suicide. Annu Rev Sociol 37: 505 -- 528.
7. Putnam RD (2000) Bowling Alone. New York: Simon & Schuster.
8. Pescosolido BA, Georgianna S (1989) Durkheim, suicide, and religion: toward a network theory of
suicide. Amer Sociol Rev 54: 33 -- 48.
9. Bearman PS (1991) The social structure of suicide. Sociol Forum 6: 501 -- 524.
10. Berkman LF, Glass T, Brissette I, Seeman TE (2000) From social integration to health: Durkheim
in the new millennium. Soc Sci Med 51: 843 -- 857.
11. Kawachi I, Berkman LF (2001) Social ties and mental health. J Urban Health 78: 458 -- 467.
12. Wasserman S, Faust K (1994) Social Network Analysis. New York: Cambridge University Press.
13. Newman MEJ (2010) Networks -- An Introduction. Oxford: Oxford University Press.
14. Bearman PS, Moody J (2004) Suicide and friendships among American adolescents. Amer J Public
Health 94: 89 -- 95.
12
15. Cui S, Cheng Y, Xu Z, Chen D, Wang Y (2010) Peer relationships and suicide ideation and attempts
among Chinese adolescents. Child Care Health Dev 37: 692 -- 702.
16. Krackhardt D (1999) The ties that torture: Simmelian tie analysis in organizations. Research in
the Sociology of Organizations 16: 183 -- 210.
17. Palla G, Der´enyi I, Farkas I, Vicsek T (2005) Uncovering the overlapping community structure of
complex networks in nature and society. Nature 435: 814 -- 818.
18. Onnela JP, Saramaki J, Hyvonen J, Szab´o G, Lazer D, et al. (2007) Structure and tie strengths in
mobile communication networks. Proc Natl Acad Sci USA 104: 7332 -- 7336.
19. Backstrom L, Huttenlocher D, Kleinberg J, Lan X (2006) Group formation in large social net-
works: membership, growth, and evolution. Proceedings of the 12th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining : 44 -- 54.
20. Aral S, Muchnik L, Sundararajan A (2009) Distinguishing influence-based contagion from
homophily-driven diffusion in dynamic networks. Proc Natl Acad Sci USA 106: 21544 -- 21549.
21. Shalizi CR, Thomas AC (2011) Homophily and contagion are generically confounded in observa-
tional social network studies. Sociol Methods Res 40: 211 -- 239.
22. Mann JJ (2002) A current perspective of suicide and attempted suicide. Ann Intern Med 136:
302 -- 311.
23. Baller RD, Richardson KK (2002) Social integration, imitation, and the geographic patterning of
suicide. Amer Soc Rev 67: 873 -- 888.
24. Romer D, Jamieson PE, Jamieson KH (2006) Are news reports of suicide contagious? A stringent
test in six U. S. cities. J Communication 56: 253 -- 270.
25. Hedstrom P, Liu KY, Nordvik MK (2008) Interaction domains and suicide: a population-based
panel study of suicides in Stockholm, 1991 -- 1999. Soc Forces 87: 713 -- 740.
26. Baller RD, Richardson KK (2009) The "dark side" of the strength of weak ties: the diffusion of
suicidal thoughts. J Health Soc Behav 50: 261 -- 276.
13
27. Gould MS, Wallenstein S, Davidson L (1989) Suicide clusters: a critical review. Suicide Life-
Threatening Behav 19: 17 -- 29.
28. Christakis NA, Fowler JH (2009) Connected. New York: Little, Brown and Company.
29. Rosenquist JN, Fowler JH, Christakis NA (2011) Social network determinants of depression. Mol
Psychiatry 16: 273 -- 281.
30. Lyons R (2011) The spread of evidence-poor medicine via flawed social-network analysis. Stat
Politics Policy 2: Article 2.
31. VanderWeele TJ (2011) Sensitivity analysis for contagion effects in social networks. Sociol Methods
Res 40: 240 -- 255.
32. Brezo J, Paris J, Turecki G (2006) Personality traits as correlates of suicidal ideation, suicide
attempts, and suicide completions: a systematic review. Acta Psychiatr Scand 113: 180 -- 206.
33. Martin D (2010) What Americans do online: social media and games dominate activity. Nielsen
News, Online (2 August 2010).
34. Yuta K, Ono N, Fujiwara Y (2007). A gap in the community-size distribution of a large-scale social
networking site. arXiv:physics/0701168.
35. Ugander J, Karrer B, Backstrom L, Marlow C (2011). The anatomy of the Facebook social graph.
arXiv:1111.4503.
36. Stine RA (1995) Graphical interpretation of variance inflation factors. Am Stat 49: 53 -- 56.
37. Tuff´ery S (2011) Data Mining and Statistics for Decision Making (2nd edition). Chichester: Willey.
38. Watts DJ, Strogatz SH (1998) Collective dynamics of 'small-world' networks. Nature 393: 440 -- 442.
14
Figure captions
Figure 1: Distribution of the community number (i.e., number of communities to which a user belongs)
for the suicide, depression, and control groups. We set the bin width for generating the histogram to
50. The abrupt increase in the distribution at 1000 communities for the suicide and depression groups is
owing to the restriction that a user can belong to at most 1000 communities.
Figure 2: Complementary cumulative distribution of the degree (i.e., fraction of users having the degree
larger than a specified value) for the suicide, depression, and control groups.
Figure 3: Dependence of the mean local clustering coefficient on the degree for the suicide, depression,
and control groups. Each data point C(k) for degree k is obtained by averaging Ci over the users in
a group with degree k. Large fluctuations of C(k) at large k values are caused by the paucity of users
having large k.
Figure 4: Examples of the degree (ki) and the local clustering coefficient (Ci). The shown values of ki
and Ci are for the nodes shown by the filled circles.
15
Table captions
Table 1: Univariate statistics of independent variables for the suicide and control groups. The p-value for
the gender is based on the Chi-square test. The p-values for the other independent variables are based
on the Student's t-test. Also shown are the statistics of two auxiliary variables that are not used in the
logistic regression, i.e., the number of suicidal communities to which the user belongs and the number
of days on which the user logged on to mixi. The p-value for the number of log-on days is based on the
Student's t-test. SD: standard deviation.
Table 2: Multivariate logistic regression of suicide ideation on individual and network variables. OR: odds
ratio; CI: 95 % confidence interval; VIF: variance inflation factor.
Table 3: Correlation coefficients between pairs of independent variables for the suicide, depression, and
control groups. P: Pearson; S: Spearman; K: Kendall correlation coefficients.
Table 4: Univariate logistic regression of suicide ideation on individual and network variables. OR: odds
ratio; CI: 95 % confidence interval; AUC: area under the curve.
Table 5: Univariate statistics of independent variables for the depression and control groups. The values
for the control group are equal to those shown in Table 1 except for those of the homophily variable. The
homophily is defined as the fraction of neighbors belonging to the depression group in this table, whereas
it is defined as the fraction of neighbors belonging to the suicide group in Table 1. The p-value for the
gender is based on the Chi-square test. The p-values for the other variables are based on the Student's
t-test. SD: standard deviation.
Table 6: Multivariate logistic regression of depressive symptoms on individual and network variables. OR:
odds ratio; CI: 95 % confidence interval; VIF: variance inflation factor.
Table 7: Univariate logistic regression of depressive symptoms on individual and network variables. OR:
odds ratio; CI: 95 % confidence interval; AUC: area under the curve.
Table 8: Statistics of suicidal communities.
Table 9: Statistics of depression-related communities. For a technical reason, we collected the number
of members for communities 1, 2, 3, and 6 on November 2, 2011 and communities 4, 5 and 7 on November
4, 2011.
16
Figure 1
17
s
r
e
s
u
f
o
n
o
i
t
c
a
r
f
0.8
0.6
0.4
0.2
0.0
Suicide
Depression
Control
0
200
400
600
800
1000
community number
Figure 2
18
n
o
i
t
c
n
u
f
r
o
v
i
v
r
u
S
1.0
0.8
0.6
0.4
0.2
0.0
Suicide
Depression
Control
101
102
103
degree
Figure 3
19
Figure 4
20
)
k
(
C
10- 1
10- 2
10- 3
10- 4
Suicide
Depression
Control
101
102
103
degree
21
Table 1
Variable
Suicide group
(N = 9, 990)
Control group
(N = 228, 949)
Mean±SD
Range
(min,max)
Mean±SD
Range
(min,max)
p-value
Age
27.4±10.3
(17, 97)
27.7±9.2
(14, 96)
0.000652
Community number
283.7±284.3
(1, 1000)
46.3±79.4
(1, 1000)
< 0.0001
ki
Ci
82.9±98.7
(2, 1000)
65.8±67.6
(2, 1000)
< 0.0001
0.087±0.097
(0, 1)
0.150±0.138
(0, 1)
< 0.0001
Homophily (suicide)
0.0110±0.0329
(0, 1.000)
0.0012±0.0080
(0, 0.667) < 0.0001
Registration period
1235.7±638.9
(122, 2878)
1333.5±670.5
(102, 2891) < 0.0001
Gender (female)
5,786 (57.9%)
126,941 (55.4%)
< 0.0001
No. suicidal communities
1.20±0.51
(1, 4)
N/A
N/A
N/A
No. login days
28.9±4.4
(1, 31)
26.9±6.3
(1, 31)
< 0.0001
22
Table 2
Variable
OR
CI
p-value
VIF
Age
1.00463
(1.00211, 1.00716)
0.000313
1.091
Gender (female = 1)
0.821
(0.783, 0.861)
< 0.0001
1.028
Community number
1.00733
(1.00720, 1.00747)
< 0.0001
1.197
ki
Ci
0.99790
(0.99758, 0.99821)
< 0.0001
1.156
0.0093
(0.0069, 0.0126)
< 0.0001
1.081
Homophily (suicide)
2.22 × 1012
(0.57 × 1012, 8.65 × 1012) < 0.0001
1.016
Registration period
0.999383
(0.999346, 0.999420)
< 0.0001
1.135
23
Table 3
Variable 1
Variable 2
Suicide
Depression
Control
P
S
K
P
S
K
P
S
K
Age
Age
Age
Age
Age
Age
Age
Gender
Gender
Gender
Gender
Gender
Gender
Gender
−.094 −.137 −.116 −.166 −.174 −.145 −.053 −.026 −.022
Community number
−.045 −.105 −.073 −.089 −.131 −.091 −.032
.023
.015
ki
Ci
−.103 −.224 −.157 −.168 −.268 −.187 −.279 −.385 −.271
−.048 −.220 −.154 −.092 −.273 −.192
.041 −.152 −.111
Homophily (suicide)
.031 −.037 −.029
N/A
N/A
N/A −.011 −.090
.074
Homophily (depression)
N/A
N/A
N/A
.166
.121 −.089 −.007 −.083 −.066
Registration period
.159
.356
.259
.203
.364
.266
.278
.460
.337
Community number
.205
.204
.166
.086
.083
.068
.110
.116
.095
ki
Ci
.048
.046
.038
.048
.046
.038
.015
.014
.011
−.109 −.097 −.080 −.061 −.030 −.024 −.084 −.085 −.069
Homophily (suicide)
−.007
.031
.028
N/A
N/A
N/A −.012 −.017 −.017
Homophily (depression)
N/A
N/A
N/A −.053 −.021 −.018
.000
.009
.008
Registration period
−.064 −.061 −.050 −.078 −.079 −.065
.025
.025
.020
Community number
Community number
ki
Ci
.348
.338
.231
.375
.360
.248
.375
.372
.258
−.231 −.200 −.136 −.201 −.171 −.116 −.376 −.399 −.277
Community number
Homophily (suicide)
−.034
.140
.105
N/A
N/A
N/A
.027
.113
.091
Community number
Homophily (depression)
N/A
N/A
N/A −.150
.034
.025
.038
.166
.132
Community number
Registration period
.166
.152
.102
.187
.172
.115
.339
.338
.230
ki
ki
ki
ki
Ci
Ci
Ci
Ci
−.251 −.116 −.085 −.240 −.105 −.074 −.363 −.248 −.175
Homophily (suicide)
−.175
.174
.107
N/A
N/A
N/A −.013
.191
.150
Homophily (depression)
N/A
N/A
N/A −.210
.076
.029 −.027
.254
.188
Registration period
.170
.154
.103
.172
.152
.101
.102
.081
.055
Homophily (suicide)
−.047 −.213 −.162
N/A
N/A
N/A −.026 −.100 −.080
Homophily (depression)
N/A
N/A
N/A −.055 −.243 −.182 −.031 −.145 −.114
Registration period
−.143 −.112 −.162 −.133 −.099 −.068 −.221 −.249 −.168
Homophily (suicide)
Registration period
−.104 −.059 −.044
N/A
N/A
N/A −.039 −.031 −.025
Homophily (depression)
Registration period
N/A
N/A
N/A −.120 −.049 −.036 −.024
.011
.009
24
Table 4
Variable
OR
CI
p-value
AUC
Age
0.99604
(0.99377, 0.99832)
0.000651
0.515
Gender (female = 1)
1.106
(1.062, 1.152)
< 0.0001
0.512
Community number
1.00728
(1.00716, 1.00741)
< 0.0001
0.867
ki
Ci
1.00259
(1.00237, 1.00280)
< 0.0001
0.549
0.000581
(0.000428, 0.000789)
< 0.0001
0.690
Homophily (suicide)
1.57 × 1016
(0.41 × 1016, 6.08 × 1016) < 0.0001
0.643
Registration period
0.999783
(0.999753, 0.999813)
< 0.0001
0.545
25
Table 5
Variable
Depression group
(N = 24, 410)
Control group
(N = 228, 949)
Mean±SD
Range
(min,max)
Mean±SD
Range
(min,max)
p-value
Age
28.8±9.4
(16, 97)
27.7±9.2
(14, 96)
< 0.0001
Community number
249.6±263.1
(1, 1000)
46.3±79.4
(1, 1000)
< 0.0001
ki
Ci
81.9±88.1
(2, 1000)
65.8±67.6
(2, 1000)
< 0.0001
0.085±0.089
(0, 1)
0.150±0.138
(0, 1)
< 0.0001
Homophily (depression)
0.0196±0.0501
(0, 1.000)
0.0031±0.0131
(0, 0.667) < 0.0001
Registration period
1389.4±659.2
(122, 2885)
1333.5±670.5
(102, 2891) < 0.0001
Gender (female)
16,872 (69.1%)
126,941 (55.4%)
< 0.0001
No. suicidal communities
1.16±0.47
(1, 6)
N/A
N/A
N/A
No. login days
28.8±4.4
(1, 31)
26.9±6.3
(1, 31)
< 0.0001
26
Table 6
Variable
OR
CI
p-value
VIF
Age
1.0141
(1.0124, 1.0158)
< 0.0001
1.104
Gender (female = 1)
1.532
(1.481, 1.585)
< 0.0001
1.019
Community number
1.00790
(1.00778, 1.00803)
< 0.0001
1.155
ki
Ci
0.99833
(0.99810, 0.99856)
< 0.0001
1.154
0.0145
(0.0118, 0.0178)
< 0.0001
1.079
Homophily (depression)
1.98 × 1010
(0.99 × 1010, 4.02 × 1010) < 0.0001
1.022
Registration period
0.999744
(0.999720, 0.999769)
< 0.0001
1.117
27
Table 7
Variable
OR
CI
p-value
AUC
Age
1.0110
(1.0097, 1.0123)
< 0.0001
0.551
Gender (female = 1)
1.799
(1.748, 1.850)
< 0.0001
0.568
Community number
1.00826
(1.00814, 1.00837)
< 0.0001
0.860
ki
Ci
1.00258
(1.00243, 1.00274)
< 0.0001
0.566
0.000415
(0.000338, 0.000509)
< 0.0001
0.692
Homophily (depression)
2.12 × 1012
(1.05 × 1012, 4.28 × 1012) < 0.0001
0.658
Registration period
1.000126
(1.000106, 1.000145)
< 0.0001
0.522
28
Table 8
Date of creation
No. active
Fraction of
No.
No. active
(day/month/year)
No. users
users
active users (%)
comments
topics
18/01/2008
21/09/2006
01/12/2004
04/02/2008
8367
5135
3459
1445
5985
3192
1883
965
69.9
62.9
53.2
62.4
741
318
279
105
16
6
12
9
ID
1
2
3
4
29
Table 9
Date of creation
No. active
Fraction of
No.
No. active
ID
(day/month/year)
No. users
users
active users (%)
comments
topics
1
2
3
4
5
6
7
06/04/2004
15618
06/02/2006
13082
08/12/2004
22/04/2006
28/01/2008
09/12/2004
21/12/2004
4948
4606
3406
3464
2440
8605
9674
2845
2907
2321
2039
1367
54.7
72.8
56.5
60.4
65.0
58.2
54.2
14466
1008
782
221
1350
851
535
52
16
17
30
24
20
5
|
1603.01511 | 1 | 1603 | 2016-03-04T15:59:06 | Hoaxy: A Platform for Tracking Online Misinformation | [
"cs.SI",
"physics.soc-ph"
] | Massive amounts of misinformation have been observed to spread in uncontrolled fashion across social media. Examples include rumors, hoaxes, fake news, and conspiracy theories. At the same time, several journalistic organizations devote significant efforts to high-quality fact checking of online claims. The resulting information cascades contain instances of both accurate and inaccurate information, unfold over multiple time scales, and often reach audiences of considerable size. All these factors pose challenges for the study of the social dynamics of online news sharing. Here we introduce Hoaxy, a platform for the collection, detection, and analysis of online misinformation and its related fact-checking efforts. We discuss the design of the platform and present a preliminary analysis of a sample of public tweets containing both fake news and fact checking. We find that, in the aggregate, the sharing of fact-checking content typically lags that of misinformation by 10--20 hours. Moreover, fake news are dominated by very active users, while fact checking is a more grass-roots activity. With the increasing risks connected to massive online misinformation, social news observatories have the potential to help researchers, journalists, and the general public understand the dynamics of real and fake news sharing. | cs.SI | cs | Hoaxy: A Platform for Tracking Online Misinformation
∗
Chengcheng Shao
School of Computer
National University of Defense Technology,
China
Giovanni Luca Ciampaglia1,
Alessandro Flammini1,2,
Filippo Menczer1,2
1 Indiana University Network Science Institute
2 School of Informatics and Computing
Indiana University, Bloomington, USA
6
1
0
2
r
a
M
4
]
I
S
.
s
c
[
1
v
1
1
5
1
0
.
3
0
6
1
:
v
i
X
r
a
ABSTRACT
Massive amounts of misinformation have been observed to
spread in uncontrolled fashion across social media. Exam-
ples include rumors, hoaxes, fake news, and conspiracy the-
ories. At the same time, several journalistic organizations
devote significant efforts to high-quality fact checking of on-
line claims. The resulting information cascades contain in-
stances of both accurate and inaccurate information, un-
fold over multiple time scales, and often reach audiences of
considerable size. All these factors pose challenges for the
study of the social dynamics of online news sharing. Here
we introduce Hoaxy, a platform for the collection, detection,
and analysis of online misinformation and its related fact-
checking efforts. We discuss the design of the platform and
present a preliminary analysis of a sample of public tweets
containing both fake news and fact checking. We find that,
in the aggregate, the sharing of fact-checking content typi-
cally lags that of misinformation by 10–20 hours. Moreover,
fake news are dominated by very active users, while fact
checking is a more grass-roots activity. With the increas-
ing risks connected to massive online misinformation, social
news observatories have the potential to help researchers,
journalists, and the general public understand the dynamics
of real and fake news sharing.
Keywords
Misinformation; hoaxes;
checking; Twitter
fake news; rumor tracking;
fact
1.
INTRODUCTION
The recent rise of social media has radically changed the
way people consume and produce information online [21].
Approximately 65% of the US adult population accesses the
news through social media [2, 30], and more than a billion
∗Work performed as a visiting scholar at Indiana University.
Email: [email protected]
Preprint version
.
people worldwide are active on a daily basis on Facebook
alone [16].
The possibility for normal consumers to produce content
on social media creates new economies of attention [10] and
has changed the way companies relate to their customers [35].
Social media allow users to participate in the propagation
of the news. For example, in Twitter, users can rebroad-
cast, or retweet, any piece of content to their social circles,
creating a competition among posts for our limited atten-
tion [37]. This has the implication that no individual author-
ity can dictate what kind of information is distributed on the
whole network. While such platforms have brought about
a more egalitarian model of information access according to
some [4], the inevitable lack of oversight from expert jour-
nalists makes social media vulnerable to the unintentional
spread of false or inaccurate information, or misinformation.
Large amounts of misinformation have been indeed ob-
served to spread online in viral fashion, oftentimes with wor-
rying consequences in the offline world [8, 22, 29, 23, 27, 7];
examples include rumors [18], false news [8, 23], hoaxes, and
even elaborate conspiracy theories [1, 13, 19].
Due to the magnitude of the phenomenon, media orga-
nizations are devoting increasing efforts to produce accu-
rate verifications in a timely manner. For example, during
Hurricane Sandy, false reports that the New York Stocks
Exchange had been flooded were corrected in less than an
hour [36]. These fact-checking assessments are consumed
and broadcast by social media users like any other type
of news content, leading to a complex interplay between
'memes' that vie for the attention of users [37]. Examples
of such organizations include Snopes.com, PolitiFact, and
FactCheck.org.
Structural features of the information exchange networks
underlying social media create peculiar patterns of infor-
mation access. Online social networks are characterized by
homophily [25], polarization [12], algorithmic ranking [3],
and social bubbles [28] - information environments with
low content diversity and strong social reinforcement.
All of these factors, coupled with the fast news life cy-
cle [14, 10], create considerable challenges for the study of
the dynamics of social news sharing. To address some of
these challenges, here we present Hoaxy, an upcoming Web
platform for the tracking of social news sharing. Its goal is
to let researchers, journalists, and the general public moni-
tor the production of online misinformation and its related
fact checking.
As a simple proof of concept for the capabilities of this
kind of systems, here we present the results of a prelimi-
nary analysis on a dataset of public tweets collected over
the course of several months. We focus on two aspects: the
temporal relation between the spread of misinformation and
fact checking, and the differences in how users share them.
We find that, in absolute terms, misinformation is produced
in much larger quantity than fact-checking content. Fact
checks obviously lag misinformation, and we present evi-
dence that there exists a characteristic lag of approximately
13 hours between the production of misinformation and that
of fact checking. Finally, we show preliminary evidence that
fact-checking information is spread by a broader plurality of
users compared to fake news.
2. RELATED WORK
Tracking abuse of social media has been a topic of in-
tense research in recent years. Beginning with the detection
of simple instances of political abuse like astroturfing [31],
researchers noted the need for automated tools for monitor-
ing social media streams. Several such systems have been
proposed in recent years, each with a particular focus or a
different approach. The Truthy system [32], which relies on
network analysis techniques, is among the best known of
such platforms. The TweetCred system [9] focuses instead
on content-based features and other kind of metadata, and
distills a measure of overall information credibility.
More recently, specific systems have been proposed to
detect rumors. These include RumorLens [33], Twitter-
Trails [26], and FactWatcher [20]. The fact-checking capa-
bilities of these systems range from completely automatic
(TweetCred), to semi-automatic (TwitterTrails, RumorLens).
In addition, some of them let the user explore the prop-
agation of a rumor with an interactive dashboard (Twit-
terTrails, RumorLens). However, they do not monitor the
social media stream automatically, but require the user to
input a specific rumor to investigate. Compared with these,
the objective of the Hoaxy system is to track both accurate
and inaccurate information in automatic fashion.
Automatic attempts to perform fact checking have been
recently proposed for simple statements [11], and for multi-
media content [6]. At this initial stage, because our focus
is on automatic tracking of news sharing, the Hoaxy system
does not perform any kind of fact checking. Instead, we fo-
cus on tracking news shares from sources whose accuracy has
been determined independently. There have been investiga-
tions on the related problems of finding reliable information
sources [15] and news curators [24].
3. SYSTEM ARCHITECTURE
Our main objective is to build a uniform and extensible
platform to collect and track misinformation and fact check-
ing. Fig. 1 shows the architecture of our system. Currently
our efforts have been focused on the 'Monitors' part of the
system. We have implemented a tracker for the Twitter API,
and a set of crawlers for both fake news and fact checking
websites, as well as a database.
We begin by describing the origin of our data. The sys-
tem collects data from two main sources: news websites and
social media. From the first group we can obtain data about
the origin and evolution of both fake news stories and their
fact checking. From the second group we collect instances of
these news stories (i.e., URLs) that are being shared online.
Figure 1: Architecture of the Hoaxy system.
To collect data from such disparate sources, we make use
of a number of technologies: Web scraping, Web syndica-
tion, and, where available, APIs of social networking plat-
forms. For example, we use the Twitter streaming API to
do real-time tracking of news sharing. Because tweets are
limited to 140 characters, the most common method to share
a news story on Twitter is to include directly a link to its
Web article. This means that we can focus only on tweets
containing links to specific domains (websites), a task that
is performed efficiently by the filter endpoint of the Twitter
streaming API.1
To collect data on news stories we rely on RSS, which al-
lows us to use a unified protocol instead of manually adapt-
ing our scraper to the multitude of Web authoring systems
used on the Web. Moreover, RSS feeds contain information
about updates made to news stories, which let us track the
evolution of news articles. We collect data from news sites
using the following two steps: when a new website is added
to our list of monitored sources, we perform a 'deep' crawl
of its link structure using a custom Python spider written
with the Scrapy framework2; at this stage, we also identify
the URL of the RSS feed, if available. Once all existing sto-
ries have been acquired, we perform every two hours a 'light'
crawl by checking its RSS feed only. To perform the 'deep'
crawl, we use a depth-first strategy. The 'light' crawl is in-
stead performed using a breadth-first approach. We store all
these structured data into a database; this allows convenient
retrieval for future analysis, which we plan to implement as
an interactive Web dashboard. Unfortunately, URLs do not
make for good, unique identifiers, since URLs with different
protocol schema, query parameters, or fragments may all
refers to the same page. We rely on canonical URLs where
possible, and adopt a simple URL canonization technique in
other cases (see below).
1dev.twitter.com/streaming/reference/post/
statuses/filter
2scrapy.org
DATABASEStoreMonitorsURL Tracker(stream api)RSS ParserScrapy SpiderFetchNews SitesSocial NetworksAPICrawlerAnalysis DashboardFigure 2: Lagged cross correlation (Pearson's r) be-
tween news sharing activity of misinformation and
fact-checking, with peak value at lag = −13 hours.
Figure 3: Daily volume of tweets. The gaps corre-
spond to two windows with missing data when our
collection script crashed.
Table 1: Summary statistics of tweet data.
Nusers NURLs
source Nsites
Ntweets
fake news
fact checking
71
6
1,287,769
154,526
171,035
78,624
96,400
11,183
4. PRELIMINARY ANALYSIS
In this section we report results from a preliminary anal-
ysis performed on a large set of public tweets collected over
the course of several months. Since we are interested in
characterizing the relation between the overall social shar-
ing activity of misinformation and fact checking, we begin
our analysis by focusing on the overall aggregate volume of
tweets, without breaking activity down to the level of an in-
dividual story or set of stories. We take aggregate volume as
a proxy for the overall social sharing activity of news stories.
4.1 Data
We collect tweets containing URLs from two lists of Web
domains: the first, fake news, covers 71 domains and was
taken from a comprehensive resource on online misinforma-
tion.3 We manually removed known satirical sources like
The Onion. The second list is composed of the six most
popular fact-checking websites: Snopes.com, PolitiFact.
com, FactCheck.org, OpenSecrets.org, TruthOrFiction.
com, and HoaxSlayer.com. The keywords we used to collect
all these tweets correspond to the domain names of these
websites.
To convert the URLs to canonical form we perform the
following steps: first, we transform all text into lower case;
then we remove the protocol schema (e.g. 'http://'); then we
remove, if present, any prefix instance of the strings 'www.'
or 'm.'; finally, we remove all URL query parameters.
We collected about 3 months of filtered tweets traffic from
Oct 14, 2015 to Jan 24, 2016. The summary statistics for
the numbers of tweets, unique users, and unique canonical
3fakenewswatch.com
URLs (Table 1) illustrate the imbalance between the sets of
fake news and fact-checking sites.
4.2 Tweet Volume
Fig. 3 plots the daily volume of tweets. As described be-
fore, we track more fake sites than fact checking ones, so
the volume of fake news tweets is larger than that of fact
checking ones by approximately one order of magnitude.
While both time series display significant fluctuations, the
presence of aligned peaks (Nov 16) and valleys (Nov 2) sug-
gests the presence of cross-correlated activity. To better
understand this, we perform a lagged cross-correlation anal-
ysis, which measures the similarity between two time series
signals as a function of the lag.
Fig. 2 shows the results of the cross correlation analysis,
with lags ranging from −48 hours to +48 hours. A higher
correlation at a negative lag indicates that the sharing of
fake news precedes that of fact checking. To eliminate circa-
dian fluctuations, we use a simple moving average method
with centered window of size equal to 24 hours. The results
suggest that, in the limited number of examples at our dis-
posal, there is a characteristic time lag between fake news
and fact checking of approximately 13 hours. Because the
moving average cleaning could only remove circadian fluc-
tuations, we do not exclude the presence of correlations at
larger lags (e.g., weekly).
While this cross-correlation is suggestive of a temporal
relation between misinformation and fact-checking, it is im-
portant to understand that it is based on aggregate data.
We selected a subset of URLs from both data sets to see if
these correlations also hold at the level of individual events.
We followed two strategies: (1) we selected a single URL
from our pool of fake news stories and a matching URL
from that of fact-checking stories; (2) we considered a small
set of keywords and used them to perform pattern matching
on the lists of URLs.
Table 2 displays the two URLs (A1, A2) used in the first
strategy. The reported story focuses on the current Syr-
ian conflict, and contains several inaccuracies that were de-
bunked in a piece by Snopes.com. For the second strategy,
−40−2002040Lag (hours)0.000.050.100.150.200.250.300.350.40rNovDecJan2016103104105Number of tweetsFake newsFact checkingTable 2: A1: An example of inaccurate news story. A2: Corresponding fact checking page. B1: News articles
reporting inaccurate information about the death of actor Alan Rickman. B2: Corresponding fact-checking
pages.
A1
A2
B1
www.infowars.com/white-house-gave-isis-45-minute-warning-before-bombing-oil-tankers/
www.snopes.com/2015/11/23/obama-dropped-leaflets-warning-isis-airstrikes/
en.mediamass.net/people/alan-rickman/deathhoax.html
www.disclose.tv/forum/david-bowie-alan-rickman-death-hoax-100-staged-t108254.html
worldtruth.tv/david-bowie-and-alan-rickman-death-hoax-100-staged/
beforeitsnews.com/alternative/2016/01/
alan-rickman-the-curse-of-the-69-takes-another-victim-january-man-predicts-his-death-video-3277444.
html
beforeitsnews.com/celebrities/2016/01/
david-bowie-alan-rickman-death-hoax-100-staged-both-69-died-from-cancer-2474208.html
age-69.beforeitsnews.com/alternative/2016/01/
harry-potter-star-alan-rickman-dead-at-age-69-3277454.html
from-cancer.beforeitsnews.com/celebrities/2016/01/
david-bowie-alan-rickman-death-hoax-100-staged-both-69-died-from-cancer-2474208.html
B2
www.snopes.com/2016/01/14/alan-rickman-dies-at-69/
www.snopes.com/alan-rickman-potter-meme/
Figure 4: Daily volume of tweets for (a) A1 and A2 (cf. Table 2); (b) B1 and B2. Semi-log scale was used
for the plot.
we focused on a recent event: the death of famous actor
Alan Rickman on January 14, 2016. We used the keywords
'alan' and 'rickman' to match URLs from our database, and
found 15 matches (B1) among fake news sources and two
from fact-checking ones (B2). The fake news, in particu-
lar, were spreading the rumor that the actor had not died.
Fig. 4 plots the volume of tweets containing URLs from both
strategies. Despite low data volumes, the spikes of activity
and the successive decay show fairly strong alignment.
4.3 User Activity and URL Popularity
We measure the activity a of users by counting the num-
ber of tweets they posted, and the popularity of a given
story (either fake news or fact checking) by counting ei-
ther the total number n of times its URL was tweeted, or
the total number p of people who tweeted it. Fig. 5 shows
that these quantities display heavy-tailed, power-law distri-
butions P (x) ∼ x−γ. We estimated the power-law decay
exponents, obtaining the following results: for user activity
γfn
a = 2.3, γfc
a = 2.7; for URL popularity by tweets (tail fit
for n ≥ 200) γfn
n = 2.5; and for URL popularity
by users (tail fit for p ≥ 200) γfn
p = 2.5. These
observations suggest that fake news and fact checking have
p = 2.9, γfc
n = 2.7, γfc
similar popularity profiles, with fake news being spread by
accounts that, in some cases, can generate huge numbers of
tweets. While it is expected that active users are responsible
for producing a majority of news shares, the strong differ-
ence between fake news and fact checking deserves further
scrutiny.
In Twitter there are four types of content: original tweets,
retweets, quotes, and replies. In our data, original tweets and
retweets were the most common category (80–90%) while
quotes and replies correspond to only 10–20% of the total,
usually with slightly more replies than quotes. However, we
observe differences between fact checking and misinforma-
tion tweets. The first is that there are more replies and
quotes among fact checking tweets (> 20%) than misinfor-
mation (≈ 10%), suggesting that fact checking is a more
conversational task.
The second difference has to do with how content genera-
tion is shared among the top active users and the remaining
user base. To investigate this difference, we select for both
fake news and fact checking the tweets generated by the top
active users, which we define as the 1% most active user by
number of tweets. In Fig. 6 we plot the ratio ρ between origi-
nal tweets and retweets for all users and top active ones. For
DecJan2016252330071421280411180100101102103104Frequency of URL occurrence(a)A1, fake newsA2, fact checking13Jan2016231415161718192021220100101102103104Frequency of URL occurrence(b)B1, fake newsB2, fact checkingFigure 5: Complementary cumulative distribution function (CCDF) of (a) user activity a (tweets per user)
(b) URL popularity n (tweets per URL) and (c) URL popularity p (users per URL).
active accounts, and grass-roots responses that spread fact
checking information several hours later.
In the future we plan to study the active spreaders of
fake news to see if they are likely social bots [17, 34]. We
will also expand our analysis to a larger set of news stories
and investigate how the lag between misinformation and fact
checks varies for different types of news.
Acknowledgments
CS was supported by the China Scholarship Council while
visiting the Center for Complex Networks and Systems Re-
search at the Indiana University School of Informatics and
Computing. GLC acknowledges support from the Indiana
University Network Science Institute (iuni.iu.edu) and from
the Swiss National Science Foundation (PBTIP2–142353).
This work was supported in part by the NSF (award CCF-
1101743) and the J.S. McDonnell Foundation.
6. REFERENCES
[1] A. Anagnostopoulos, A. Bessi, G. Caldarelli,
M. Del Vicario, F. Petroni, A. Scala, F. Zollo, and
W. Quattrociocchi. Viral misinformation: the role of
homophily and polarization. arXiv preprint
arXiv:1411.2893, 2014.
[2] M. Anderson and A. Caumont. How social media is
reshaping news.
http://www.pewresearch.org/fact-tank/2014/09/
24/how-social-media-is-reshaping-news/, 2014.
[Online; accessed December 2015].
[3] E. Bakshy, S. Messing, and L. A. Adamic. Exposure to
ideologically diverse news and opinion on facebook.
Science, 348(6239):1130–1132, 2015.
[4] Y. Benkler. The wealth of networks: How social
production transforms markets and freedom. Yale
University Press, 2006.
[5] T. Berners-Lee, W. Hall, J. Hendler, N. Shadbolt, and
D. J. Weitzner. Creating a science of the web. Science,
313(5788):769–771, 2006.
[6] C. Boididou, S. Papadopoulos, Y. Kompatsiaris,
S. Schifferes, and N. Newman. Challenges of
computational verification in social multimedia. In
Proceedings of the 23rd International Conference on
World Wide Web, WWW '14 Companion, pages
743–748, 2014.
Figure 6: Ratio of original tweets to retweets for all
vs. top active users.
all users, the ratio is similar; there are more retweets than
original tweets. This is also the case for the top spreaders of
fact checking. However, for top spreaders of fake news, this
ratio is much higher: these users do not retweet as much but
post many original messages promoting the misinformation.
Taken together, these observations strongly suggest that
rumor-mongering is dominated by few very active accounts
that bear the brunt of the promotion and spreading of mis-
information, whereas the propagation of fact checking is a
more distributed, grass-roots activity.
5. CONCLUSIONS & FUTURE WORK
Social media provide excellent examples of marketplaces
of attention where different memes vie for the limited time
of users [10]. A scientific understanding of the dynamics of
the Web is increasingly critical [5], and the dynamics of on-
line news consumption exemplify this need, as the risk of
massive uncontrolled misinformation grows. Our upcoming
Hoaxy platform for the automatic tracking of online misin-
formation may provide an important tool for the study of
these phenomena. Our preliminary results suggest an inter-
esting interplay between fake news promoted by few very
100101102103104a10-610-510-410-310-210-1100Pr©A¸aªa100101102103104n10-510-410-310-210-1100Pr©N¸nªbFake newsFact checking100101102103p10-510-410-310-210-1100Pr©P¸pªcFake newsFact checking0.00.51.01.52.0½AllTop[7] A. M. Buttenheim, K. Sethuraman, S. B. Omer, A. L.
Hanlon, M. Z. Levy, and D. Salmon. {MMR}
vaccination status of children exempted from
school-entry immunization mandates. Vaccine,
33(46):6250 – 6256, 2015.
[8] C. Carvalho, N. Klagge, and E. Moench. The
persistent effects of a false news shock. Journal of
Empirical Finance, 18(4):597 – 615, 2011.
[9] C. Castillo, M. Mendoza, and B. Poblete. Information
credibility on Twitter. In Proceedings of the 20th
International Conference on World Wide Web, page
675, 2011.
[10] G. L. Ciampaglia, A. Flammini, and F. Menczer. The
production of information in the attention economy.
Scientific Reports, 5:9452, 2015.
[11] G. L. Ciampaglia, P. Shiralkar, L. M. Rocha,
J. Bollen, F. Menczer, and A. Flammini.
Computational fact checking from knowledge
networks. PLoS ONE, 10(6):e0128193, 06 2015.
[12] M. Conover, J. Ratkiewicz, M. Francisco,
B. Gon¸calves, A. Flammini, and F. Menczer. Political
polarization on Twitter. In Proc. 5th International
AAAI Conference on Weblogs and Social Media
(ICWSM), 2011.
[13] M. Del Vicario, A. Bessi, F. Zollo, F. Petroni,
A. Scala, G. Caldarelli, H. E. Stanley, and
W. Quattrociocchi. The spreading of misinformation
online. Proceedings of the National Academy of
Sciences, 113(3):554–559, 2016.
[23] T. Lauricella, C. S. Stewart, and S. Ovide. Twitter
hoax sparks swift stock swoon. The Wall Street
Journal, 23, 2013.
[24] J. Lehmann, C. Castillo, M. Lalmas, and
E. Zuckerman. Finding news curators in twitter. In
Proceedings of the 22nd International Conference on
World Wide Web, WWW '13 Companion, pages
863–870, 2013.
[25] M. McPherson, L. Smith-Lovin, and J. M. Cook.
Birds of a feather: Homophily in social networks.
Annual Review of Sociology, 27(1):415–444, 2001.
[26] P. T. Metaxas, S. Finn, and E. Mustafaraj. Using
twittertrails.com to investigate rumor propagation. In
Proceedings of the 18th ACM Conference Companion
on Computer Supported Cooperative Work & Social
Computing, CSCW'15 Companion, pages 69–72, 2015.
[27] D. Mocanu, L. Rossi, Q. Zhang, M. Karsai, and
W. Quattrociocchi. Collective attention in the age of
(mis)information. Computers in Human Behavior, 51,
Part B:1198–1204, 2015.
[28] D. Nikolov, D. Fregolente, A. Flammini, and
F. Menczer. Measuring online social bubbles. PeerJ
Computer Science, 1:e38, 2015.
[29] B. Nyhan, J. Reifler, and P. A. Ubel. The hazards of
correcting myths about health care reform. Medical
Care, 51(2):127–132, 2013.
[30] A. Perrin. Social media usage: 2005-2015.
http://www.pewinternet.org/2015/10/08/2015/
Social-Networking-Usage-2005-2015/.
[14] Z. Dezso, E. Almaas, A. Luk´acs, B. R´acz, I. Szakad´at,
[31] J. Ratkiewicz, M. Conover, M. Meiss, B. Gon¸calves,
and A.-L. Barab´asi. Dynamics of information access
on the web. Phys. Rev. E, 73:066132, Jun 2006.
[15] N. Diakopoulos, M. De Choudhury, and M. Naaman.
Finding and assessing social media information
sources in the context of journalism. In Proceedings of
the SIGCHI Conference on Human Factors in
Computing Systems, CHI '12, pages 2451–2460, 2012.
[16] Facebook Newsroom. Company info.
https://web.archive.org/web/20151222043012/
http://newsroom.fb.com/company-info/. Online;
accessed December 2015.
[17] E. Ferrara, O. Varol, C. Davis, F. Menczer, and
A. Flammini. The rise of social bots. Comm. ACM,
Forthcoming. preprint arXiv:1407.5225.
A. Flammini, and F. Menczer. Detecting and tracking
political abuse in social media. In Proc. 5th
International AAAI Conference on Weblogs and Social
Media (ICWSM), 2011.
[32] J. Ratkiewicz, M. Conover, M. Meiss, B. Gon¸calves,
S. Patil, A. Flammini, and F. Menczer. Truthy:
Mapping the spread of astroturf in microblog streams.
In Proceedings of the 20th International Conference
Companion on World Wide Web, WWW '11, pages
249–252, 2011.
[33] P. Resnick, S. Carton, S. Park, Y. Shen, and N. Zeffer.
Rumorlens: A system for analyzing the impact of
rumors and corrections in social media. In Proc.
Computational Journalism Conference, 2014.
[18] A. Friggeri, L. A. Adamic, D. Eckles, and J. Cheng.
[34] V. Subrahmanian, A. Azaria, S. Durst, V. Kagan,
Rumor cascades. In Proc. Eighth Intl. AAAI Conf. on
Weblogs and Social Media (ICWSM), 2014.
[19] S. Galam. Modelling rumors: the no plane pentagon
A. Galstyan, K. Lerman, L. Zhu, E. Ferrara,
A. Flammini, F. Menczer, et al. The DARPA Twitter
Bot Challenge. arXiv preprint arXiv:1601.05140, 2016.
french hoax case. Physica A: Statistical Mechanics and
Its Applications, 320:571–580, 2003.
[35] D. Tapscott and A. D. Williams. Wikinomics: How
mass collaboration changes everything. Penguin, 2008.
[20] N. Hassan, A. Sultana, Y. Wu, G. Zhang, C. Li,
[36] E. Wemple. Hurricane Sandy: NYSE NOT flooded!
J. Yang, and C. Yu. Data in, fact out: Automated
monitoring of facts by factwatcher. Proc. VLDB
Endow., 7(13):1557–1560, Aug. 2014.
[21] A. M. Kaplan and M. Haenlein. Users of the world,
unite! The challenges and opportunities of Social
Media. Business Horizons, 53(1):59 – 68, 2010.
[22] A. Kata. Anti-vaccine activists, web 2.0, and the
postmodern paradigm–an overview of tactics and
tropes used online by the anti-vaccination movement.
Vaccine, 30(25):3778–3789, 2012.
http://wapo.st/1QiG16A, October 2012. Last
accessed 2016-02-04.
[37] L. Weng, A. Flammini, A. Vespignani, and
F. Menczer. Competition among memes in a world
with limited attention. Scientific Reports, 2, 2012.
|
1501.04579 | 2 | 1501 | 2015-04-15T20:55:26 | Stability of Influence Maximization | [
"cs.SI"
] | The present article serves as an erratum to our paper of the same title, which was presented and published in the KDD 2014 conference. In that article, we claimed falsely that the objective function defined in Section 1.4 is non-monotone submodular. We are deeply indebted to Debmalya Mandal, Jean Pouget-Abadie and Yaron Singer for bringing to our attention a counter-example to that claim.
Subsequent to becoming aware of the counter-example, we have shown that the objective function is in fact NP-hard to approximate to within a factor of $O(n^{1-\epsilon})$ for any $\epsilon > 0$.
In an attempt to fix the record, the present article combines the problem motivation, models, and experimental results sections from the original incorrect article with the new hardness result. We would like readers to only cite and use this version (which will remain an unpublished note) instead of the incorrect conference version. | cs.SI | cs | Stability of Influence Maximization
Xinran He ∗
David Kempe †
April 17, 2015
Abstract
The present article serves as an erratum to our paper of the same title, which was presented and
published in the KDD 2014 conference. In that article, we claimed falsely that the objective function
defined in Section 1.4 is non-monotone submodular. We are deeply indebted to Debmalya Mandal, Jean
Pouget-Abadie and Yaron Singer for bringing to our attention a counter-example to that claim.
in fact NP-hard to approximate to within a factor of O(n1−) for any > 0.
Subsequent to becoming aware of the counter-example, we have shown that the objective function is
In an attempt to fix the record, the present article combines the problem motivation, models, and
experimental results sections from the original incorrect article with the new hardness result. We would
like readers to only cite and use this version (which will remain an unpublished note) instead of the
incorrect conference version.
5
1
0
2
r
p
A
5
1
]
I
S
.
s
c
[
2
v
9
7
5
4
0
.
1
0
5
1
:
v
i
X
r
a
∗Department of Computer Science, University of Southern California; [email protected]
†Department of Computer Science, University of Southern California; [email protected]
1
1
Introduction
The processes and dynamics by which information and behaviors spread through social networks have long
interested scientists within many areas. Understanding such processes has the potential to shed light on hu-
man social structure, and to impact the strategies used to promote behaviors or products. While the interest
in the subject is long-standing, recent increased availability of social network and information diffusion data
(through sites such as Facebook, Twitter, and LinkedIn) has raised the prospect of applying social network
analysis at a large scale to positive effect. Consequently, the resulting algorithmic questions have received
widespread interest in the computer science community.
Among the broad algorithmic domains, Influence Maximization has been repeatedly held up as having
the potential to be of societal and financial value. The high-level hope is that based on observed data — such
as social network information and past behavior — an algorithm could infer which individuals are likely to
influence which others. This information could in turn be used to effect desired behavior, such as refraining
from smoking, using superior crops, or purchasing a product. In the latter case, the goal of effecting desired
behavior is usually termed viral marketing.
Consequently, both the problem of inferring the influence between individuals [11, 12, 13, 14, 23] and that
of maximizing the spread of a desired behavior have been studied extensively. For the Influence Maximization
problem, a large number of models have been proposed, along with many heuristics with and without
approximation guarantees [5, 8, 9, 17, 18, 20, 22, 25, 26]. (See the monograph [7] for a recent overview of
work in the area.)
However, one crucial aspect of the problem has — with very few exceptions discussed in Section 1.6 —
gone largely unstudied. Contrary to many other algorithmic domains, noise in social network data is not
an exception, but the norm. Indeed, one could argue that the very notion of a “social link” is not properly
defined in the first place, so that any representation of a social network is only an approximation of reality.
This issue is much more pronounced for a goal such as Influence Maximization. Here, the required data
include, for every pair (u, v) of individuals, a numerical value for the strength of influence from u to v and
vice versa. This influence strength will naturally depend on context (e.g., what exact product or behavior
is being spread); furthermore, it cannot be observed directly, and must therefore be inferred from observed
behavior or individuals’ reports; all of these are inherently very noisy.
When the inferred influence strength parameters differ from the actual ground truth, even an optimal
algorithm is bound to return suboptimal solutions, for it will optimize the wrong objective function: a
solution that appears good with respect to the incorrect parameters may be bad with respect to the actual
ones. If relatively small errors in the inferred parameters could lead to highly suboptimal solutions, this
would cast serious doubts on the practical viability of algorithmic influence maximization. Therefore, in the
present paper, we begin an in-depth study of the effect of noise on the performance of Influence Maximization
algorithms.
1.1 The Independent Cascade Model
We study this question under two widely adopted models for influence diffusion [17]: the Independent Cascade
(IC) Model and the Linear Threshold (LT) Model. Both of these models fit in the following framework: The
algorithm selects a seed set A0 of k nodes, which begin active (having adopted the behavior). Starting
with A0, the process proceeds in discrete time steps: in each time step, according to a probabilistic process,
additional nodes may become active based on the influence from their neighbors. Active nodes never become
inactive, and the process terminates when no new nodes become active in a time step. The goal is to maximize
the expected number of active nodes when the process terminates; this expected number is denoted by σ(A0).
To illustrate the questions and approaches, we describe the IC model in this section. (A formal description
of the LT model and general definitions of all concepts are given in Section 2.) Under the IC model, the
probabilistic process is particularly simple and intuitive. When a node u becomes active in step t, it attempts
to activate all currently inactive neighbors in step t + 1. For each neighbor v, it succeeds with a known
probability pu,v. If it succeeds, v becomes active; otherwise, v remains inactive. Once u has made all these
attempts, it does not get to make further activation attempts at later times.
It was shown in [17] that
2
the set of nodes active at the end can be characterized alternatively as follows: for each ordered pair (u, v)
independently, insert the directed edge (u, v) with probability pu,v. Then, the active nodes are exactly the
ones reachable via directed paths from A0.
1.2 Can Instability Occur?
Suppose that we have inferred all parameters pu,v, but are concerned that they may be slightly off: in reality,
u,v ≈ pu,v. Are there instances in which a seed set A0 that is very influential
the influence probabilities are p(cid:48)
with respect to the pu,v may be much less influential with respect to the p(cid:48)
u,v? It is natural to suspect that
this might not occur: when the objective function σ varies sufficiently smoothly with the input parameters
(e.g., for linear objectives), small changes in the parameters only lead to small changes in the objective value;
therefore, optimizing with respect to a perturbed input still leads to a near-optimal solution.
However, the objective σ of Influence Maximization does not depend on the parameters in a smooth way.
To illustrate the issues at play, consider the following instance of the IC model. The social network consists
of two disjoint bidirected cliques Kn, and pu,v = p for all u, v in the same clique; in other words, for each
directed edge, the same activation probability p is observed. The algorithm gets to select exactly k = 1 node.
Notice that because all nodes look the same, any algorithm essentially chooses an arbitrary node, which may
as well be from Clique 1.
Let p = 1/n be the sharp threshold for the emergence of a giant component in the Erdos-R´enyi Random
Graph G(n, p). It is well known [4, 10] that the largest connected component of G(n, p) has size O(log n) for
any p ≤ p − Ω(1/n), and size Ω(n) for any p ≥ p + Ω(1/n). Thus, if unbeknownst to the algorithm, all true
activation probabilities in Clique 1 are p ≤ p − Ω(1/n), while all true activation probabilities in Clique 2
are p ≥ p + Ω(1/n), the algorithm only activates O(log n) nodes in expectation, while it could have reached
Ω(n) nodes by choosing Clique 2. Hence, small adversarial perturbations to the input parameters can lead
to highly suboptimal solutions from any algorithm.1
1.3 Diagnosing Instability
The example of two cliques shows that there exist unstable instances, in which an optimal solution to the
observed parameters is highly suboptimal when the observed parameters are slightly perturbed compared
to the true parameters. Of course, not every instance of Influence Maximization is unstable: for instance,
when the probability p in the Two-Clique instance is bounded away from the critical threshold of G(n, p),
the objective function varies much more smoothly with p. This motivates the following algorithmic ques-
tion, which is the main focus of our paper: Given an instance of Influence Maximization, can we diagnose
efficiently whether it is stable or unstable?
To make this question precise, we formulate a model of perturbations. We assume that for each edge
(u, v), in addition to the observed activation probability pu,v, we are given an interval Iu,v (cid:51) pu,v of values
that the actual probability p(cid:48)
u,v are chosen from the intervals Iu,v by
an adversary; they induce an objective function σ(cid:48) which the algorithm would like to maximize, while the
observed values induce a different objective function σ which the algorithm actually has access to.
An instance (pu,v, Iu,v)u,v is stable if σ(S) − σ(cid:48)(S) is small for all objective functions σ(cid:48) induced by
legal probability settings, and for all seed sets S of size k. Here, “small” is defined relative to the objective
function value σ(A∗
u,v could assume. The true values p(cid:48)
0) of the optimum set.
When σ(S) − σ(cid:48)(S) is small compared to σ(A∗
0) for all sets S, a user can have confidence that his
optimization result will provide decent performance guarantees even if his input was perturbed. The converse
1The example reveals a close connection between the stability of an IC instance and the question whether a uniform
activation probability p lies close to the edge percolation threshold of the underlying graph. Characterizing the percolation
threshold of families of graphs has been a notoriously hard problem. Successful characterizations have only been obtained for
very few specific classes (such as d-dimensional grids [19] and d-regular expander graphs [2]). Therefore, it is unlikely that a
clean characterization of stable and unstable instances can be obtained. The connection to percolation also reveals that the
instability was not an artifact of having high node degrees. By the result of Alon et al. [2], the same behavior will be obtained
if both components are d-regular expander graphs, since such graphs also have a sharp percolation threshold.
3
is of course not necessarily true: even in unstable instances, a solution that was optimal for the observed
input may still be very good for the true input parameters.
1.4 Influence Difference Maximization
Trying to determine whether there are a function σ(cid:48) and a set S for which σ(S) − σ(cid:48)(S) is large motivates
the following optimization problem: Maximize σ(S) − σ(cid:48)(S) over all feasible functions σ(cid:48) and all sets S.
For any given set S, the objective is maximized either by making all probabilities (and thus σ(cid:48)(S)) as small
as possible, or by making all probabilities (and thus σ(cid:48)(S)) as large as possible.2 We denote the resulting
two objective functions by σ− and σ+, respectively. The following definition then captures the optimization
goal.
Definition 1 (Influence Difference Maximization) Given two instances with probabilities pu,v ≥ p(cid:48)
for all u, v, let σ and σ(cid:48) be their respective influence functions. Find a set S of size k maximizing δ(S) :=
σ(S) − σ(cid:48)(S).
u,v
In this generality, the Influence Difference Maximization problem subsumes the Influence Maximization
problem, by setting p(cid:48)
u,v ≡ 0 (and thus also σ(cid:48) ≡ 0).
While Influence Difference Maximization subsumes Influence Maximization, whose objective function is
monotone and submodular, the objective function of Influence Difference Maximization is in general neither.
To see non-monotonicity, notice that δ(∅) = δ(V ) = 0, while generally δ(S) > 0 for some sets S.
The function is also not in general submodular, a fact brought to our attention by Debmalya Mandal,
Jean Pouget-Abadie and Yaron Singer, and in contrast to the main result claimed in a prior version of the
present article. The following example shows non-submodularity for both the IC and LT Models.
The graph has four nodes V = {u, v, x, y} and three edges (u, v), (v, x), (x, y). The edges (v, x) and
(x, y) are known to have an activation probability of 1, while the edge (u, v) has an adversarially chosen
activation probability in the interval [0, 1]. With S = {u} and T = {u, x}, we obtain that δ(S + v) − δ(S) =
∅ − {v, x, y} = −3, while δ(T + v) − δ(T ) = ∅ − {v} = −1, which violates submodularity.
In fact, we establish a very strong hardness result here, in the form of the following theorem, whose proof
is given in Section 3.
Theorem 1 Under the Independent Cascade Model, the Influence Difference Maximization objective func-
tion δ(S) cannot be approximated better than n1− for any > 0 unless NP ⊆ ZPP.
1.5 Experiments
Next, we investigate how pervasive instabilities are in real data. We evaluate frequently used synthetic
models (2D grids, random regular graphs, small-world networks, and preferential attachment graphs) and
real-world data sets (computer science theory collaborations and retweets about the Haiti earthquake). We
focus on the Independent Cascade Model, and vary the influence strengths over a broad range of commonly
studied values. We consider different relative perturbation levels ∆, ranging from 1% to 50%. The adversary
can thus choose the actual activation probability to lie in the interval [(1 − ∆)pu,v, (1 + ∆)pu,v].
To calculate a value for the maximum possible Influence Difference, we use the random greedy algorithm
of Buchbinder et al. [6]. This choice of algorithm was motivated by the false belief that the objective function
is submodular, in which case the algorithm would have provided a 1/e approximation. Notice, however, that
the algorithm can only underestimate the maximum possible objective function value. Thus, when the
Random Greedy algorithm finds a set with large influence difference, it suggests that the misestimations due
to parameter misestimates may drown out the objective value, rendering Influence Maximization outputs
very spurious. On the other hand, when the objective value obtained by the Random Greedy algorithm is
small, no positive guarantees can be provided.
2This observation relies crucially on the fact that each pu,v can independently take on any value in Iu,v. If the adversary
were constrained by the total absolute deviation or sum of squares of deviations of parameters, this would no longer be the
case. This issue is discussed in Section 5.
4
Our experiments suggest that perturbations can have significantly different effects depending on the
network structure and observed values. As a general rule of thumb, perturbations above 20% relative to
the parameter values could significantly distort the optimum solution. For smaller errors (10% or less
relative error), the values obtained by the algorithm are fairly small; however, as cautioned above, the actual
deviations may still be large.
Since errors above 20% should be considered quite common for estimated social network parameters, our
results suggest that practitioners exercise care in evaluating the stability of their problem instances, and
treat the output of Influence Maximization algorithms with a healthy dose of skepticism.
1.6 Adversarial vs. Random Perturbations
One may question why we choose to study adversarial instead of random perturbations. This choice is for
three reasons:
Theoretical: Worst-case analysis provides stronger guarantees, as it is not based on particular assumptions
about the distribution of noise.
Practical: Most random noise models assume independence of noise across edges. However, we believe that
in practice, both the techniques used for inferring model parameters as well as the data sources they
are based on may well exhibit systematic bias, i.e., the noise will not be independent. For instance, a
particular subpopulation may systematically underreport the extent to which they seek others’ advice,
or may have fewer visible indicators (such as posts) revealing their behavior.
Modeling Interest: Perhaps most importantly, most natural random noise models do not add anything to
the IC and LT models. As an illustration, consider the random noise models studied in recent work by
Goyal, Bonchi and Lakshmanan [15] and Adiga et al. [1]. Goyal et al. assume that for each edge (u, v),
the value of pu,v is perturbed with uniformly random noise from a known interval. Adiga et al. assume
that each edge (u, v) that was observed to be present is actually absent with some probability , while
each edge that was not observed is actually present with probability ; in other words, each edge’s
presence is independently flipped with probability .
The standard Independent Cascade Model subsumes both models straightforwardly. Suppose that a
decision is to be made about whether u activates v. In the model of Goyal et al., we can first draw
the actual (perturbed) value of p(cid:48)
u,v from its known distribution; subsequently, u activates v with
probability p(cid:48)
u,v; in total, u activates v with probability E(cid:2)p(cid:48)
(cid:3). Thus, we obtain an instance of the
(cid:3). In the special case when the
IC model in which all edge probabilities pu,v are replaced by E(cid:2)p(cid:48)
u,v
u,v
noise has mean 0, this expectation is exactly equal to pu,v, which explains why Goyal et al. observed
the noise to not affect the outcome at all.
In the model of Adiga et al., we first determine whether the edge is actually present; when it was
observed present, this happens with probability 1 − ; otherwise with probability . Subsequently, the
activation succeeds with probability p. ([1] assumed uniform probabilities). Thus, the model is an
instance of the IC model in which the activation probabilities on all observed edges are p(1 − ), while
those on unobserved edges are p. This reduction explains the theoretical results obtained by Adiga et
al.
More fundamentally, practically all “natural” random processes that independently affect edges of the
graph can be “absorbed into” the activation probabilities themselves; as a result, random noise does
not at all play the result of actual noise.
2 Models and Preliminaries
The social network is modeled by a directed graph G = (V, E) on n nodes. All parameters for non-existing
edges are assumed to be 0. We first describe models of influence diffusion, and then models of parameter
perturbation.
5
2.1 Influence Diffusion Models
Most of the models for Influence Maximization have been based on the Independent Cascade Model (see
Section 1.1) and Linear Threshold Model studied in [17] and their generalizations. Like the Independent
Cascade Model, the Linear Threshold Model also proceeds in discrete rounds. Each edge (u, v) is equipped
u→v cu,v ≤ 1 for all nodes v. (By u → v, we denote that there is a
directed edge (u, v).) Each node v initially draws a threshold ψv independently and uniformly at random
from [0, 1]. A set A0 of nodes is activated at time 0, and we use At to denote the set of nodes active at time
u∈At−1,u→v cu,v ≥ ψv. If so, v becomes active at time t,
with a weight cu,v ∈ [0, 1], satisfying(cid:80)
t. In each discrete round t, each node v checks if(cid:80)
and remains active subsequently.
Any instance of the Influence Maximization problem is characterized by its parameters. For the LT model,
the parameters are the n2 edge weights cu,v for all edges (u, v). Similarly, for the IC model, the parameters
are the edge activation probabilities pu,v for all edges (u, v). To unify notation, we write θ = (θu,v)(u,v)∈E
for the vector of all parameter values, where θu,v could be either cu,v or pu,v.
Both the IC and LT model define random processes that continue until the diffusion process quiesces,
i.e., no new activations occur. Let τ ≤ n be the (random) time at which this happens. It is clear that τ ≤ n
always, since at least one more node becomes active in each round. We denote the stochastic process by
t=0, with Mod ∈ {IC, LT} denoting the model. The final set of active nodes is Aτ . We can
P Mod
now formally define the Influence Maximization problem:
(A0) = (At)τ
θ
Definition 2 (Influence Maximization) The Influence Maximization problem consists of maximizing the
objective σ(A0) := E[Aτ] (i.e., the expected number of active nodes in the end3), subject to a cardinality
constraint A0 ≤ k.
The key insight behind most prior work on algorithmic Influence Maximization is that the objective
function σ(S) is a monotone and submodular function of S. This was proved for the IC and LT models in
[17], and subsequently for a generalization called Generalized Threshold Model (proposed in [17]) by Mossel
and Roch [22].
2.2 Models for Perturbations
resulting activation functions are always submodular, we require that (cid:80)
To model adversarial input perturbations, we assume that for each of the edges (u, v), we are given an
interval Iu,v = [(cid:96)u,v, ru,v] ⊆ [0, 1] with θu,v ∈ Iu,v. For the Linear Threshold Model, to ensure that the
u→v ru,v ≤ 1 for all nodes v. We
write Θ = ×(u,v)∈EIu,v for the set of all allowable parameter settings. The adversary must guarantee that
the ground truth parameter values satisfy θ(cid:48) ∈ Θ; subject to this requirement, the adversary can choose the
actual parameter values arbitrarily.
Together, the parameter values θ determine an instance of the Influence Maximization problem. We will
usually be explicit about indicating the dependence of the objective function on the parameter setting. We
write σθ for the objective function obtained with parameter values θ, and only omit the parameters when
θ ∈ argmaxS σθ(S)
they are clear from the context. For a given setting of parameters, we will denote by A∗
a solution maximizing the expected influence under parameter values θ.
2.3 Influence Difference Maximization
In order to capture to what extent adversarial changes in the parameters can lead to misestimates of any
set’s influence, we are interested in the quantity
3Our results carry over unchanged if we assign each node a non-negative value rv, and the goal is to maximize (cid:80)
S
(1)
v∈Aτ
rv.
max
max
θ(cid:48)∈Θ
σθ(S) − σθ(cid:48) (S),
We focus on the case of uniform values for notational convenience only.
6
where θ denotes the observed parameter values. For two parameter settings θ, θ(cid:48) with θ ≥ θ(cid:48) coordinate-
wise, it is not difficult to show using a simple coupling argument that σθ(S) ≥ σθ(cid:48) (S) for all S. Therefore,
for any fixed set S, the maximum is attained either by making θ(cid:48) as large as possible or as small as possible.
Hence, solving the following problem is sufficient to maximize (1).
Definition 3 Given an influence model and two parameter settings θ, θ(cid:48) with θ ≥ θ(cid:48) coordinate-wise, define
Given the set size k, the Influence Difference Maximization (IDM) problem is defined as follows:
δθ,θ(cid:48) (S) = σθ(S) − σθ(cid:48) (S).
Maximize
subject to
δθ,θ(cid:48)(S)
S = k.
(2)
(3)
3 Approximation hardness
In this section, we prove Theorem 1.
Proof of Theorem 1. We establish the approximation hardness of Influence Difference Maximization
without any constraint on the cardinality of the seed set A0. From this version, the hardness of the con-
strained problem is inferred easily as follows:
if any better approximation could be obtained for the con-
strained problem, one could simply enumerate over all possible values of k from 1 to n, and retain the best
solution, which would yield the same approximation guarantee for the unconstrained problem.
i ∈ V (cid:48)(cid:48). The edge set is E(cid:48) ∪ E(cid:48)(cid:48), where E(cid:48) = {(v(cid:48)
i, v(cid:48)(cid:48)
j ) (vi, vj) ∈ E}, and E(cid:48)(cid:48) = {(v(cid:48)
i, v(cid:48)(cid:48)
First, let S be an independent set in G. Consider the set S(cid:48) = {v(cid:48)
We give an approximation-preserving reduction from the Maximum Independent Set problem to the
Influence Difference Maximization problem. It is well known that Maximum Independent Set cannot be
approximated better than O(n1−) for any > 0 unless NP ⊆ ZPP [16].
Let G = (V, E) be an instance of the Maximum Independent Set problem, with V = n. We construct
from G a directed bipartite graph G(cid:48) with vertex set V (cid:48) ∪ V (cid:48)(cid:48). For each node vi ∈ V , there are nodes v(cid:48)
i ∈ V (cid:48)
i ) vi ∈ V }.
and v(cid:48)(cid:48)
All edges of E(cid:48) are known to have an activation probability of 1, while all edges of E(cid:48)(cid:48) have an activation
probability from the interval [0, 1].
The difference is maximized by making all probabilities as large for one function (meaning that all edges
in E(cid:48) ∪ E(cid:48)(cid:48) are present deterministically), while making them as small as possible for the other (meaning
that exactly the edges in E(cid:48) are present).
i with vi ∈ S is
i in G(cid:48), but not in (V (cid:48) ∪ V (cid:48)(cid:48), E(cid:48)), because S is independent. Hence, the
reachable from the corresponding v(cid:48)
objective function value obtained in Influence Difference Maximization is at least S.
Conversely, consider an optimal solution S(cid:48) to the Influence Difference Maximization problem. Without
loss of generality, we may assume that S(cid:48) ⊆ V (cid:48): any node v(cid:48)(cid:48)
j ∈ V (cid:48)(cid:48) can be removed from S(cid:48) without lowering
i ∈ S(cid:48)} is not independent, and that (vi, vj) ∈ E for
the objective value. Assume that S := {vi ∈ V v(cid:48)
vi, vj ∈ S. Then, removing v(cid:48)
j from S(cid:48) cannot lower the Influence Difference Maximization objective value
of S(cid:48): all of v(cid:48)
j also
does not contribute, as it is reachable using E(cid:48) from v(cid:48)
i. Thus, any node with a neighbor in S can be removed
from S(cid:48), meaning that S is without loss of generality independent in G.
At this point, all the neighbors of S(cid:48) contribute 0 to the Influence Difference Maximization objective
function (because they are reachable under E(cid:48) already), and the objective value of S(cid:48) is exactly S(cid:48) = S.
j’s neighbors in V (cid:48)(cid:48) contribute 0, as they are reachable using E(cid:48) already; furthermore, v(cid:48)(cid:48)
i vi ∈ S}. Each node v(cid:48)(cid:48)
4 Experiments
While we saw in Section 1.2 that examples highly susceptible (with errors of magnitude Ω(n)) to small
perturbations exist, the goal of this section is to evaluate experimentally how widespread this behavior is for
realistic social networks.
7
4.1 Experimental Setting
We carry out experiments under the Independent Cascade Model, for six classes of graphs — four synthetic
and two real-world. In each case, the model/data give us a simple graph or multigraph. Multigraphs are
converted to simple graphs by collapsing parallel edges to a single edge with weight ce equal to the number of
parallel edges; for simple graphs, all weights are ce = 1. The observed probabilities for edges are pe = ce · p;
across experiments, we vary the base probability p to take on the values {0.01, 0.02, 0.05, 0.1}. The resulting
parameter vector is denoted by θ.
The uncertainty interval for e is Ie = [(1 − ∆)pe, (1 + ∆)pe]; here, ∆ is an uncertainty parameter for the
estimation, which takes on the values {1%, 5%, 10%, 20%, 50%} in our experiments. The parameter vectors
θ+ and θ− describe the settings in which all parameters are as large (as small, respectively) as possible.
4.2 Network Data
We run experiments on four synthetic networks and two real social networks. Synthetic networks provide a
controlled environment in which to compare observed behavior to expectations, while real social networks
may give us indications about the prevalence of vulnerability to perturbations in real networks that have
been studied in the past.
Synthetic Networks. We generate synthetic networks according to four widely used network models.
In all cases, we generate undirected networks with 400 nodes. The network models are: (1) the 2-dimensional
grid, (2) random regular graphs, (3) the Watts-Strogatz Small-World (SW) Model [27] on a ring with each
node connecting to the 5 closest nodes on each side initially, and a rewiring probability of 0.1. (4) The
Barab´asi-Albert Preferential Attachment (PA) Model [3] with 5 outgoing edges per node. For all synthetic
networks, we select k = 20 seed nodes.
Real Networks. We consider two real networks to evaluate the susceptibility of practical networks: one
(STOCFOCS ) is a co-authorship network of theoretical CS papers; the other (Haiti ) is a Retweet network.
The co-authorship network, STOCFOCS, is a multigraph extracted from published papers in the con-
ferences STOC and FOCS from 1964–2001. Each node in the network is a researcher with at least one
publication in one of the conferences. For each multi-author paper, we add a complete undirected graph
among the authors. As mentioned above, parallel edges are then compressed into a single edge with corre-
sponding weight. The resulting graph has 1768 nodes and 10024 edges. Due to its larger size, we select 50
seed nodes.
The Haiti network is extracted from tweets of 274 users on the topic Haiti Earthquake in Twitter. For each
tweet of user u that was retweeted by v, we add a directed edge (u, v). We obtain a directed multigraph;
after contracting parallel edges, the directed graph has 383 weighted edges. For this network, due to its
smaller size, we select 20 seeds.
In all experiments, we work with uniform edge weights p, since — apart from edge multiplicities — we
have no evidence on the strength of connections. It is a promising direction for future in-depth experiments
to use influence strengths inferred from real-world cascade datasets by network inference methods such as
[11, 14, 23].
4.3 Algorithms
Our experiments necessitate the solution of two algorithmic problems: Finding a set of size k of maximum
influence, and finding a set of size k maximizing the influence difference. The former is a well-studied problem,
with a monotone submodular objective function. We simply use the widely known 1 − 1/e approximation
algorithm due to Nemhauser et al. [24], which is best possible unless P=NP.
For the goal of Influence Difference Maximization, we established (in Section 3) that the objective function
is hard to approximate better than a factor O(n1−) for any > 0. For experimental purposes, we use the
Random Greedy algorithm of Buchbinder et al. [6], given as Algorithm 1 below. It is a natural generalization
of the simple greedy algorithm of Nemhauser et al.: Instead of picking the best single element to add in each
iteration, it first finds the set of the k individually best single elements (i.e., the elements which when added
8
to the current set give the largest, second-largest, third-largest, . . ., kth-largest gain). Then, it picks one of
these k elements uniformly at random and continues.
This particular choice of algorithm was motivated by an incorrect claim included in a prior version of
this work, namely, that the Influence Difference Maximization objective is (non-monotone) submodular.
For such functions, the Random Greedy algorithm guarantees at least an 0.266-approximation, and the
guarantee improves to nearly 1/e when k (cid:28) n. Furthermore, the Random Greedy algorithm is simpler and
more efficient than other algorithms with slightly superior approximation guarantees. We stress that these
guarantees are not obtained for our objective function, as submodularity does not hold.
Let Mi ⊆ V \ Si−1 be the subset of size k maximizing(cid:80)
Algorithm 1 Random Greedy Algorithm
1: Initialize: S0 ← ∅
2: for i = 1, . . . , k do
3:
4: Draw ui uniformly at random from Mi.
5:
6: end for
7: Return Sk
Let Si ← Si−1 ∪ {ui}.
g(Si−1 ∪ {u}) − g(Si−1).
u∈Mi
The running time of the Random Greedy Algorithm is O(kCV ), where C is the time required to estimate
g(S ∪ {u}) − g(S). In our case, the objective function is #P-hard to evaluate exactly [25, 9], but arbitrarily
close approximations can be obtained by Monte Carlo simulation. Since each simulation takes time O(V ),
if we run M = 2000 iterations of the Monte Carlo simulation in each iteration, the overall running time of
the algorithm is O(kMV 2).
A common technique for speeding up the greedy algorithm for maximizing a submodular function is the
CELF heuristic of Leskovec et al. [21]. When the objective function is submodular, the standard greedy
algorithm and CELF obtain the same result. However, when it is not, the results may be different.
In
the previous version of this article, we had used the CELF heuristic due to the incorrect belief that the
objective function was submodular. In this revised version, we instead report the results from rerunning
all the experiments without the use of the CELF heuristic. The single exception is the largest input, the
STOCFOCS network. (Here, the greedy algorithm without CELF did not finish in a reasonable amount
of time.) For all networks other than STOCFOCS, the results using CELF are not significantly different
from the reported results without the CELF optimization. For STOCFOCS, we instead report the result
including the CELF heuristic.
4.4 Results
In all our experiments, the results for the Grid and Small-World network are sufficiently similar that we
omit the results for grids here. As a first sanity check, we empirically computed maxS:S=1 δθ+,θ− (S) for
the complete graph on 200 nodes with Ie = [1/200 · (1 − ∆), 1/200 · (1 + ∆)] and k = 1. According to the
analysis in Section 1.2, we would expect extremely high instability. The results, shown in Table 1, confirm
this expectation.
σθ+
∆
50% 66.529
20% 23.961
10% 15.071
σθ−
1.955
4.253
6.204
Table 1: Instability for the clique K200.
Next, Figure 1 shows the (approximately) computed values maxS:S=k δθ+,θ− (S), and — for calibration
purposes — maxA0:A0=k σθ(A0) for all networks and parameter settings. Notice that the result is obtained
by running the Random Greedy algorithm without any approximation guarantee. However, as the algorithm’s
9
(a) Small World
(b) PA
(c) STOCFOCS
(d) Haiti
Figure 1: Comparison between Influence Difference Maximization and Influence Maximization
results for four different networks. (The result of STOCFOCS network is obtained with CELF
optimization.)
α = −20%
α = 0
α = 20%
Figure 2: Ratio between the computed values of Influence Difference Maximization and Influ-
ence Maximization under random regular graphs with different degree.
output provides a lower bound on the maximum influence difference, a large value suggests that Influence
Maximization could be unstable. On the other hand, small values do not guarantee that the instance is
stable, as the algorithm provides no approximation guarantee.
While individual networks vary somewhat in their susceptibility, the overall trend is that larger estimates
of baseline probabilities p make the instance more susceptible to noise, as do (obviously) larger uncertainty
parameters ∆. In particular, for ∆ ≥ 20%, the noise (after scaling) dominates the Influence Maximization
objective function value, meaning that optimization results should be used with care.
Next, we evaluate the dependence of the noise tolerance on the degrees of the graph, by experimenting
with random d-regular graphs whose degrees vary from 5 to 25. It is known that such graphs are expanders
with high probability, and hence have percolation thresholds of 1/d [2]. Accordingly, we set the base prob-
ability to (1 + α)/d with α ∈ {−20%, 0, 20%}. We use the same setting for uncertainty intervals as in the
previous experiments. Figure 2 shows the ratio between Influence Difference Maximization and Influence
, with α ∈ {−20%, 0, 20%}. It indicates that for random regular graphs,
Maximization, i.e.,
the degree does not appear to significantly affect stability, and that again, noise around 20% begins to pose
a significant challenge. Moreover, we observe that the ratio reaches its minimum when the edge activation
probability is exactly at the percolation threshold 1/d. This result is in line with percolation theory and also
the analysis of Adiga et al. [1].
θ+ ,θ− (S)
maxS δ
maxS σθ (S)
As a general takeaway message, for larger amounts of noise (even just a relative error of 20%) — which may
well occur in practice — a lot of caution is advised in using the results of algorithmic Influence Maximization.
10
5 Discussion
We began a study of the stability of Influence Maximization when the input data are adversarially noisy.
We showed that estimating the susceptibility of an instance to perturbations can be cast as an Influence
Difference Maximization problem. Unfortunately, the Influence Difference Maximization problem under the
Independent Cascade Model is as hard to approximate as the Independent Set problem. While we do not
at present have a comparable approximation hardness result for the Linear Threshold Model, we consider it
unlikely that the Influence Difference Maximization objective could be much better approximated for that
model.
We used the Random Greedy algorithm of Buchbinder et al. to gain an empirical understanding of the
prevalence of instability on several synthetic and real networks. The results suggest that 20% relative error
could lead to a significant risk of suboptimal outputs. Given the noise inherent in all estimates of social
network data, this suggests applying extreme caution before relying heavily on results of algorithmic Influence
Maximization.
The fact that our main theorem is negative (i.e., a strong approximation hardness result) is somewhat
disappointing, in that it rules out reliably categorizing data sets as stable or unstable. This suggests searching
for models which remain algorithmically tractable while capturing some notion of adversarially perturbed
inputs. The issue of noise in social network data will not disappear, and it is necessary to understand its
impact more fundamentally.
While we begin an investigation of how pervasive susceptibility to perturbations is in Influence Maxi-
mization data sets, our investigation is necessarily limited. Ground truth data are by definition impossible
to obtain, and even good and reliable inferred data sets of actual influence probabilities are currently not
available. The values we assigned for our experimental evaluation cover a wide range of parameter values
studied in past work, but the community does not appear to have answered the question whether these
ranges actually correspond to reality.
At an even more fundamental level, the models themselves have received surprisingly little thorough
experimental validation, despite having served as models of choice for hundreds of papers over the last decade.
In addition to verifying the susceptibility of models to parameter perturbations, it is thus a pressing task to
verify how susceptible the optimization problems are to incorrect models. The verification or falsification of
sociological models for collective behavior likely falls outside the expertise of the computer science community,
but nonetheless needs to be undertaken before any significant impact of work on Influence Maximization can
be truthfully claimed.
Acknowledgments
We are deeply indebted to Debmalya Mandal, Jean Pouget-Abadie and Yaron Singer for bringing to our
attention a counter-example to a theorem incorrectly claimed in the previous version of this article.
Furthermore, we would like to thank Shaddin Dughmi for useful pointers and feedback, Shishir Bharathi
and Mahyar Salek for useful discussions, and anonymous reviewers for useful feedback on prior versions.
Xinran He was supported in part by the grant ONR MURI W911NF-11-1-0332 and DARPA SMISC W911NF-
12-1-0034.
References
[1] A. Adiga, C. J. Kuhlman, H. S. Mortveit, and A. K. S. Vullikanti. Sensitivity of diffusion dynamics to
network uncertainty. In Proc. 28th AAAI Conf. on Artificial Intelligence, 2013.
[2] N. Alon, I. Benjamini, and A. Stacey. Percolation on finite graphs and isoperimetric inequalities. Annals
of Probability, 32:1727–1745, 2004.
[3] A.-L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286:509–512, 1999.
[4] B. Bollob´as. Random Graphs. Cambridge University Press, second edition, 2001.
11
[5] C. Borgs, M. Brautbar, J. T. Chayes, and B. Lucier. Maximizing social influence in nearly optimal
time. In Proc. 25th ACM-SIAM Symp. on Discrete Algorithms, pages 946–957, 2014.
[6] N. Buchbinder, M. Feldman, J. S. Naor, and R. Schwartz. Submodular maximization with cardinality
constraints. In Proc. 25th ACM-SIAM Symp. on Discrete Algorithms, pages 1433–1452, 2014.
[7] W. Chen, L. V. Lakshmanan, and C. Castillo. Information and Influence Propagation in Social Net-
works. Synthesis Lectures on Data Management. Morgan & Claypool, 2013.
[8] W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proc. 15th
Intl. Conf. on Knowledge Discovery and Data Mining, pages 199–208, 2009.
[9] W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear
threshold model. In Proc. 10th Intl. Conf. on Data Mining, pages 88–97, 2010.
[10] P. Erdos and A. R´enyi. On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci., 5:17–61,
1960.
[11] M. Gomez-Rodriguez, D. Balduzzi, and B. Scholkopf. Uncovering the temporal dynamics of diffusion
networks. In Proc. 28th Intl. Conf. on Machine Learning, pages 561–568, 2011.
[12] M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. ACM
Transactions on Knowledge Discovery from Data (TKDD), 5(4), 2012.
[13] M. Gomez-Rodriguez and B. Scholkopf. Submodular inference of diffusion networks from multiple trees.
In Proc. 29th Intl. Conf. on Machine Learning, 2012.
[14] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. Learning influence probabilities in social networks. In
Proc. 3rd ACM Intl. Conf. on Web Search and Data Mining, pages 241–250, 2010.
[15] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. A data-based approach to social influence maximization.
Proc. VLDB Endow., 5(1):73–84, Sept. 2011.
[16] J. Hastad. Clique is hard to approximate within n1−ε. Acta Mathematica, 182:105–142, 1999.
[17] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence in a social network. In
Proc. 9th Intl. Conf. on Knowledge Discovery and Data Mining, pages 137–146, 2003.
[18] D. Kempe, J. Kleinberg, and E. Tardos. Influential nodes in a diffusion model for social networks. In
Proc. 32nd Intl. Colloq. on Automata, Languages and Programming, pages 1127–1138, 2005.
[19] H. Kesten. Asymptotics in high dimension for percolation.
In G. Grimmett and D. Welsh, editors,
Disorder in Physical System, pages 219–240. Oxford University Press, 1990.
[20] S. Khanna and B. Lucier. Influence maximization in undirected networks. In Proc. 25th ACM-SIAM
Symp. on Discrete Algorithms, pages 1482–1496, 2014.
[21] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. S. Glance. Cost-effective
outbreak detection in networks. In Proc. 13th Intl. Conf. on Knowledge Discovery and Data Mining,
pages 420–429, 2007.
[22] E. Mossel and S. Roch. Submodularity of influence in social networks: From local to global. SIAM J.
Comput., 39(6):2176–2188, 2010.
[23] S. A. Myers and J. Leskovec. On the convexity of latent social network inference. In Proc. 22nd Advances
in Neural Information Processing Systems, pages 1741–1749, 2010.
[24] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of the approximations for maximizing
submodular set functions. Mathematical Programming, 14:265–294, 1978.
12
[25] C. Wang, W. Chen, and Y. Wang. Scalable influence maximization for independent cascade model in
large-scale social networks. Data Mining and Knowledge Discovery Journal, 25(3):545–576, 2012.
[26] Y. Wang, G. Cong, G. Song, and K. Xie. Community-based greedy algorithm for mining top-k influential
nodes in mobile social networks. In Proc. 16th Intl. Conf. on Knowledge Discovery and Data Mining,
pages 1039–1048, 2010.
[27] D. J. Watts and S. Strogatz. Collective dynamics of ‘small-world’ networks. Nature, 393:440–442, 1998.
13
|
1606.00715 | 1 | 1606 | 2016-06-02T15:05:18 | Measure of Node Similarity in Multilayer Networks | [
"cs.SI",
"physics.soc-ph"
] | The weight of links in a network is often related to the similarity of the nodes. Here, we introduce a simple tunable measure for analysing the similarity of nodes across different link weights. In particular, we use the measure to analyze homophily in a group of 659 freshman students at a large university. Our analysis is based on data obtained using smartphones equipped with custom data collection software, complemented by questionnaire-based data. The network of social contacts is represented as a weighted multilayer network constructed from different channels of telecommunication as well as data on face-to-face contacts. We find that even strongly connected individuals are not more similar with respect to basic personality traits than randomly chosen pairs of individuals. In contrast, several socio-demographics variables have a significant degree of similarity. We further observe that similarity might be present in one layer of the multilayer network and simultaneously be absent in the other layers. For a variable such as gender, our measure reveals a transition from similarity between nodes connected with links of relatively low weight to dis-similarity for the nodes connected by the strongest links. We finally analyze the overlap between layers in the network for different levels of acquaintanceships. | cs.SI | cs | PLoS Submission
6
1
0
2
n
u
J
2
]
I
S
.
s
c
[
1
v
5
1
7
0
0
.
6
0
6
1
:
v
i
X
r
a
Measure of Node Similarity in Multilayer Networks
Anders Mollgaard1,
Ingo Zettler2,
Jesper Dammeyer2,
Mogens H. Jensen1,
Sune Lehmann3,
Joachim Mathiesen1,*
1 University of Copenhagen, Niels Bohr Institute , 2100 Copenhagen,
Denmark
2 University of Copenhagen, Department of Psychology, 1353 Copenhagen,
Denmark
3 Technical University of Denmark, 2800 Kgs. Lyngby, Denmark
* [email protected]
Abstract
The weight of links in a network is often related to the similarity of the nodes. Here, we
introduce a simple tunable measure for analysing the similarity of nodes across different
link weights. In particular, we use the measure to analyze homophily in a group of 659
freshman students at a large university. Our analysis is based on data obtained using
smartphones equipped with custom data collection software, complemented by
questionnaire-based data. The network of social contacts is represented as a weighted
multilayer network constructed from different channels of telecommunication as well as
data on face-to-face contacts. We find that even strongly connected individuals are not
more similar with respect to basic personality traits than randomly chosen pairs of
individuals. In contrast, several socio-demographics variables have a significant degree
of similarity. We further observe that similarity might be present in one layer of the
multilayer network and simultaneously be absent in the other layers. For a variable such
as gender, our measure reveals a transition from similarity between nodes connected
with links of relatively low weight to dis-similarity for the nodes connected by the
strongest links. We finally analyze the overlap between layers in the network for
different levels of acquaintanceships.
Introduction
Are two connected individuals more similar than a pair of strangers? Over the last
decades, advances in data collection methods have provided new opportunities for
research on human behavior [1] including the topic of homophily, i.e., whether a pair of
connected individuals tends to be more similar than pairs of randomly selected
individuals. For instance, it is now possible to observe social interaction across multiple
channels, e.g., by combining data describing face-to-face contacts, with data from online
social organizations or smartphone data [2–5]. Multiple networks formed from the
simultaneous interaction in different channels are often called multiplex or multilayer
networks [6]. Homophily has been observed with regard to many different variables.
PLOS
1/12
PLoS Submission
Figure 1. The phone call, the text message, and the proximity networks.
The size of a node is determined by the sum of the weights of in-going links. The width
and the darkness of a link is given by the square root of the link weight. For visual
clarity, we show the nodes in the same positions in each panel and we do not show the
weakest links (wij < 0.01).
Examples span across socio-demographic variables (e.g., age, gender, ethnicity),
variables describing behavioral patterns (e.g., drinking behavior, smoking behavior,
physical activity), variables representing attitudes, beliefs, or opinions (e.g., about
politics and sport), and personality traits such as extraversion [7–12]. It is an open
question though, if homophily is becoming more pronounced between stronger
connected individuals. Here, we introduce an extended similarity measure with a
tunable parameter, which allows us to check for homophily across links with a broad
spectrum of weights. Based on the measure, we find a moderate degree of homophily
with respect to behavioral patterns but no significant homophily with regard to the
basic personality traits conscientiousness, agreeableness, and neuroticism.
Most commonly, homophily is investigated via likeability ratings about strangers, via
a comparison of personality reports from a dyad, triplet etc. of acquaintances, or via
network analyses. Recent studies based on personality reports by well-acquainted
persons did find overlap between acquaintances concerning the levels of some of the
basic personality traits [13–15]. Network studies focusing on observable variables such
as gender or cigarette use have suggested that similarity in this regard is important for
friendly acquaintanceship [16]. Overall, research so far suggests similarity between pairs
of friends or acquaintances, but the detailed conclusions concerning homophily tend to
differ depending on the methodology. In addition, the similarity of nodes, as we shall
see below, is strongly related to the strength of the link connecting them.
For an accurate understanding of homophily, a long-term and detailed monitoring of
social networks is needed for several reasons. In order to reveal a complete picture of
homophily, it is essential to gain insights into the similarity at all levels, e.g., from best
friends, acquaintances, to people in the network one hardly likes or spends time with.
These distinctions are possible in weighted network analyses. Here, we investigate the
similarity of connected individuals in a multilayer social network, with connections
based on phone calls, text messages, and physical proximity (Bluetooth). We estimate
the similarity between connected persons within a specified network with regard to
socio-demographic variables (sex, age, body mass index), behavioral patterns (physical
activity, alcohol drinking, and smoking behavior), attitudes concerning politics and
religion, and, ultimately, basic personality traits in terms of the Big Five, i.e.,
conscientiousness (e.g., being organized, precise, thorough), agreeableness (e.g., being
kind, sympathetic, warm), neuroticism (e.g., being anxious, moody, touchy), openness
to experience (e.g., being creative, philosophical, unconventional), and extraversion (e.g.,
being active, sociable, talkative). We focus on the Big Five as personality traits since
PLOS
2/12
PLoS Submission
Figure 2. Similarity of connected individuals in the network. The bars show
the intraclass correlation coefficient for the different variables and for the networks
formed from call activity, SMS activity and proximity data. The lines have a range of
one standard deviation. We find no similarity with regard to the personality traits
conscientiousness, agreeableness and neuroticism but we find a weak similarity with
regard to extraversion and dissimilarity with respect to openness. In general a stronger
similarity is found for socio-demographic, behavior- and attitudes-related variables.
they reflect an 'integrative descriptive taxonomy for personality research' [17].
Results
This work rests on a unique dataset. We have mapped out the social network between
659 freshman students starting in the year 2013 at the Technical University of Denmark
and running over 24 months [5]. Using state-of-the-art smartphones equipped with
custom data collection software, we have collected the communication patterns within
this densely connected population across a number of channels [18]. Specifically, we
measure telecommunication networks (phone calls, text messages), online social
networks (Facebook connections and interactions), and networks based on physical
proximity. The physical proximity networks are measured via the Bluetooth signal
strength, and can be used as a proxy for face-to-face meetings [19]. As a complement to
the network data, we also collect information on geo-spatial mobility using GPS, as well
as a number of more technical probes.
In addition to the automated data collection, we have also acquired extensive
questionnaire-based data on participants' personality and behavior, comprising the
following questionnaires: Big Five Inventory [17], Rosenberg Self Esteem Scale [20],
Narcissistic Admiration and Rivalry Questionnaire [21], Satisfaction With Life Scale [22],
Rotter's Locus of Control Scale [23], UCLA Loneliness scale [24], Self-efficacy [25],
Perceived Stress Scale [26], Major Depression Inventory [27], The Copenhagen Social
Relation Questionnaire [28], and Positive and Negative Affect Schedule [29], as well as
several general health-, attitudes- and behavior-related questions.
Here, we consider three different types of social interaction networks based on calls,
text messages, and physical proximity, respectively. We introduce a tunable link weight
based on the strength of the interactions. To explain our definition of a link weight, let
us start by considering the call network. The weight of a directed link from person i to
PLOS
3/12
PLoS Submission
person j is given by
(cid:88)
k
nα
ik,
wij(α) = nα
ij/
where nij represents the total number of accepted calls from person i to person j. Links
therefore take a value in the interval, wij ∈ [0, 1], and the sum of weights of outgoing
links from any person equals unity. The power α is used to test if homophily is more
pronounced between individuals who interact more frequently than for individuals who
do not interact that often. The case α = 0 corresponds to a network where all links
have equal weight. For intermediate α values, we predominantly test for similarity on
the strongest links and, ultimately, for large values, e.g., for α ≈ 2, we only consider the
strongest out-going link for each individual. The network of text-messages (SMS
network) is constructed in the similar fashion, but with nij, representing the number of
text messages sent from person i to person j. From the data on physical proximity, we
can determine the time a pair of individuals has spent together. We say that a person i
has spent an amount of time ∆t together with person j if two consecutive Bluetooth
scans are separated by a time ∆t and, in addition, both scans estimate person j to be
within approximately three meters distance. The link weight between i and j is
(cid:88)
wij(α) = T α
ij/
T α
ik,
k
where Tij is the total time that j has been within the three meter limit of i. In general,
the proximity data contains information about a large number of more or less random
encounters during lectures and classes. In order to prevent that these encounters
dominate our data, we make use of proximity data sampled only in the weekends or from
6pm to 12am during the weekdays. We place no such restrictions on the call and SMS
data. Finally, we construct a symmetric weight from the two directed weights by taking
the average weight of the two directed links. From these three types of interaction, we
construct the corresponding networks, see Fig. 1. Here the size and color of the nodes
are determined by the sum of link weights connecting to the node, while the width of a
link is given by the square root of the link weight. The visual representation reveals that
the networks tend to be dominated by a relatively small set of links with strong weights.
In order to analyze homophily, we construct vectors (xi, xj, wij) for each link in the
network where xi represents a variable (e.g., of a personality trait) associated with
person i. The degree of homophily is estimated by a generalization of the intraclass
correlation coefficient (ICC). The ICC quantifies the similarity of the variables xi and
xj for the connected persons i and j in the network. Similarly to the Pearson
correlation coefficient, the ICC is a measure of the tendency for xi and xj to assume
similar values relative to their average value. Normally, the ICC is computed under the
assumption that persons are either connected or not. Here we modify the ICC by
including the weight of interactions wij between persons. The weighted ICC, here
denoted by r, is then computed for a network, (xi, xj, wij), from the expressions,
PLOS
4/12
PLoS Submission
i>j wij (xi + xj)
,
i>j 2wij
(cid:80)
(cid:80)
(cid:80)
(cid:80)
i>j wij (xi − ¯x) (xj − ¯x)
(xi − ¯x)2 + (xj − ¯x)2(cid:17)
(cid:80)
i>j 2wij
,
i>j 2wij
,
r = t2/s2
¯x =
s2 =
t2 =
i>j wij
(cid:16)
(cid:80)
The auxiliary variable s measures the variance within the sample, including both
variables xi and xj, and the variable t is a measure of the co-variance of xi and xj.
Please note how the contribution to the variance for each link is weighted by wij. In
general, the weighted correlation coefficient provides a basic measure of the importance
of homophily in social interactions. In Fig. 2, we show the ICC where all weights are
proportional to the activity on the link, i.e., α = 1. The error bars are estimated using
bootstrapping, where we for each value of α and for each network layer (Call, SMS, and
BlueTooth), generate 10,000 reference networks by randomly reshuffling the links. We
then measure the correlation coefficient in these reference network. The fraction of
networks with an ICC larger than that of the true network provides us with a measure
of the p-value.
We observe in Fig. 2 that there is no pronounced homophily for the personality
traits conscientiousness, agreeableness and neuroticism, even when we consider only the
strongest links. In Fig. 3, we test the importance of link strength by varying the
parameter α, i.e., we test for homophily by considering all social interactions equally
important (α = 0) or by weighting frequent interactions higher (α > 0). We see that for
the Big Five personality traits, only extraversion have ICCs which are significantly
different (p < 0.05) from zero in all layers. List of p-values for the computed ICCs are
listed in the Supporting Information S3 and a description of how the p-values are
computed can be found in Materials and Methods. In the sms layer, the ICC for
extraversion ranges from values around zero when all links have equal weights to values
around 0.2 for α = 2. For both the extraversion and openness traits, the proximity and
call layers result in ICCs that are lower than the ICC of the text message layer. The
ICCs for agreeableness, conscientiousness and neuroticism are for almost all values of α
not significantly different from zero and are bounded above by approximately 0.12.
Homophily is pronounced in the phone call network for the variables capturing
smoking and drinking behaviors. Here the ICCs are significantly different (p < 0.05)
from zero and achieve values larger than 0.3 in the call layer and values up to 0.2 in the
sms layer. This is in contrast to the other variables in our study, where homophily is
most pronounced in the sms layer. The variables representing attitudes concerning
politics and religion show a weak or no correlation. Less surprisingly, we see an
over-representation of social interaction between individuals of the same sex for calls
and text messages when α = 0; the ICCs attain values around 0.2. Moreover, we
observe that for increasing values of α, the stronger links in the text message network
more frequently connect individuals of different sex, i.e. we see a transition from a
positive ICC to a negative ICC as alpha is increased. Interestingly, albeit the
correlation is slightly smaller, the proximity data at the same time shows that
individuals with frequent face-to-face encounters tend to be of same sex.
PLOS
5/12
PLoS Submission
Figure 3. Computed similarity of individuals with different levels of social
interaction. The computed similarity is shown as function of the parameter α, which
tunes the weight of the individual links in the networks. The case α = 0 corresponds to
the case of links having equal weight, whereas increasing values of α enhances the
contribution from the stronger links in the calculation, e.g., for α = 2 the strongest links
of each individual dominates. The envelope is the estimate of the standard deviation
(see text). In the Supporting Information S3, a table is included of p-values for the
individual traits and for different α-values. In general, the p-values are large (> 0.05)
for the traits Conscientiousness, Agreeableness, Neuroticism and Openness. The
estimates of Extraversion attains lower p-values, e.g. for the BlueTooth, p ≈ 0.01, and
for SMS the p-value varies in the interval 0.02 − 0.08 for different α-values.
PLOS
6/12
PLoS Submission
Discussion
Multilayer networks – The overlap between the three layers in the multilayer
network can be estimated from the pairwise Pearson correlation coefficients rp,k(cid:96) of the
link weights wL
ij in two layers Lk and L(cid:96).
ij − ¯wLk )(wL(cid:96)
(cid:105)1/2(cid:104)(cid:80)
ij − ¯wL(cid:96))
i>j(wL(cid:96)
ij − ¯wL(cid:96))2
(cid:105)1/2
(1)
(cid:104)(cid:80)
rp,k(cid:96) =
(cid:80)
i>j(wLk
ij − ¯wLk )2
i>j(wLk
We find that for α = 1 the correlation coefficient is 0.75 between the call and SMS
layers, 0.53 between the call and proximity layers, and 0.47 between the SMS and
proximity layers. A similar approach has previously been suggested in Ref. [30] where,
instead of the link weights, the degree of the nodes in the individual layers was
considered. Using the link weights, we can now by tuning the parameter α test the
overlap between the layeres for different levels of acquaintanceships. In Fig. 4, we show
the pairwise correlation between the three layers for different values of α. As expected
there is a significant overlap between the layers, but they certainly also differ enough to
be treated as more than a fluctuation of a single network. Interestingly, the overlap
changes with the factor α, which opens a fundamental question in the analysis of
multiplex networks. Which weights would be the right to use? The unweighted case
α = 0 certainly leads to a correlation different than those of larger α values. In fact,
strong links might not necessarily be present or strong in all layers, e.g. two persons
that frequently communicate might prefer phone calls rather than text messages. At the
intermediate range, interaction could be more equally distributed across the channels or
layers. In other words, the degree of multiplexity in our network is tunable and depends
on the perspective, whether strong or weak links should be favored. This observed
sensitivity in overlap, could have implications for community detection algorithms on
multiplex networks [31, 32] or for the structural reducibility of overlapping layers [33].
We further note that the proximity (Bluetooth) layer is more densely connected than
the other layers, in particular because the participants in the study meet at more
informal gatherings at the university campus or have encounters which could either be
spontaneous or of less personal character such as study groups. This could be one
reason for the weaker similarity seen for most of the variables in the proximity data in
Figs. 2 and 3.
Here, we have performed an extensive mapping of similarity in a large social network
based on detailed records of social interactions over a time span of nearly two years.
From the frequency of interactions, all links in the network are assigned a weight, which
we have been able to tune in order to look for homophily across varying levels of
acquaintanceships. We show that tuning the weights can reveal new features of the
node similarity. For the variables describing alcohol use, cigarette use, and extraversion,
we see that individuals are more similar when they interact strongly. In contrast if the
weights are disregarded, we see little or no similarity. Interestingly, the similarity of
individuals is not monotonically increasing with the frequency of interaction for all
variables, e.g., the intraclass correlation coefficient with regard to gender transitions
from postive to negative values. The analysis of our data does not provide any evidence
that the basic personality traits agreableness, conscientiousness, neuroticism and to
some degree openness are an important factor in the formation of social networks. In
fact, we find a small or non-existing correlation between these personality traits and
social interaction, even when we only consider individuals that interact very frequently.
Finally, the measure, we have introduced, shows that the degree of muliplexity in our
network is tunable as we vary the balance between weak and strong links.
PLOS
7/12
PLoS Submission
Figure 4. Overlap between layers in the multilayer social network. Based on
the correlation between the link-weights, we can check the overlap between the
individual layers of call, SMS, and proximity for varying values of α. We see that the
multilayer features of the network changes with the link-weight exponent α and the
overlap between the layers is maximal for intermediate values of α.
PLOS
8/12
PLoS Submission
Materials and Methods
In constructing the multilayer network, we include links from participants that meet
minimum requirements with respect to the total time window in which they are active
and their level of activity. In particular, we require that the data recording period is
longer than 3 months and associated with at least 170 calls, 950 text messages and 200
hours of Bluetooth interaction. These numbers correspond to the typical social activity
of a person during a 3 months period, which, we believe, is a reasonable time scale for
the resolution of social behavior. These requirements reduce the dataset to 659
participants and is introduced to avoid the addition of noisy links in the network. The
average user in the study has been active for 530 days, has been part of 952 phone calls,
and has exchanged 5313 text messages. The average number of hours that a user has
been in the proximity of others is 1073. The proximity network is based on
asynchronous Bluetooth scans by each smartphone every 5 minutes, which are collected
into 5 minute time-bins and symmetrized. Many of the recorded interactions are with
people outside the study and can therefore not be included in the analysis of homophily.
In the call and SMS data, the total weight of a single individual therefore depends on
the fraction of calls or text messages that are directed to other participants in the study.
The significance of our estimated ICCs have been computed in the following way. For
each value of alpha and each layer in the network, we generate 10,000 reference layers
(i.e. networks) by shuffling the links within a layer. We then measure the ICC in these
reference layers. The fraction of network layers with an intraclass correlation coefficient
larger than that of the original network layer provides us with a estimated of the p-value.
A table of all computed p-values have been included in the Supporting Information S3.
This study was reviewed and approved by the appropriate Danish authority, the
Danish Data Protection Agency (Reference number: 2012-41-0664). The Data
Protection Agency guarantees that the project abides by Danish law and also considers
potential ethical implications. All subjects in the study provided written informed
consent.
References
1. Borgatti SP, Mehra A, Brass DJ, Labianca G. Network analysis in the social
sciences. science. 2009;323(5916):892–895.
2. Eagle N, Pentland A. Reality mining: sensing complex social systems. Personal
and ubiquitous computing. 2006;10(4):255–268.
3. Cattuto C, Van den Broeck W, Barrat A, Colizza V, Pinton J, Vespignani A.
Dynamics of Person-to-Person Interactions from Distributed RFID Sensor
Networks. PLOS ONE. 2010 07;5(7):e11596. Available from:
http://dx.doi.org/10.1371%2Fjournal.pone.0011596.
4. Aharony N, Pan W, Ip C, Khayal I, Pentland A. Social fMRI: Investigating and
shaping social mechanisms in the real world. Pervasive and Mobile Computing.
2011;7(6):643–659.
5. Stopczynski A, Sekara V, Sapiezynski P, Cuttone A, Madsen MM, Larsen JE,
et al. Measuring Large-Scale Social Networks with High Resolution. PLoS ONE.
2014 04;9(4):e95978. Available from:
http://dx.doi.org/10.1371/journal.pone.0095978.
6. Kivela M, Arenas A, Barthelemy M, Gleeson JP, Moreno Y, Porter MA.
Multilayer networks. Journal of Complex Networks. 2014;2(3):203–271.
PLOS
9/12
PLoS Submission
7. Crandall CS, Schiffhauer KL, Harvey R. Friendship pair similarity as a measure
of group value. Group Dynamics. 1997;1(2):133–143. Available from:
http://www.scopus.com/inward/record.url?eid=2-s2.
0-0141662438&partnerID=40&md5=cfe73a3d2adb3e9e5b1eaed153451a2b.
8. Currarini S, Jackson MO, Pin P. Identifying the roles of race-based choice and
chance in high school friendship network formation. Proceedings of the National
Academy of Sciences. 2010;107(11):4857–4861.
9. Kandel DB. Similarity in real-life adolescent friendship pairs. Journal of
Personality and Social Psychology. 1978;36(3):306–312. Available from:
http://www.scopus.com/inward/record.url?eid=2-s2.
0-25444466854&partnerID=40&md5=00cc0153e389eaf6d02ccd89624333d1.
10. Rushton JP, Bons TA. Mate Choice and Friendship in Twins: Evidence for
Genetic Similarity. Psychological Science. 2005;16(7):555–559. Available from:
http://www.scopus.com/inward/record.url?eid=2-s2.
0-23944492077&partnerID=40&md5=56a6b7b64363aae63c9f77e1478894cc.
11. Kurtz JE, Sherker JL. Relationship quality, trait similarity, and self-other
agreement on personality ratings in college roommates. Journal of personality.
2003;71(1):21–48.
12. Stehl´e J, Charbonnier F, Picard T, Cattuto C, Barrat A. Gender homophily from
spatial behavior in a primary school: a sociometric study. Social Networks.
2013;35(4):604–613.
13. Cohen TR, Panter AT, Turan N, Morse L, Kim Y. Agreement and similarity in
self-other perceptions of moral character. Journal of Research in Personality.
2013;47(6):816–830. Available from:
http://www.scopus.com/inward/record.url?eid=2-s2.
0-84884293708&partnerID=40&md5=c463cc29df8e4a105ca67e0dc8ae9af9.
14. Lee K, Ashton MC, Pozzebon JA, Visser BA, Bourdage JS, Ogunfowora B.
Similarity and Assumed Similarity in Personality Reports of Well-Acquainted
Persons. Journal of Personality and Social Psychology. 2009;96(2):460–472.
Available from: http://www.scopus.com/inward/record.url?eid=2-s2.
0-60749103381&partnerID=40&md5=8ba442558d8e4f4298385a93f3ccb448.
15. Paunonen SV, Hong RY. The many faces of assumed similarity in perceptions of
personality. Journal of Research in Personality. 2013;47(6):800–815. Available
from: http://www.scopus.com/inward/record.url?eid=2-s2.
0-84884223362&partnerID=40&md5=f33fe27c11db6a1b460225611fd29858.
16. Delay D, Laursen B, Kiuru N, Salmela-Aro K, Nurmi JE. Selecting and retaining
friends on the basis of cigarette smoking similarity. Journal of Research on
Adolescence. 2013;23(3):464–473. Available from:
http://www.scopus.com/inward/record.url?eid=2-s2.
0-84882664852&partnerID=40&md5=37a95e3589dc5e9d318e06c0249d6737.
17. John OP, Naumann LP, Soto CJ. Paradigm shift to the integrative big five trait
taxonomy. Handbook of personality: Theory and research. 2008;3:114–158.
18. Mollgaard A, Mathiesen J. The Dynamics of Initiative in Communication
Networks. PloS one. 2016;11(4):e0154442.
PLOS
10/12
PLoS Submission
19. Sekara V, Lehmann S. The strength of friendship ties in proximity sensor data.
PLOS One. 2014;9(7).
20. Rosenberg M. Society and the adolescent self-image (rev). Wesleyan University
Press; 1989.
21. Back MD, Kufner AC, Dufner M, Gerlach TM, Rauthmann JF, Denissen JJ.
Narcissistic admiration and rivalry: Disentangling the bright and dark sides of
narcissism. Journal of Personality and Social Psychology. 2013;105(6):1013.
22. Diener E, Emmons RA, Larsen RJ, Griffin S. The satisfaction with life scale.
Journal of personality assessment. 1985;49(1):71–75.
23. Rotter JB. Generalized expectancies for internal versus external control of
reinforcement. Psychological monographs: General and applied. 1966;80(1):1.
24. Russell DW. UCLA Loneliness Scale (Version 3): Reliability, validity, and factor
structure. Journal of personality assessment. 1996;66(1):20–40.
25. Sherer M, Maddux JE, Mercandante B, Prentice-Dunn S, Jacobs B, Rogers RW.
The self-efficacy scale: Construction and validation. Psychological reports.
1982;51(2):663–671.
26. Cohen S, Kamarck T, Mermelstein R. A global measure of perceived stress.
Journal of health and social behavior. 1983;p. 385–396.
27. Bech P, Rasmussen NA, Olsen LR, Noerholm V, Abildgaard W. The sensitivity
and specificity of the Major Depression Inventory, using the Present State
Examination as the index of diagnostic validity. Journal of affective disorders.
2001;66(2):159–164.
28. Lund R, Nielsen LS, Henriksen PW, Schmidt L, Avlund K, Christensen U.
Content Validity and Reliability of the Copenhagen Social Relations
Questionnaire. Journal of aging and health. 2014;26(1):128–150.
29. Watson D, Clark LA, Tellegen A. Development and validation of brief measures
of positive and negative affect: the PANAS scales. Journal of personality and
social psychology. 1988;54(6):1063.
30. Nicosia V, Latora V. Measuring and modeling correlations in multiplex networks.
Physical Review E. 2015;92(3):032805.
31. Mucha PJ, Richardson T, Macon K, Porter MA, Onnela JP. Community
Structure in Time-Dependent, Multiscale, and Multiplex Networks. Science.
2010;328(5980):876–878. Available from:
http://science.sciencemag.org/content/328/5980/876.
32. De Domenico M, Lancichinetti A, Arenas A, Rosvall M. Identifying Modular
Flows on Multilayer Networks Reveals Highly Overlapping Organization in
Interconnected Systems. Phys Rev X. 2015 Mar;5:011027. Available from:
http://link.aps.org/doi/10.1103/PhysRevX.5.011027.
33. De Domenico M, Nicosia V, Arenas A, Latora V. Structural reducibility of
multilayer networks. Nature communications. 2015;6.
PLOS
11/12
PLoS Submission
Acknowledgements
The study received funding through the UCPH 2016 Excellence Programme for
Interdisciplinary Research.
Supporting Information
S1 Text
Description of data. Short description of the format of the data.
S2 Text
Data file. Data used in the analysis in the manuscript.
S3 Text
List of p-values for different traits and values of α.
PLOS
12/12
|
1101.0272 | 2 | 1101 | 2011-03-05T22:09:35 | Social Norms for Online Communities | [
"cs.SI",
"cs.NI",
"physics.soc-ph"
] | Sustaining cooperation among self-interested agents is critical for the proliferation of emerging online social communities, such as online communities formed through social networking services. Providing incentives for cooperation in social communities is particularly challenging because of their unique features: a large population of anonymous agents interacting infrequently, having asymmetric interests, and dynamically joining and leaving the community; operation errors; and low-cost reputation whitewashing. In this paper, taking these features into consideration, we propose a framework for the design and analysis of a class of incentive schemes based on a social norm, which consists of a reputation scheme and a social strategy. We first define the concept of a sustainable social norm under which every agent has an incentive to follow the social strategy given the reputation scheme. We then formulate the problem of designing an optimal social norm, which selects a social norm that maximizes overall social welfare among all sustainable social norms. Using the proposed framework, we study the structure of optimal social norms and the impacts of punishment lengths and whitewashing on optimal social norms. Our results show that optimal social norms are capable of sustaining cooperation, with the amount of cooperation varying depending on the community characteristics. | cs.SI | cs | Social Norms for Online Communities
Yu Zhang, Student Member, IEEE, Jaeok Park, Mihaela van der Schaar, Fellow, IEEE
Department of Electrical Engineering, UCLA
[email protected], {jaeok, mihaela}@ee.ucla.edu
Abstract—Sustaining cooperation among self-interested agents is critical for the proliferation of emerging online social
communities, such as online communities formed through social networking services. Providing incentives for cooperation in
social communities is particularly challenging because of their unique features: a large population of anonymous agents
interacting infrequently, having asymmetric interests, and dynamically joining and leaving the community; operation errors;
and low-cost reputation whitewashing. In this paper, taking these features into consideration, we propose a framework for the
design and analysis of a class of incentive schemes based on a social norm, which consists of a reputation scheme and a social
strategy. We first define the concept of a sustainable social norm under which every agent has an incentive to follow the social
strategy given the reputation scheme. We then formulate the problem of designing an optimal social norm, which selects a
social norm that maximizes overall social welfare among all sustainable social norms. Using the proposed framework, we
study the structure of optimal social norms and the impacts of punishment lengths and whitewashing on optimal social norms.
Our results show that optimal social norms are capable of sustaining cooperation, with the amount of cooperation varying
depending on the community characteristics.
Keywords—Incentive schemes, social communities, reputation schemes, social norms, whitewashing.
I.
INTRODUCTION
Recent developments in technology have expanded the boundaries of communities in which individuals interact
with each other. For example, nowadays individuals can obtain valuable information or content from remotely
located individuals in a community formed through networking services [1][2][4]. However, a large population and
the anonymity of individuals in social communities make it difficult to sustain cooperative behavior among self-
interested individuals [3]. For example, it has been reported that so-called free-riding behavior is widely observed
in peer-to-peer networks [5][6][7][8]. Hence, incentive schemes are needed to provide individuals with incentives
for cooperation.
The literature has proposed various incentive schemes. The popular forms of incentive devices used in many
incentive schemes are payment and differential service. Pricing schemes use payments to reward and punish
individuals for their behavior. Pricing schemes in principle can lead self-interested individuals to achieve social
optimum by internalizing their external effects (see, for example, [9][10]). However, it is often claimed that pricing
schemes are impractical because they require an accounting infrastructure [11]. Moreover, the operators of social
communities may be reluctant to adopt a pricing scheme when pricing discourages individuals’ participation in
community activities. Differential service schemes, on the other hand, reward and punish individuals by providing
differential services depending on their behavior [12]. Differential services can be provided by community
operators or by community members. Community operators can treat individuals differentially (for example, by
varying the quality or scope of services) based on the information about the behavior of individuals. Incentive
provision by a central entity can offer a robust method to sustain cooperation [13][14]. However, it is impractical in
a community with a large population because the burden of a central entity to monitor individuals’ behavior and
1
provide differential services for them becomes prohibitively heavy as the number of individuals grows.
Alternatively, there are more distributed incentive schemes where community members monitor the behavior of
each other and provide differential services based on their observations [15][16][17][18]. Such incentive schemes
are based on the principle of reciprocity and can be classified into personal reciprocation (or direct reciprocity)
[15][16] and social reciprocation (or indirect reciprocity) [17][18]. In personal reciprocation schemes, individuals
can identify each other, and behavior toward an individual is based on their personal experience with the individual.
Personal reciprocation is effective in sustaining cooperation in a small community where individuals interact
frequently and can identify each other, but it loses its force in a large community where anonymous individuals
with asymmetric interests interact infrequently [17]. In social reciprocation schemes, individuals obtain some
information about other individuals (for example, rating) and decide their behavior toward an individual based on
their information about that individual. Hence, an individual can be rewarded or punished by other individuals in
the community who have not had direct interaction with it [17][19]. Since social reciprocation requires neither
observable identities nor frequent interactions, it has a potential to form a basis of successful incentive schemes for
social communities. As such, this paper is devoted to the study of incentive schemes based on social reciprocation.
Sustaining cooperation using social reciprocation has been investigated in the economics literature using the
framework of anonymous random matching games. Social norms have been proposed in [17] and [19] in order to
sustain cooperation in a community with a large population of anonymous individuals. In an incentive scheme
based on a social norm, each individual is attached a label indicating its reputation, status, etc. which contains
information about its past behavior, and individuals with different labels are treated differently by other individuals
they interact with. Hence, a social norm can be easily adopted in social communities with an infrastructure that
collects, processes, and delivers information about individuals’ behavior. However, [17] and [19] have focused on
obtaining the Folk Theorem by characterizing the set of equilibrium payoffs that can be achieved by using a
strategy based on a social norm when the discount factor is sufficiently close to 1. Our work, on the contrary,
addresses the problem of designing a social norm given a discount factor and other parameters arising from
practical considerations. Specifically, our work takes into account the following features of social communities:
Asymmetry of interests. As an example, consider a community where individuals with different areas of
expertise share knowledge with each other. It will be rarely the case that a pair of individuals has a mutual
interest in the expertise of each other. We allow the possibility of asymmetric interests by modeling the
interaction between a pair of individuals as a gift-giving game, instead of a prisoner’s dilemma game, which
assumes mutual interests between a pair of individuals.
Report errors. In an incentive scheme based on a social norm, it is possible that the reputation (or label) of an
individual is updated incorrectly because of errors in the report of individuals. Our model incorporates the
possibility of report errors, which allows us to analyze its impact on design and performance, whereas most
existing works on reputation schemes [15][20][18] adopt an idealized assumption that reputations are always
updated correctly.
Dynamic change in the population. The members of a community change over time as individuals gain or lose
interest in the services provided by community members. We model this feature by having a constant fraction of
2
individuals leave and join the community in every period. This allows us to study the impact of population
turnover on design and performance.
Whitewashing reputations. In an online community, individuals with bad reputations may attempt to whitewash
their reputations by joining the community as new members [15]. We consider this possibility and study the
design of whitewash-proof social norms and their performance.
The remainder of this paper is organized as follows. In Section II, we describe the repeated matching game and
incentive schemes based on a social norm. In Section III, we formulate the problem of designing an optimal social
norm. In Section IV, we provide analytical results about optimal social norms. In Section V, we extend our model
to address the impacts of variable punishment lengths and whitewashing possibility. We provide simulation results
in Section VI, and we conclude the paper in Section VII.
II. MODEL
A. Repeated Matching Game
We consider a community where agents can offer a valuable service to other agents. Examples of services are
expert knowledge, customer reviews, job information, multimedia files, storage space, and computing power. We
consider an infinite-horizon discrete time model with a continuum of agents [15][22]. In a period, each agent
generates a service request [27][29], which is sent to another agent that can provide the requested service. We
model the request generation and agent selection process by uniform random matching, where each agent receives
exactly one request in every period, each agent is equally likely to receive the request from a particular agent, and
the matching is independent across periods. In a pair of matched agents, the agent that requests a service is called a
client while the agent that receives a service request is called a server. In every period, each agent in the
community is involved in two matches, one as a client and the other as a server. Note that the agent with whom an
agent interacts as a client can be different from that with which it interacts as a server, reflecting asymmetric
interests between a pair of agents.
We model the interaction between a pair of matched agents as a gift-giving game [23]. In a gift-giving game,
the server has the binary choice of whether to fulfill or decline the request, while the client has no choice. The
server’s action determines the payoffs of both agents. If the server fulfils the client’s request, the client receives a
c > . We assume that b
b > while the server suffers a service cost of
c> so that the service
service benefit of
0
0
of an agent creates a positive net social benefit. If the server declines the request, both agents receive zero payoffs.
, where F stands for “fulfill” and D for “decline”. The
The set of actions for the server is denoted by
=
{ , }F D
payoff matrix of the gift-giving game is presented in Table 1. An agent plays the gift-giving game repeatedly with
changing partners until it leaves the community. We assume that at the end of each period a fraction
of
a Î
agents in the current population leave and the same amount of new agents join the community. We refer to a as
the turnover rate [15].
c> ,
Social welfare in a time period is measured by the average payoff of the agents in that period. Since b
social welfare is maximized when all the servers choose action F in the gift-giving game they play, which yields
c- to every agent. On the contrary, action D is the dominant strategy for the server in the gift-giving
payoff b
[0, 1]
3
game, which can be considered as the myopic equilibrium of the gift-giving game. When every server chooses its
action to maximize its current payoff myopically, an inefficient outcome arises where every agent receives zero
payoffs.
TABLE 1. Payoff matrix of a gift-giving game.
Server
D
0 , 0
F
b , c-
Client
B. Incentive Schemes Based on a Social Norm
In order to improve the efficiency of the myopic equilibrium, we use incentive schemes based on social norms.
A social norm is defined as the rules that a group uses to regulate the behavior of members. These rules indicate the
established and approved ways of “operating” (e.g. exchanging services) in the group: adherence to these rules is
positively rewarded, while failure to follow these rules results in (possibly severe) punishments [26]. This gives
social norms a potential to provide incentives for cooperation. We consider a social norm that consists of a
reputation scheme and a social strategy, as in [17] and [19]. A reputation scheme determines the reputations of
agents depending on their past actions as a server, while a social strategy prescribes the actions that servers should
take depending on the reputations of the matched agents.
,K t . is the set of reputations that an
Formally, a reputation scheme is represented by three elements (
),
agent can hold, K Î is the initial reputation attached to newly joining agents, and is the reputation update rule.
After a server takes an action, the client sends a report (or feedback) about the action of the server to the third-party
device or infrastructure that manages the reputations of agents, but the report is subject to errors with a small
probability e . That is, with probability e , D is reported when the server takes action F, and vice versa. Assuming a
]
binary set of reports, it is without loss of generality to restrict e in [
, reports are
0, 1 / 2 . When
e =
completely random and do not contain any meaningful information about the actions of servers. We consider a
reputation update rule that updates the reputation of a server based only on the reputations of matched agents and
the reported action of the server. Then, a reputation update rule can be represented by a mapping
t q q
(
)
, Ra
,
matched with a client with reputation q and its action is reported as . A social strategy is represented by a mapping
),s q q is the approved action for a server with reputation q that is matched with a client
(
´ , where
:s
is the new reputation for a server with current reputation q when it is
:t
´ ´ , where
1 / 2
with reputation q .1
To simplify our analysis, we initially impose the following restrictions on reputation schemes we consider.2
1) is a nonempty finite set, i.e.,
¼ for some nonnegative integer L .
}
{
0, 1,
=
, L
2) K L= .
3) t is defined by
1 The strategies in the existing reputation mechanisms [17][19] determine the server’s action based solely on the client’s reputation, and thus can be
considered as a special case of the social strategies proposed in this paper.
2 We will relax the second and the third restrictions in Section V.
4
,
R
R
R
a
}
)
L
1,
=
+
¹
{
q
(1)
a
if
(
t q q
,
,
(
)
s q q
,
)
(
s q q
.
,
ìï
min
ïï= íï
a
0 if
ïïî
Note that with the above three restrictions a nonnegative integer L completely describes a reputation scheme,
and thus a social norm can be represented by a pair
. We call the reputation scheme determined by L
k
s
=
( , )L
the maximum punishment reputation scheme with punishment length L . In the maximum punishment reputation
scheme with punishment length L , there are
1L + reputations, and the initial reputation is specified as L . If the
reported action of the server is the same as that specified by the social strategy s , the server’s reputation is
increased by 1 while not exceeding L . Otherwise, the server’s reputation is set as 0 . A schematic representation of
a maximum punishment reputation scheme is provided in Fig 1.
Below we summarize the sequence of events in a time period:
1) Agents generate service requests and are matched.
2) Each server observes the reputation of its client and then determines its action.
3) Each client reports the action of its server.
4) The reputations of agents are updated, and each agent observes its new reputation for the next period.
5) A fraction of agents leave the community, and the same amount of new agents join the community.
III. PROBLEM FORMULATION
A. Stationary Distribution of Reputations
As time passes, the reputations of agents are updated and agents leave and join the community. Thus, the
th q be the fraction of q -agents in the total population at the
distribution of reputations evolves over time. Let
( )
beginning of an arbitrary period t , where a q -agent means an agent with reputation q . Suppose that all the agents
L
to {
}
L
} 0
in the community follow a given social strategy s . Then the transition from {
q+
1
t
h
h q
( )
( )
q
=
q
=
0
determined by the reputation update rule , taking into account the turnover rate a and the error probability e , as
shown in the following expressions:
( )
0
( )
q
( )
L
)
)
(
t
e h q
q
£ £ -
-
L
1 for 1
}
{
)
( )
)
(
t
t
h
a
e h
+
-
+
L
L
.
1
Since we are interested in the long-term payoffs of the agents, we study the distribution of reputations in the long
run.
Definition 1 (Stationary distribution)
is a stationary distribution of reputations under the dynamics
)
a e
,
) (
a
-
1
) (
a
-
1
(
= -
1
(
= -
1
(
= -
1
h
h
h
(2)
is
1,
+
1
+
1
+
1
{
}
( )
h q
t
t
t
t
defined by (2) if it satisfies
å
L
q
=
0
h q
( )
=
1
and
5
( )
h
0
( )
h q
( )
h
L
(
= -
1
(
= -
1
(
= -
1
)
a e
,
) (
a
-
1
) (
a
-
1
)
) (
q
e h q
£ £ -
-
L
1 for 1
}
{
( )
(
)
)
a
e h
h
+
-
+
L
L
1
.
The following lemma shows the existence of and convergence to a unique stationary distribution.
{
}
[
]
Lemma 1. For any
and
, there exists a unique stationary distribution
( )
a Î
e Î
h q
0, 1 / 2
[0, 1]
(3)
1,
whose
expression is given by
h
( )
L
Proof: Suppose that
a > or
0
( )
h q
+
1
-
q
q
(
)
)
(
e
a
e
q
= -
-
£ £ -
L
, for 0
1
1
1,
ìï
e
a
= =
1 if
ïïïï=
+
L
L
1
)
)
(
(
a
e
-
1
1
íïïï
) (
(
a
- -
-
1
1
1
ïïî
{
}
( )
h q
e > . Then (3) has a unique solution
0
e a
+
)
e
otherwise.
0,
(4)
Moreover, the stationary distribution
is reached within (
L + periods starting from any initial distribution.
1)
( )
h q
h
( )
L
(
= -
1
(
1
-
=
e
+
1
a
-
q
q
)
(
)
e
1
, for 0
+
L
L
1
)
(
)
a
e
-
1
) (
(
a
-
- -
1
1
1
e a
+
)
e
,
q
£ £ -
L
1,
(5)
which satisfies
å
L
q
=
0
h q
( )
=
1
. Suppose that
a = and
0
e = . Then solving (3) together with
0
å
L
q
=
0
h q
( )
=
1
yields a unique solution
h q = for 0
( )
0
q£ £ - and
1L
( )
Lh
= . It is easy to see from the expressions in (2)
1
that
( )
h q is reached within (
q + periods, for all q , starting from any initial distribution. ■
1)
Since the coefficients in the equations that define a stationary distribution are independent of the social strategy
that the agents follow, the stationary distribution is also independent of the social strategy, as can be seen in (4).
Thus, we will write the stationary distribution as { ( )}
Lh q
to emphasize its dependence on the reputation scheme,
which is represented by L .
B. Sustainable Social Norms
We now investigate the incentive of agents to follow a prescribed social strategy. For simplicity, we check the
incentive of agents at the stationary distribution of reputations, as in [19] and [21]. Since we consider a non-
cooperative scenario, we need to check whether an agent can improve its long-term payoff by a unilateral deviation.
Note that any unilateral deviation from an individual agent would not affect the evolution of reputations and thus
the stationary distribution,3 because we consider a continuum of agents.
cs q q be the cost suffered by a server with reputation q that is matched with a client with reputation q
(
),
Let
3 This is true for any deviation by agents of measure zero.
6
c
c
if
and follows a social strategy , i.e.,
cs q q =
s q q =
s q q =
s q q =
(
),
(
),
(
),
(
),
bs q q be the benefit received by a client with reputation q that is matched with a server with reputation q
(
),
s q q =
s q q =
bs q q =
s q q =
(
),
(
),
(
),
(
),
b
consider uniform random matching, the expected period payoff of a q -agent under social norm k before it is
matched is given by
following a social strategy s , i.e.,
. Similarly, let
. Since we
and
and
if
if
if
D
D
F
F
0
0
b
( )
q
=
v
k
å
q
Î
h
L
( )
q
b
s
(
q q
,
)
-
å
q
Î
h
L
( )
q
c
s
)
(
q q
,
.
(6)
To evaluate the long-term payoff of an agent, we use the discounted sum criterion in which the long-term payoff of
an agent is given by the expected value of the sum of discounted period payoffs from the current period. Let
)
(
q be the transition probability that a q -agent becomes a
pk q
'q -agent in the next period under social norm k .
'
Since we consider maximum punishment reputation schemes,
(
pk q
'
)
q can be expressed as
'
'
e
=
pk
(
q
q
if
q
min{
ìï -
1
ïïïï=
q
e
=
if
0,
íïïïïïî
0 otherwise,
Then we can compute the long-term payoff of an agent from the current period (before it is matched) by solving the
following recursive equations
q
for all
L
1, },
.
(7)
+
Î
)
q
'
( )
q
'
(
q
)
( )
'
q
( )
q
k
v
v
v
q
=
¥
k
¥
k
p
k
for q Î ,
+ å
d
'
q
Î
where
- is the weight that an agent puts on its future payoff. Since an agent leaves the community
a
d
b
=
)
(
1
with probability a at the end of the current period, the expected future payoff of a q -agent is given by
( )
(
)
- å
q¥
'
q
a
)
k
expected future payoff is multiplied by a common discount factor
patience, of agents.
, assuming that an agent receives zero payoff once it leaves the community. The
, which reflects the time preference, or
)0, 1
b Î
(8)
p
k
'
Î
(1
q
v
[
q
'
's under social norm k . Since the deviation of a
Now suppose that an agent deviates and uses a social strategy
single agent does not affect the stationary distribution, the expected period payoff of a deviating q -agent is given
by
( )
q
=
v
'
k s
,
å
q
Î
h
L
( )
q
b
s
(
q q
,
)
+
h
L
( )
q
c
s
'
)
(
q q
,
.
å
q
Î
(9)
'
)
(
q q be the transition probability that a q -agent using social strategy
's becomes a
'q -agent in the
Let
pk s q
,
'
,
next period under social norm k , when it is matched with a client with reputation q . For each q ,
=
while the
)
)
(
(
'
' min
'
q = with probability e if
with probability (
e- and
{
}
s q q
s q q
q
q
)
+
=
,
,
0
1
1, L
7
'
'
'
'
v
q
h
L
p
k s
,
p
k s
,
gives the transition
probabilities are reversed otherwise. Then
)
(
(
)
( )
= å
q q
q
q
q
,
q
Î
probability of a q -agent before knowing the reputation of its client, and the long-term payoff of a deviating agent
from the current period (before it is matched) can be computed by solving
( )
(
)
'
q
q
+ å
d
'
q
Î
In our model, a server decides whether to provide a service or not after it is matched with a client and observes
the reputation of the client. Hence, we check the incentive for a server to follow a social strategy at the point when
it knows the reputation of the client. Suppose that a server with reputation q is matched with a client with
reputation q . When the server follows the social strategy s prescribed by social norm k , it receives the long-term
( )
(
)
+ å
(
)
q¥
'
'
, excluding the possible benefit as a client. On the contrary, when the
payoff
d
q q
q
,
k
for q Î .
(10)
p
k s
,
( )
q
( )
q
¥
k s
,
¥
k s
,
-
c
p
k
=
k s
,
q
q
v
v
v
s
'
'
'
'
'
'
q
-
c
server deviates to a social strategy s ¢ , it receives the long-term payoff
)
( )
(
+ å
(
)
q¥
'
q q
q q
d
q
p
,
,
'
k s
s
k s
¢
,
,
q
again excluding the possible benefit as a client. By comparing these two payoffs, we can check whether a q -agent
's when it is matched with a client with reputation q .
has an incentive to deviate to
Definition 2 (Sustainable social norms) A social norm k is sustainable if
( )
(
)
(
)
(
)
å
å
'
q q
q q
q
q
,
,
s
),q q .
's , for all (
³ -
c
s
for all
)
q q
,
( )
'
q
(11)
p
k s
,
¥
k s
,
(
q
-
c
p
k
¥
k
+
+
,
q
d
d
v
v
v
q
q
¢
'
'
'
'
'
'
'
'
'
is sustainable if no agent can gain from a unilateral deviation regardless of
In words, a social norm
s
k
=
( , )L
the reputation of the client it is matched with when every other agent follows social strategy s and the reputations
are determined by the maximum punishment reputation scheme with punishment length L. Thus, under a
sustainable social norm, agents follow the prescribed social strategy in their self-interest. Checking whether a social
norm is sustainable using the above definition requires computing deviation gains from all possible social strategies,
whose computation complexity can be quite high for moderate values of L. By employing the criterion of
unimprovability in Markov decision theory [28], we establish the one-shot deviation principle for sustainable social
norms, which provides simpler conditions. For notation, let be the cost suffered by a server that takes action a ,
)
(
q q be the transition probability that a -agent becomes a
q
,
norm k when it takes action a to a client with reputation q . The values of
'q -agent in the next period under social
)
q q can be obtained in a
,
and let
apk
,
apk
,
(
q
'
'
similar way to obtain
)
(
),s q q .
q q , by comparing a with
(
pk s q
,
'
,
Lemma 2 (One-shot Deviation Principle). A social norm k is sustainable if and only if
'
)
(
q q
,
c
s
- £
c
a
d
é
ê
ê
ê
ë
å
'
q
{
p
k
'
(
q
q
)
-
p
k
a
,
'
(
q
}
)
q q
,
v
ù
( )
ú
q¥
'
ú
k
ú
û
(12)
),q q .
for all a Î , for all (
8
Proof: If social norm k is sustainable, then clearly there are no profitable one-shot deviations. We can prove
the converse by showing that, if k is not sustainable, there is at least one profitable one-shot deviation. Since
cs q q and ac are bounded, this is true by the unimprovability property in Markov decision theory [24][25]. ■
(
),
Lemma 2 shows that if an agent cannot gain by unilaterally deviating from s only in the current period and
's either, and vice versa. The left-
following s afterwards, it cannot gain by switching to any other social strategy
hand side of (12) can be interpreted as the current gain from choosing a , while the right-hand side of (12)
represents the discounted expected future loss due to the different transition probabilities induced by choosing a .
Using the one-shot deviation principle, we can derive incentive constraints that characterize sustainable social
norms.
),
(
s q q =
),q q such that
First, consider a pair of reputations (
client, it suffers the service cost of c in the current period while its reputation in the next period becomes
with probability (1
)e- and 0 with probability e . Thus, the expected long-term payoff of a q -
{
}
q +
1, L
min
agent when it provides a service is given by
. If the server with reputation q serves the
F
)
d
L
1,
-
+
+
e
)
v
min
= - +
c
(
)
ù
é
{
}
¥
¥
q
(0)
(1
( ;
V F F
ú
ê
q
k
k
û
ë
On the contrary, if a q -agent deviates and declines the service request, it avoids the cost of c in the current period
while its reputation in the next period becomes 0 with probability (1
with probability e .
)e- and
{
}
q +
1, L
min
Thus, the expected long-term payoff of a q -agent when it does not provide a service is given by
)
(
é
ù
{
}
q
(1
ê
ú
ë
û
The incentive constraint that a q -agent does not gain from a one-shot deviation is given by
V D F
( ;
q
(14)
(13)
min
e
v
)
(0)
¥
k
¥
k
e
v
e
v
=
-
+
+
1,
L
,
.
d
)
)
)
( ;
V F F
q
q³
( ;
V D F
which can be expressed as
-
¥
k
d
(1
e
2 )
{
q
min
é
v
ê
ë
),
(
s q q =
),q q such that
Now, consider a pair of reputations (
show that the incentive constraint that a q -agent does not gain from a one-shot deviation can be expressed as
(
)
{
}
q
ù
(0)
ú
û
(15)
(16)
min
e
2 )
¥
k
-
+
-
(1
-
+
³
D
1,
1,
¥
k
¥
k
L
L
d
.
v
v
c
. Using a similar argument as above, we can
)
}
(
é
v
ê
ë
.
³ -
c
ù
(0)
ú
û
for some q , we can check only the first
F
Note that (15) implies (16), and thus for q such that
(
),
s q q =
incentive constraint (15). Therefore, a social norm k is sustainable if and only if (15) holds for all q such that
(
),
(
),
s q q =
s q q =
for some q and (16) holds for all q such that
for all q . The left-hand side of the
incentive constraints (15) and (16) can be interpreted as the loss from punishment that social norm k applies to a
q -agent for not following the social strategy. Therefore, in order to induce a q -agent to provide a service to some
clients, the left-hand side should be at least as large as the service cost c , which can be interpreted as the deviation
D
F
9
gain. We use
{
}
)
(
ù
é
}
d
(0)
v
ú
ê
û
ë
cooperation under social norm k , where cooperation means providing the requested service in our context.
to measure the strength of the incentive for
min
min
{
q
(
1
¥
k
¥
k
Î
-
-
+
1,
L
)
2
e
v
q
C. Social Norm Design Problem
Since we assume that the community operates at the stationary distribution of reputations, social welfare under
social norm k can be computed by
k
( )
q
v
k
( )
q
.
U
h
L
= å
q
We assume that the community operator aims to choose a social norm that maximizes social welfare among
sustainable social norms. Then the problem of designing a social norm can be formally expressed as
( )
( )
å
q
q
q
)
(
ù
é
{
}
(
)
¥
q
e
s q q
q
v
L
such that
(0)
2 )
,
min
ú
ê
k
û
ë
)
(
ù
é
}
{
(
)
¥
s q q
q
q
³ - "
-
c
v
(0)
,
,
such that
min
.
ú
ê
k
û
ë
A social norm that solves the design problem (18) is called an optimal social norm.
U
maximize
(
)
s
L
,
d
subject to (1
d
(1
$
such that
¥
v
k
¥
k
= "
D
³ "
c
,
(18)
(17)
e
2 )
h
L
-
+
=
-
+
-
=
1,
1,
F
L
q
v
k
q
v
k
,
IV. ANALYSIS OF OPTIMAL SOCIAL NORMS
A. Optimal Value of the Design Problem
We first investigate whether there exists a sustainable social norm, i.e., whether the design problem (18) has a
s q q =
D
feasible solution. Fix the punishment length L and consider a social strategy D
Ls defined by
( , )
L
),q q . Since there is no service provided in the community when all the agents follow D
(
Ls , we have
for all
=
0
D
¥
LLv s
D
( ,
q
)( )
)D
for all q . Hence, the relevant incentive constraint (16) is satisfied for all q , and the social norm ( ,
LL s
sustainable. This shows that the design problem (18) always has a feasible solution.
is
*U be the optimal value of the design problem (18). In the
Assuming that an optimal social norm exists, let
*U .
following proposition, we study the properties of
Proposition 1. (i)
£ - .
b
c
£
0 U
*
*
U = if
(ii)
0
c
b
>
b
-
a
-
(
1
b
-
(
1
-
) (
1
a
) (
2
e
)
2
e
-
3
)
1
.
(iii)
U
*
(
³ - -
[1
1
a e
)
]
(
b
- if
)
c
c
b
£
b
(1
-
a
)(1
-
e
2 )
.
*U
(iv)
< - if
c
b
e > .
0
*U
(v)
= - if
c
b
e = and
0
c
b
£
b
(1
- .
a
)
*U
(vi)
= - only if
c
b
e = and
0
c
b
£
b
-
a
(
-
1
b
(
-
1
)
a
)
1
.
Proof: See Appendix A. ■
10
We obtain zero social welfare at myopic equilibrium, without using a social norm. Hence, we are interested in
whether we can sustain a social norm in which agents cooperate in a positive proportion of matches. In other words,
*
b c b a e that yield
U > . From Proposition 1(ii) and (iii), we can
we look for conditions on the parameters ( , ,
, )
,
0
é
ê
ë
regard /
c b
£
conditions for
c b
/
£
b
(1
-
a
*U
maximum social welfare
in the limit.
a
-
-
-
a
b
(1
-
b
(1
-
)(1
)(2
ù
é
e
2 ) / 1
ú
ê
û
ë
ù
û and /
e
c b
3 )
ú
*
U > , respectively. Moreover, when there are no report errors (i.e.,
0
ù
é
û and /
a
c b
)
) / 1
ê
ú
ë
= - , respectively. As a corollary of Proposition 1, we obtain the following results
b
c
- as necessary and sufficient conditions to achieve the
a
)
as necessary and sufficient
e = ), we can interpret
0
e
2 )
)(1
£
-
-
£
(1
(1
b
(1
-
-
b
a
b
Corollary 1. For any ( , )b c such that b
*U converges to b
c> , (i)
c- as
b ,
1
a , and
0
e , and (ii)
0
*U converges to 0 as
b ,
0
a , or
1
e
1 / 2
. ■
*U close to
Corollary 1 shows that we can design a sustainable social norm that achieves near efficiency (i.e.,
c- ) when the community conditions are good (i.e., b is close to 1, and a and e are close to 0). Moreover, it
b
suffices to use only two reputations (i.e.,
L = ) for the design of such a social norm. On the contrary, no
1
*
U = ) when the community conditions are bad (i.e., b is close to 0, a is
cooperation can be sustained (i.e.,
0
close to 1, or e is close to 1/2), as implied by Proposition 1(ii).
B. Optimal Social Strategies Given a Punishment Length
In order to obtain analytical results, we consider the design problem (18) with a fixed punishment length L ,
denoted DPL. Note that DPL has a feasible solution, namely D
Ls , for any L and that there are a finite number (total
)21
(
2 L + ) of possible social strategies given L . Therefore, DPL has an optimal solution for any L . We use
*
LU and
Ls to denote the optimal value and the optimal social strategy of DPL, respectively. We first show that increasing
*
the punishment length cannot decrease the optimal value.
Proposition 2.
'L such that
U
for all L and
'
L³ .
L
*
*
L
'
L
Proof: See Appendix B. ■
U³
Proposition 2
shows
that
*
LU
is non-decreasing
in L . Since
*
LU
£ -
b
c
, we have
*
.
U
U
U
=
=
lim
It may be the case that the incentive constraints eventually prevent the optimal
*
*
sup
¥
L
L
L
L
value from increasing with L so that the supremum is attained by some finite L . If the supremum is not attained,
the protocol designer can set an upper bound on L based on practical consideration. Now we analyze the structure
of optimal social strategies given a punishment length.
Proposition 3. Suppose that
{
}
c
b
min ln / ln ,
b
L
.
³
q
e > and
0
1a < . (i) If
*
s
L
(
)
q = for some q , then
0,
F
(
* 0,
s
L
)
q =
F
for all
11
(ii) If
q Î
{
1,
-
}
1L
,
satisfies
q
³ -
L
(
ln
c
b
)
a e
L
Y
ln ( ,
, )
-
ln
b
, where
Y
(
a e
, ,
L
)
=
(
1
-
a
L
)
+
1
L
L
a
e e
- -
-
)
)
(1
(1
(1
+
L
L
1
e e a
a
-
-
+
)
)
(1
(1
2
+
L
+
1
-
e
)
e
(19)
and
(
)
s q q = for some q , then
,
*
F
L
)
(
,
q = for some q , then
*
s
L L
F
Proof: See Appendix C. ■
(
*
s q
,
L
(iii) If
L
)
= .
F
(
*
s
L L L
,
)
= .
F
C. Illustration with L=1 and L= 2
We can represent a social strategy
Ls as an (
L
+ ´ + matrix whose ( , )
(
)
)
L
i j
1
1
-entry is given by
j
1,
- . Proposition 3 provides some structures of an optimal social strategy
1)
*
Ls in the first row and the
s -
(
L i
last column of the matrix representation, but it does not fully characterize the solution of DPL. Here we aim to
obtain the solution of DPL for
L = and 2 and analyze how it changes with the parameters. We first begin with
1
(
)
),q q , the relevant incentive
s q q =
for some (
the case of two reputations, i.e.,
,
1
(
)
s q q =
*
,
1
. By Proposition 3(i) and (iii), if
L = . In this case, if
1
constraint to sustain
s=
(1,
1
is (1
d
for
(1)
¥
k
-
³
-
F
F
k
v
c
)
é
e ¥
2 )
v
ê
k
ë
ù
(0)
ú
û
),q q , then
some (
*
*
s
s=
1
1
social strategies, only four can be optimal social strategies. These four social strategies are
= , provided that
(1, 1) F
e > and
0
(0, 1)
1a < . Hence, among the total of 16 possible
1
s
1
=
é
D F
ê
ê
F F
ê
ë
ù
ú
ú
ú
û
,
2
s
1
=
F F
D F
é
ê
ê
ê
ë
ù
ú
ú
ú
û
3
s
,
1
=
0
D
s
1
=
é
D F
ê
ê
D F
ê
ë
ù
ú
ú
ú
û
4
s
,
1
=
D
s
1
=
é
D D
ê
ê
D D
ê
ë
ù
ú
ú
ú
û
.
(20)
if 0
The following proposition specifies the optimal social strategy given the parameters.
Proposition 4. Suppose that 0
. Then
a e
< -
<
1 / 2
)
(1
ìïïïïïïïïïïïïíïïï
1
s
1
2
s
1
3
s
ïïïïïïï
1
4
s
ïïî
1
(
)11,
i
s=
2
e e
a
b
-
-
c
2 )
) (1
(1
< £
2
e e
a
b
-
-
+
b
(1
) (1
2 )
1
2
b
a
e e
-
-
c
2 )
(1
) (1
< £
2
b
a
e e
-
-
b
2 )
) (1
(1
a
a e
e
-
-
- -
(1
2 )[1
)(1
) ]
2
e e
b
a
-
-
-
) (1
1
(1
2 )
c
< <
b
a
-
)(1
b
-
1
(1
c
b
. We obtain that
b
if (1
Proof: Let
if
if
1, 2, 3, 4
b
+
(1
, for
-
-
a
)(1
1
b
i =
e
2 )
*
s
1
)(1
(1
(1
=
£
<
-
-
-
-
i
k
1.
a
b
,
a e
e
- -
(1
) ]
2 )[1
2
a
e e
-
2 )
) (1
,
(21)
e
2 ),
(
= -
1
(
= -
1
U
U
1
k
3
k
)
2
(0)
)
b
(0) (
-
b
(
-
c
h
1
h
1
c
U
),
2
k
U
),
4
k
12
(
= -
1
=
0.
h
1
h
(0)
1
)
b
(1) (
-
c
),
(22)
Since 0
< -
(1
a e
)
<
1 / 2
, we have 1
h
(0)
h<
1
(1)
. Thus, we have
U
>
U
2
k
1
k
>
U
3
k
>
U
4
k
. Also, we obtain that
v
v
¥
1
k
¥
3
k
(1)
(1)
-
-
v
v
¥
1
k
¥
3
k
(0)
(0)
=
=
¥
¥
h
-
-
v
b
v
c
(1)
(0)
),
(0)(
1
2
2
k
k
¥
¥
-
v
v
b
(0)
,
(1)
4
4
k
k
= -
b
=
0.
b
(0)(
-
c
),
h
1
(23)
v
v
v
v
-
-
>
(1)
(1)
(0)
Thus, we have
¥
¥
¥
¥
¥
¥
¥
¥
3
3
2
2
1
1
4
4
k
k
k
k
k
k
k
k
strategy that yields the highest social welfare among feasible ones, we obtain the result. ■
Proposition 4 shows that the optimal social strategy is determined by the ratio of the service cost and benefit,
1
1s can be sustained, yielding the highest social welfare
/c b . When /c b is sufficiently small, the social strategy
. By choosing the social
(0)
(0)
(0)
(1)
(1)
>
>
-
-
v
v
v
v
among the four candidate social strategies. As /c b increases, the optimal social strategy changes from
1
1s to
2
1s
to
0.8
for
b =
L = as c varies. The parameters we
1
4
3
1s . Fig 2 shows the optimal social strategies with
1s and eventually to
,
,
use to obtain the results in the figures of this paper are set as follows unless otherwise stated:
a =
0.1
b = . Fig 2(a) plots the incentive for cooperation of the four social strategies. We can find the
, and
e =
10
0.2
region of c in which each strategy is sustained by comparing the incentive for cooperation with the service cost c
1
2
3
4
1s ,
1s , and
1s , and with c- for
1s . The solid portion of the lines indicates that the strategy is sustained
while the dashed portion indicates that the strategy is not sustained. Fig 2(b) plots the social welfare of the four
candidate strategies, with solid and dashed portions having the same meanings. The triangle-marked line represents
the optimal value, which takes the maximum of the social welfare of all sustained strategies.
L = . In order to provide a partial characterization of the
Next, we analyze the case of three reputations, i.e.
2
*
2s , we introduce the following notation. Let #
2s be the social strategy with
L = that
2
2G + be the set of
¥
¥
¥
¥
L = . Let
among all the social strategies with
-
-
2
k
k
k
k
all social strategies that satisfy the incentive constraints of DP2 for some parameters ( , ,
b c b a e satisfying
e > ,
0
, )
,
2s + be the social strategy that maximizes
2G + . Lastly, define a social strategy B
B
=
Ls by
s
D
L L
(
- as defined in Appendix A. Let
e
)
1a < , and (24) below with
optimal social strategy
maximizes min{
v
(0)}
1, 0)
(0),
(2)
(1)
(
1
-
=
g
d
v
v
v
social welfare U k among all the social strategies in
s q q =
B
and
.
for all ( , )
q q ¹ -
(
L
F
( , )
L
Proposition 5. Suppose that
1a < , and
e > ,
0
1, 0)
c
b
<
(2) 1
(1)
g
-
g
b
< .
c
(24)
(i) #
s
2
0
D
s=
2
. (ii) If 2
h
(0)
h<
2
(2)
, then
+ =
s
2
B
s
2
h
2
h
2
.
Proof: (i) Let
k
)D
0
s=
(2,
2
. Then
v
¥
k
(1)
-
v
¥
k
(0)
=
v
¥
k
(2)
-
v
¥
k
(0)
= . We can show that, under the given
b
conditions, any change from
0
Ds
2
results in a decrease in the value of
v
¥
k
(1)
¥-
v
k
(0)
, which proves that
0
Ds
2
maximizes min{
v
¥
k
(1)
-
v
¥
k
(0),
v
¥
k
(2)
-
v
¥
k
(0)}
.
13
F
=
v
v
¥
k
-
v
-
v
¥
k
¥
k
(1)
(2)
(0)
(0)
q =
0, 1, 2
(ii) Since
e > and
0
constraints, and thus
, and thus replacing D with F in an element of
1a < , we have 2 ( )
h q > for all
0
a social strategy always improves social welfare. Hence, we first consider the social strategy F
Ls defined by
s q q =
for all ( , )q q .
F
Fs maximizes social welfare U k among all the social strategies with
L = , but
( , )
2
L
2
¥
Fs satisfies the incentive
= . Thus, we cannot find parameters such that
0
k
2
G +Ï
. Now consider social strategies in which there is exactly one D element. We can
Fs
2
2
q >
at ( , )q q such that
s q q =
show that, under the given conditions, having 2 ( , ) D
s q q =
q =
at ( , )q q such that
¥-
¥
whereas having 2 ( , ) D
yields both
v
0
k
k
q >
strategy having the only D element at ( , )q q such that
, there do not exist parameters in the considered
[
]
e ¥
¥
parameter space with which the incentive constraint for 0-agents,
d
-
-
v
v
2 )
(0)
(1
(1)
k
k
q =
the other hand, for any social strategy having the only D element at ( , )q q such that
incentive constraints by choosing
, and c sufficiently close to 0. This shows that, among
1a < ,
b > ,
0
2G + . Since
Bs achieves the highest social welfare among the three candidate social strategies. ■
,
h
h
<
<
(1)
(0)
(2)
2
2
2
Let us try to better understand now what the conditions in Proposition 5 mean. Proposition 5(i) implies that the
maximum incentive for cooperation that can be achieved with three reputations is
. Hence,
b
a
e
-
-
2 )b
)(1
(1
the social strategies having exactly one D element, only those having D in the first column belong to
¥
¥-
v
k
k
> and . Thus, for any social
0
, we can satisfy both
³ , is satisfied. On
c
yields
< ,
0
1 / 2
e <
(0)
(0)
(1)
(1)
h
2
0
0
0
v
v
cooperation can be sustained with
L = if and only if (1
b
2
-
a
)(1
-
e
2 )b
³ . That is, if /
c
c b
>
b
(1
-
a
)(1
-
e
2 )
,
then
Ds is the only feasible social strategy and thus
*
U = . Hence, when we increase c while holding other
0
2
2
parameters fixed, we can expect that
Ds
Ds around
*
2s changes from
2
2
same is observed with
converges to 1 as a
L = in Proposition 4. We can see that [
1
t
t
goes to 0 and b goes to 1. Hence, for given values of b , c , and e , the condition (24) is satisfied and thus some
cooperation can be sustained if a and b are sufficiently close to 0 and 1, respectively.
. Note that the
(1)][(1
g
) / ]
a
)(1
(2) /
e
2 )
b
to
(1
-
=
-
-
b
g
h
h
c
0
Consider a social norm
k
)B
s=
(2,
2
. We obtain that
min{
v
and
U
k
ae
(
ç= - -
1
1
ç
çè
a
-
(1)
¥
k
3
) (
1
-
v
¥
k
)
e e
v
(0),
ö÷
(
-÷
b
÷
ø
2
¥
k
(2)
-
v
¥
k
(0)}
=
v
¥
k
(2)
-
v
¥
k
(0)
= -
(1
2
a
) (1
-
e e
) (
b
-
b
c
)
(25)
)
c
. Since
2G + is the set of all feasible social strategies with
L = for some
2
parameters in the considered parameter space, we can interpret Proposition 5(ii) as stating that
*
s
2
B
s=
2
when the
community conditions are “favorable.” More precisely, we have
*
s
2
B
s=
2
if
(1
-
a
2
) (1
-
e e
b
) (
-
b
c
)
³ , or
c
c
b
£
b
+
-
(1
2
b
(1
3
a
-
) (1
3
a
-
) (1
e
-
2 )(1
e
-
2 )(1
e e
)
e e
-
)
1
.
(26)
14
Also, Proposition 5(ii) implies that
U
*
2
ae
(
ç£ - -
1
1
ç
çè
a
3
) (
1
-
)
e e
2
ö÷
(
-÷
b
÷
ø
)
c
as long as the parameters remain in
the considered parameter space.
In Fig 3, we show the optimal value and the optimal social strategy of DP2 as we vary c . The optimal social
*
Ds as c increases:
2s changes in the following order before becoming 2
strategy
=
=
,
1
s
2
=
,
2
s
2
,
3
s
2
ù
ù
é
é
ù
é
F F F
D F F
D F F
ú
ú
ê
ê
ú
ê
ú
ú
ê
ú
ê
ê
D F F
D F F
F F F
ú
ú
ê
ê
ú
ê
ú
ú
ê
ê
ú
ê
F F F
F F F
F F F
ú
ú
ê
ê
ú
ê
û
ë
û
û
ë
ë
ù
ù
ù
ù
é
é
é
é
D F F
D F F
F F F
F F F
ú
ú
ú
ú
ê
ê
ê
ê
ú
ú
ú
ú
ê
ê
ê
ê
D F F
D F F
F F F
F F F
ú
ú
ú
ú
ê
ê
ê
ê
ú
ú
ú
ú
ê
ê
ê
ê
D F F
D F F
D F F
D F F
ú
ê
ê
ê
ú
ú
ú
ê
ë
û
ë
ë
û
û
û
ë
1
7
B
D
for large c (but not too large to sustain cooperation), which are
for small c and
s
s=
s
s=
2
2
2
2
consistent with the discussion about Proposition 5. For the intermediate values of c , only the elements in the first
column change in order to increase the incentive for cooperation. We find that the order of the optimal social
Note that
(27)
,
5
s
2
,
6
s
2
,
7
s
2
4
s
2
=
.
=
=
=
0
strategies between
1
s
2
B
s=
2
and
s
7
2
D
s=
2
0
depends on the community’s parameters ( ,
b b a e .
, )
,
V. EXTENSIONS
A. Reputation Schemes with Shorter Punishment Length
So far we have focused on maximum punishment reputation schemes under which any deviation in reported
actions results in the reputation of 0. Although this class of reputation schemes is simple in that a reputation
scheme can be identified with the number of reputations, it may not yield the highest social welfare among all
e = , an agent
possible reputation schemes when there are report errors. When there is no report error, i.e.,
0
maintains reputation L as long as it follows the prescribed social strategy. Thus, in this case, punishment exists
only as a threat and it does not result in an efficiency loss. On the contrary, when
e > and
1a < , there exist a
0
positive proportion of agents with reputations 0 to
1L - in the stationary distribution even if all the agents follow
the social strategy. Thus, there is a tension between efficiency and incentive. In order to sustain a social norm, we
need to provide a strong punishment so that agents do not gain by deviation. At the same time, too severe a
punishment reduces social welfare. This observation suggests that, in the presence of report errors, it is optimal to
provide incentives just enough to prevent deviations. If we can provide a weaker punishment while sustaining the
same social strategy, it will improve social welfare. One way to provide a weaker punishment is to use a random
punishment. For example, we can consider a reputation scheme under which the reputation of a q -agent becomes 0
in the next period with probability
and remains the same with probability 1
q q- when it reportedly
q q Î
(0, 1]
deviates from the social strategy. By varying the punishment probability q q for q -agents, we can adjust the
severity of the punishment applied to q -agents. This class of reputation schemes can be identified by . Maximum
q q = for all q .
punishment reputation schemes can be considered as a special case where
1
15
Another way to provide a weaker punishment is to use a smaller punishment length, denoted M . Under the
reputation scheme with (
L + reputations and punishment length M , reputations are updated by
1)
.
R
R
R
a
)
+
=
-
¹
M
{
q
(28)
(
t q q
,
,
}
if a
, 0
if a
L
1, }
)
(
s q q
,
,
(
)
s q q
,
ìï
q
min{
ïï= íï
max
ïïî
When a q -agent reportedly deviates from the social strategy, its reputation is reduced by M in the next period if
Mq ³ and becomes 0 otherwise. Note that this reputation scheme is analogous to real-world reputation schemes
for credit rating and auto insurance risk rating. This class of reputation schemes can be identified by ( ,
L M with
)
£ £ .4 Maximum punishment reputation schemes can be considered as a special case where M L= .
1 M L
In this paper, we focus on the second approach to investigate the impacts of the punishment length on the social
{
}
é
ù
{
{
}
(
)
}
q
q
d
v
, 0 )
1
)
min
ú
ê
ë
û
q
L M s . The punishment length M affects the evolution of the reputation
social norm k , which is now defined as ( ,
, )
{
}
L
( )
h
q
( ,
L M
q
L M ,
distribution, and the stationary distribution of reputations with the reputation scheme ( ,
)
welfare U k and the incentive for cooperation
of a
(max
(min
¥
k
¥
k
e
2
M
+
-
-
-
1,
=
1
L
,
v
)
satisfies the following equations:
( )
0
( )
q
( )
q
( )
L
(
= -
1
(
= -
1
(
= -
1
(
= -
1
M
)
å
a e
q
=
0
) (
a
-
1
) (
a
-
1
) (
a
-
1
)
( )
q
,
(
(
h
( ,
L M
)
e h
( ,
L M
)
e h
( ,
L M
{
)
e h
( ,
L M
)
)
)
(
)
)
(
)
q
q
a eh
-
-
+
M
1 + 1
for 1
( ,
)
L M
)
q
q
-
- + £ £ -
L M
L
1
1 for
1,
}
)
( )
(
a
h
+
+
-
L
L
.
1
( ,
L M
)
q
£ £ -
L M
,
(29)
h
( ,
L M
)
)
)
h
( ,
L M
h
( ,
L M
h
( ,
L M
}
L
( )
q
q
)
)
)
)
)
=
1
=
1
for
Let
for
( )
q
( )
k
h
L M
( ,
m
L M
( ,
, i.e.,
}
L
( )
q
q
{
h
L M
( ,
{
m
L M
( ,
be the cumulative distribution of
q = . Fig 4 plots the stationary distribution
, L
0,
q
= å
=
k
0
{
}
{
}
L
L
( )
( )
m
h
q
q
L M
L M
( ,
( ,
q
q
=
=
1
1
L = and
M = . We can see that the cumulative distribution monotonically decreases with M , i.e.
1,
, 5
5
( )
( )
q
q
1
2
agents holding a lower reputation. As a result, when the community adopts a social strategy that treats an agent
with a higher reputation better, increasing the punishment length reduces social welfare while it increases the
incentive for cooperation. This trade-off is illustrated in Fig 5, which plots social welfare and the incentive for
, where the social strategy C
Ls is defined by
. This shows that, as the punishment length increases, there are more
cooperation under a social norm
and its cumulative distribution
for all q if
)CM s
,
3
M M>
1
m
L M
( ,
m
L M
( ,
M =
1, 2, 3
for
(3,
£
2
)
)
)
)
C
s
L
(
),
q q =
q³
if and only if q
F
, for all q .
4 We can further generalize this class by having the punishment length depend on the reputation. That is, when a q -agent reportedly deviates from the
social strategy, its reputation is reduced to
in the next period for some M q
q£ .
q -
M q
16
p
k
-
M
'
'
)
)
=
1
'
q
(
q
)
(30)
Î
.
. Agents’ long-term
can be computed by (6), with the modification of the stationary distribution to
In general, the social strategy adopted in the community is determined together with the reputation scheme in
order to maximize social welfare while satisfying the incentive constraints. The design problem with variable
punishment lengths can be formulated as follows. First, note that the expected period payoff of a q -agent,
vk q ,
( )
{
}
L
( )
h
q
L M
( ,
q
payoffs can be obtained by solving (8), with the transition probabilities now given by
ìï -
{
}
q
e
q
=
+
L
1,
1
if
min
,
ïïïï=
{
}
q
q
e
q
=
-
M
, 0 , for all
if
max
íïïïïïî
0 otherwise,
Finally, the design problem can be written as
( )
å
q
h
U
maximize
L M
( ,
(
)
s
L M
,
,
q
(
é
)
(
¥
¥
d
e
q
-
-
+
v
v
L
min{
2 )
max
subject to (1
1, }
ê
k
k
ë
(
)
s q q
q
q
=
"
$
such that
such that
,
(
é
)
(
¥
¥
d
q
e
+
-
-
v
v
L
(1
min{
2 )
max
1, }
ê
k
k
ë
(
)
q
q
s q q
"
= "
.D
,
such that
, and plot the
L = and
L M for
We find the optimal social strategy given a reputation scheme ( ,
M =
)
1, 2, 3
3
social welfare and the incentive for cooperation of the optimal social strategies in Fig 6. Since different values of
M induce different optimal social strategies given the value of L , there are no monotonic relationships between
the punishment length and social welfare as well as the incentive for cooperation, unlike in Fig 5. The optimal
punishment length given L can be obtained by taking the punishment length that yields the highest social welfare,
which is plotted in Fig 7. We can see that, as the service cost c increases, the optimal punishment length increases
from 1 to 2 to 3 before cooperation becomes no longer sustainable. This result is intuitive in that larger c requires a
stronger incentive for cooperation, which can be achieved by having a larger punishment length.
{
q
F
,
{
q
)
ù
}
, 0
ú
û
)
ù
}
, 0
ú
û
³ -
c
,
(31)
( )
q
v
k
=
k
-
M
³
c
,
B. Whitewash-Proof Social Norms
So far we have restricted our attention to reputation schemes where newly joining agents are endowed with the
highest reputation, i.e., K L= , without worrying about the possibility of whitewashing. We now make the initial
reputation K as a choice variable of the design problem while assuming that agents can whitewash their reputations
in order to obtain reputation K [15]. At the end of each period, agents can decide whether to whitewash their
reputations or not after observing their reputations for the next period. If an agent chooses to whitewash its
reputation, then it leaves and rejoins the community with a fraction of agents and receives initial reputation K .
wc ³ .
The cost of whitewashing is denoted by
0
The incentive constraints in the design problem (18) are aimed at preventing agents from deviating from the
prescribed social strategy. In the presence of potential whitewashing attempts, we need additional incentive
constraints to prevent agents from whitewashing their reputations. A social norm k is whitewash-proof if and only
17
if
¥
v K
(
k
)
¥-
k q
v
( )
£ for all
c
w
q = . 5 Note that
, L
0,
¥
v K
(
k
)
¥-
k q
v
( )
is the gain from whitewashing for an
)
)
q Q
Î
max
)
-
v
¥
v K
(
k
¥-
k q
v
( )
. A social
)L K with 0 K L
£ £ . Let
( ,
agent whose reputation is updated as q . If
agent. We measure the incentive for whitewashing under a social norm k by
£ , there is no net gain from whitewashing for a q -
c
w
{
}
¥
¥
k q
v K
( )
(
k
norm is more effective in preventing whitewashing as the incentive for whitewashing is smaller.
To simplify our analysis, we fix the punishment length at M L= so that a reputation scheme is represented by
{
}
L
( )
h
q
L K
( ,
q
=
1
)L K . Then the design problem is modified as
( ,
å
q
é
¥
e
v
2 )
ê
k
ë
é
¥
q
e
d
v
2 )
(min{
(1
ê
k
ë
¥-
¥
k q
v
v K
c
( )
(
k
w
Now an optimal social norm is the one that maximizes social welfare among sustainable and whitewash-proof
(
)
q
s q q
such that
,
(
)
s q q
q
,
such that
,
be the stationary distribution of reputations under reputation scheme
U
maximize
(
)
s
L K
,
,
d
subject to (1
ù
(0)
ú
û
ù
³ - "
c
(0)
,
ú
û
L
1, })
q
.
$
such that
¥
v
k
¥
k
³ "
c
,
q
q
(min{
= "
D
+
L
1, })
-
(32)
=
F
,
h
L K
( ,
)
q
v
( )
k
q
( )
=
k
£
"
,
-
-
+
-
v
q
)
social norms. Note that the design problem (32) always has a feasible solution for any
)D
wc ³ since ( ,
L K s
0
,
L
is
sustainable and whitewash-proof for all ( ,
)L K .
Proposition 6. If
c
w
Proof: Since
- £
c
v
³
-
1
( )
k q
+
b
c
a
-
)(1
(1
b
-
e
)
, then every social norm is whitewash-proof.
£ for all q , we have
b
v
k
( )
q
-
v
k
( )'
q
£ + for all q and q ¢ . Hence, by (37),
c
b
v
¥
k
q
( )
-
v
¢
q
( )
=
¥
k
-
L
1
å
=
l
0
l
g
é
v
ê
ë
k
(
q
min{
+
)
l L
, }
-
v
k
q
(min{
¢
+
ù
l L
, })
ú
û
£
b
1
+
-
c
g
.
(33)
c
) / (1
³ +
b
(
Therefore, if
wc
Now we investigate the impacts of the initial reputation K on social welfare and the incentive for whitewashing.
We first consider the case where the social strategy is fixed. Fig 8 plots social welfare and the incentive for
L K s . ■
- , the whitewash-proof constraint is satisfied for any choice of ( ,
g
, )
)
(3,
for
whitewashing under a social norm
K = . We can see that larger K yields higher social
0,
, 3
)CK s
,
3
welfare and at the same time a larger incentive for whitewashing since new agents are treated better. Hence, there is
a trade-off between efficiency and whitewash-proofness as we increase K while fixing the social strategy. Next we
)L K . Fig 9 plots social welfare and the incentive
consider the optimal social strategy given a reputation scheme ( ,
K = . We can see that giving the highest
L = and
for whitewashing under the optimal social strategy for
, 3
0,
3
reputation to new agents (
3K = ) yields the highest social welfare but it can prevent whitewashing only for small
5 This condition assumes that an agent can whitewash its reputation only once in its lifespan in the community. More generally, we can consider the case
where an agent can whitewash its reputation multiple times. For example, an agent can use a deterministic stationary decision rule for whitewashing, which
, where
w q = (resp.
w q = ) means that the agent whitewashes (resp. does not whitewash) its
can be represented by a function
w
( )
0
( )
1
:
{0, 1}
reputation if it holds reputation q in the next period. This will yield a different expression for the gain from whitewashing.
18
3K = is optimal only for small c , and optimal K drops
values of c . With our parameter specification, choosing
to 0 for other values of c with which some cooperation can be sustained. Fig 10 plots the optimal initial reputation
*K as we vary the whitewashing cost wc , for
. As wc increases, the incentive constraints for
*K is non-decreasing in wc . On the other hand, as c increases, it
whitewashing becomes less binding, and thus
)
(
L
1, }
becomes more difficult to sustain cooperation while the difference between
q
min{
and
1, 2, 3
¥
vk
c =
( )0
+
v
¥
k
s q q =
increases for all q such that ( , ) F
for some q . As a result,
*K is non-increasing in c .
VI.
ILLUSTRATIVE EXAMPLE
In this section, we present numerical results to illustrate in detail the performance of optimal social norms.
b = ), the cost per
Unless stated otherwise, the setting of the community is as follows: the benefit per service (
10
service (
c = ), the discount factor (
), the turnover rate (
), the report error (
), the
b =
a =
e =
0.8
0.2
0.1
1
punishment step ( M L= ), and the initial reputation ( K L= ). Since the number of all possible social strategies
given a punishment length L increases exponentially with L , it takes a long time to compute the optimal social
(
)*
s
, LL
We first compare the performances of the optimal social norm and the fixed social norm for
strategy even for a moderate value of L . Hence, we consider social norms
. For
1, 2, 3
1, 2, 3
for
L =
L =
=
k
.
When c is small,
. As it shows, the optimal social norm
)C
each L , we use ( ,
as the example of the fixed social norm. Fig 11 illustrates the results, with the red bar
LL s
representing the pareto optimal value b
c- , i.e., the highest social welfare that can be possibly sustained by a
social norm, the black bar representing the social welfare of the optimal social norm, and the yellow bar
)C
*
)LL s outperforms ( ,
LL s
( ,
. When c is sufficiently large such that no
)C
representing the social welfare of ( ,
LL s
)C
*
)LL s delivers higher social welfare than ( ,
LL s
( ,
)C
*
cooperation can be sustained under ( ,
)LL s .
, a positive level of cooperation can still be sustained under
LL s
( ,
Next, we analyze the impacts of the community’s parameters on the performance of optimal social norms.
Impact of the Discount Factor: We discuss the impact of the discount factor b on the performance of optimal
social norms. As b increases, an agent puts a higher weight on its future payoff relative to its instant payoff. Hence,
with larger b , it is easier to sustain cooperation using future reward and punishment through a social norm. This is
.
illustrated in Fig 12(a), which shows that social welfare is non-decreasing in b .
Impact of the Turnover Rate: Increasing a has two opposite effects on social welfare. As a increases, the
weight on the future payoffs,
- , decreases, and thus it becomes more difficult to sustain cooperation.
a
b
d
=
)
(
1
On the other hand, as a increases, there are more agents holding the highest reputation given the restriction
K L= . In general, agents with the highest reputation are treated well under optimal social strategies, which
implies a positive effect of increasing a on social welfare. From Fig 12(b), we can see that, when a is large, the
first effect is dominant, making cooperation not sustainable. We can also see that the second effect is dominant for
19
the values of a with which cooperation can be sustained, yielding an increasing tendency of social welfare with
respect to a .
Impact of the Report Errors: As e increases, it becomes more difficult to sustain cooperation because reward
and punishment provided by a social norm becomes more random. At the same time, larger e increases the
fraction of 0 -agents in the stationary distribution, which usually receive the lowest long-term payoff among all
reputations. Therefore, we can expect that optimal social welfare has a non-increasing tendency with respect to e ,
as illustrated in Fig 12(c). When e is sufficiently close to 1/2, D
Ls is the only sustainable social strategy and social
welfare falls to 0 . On the other direction, as e approaches 0, social welfare converges to its upper bound b
c- ,
regardless of the punishment length, as can be seen from Proposition 1(iii). We can also observe from Fig 12 that
*
the regions of a and e where some cooperation can be sustained (i.e.,
LU > ) become wider as L increases,
0
whereas that of b is independent of L .
VII. CONCLUSIONS
In this paper, we used the idea of social norms to establish a rigorous framework for the design and analysis of a
class of incentive schemes to sustain cooperation in online social communities. We derived conditions for
sustainable social norms, under which no agent gains by deviating from the prescribed social strategy. We
formulated the problem of designing an optimal social norm and characterized optimal social welfare and optimal
social strategies given parameters. We also discussed the impacts of punishment lengths and whitewashing
possibility on the design and performance of optimal social norms, identifying a trade-off between efficiency and
incentives. Lastly, we presented numerical results to illustrate the impacts of the discount factor, the turnover rate,
and the probability of report errors on the performance of optimal social norms. Our framework will provide a
foundation of incentive schemes to be deployed in real-world communities, encouraging cooperation among
anonymous, self-interested individuals.
APPENDIX A
PROOF OF PROPOSITION 1
(i)
*
U ³ follows by noting that ( ,
LL s
)D
0
)
( )
( )
(
q h
s q q
q
(
,
L
å
q q h
)
L
,
=
F
c
I
)
= -
b
(
U
k
is feasible. Note that the objective function can be rewritten as
, where I is an indicator function. Hence, U
k £ - for all k ,
b
c
*U
which implies
£ - .
b
c
(ii) By (8), we can express
v
¥
k
( )
1
¥-
v
k
( )
0
as
=
=
v
k
v
k
Similarly, we have
( )
1
-
v
k
( )
0
+
d
v
¥
k
( )
1
-
¥
v
k
[
(
1
( )
0
-
e
)
( )
1
+
d
v
¥
k
(
1
( )
2
-
e
+
[
v
)
e
v
¥
k
-
d
[
(
1
-
e
)
v
¥
k
( )
1
+
e
v
¥
k
]
( )
0
(34)
¥
k
( )
2
]
( )
0
-
v
-
v
¥
k
( )
0
k
]
( )
1 .
20
v
¥
k
( )
2
-
v
¥
k
( )
1
=
v
k
( )
2
-
v
k
( )
1
+
d
(
1
-
e
)
[
v
¥
k
( )
3
-
v
¥
k
]
( )
2 ,
v
¥
k
)
(
- -
L
1
¥
( )
-
L
k
v
v
¥
k
¥
v
k
(
L
(
L
)
- =
2
)
- =
1
)
(
(
- -
v L
v L
1
k
k
( )
(
-
-
v L
v L
k
k
)
- +
2
)
1 .
d
(
1
-
e
)
[
v
¥
k
( )
L
-
v
¥
k
(
L
-
]
)
1 ,
(35)
v
¥
k
( )
q
-
v
¥
k
(
q
)
- =
1
q
-
L
å
=
l
0
l
g
[
v
k
(
q
)
+ -
l
v
k
(
q
+ -
l
]
)
1 ,
(36)
In general, for
q = ¼ ,
, L
1,
where we define
g
=
- . Thus, we obtain
e
d
)
(
1
¥
¥
q
-
v
v
( )
(0)
k
k
(0)
q
( )
q
(
+
g
=
v
-
q
- +
1
L
v
k
[
v L
( )
k
k
g
-
+
[
v
k
v L
(
k
+ -
1)
]
+ +
v
(1)
k
]
q
- + + +
1)
g
L
-
1
L
q
-
[
g
v L
( )
k
[
-
v L
( )
k
v L
(
k
-
v L
(
k
-
-
]
1)
q
]
)
(37)
=
-
L
1
å
=
l
0
l
g
é
v
ë
k
(
q
min{
+
)
l L
, }
-
ù
v l
( ) ,
û
k
for
q = ¼ .
, L
1,
Since
- £
c
v
k q
( )
£ for all q , we have
b
v
q
( )
k
q-
v
( )
k
£ +
b
c
for all ( , )q q . Hence, by (37),
v
¥
k
q
( )
-
v
¥
k
(0)
£
L
g
-
1
g
-
1
b
(
+ £
c
)
b
1
+
-
c
g
(38)
for all
q = ¼ , for all
, L
1,
k
=
s
( , )L
. Therefore, if
d
(1
-
e
b
2 )[(
+
c
) / (1
-
g
)]
< , or equivalently,
c
c b
/
>
b
[ (1
-
a
)(1
-
e
2 )] / [1
-
b
(1
-
a
)(2
-
e
3 )]
for any social norm ( , )L s . This implies that any social strategy s such that
, then the incentive constraint (15) cannot be satisfied for any q ,
),
(
for some (
),q q is not
s q q =
F
*
feasible, and thus
U = .
0
(iii) For any L , define a social strategy
Ls by
0D
s
D
L
0
(
)
q q =
,
D
for
q =
0
and
0
s
D
L
(
)
q q =
,
F
for all
q >
0
,
for all q . In other words, with
Ls each agent declines the service request of 0-agents while providing a service to
0D
other agents. Consider a social norm
. Hence,
and
. Then
c
(1)
(0)
(1)
k
v
v
s=
0
)D
(1,
1
and
v
¥
k
(1)
¥-
v
k
(0)
=
b
,
constraint
k
c
(1)
h= -
1
thus
and
k
the
= -
b
h
1
incentive
³ is satisfied by the hypothesis /
c b
c
£
b
(1
-
a
)(1
-
e
2 )
. Since there exists a
d
U
k
(
1
a e
-
= - -
c
b
)
) ](
[1
(1
(
)
)
( )
( )
e ¥
v
0
1
k
feasible solution that achieves
U
¥
k
-
-
2
v
[
= - -
(1
1
]
a e
b
) (
- , we have
U
c
)
*
[
³ - -
(1
1
]
a e
b
) (
- .
c
)
k
*U
(iv) Suppose, on the contrary to the conclusion, that
= - . If
b
c
a = , then (15) cannot be satisfied for any
1
*
q , for any k , which implies
U = . Hence, it must be the case that
0
social norm that achieves
*U
= - . Since
c
b
e > and
0
1a < ,
21
*
k
=
*
L
(
1a < . Let
( )
q > for all q by (4). Since
0
be an optimal
s
)
,
*
h
*
L
*
U
=
U
*
k
= -
b
(
c
å
)
q q
,
h
*
L
( )
q h
*
L
( )
q
I
)
(
*
s q q
,
(
=
F
)
,
*s should have
(
)
s q q =
*
,
F
),q q . However,
for all (
under this social strategy, all the agents are treated equally, and thus
¥
¥
*
v L
(
*
*
k
k
satisfy the relevant incentive constraint (15) for all q since the left-hand side of (15) is zero, which contradicts the
optimality of (
)
*
*
,L s .
(v) The result can be obtained by combining (i) and (iii).
*s cannot
. Then
= =
(0)
v
)
*U
(vi) Suppose that
*U
= - , and let ( , )L s be an optimal social norm that achieves
b
c
= - . By (iv), we
b
c
obtain
e = . Then by (4),
0
Lh q = for all 0
( )
0
q£ £ - and
1L
L Lh
( )
= . Hence, s should have ( , )L L
s
1
=
F
in order to attain
*U
= - . Since
b
c
( )
v L
k
= - and
b
c
v
k q ³ - for all 0
( )
c
q£ £ - , we have
1L
v
¥
k
( )
L
¥-
v
k
( )0
£
b
/ (1
-
g
)
by (37). If
d
b
/ (1
d- < , then the incentive constraint for L -agents,
c
)
d ¥
v L
[
( )
k
¥-
v
k
(0)]
³ , cannot be satisfied. Therefore, we obtain /
c b
c
£
d
/ (1
- . ■
d
)
APPENDIX B
PROOF OF PROPOSITION 2
Choose an arbitrary L . To prove the result, we will construct a social strategy
1Ls + using punishment length
*
1L + that is feasible and achieves
LU . Define
1Ls + by
s
L
+
1
(
)
q q
,
q
for
)
(
ìï
*
s q q
q
for
,
ïïïïï
L
)
(
*
s
q
L
,
ïï= íï
L
*
)
s q
(
,
ïïïïï
L
*
s
ïïî
L
q
for
q
for
(
L L
,
L
)
£
L
£
q
and
L
,
q
1 and
q
and
= +
L
£
L
1,
= +
L
q
1 and
= +
L
= +
L
£
L
,
(39)
1.
k
=
Let
(
)*
s
, LL
(
( )
h
++
L
L
L
1
q = and
, L
0,
h
L
+
1
'
k
and
(
= +
L
( )
)
+ =
L
1
)
( )
+ =
v Lk
1
h
L
(
v L
'
k
. Hence, we have that
s +
1, L
1
)
. From (4), we have
h
+
1L
( )
q
=
h
L
( )
q
for
q =
0,
-
1L
,
and
. Using this and (6), it is straightforward to see that
( )
k q
'v
=
vk
( )
q
for all
U
'
k
=
=
=
+
L
1
å
q
=
0
-
L
1
å
q
=
0
-
L
1
å
q
=
0
h
L
+
1
( )
q
h
L
( )
q
v
k
v
'
k
( )
q
( )
q
+
h
L
( )
q
v
k
( )
q
+
+
1
=
h
L
-
L
1
å
q
=
0
+
L
1
å
h
L
q
=
L
( )
( )
h
L v L
k
L
( )
q
+
1
( )
q
( )
q
v
'
k
( )
v L
k
+
+
L
1
å
q
=
L
h
L
+
1
( )
q
v
'
k
( )
q
(40)
=
U
k
=
U
*
L
.
22
Using
(37), we
can
show
that
v
¥
'
k
q
( )
-
v
¥
'
k
(0)
=
v
¥
k
q
( )
-
v
¥
k
(0)
for
all
q =
1,
, L
and
¥
v L
(
'
k
+ -
1)
v
¥
'
k
(0)
=
¥
v L
( )
k
-
v
¥
k
(0)
. By the definition of
1Ls + , the right-hand side of the relevant incentive
constraint (i.e., c or c- ) for each
q = is the same both under
, L
0,
*
Ls and under
1Ls + . Also, under
1Ls + , the
right-hand side of the relevant incentive constraint for
q = + is the same as that for
1L
q = . Therefore,
L
1Ls +
satisfies the relevant incentive constraints for all
q =
0,
+
1L
,
. ■
APPENDIX C
PROOF OF PROPOSITION 3
To facilitate the proof, we define
uk q¥
( )
by
u
¥
k
( )
q
=
¥
å
=
l
0
l
g
v
k
(
min
{
q
+
l L
,
)
}
(41)
for
q = . Then, by (37), we have
, L
0,
v
¥
k
q
( )
-
v
¥
k
(0)
=
u
¥
k
q
( )
-
u
¥
k
(0)
for all
q = . Thus, we can use
, L
1,
u
q¥
( )
k
¥-
u
k
(0)
q¥
( )
k
¥-
v
k
(0)
in the incentive constraints of DPL.
instead of
v
)
(
0,
q =
*
s
L
Suppose that
F
for some q . Then the relevant incentive constraint for a 0-agent is
d
(1
-
é
e ¥
u
2 )
ê
k
ë
(1)
-
u
¥
k
ù
(0)
ú
û
³
c
. Suppose that
(
* 0,
s
L
)
q = for some
D
q Î
{
1,
-
}
1L
,
such that
q
³
c
ln / ln
b
b
.
Consider a social strategy
'
Ls defined by
)
(
'
s q q
,
L
ìï
)
(
(
)
*
q q
s q q
,
for
,
ïï= íï
L
)
(
q q
F
,
for
ïïî
¹
=
That is,
'
Ls is the social strategy that differs from
v
k
' (0)
-
v
k
(0)
h
= -
t
U
'
k
-
U
k
=
h
L
h
(0)
L
( )
q
( )
q
c
<
0
and
v
( )
k q
'
-
v
b
(
- > . Also,
c
)
0
)0, q . Let
Ls only at (
*
( )
q
=
h
t
k
( )
0
b
>
0
(
q
0,
(
q
0,
)
,
)
.
(
)*
s
, LL
since
e >
=
k
(42)
and
'
k
=
0
and
(
)
'
s
, LL
1a <
. Note that
. Thus,
u
¥
'
k
( )
q
-
u
¥
k
( )
q
q
ìï
( )
( )
q
g
q
-
+
-
v
v
v
v
]
[
(0)
(0)]
[
ïïïï
k
k
'
'
k
k
q
q
q
+
1
e e b
a
q
=
= -
-
-
b
c
0,
)
(1
] for
)
[
(1
ïï
= íï
( )
( )
q
q
-
q
q
g
q
q
= ¼
-
v
v
1,
] for
[
,
,
ïïïï
k
'
k
q
q
= + ¼
1,
0 for
ïîï
,
L
.
(43)
Since
q
³
c
ln / ln
b
b
, we have
u
¥
( )
' 0
k
¥-
uk
( )
0
£ . Thus,
0
u
¥
'
k
q
( )
-
u
¥
'
k
(0)
³
u
¥
k
q
( )
-
u
¥
k
(0)
for all
23
q = . Since
, L
1,
*
s
L
(
)
q = for some q , the relevant incentive constraint for a q -agent is the same both
0,
F
under
*
Ls and under
'
Ls , for all q . Hence,
'
Ls satisfies the incentive constraints of DPL, which contradicts the
optimality of
*
Ls . This proves that
q =
* (0, )
s
L
F
for all
³
q
c
ln / ln
b
b
. Similar approaches can be used to prove
* (0, )
s
L
L
= , (ii), and (iii). ■
F
APPENDIX D
FIGURES
L
1L -
…
q
…
0
s
s
s
Fig 1. Schematic representation of a maximum punishment reputation scheme.
service cost c
1
1
2
1
3
1
4
1
5
4
3
2
1
0
n
o
i
t
a
r
e
p
o
o
c
r
o
f
e
v
i
t
n
e
c
n
I
0
1
2
3
4
6
7
8
9
10
5
c
24
1
1
* =
1
10
9
8
7
6
5
4
3
2
1
0
0
e
r
a
f
l
e
w
l
a
i
c
o
S
(a)
2
1
3
1
4
1
1
1
2
1
3
1
4
1
*
1
2
3
1
5
c
(b)
Fig 2. Performance of the four candidate social strategies when
L = : (a) incentive for cooperation, and (b) social welfare
1
and the optimal social strategy.
10
7
8
9
4
6
7
6 2
5 2
4 2
3 2
2 2
1 2
* = 2
2
10
D
2
1
e
r
a
f
l
e
w
l
a
i
c
o
s
l
a
m
i
t
p
O
8
6
4
2
0
0
0.8
0.6
0.4
0.2
0
0
)
(
)
M
,
L
(
n
o
i
t
u
b
i
r
t
s
i
d
y
r
a
n
o
i
t
a
t
S
2
5
c
Fig 3. Optimal social welfare and the optimal social strategy of DP2.
3
7
4
6
8
M = 1
M = 2
M = 3
M = 4
M = 5
9
10
1
2
Reputation
3
4
5
25
5
L = .
5
8
9
10
L = .
3
1
2
3
4
Reputation
(b)
(a) Stationary distribution of reputations and (b) its cumulative distribution when
M = 1
M = 2
M = 3
8
6
4
service cost c
2
0
0
M = 1
M = 2
M = 3
5
5
6
c
c
Fig 5. Social welfare and the incentive for cooperation under social strategy C
Ls when
0
0
8
9
10
3
4
7
1
2
3
1
2
6
7
4
2
service cost c
)
(
)
M
,
L
(
n
o
i
t
u
b
i
r
t
s
i
d
e
v
i
t
a
l
u
m
u
C
1
0.8
0.6
0.4
0.2
0
0
(a)
Fig 4.
10
8
6
4
e
r
a
f
l
e
w
l
a
i
c
o
S
10
e
r
a
f
l
e
w
l
a
i
c
o
S
9
8
7
6
5
4
M = 1
M = 2
M = 3
M = 4
M = 5
10
n
o
i
t
a
r
e
p
o
o
c
r
o
f
e
v
i
t
n
e
c
n
I
7
n
o
i
t
a
r
e
p
o
o
c
r
o
f
e
v
i
t
n
e
c
n
I
6
5
4
3
2
1
M = 1
M = 2
M = 3
3
M = 1
M = 2
M = 3
3
3
0
1
2
4
5
0
0
1
2
c
c
Fig 6. Social welfare and the incentive for cooperation under the optimal social strategy when
4
5
L = .
3
h
t
g
n
e
l
t
n
e
m
h
s
i
n
u
p
l
a
m
i
t
p
O
3
2
1
0
1
2
c
26
3
4
5
10
8
6
4
2
e
r
a
f
l
e
w
l
a
i
c
o
S
L = .
3
K = 0
K = 1
K = 2
K = 3
Fig 7. Optimal punishment length when
K = 0
K = 1
K = 2
K = 3
g
n
i
h
s
a
w
e
t
i
h
w
r
o
f
e
v
i
t
n
e
c
n
I
20
15
10
5
0
0
6
7
8
L = and
3
9
10
wc = .
1
0
0
1
4
1
2
3
4
8
9
2
3
6
7
10
5
5
c
c
Fig 8. Social welfare and the incentive for whitewashing under social strategy C
Ls when
1
10
9
8
7
6
5
4
3
2
1
0
0
g
n
i
h
s
a
w
e
t
i
h
w
r
o
f
e
v
i
t
n
e
c
n
I
K = 0
K = 1
K = 2
K = 3
K = 0
K = 1
K = 2
K = 3
e
r
a
f
l
e
w
l
a
i
c
o
S
0
0
0.5
2
1
3
2
1
3
4
5
c
c
Fig 9. Social welfare and the incentive for whitewashing under the optimal social strategy when
4
L = and
3
5
wc = .
1
n
o
i
t
a
t
u
p
e
r
l
a
i
t
i
n
i
l
a
m
i
t
p
O
3
2
1
0
0
1
c = 1
c = 2
c = 3
4
3
2
5
cw
Fig 10. Optimal initial reputation when
6
10
7
8
9
L = .
3
27
e
r
a
f
l
e
w
l
a
i
c
o
S
e
r
a
f
l
e
w
l
a
i
c
o
S
e
r
a
f
l
e
w
l
a
i
c
o
S
10
9
8
7
6
5
4
3
2
1
0
10
9
8
7
6
5
4
3
2
1
0
10
9
8
7
6
5
4
3
2
1
0
Pareto optimum
Optimal social no rm
Fixed social no rm
0
1
2
c
(a)
3
4
5
Pareto optimum
Optimal social no rm
Fixed social no rm
0
1
2
c
(b)
3
4
5
Pareto optimum
Optimal social no rm
Fixed social no rm
0
1
2
3
4
5
Fig 11. Performances of the optimal norm (
)*
, LL s
10
, C
LL when (a)
L = ; (b)
1
L = ; (c)
2
L =
3
c
(c)
and the fixed social norm
e
r
a
f
l
e
w
l
a
i
c
o
s
l
a
m
i
t
p
O
8
6
4
2
L = 1
L = 2
L = 3
0
0
0.1
0.2
0.3
0.4
0.5 0.6
(a)
0.7
0.8
0.9
1.0
28
e
r
a
f
l
e
w
l
a
i
c
o
s
l
a
m
i
t
p
O
10
8
6
4
2
0
0
10
e
r
a
f
l
e
w
l
a
i
c
o
s
l
a
m
i
t
p
O
8
6
4
2
L = 1
L = 2
L = 3
L = 1
L = 2
L = 3
0.1 0.2 0.3
0.7 0.8 0.9
0.4 0.5 0.6
(b) (c)
Fig 12. Optimal social welfare given L as b , a , and e vary.
1.0
0
0
0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
REFERENCES
[1] O. Gharehshiran, V. Krishnamurthy, “Coalition Formation for Bearings–Only Localization in Sensor Networks – A
Cooperative Game Approach,” IEEE Trans. on Signal Proc., vol 58, no. 8, pp. 4322 – 4338, 2010.
[2] M. Jackson, “Social and Economic Networks,” Princeton University Press, 2008.
[3] N. Hanaki, A. Peterhansl, P. Dodds, D. Watts, “Cooperation in Evolving Social Networks,” Management Science, vol. 53,
no. 7, pp. 1036 – 1050, 2007.
[4] H. Park, M. van der Schaar, “Evolution of Resource Reciprocation Strategies in P2P Networks,” IEEE Trans. on Signal
Proc., vol. 58, no. 3, pp. 1205 – 1218, 2010.
[5] E. Adar, B. A. Huberman, “Free Riding on Gnutella,” First Monday, vol. 5, No. 10, Oct. 2000.
[6] Z. Xiang, Q. Zhang, W. Zhu, Z. Zhang, Y. Zhang “Peer-to-Peer Based Multimedia Distribution Service,” IEEE Trans. on
Multimedia, vol. 6, no. 2, pp. 343 – 355, 2004.
[7] M. Ripeanu, I. Foster, and A. Iamnitchi, “Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems
and Implications for System Design,” IEEE Internet Computing Journal, Special Issue on Agent-to-Agent Networking,
2002.
[8] S. Saroiu, P. K. Gummadi, and S. D. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems,” Proc.
Multimedia Computing and Networking, 2002.
[9] J. K. MacKie-Mason and H. R. Varian, “Pricing Congestible Network Resources,” IEEE J. Sel. Areas Commun., vol. 13,
no. 7, pp. 1141–1149, Sep. 1995.
[10] F. Wang, M. Krunz, S. Cui, “Price-Based Spectrum Management in Cognitive Radio Networks,” IEEE Journal of
Selected Topics in Signal Processing, vol 2, no. 1, pp. 74 – 87, 2008.
[11] C. Buragohain, D. Agrawal, and S. Suri, “A Game-theoretic Framework for Incentives in P2P Systems,” Proc. Int. Conf.
Agent-to-Agent Computing, pp. 48-56, Sep. 2003.
[12] B. Skyrms, R. Pemantle, “A Dynamic Model of Social Network Formation,” Adaptive Networks (Understanding Complex
Systems), pp. 231 – 251, 2009.
[13] J. Park, M. van der Schaar, “Medium Access Control Protocols with Memory,” IEEE/ACM Trans. on Networking, vol. 18,
no. 6, pp. 1921 – 1934, 2010.
[14] J. Huang, H. Mansour, V. Krishnamurthy, “A Dynamical Games Approach to Transmission-Rate Adaptation in
Multimedia WLAN,” IEEE Trans. on Signal Proc., vol 58, no. 7, pp. 3635 – 3646, 2010.
[15] M. Feldman, K. Lai, I. Stoica, J. Chuang, “Robust Incentive Techniques for Peer-to-Peer Networks,” Proc. of the 5th
ACM Conf. on Elec. Commerce, Session 4, pp. 102-111, 2004.
[16] A. Habib, J. Chuang, “Service Differentiated Peer Selection: an Incentive Mechanism for Peer-to-Peer Media Streaming,”
IEEE Trans. on Multimedia, vol 8, no. 3, pp. 610 – 621, 2006.
[17] M. Kandori, “Social Norms and Community Enforcement,” Rev. Economic Studies, vol. 59, No. 1, pp. 63-80, Jan. 1992.
[18] A. Ravoaja, E. Anceaume, “STORM: A Secure Overlay for P2P Reputation Management,” Proc. 1st Int’l Conf. on Self-
Adaptive and Self-Organizing Systems, pp. 247 – 256, 2007.
[19] M. Okuno-Fujiwara and A. Postlewaite, “Social norms and random matching games,” Games Econ. Behavior, vol. 9, no.
1, pp. 79–109, Apr. 1995.
29
[20] S. Kamvar, M. T. Schlosser, H. G. Molina, “The Eigentrust Algorithm for Reputation Management in P2P Networks,”
Proc. 12th Int’l Conf. on World Wide Web, pp. 640 – 651, 2003.
[21] S. Adlakha, R. Johari, G. Y. Weinstraub, and A. Goldsmith, “Oblivious Equilibrium for Large-Scale Stochastic Games
with Unbounded Costs,” IEEE Conference on Decision and Control, pp. 5531 – 5538, 2008
[22] eMule Peer-to-Peers File Sharing Content, [Online]. Available: http://www.emule-project.net/, [Online]. Available
[23] P. Johnson, D. Levine, and W. Pesendorfer, “Evolution and Information in a Gift-Giving Game,” J. Econ. Theory, vol.
100, no. 1, pp. 1-21, 2001.
[24] D. Kreps, “Decision Problems with Expected Utility Criteria, I: Upper and Lower Convergent Utility,” Mathematics of
Operations Research, vol. 2, no. 1, pp. 45 – 53, 1977.
[25] D. Kreps, “Decision Problems with Expected Utility Criteria, II: Stationary,” Mathematics of Operations Research, vol. 2,
no. 3, pp. 266 – 274, 1977.
[26] G. J. Mailath, L. Samuelson, “Repeated Games and Reputations: Long-Run Relationships,” Oxford University Press, Sep.
2006.
[27] L. Massoulie, M. Vojnovic, “Coupon Replication Systems,” IEEE/ACM Trans. on Networking, vol. 16, no. 3, pp. 603 –
616, 2005.
[28] P. Whittle, “Optimization Over Time,” New York: Wiley, 1983.
[29] Y. Zhou, D. M Chiu, J. Lui, “A Simple Model for Analyzing P2P Streaming Protocols,” IEEE Int’l Conf. on Networking
Protocols, pp. 226 – 235, 2007.
30
|
1609.00427 | 6 | 1609 | 2019-04-21T02:13:16 | No Time to Observe: Adaptive Influence Maximization with Partial Feedback | [
"cs.SI"
] | Although influence maximization problem has been extensively studied over the past ten years, majority of existing work adopt one of the following models: \emph{full-feedback model} or \emph{zero-feedback model}. In the zero-feedback model, we have to commit the seed users all at once in advance, this strategy is also known as non-adaptive policy. In the full-feedback model, we select one seed at a time and wait until the diffusion completes, before selecting the next seed. Full-feedback model has better performance but potentially huge delay, zero-feedback model has zero delay but poorer performance since it does not utilize the observation that may be made during the seeding process. To fill the gap between these two models, we propose \emph{Partial-feedback Model}, which allows us to select a seed at any intermediate stage. We develop two novel greedy policies that, for the first time, achieve bounded approximation ratios under both uniform and non-uniform cost settings. | cs.SI | cs | Submitted to
manuscript 2017
9
1
0
2
r
p
A
1
2
]
I
S
.
s
c
[
6
v
7
2
4
0
0
.
9
0
6
1
:
v
i
X
r
a
No Time to Observe: Adaptive Influence
Maximization with Partial Feedback
Jing Yuan Shaojie Tang
The University of Texas at Dallas
Although influence maximization problem has been extensively studied over the past ten years, majority
of existing work adopt one of the following models: full-feedback model or zero-feedback model. In the zero-
feedback model, we have to commit the seed users all at once in advance, this strategy is also known as
non-adaptive policy. In the full-feedback model, we select one seed at a time and wait until the diffusion
completes, before selecting the next seed. Full-feedback model has better performance but potentially huge
delay, zero-feedback model has zero delay but poorer performance since it does not utilize the observation
that may be made during the seeding process. To fill the gap between these two models, we propose Partial-
feedback Model, which allows us to select a seed at any intermediate stage. We develop two novel greedy
policies that, for the first time, achieve bounded approximation ratios under both uniform and non-uniform
cost settings.
1.
Introduction
Since the seminal work of (Domingos and Richardson 2001), the influence maximization
problem has attracted tremendous attention in recent years. This problem is first formal-
ized and studied by (Kempe et al. 2003) as a discrete optimization problem. They study
this problem under several diffusion models including independent cascade model and lin-
ear threshold model. They demonstrate that the influence maximization problem under
both models are NP-hard, however, the objective function is monotone and submodular.
Leveraging these nice properties, they propose an elegant greedy algorithm with constant
approximation ratio. Since then, considerable work (Chen et al. 2013, Leskovec et al. 2007,
Cohen et al. 2014, Chen et al. 2010, 2009, Tang et al. 2011, Tang and Yuan 2016, Tong
et al. 2016, Yuan and Tang 2017) has been devoted to this topic and its variants.
However, majority of existing work fall into one of the following categories: full-feedback
model (Golovin and Krause 2011) or zero-feedback model (Kempe et al. 2003). In the zero-
feedback model, we have to commit the seed users all at once in advance, this strategy is
also known as non-adaptive policy. In the full-feedback model, we select one seed at a time
1
2
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
and wait until the diffusion completes, before selecting the next seed, this policy is also
known as adaptive policy. This type of policy has better performance in terms of expected
cascade because of its adaptivity, e.g, it allows us to adaptively choose the next seed
after observing the actual spread resulting from previously selected seeds. However, the
viral marketing in reality is often time-critical, implying that it is impractical, sometimes
impossible, to collect the full status of the actual spread before selecting the next seed.
To fill this gap, we propose a generalized feedback model, called partial-feedback model,
that captures the tradeoff between performance and delay. We adopt independent cascade
model (IC) (Kempe et al. 2003), which is one of the most commonly used models, to model
the diffusion dynamics in a social network. Unfortunately, we show that the objective
under partial-feedback model and IC is not adaptive submodular, implying that existing
results on adaptive submodular maximization does not apply to our model directly. To
overcome this challenge, we develop two novel greedy policies, that, for the first time,
achieve bounded approximation ratios under partial-feedback model. One nice feature of
our policies is that we can balance the delay/performance tradeoff by adjusting the value
of a controlling parameter.
1.1. Related Work
In (Domingos and Richardson 2001), they show that data mining can be used to determine
potential seed users in viral market. Since then, there is a rich body of works that has been
devoted to viral marketing problem. Most of existing works on this topic can be classified
into two categories.
The first category is non-adaptive influence maximization: we must find a set of influen-
tial customers all at once in advance subject to a budget constraint. Kempe et al. (Kempe
et al. 2003) first formalized and studied this problem under two diffusion models, namely
Independent Cascade model and Linear Threshold model. (Chen et al. 2013, Leskovec et al.
2007, Cohen et al. 2014, Chen et al. 2010, 2009) study influence maximization problem
under various extended models.
The second category is adaptive influence maximization, which is closely related to
adaptive/stochastic submodular maximization Golovin and Krause (2011), Badanidiyuru
et al. (2016), Tong et al. (2016), Yuan and Tang (2017). Existing studies mainly adopt
full-feedback model, assuming that we can observe the full status of the previous cascade
before selecting the next seed. We relax this assumption by incorporating partial-feedback
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
3
and develop two adaptive policies that achieve the first bounded approximation ratios
under partial-feedback model.
2. Network Model and Diffusion Process
2.1.
Independent Cascade Model
A social network is modeled as a directed graph G = (V, E), where V is a set of n nodes
and E is a set of social ties. We adopt independent cascade model (Kempe et al. 2003)
to model the diffusion dynamics in a social network. Each node v ∈ V is associated with
a cost cv, each edge (u, v) in the graph is associated with a propagation probability puv,
which is the probability that node u independently influences node v in the next slot after
u is influenced. The expected cascade of U , which is the expected number of influenced
nodes given seed set U , is denoted as I(U ).
2.2. The Feedback Model
Majority of existing work adopt one of the following feedback models: zero-feedback model
or full-feedback model.
Zero-feedback Model: During the seeding process, we can not observe anything about
the resulting spread of adoption. Since there is no benefit in "waiting", we can simply
commit the seeds all at once in advance. This model is equivalent to traditional non-
adaptive influence maximization problem which has been well studied in the literature,
(Kempe et al. 2003) showed that the utility function under this model is submodular and
then propose a Greedy algorithm whose performance is lower bounded (1− 1/e) times the
optimal non-adaptive solution. It is still unclear about the upper bound on the adaptivity
gap, e.g., the performance gap between non-adaptive and adaptive solutions.
Full-feedback Model: We select one seed at a time and wait until the diffusion completes,
before selecting the next seed, this policy is also known as adaptive policy. In particular,
after selecting a seed u, we can observe the status of all edges existing v, where v is any node
that is reachable from u via live edges in the full realization. For this model, (Golovin and
Krause 2011) introduced the concept of adaptive submodularity and proposed a Greedy
algorithm has a (1− 1/e) approximation guarantee.
As discussed in Section 1, full-feedback (resp. zero-feedback) model has better (resp.
poorer) performance but potentially huge (resp. small) delay. To fill the gap between these
two models, we propose partial-feedback model, which generalizes the previous two models
by allowing us to select the next seed at some intermediate stage.
4
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
Based on independent cascade model, we next introduce the concept of diffusion real-
ization (Golovin and Krause 2011) and other related concepts.
Definition 1 (Diffusion Realization). Let ψ((u, v)) ∈ {0, 1, ?} denote the state of
(u, v) given realization ψ where ψ((u, v)) = 0 means that (u, v) is blocked, ψ((u, v)) = 1
means that (u, v) is live, and ψ((u, v)) =? means that the state of (u, v) is unknown. We
represent the state of the diffusion stage using function ψ : E → {0, 1, ?}, called diffusion
realization.
Definition 2 (Partial and Full Realization). Let dom(ψ) = {(u, v) : ψ((u, v)) ∈
{0, 1}} denote the set of edges observed in ψ. ψ is a full realization if dom(ψ) = E (i.e., all
edges are observed in full realization). Otherwise, ψ is called partial realization.
Definition 3 (Intermediate and Final Realization). Given a realization ψ of
seeds S, we say ψ is a final realization if dom(ψ) is finalized (i.e., we can not observe
more edges other than dom(ψ) by waiting longer). Otherwise, ψ is called intermediate
realization. Let X(S) denote the set of all final realizations of S.
Definition 4 (Subrealization and Superrealization). A realization ψa is consis-
tent with a realization ψb (i.e., ψa ∼ ψb) if they are equal everywhere in dom(ψa)∩ dom(ψb).
We say ψa is a subrealization of ψb (or equivalently ψb is a suprealization of ψa) if ψa is
consistent with ψb and dom(ψa) ⊆ dom(ψb), or ψa ⊆ ψb. We say ψb is a final superreal-
ization of ψa given S if ψb ∈ X(S) and ψb ⊇ ψa (i.e., ψb is a final realization and ψb is a
superrealization of ψa).
Consider an intermediate realization ψ of seeds S, let Xfinal(Sψ) := {φ : φ ∈ X(S), φ ⊇ ψ}
denote the set of all final realizations of S given ψ.
3. Problem Formulation
Under the partial-feedback model, we perform the decision process in a sequential manner
where the decision made in each round is depending on the current observation of the
network status and the remaining budget.
Definition 5 (Adaptive Policy). We define our adaptive policy π : (ψ, S) → v,
which is a function from the current "observation" ψ and the set of existing seeds S to v,
specifying which seed to pick next given a particular set of observations.
Definition 6 (Policy Concatenation). Given two policies πa and πb, we use πa@πB
to denote a policy that runs πa first, and then runs policy πb, ignoring the information
obtained from running πa.
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
5
We use Ψ to denote a random realization. Assume there is a known prior probability
distribution Pr[ψ] := Pr[Ψ = ψ] over W which is the universe of all possible full realizations.
Given a full realization ψ, let Sψ denote all seeds picked by π under ψ, and c(Sψ) =(cid:80)
v∈Sψ
cv
denote the total cost of Sψ. The expected cascade of a policy π is
f (π) = E[I(SΨΨ)] =
Pr[ψ]I(Sψ)
(cid:88)
ψ∈W
where I(Sψ) denotes the cascade of Sψ given realization ψ, e.g., all nodes that are reachable
from Sψ under ψ. The goal of the adaptive influence maximization problem is to find a
policy π such that
Maximize f (π)
subject to:
c(Sψ) ≤ B,∀ψ ∈ W
We first show that the objective is not adaptive submodular under partial feedback
model. The concept of adaptive submodularity is a generalization of submodularity to
adaptive policies: we say a function f is adaptive submodular if adding an element e to
a realization ψ increases f at least as much as adding e to a superset of ψ. Since the
Myopic Feedback model proposed in (Golovin and Krause 2011) is a special case of our
partial-feedback model, we borrow the same counter example from their work to prove the
following lemma.
Theorem 1. (Golovin and Krause 2011) The objective f under partial-feedback model
is not adaptive submodular.
First of all, we want to emphasize the difference between "round" and "slot". One round
corresponds to one execution of our algorithm, while one slot corresponds to one step of
information propagation. In the rest of this paper, we use · to denote the size of a set.
4. α-Greedy Adaptive Policy with Partial Feedback
In this section, we present the first adaptive policy, called α-Greedy policy, and analyze
its performance bound. For ease of presentation, we start with uniform cost setting where
all nodes have identical costs. Then we extend this result to non-uniform cost setting.
4.1. Uniform Cost
We first study the case with uniform cost, e.g., ∀v ∈ V : cv = 1. Since each node has the
same cost, the budget constraint can be reduced to cardinality constraint, e.g., the number
of seeds that can be selected is upper bounded by B.
6
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
4.1.1. Policy Description α-Greedy policy πα (Algorithm 1) is performed in a sequen-
tial greedy manner as follows: After observing the current partial realization, we choose
to either wait for another slot or select the next seed immediately that maximizes the
expected marginal benefit. This process iterates until the budget is used up.
1. Start with slot t = 1, seeds S = ∅, and a control parameter α ∈ [0, 1];
2. Suppose we have made observations ψ[t] at slot t, let pv(S; ψ[t]) denote the activation
probability of v given seeds S and observation ψ[t], and let f (Sψ[t]) =(cid:80)
v∈V pv(S; ψ[t])
denote the expected cascade under the same setting. Define O(S; ψ[t]) := {v : pv(S; ψ[t]) = 0}
as the set of nodes whose activation probability is zero under ψ[t] and S. We then examine
the following condition.
f (Sψ[t])
V \ O(S; ψ[t]) ≥ α
(1)
If condition (1) is satisfied, select arg maxu∈V ∆u(S; ψ[t]) where ∆u(ψ[t]; S) = f ({u} ∪
Sψ[t]) − f (Sψ[t]) denotes the expected marginal benefit of v given existing seeds S and
partial realization ψ[t] (i.e., we select a node that maximizes the expected marginal benefit).
Otherwise, if condition (1) is not satisfied, we wait for another slot.
3. This process iterates until the budget is used up.
Condition (1) can be interpreted as follows: we will not select the next seed until the aver-
age activation probability of all nodes with non-zero activation probability is sufficiently
high. Note that this condition can always be satisfied when we reach a final realization (i.e.,
f (Sψ[t])
V \O(S;ψ[t]) = 1 when ψ[t] is a final realization). We use α to control the tradeoff of delay
and performance. In particular, a larger α indicates longer delay but better performance.
For example, if we set α = 1, our model becomes full-feedback model, that is, we must wait
until every node is either in active state or non-active state, before selecting the next seed.
On the other hand, if we set α = 0, our model is reduced to zero-feedback model, implying
that we can select all seeds in advance.
It was worth noting that we may select multiple seeds in one slot as long as condition
(1) holds, thus one slot may contain multiple rounds.
4.1.2. Performance Analysis Let π[t] denote the level-t-truncation of π obtained by
running until it terminates or until slot t. For every 1 ≤ i ≤ B, assume the i-th seed is
f (Sψ[ti])
V \O(S;ψ[ti]) ≥ α). For brevity, we use O to denote O(S; ψ[ti]).
added to S at slot ti (i.e.,
v∈O pv(S; ψ[ti]) denote the expected cascade in O given seeds S and
Let f O(Sψ[ti]) =(cid:80)
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
7
Algorithm 1 α-Greedy Policy: πα
Input: 0 ≤ α ≤ 1.
Output: S.
1: S = ∅; t = 0;
2: S ← S ∪{arg maxu∈V ∆u(Sψ[t])};
3: B ← B − 1; t ← t + 1
4: while B ≥ 0 do
if
f (Sψ[t])
V \O(S;ψ[t]) ≥ α then
S ← S ∪{arg maxu∈V ∆u(Sψ[t])};
B ← B − 1;
else
t ← t + 1; update ψ[t];
5:
6:
7:
8:
9:
10: return S
observation ψ[ti]. We use π∗ to denote the optimal adaptive policy. In the rest of this paper,
let f (πψ), f O(πψ), f V \O(πψ) denote respectively the expected cascade of π in V , O,
V \ O under realization ψ. In order to prove the main theorem (Theorem 2), we first prove
two preparatory lemmas (Lemma 1 and Lemma 2).
Lemma 1. For any 1 ≤ i ≤ B and 0 < α ≤ 1, we have
f (π∗ψ[ti])− f (πα
[ti]ψ[ti])/α ≤ f O(π∗ψ[ti])− f O(πα
[ti]ψ[ti])
Proof: First, we have
[ti]ψ[ti])/α
f (π∗ψ[ri])− f (πα
= (f O(π∗ψ[ti])− f O(πα
≤ (f O(π∗ψ[ti])− f O(πα
[ti]ψ[ti])/α) + (f V \O(π∗ψ[ti])− f V \O(πα
[ti]ψ[ti])) + (f V \O(π∗ψ[ti])− f V \O(πα
[ti]ψ[ti])/α)
[ti]ψ[ti])/α)
(cid:80)
(cid:80)
[ti]ψ[ti]) =(cid:80)
Based on the definition of ti, we have
f V \O(πα
Then f (π∗ψ[ti])− f (πα
v∈V \O pv(S; ψ[ti]) ≥ αV \ O, thus f V \O(π∗ψ[ti])− f V \O(πα
[ti]ψ[ti])/α ≤ f O(π∗ψ[ti])− f O(πα
[ti]ψ[ti]). (cid:3)
V \O
V \O
=
v∈V pv(S;ψ[ti])
v∈V \O pv(S;ψ[ti])
Lemma 2. For any 1 ≤ i ≤ B, we have
∆u(S; ψ[ti]) ≥ 1
B
max
u∈V
(cid:0)f O(π∗ψ[ti])− f O(πα
[ti]ψ[ti])(cid:1)
(2)
(3)
(4)
≥ α. It follows that
[ti]ψ[ti])/α ≤ 0.
8
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
Notice that f O(S;ψ)(Sψ) = (cid:80)
Proof: Assume ψ(cid:48) and ψ are two partial realizations satisfying ψ(cid:48) ⊇ ψ, let S(cid:48) and S denote
the seeds selected under ψ(cid:48) and ψ, satisfying S(cid:48) ⊇ S. Since the activation probability of
v ∈ O(S; ψ) is zero, then based on similar proof of Theorem 8.1 in (Golovin and Krause
2011), we can prove the following ∀v ∈ O(S; ψ),∀z ∈ V : pv(S ∪{z}; ψ)− pv(S; ψ) ≥ pv(S(cid:48) ∪
{z}; ψ(cid:48))− pv(S(cid:48); ψ(cid:48)).
v∈O(S;ψ) pv(S; ψ),
it follows that f O(S;ψ)(S ∪ {z}ψ) −
f O(S;ψ)(Sψ) ≥ f O(S;ψ)(S(cid:48) ∪ {z}ψ(cid:48)) − f O(S;ψ)(S(cid:48)ψ(cid:48)). This implies that function f O(·)
is submodular. Based on the standard analysis of submodular maximization, we
have maxz∈V [f O(S ∪ {z}ψ[ti]) − f O(Sψ[ti])] ≥ 1
. Because
(cid:16)
maxu∈V ∆u(S; ψ) ≥ maxz∈V [f O(S ∪ {z}ψ[ti]) − f O(Sψ[ti])], we have maxu∈V ∆u(S; ψ) ≥
(cid:17)
[ti]ψ[ti])
f O(π∗ψ[ti])− f O(πα
(cid:17)
(cid:16)
[ti]ψ[ti])
f O(π∗ψ[ti])− f O(πα
Now we are ready to prove the performance bound of πα.
Theorem 2. The expected cascade of πα is bounded by f (πα) ≥ α(1− e− 1
. (cid:3)
α )f (π∗).
1
B
B
Proof: Let ∆i = f (π∗) − f (πα
observed at slot ti−1, we have
[ti])/α and Pr(ψ[ti−1]) denote the probability that ψ[ti−1] is
α(∆i−1 − ∆i) = f (πα
[ti−1]ψ[ti−1]))
(cid:17)
[ti]ψ[ti−1])− f (πα
[ti−1]ψ[ti−1])
[ti−1]ψ[ti−1])/α))
)
(cid:16)
[ti])− f (πα
[ti−1]) = Pr(ψ[ti−1])(f (πα
≥ Pr(ψ[ti−1])(
f O(π∗ψ[ti−1])− f O(πα
1
B
≥ Pr(ψ[ti−1])(
(f (π∗ψ[ti−1])− f (πα
1
B
f (π∗)− 1
αB
f (π∗)− 1
αB
Pr(ψ[ti−1])f (πα
[ti−1]ψ[ti−1])
∆i−1
[ti−1]) =
1
B
1
B
f (πα
1
B
=
=
(5)
(6)
(7)
(8)
(9)
The first inequality is due to Lemma 2, and the second inequality is due to Lemma 1.
It follows that ∆i+1 ≤ (1 − 1
f (π∗)− f (πα
αB )∆i. Hence ∆B ≤ (1 − 1
α f (π∗). Hence f (πα) = f (πα
αB )B∆0 ≤ e− 1
α ∆0. It follows that
α )f (π∗). (cid:3)
α ∆0 = e− 1
[tB]) ≥ α(1− e− 1
[tB])/α ≤ e− 1
As a corollary of Theorem 2, we can prove that the approximation ratio of our greedy
policy under full-feedback setting is (1− e−1).
Corollary 1. Under full-feedback model, i.e., α = 1, we have f (πα) ≥ (1− e−1)f (π∗).
Another interesting finding is that if we set α = 0, then condition (1) is always true
regardless of the observation ψ[t]. Our policy under this setting becomes non-adaptive,
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
9
implying that we can select all B seeds in advance without observing any partial realization.
It is also worth noting that select the seed at a later slot never worsens the result.
Implications of our results. One immediate implication of Theorem 2 is that given a
desired approximation ratio, we can decide the appropriate seed selection point. Another
implication is that we can decide the approximation ratio of the greedy selection strategy
given any partial feedback.
4.2. Non-Uniform Cost
4.2.1. Policy Description We next study the case with non-uniform cost. The previous
adaptive policy can be naturally modified to handle non-uniform item costs by replacing its
selection rule by selecting arg maxu∈V
∆u(S;ψ[t])
cu
(i.e., select the node that achieves the largest
benefit-to-cost ratio). The detailed description of our greedy policy with non-uniform cost
is listed in Algorithm 2.
Algorithm 2 α-Greedy Policy with non-uniform cost: πα
Input: 0 ≤ α ≤ 1.
Output: S.
1: S = ∅; t = 0;
2: select v = arg maxu∈V
3: S ← S ∪{v}; B ← B − cv;
4: t ← t + 1; update ψ[t];
5: while B ≥ 0 do
∆u(S;ψ[t])
;
cu
if
f (Sψ[t])
V \O(S;ψ[t]) ≥ α then
select v = arg maxu∈V
if B − cv < 0 then
∆u(S;ψ[t])
cu
;
6:
7:
8:
9:
10:
11:
12:
13:
14:
break;
else
S ← S ∪{v}; B ← B − cv;
else
t ← t + 1;
update ψ[t];
15: return S
10
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
4.2.2. Performance Analysis We next focus on analyzing the performance bound of
πα. For this purpose, we introduce the concepts of virtual time and virtual slot. Imagine
that a policy π runs over virtual time, after π adds a node u to S, it starts to run u, and
stops after cu virtual slots. Notice that running a node over virtual time does not consume
actual time. We next introduce two important concepts. The level-k-truncation of a policy
π over virtual time, denoted by πk, is a randomized policy defined as follows.
Definition 7 (Level-k-truncation of π over virtual time). First run π for k
virtual slots, and for every node v ∈ V , if v has been running for γ ≤ cv virtual slots,
selecting v independently with probability γ/cv.
The strict level-k-truncation of π, denoted π←k, is defined as follows.
Definition 8 (Strict level-k-truncation of π over virtual time). First
run
π for k virtual slots, and for every node v ∈ V , selecting v if and only if it has been run
for γ = cv virtual slots (i.e., removing any node whose virtual running time is strictly less
than its cost).
Theorem 3. Let c = maxv∈V cv, the expected cascade of πα is bounded by f (πα) ≥ α(1−
e− 1
α
B−c
B )f (π∗).
Proof: Our proof is based on techniques studied in the context of adaptive submodular
maximization Golovin and Krause (2011). In the rest of the proof, let S denote the set of
seeds selected by πα←k, O denote the set of nodes whose activation probability is zero under
ψk and S, and ψk denote the partial realization observed at virtual slot k. We first provide
two preparatory lemmas whose proofs are similar to the proofs of Lemma 1 and Lemma 2.
Lemma 3. For any k ≥ 1, we have f (π∗ψk)− f (πα←kψk)/α ≤ f O(π∗ψk)− f O(πα←kψk).
Lemma 4. For any k ≥ 1, maxu∈V (∆u(S; ψk)/cu) ≥ 1
Let ∆k = f (π∗)− f (πα
(cid:0)f O(π∗ψk)− f O(πα←kψk)(cid:1).
k )/α and Pr[ψi] denote the probability that ψi is observed in virtual
B
slot i, we have
α(∆k−1 − ∆k) = f (πα
k−1)
i )− f (πα
= Pr[ψi−1] max
v∈V
≥ 1
B
≥ 1
B
(∆v(S; ψk−1)/cv)
Pr[ψk−1](f O(π∗ψk−1)− f O(πα←(k−1)ψk−1))
Pr[ψk−1](f (π∗ψk−1)− f (πα←(k−1)ψk−1)/α))
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
11
≥ 1
B
1
B
=
Pr[ψk−1](f (π∗ψk−1)− f (πα
k−1ψk−1)/α))
∆k−1
The first inequality is due to Lemma 4 and the second inequality is due to Lemma 3. It
follows that ∆k ≤ (1− 1
αB )∆k−1. Hence, assume πα terminates after l virtual slots, we have
B ∆0 where for the second inequality we have used the fact
∆l ≤ [(cid:81)l
αB )]∆0 ≤ e− 1
k=1(1 − 1
α
l
that 1− x < e−x for all x > 0. Hence
f (πα
l ) ≥ α(1− e− 1
α
l
B )f (π∗)
(10)
Although we are not guaranteed to use up all the budget at the end of πα, the remaining
budget in every realization can not be larger than c. In other words, the last virtual slot
reached by πα is l ≥ B − c. It follows that f (πα) ≥ πα
B )f (π∗). (cid:3)
B−c
B−c ≥ α(1− e− 1
Based on πα, we next provide an enhanced greedy policy πα−enhanced with constant
approximation ratio. πα−enhanced (Algorithm 5) randomly picks one from the following two
candidate solutions with equal probability: The first candidate solution contains a single
node v∗ which can maximize the expected cascade: v∗ = arg maxv∈V I({v}); the second
candidate solution is computed by the greedy policy πα.
α
Algorithm 3 Enhanced Greedy Policy πα−enhanced
1: Let v∗ = arg maxv∈V I({v});
2: Randomly pick one from the following two strategies with equal probability: return
{v∗} or run πα;
Theorem 4. The expected cascade of πα−enhanced is bounded by f (πα−enhanced) ≥
α(1−e− 1
α )
f (π∗).
2
Proof: Consider a policy π(cid:48) obtained by first running πα, then selecting one more node
according to the same greedy manner. It is easy to verify that π(cid:48) runs for at least B virtual
slots. According to Theorem 3, we have f (π(cid:48)) ≥ α(1− e− 1
α )f (π∗). Due to the submodularity
of I(·), we have f (π(cid:48)) ≤ f (πα) + I({v∗}). Thus f (πα) + I({v∗}) ≥ f (π(cid:48)) ≥ α(1− e− 1
α )f (π∗).
Then f (πα−enhanced) = (f (πα) + I({v∗}))/2 ≥ α(1−e− 1
f (π∗).
α )
(cid:3)
As a corollary of Theorem 4, we can prove that the approximation ratio of πα−enhanced
2
under full-feedback and non-uniform cost setting is (1− e−1)/2.
12
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
Corollary 2. Under full-feedback model,
i.e., α = 1, we have f (πα−enhanced) ≥
(1−e−1)
2
f (π∗).
5.
β-Greedy Adaptive Policy with Partial Feedback
Our second policy πβ (Algorithm 4) is still a simple greedy policy. However, we replace
condition (1) used in the previous policy by condition (11). We first explain the idea of
β-Greedy policy with non-uniform cost and then analyze the performance bound of πβ.
5.1. Policy Description
We next summarize the work flow of β-Greedy policy with non-uniform cost.
1. Start with slot t = 1, S = ∅, and a control parameter β ∈ [0, 1];
2. Suppose we have made observations ψ[t] at slot t, let Pr[ψψ[t]] denote the prob-
ability that ψ is the final superrealization of ψ[t]. Given S and final realization ψ, let
maxu∈V (∆u(S; ψ)/cu) denote the largest benefit-to-cost ratio achieved by selecting one
more node. We then examine the following condition.
maxv∈V (∆v(S; ψ[t])/cv)
EΨ[maxu∈V (∆u(S; Ψ)/cu)Ψ ∈ Xfinal(Sψ[t])]
≥ β
(11)
where
(∆u(S; Ψ)/cu)Ψ ∈ Xfinal(Sψ[t])] =
EΨ[max
u∈V
(cid:88)
ψ∈Xfinal(Sψ[t])
Pr[ψψ[t]] max
u∈V
(∆u(S; ψ)/cu)
If condition (11) is satisfied, add arg maxu∈V (∆u(S; ψ[t])/cu) to S (i.e., we select a node that
maximizes the expected benefit-to-cost ratio). Otherwise, if condition (11) is not satisfied,
wait for another slot.
3. This process iterates until the budget is used up.
The left side of condition (11) can be interpreted as the gap between adaptive policy and
non-adaptive policy given ψ[t]. We use β to control the tradeoff of delay and performance. It
was worth noting that EΨ[maxu∈V (∆u(S; Ψ)/cu)Ψ ∈ Xfinal(Sψ[t])] in condition (11) can be
replaced by maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu) without affecting our results, this is due
to maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu) ≥ EΨ[maxu∈V (∆u(S; Ψ)/cu)Ψ ∈ Xfinal(Sψ[t])].
However, this may prolong the waiting time before selecting the next seed. In fact, Tang
(2018) uses this value to derive a performance bound on adaptive influence maximiza-
tion problem subject to partition matroid constraint. As pointed out in (Tang 2018),
arg maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu) can be interpreted as the most "pessimistic" final
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
13
superrealization of ψ[t] under which no additional users, other than those who have been
influenced under ψ[t], will be influenced. As compared with EΨ[maxu∈V (∆u(S; Ψ)/cu)Ψ ∈
Xfinal(Sψ[t])], it is easier to evaluate the value of maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu).
Assume that no additional nodes can be further influenced given ψ[t], we select the node,
say v, that maximizes the marginal benefit-to-cost ratio. It is easy to verify that the
benefit-to-cost ratio of v is maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu).
Algorithm 4 β-Greedy Policy: πβ
Input: 0 ≤ β ≤ 1.
Output: S.
1: S = ∅; t = 0;
2: select v = arg maxu∈V
3: S ← S ∪{v}; B ← B − cv;
4: t ← t + 1; update ψ[t];
5: while B ≥ 0 do
∆u(S;ψ[t])
cu
;
if
6:
7:
8:
9:
10:
11:
12:
13:
14:
maxv∈V (∆v(S;ψ[t])/cv)
EΨ[maxu∈V (∆u(S;Ψ)/cu)Ψ∈Xfinal(Sψ[t])] ≥ β then
select v = arg maxu∈V
if B − cv < 0 then
∆u(S;ψ[t])
cu
;
break;
else
S ← S ∪{v}; B ← B − cv;
else
t ← t + 1;
update ψ[t];
15: return S
5.2. Performance Analysis
We next provide the performance bound of πβ. In the rest of this section, we adopt the
same notations used in Section 4.2.2.
Theorem 5. Let c = maxv∈V cv, the expected cascade of πβ is bounded by f (πβ) ≥ (1 −
B )f (π∗).
e−β B−c
14
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
Proof: Let ∆k = f (π∗)− f (πβ
∆k−1 − ∆k = f (πβ
k−1) = Pr[ψk−1](f (πβ
kψk−1)− f (πβ
k−1ψk−1))
k ), we have
k )− f (πβ
≥ Pr[ψk−1] max
v∈V
≥ Pr[ψk−1](β
(cid:88)
≥ Pr[ψk−1]
≥ Pr[ψk−1]
β
B
β
B
=
β
B
(f (π∗)− f (πβ
k−1)) ≥ β
B
∆k−1
(∆v(S; ψk−1)/cv)
ψ∈Xfinal(Sψk−1)
Pr[ψψk−1] max
u∈V
[←(k−1)]@π∗ψk−1)− f (πβ
k−1ψk−1))
(f (πβ
(f (π∗ψk−1)− f (πβ
(∆u(S; ψ)/cu))
[←(k−1)]ψk−1))
The first inequality is due to the selection rule of πβ
k (Line 7 in Algorithm 4). The second
inequality holds due to condition (11) is satisfied before selecting the next node. The
third inequality is due to the adaptive submodularity of f under full-feedback model.
The last inequality is due to f (π∗) ≥ f (πβ
that ∆k ≤ (1 − β
B )∆k−1. Hence ∆l ≤ (1 − β
e−β∆0 = e− βl
f (πβ) ≥ f (πβ
k−1). It follows
l ) ≤
B f (π∗). Because the last virtual slot reached by πβ is l ≥ B − c, we have
B−c) ≥ (1− e− β(B−c)
[←(k−1)]@π∗) and f (πβ
B )l∆0 ≤ e− βl
B ∆0. It follows that f (π∗) − f (πβ
[←(k−1)]) ≥ (πβ
)f (π∗). (cid:3)
B
As a corollary of Theorem 2, we can prove that the approximation ratio of our greedy
policy under full-feedback setting is (1− e−1).
Corollary 3. Under full-feedback model, i.e., β = 1, we have f (πβ) ≥ (1− e−1)f (π∗).
Based on πβ, we next provide an enhanced greedy policy πβ−enhanced (Algorithm 5) with
constant approximation ratio. πβ−enhanced randomly picks one from the following two can-
didate solutions with equal probability: The first candidate solution contains a single node
v∗ which can maximize the expected cascade: v∗ = arg maxv∈V I({v}); the second candidate
solution is computed by the greedy policy πβ.
Algorithm 5 Enhanced Greedy Policy πβ−enhanced
1: Let v∗ = arg maxv∈V I({v});
2: Randomly pick one from the following two strategies with equal probability: return
{v∗} or run πβ;
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
15
Theorem 6. The expected cascade of πβ−enhanced is bounded by f (πβ−enhanced) ≥
(1−e−β )
2
f (π∗).
Proof: Due to the submodularity of I(·), we have f (πβ) + I({v∗}) ≥ (1 − e−β)f (π∗). Then
f (πβ−enhanced) = (f (πβ) + I({v∗}))/2 ≥ (1−e−β )
f (π∗).
2
(cid:3)
As a corollary of Theorem 6, we can prove that the approximation ratio of πβ−enhanced
under full-feedback and non-uniform cost setting is (1− e−1)/2.
Corollary 4. Under full-feedback model,
i.e., β = 1, we have f (πβ−enhanced) ≥
(1−e−1)
2
f (π∗).
6. Experimental Evaluation
Figure 1
Influence spread vs. α on NetHEPT dataset under varying budget constraint.
We conduct extensive experiments on a real benchmark social networks: NetHEPT to
examine the effectiveness and efficiency of α-Greedy policy. We set the propagation prob-
ability of each directed edge randomly from i × {0.01, 0.001} as in (Jung et al. 2012). We
vary the value of i and examine how it affects the quality of the solutions. Selecting the
node with the largest marginal gain is #P-hard (Chen et al. 2010), and is typically approx-
imated by numerous Monte Carlo simulations (Kempe et al. 2003). We adjust the value of
control parameter α in range [0, 1].
Figure 1 shows the influence spread yielded by the proposed enhanced greedy policy on
the NetHEPT dataset, as α ranges from 0 to 1 with a step of 0.2. The x-axis corresponds
to the value of the control parameter α and the y-axis holds the size of the influence spread
achieved. We test the scenario with varying edge propagation probability distributions as
discussed above. In particular, each edge is randomly assigned a propagation probability
16
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
from i×{0.01, 0.001}. We adjust the value of i from 1 to 8 and Figure 1(a)-(d) shows the
comparison of the influence spread under i = 1, i = 2, i = 4, i = 8, respectively. In this set
of experiments, the budget B ranges from 30 to 60. The cost of each node is randomly
assigned from [1, 10]. As expected, a higher budget leads to a larger influence spread since
the budget indirectly controls the number of seeds can be selected.
We observe that when i takes a smaller value, take i = 1 as an example, the advantage
of performing adaptive seeding with partial feedback is not obvious since the improvement
over influence spread does not increase much as α increases. The reason behind this is
that a smaller i indicates a lower probability for the edges to be alive, resulting in a
lower uncertainty about the status of the edges. In this case observations gained from
partial feedback may not help much since with high probability the estimation of influence
spread based on sampling technique matches the real propagation. As shown in Figure 1,
the advantage of taking adaptive seeding based on partial feedback becomes obvious as
i increases. We observe that when i ≥ 2, a much larger influence spread can be achieved
based on partial feedback (α > 0) compared to zero-feedback scenario (α = 0). For example,
when i = 4 with budget of 50, while the influence spread based on zero-feedback leads to
a size of 57, the spread achieves a size of 87 based on partial feedback (α = 0.8), a 52.6%
increase.
We also observe that a smaller α can lead to a significant improvement on influence
spread with a higher edge propagation probability. For example, as shown in Figure 1, when
i = 2, a 10% improvement can be achieved with α = 0.6. When i = 4, a 20% improvement
can be achieved with α = 0.4. This implies that given a social graph with moderate edge
propagation probability, it is worth to leverage the partial observation of diffusion realiza-
tion, since adaptive seeding based on partial feedback leads to a significant improvement
over the size of influence spread.
7. Conclusion
To the best of our knowledge, we are the first to systematically study the problem of
influence maximization problem with partial feedback. Under independent cascade model,
which is one of the most commonly used models in literature, we present two greedy
algorithms with bounded approximation ratios.
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
17
References
Badanidiyuru, Ashwinkumar, Christos Papadimitriou, Aviad Rubinstein, Lior Seeman, Yaron Singer. 2016.
Locally adaptive optimization: adaptive seeding for monotone submodular functions. Proceedings of
the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 414 -- 429.
Chen, Wei, Laks VS Lakshmanan, Carlos Castillo. 2013. Information and influence propagation in social
networks. Synthesis Lectures on Data Management 5(4) 1 -- 177.
Chen, Wei, Chi Wang, Yajun Wang. 2010. Scalable influence maximization for prevalent viral marketing
in large-scale social networks. Proceedings of the 16th ACM SIGKDD international conference on
Knowledge discovery and data mining. ACM, 1029 -- 1038.
Chen, Wei, Yajun Wang, Siyu Yang. 2009. Efficient influence maximization in social networks. Proceedings
of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM,
199 -- 208.
Cohen, Edith, Daniel Delling, Thomas Pajor, Renato F Werneck. 2014. Sketch-based influence maximization
and computation: Scaling up with guarantees. Proceedings of the 23rd ACM International Conference
on Conference on Information and Knowledge Management. ACM, 629 -- 638.
Domingos, Pedro, Matt Richardson. 2001. Mining the network value of customers. Proceedings of the seventh
ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 57 -- 66.
Golovin, Daniel, Andreas Krause. 2011. Adaptive submodularity: Theory and applications in active learning
and stochastic optimization. Journal of Artificial Intelligence Research 427 -- 486.
Jung, Kyomin, Wooram Heo, Wei Chen. 2012. Irie: Scalable and robust influence maximization in social
networks. Data Mining (ICDM), 2012 IEEE 12th International Conference on. IEEE, 918 -- 923.
Kempe, David, Jon Kleinberg, ´Eva Tardos. 2003. Maximizing the spread of influence through a social
network. Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and
data mining. ACM, 137 -- 146.
Leskovec, Jure, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
2007. Cost-effective outbreak detection in networks. Proceedings of the 13th ACM SIGKDD interna-
tional conference on Knowledge discovery and data mining. ACM, 420 -- 429.
Tang, Shaojie. 2018. When social advertising meets viral marketing: Sequencing social advertisements for
influence maximization. Thirty-Second AAAI Conference on Artificial Intelligence.
Tang, Shaojie, Jing Yuan. 2016. Optimizing ad allocation in social advertising. Proceedings of the 25th ACM
International on Conference on Information and Knowledge Management. ACM, 1383 -- 1392.
Tang, Shaojie, Jing Yuan, Xufei Mao, Xiang-Yang Li, Wei Chen, Guojun Dai. 2011. Relationship classification
in large scale online social networks and its impact on information propagation. INFOCOM, 2011
Proceedings IEEE . IEEE, 2291 -- 2299.
18
Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback
Article submitted to ; manuscript no. 2017
Tong, Guangmo, Weili Wu, Shaojie Tang, Ding-Zhu Du. 2016. Adaptive influence maximization in dynamic
social networks. IEEE/ACM Transactions on Networking .
Yuan, Jing, Shaojie Tang. 2017. Adaptive discount allocation in social networks. Proceedings of the eighteenth
ACM international symposium on Mobile ad hoc networking and computing. ACM.
|
1502.05058 | 1 | 1502 | 2015-02-17T21:04:44 | Tensor Spectral Clustering for Partitioning Higher-order Network Structures | [
"cs.SI",
"physics.soc-ph"
] | Spectral graph theory-based methods represent an important class of tools for studying the structure of networks. Spectral methods are based on a first-order Markov chain derived from a random walk on the graph and thus they cannot take advantage of important higher-order network substructures such as triangles, cycles, and feed-forward loops. Here we propose a Tensor Spectral Clustering (TSC) algorithm that allows for modeling higher-order network structures in a graph partitioning framework. Our TSC algorithm allows the user to specify which higher-order network structures (cycles, feed-forward loops, etc.) should be preserved by the network clustering. Higher-order network structures of interest are represented using a tensor, which we then partition by developing a multilinear spectral method. Our framework can be applied to discovering layered flows in networks as well as graph anomaly detection, which we illustrate on synthetic networks. In directed networks, a higher-order structure of particular interest is the directed 3-cycle, which captures feedback loops in networks. We demonstrate that our TSC algorithm produces large partitions that cut fewer directed 3-cycles than standard spectral clustering algorithms. | cs.SI | cs |
Tensor Spectral Clustering for Partitioning Higher-order Network Structures
Austin R. Benson∗
David F. Gleich†
Jure Leskovec‡
Abstract
Spectral graph theory-based methods represent an important
class of tools for studying the structure of networks. Spec-
tral methods are based on a first-order Markov chain de-
rived from a random walk on the graph and thus they cannot
take advantage of important higher-order network substruc-
tures such as triangles, cycles, and feed-forward loops. Here
we propose a Tensor Spectral Clustering (TSC) algorithm
that allows for modeling higher-order network structures in a
graph partitioning framework. Our TSC algorithm allows the
user to specify which higher-order network structures (cy-
cles, feed-forward loops, etc.) should be preserved by the
network clustering. Higher-order network structures of in-
terest are represented using a tensor, which we then partition
by developing a multilinear spectral method. Our framework
can be applied to discovering layered flows in networks as
well as graph anomaly detection, which we illustrate on syn-
thetic networks. In directed networks, a higher-order struc-
ture of particular interest is the directed 3-cycle, which cap-
tures feedback loops in networks. We demonstrate that our
TSC algorithm produces large partitions that cut fewer di-
rected 3-cycles than standard spectral clustering algorithms.
1 Introduction
Spectral graph methods investigate the structure of networks
by studying the eigenvalues and eigenvectors of matrices as-
sociated to the graph, such as its adjacency matrix or Lapla-
cian matrix. Arguably the most important spectral graph
algorithms are the spectral graph partitioning methods that
identify partitions of nodes into low conductance commu-
nities in undirected networks [1]. While the simple matrix
computations and strong mathematical theory behind spec-
tral clustering methods makes them appealing, the methods
are inherently limited to two-dimensional structures, for ex-
ample, undirected edges connecting pairs nodes. Thus, it is
a natural question whether spectral methods can be general-
ized to higher-order network structures. For example, tradi-
tional spectral clustering attempts to minimize (appropriately
normalized) number of first-order structures (i.e., edges) that
need to be cut in order to split the graph into two parts. In a
∗Institute for Computational and Mathematical Engineering, Stanford
University.
†Department of Computer Science, Purdue University.
‡Department of Computer Science, Stanford University.
similar spirit, a higher-order generalization of spectral clus-
tering would try to minimize cutting higher-order structures
that involve multiple nodes (e.g., triangles).
Incorporating higher-order graph information (that is,
network motifs/graphlets) into the partitioning process can
significantly improve our understanding of the underlying
network. For example, triangles (three-dimensional network
structures involving three nodes) have proven fundamental to
understanding social networks [14, 21] and their community
structure [10, 26, 29]. Most importantly, higher-order spec-
tral clustering would allow for greater modeling flexibility
as the application would drive which higher-order network
structures should be preserved by the network clustering. For
example, in financial networks, directed cycles might indi-
cate money laundering and higher-order spectral clustering
could be used to identify groups of nodes that participate
in such directed cycles. As directed cycles involve multi-
ple edges, current spectral clustering tools would not be able
to identify groups with such structural signatures.
Generalizing spectral clustering to higher-order struc-
tures involves several challenges. The essential challenge
is that higher-order structures are often encoded in tensors,
i.e., multi-dimensional matrices. Even simple computations
with tensors lack the traditional algorithmic guarantees of
two-dimensional matrix computations such as existence and
known runtimes. For instance, eigenvectors are a key com-
ponent to spectral clustering, and finding tensor eigenvectors
is NP-hard [15]. An additional challenge is that the number
of higher-order structures increases exponentially with the
size of the structure. For example, in a graph with n nodes,
the number of possible triangles is O(n3). However, real-
world networks have far fewer triangles.
While there exist several extensions to the spectral
method, including the directed Laplacian [5], the asymmet-
ric Laplacian [4], and co-clustering [9, 28], these methods
are all limited to two-dimensional graph representations. A
simple work-around would be to weight edges that occur in
higher-order structures [19]. However, this heuristic is un-
satisfactory because the optimization is still on edges, and
not on the higher-order patterns we aim to cluster.
Here, we propose a Tensor Spectral Clustering (TSC)
framework that is directly based on higher-order network
structures, i.e., network information beyond edges connect-
ing two nodes. Our framework operates on a tensor of net-
work data and allows the user to specify which higher-order
network structures (cycles, feed-forward loops, etc.) should
be preserved by the clustering. For example, if one aims to
obtain a partitioning that does not cut triangles, then this can
be encoded in a third-order tensor T, where T(i, j, k) is equal
to 1 if nodes i, j, and k form a triangle and 0 otherwise.
Given a tensor representation of the desired higher-order
network structures, we then use a mutlilinear PageRank vec-
tor [13] to reduce the tensor to a two-dimensional matrix.
This dimensionality reduction step allows us to use effi-
cient matrix algorithms while approximately preserving the
higher-order structures represented by the tensor. Our result-
ing TSC algorithm is a spectral method that partitions the
network to minimize the number of higher-order structures
cut. This way our algorithm finds subgraphs that contain
many instances of the higher-order structure described by the
tensor. Figure 1 illustrates a directed network, and our goal
is to identify clusters of directed 3-cycles. That is, we aim
to partition the nodes into two sets such that few directed 3-
cycles get cut. Our TSC algorithm finds a partition that does
not cut any of the directed 3-cycles, while a standard spectral
partitioner (the directed Laplacian [5]) does.
Clustering networks based on higher-order structures
has many applications. For example, the TSC algorithm
allows for identifying layered flows in networks, where
the network consists of several layers that contain many
feedback loops. Between layers, there are many edges,
but they flow in one direction and do not contribute to
feedback. We identify such layers by clustering a tensor
that describes small feedback loops (e.g., directed 3-cycles
and reciprocated edges). Similarly, TSC can be applied to
anomaly detection in directed networks, where the tensor
encodes directed 3-cycles that have no reciprocated edges.
Our TSC algorithm can find subgraphs that have many
instances of this pattern, while other spectral methods fail
to capture these higher-order network structures.
Our contributions are summarized as follows:
• In Sec. 3, we develop a tensor spectral clustering frame-
work that computes directly on higher-order graph
structures. We provide theoretical justifications for our
framework in Sec. 4.
• In Sec. 5, we provide two applications—layered
flow networks and anomaly detection—where our ten-
sor spectral clustering algorithm outperforms standard
spectral clustering on small, illustrative networks.
• In Sec. 6, we use tensor spectral clustering to parti-
tion large networks so that directed 3-cycles are not cut.
This provides additional empirical evidence that our al-
gorithm out-performs state-of-the-art spectral methods.
Code
used
is
for
this
at
https://github.com/arbenson/tensor-sc,
and
all networks used in experiments are available from
SNAP [23].
available
paper
0
2
3
5
1
4
Tensor spectral clustering:
{0, 1, 2}, {3, 4, 5}
Directed Laplacian:
{1, 2, 5}, {0, 3, 4}
Figure 1:
(Left) Network where directed 3-cycles only ap-
pear within the blue or red nodes. (Right) Partitioning found
by our proposed tensor spectral clustering algorithm and the
directed Laplacian. Our proposed algorithm doesn’t cut any
directed 3-cycles. Directed 3-cycles are just one higher-order
structure that can be used within our framework.
2 Preliminaries and background
We now review spectral clustering and conductance cut. The
key ideas are a Markov chain representing a random walk
on a graphs, a second left eigenvector of the Markov chain,
and a sweep cut that uses the ordering of the eigenvector to
compute conductance scores. In Sec. 3, we generalize these
ideas to tensors and higher-order structures on graphs.
+
2.1 Notation and the transition matrix Consider an
undirected, weighted graph G = (V, E), where n = V and
m = E. Let A ∈ Rn×n
be the weighted adjacency matrix of
G, i.e., Ai j = wi j if (i, j) ∈ E and Ai j = 0 otherwise. Let D
be the diagonal matrix with generalized degrees of the ver-
tices of G. In other words, D = diag (Ae), where e is the
vector of all ones. The combinatorial Laplacian or Kirchoff
matrix is K = D − A. The matrix P = AT D−1 is a column
stochastic matrix, which we call the transition matrix. We
now interpret this matrix as a Markov chain.
2.2 Markov chain interpretation Since P is column
stochastic, we can interpret the matrix as a Markov chain
with states S t, for each time step t. Specifically, the states of
the Markov chain are the vertices on the graph, i.e., S t ∈ V.
The transition probabilities are given by P:
Prob(S t+1 = i S t = j) = Pi j = A ji/D j j.
This Markov chain represents a random walk on the
In Sec. 3.2, we will generalize this idea to
graph G.
tensors of graph data. We now show how the second left
eigenvector of the Markov chain described here is key to
spectral clustering.
2.3 Second left eigenvector for conductance cut The
conductance of a set S ⊂ V of nodes is
(2.1)
φ (S ) = cut (S ) / min(cid:16)vol(S ), vol( ¯S )(cid:17) ,
where cut (S ) = (cid:12)(cid:12)(cid:12)
, and vol(S ) =
{(u, v) u ∈ S }. Small conductance indicates a good par-
{(u, v) u ∈ S , v ∈ ¯S }(cid:12)(cid:12)(cid:12)
tition of the graph: the number of cut edges must be small
and neither S nor ¯S can be too small. Let z ∈ {−1, 1}n be an
indicator vector over the nodes in G, where zi = 1 if the ith
node is in S . Then
(2.2)
zTKz = X
(i, j)∈E
4I (cid:16)zi = z j(cid:17) ∝ cut (S ) .
The conductance cut eigenvalue problem is an approxi-
mation for the NP-hard problem of minimizing conductance:
(2.3)
minimize
z∈Rn
zTKz/zT Dz
subject to eT Dz = 0,
kzk = 1
The idea of the real-valued relaxation in Eqn. (2.3) is
that positive and negative values of z correspond to the ±1
indicator vector for the cut in Eqn. (2.2). In Sec. 2.4 we will
review how to convert the real-valued solution to a cut.
The matrices K and D are positive semi-definite, and
Eqn. (2.3) is a generalized eigenvalue problem. In particular,
the solution is the vector z such that Kz = λDz, where λ
is the second smallest generalized eigenvalue (the smallest
eigenvalue is 0 and corresponds to the trivial solution z = e).
To get the solution z, we observe that
Kz = λDz ⇐⇒ (I − D−1 A)z = λz
⇐⇒ zT P = (1 − λ)zT
where 1 − λ is the second largest left eigenvalue of P. We
know that eT P = eT , so we are looking for the dominant left
eigenvector that is orthogonal to the trivial one.
Here, we call the above partitioning algorithm for undi-
rected graphs the “undirected Laplacian” method. One gen-
eralization to directed graphs is due to Chung [5]. For this
method, we use the undirected Laplacian method on the
following symmetrized network: Asym := 1
2 (cid:16)ΠPT + PΠ(cid:17),
where P = AT D−1 and Π = diag (π) for Pπ = π, the station-
ary distribution of P. Note that Dsym = diag (cid:16)Asyme(cid:17) = Π, so
we are interested in the second left eigenvector of
(2.4)
Psym =
1
2 (cid:16)ΠPTΠ−1 + P(cid:17) .
By “directed Laplacian”, we refer to the method that uses the
second left eigenvector of Psym.
2.4 Sweep cuts In order to round the real-valued solution
z to a solution set S to evaluate Eqn. (2.1), we sort the
vertices by the values zi and consider vertex sets S k that
consist of the first k nodes in the sorted vertex list.
In
other words, if σi is equal to the index of the ith smallest
element of z, then S k = {σ1, σ2, . . . σk}. We then choose
S = arg minS k φ(S k). The set of nodes S satisfies the
celebrated Cheeger inequality [1]: φ2
∗/2 ≤ φ(S ) ≤ 2φ∗,
where φ∗ is the minimum conductance over all cuts. The
sweep cut computation is fast, since S k+1 differs from S k by
only one node, and the sequence of scores φ(S 1), . . . , φ(S n)
can be computed in O(n + m) time.
interest are the normalized cut, ncut(S )
In addition to conductance, other scores can also
be computed in the same sweeping fashion. Of par-
ticular
=
cut (S ) (cid:16)1/vol(S ) + 1/vol( ¯S )(cid:17), and the expansion, ρ(S ) =
cut (S ) / min(S , ¯S ). The normalized cut differs by at most
a factor of two from conductance, so we will limit ourselves
to conductance and expansion in this paper.
3 Tensor spectral clustering framework
The key ingredients for spectral clustering discussed in
Sec. 2 were a transition matrix from an undirected graph,
a Markov chain interpretation of the transition matrix, and
the second left eigenvector of the Markov chain. We now
generalize these ideas for higher-order network structures.
3.1 Transition tensors Our first goal is to represent the
higher-order network stuctures of interest. For example, to
represent structures on three nodes (i.e., directed cycles, or
feed-forward loops) we required a three-dimensional tensor.
In particular, we want a symmetric order-3 tensor T ∈ Rn×n×n
such that the entry at index (i, j, k) contains information
about nodes i, j, k ∈ V. (Here, symmetric means that the
value of T(i, j, k) remains the same under any permutation of
the three indices.) A tensor describing triangles in G is:
+
(3.5) T(i, j, k) = I (cid:0)i, j, k ∈ V distinct and form a triangle(cid:1) .
This tensor represents third-order information about the
graph. We form a transition tensor by
P(i, j, k) = T(i, j, k)/
n
X
i=1
T(i, j, k),
1 ≤ i, j, k ≤ n.
In the case that Pn
i=1 T(i, j, k) = 0, we fill in P(:, j, k) with
a stochastic vector u, i.e., P(:, j, k) = u. We call the vector
u the dangling distribution vector, borrowing the term from
the PageRank community [3]. Next, we see how to interpret
this transition tensor as a second-order Markov chain.
3.2 Second-order Markov chains and the spacey ran-
dom surfer Next, we seek to generalize the Markov chain
interpretation of spectral clustering to tensors. While spec-
tral clustering on matrices is analogous to a first-order
Markov chain, we will show that tensor spectral clustering
is analogous to a second-order Markov chain on a matrix
representation of the tensor.
Entries of the transition tensor P from Sec. 3.1 can be
interpreted as the transition probabilities of a second-order
Markov chain. Specifically, given a second-order Markov
chain with state space the set of vertices, V, we define the
transition probabilities as
P(i, j, k) = Prob (S t+1 = i S t = j, S t−1 = k) .
In other words, the probability of moving to state i depends
on the current state j and the last state k. For the triangle
tensor in Eqn. (3.5),
P(i, j, k) =
I (cid:0)i, j, k form triangle(cid:1)
#(triangles involving nodes j and k)
If the previous state was node k and the current state is
node j, then, for the next state, the Markov chain chooses
uniformly over all nodes i that form a triangle with j and k.
The stationary distribution Xi j of the second-order
Markov chain satisfies Pk P(i, j, k)X jk = Xi j. We would
like to model the full second-order dynamics of the Markov
chain, but doing so is computationally infeasible because
just storing the stationary distribution requires O(n2) mem-
ory. Instead, we will make the simplifying assumption that
Xi j = xix j for some vector x ∈ Rn
+ with Pi xi = 1. The
stationary distribution then satisfies
(3.6)
X
1≤ j,k≤n
P(i, j, k)x jxk = xi.
With respect to Eqn. (3.6), x is called a z eigenvector of
the tensor P with eigenvalue 1 [27]. To simplify notation,
we will denote the one-mode unfolding of P by R ∈ Rn×n2,
namely R = hP(:, :, 1) P(:, :, 2)
. . . P(:, :, n)i. The ma-
trix R is a column stochastic matrix. We use Rk = P(:, :, k) to
denote the kth n ×n block of R. With this notation, Eqn. (3.6)
reduces to R · (x ⊗ x) = x, where ⊗ denotes the Kronecker
product.
The simplifying approximation Xi j = xix j is computa-
tionally and algebraically appealing, but we also want a ran-
dom process to interpret the vector. Recent work [13] has
considered the multilinear pagerank vector x that satisfies
(3.7)
αR (x ⊗ x) + (1 − α)u = x, xk ≥ 0, eTx = 1,
for a constant α ∈ (0, 1) and stochastic vector u.
This vector is the stationary distribution of a stochastic
process recently termed the spacey random surfer [12]. At
any step of the process, a random surfer has just moved from
node k to node j. With probability (1−α), the surfer teleports
to a random state via the stochastic vector u. With probability
α, the surfer wants to transition to node i with probability
P(i, j, k). However, the surfer spaces out and forgets that s/he
came from node k. Instead, the surfer guesses the previous
state, based on the historical distribution over the state
space. Formally, the surfer guesses node ℓ with probability
t+n (cid:16)1 + Pt
1
r=1 I [S t = ℓ](cid:17). It is important to note that although
this process is an approximation to a second-order Markov
chain, the process is no longer Markovian.
3.3 Second left eigenvector Following the steps of spec-
tral clustering, we now need to obtain an equivalent of the
second left eigenvector (Sec. 2.3).
In particular, we now
show how to get a relevant eigenvector from the multilinear
PageRank vector x and the transition tensor P. The multilin-
ear PageRank vector x satisfying αR · (x ⊗ x) + (1 − α)u = x
can also be re-interpreted as the stationary distribution of a
particular Markov chain. Specifically, define the matrix
(3.8)
P[x] :=
n
X
k=1
xkRk.
(Recall that Rk = P(:, :, k) is the kth n × n block of R). The
matrix P[x] is column stochastic because each Rk is column
stochastic and Pn
R · (x ⊗ x) =
k=1 xk = 1. Note that
n
x = P[x] · x.
n
X
k=1
Rk (xkx) =
X
k=1
xkRk
Hence, x is the stationary distribution of the PageRank
system αP[x] · x + (1 − α)u = x. However, the transition
matrix depends on x itself.
We use the second left eigenvector of P[x] for our
higher-order spectral clustering algorithm. Heuristically,
P[x] is a weighted sum of n “views” of the graph (the
matrices Rk), from the perspective of each node (k, 1 ≤ k ≤
n), according to three-dimensional graph data (the tensor T).
If node k has a large influence on the three-dimensional data,
then xk will be large and we will weight data associated with
node k more heavily. The ordering of the eigenvector will be
used for a sweep cut on the vertices.
3.4 Sweep cuts The last remaining step is to generalize
the notion of the sweep cut (Sec. 2.4). Recall that the sweep
cut takes some ordering on the nodes, σ, and computes some
score f (S k) for each cut S k = {σ1, . . . , σk}. Finally, the
sweep cut procedure returns arg maxS k f (S k). The eigenvec-
tor from Sec. 3.3 provides us with an ordering for a sweep
cut, just as in the two-dimensional case (Sec. 2.4). We gen-
eralize the cut and volume measures as follows:
cut3(S )
:= X
T(i, j, k) − X
i, j,k∈V
i, j,k∈S
T(i, j, k) − X
i, j,k∈ ¯S
T(i, j, k)
vol3(S )
:= X T(S , V, V).
And we define “higher-order conductance” (denoted φ3) and
“higher-order expansion” (denoted ρ3) as
cut3(S )
(3.9)
φ3 (S )
:=
(3.10)
ρ3(S )
:=
min (cid:16)vol3(S ), vol3( ¯S )(cid:17)
cut3(S )
min (cid:16)S , ¯S (cid:17)
.
This definition ensures that φ3(S ) ∈ [0, 1], as in standard
conductance.
Algorithm 1: Tensor Spectral Partitioning
Data: G = (V, E), V = n, T ∈ Rn×n×n
distribution vector u, α ∈ (0, 1)
+
, dangling
Result: Set of nodes S ⊂ V
for 1 ≤ i, j, k ≤ n, T(i, j, k) , 0 do
P(i, j, k) ← T(i, j, k)/ Pi T(i, j, k)
for j, k such that Pi T(i, j, k) = 0 do
P(:, j, k) ← u
x ← MultilinearPageRank(α, P)
Rk ← P(:, :, k)
P[x] ← Pk xkRk
Compute second left eigenvector z of P[x]
σ ← sorted ordering of z
S ← S weepCut(σ, G)
Algorithm 2: Tensor Spectral Clustering (TSC)
Data: G = (V, E), V = n, T ∈ Rn×n×n
, dangling
distribution vector u, α ∈ (0, 1), number of
clusters C
+
Result: Partition P of V
if P < C then
Partition G into G1 = (V1, E1) and G2 = (V2, E2)
via Algorithm 1.
P = P ∪ {V1, V2}.
Recurse on largest component in P.
3.5 Tensor spectral clustering framework We now have
higher-order analogs of all the spectral clustering tools from
Sec. 2. The central routine of our tensor spectral clustering
framework is given in Algorithm 1, which is the tensor
spectral partitioning algorithm. This subroutine takes a
data tensor T of third-order information about a graph G
and partitions the nodes into two sets. Algorithm 2 is
the clustering algorithm that performs recursive bisection in
order to decompose the graph into several components. This
algorithm can also be used with other partitioning algorithms
[11], and we will take that approach in Sec. 5.
3.6 Complexity The complexity of Algorithm 2 depends
on the sparsity of the data tensor T, i.e.the number of higher-
order structures in the network. The algorithm depends on
the sparsity in three ways. First, all of the higher-order
structures in the network must be enumerated as an upfront
cost. Second, the sparsity affects the complexity of the
multilinear PageRank subroutine in Algorithm 1. Third,
the number of non-zeroes in P[x] is equal to the number
of the higher-order structures. When performing recursive
bisection (Algorithm 2), there is no upfront cost to enumerate
the structures—we only need to determine which structures
are preserved under the partition.
We argue that the upfront cost is not cumbersome.
Triangle enumeration for real-world undirected networks is
a well-studied problem [7, 30]. For directed graphs, we can:
(1) undirect the graph, (2) use high-performance code to
enumerate the triangles, and (3) stream through the triangles
and only keep those that are the directed structure of interest.
Now, we consider the second and third computations.
Let T be the number of non-zeroes in T. There are several
methods for computing the multilinear PageRank vector in
Algorithm 1 [13]. We use the shifted fixed point method
(akin to the symmetric higher-order power method [20]).
Each iteration takes O(T ) time, and we found that this
method converges very quickly—usually within a handful of
iterations. The computation of the second left eigenvector of
P[x] dominates the running time. We use the power method
to compute this eigenvector. Since P[x] has T non-zero
entries, each iteration takes O(T ) time.
Finally, we look at the relationship between T and the
In theory, T can be O(n3), but this is
size of the graph.
far from what we see in practice. For the large networks
considered in Sec. 6, T ≤ 6m (see Table 1).
To summarize, the majority of our time is spent comput-
ing the eigenvector of P[x]. Each iteration takes O(T ) time,
and T ≤ 6m for the algorithms we consider. Standard spec-
tral algorithms also compute an eigenvector with the power
method, but each iteration is only O(m) time. Thus, we can
think of our algorithms as running within an order of magni-
tude of standard algorithms. However, when moving beyond
third-order structures, we note that T can be much larger.
4 Generalizations and directed 3-cycle cut
Before transitioning to applications, we mention two impor-
tant generalities of our framework and discuss directed 3-
cycle cuts. The directed 3-cycle will play an important role
for our applications in Sections 5 and 6.
4.1 Generalizations Our first generalization deals with
data beyond three dimensions. While we have presented the
algorithm with three-dimensional data, the same ideas carry
through for higher-order data. The multilinear PageRank
vector can still be computed, although α must be smaller to
guarantee convergence [13]. However, in practice, we do not
observe large α impeding convergence.
Second, our TSC algorithm is a strict generalization of
traditional spectral clustering in the following sense. There
is a data tensor T such that for any multilinear PageRank
vector x, we compute the same eigenvector that conductance
cut computes. In particular, we can always define T(i, j, k) =
Ai j, where A is the adjacency matrix. Then Rk = P,
1 ≤ k ≤ n, and P[x] = Pk xkP = P Pk xk = P.
4.2 Directed 3-cycle cuts We now turn our attention to a
particular three-dimensional representation of directed graph
data: directed 3-cycles (D3Cs), i.e., sets of edges (i, j), ( j, k),
and (k, i) for distinct nodes i,
j, and k. Such structures
are important for community detection [19] and are natural
motifs for network feedback. We will use this structure for
applications in Sections 5 and 6. The data tensor we use for
directed 3-cycle cuts is
(4.11)
T(i, j, k) =
2
1
0
i, j, k form two D3Cs
i, j, k form one D3C
otherwise
Nodes i, j, and k form two D3Cs if and only if every possible
directed edge between them is present. When T(i, j, k) = 1,
we do not differentiate between 0, 1, or 2 reciprocated edges.
For directed 3-cycle cut, we want to find partitions of the
graph that do not cut many D3Cs.
4.3 Strongly connected components We now show that
TSC correctly breaks up strongly connected components
when using the data tensor in Eqn. (4.11). Suppose we
have an undirected graph G = (V, E) with two connected
components V1 and V2. A standard result of the spectral
method for conductance cut on undirected graphs (Sec. 2.3)
is that there is a second left eigenvector z of P such that
zT P = z, and sign(zi) = −sign(z j) for i ∈ V1,
j ∈ V2
[6]. This means that the ordering induced by the eigenvector
correctly separates the components. A similar result holds
for strongly connected components in a directed graph G
using the directed Laplacian.
We now present a similar result for directed 3-cycle
cut. First, we observe the following: there is no directed
3-cycle that has nodes from different strongly connected
components. Now, Lemma 4.1 shows that if we have a
graph with two strongly connected components, then, under
some conditions, the second left eigenvector computed by
Algorithm 1 correctly partitions the two strongly connected
components.
Lemma 4.1. Consider a directed graph G = (V, E) with two
components V1 and V2 such that there are no directed 3-
cycles containing a node i ∈ V1 and j ∈ V2. Assume
that the directed 3-cycle tensor T is given by Eqn. (4.11).
Augment the corresponding transition matrices Rk with a
sink node t so that transition involving j ∈ V1, k ∈ V2 (or
vice versa) jump to the sink node, i.e., P(i, j, k) = I (i = t).
Finally, instead of using the dangling distribution vector u
to fill in P, assume that when Pi T(i, j, k) = 0 for j, k ∈ V1,
P(i, j, k) = I(i ∈ V1)/V1.
(And the same for transitions
involving j, k ∈ V2).
Then P[x] has a second left eigenvector z with eigen-
value 1 such that zTe = 0 and sign(zi) = −sign(z j) for any
i ∈ V1, j ∈ V2.
Proof. See the full version of the paper.1
1Available from https://github.com/arbenson/tensor-sc.
5 Applications on synthetic networks
We now explore applications of our TSC framework. The
purpose of this section is to illustrate that explicitly parti-
tioning higher-order network data can improve partitioning
and clustering on directed networks. The examples that fol-
low are small and synthetic but illustrative. In future work,
we plan to use these ideas on real data sets.
For the applications in this section, we use the following
parameters for the tensor spectral clustering algorithm: α =
0.99 for the multilinear PageRank vector, γ = 0.01 for SS-
HOPM, u = u = 1
n e, and the higher-order conductance score
function (Eqn. (3.9)).
5.1 Layered flow networks Our first example is a net-
work consisting of multiple layers, where feedback loops
Information tends to flow
primarily occur within a layer.
“downwards” from one layer to the next.
In other words,
most edges between two layers point in the same direction.
Figure 2 gives an example of such a network with three lay-
ers, each consisting of four nodes.
We are interested in separating the layers of the network
via our TSC algorithm. Feedback in a directed network is
synonymous with directed cycle. For this example, we count
all directed 2-cycles (i.e., reciprocated edges) and directed
3-cycles. In order to account for the directed 2-cycles, we
will say that the data tensor T is equal to one for any index
of the form (i, i, j), (i, j, i), or ( j, i, i) when nodes i and j have
reciprocated edges. Formally, the data tensor is:
T(i, j, k) =
2
1
1
1
i, j, k distinct and form two D3Cs
i, j, k distinct and form one D3C
(k = j or k = i) and (i, j), ( j, i) ∈ E
j = i and (i, k), (k, i) ∈ E
Figure 2 lists the three communities found by (1) TSC
(Algorithm 2 with C = 3), (2) the directed Laplacian
(DL), and (3) the directed Laplacian on the subgraph only
including edges involved in at least one directed 2-cycle
or directed 3-cycle (Sub-DL). TSC is the only method that
correctly identifies the three communities. Sub-DL performs
almost as well, but misclassifies node 1, placing it with the
green nodes two layers beneath.
In general, DL does not
do well because there are a large number of edges between
layers, and the algorithm does not want to cut these edges.
5.2 Anomaly detection Our second example is anomaly
detection.
In many real networks, most directed 3-cycles
have at least one reciprocated edge [19]. Thus, a set of
nodes with many directed 3-cycles and few reciprocated
edges between them would be highly anamolous. The goal
of this example is to show that our TSC framework can find
such sets of nodes when they are planted in a network.
Figure 3 shows a network where the anomalous cluster
we want to identify is nodes 0–5. All triangles between
0
2
4
1
5
3
7
6
8
10
11
TSC
DL
{0, 1, 2, 3},
{4, 5, 6, 7},
{8, 9, 10, 11}
{1, 2, 3, 6, 7, 10},
{0, 4, 5, 8, 9},
{11}
9
Sub-DL {8, 10, 11},
{9},
{0, 1, 2, 3, 4, 5, 6, 7}
Figure 2:
(Left) Layered flow network, where almost
all feedback occurs at three different layers (specified by
the blue, red, and green nodes). There are many edges
going from one layer to the layers below it. (Right) Three
communities found when using TSC, the directed Laplacian
(DL), and the directed Laplacian on the subgraph of edges
participating in at least one directed 2- or 3-cycle (Sub-DL).
Only TSC correctly identifies all three communities.
nodes 0–5 are directed 3-cycles with no reciprocated edges.
Nodes 6–21 connect to each other according to a Erdos-
R´enyi model with edge probability 0.25. Finally, nodes 0–
5 each have four outgoing and two incoming edges with
nodes 6–21. In total, there are 18 directed 3-cycles with no
reciprocated edges, and 8 of them occur between nodes 0–5.
To use the TSC framework, we form a data tensor that
only counts directed 3-cycles with no reciprocated edges:
T(i, j, k) = I ((i, j), ( j, k), (k, i) ∈ E, ( j, i), (k, j), (i, k) < E)
+ I (( j, i), (k, j), (i, k) ∈ E, (i, j), ( j, k), (k, i) < E)
Figure 3 lists the smaller of the two communities found
by (1) TSC (Algorithm 2 with C = 2), (2) the directed
Laplacian (DL), and (3) the directed Laplacian on the sub-
graph only including edges involved in at least one directed
3-cycle with no reciprocated edges (Sub-DL). We see that
only TSC correctly captures the planted anomalous commu-
nity. DL does not capture any information about directed
3-cycles with no reciprocated edges, and hence the cut does
not make sense in this context. Sub-DL correctly captures
nodes 0, 1, 4, and 5, but misses nodes 2 and 3.
6 Directed 3-cycle cuts on large networks
We now transition to real data sets and show that our tensor
spectral partitioning algorithm provides good cuts for the
directed 3-cycle (D3C) data tensor given by Eqn. (4.11). We
compare the following algorithms:
9
2
11
10
3
4
8
1
5
0
7
6
21
17
18
19
20
12
13
14
15
16
DL
TSC
{0, 1, 2, 3, 4, 5,
12, 13, 16}
{1, 4, 5, 7, 8, 12,
13, 15, 18, 20}
Sub-DL {0, 1, 4, 5, 9, 11
16, 17, 19, 20}
(Left) Network with planted anomalous clus-
Figure 3:
ter (nodes 0–5). Between these nodes,
there are many
directed 3-cycles with no reciprocated edges (thick black
lines). Nodes 6–22 follow an Erdos-R´enyi graph pattern with
edges indicated by dashed lines. (Right) Smaller of two com-
munities found by TSC, the directed Laplacian (DL), and the
directed Laplacian on the subgraph with only edges involved
in a directed 3-cycle with no reciprocated edges (Sub-DL).
Only TSC finds the entire anomalous cluster.
• Directed Laplacian (DL) [5]: The sweep cut ordering
is provided by the second left eigenvector of Psym in
Eqn. (2.4).
• Asymmetric Laplacian (AL) [4]: The sweep cut or-
dering is provided by the second left eigenvector of P.
• Co-clustering (Co) [9, 28]: The sweep cut ordering
is based on the second left and right singular vectors
of a normalized adjacency matrix. Specifically, let
Drow = diag(Ae) and Dcol = diag(ATe) and let UΣVT
row AD−1/2
be the singular value decomposition of D−1/2
.
col
The the sweep cut ordering is provided by D−1/2
row U(:, 2)
or D−1/2
col V(:, 2). We take the better of the two cuts.
• Random: The sweep cut ordering is random. This
provides a simple baseline.
6.1 Data preprocessing Before running partitioning algo-
rithms, we first filter the networks as follows: (1) remove all
edges that do not participate in any D3C, and (2) take the
largest strongly connected component of the remaining net-
work. We perform this filtering to make a fairer comparison
between the different partitioning algorithms. Table 1 lists
the relevant networks and statistics for the filtered networks
that we use in our experiments. We limit ourselves to a few
representative networks to illustrate the main patterns we ob-
served. Data for more networks is available in the full ver-
sion of this paper. Networks are available from SNAP [23].
• TSC: This is our proposed method (Algorithm 2 with
C = 2), where the data tensor is given by Eqn. (4.11).
The sweep cut ordering is provided by the second left
eigenvector of P[x].
• Undirected Laplacian (UL): The sweep cut ordering is
provided by the second left eigenvector of the transition
matrix of the undirected version of the graph.
6.2 Results Figure 4 shows the sweep profiles on the net-
works in Table 1. The results are for a single cut of the
network. The plots show the higher-order conductance
(Eqn. (3.9)), higher-order expansion (Eqn. (3.10)), and den-
sity of the smaller of the partitionined vertex sets. For
email-EuAll and wiki-Talk, higher-order conductance
is the same for most algorithms, but TSC has much bet-
100
)
S
(
3
φ
10−1
10−2
10−3
101
104
102
100
)
S
(
3
ρ
10−2
101
100
y
t
i
s
n
e
d
10−2
10−4
101
email−EuAll
102
S
103
104
email−EuAll
102
S
103
104
email−EuAll
102
S
103
104
100
)
S
(
3
φ
10−1
10−2
10−3
100
104
)
S
(
3
ρ
102
100
100
100
y
t
i
s
n
e
d
10−2
10−4
100
wiki−Talk
S
wiki−Talk
S
wiki−Talk
soc−Epinions1
102
S
103
104
soc−Epinions1
102
S
103
104
soc−Epinions1
100
)
S
(
3
φ
10−1
10−2
105
10−3
101
104
102
100
)
S
(
3
ρ
105
10−2
101
100
y
t
i
s
n
e
d
10−2
S
105
10−4
101
102
S
103
104
100
)
S
(
3
φ
10−1
10−2
10−3
100
1010
)
S
(
3
ρ
105
100
10−5
100
100
y
t
i
s
n
e
d
10−2
10−4
10−6
100
twitter_combined
S
twitter_combined
S
twitter_combined
TSC
DL
UL
AL
Co
Random
105
105
S
105
Figure 4:
(Top row) Higher-order conductance, φ3(S ), as a function of the smaller vertex partition set (S ). The size of
the vertex set runs from twenty to half the nodes in the network. (Middle row) Higher-order expansion, ρ3(S ). (Bottom
row) Density of the cluster. For email-EuAll and wiki-Talk (left two coumns), higher-order conductance from TSC is
on par with other spectral methods, and higher-order expansion is better for large enough clusters. For soc-Epinions1
and twitter combined, the higher-order conductance and expansion is better using standard clustering algorithms. In all
cases, TSC finds much denser clusters.
Table 1: Statistics of networks used for computing directed
3-cycle cuts. The statistics are taken on the largest strongly
connected component of the network after removing all
edges that do not participate in any D3C.
Network
n = V m = E
# D3Cs
email-EuAll
soc-Epinions1
wiki-Talk
twitter combined
11,315
15,963
52,411
57,959
80,211
262,779
957,753
1,371,621
183,836
738,231
5,138,613
6,921,399
ter higher-order expansion when the vertex set gets large
enough. On soc-Epinions1 and twitter combined,
standard spectral methods have better higher-order conduc-
tance and higher-order expansion. Crucially, in all cases,
TSC finds much denser subgraphs.
In general, we expect
communities with lots of directed 3-cycles to be dense sets.
Thus, even though TSC sometimes does not always do well
with respect to the score metrics discussed in Sec. 3.4, it is
still finding relevant structure.
Since our goal is to explore structural properties of
the cuts, we did not tune our TSC algorithms for high
performance. Subsequently, we do not compare running
times of the algorithms. However, we note that for each
network, our straightforward implementation of TSC ran in
under 10 minutes using a laptop with 4GB of memory.
7 Related work
While the bulk of community detection algorithms are for
undirected networks, there is still an abundance of meth-
ods for directed networks [25]. There are several spectral
algorithms related to partitioning directed networks. The
ones we investigated in this paper were based on the undi-
rected Laplacian (i.e., standard spectral clustering but ignor-
ing edge directions), the directed Laplacian [5], the asym-
metric Laplacian [4], and co-clustering [9, 28]. Other spec-
tral algorithms are based on dyadic methods [24] and opti-
mizing directed modularity [22].
There is some work in community detection that explic-
itly targets higher-order structures. Klymko et al. weight
directed edges in triangles and then revert to a clustering
algorithm for undirected networks [19]. Clique percola-
tion builds overlapping communities by examining small
cliques [8]. Optimizing the LinkRank metric can identify
communities based on information flow [18], which is sim-
ilar to our use of directed 3-cycles in Sec. 5.1. Multi-way
relationships between nodes are also explicitly handled by
hypergraph partitioners [17] .
Finally, we mention that tensor factorizations have been
used by Huang et al. to find overlapping communities [16].
This work uses new spectral techniques for learning latent
variable models from higher-order moments [2].
8 Discussion
We have provided a framework for tensor spectral clustering
that opens the door to further higher-order network analy-
sis. The framework gives the user the flexibility to cluster
structures based on his or her application. In Sec. 5 we pro-
vided two applications—layered flow networks and anomaly
detection—that showed how this framework can lead to bet-
ter clustering of nodes based on network motifs. For these
applications, the networks were small and manually con-
structed. In future work, we plan to explore these applica-
tions on large networks.
In Sec. 6, we explored clustering based on directed 3-
In some cases, TSC provided much better cuts in
cycles.
terms of higher-order expansion.
Interestingly, for some
networks, simply removing edges that do not participate in
a directed 3-cycle and using a standard spectral clustering
algorithm is sufficient for finding good cuts with respect
to higher-order conductance and higher-order expansion.
However, in these cases, we are comparing against baselines
optimized for our specific problem. That being said, TSC
does always identify much denser clusters. The networks
we analyzed were social and internet-based, and it would be
interesting to see if similar trends hold for networks derived
from physical or biological systems.
For the large networks, we did not perform full directed
clustering—we only investigated the sweep profiles. The
higher-level goal of this paper is to explore the ideas in
higher-order clustering, and we leave full-stack algorithms
to future work. One interesting question for such algorithms
is whether we should partition based on recursive bisection
(Algorithm 2) or k-means. These algorithmic variations
provide several opportunities for challenging future work.
Acknowledgements
This research has been supported in part by NSF IIS-
1016909, CNS-1010921, CAREER IIS-1149837, ARO
MURI, DARPA XDATA, DARPA GRAPHS, Boeing, Face-
book, Volkswagen, and Yahoo. David F. Gleich is supported
by NSF CAREER CCF-1149756 and IIS-1422918. Austin
R. Benson is supported by a Stanford Graduate Fellowship.
References
[1] N. Alon and V. D. Milman. λ1, isoperimetric inequalities for
Journal of Combinatorial
graphs, and superconcentrators.
Theory, Series B, 38(1):73–88, 1985.
[2] A. Anandkumar, R. Ge, D. Hsu, S. M. Kakade, and M. Tel-
garsky. Tensor decompositions for learning latent variable
models. arXiv preprint arXiv:1210.7559, 2012.
[3] P. Boldi, R. Posenato, M. Santini, and S. Vigna. Traps and
pitfalls of topic-biased PageRank. In Algorithms and Models
for the Web-Graph, pages 107–116. Springer, 2008.
[4] D. Boley, G. Ranjan, and Z.-L. Zhang. Commute times for
a directed graph using an asymmetric Laplacian. Linear
Algebra and its Applications, 435(2):224–242, 2011.
[5] F. Chung. Laplacians and the Cheeger inequality for directed
graphs. Annals of Combinatorics, 9(1):1–19, 2005.
[6] F. R. Chung. Spectral graph theory, volume 92. American
Mathematical Soc., 1997.
[7] J. Cohen. Graph twiddling in a mapreduce world. Computing
in Science & Engineering, 11(4):29–41, 2009.
[8] I. Der´enyi, G. Palla, and T. Vicsek. Clique percolation in
random networks. PRL, 94(16):160202, 2005.
[9] I. S. Dhillon. Co-clustering documents and words using
bipartite spectral graph partitioning. In KDD, 2001.
[10] N. Durak, A. Pinar, T. G. Kolda, and C. Seshadhri. Degree re-
lations of triangles in real-world networks and graph models.
In CIKM, 2012.
[11] D. F. Gleich. Hierarchical directed spectral graph partition-
ing, 2006.
[12] D. F. Gleich, L.-H. Lim, and A. Benson. The Spacey Random
Surfer: A stochastic process for multilinear PageRank.
[13] D. F. Gleich, L.-H. Lim, and Y. Yu. Multilinear PageRank.
arXiv, cs.NA:1409.1465, 2014.
[14] M. S. Granovetter. The strength of weak ties. American
Journal of Sociology, pages 1360–1380, 1973.
[15] C. J. Hillar and L.-H. Lim. Most tensor problems are NP-
hard. Journal of the ACM (JACM), 60(6):45, 2013.
[16] F. Huang, U. Niranjan, M. Hakeem, and A. Anandkumar.
Fast detection of overlapping communities via online tensor
methods, 2013.
[17] G. Karypis and V. Kumar. Multilevel k-way hypergraph
partitioning. VLSI design, 11(3):285–300, 2000.
[18] Y. Kim, S.-W. Son, and H. Jeong. Finding communities in
directed networks. Phys. Rev. E, 81:016103, Jan 2010.
[19] C. Klymko, D. F. Gleich, and T. G. Kolda. Using triangles
In
to improve community detection in directed networks.
Proceedings of the ASE BigData Conference, 2014.
[20] T. G. Kolda and J. R. Mayo. Shifted power method for com-
puting tensor eigenpairs. SIAM Journal on Matrix Analysis
and Applications, 32(4):1095–1124, 2011.
[21] G. Kossinets and D. J. Watts. Empirical analysis of an
evolving social network. Science, 311(5757):88–90, 2006.
[22] E. A. Leicht and M. E. Newman. Community structure in
directed networks. PRL, 100(11):118703, 2008.
[24] Y. Li, Z.-L. Zhang, and J. Bao. Mutual or unrequited love:
Identifying stable clusters in social networks with uni-and
bi-directional links.
In Algorithms and Models for the Web
Graph, pages 113–125. Springer, 2012.
[25] F. D. Malliaros and M. Vazirgiannis. Clustering and commu-
nity detection in directed networks: A survey. Physics Re-
ports, 533(4):95 – 142, 2013.
[26] A. Prat-P´erez, D. Dominguez-Sal, J. M. Brunat, and J.-L.
Larriba-Pey. Shaping communities out of triangles. In CIKM,
2012.
[27] L. Qi. Eigenvalues of a real supersymmetric tensor. Journal
of Symbolic Computation, 40(6):1302–1324, 2005.
[28] K. Rohe and B. Yu. Co-clustering for directed graphs; the
stochastic co-blockmodel and a spectral algorithm. arXiv
preprint arXiv:1204.2296, 2012.
[29] M. Rosvall, A. V. Esquivel, A. Lancichinetti, J. D. West,
and R. Lambiotte. Memory in network flows and its effects
on spreading dynamics and community detection. Nature
communications, 5, 2014.
[30] T. Schank and D. Wagner. Finding, counting and listing
In
all triangles in large graphs, an experimental study.
Experimental and Efficient Algorithms. 2005.
9 Proof of Lemma 4.1
Proof. Without loss of generality, order the nodes so that
the nodes in V1 are first, the nodes V2 are second, and the
sink node t is last. Let R(i)
k be the transition probabilities of
Rk, restricted to nodes in Vi, i = 1, 2. Because nodes from
two different strongly connected components cannot be in
the same directed 3-cycle,
Rk = R(1)
k
0
0
0
0
eT
0
0
1
, k ∈ V1; Rk =
0
0
0 R(2)
k
eT
0
0
0
1
, k ∈ V2
Here, the first block diagonal matrix is of size V1 × V1, the
second of size V2 × V2, and the third of size 1 × 1. Consider
the following vectors that have the same block structure:
T
1 = heT
y
0 1i ,
T
2 = h0 eT
y
1i .
Then y
T
i Rk = yi, i = 1, 2 for k ∈ V1 and k ∈ V2. Thus,
T
i P[x] = X
y
T
i (xkRk) = X
y
xky
T
i = y
T
i
k
k
The vector z = y1 − N1+1
N2+1 y2 satisfies zT P[x] = zT and
zTe = 0. Since eT P[x] = eT, z is a second left eigenvector.
Finally, zi is positive for all i ∈ V1 and negative for all i ∈ V2.
[23] J. Leskovec
and A. Krevl.
Stanford
http://snap.stanford.edu/data, June 2014.
network
large
SNAP Datasets:
collection.
dataset
10 Directed 3-cycle cuts on more networks
Here we present the results of Sec. 6 on more networks. Ta-
ble 2 lists the statistics of eleven networks that we consider.
We include one undirected network, email-Enron. For this
data set, all undirected edges are simply replaced with two
directed edges. Figures 5, 6, and 7 show the sweep profiles
for higher-order conductance, higher-order expansion, and
density, respectively.
Table 2: Statistics of networks used for computing directed
3-cycle cuts. The statistics are taken on the largest strongly
connected component of the network after removing all
edges that do not participate in any directed 3-cycle.
Network
n = V
m = E
# D3Cs
wiki-Vote
wiki-RfA
as-caida20071105
email-EuAll
web-Stanford
soc-Epinions1
soc-Slashdot0811
email-Enron
wiki-Talk
twitter combined
amazon0312
1,151
2,219
8,320
11,315
12,520
15,963
22,193
22,489
52,411
57,959
253,405
24,349
61,965
50,016
80,211
105,376
262,779
377,172
332,396
957,753
1,371,621
1,476,377
43,975
133,004
72,664
183,836
212,639
738,231
883,884
1,447,534
5,138,613
6,921,399
1,682,909
100
10−1
100
)
S
(
3
φ
10−1
10−2
10−3
101
100
)
S
(
3
φ
10−1
10−2
10−3
101
100
amazon0312
TSC
DL
UL
AL
Co
Random
email−EuAll
)
S
(
3
φ
10−1
10−2
10−3
100
100
100
)
S
(
3
φ
10−1
10−2
10−3
101
100
)
S
(
3
φ
10−1
10−2
10−3
101
102
S
103
104
web−Stanford
102
S
103
104
100
)
S
(
3
φ
10−1
10−2
10−3
101
100
)
S
(
3
φ
10−1
10−2
10−3
100
100
)
S
(
3
φ
10−1
10−2
10−3
100
email−Enron
S
twitter_combined
S
wiki−Vote
105
105
as−caida20071105
102
S
103
104
soc−Slashdot0811
100
)
S
(
3
φ
10−1
10−2
10−3
100
100
)
S
(
3
φ
10−1
10−2
S
wiki−Talk
105
10−3
100
100
)
S
(
3
φ
10−1
10−2
105
10−3
101
S
102
S
103
102
S
104
106
soc−Epinions1
102
S
103
104
wiki−RfA
102
S
103
104
Figure 5: Directed 3-cycle higher-order conductance (φ3(S ), Eqn. (3.9)) as a function of the smaller partition size, S . The
size runs from twenty nodes to half the nodes in the network.
100
10−1
10−1
104
102
100
)
S
(
3
ρ
10−2
101
104
102
100
)
S
(
3
ρ
10−2
101
TSC
DL
UL
AL
Co
Random
email−EuAll
102
S
103
104
web−Stanford
102
S
103
104
104
102
100
)
S
(
3
ρ
10−2
100
100
104
102
100
)
S
(
3
ρ
10−2
101
104
103
102
)
S
(
3
ρ
101
101
amazon0312
102
S
104
106
soc−Epinions1
103
104
102
S
wiki−RfA
102
S
103
104
103
102
101
)
S
(
3
ρ
100
101
104
102
100
)
S
(
3
ρ
10−2
100
104
)
S
(
3
ρ
102
100
100
as−caida20071105
102
S
103
104
soc−Slashdot0811
email−Enron
S
twitter_combined
104
102
100
)
S
(
3
ρ
10−2
100
1010
)
S
(
3
ρ
105
100
S
wiki−Talk
S
wiki−Vote
105
10−5
100
103
)
S
(
3
ρ
102
105
105
105
101
101
S
102
S
103
Figure 6: Directed 3-cycle higher-order expansion (ρ3(S ), Eqn. (3.9)) as a function of the smaller partition size, S . The
size runs from twenty nodes to half the nodes in the network.
100
10−1
10−2
10−1
100
y
t
i
s
n
e
d
10−2
10−4
101
100
y
t
i
s
n
e
d
10−2
10−4
101
TSC
DL
UL
AL
Co
Random
email−EuAll
100
amazon0312
y
t
i
s
n
e
d
10−2
100
10−4
100
100
S
soc−Epinions1
y
t
i
s
n
e
d
10−2
10−4
101
100
y
t
i
s
n
e
d
10−2
10−4
101
102
S
103
104
web−Stanford
102
S
103
104
102
S
103
104
wiki−RfA
102
S
103
104
100
y
t
i
s
n
e
d
10−2
105
10−4
101
100
y
t
i
s
n
e
d
10−2
10−4
100
100
y
t
i
s
n
e
d
10−2
10−4
100
as−caida20071105
102
S
103
104
soc−Slashdot0811
email−Enron
S
twitter_combined
100
y
t
i
s
n
e
d
10−2
10−4
100
100
y
t
i
s
n
e
d
10−2
S
wiki−Talk
105
10−4
100
100
y
t
i
s
n
e
d
10−2
S
wiki−Vote
105
105
105
10−4
101
S
102
S
103
Figure 7: Density of the smaller partition set of vertices as a function of its size, S . The size runs from twenty nodes to
half the nodes in the network. In nearly all cases, TSC finds the densest clusters.
|
1705.04969 | 1 | 1705 | 2017-05-14T14:32:22 | Attributed Social Network Embedding | [
"cs.SI"
] | Embedding network data into a low-dimensional vector space has shown promising performance for many real-world applications, such as node classification and entity retrieval. However, most existing methods focused only on leveraging network structure. For social networks, besides the network structure, there also exists rich information about social actors, such as user profiles of friendship networks and textual content of citation networks. These rich attribute information of social actors reveal the homophily effect, exerting huge impacts on the formation of social networks. In this paper, we explore the rich evidence source of attributes in social networks to improve network embedding. We propose a generic Social Network Embedding framework (SNE), which learns representations for social actors (i.e., nodes) by preserving both the structural proximity and attribute proximity. While the structural proximity captures the global network structure, the attribute proximity accounts for the homophily effect. To justify our proposal, we conduct extensive experiments on four real-world social networks. Compared to the state-of-the-art network embedding approaches, SNE can learn more informative representations, achieving substantial gains on the tasks of link prediction and node classification. Specifically, SNE significantly outperforms node2vec with an 8.2% relative improvement on the link prediction task, and a 12.7% gain on the node classification task. | cs.SI | cs |
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
1
Attributed Social Network Embedding
Lizi Liao, Xiangnan He, Hanwang Zhang, and Tat-Seng Chua
Abstract-Embedding network data into a low-dimensional vector space has shown promising performance for many real-world
applications, such as node classification and entity retrieval. However, most existing methods focused only on leveraging network
structure. For social networks, besides the network structure, there also exists rich information about social actors, such as user profiles
of friendship networks and textual content of citation networks. These rich attribute information of social actors reveal the homophily
effect, exerting huge impacts on the formation of social networks. In this paper, we explore the rich evidence source of attributes in
social networks to improve network embedding. We propose a generic Social Network Embedding framework (SNE), which learns
representations for social actors (i.e., nodes) by preserving both the structural proximity and attribute proximity. While the structural
proximity captures the global network structure, the attribute proximity accounts for the homophily effect. To justify our proposal, we
conduct extensive experiments on four real-world social networks. Compared to the state-of-the-art network embedding approaches,
SNE can learn more informative representations, achieving substantial gains on the tasks of link prediction and node classification.
Specifically, SNE significantly outperforms node2vec with an 8.2% relative improvement on the link prediction task, and a 12.7% gain
on the node classification task.
Index Terms-Social Network Representation, Homophily, Deep Learning.
!
1 INTRODUCTION
S OCIAL networks are an important class of networks
that span a wide variety of media, ranging from social
websites such as Facebook and Twitter, citation networks of
academic papers, and telephone caller–callee networks - to
name a few. Many applications need to mine useful informa-
tion from social networks. For instance, content providers
need to cluster users into groups for targeted advertising [1],
and recommender systems need to estimate the preference
of a user on items for personalized recommendation [2].
In order to apply general machine learning techniques on
network-structured data, it is essential to learn informative
node representations.
Recently, research interest in representation learning has
spread from natural language to network data [3]. Many
network embedding methods have been proposed [3], [4],
[5], [6], and show promising performance for various ap-
plications. However, existing methods primarily focused
on general class of networks and leveraged the structural
information only. For social networks, we point out that
there almost always exists rich information about social
actors in addition to the link structure. For example, users
on social websites may have profiles like age, gender and
textual comments. We term all such auxiliary information
as attributes, which not only refer to user demographics, but
also include other information such as the affiliated texts
and the possible labels.
Attributes essentially exert huge impacts on the orga-
nization of social networks. Many studies have justified
its importance, ranging from user demographics [7], to
• X. He is the corresponding author. E-mail: [email protected]
•
L. Liao is with the NUS Graduate School for Integrative Sciences and
Engineering, National University of Singapore, Singapore, 117456.
E-mail: [email protected]
• X. He, H. Zhang and TS. Chua are with National University of Singapore.
Manuscript received May 12, 2017; revised **** ****.
(a) class year
(b) major
(c) dormitory
Fig. 1: Attribute homophily largely impacts social net-
work: we group users in each 4018×4018 user matrix based
on a specific attribute. Clear blocks around the diagonal
show the attribute homophily effect.
subjective preference like political orientation and personal
interests [8]. To illustrate this point, we plot the user–user
friendship matrix of a Facebook dataset from three views1.
Each row or column denotes a user, and a colored point
indicates that the corresponding users are friends. Each
subfigure is a re-ordering of users according to a certain
attribute such as "class year', "major" and "dormitory". For
example, Figure 1(a) first groups users by the attribute "class
year", and then sort these resulting groups in chronological
order. As can be seen, there exist clear block structures in
each subfigure, where users of a block are more densely
connected. Each block actually points to users of the same
attribute; for example, the right bottom block of Figure 1(a)
corresponds to users who will graduate in the year of 2009.
This real-world example lends support to the importance
of attribute homophily. By jointly considering the attribute
homophily and the network structure, we believe more
informative node representations can be learned. Moreover,
1. This is the Chapel Hill data constructed by [9], which we will detail
later in Section 5.1.1.
(cid:1006)(cid:1004)(cid:1004)(cid:1013)(cid:1006)(cid:1004)(cid:1004)(cid:1012)(cid:1006)(cid:1004)(cid:1004)(cid:1011)(cid:857)(cid:68)(cid:258)(cid:361)(cid:381)(cid:396)(cid:882)(cid:1005)(cid:1004)(cid:1011)(cid:857)(cid:857)(cid:24)(cid:381)(cid:396)(cid:373)(cid:882)(cid:1006)(cid:1005)(cid:1012)(cid:857)(cid:857)JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
2
since we utilize the auxiliary attribute information, the link
sparsity and cold-start problem [10] can largely be allevi-
ated.
In this paper, we present a neural framework named
SNE for learning node representations from social network
data. SNE is a generic machine learner working with real-
valued feature vectors, where each feature denotes the ID
or an attribute of a node. Through this, we can easily incor-
porate any type and number of attributes. Under our SNE
framework, each feature is associated with an embedding,
and the final embedding for a node is aggregated from its
ID embedding (which preserves the structural proximity) and
attribute embedding (which preserves the attribute proxim-
ity). To capture the complex interactions between features,
we adopt a multi-layer neural network to take advantage
of strong representation and generalization ability of deep
learning.
In summary, the contributions of this paper are as fol-
lows.
• We demonstrate the importance of integrating net-
work structure and attributes for learning more in-
formative node representations for social networks.
• We propose a generic framework SNE to perform so-
cial network embedding by preserving the structural
proximity and attribute proximity of social networks.
• We conduct extensive experiments on four datasets
with two tasks of link prediction and node classifica-
tion. Empirical results and case studies demonstrate
the effectiveness and rationality of SNE.
The rest of the paper is organized as follows. We first
discuss the related work in Section 2, followed by providing
some preliminaries in Section 3. We then present the SNE
framework in Section 4. We show experimental results in
Section 5, before concluding the whole paper in Section 6.
2 RELATED WORK
In this section, we briefly summarize studies about attribute
homophily. We then discuss network embedding methods
that are closely related to our work.
2.1 Attribute homophily in Social Networks
Social networks belong to a special class of networks, in
which the formation of social ties involves not only the
self-organizing network process, but also the attribute-based
process [11]. The motivation for considering attribute prox-
imity in the embedding procedure is rooted in the large
impact of attribute homophily, which plays an important
role in attribute-based process. Therefore, we provide a brief
summarization of homophily studies here as a background.
Generally speaking, the "homophily principle"-birds of
a feather flock together-is one of the most striking and
robust empirical regularities of social life [12], [13], [14]. The
hypothesis that people similar to each other tend to become
friends dates back to at least the 70s in the last century. In
social science, there is a general expectation that individuals
develop friendships with others of approximately the same
age [15]. In [16] the authors studied the inter-connectedness
between homogeneous composition of groups and the emer-
gence of homophily. In [17] the authors tried to find the
role of homophily in online dating choices made by users.
They found that online users of the online dating system
seek people like them much more often than chance would
predict, just as in the offline world. In more recent years,
[18] investigated the origins of homophily in a large univer-
sity community, using network data in which interactions,
attributes and affiliations were all recorded over time. Not
surprisingly, it has been concluded that besides structural
proximity, preferences for attribute similarity also provides
an important factor for the social network formation pro-
cedure. Thus, to get more informative representations for
social networks, we should take attributes information into
consideration.
2.2 Network Embedding
Some earlier works such as Local Linear Embedding
(LLE) [19], IsoMAP [20] and Laplacian Eigenmap [21] first
transform data into an affinity graph based on the feature
vectors of nodes ( e.g., k-nearest neighbors of nodes) and
then embed the graph by solving the leading eigenvectors
of the affinity matrix.
Recent works focus more on embedding an existing
network into a low-dimensional vector space to facilitate
further analysis and achieve better performance than those
earlier works. In [3] the authors deployed truncated ran-
dom walks on networks to generate node sequences. The
generated node sequences are treated as sentences in lan-
guage models and fed to the Skip-gram model to learn
the embeddings. In [5] the authors modified the way of
generating node sequences by balancing breadth-first sam-
pling and depth-first sampling, and achieved performance
improvements. Instead of performing simulated "walks"
on the networks, [6] proposed clear objective functions to
preserve the first-order proximity and second-order proximity
of nodes while [10] introduced deep models with multiple
layers of non-linear functions to capture the highly non-
linear network structure. However, all these methods only
leverage network structure. In social networks, there exists
large amount of attribute information. Purely structure-
based methods fail to capture such valuable information,
thus may result in less informative embeddings. In addition,
these methods get affected easily when the link sparsity
problem occurs.
Some recent efforts have explored the possibility of in-
tegrating contents to learn better representations [22]. For
example, TADW [23] proposed text-associated DeepWalk [3]
to incorporate text features into the matrix factorization
framework. However, only text attributes can be handled.
Being with the same problem, TriDNR [24] proposed to
separately learn embeddings from the structure-based Deep-
Walk [3] and label-fused Doc2Vec model [25], the embed-
dings learned were linearly combined together in an itera-
tive way. Under such a scheme, the knowledge interaction
between the two separate models only goes through a series
of weighted sum operations and lacks further convergence
constrains. On the contrary, our method models the struc-
ture proximity and attribute proximity in an end-to-end
neural network that does not have such limitations. Also, by
incorporating structure and attribute modeling by an early
fusion, the two parts only need to complement each other,
resulting in sufficient knowledge interactions [26].
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
3
In this work, we strive to develop embedding meth-
ods that preserve both the structural proximity and attribute
proximity of social network. In what follows, we give the
definition of the two notions.
Definition 1. (Structural Proximity) denotes the proximity of
social actors that is evidenced by links. For ui and uj, if there
exists a link eij between them, it indicates the direct proximity;
on the other hand, if uj is within the context of ui, it indicates the
indirect proximity.
Intuitively, the direct proximity corresponds to the first-
order proximity, while the indirect proximity accounts for
higher-order proximities [6]. A popular way to generate
contexts is by performing random walks in the network [3],
i.e., if two nodes appear in a walking sequence, they are
treated as in the same context. In our method, we apply the
walking procedure proposed by node2vec [5], which controls
the random walk by balancing the breadth-first sampling
(BFS) and depth-first sampling (DFS). In the remaining of
the paper, we use the term "neighbors" to denote both the
first-order neighbors and the nodes in the same context for
simplicity.
Definition 2. (Attribute Proximity) denotes the proximity of
social actors that is evidenced by attributes. The attribute inter-
section of Ai and Aj indicates the attribute proximity of ui and
uj.
By enforcing the constraint of attribute proximity, we can
model the attribute homophily effect, as social actors with
similar attributes will be placed close to each other in the
embedding space.
4 PROPOSED METHOD
We first describe how we model the structural proximity with
a deep neural network architecture. We then elaborate how
to model the attribute proximity with a similar architecture
by casting attributes to a generic feature representation. Our
final SNE model integrates the models of structures and
attributes by an early fusion on the input layer. Lastly, we
discuss the relationships of our SNE model to other relevant
models. Some of the terms and notations are summarized in
Table 1.
4.1 Structure Modeling
Since the focus of this subsection is on the modeling of
network structure, we use only the identity (ID) to represent
a node in the one-hot representation, in which a node ui is
represented as an M-dimensional sparse vector where only
the i-th element of the vector is 1. Based on our definition
of structural proximity, the key to structure modeling is in
the estimation of pairwise proximity of nodes. Let f be
the function that maps two nodes ui, uj to their estimated
proximity score. We define the conditional probability of
node uj on ui using the softmax function as:
(cid:80)M
p(ujui) =
exp(f (ui, uj))
j(cid:48)=1 exp(f (ui, uj(cid:48)))
,
(1)
which measures the likelihood that node uj is connected
with ui. To account for a node's structural proximity w.r.t. all
Fig. 2: An illustration of social network embedding. The
numbered nodes denote users, and users of the same color
share the referred attribute.
[27]
There have also been efforts explored semi-supervised
learning for network embedding.
combined an
embedding-based regularizer with a supervised learner to
incorporate label information. Instead of imposing regu-
larization, [28] used embeddings to predict the context
in graph and leveraged label information to build both
transductive and inductive formulations. In our framework,
label information can also be incorporated in the same
way similar to [28] when available. We leave this extension
as future work, as this work focuses on the modeling of
attributes for network embedding.
3 DEFINITIONS
Social networks are more than links; in most cases, social
actors are associated with rich attributes. We denote a social
network as G = (U,E,A), where U = {u1, ..., uM} denotes
the social actors, E = {eij} denotes the links between social
actors, and A = {Ai} denotes the attributes of social actors.
Each edge eij can be associated with a weight sij denoting
the strength of connection between ui and uj. Generally,
our analysis can apply to any (un)directed, (un)weighted
network. While in this paper, we focus on unweighted
network, i.e., sij is 1 for all edges, our method can be easily
applied to weighted network through the neighborhood
sampling strategy [5].
The aim of social network embedding is to project the
social actors into a low-dimensional vector space (a.k.a. em-
bedding space). Since the network structure and attributes
offer different sources of information, it is crucial to capture
both of them to learn a comprehensive representation of
social actors. To illustrate this point, we show an example in
Figure 2. Based on the link structure, a common assumption
of network embedding methods [3], [5], [6] is that closely
connected users should be close to each other in the embed-
ding space. For example, (u1, u2, u3, u4, u5) should be close
to each other, and similarly for (u8, u9, u11, u12). However,
we argue that purely capturing structural information is
far from enough. Taking the attribute homophily effect into
consideration, (u2, u9, u11, u12) should also be close to each
other. This is because they all major in computer science;
although u2 is not directly linked to u9, u11 or u12, we could
expect that some computer science articles popular among
(u9, u11, u12) might also be of interest to u2. To learn more
informative representations for social actors, it is essential
to capture the attribute information.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
(cid:89)
its neighbors, we further define the conditional probability
of a node set by assuming conditional independence:
p(Niui) =
p(ujui),
j∈Ni
(2)
where Ni denotes the neighbor nodes of ui. By maxi-
mizing this conditional probability over all nodes, we can
achieve the goal of preserving the global structural proximity.
Specifically, we define the likelihood function for the global
structure modeling as:
M(cid:89)
i=1
M(cid:89)
(cid:89)
i=1
j∈Ni
l =
p(Niui) =
p(ujui).
(3)
W(k), b(k)
Wid, Watt
Symbol
M
Ni
n
U
h(n)
i
ui
ui
u(cid:48)
i
4
TABLE 1: Terms and Notations
Definition
total number of social actors in the social network
neighbor nodes of social actor ui
number of hidden layers
the weight matrix connecting to the output layer
embedding of ui with both structure and attributes
the row in U refers to ui's embedding as a neighbor
pure structure representation of ui
pure attribute representation of ui
the k-th hidden layer weight matrix and biases
the weight matrix for id and attributes input
Having established the target of learning from network
data, we now design an embedding model to estimate the
pairwise proximity f (ui, uj). Most previous efforts have
used shallow models for relational modeling, such as matrix
factorization [29], [30] and neural networks with one hidden
layer [3], [5], [31]. In these formulations, the proximity of
two nodes is usually modeled as the inner product of their
embedding vectors. However, It is known that simply the
inner product of embedding vectors can limit the model's
representation ability and incur large ranking loss [32]. To
capture the complex non-linearities of real-world networks
[10], [33], we propose to adopt a deep architecture to model
the pairwise proximity of nodes:
fid(ui, uj)
= uj · δn(W(n)(··· δ1(W(1)ui + b(1))··· ) + b(n)),
(4)
where ui denotes the embedding vector of node ui, and
n denotes the number of hidden layers to transform an
embedding vector to its final representation; W(n), b(n) and
δn denote the weight matrix, bias vector and activation
function of the n-th hidden layer, respectively.
It is worth noting that in our model design, each node
has two latent vector representations, u that encodes a node
to its embedding and u that embeds the node as a neighbor.
To comprehensively represent a node for downstream appli-
cations, practitioners can add/concatenate the two vectors
which has empirically shown to have better performance in
distributed word representations [34], [35].
4.2 Encoding Attributes
Many real-world social networks contain rich attribute in-
formation, which can be heterogeneous and highly diverse.
To avoid manual efforts that design specific model com-
ponents for specific attributes, we convert all attributes
to a generic feature vector representation (see Figure 3 as
an example) to facilitate designing a general method for
learning from attributes. Regardless of semantics, we can
categorize attributes into two types:
• Discrete attributes. A prevalent example is categor-
ical variables, such as user demographics like gen-
der and country. We convert a categorical attribute
to a set of binary features via one-hot encoding.
For example, the gender attribute has two values
{male, f emale}, so we can express a female user as
the vector v = {0, 1} where the second binary feature
of value 1 denotes "female".
• Continuous attributes. Continuous attributes natu-
rally exist on social networks, e.g., raw features of
images and audios. Or they can be artificially gener-
ated from transformation of categorical variables. For
example, in document modeling, after obtaining bag-
of-words representation of a document, it is common
to transform it to real-valued vector via TF-IDF to
reduce noises. Another example is the historical fea-
tures, such as users' purchases on items and check-
ins on locations, which are always normalized to
real-valued vector to reduce the impact of variable
length [36].
Fig. 3: A simple example to show the two kinds of social
network attributes information.
Suppose there are K feature entries in the attribute
feature vector v as shown in Figure 3, for each feature entry,
we associate it with an low-dimensional embedding vector
ek which corresponds to the k-th column of the weight
matrix Watt as shown in Figure 4. We then aggregate the
attribute representation vector u(cid:48) for each input social actor
by u(cid:48) =(cid:80)K
k=1 vkek.
Similar to structure modeling, we aim to model the
attribute proximity by adopting a deep model to approximate
the complex interactions between attributes and introduce
non-linearity, which can be fulfilled by Equation 4 while
substituting ui with u(cid:48)
i.
4.3 The SNE Model
To combine the strength of both structure and attribute
modeling, an intuitive way is to concatenate the learned
embeddings from each part by late fusion as adopted by
[6]. However, the main drawback of late fusion is that
individual models are trained separately without knowing
each other and results are simply combined after training.
On the contrary, early fusion allows optimizing all parame-
ters simultaneously. As a result, the attribute modeling can
complement the learning of structure modeling, allowing
010.8…0.10.20.10.0…0.10.0…0.4FMl1…lLw1w2w3wW…t1tT…GenderLocationText.contentTransformedJOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
5
(cid:20) u
(cid:21)
teh two parts closely interact with each other. Essentially,
the strategy of early fusion is more preferable in recent
developments of end-to-end deep learning methods, such as
Deep crossing [37] and Neural Factorization Machines [38].
Therefore, we propose a generic social network embedding
framework (SNE) as shown in Figure 4, which integrates the
structure and attribute modeling parts by an early fusion on
the input layer. In what follows, we elaborate the design of
SNE layer by layer.
Embedding Layer. The embedding layer consists of two
fully connected components. One component projects the
one-hot user ID vector to a dense vector u which captures
structure information. The other component encodes the
generic feature vector and generates a compact vector u(cid:48)
which aggregates attributes information.
Hidden Layers. Above the embedding layer, u and u(cid:48)
are fed into a multi-layer perceptron. The hidden repre-
sentations for each layer are denoted as h(0), h(1),··· , h(n),
which are defined as follows:
,
λu(cid:48)
h(0) =
h(k) = δk(W(k)h(k−1) + b(k)), k = 1, 2,··· , n,
(5)
i
where λ ∈ R adjusts the importance of attributes, δk de-
notes the activation function, n is the number of hidden
layers. From the last hidden layer, we obtain an abstractive
representation h(n)
of the input social actor ui.
Stacking multiple non-linear layers has been shown to
help learning better representations of data [39]. Regarding
the architecture design, a common strategy is to use a
tower structure, where each successive layer has a smaller
number of neurons. The premise is that by using a small
number of hidden units for higher layers, they can learn
more abstractive features of data [39]. Therefore, as depicted
in Figure 4, we implement the hidden layers component
following the tower structure with halved layer size for
each successive higher layer. Such a design has also been
shown to be effective by recent work on recommendation
task [32]. Moreover, u and u(cid:48) are concatenated with weight
adjustments λ before fed into the fully connected layers,
which can help to learn high-order interactions between also
has been shown to help learning higher-order interactions
between u and u(cid:48) [32], [37].
Output Layer. At last, the output vector of the last
hidden layer h(n)
is transformed into a probability vector
o, which contains the predictive link probability of ui to all
the nodes in U:
i
o = [p(u1ui), p(u2ui),··· , p(uMui)].
(6)
Denoting the abstractive representation of a neighbor uj
as uj which corresponds to a row in the weight matrix
U between the last hidden layer and the output layer, the
proximity score between ui and uj can be defined as below:
f (ui, uj) = uj · h(n)
i
,
(7)
which can be fed into Equation 1 for further obtaining the
predictive link probability p(ujui) in vector o:
p(ujui) =
(cid:80)M
exp(uj · h(n)
j(cid:48)=1 exp(u(cid:48)
i
j · h(n)
i
)
,
)
(8)
Fig. 4: Social network embedding (SNE) framework.
where all the parameters Θ = {Θh, Wid, Watt, U} and Θh
denotes the weight matrices and biases in the hidden layers
component.
4.3.1 Optimization
To estimate the model parameters of the whole SNE frame-
work, we need to specify an objective function to optimize.
As detailed in Equation 3, we aim to maximize the condi-
tional link probability over all nodes. In this way, the whole
SNE framework is jointly trained to maximize the likelihood
with respect to all the parameters Θ,
i=1
M(cid:89)
(cid:88)
(cid:88)
(cid:89)
p(ujui)
(cid:88)
(cid:88)
uj∈Ni
ui∈M
j∈Ni
ui∈M
uj∈Ni
Θ(cid:63) = arg max
Θ
= arg max
Θ
= arg max
Θ
log p(ujui)
(cid:80)
exp(uj · h(n)
j(cid:48)∈M exp(uj(cid:48) · h(n)
log
)
i
i
(9)
. (10)
)
Maximizing the softmax scheme in Equation 10 actually
has two effects: to enhance the similarity between any ui
and these u ∈ Ni as well as to weaken that between any ui
and these u (cid:54)∈ Ni. However, this causes two major problems.
The first one lies in the fact that if two social actors are
not linked together, it does not necessarily mean they are
dissimilar. For example, many users in social websites are
not linked, not because they are dissimilar. Most of the
times, it is simply because they never had the chance to
know each other. Thus forcing dissimilarity between ui and
all the other actors not inside Ni will be inappropriate.
The second problem arises from the calculation of the nor-
malization constant in Equation 10. In order to calculate a
single probability, we need to go through all the actors in
the whole network, which is computationally inefficient. In
order to avoid these problems, we apply negative sampling
procedure [31], [40] where only a very small subset of users
are sampled from the whole social network.
The main idea is to do approximation in the gradient
calculation procedure. When we consider the gradient of
the log-probability in Equation 9, the gradient is actually
composed of a positive and a negative part as follows,
∇ log p(ujui) = ∇ f (ui, uj) − (cid:88)
p(uj(cid:48)ui)∇ f (ui, uj(cid:48)),
j(cid:48)∈M
i
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
where f (ui, uj) = uj · h(n)
as defined in Equation 7. Note
that given the actor ui, the negative part of the gradient is
in essence the expected gradient of ∇f (ui, uj(cid:48)), denoting
as E[∇f (ui, uj(cid:48))]. The key idea for sampling a subset of
social actors is to approximate this expectation, resulting in
much lower computational complexity as well as avoiding
too strong constraint on those not linked actors.
To optimize the aforementioned framework, we ap-
ply the Adaptive Moment Estimation (Adam) [41], which
adapts the learning rate for each parameter by performing
smaller updates for the frequent parameters and larger
updates for the infrequent parameters. The Adam method
combines the advantages of two popular optimization meth-
ods: the ability of AdaGrad [42] to deal with sparse gra-
dients, and the ability of RMSProp [43] to deal with non-
stationary objectives. To address internal covariate shift [44]
which slows down the training by requiring careful settings
of learning rate and parameter initialization, we adopt batch
normalization [44] in our multi-layer SNE framework. In
the embedding layer and each hidden layer, we also add
dropout component to alleviate overfitting. After proper
optimization, we obtain abstractive representation h(n) and
u for each social actor, similar to [34], [35], we use h(n) + u as
the final representation for each social actor, which returns
us better performance results.
4.4 Connections to Other Models
In this subsection, we discuss the connection of the pro-
posed SNE framework to other related models. We show
that SNE subsumes the state-of-the-art network embedding
method node2vec [5] and the linear latent factor model
SVD++ [45]. Specially, the two models can be seen as a
special case of shallow SNE. To facilitate further discussion,
we first give the prediction model of the one-hidden-layer
SNE as:
(cid:21)
(cid:20) ui
λu(cid:48)
i
6
where pu (qi) denotes the embedding vector for user u (item
i); Ru denotes the set of rated items for u, and yk denotes
another embedding vector for item k for modeling the item–
item similarity. By treating the item as a "neighbor" of the
user for estimating the proximity, we reformulate the model
using the symbols of our SNE:
fSV D++(ui, uj) = uj · (ui + u(cid:48)
i) ,
i denotes the sum of item embedding vectors of Ru,
where u(cid:48)
which corresponds to the aggregated attribute representa-
tion of ui in SNE.
To see how SNE subsumes the model, we first set δ1 to an
identity function, λ to 1.0, and b(1) to a zero vector, reducing
Equation 11 to:
f (ui, uj) = uj · W(1)
(cid:21)
(cid:20)ui
u(cid:48)
i
.
By further setting W(1) to a concatenation of two identity
matrices (i.e. W(1) = [I, I]), we can recover the SVD++
model:
f (ui, uj) = uj · (ui + u(cid:48)
i) .
Through the connection between SNE and a family of shal-
low models, we can see the rationality behind our design
of SNE. Particularly, SNE deepens the shallow models so
as to capture the underlying interactions between the net-
work structure and attributes. When modeling real-world
data that may have complex and non-linear inherent struc-
ture [10], [33], our SNE is more expressive and can better fit
on the real-world data.
5 EXPERIMENTS
In this section, we conduct experiments on four publicly
accessible social network datasets to answer the following
research questions.
Can SNE learn better node representations as
compared to state-of-the-art network embed-
ding methods?
RQ2 What are the key reasons that lead to better
RQ3
representations learned by SNE?
Are deeper layers of hidden units helpful for
learning better social network embeddings?
In what follows, we first describe the experimental settings.
We then answer the above three research questions one by
one.
5.1 Experimental Setup
5.1.1 Datasets
We conduct the experiments on four public datasets, which
are representative of two types of social networks - social
friendship networks and academic citation networks [46].
The statistics of the four datasets are summarized in Table 2.
FRIENDSHIP Networks. We use two Facebook net-
works constructed by [9], which contain students from
two American universities: University of Oklahoma (OK-
LAHOMA) and University of North Carolina at Chapel
Hill (UNC), respectively. Besides user ID, there are seven
anonymized attributes: status, gender, major, second major,
f (ui, uj) = uj · δ1(W(1)
+ b(1)).
(11)
RQ1
4.4.1 SNE vs. node2vec
The node2vec applies a shallow neural network model to
learning node embeddings. Under the context of SNE, the
essence of node2vec can be seen as estimating the proximity
of two nodes as:
fnode2vec(ui, uj) = uj · ui.
By setting λ to 0.0 (i.e., no attribute modeling), δ1 to an
identity function (i.e., no nonlinear transformation), W(1) to
an identity matrix and b(1) to a zero vector (i.e., no trainable
hidden neurons), we can exactly recover the node2vec model
from Equation 11.
4.4.2 SNE vs. SVD++
The SVD++ is one of the most effective latent factor models
for collaborative filtering [45], originally proposed to model
the ratings of users to items. Given a user u and an item i,
the prediction model of SVD++ is defined as:
fSV D++(u, i) = qi ·
pu +
(cid:88)
k∈Ru
,
yk
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
dorm/house, high school, class year. Note that not all stu-
dents have the seven attributes available. For example, for
the UNC dataset, only 4, 018 of the 18, 163 users contain all
attributes (as plotted in Figure 1).
CITATION Networks. For citation networks, we use
the DBLP and CITESEER2 data used in [24]. Each node
denotes a paper. The attributes are the title contents for
each paper after removing stop words and the stemming
process. The DBLP dataset consists of bibliography data in
computer science from [47]3. A list of conferences from four
research areas are selected. The CITESEER dataset consists
of scientific publications from ten distinct research areas.
These research areas are treated as class labels in the node
classification task.
Dataset
TABLE 2: Statistics of the datasets
#(E)
892,528
766,800
52,890
77,218
#(U)
17,425
18,163
60,744
29,751
UNC [9]
DBLP [24]
OKLAHOMA [9]
CITESEER [24]
5.1.2 Evaluation Protocols
We adopt two tasks - link prediction and node classi-
fication - which have been widely used in literature to
evaluate network embeddings [3], [5]. While the link pre-
diction task assesses the ability of node representations in
reconstructing network structure [10], node classification
evaluates whether the representations contain sufficient in-
formation trainable for downstream applications.
Link prediction. We follow the widely adopted way
in [5], [10]: we randomly hold out 10% links as the test
set, 10% as the validation set for tuning hyper-parameters,
and train SNE on the remaining 80% links. Since the
test/validation set contains only positive instances, we ran-
domly sample the same number of non-existing links as
negative instances [5], and rank both positive and negative
instances according to the prediction function. To judge the
ranking quality, we employ the area under the ROC curve
(AUROC) [48], which is widely used in IR community
to evaluate a ranking list. It is a summary measure that
essentially averages accuracy across the spectrum of test
values. A higher value indicates a better performance, and
an ideal model that ranks all positive instances higher than
negative instances has an AUROC value of 1.
Node classification. We first train models on the training
sets (with links and all attributes but no class labels) to
obtain node representations; the hyper-parameters for each
model are chosen based on the performance of link predic-
tion. We then feed node representations into the LIBLINEAR
package [49], which is widely adopted in [3], [10], to train
a classifier. To evaluate the classifier, we randomly sample a
portion of labeled nodes (ρ ∈ {10%, 30%, 50%}) as training,
using the remaining labeled nodes as test. We repeat this
process 10 times, and report the mean of the Macro-F1
and Micro-F1 scores. Note that since only the DBLP and
7
TABLE 3: The optimal hyper-parameter settings.
OKLAHOMA
SNE
node2vec
LINE
TriDNR
bs
lr
λ
p
q
S
tw
128
0.0001
0.8
2.0
0.25
100
0.6
UNC
256
0.0001
0.8
2.0
1.0
100
0.6
DBLP
128
0.001
1.0
1.0
0.25
10
0.8
CITESEER
64
0.001
1.0
2.0
0.125
10
0.8
CITESEER datasets contain class labels for nodes, the node
classification task is performed on the two datasets only.
5.1.3 Comparison Methods
We compare SNE with several state-of-the-art network
embedding methods.
- node2vec [5]: It applies the Skip-Gram model [31]
on the node sequences generated by biased random walk.
There are two key hyper-parameters p and q that control the
random walk, which we tuned them the same way as the
original paper. Note that when p and q are set to 1, node2vec
degrades to DeepWalk [3].
- LINE [6]: It learns two embedding vectors for each
node by preserving the first-order and second-order proxim-
ity of the network, respectively. Then the embedding vectors
are concatenated as the final representation for a node. We
followed the hyper-parameter settings of [6] and the number
of training samples S (millions) is adapted to our data size.
- TriDNR [24]: It learns node representations by cou-
pling multiple neural network models to jointly exploit
the network structure, node–content correlation, and label–
content correspondence. This is a state-of-the-art network
embedding method that also uses attribute information.
We searched the text weight (tw) hyper-parameter among
[0.0, 0.2, ..., 1.0].
For all baselines, we used the implementation released
by the original authors. Note that although node2vec and
LINE are state-of-the-art methods for embedding networks,
they are designed to use only the structure information.
For a fair comparison with SNE that additionally exploits
attributes, we further extend them to include attributes
by concatenating the learned node representation with the
attribute feature vector. We dub the variants node2vec+ and
LINE+. Moreover, we are aware of a recent network em-
bedding work [22] also considering attribute information.
However, due to the unavailability of their codes, we do not
further compare with it.
5.1.4 Parameter Settings
Our implementation of SNE is based on TensorFlow4, which
will be made available upon acceptance. Regarding the
choice of activation function of hidden layers, we have
tried rectified linear unit (ReLU), soft sign (softsign) and
hyperbolic tangent function (tanh), finding softsign leads
to the best performance in general. As such, we use soft-
sign for all experiments. We randomly initialize model
2. http://citeseerx.ist.psu.edu/
3. http://arnetminer.org/citation (V4 version is used)
4. https://www.tensorflow.org/
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
8
(a) OKLAHOMA
(b) UNC
(c) DBLP
(d) CITESEER
Fig. 5: Performance of link prediction on social networks w.r.t. different network sparsity (RQ1).
parameters with a Gaussian distribution (with a mean
of 0.0 and standard deviation of 0.01), optimizing the
model with mini-batch Adam [41]. We test the batch size
(bs) of [8, 16, 32, 64, 128, 256] and the learning rate (lr) of
[0.1, 0.01, 0.001, 0.0001]. The search space of the concatena-
tion hyper-parameter λ is the same as tw of TriDNR, where
a value of λ = 0.0 degrades to a model that considers only
the structure (c.f., Section 4.1). The concatenation parameter
λ is searched in same space as tw. More detailed impact of
λ is studied in Section 5.2.3. The embedding dimension d is
set to 128 for all methods in line with node2vec and LINE.
The hyper-parameter p and q for controlling the walking
procedure are set to be the same with that of node2vec.
Without special mention, we use two hidden layers, i.e.,
n = 2. Table 3 summarizes the optimal hyper-parameters
of each method tuned on validation sets.
5.2 Quantitative Analysis (RQ1)
5.2.1 Link Prediction
Figure 5 shows the AUROC scores of SNE and baseline
methods on the four datasets. To explore the robustness
of embedding methods w.r.t. the network sparsity, we vary
the ratio of training links and investigate the performance
change. The key observations are as follows:
1) Our proposed SNE achieves the best performance
among all methods. Notably, compared to the pure
structure-based methods node2vec and LINE, our SNE per-
forms significantly better with only half links. This demon-
strates the usefulness of attributes in predicting missing
links, as well as the rationality of SNE in leveraging at-
tributes for learning better node representation. Moreover,
we observe more dramatic performance drop of node2vec
and LINE on DBLP and CITESEER, as compared to that of
OKLAHOMA and UNC. The reason is that the DBLP and
CITESEER datasets contain less link information (as shown
in Table 2); as such, the link sparsity problem becomes more
severe when the ratio of training links decreases. On the
contrary, our SNE exhibits more stability when we use fewer
links for training, which is credible to its effective modeling
of attributes.
2) Focusing on methods that account for attributes, we
find how to incorporate attributes plays a pivotal role for
the performance. First, node2vec+ (LINE+) slightly improves
over node2vec (LINE), which reflects the value of attributes.
Nevertheless, the rather modest improvements indicate that
simply concatenating attributes with the embedding vector
is insufficient to fully leverage the rich signal in attributes.
This reveals the necessity of designing a more principled
approach to incorporate attributes into the network em-
bedding process. Second, we can see that SNE consistently
outperforms TriDNR - the most competitive baseline that
also incorporates attributes into the network embedding
process. Although TriDNR is a joint model, it separately
trains the structured-based DeepWalk and attributed-fused
Doc2Vec during the optimization process, which can be
sub-optimal to leverage attributes. In contrast, our SNE
seamlessly incorporates attributes by an early fusion on the
input layer, which allows the following hidden layers to
capture complex structure–attribute interactions and learn
more informative node representations.
3). Comparing the two structure-based methods, we
observe that node2vec generally outperforms LINE across all
the four datasets. This result is in consistent with Grover and
Leskovec [5]'s finding. One plausible reason for node2vec's
superior performance might be that by performing ran-
dom walks on the social network, higher-order proxim-
ity information can be captured. In contrast, LINE only
models the first- and second-order proximities, which fails
in capturing sufficient information for link prediction. To
justify this, we have further explored an additional baseline
that directly utilizes the second-order proximity by ranking
nodes according to their common neighbors. As expected,
the performance is weak for all datasets (lower than the
bottom line of each subfigure), which again demonstrates
the need for learning higher-order proximities via network
embedding. Since our SNE shares the same walking proce-
dure as node2vec, it is also capable of learning from higher-
order proximities, which are further complemented by the
attribute information.
5.2.2 Node Classification
Table 4 shows the macro-F1 and micro-F1 scores obtained
by each method on the classification task. Upon getting
the node representations, we train the LIBLINEAR classifier
with different ratios of labeled data (ρ ∈ {10%, 30%, 50%}).
Ratio of links for trainning0.40.50.60.70.8AUROC value0.880.890.90.910.920.930.940.950.960.970.98node2vecLINETriDNRnode2vec+attrLINE+attrSNERatio of links for trainning0.40.50.60.70.8AUROC value0.880.890.90.910.920.930.940.950.960.970.98node2vecLINETriDNRnode2vec+attrLINE+attrSNERatio of links for trainning0.40.50.60.70.8AUROC value0.780.80.820.840.860.880.90.920.940.960.98node2vecLINETriDNRnode2vec+attrLINE+attrSNERatio of links for trainning0.40.50.60.70.8AUROC value0.70.720.740.760.780.80.820.840.860.880.9node2vecLINETriDNRnode2vec+attrLINE+attrSNEJOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
The performance trends are generally consistent with that
of the link prediction task.
First and foremost, SNE achieves the best performance
among all the methods for all settings, and the one-sample
paired t-test verifies that all improvements are statistically
significant for p < 0.05. The performance of SNE is fol-
lowed by that of TriDNR, and then followed by that of
the attribute-based methods node2vec+ and LINE+; node2vec
and LINE which use only the network structure perform
the worst. This further justifies the usefulness of attributes
on social networks, and such that properly modeling them
can lead to better representation learning and benefit down-
stream applications. Among the four attribute-based meth-
ods, SNE and TriDNR demonstrate superior performance
over node2vec+ and LINE+, which points to the positive
effects of incorporating attributes into the network embed-
ding process.
It is worth pointing out that the ground-truth labels of
the node classification task are not involved in the network
embedding process. Despite this, SNE can learn effective
representations that support the task well. This is attributed
to SNE's modeling of network structure and attributes in a
sound way, which leads to comprehensive and informative
representations for nodes.
5.2.3 Impact of λ
We further explore the impact of λ which adjusts the im-
portance of attributes. Both the link prediction task and
the node classification task are evaluated under the same
evaluation protocols as Section 5.1.2. For a clear comparison,
we plot the results in Figure 6. The link prediction results
are reported under training on 80% of links. The node
classification results are obtained from training on 50% of
labeled nodes.
Due to the fact that λ actually can be set to any real
number under our learning framework, we first broadly
explore the impact of λ on the range [0, 0.01, 0.1, 1, 10, 100].
Setting λ to 0 returns the pure structure modeling, while
setting it to a large number approximates the pure attribute
modeling. We found that good results are generally obtained
within [0, 1] across datasets. When λ becomes relatively
large and the attribte part overweights the structure part,
the performance even becomes worse than pure structure
modeling. Therefore, we focus our exploration on the range
[0, 1] at an interval of 0.2.
Generally, attributes play an important role in SNE as
evidenced by the improving performance when λ increases.
We observe similar trends for both the link prediction and
node classification tasks across datasets. If we ignore the
attribute information by setting λ = 0.0, SNE degrades to
pure structure modeling as detailed in subsection 4.1. Its
corresponding performance is the worst for both tasks, as
compared to the attributes included counterparts. Moreover,
the performance improvements on DBLP and CITESEER
are relatively larger. Specifically, we observe a dramatic im-
provement of performance on CITESEER when λ increases
from 0.0 to 0.2. As there is less link information in these two
datasets as shown in Table 2, the performance improvement
indicates that attributes help to alleviate the link sparsity
problem.
9
(a) Link prediction
(b) Node classification
Fig. 6: Performance results with different λ (RQ1).
In addition, we observe that the pure structure model
(λ = 0.0) outperforms node2vec if we further compare the
results with Figure 5 for link prediction and Table 4 for
node classification. Since the same p, q setting as node2vec
are leveraged, we attribute the performance improvements
to the non-linearity introduced by the hidden layers.
5.3 Qualitative Analysis (RQ2)
To understand why SNE can achieve better results than the
other methods, we carry out a case study on the DBLP
dataset in this subsection. Given the node representations
learned by each method, we retrieve the three most similar
papers w.r.t. a given query paper. Specifically, we measure
the similarity using the cosine distance. For a fair compari-
son with the structure-based methods, the query paper we
choose is a well-cited paper of KDD 2006 named "Group
formation in large social networks: membership, growth, and
evolution". According to Google Scholar by 15/1/2017, its
citation number reaches 1510. Based on the content of this
query paper, we expect that relevant results should be about
the structure evolution of groups or communities in social
networks. The top results retrieved by different methods are
shown in Table 5.
60.00.20.40.60.81.0AUROC value0.80.820.840.860.880.90.920.940.960.98OKLAHOMAUNCDBLPCITESEER10
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
TABLE 4: Averaged Macro-F1, Micro-F1 scores for node classification task. (cid:63) denotes the statistical significance for
p < 0.05. (RQ1)
Dataset
Method
r
c
a
m
LINE
o 10% 0.548
30% 0.580
50% 0.619
o 10% 0.573
30% 0.614
50% 0.661
r
c
i
m
CITESEER
node2vec
0.606
0.625
0.667
0.623
0.653
0.695
LINE+
0.597
0.631
0.670
0.607
0.667
0.691
node2vec+
0.613
0.630
0.682
0.628
0.695
0.717
TriDNR
0.618
0.692
0.736
0.644
0.714
0.756
SNE
0.653(cid:63)
0.715(cid:63)
0.752(cid:63)
0.675(cid:63)
0.732(cid:63)
0.767(cid:63)
LINE
0.565
0.586
0.628
0.587
0.632
0.678
node2vec
0.617
0.632
0.677
0.647
0.665
0.733
LINE+
0.619
0.636
0.692
0.661
0.678
0.732
DBLP
node2vec+
0.631
0.642
0.695
0.686
0.749
0.753
TriDNR
0.665
0.702
0.715
0.750
0.778
0.785
SNE
0.699(cid:63)
0.725(cid:63)
0.761(cid:63)
0.763(cid:63)
0.786(cid:63)
0.804(cid:63)
TABLE 5: Top three results returned by each method (RQ2)
Query: Group formation in large social networks: membership,
growth, and evolution5
SNE
1. Structure and evolution of online social networks
2. Discovering temporal communities from social network documents
3. Dynamic social network analysis using latent space models
TriDNR
1. Influence and correlation in social networks
2. A framework for analysis of dynamic social networks
3. A framework for community identification in dynamic social
networks
node2vec
1. Latent Dirichlet Allocation
2. Maximizing the spread of influence through a social network
3. Mining the network value of customers
LINE
1. Graphs over time: densification laws, shrinking diameters and
possible explanations
2. Maximizing the spread of influence through a social network
3. Relational learning via latent social dimensions
First of all, we see that SNE returns rather relevant re-
sults: all the three papers are about dynamic social network
analysis and community structures. For example, the first
one considers the evolution of structures such as communi-
ties in large online social networks. The second result can
be viewed as a follow-up work of the query, focusing on
discovering temporal communities. While for TriDNR, the
top result aims to measure social influence between linked
individuals but community structures are not of concern.
Regarding methods that only leverage structure infor-
mation, the results returned by node2vec are less similar to
the query paper. It seems that node2vec tends to find less
related but highly cited papers. According to Google Scholar
by 15/1/2017, the citation numbers for the first, second and
third results are 16908, 4099 and 1815, respectively. This is
because the random walk procedure can be easily biased
towards the popular nodes that have more links. While SNE
also relies on the walking sequences, it can correct such bias
to a certain extent by leveraging attributes.
Similarly, LINE also retrieves less relevant papers. Al-
though the first and second results are related to dynamic
social network analysis, all the three results are not con-
TABLE 6: Performance of link prediction and node classi-
fication on DBLP w.r.t. different number of hidden layers
(RQ3)
Hidden layers
No Hidden Layers
128Softsign
256Softsign → 128Softsign
512Softsign → 256Softsign → 128Softsign
AUROC micro-F1
0.9273
0.9418
0.9546
0.9589
0.791
0.799
0.804
0.802
cerned with group or community. It might due to the limi-
tations of only modeling first- and second-order proximities
while leaving out the abundant attributes.
Based on the above qualitative analysis, we draw the
conclusion that using both network structure and attributes
benefits the retrieval of similar nodes. Compared to the
pure structure-based methods, the top returned results of
SNE are more relevant to the query paper. It is worth
noting that for this qualitative study, we have purposefully
chosen a popular node to migrate the sparsity issue, which
actually favors the structure-based methods; even so, the
structure-based methods fail at identifying relevant results.
This sheds light on the limitation of solely relying on the
network structure for social network embedding, and thus
the importance of modeling the rich evidence sources in
attributes.
5.4 Experiments with Hidden Layers (RQ3)
In this final subsection, we explore the impact of hidden
layers on SNE. It is known that increasing the depth of a
neural network can increase the generalization ability for
some models [32], [39], however, it may also degrade the
performance due to optimization difficulties [50]. It is thus
curious to see whether using deeper layers can empirically
benefit the learning of SNE.
Table 6 shows SNE's performance of the link predic-
tion and node classification tasks w.r.t. different number of
hidden layers on the DBLP dataset. The results on other
datasets are generally similar, thus we just showcase one
here. As the size of the last hidden layer determines a SNE
model's representation ability, we set it to the same number
for all models to ensure a fair comparison. Note that for
each setting (row), we have re-tuned the hyper-parameters
to fully exploit the model's performance.
First, we can see the trend that with more hidden lay-
ers, the performance is improved. This indicates the pos-
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
itive effect of using a deeper architecture for SNE, which
indeed increases its generalization ability and boost its
performance. The trade-off, however, is the server CPU
time needed for the training procedure. Specifically, on our
modest commodity server (Intel Xeon CPU of 2.40GHz), a
one-layer SNE takes 25.6 seconds, while a three-layer SNE
takes 81.9 seconds for one epoch. We stopped exploring
deeper models, as the current SNE uses fully connected
layers, which become difficult to optimize and can be eas-
ily over-fitting and degrading with more layers [50]. The
diminishing improvement of results in Table 6 also implies
the potential problem. To address it, modern neural network
designs shall be applied, such as the residual units and
highway networks [39]. We leave this possibility for future
work.
It is worth noting that when there is no hidden layer,
SNE's performance is rather weak, which is in the same
level as TriDNR. With one more layer, the performance is
significantly improved. This demonstrates the usefulness of
learning structure–attribute interactions in a non-linear way.
To justify this, we have further tried to replace the softsign
activation function with the identity function, i.e., using a
linear function above the concatenation of structure and
attribute embedding vectors. However, the performance
is much worse than that of using the non-linear softsign
function.
6 CONCLUSION
To learn informative representations for social network data,
it is crucial to account for both network structure and
attribute information. To this end, we proposed a generic
framework for embedding social networks by capturing
both the structural proximity and attribute proximity. We
adopted a deep neural network architecture to model the
complex interrelations between structural information and
attributes. Extensive experiments show that SNE can learn
informative representations for social networks and achieve
superior performance on the tasks of link prediction and
node classification comparing to other representation learn-
ing methods.
This work has tackled representation learning on social
networks by leveraging both structural and attribute infor-
mation. While social networks are rich sources of informa-
tion containing more than links and textual attributes, we
will study the following directions in future. First, we will
enhance our SNE framework by fusing data from multiple
modalities. It is reported that over 45% tweets contain
images in Weibo [51], making it urgent and meaningful to
perform network embedding with multi-modal data [52].
Second, we will develop (semi-)supervised variant for SNE,
so as to learning task-oriented embeddings to tailor for a
specific task. Third, we are interested in exploring how to
capture the evolution nature of social networks, such as new
users and social relations by using temporal-aware recurrent
neural networks. Lastly, we will consider improving the
efficiency of SNE by learning to hash techniques [53] to
make it suitable for large-scale industrial use.
11
ACKNOWLEDGMENTS
This research is supported by the NExT research center,
which is supported by the National Research Foundation,
Prime Minister's Office, Singapore under its IRC@SG Fund-
ing Initiative. We warmly thank all the anonymous review-
ers for their time and efforts.
REFERENCES
[1] X. Wang, L. Nie, X. Song, D. Zhang, and T.-S. Chua, "Unifying
virtual and physical worlds: Learning toward local and global
consistency," ACM Transactions on Information Systems, vol. 36,
no. 1, p. 4, 2017.
[2] X. He, M. Gao, M.-Y. Kan, and D. Wang, "Birank: Towards ranking
on bipartite graphs," IEEE Transactions on Knowledge and Data
Engineering, vol. 29, no. 1, pp. 57–71, 2017.
[3] B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning
of social representations," in SIGKDD, 2014, pp. 701–710.
S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, and T. S.
Huang, "Heterogeneous network embedding via deep architec-
tures," in SIGKDD, 2015, pp. 119–128.
[5] A. Grover and J. Leskovec, "node2vec: Scalable feature learning
for networks," in SIGKDD, 2016, pp. 855–864.
J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, "Line:
Large-scale information network embedding," in WWW, 2015, pp.
1067–1077.
J. D. Burger, J. Henderson, G. Kim, and G. Zarrella, "Discriminat-
ing gender on twitter," in EMNLP, 2011, pp. 1301–1309.
[8] M. Pennacchiotti and A.-M. Popescu, "Democrats, republicans and
starbucks afficionados: user classification in twitter," in SIGKDD,
2011, pp. 430–438.
[9] A. L. Traud, P. J. Mucha, and M. A. Porter, "Social structure
of facebook networks," Physica A: Statistical Mechanics and its
Applications, pp. 4165–4180, 2012.
[10] D. Wang, P. Cui, and W. Zhu, "Structural deep network embed-
[4]
[6]
[7]
ding," in SIGKDD, 2016, pp. 1225–1234.
[11] G. Robins, "Exponential random graph models for social net-
works," Encyclopaedia of Complexity and System Science, Springer,
2011.
[12] P. F. Lazarsfeld, R. K. Merton et al., "Friendship as a social process:
A substantive and methodological analysis," Freedom and control
in modern society, pp. 18–66, 1954.
[13] E. O. Laumann, Prestige and association in an urban community: An
analysis of an urban stratification system. Bobbs-Merrill Company,
1966.
[14] M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a feather:
Homophily in social networks," Annual review of sociology, pp. 415–
444, 2001.
[15] S. B. Kurth, "Friendships and friendly relations," Social relation-
ships, pp. 136–170, 1970.
[16] J. M. McPherson and L. Smith-Lovin, "Homophily in voluntary
organizations: Status distance and the composition of face-to-face
groups," American sociological review, pp. 370–379, 1987.
[17] A. T. Fiore and J. S. Donath, "Homophily in online dating: when
do you like someone like yourself?" in CHI '05, 2005, pp. 1371–
1374.
[18] G. Kossinets and D. J. Watts, "Origins of homophily in an evolving
social network1," American journal of sociology, pp. 405–450, 2009.
[19] S. T. Roweis and L. K. Saul, "Nonlinear dimensionality reduction
by locally linear embedding," Science, pp. 2323–2326, 2000.
[20] J. B. Tenenbaum, V. De Silva, and J. C. Langford, "A global
geometric framework for nonlinear dimensionality reduction,"
science, pp. 2319–2323, 2000.
[21] M. Belkin and P. Niyogi, "Laplacian eigenmaps and spectral
techniques for embedding and clustering," in NIPS, 2001, pp. 585–
591.
[22] X. Huang, J. Li, and X. Hu, "Label informed attributed network
embedding," in WSDM, 2017.
[23] C. Yang, Z. Liu, D. Zhao, M. Sun, and E. Y. Chang, "Network
representation learning with rich text information," in IJCAI, 2015,
pp. 2111–2117.
[24] S. Pan, J. Wu, X. Zhu, C. Zhang, and Y. Wang, "Tri-party deep
network representation," in IJCAI, 2016, pp. 1895–1901.
[25] Q. V. Le and T. Mikolov, "Distributed representations of sentences
and documents," in ICML, 2014, pp. 1188–1196.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017
12
[26] H.-T. Cheng, L. Koc, J. Harmsen, T. Shaked, T. Chandra, H. Arad-
hye, G. Anderson, G. Corrado, W. Chai, M. Ispir et al., "Wide &
deep learning for recommender systems," in Workshop on DLRS,
2016, pp. 7–10.
[27] J. Weston, F. Ratle, H. Mobahi, and R. Collobert, "Deep learning
via semi-supervised embedding," in Neural Networks: Tricks of the
Trade, 2012, pp. 639–655.
[28] Z. Yang, W. Cohen, and R. Salakhudinov, "Revisiting semi-
supervised learning with graph embeddings," in ICML, 2016, pp.
40–48.
[29] S. Cao, W. Lu, and Q. Xu, "Grarep: Learning graph representations
with global structural information," in CIKM, 2015, pp. 891–900.
[30] X. He, H. Zhang, M.-Y. Kan, and T.-S. Chua, "Fast matrix factoriza-
tion for online recommendation with implicit feedback," in SIGIR,
2016, pp. 549–558.
[31] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean,
"Distributed representations of words and phrases and their com-
positionality," in NIPS, 2013, pp. 3111–3119.
[32] X. He, L. Liao, H. Zhang, L. Nie, X. Hu, and T. Chua, "Neural
collaborative filtering," in WWW, 2017.
[33] D. Luo, F. Nie, H. Huang, and C. H. Ding, "Cauchy graph
embedding," in ICML, 2011, pp. 553–560.
[34] J. Pennington, R. Socher, and C. D. Manning, "Glove: Global
vectors for word representation," in EMNLP, 2014, pp. 1532–1543.
[35] O. Levy, Y. Goldberg, and I. Dagan, "Improving distributional sim-
ilarity with lessons learned from word embeddings," Transactions
of the Association for Computational Linguistics, 2015.
[36] S. Rendle, "Factorization machines," in ICDM, 2010, pp. 995–1000.
[37] Y. Shan, T. R. Hoens, J. Jiao, H. Wang, D. Yu, and J. Mao, "Deep
crossing: Web-scale modeling without manually crafted combina-
torial features," in SIGKDD, 2016, pp. 255–262.
[38] X. He and T.-S. Chua, "Neural factorization machines," in SIGIR,
2017, p. to appear.
[47] J. Tang, J. Zhang, L. Yao, J. Li, L. Zhang, and Z. Su, "Arnetminer:
extraction and mining of academic social networks," in SIGKDD,
2008, pp. 990–998.
[48] K. H. Zou, A. J. OMalley, and L. Mauri, "Receiver-operating char-
acteristic analysis for evaluating diagnostic tests and predictive
models," Circulation, pp. 654–657, 2007.
[49] R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J. Lin,
"Liblinear: A library for large linear classification," Journal of
machine learning research, pp. 1871–1874, 2008.
[50] X. Glorot and Y. Bengio, "Understanding the difficulty of training
deep feedforward neural networks," in AISTATS, 2010, pp. 249–
256.
[51] T. Chen, X. He, and M.-Y. Kan, "Context-aware image tweet
modelling and recommendation," in MM, 2016, pp. 1018–1027.
[52] C. Zhang, K. Zhang, Q. Yuan, H. Peng, Y. Zheng, T. Hanratty,
S. Wang, and J. Han, "Regions, periods, activities: Uncovering ur-
ban dynamics via cross-modal representation learning," in WWW,
2017, pp. 361–370.
[53] H. Zhang, F. Shen, W. Liu, X. He, H. Luan, and T.-S. Chua,
"Discrete collaborative filtering," in SIGIR, 2016, pp. 325–334.
[39] K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for
image recognition," in CVPR, 2016, pp. 770–778.
[40] S. Wang, Y. Wang, J. Tang, K. Shu, S. Ranganath, and H. Liu, "What
your images reveal: Exploiting visual contents for point-of-interest
recommendation," in WWW, 2017, pp. 391–400.
[41] D. Kingma and J. Ba, "Adam: A method for stochastic optimiza-
tion," in ICLR, 2015, pp. 1–15.
[42] J. Duchi, E. Hazan, and Y. Singer, "Adaptive subgradient methods
for online learning and stochastic optimization," Journal of Machine
Learning Research, pp. 2121–2159, 2011.
[43] T. Tieleman and G. Hinton, "Lecture 6.5-rmsprop, coursera: Neu-
ral networks for machine learning," Tech. Rep., 2012.
[44] S. Ioffe and C. Szegedy, "Batch normalization: Accelerating deep
network training by reducing internal covariate shift," in ICML,
2015, pp. 448–456.
[45] Y. Koren, "Factorization meets the neighborhood: a multifaceted
collaborative filtering model," in SIGKDD, 2008, pp. 426–434.
[46] S. Wasserman and K. Faust, Social network analysis: Methods and
applications, 1994.
|
1610.00782 | 4 | 1610 | 2018-01-19T21:55:34 | Network Structure Inference, A Survey: Motivations, Methods, and Applications | [
"cs.SI",
"cs.AI",
"physics.soc-ph"
] | Networks represent relationships between entities in many complex systems, spanning from online social interactions to biological cell development and brain connectivity. In many cases, relationships between entities are unambiguously known: are two users 'friends' in a social network? Do two researchers collaborate on a published paper? Do two road segments in a transportation system intersect? These are directly observable in the system in question. In most cases, relationship between nodes are not directly observable and must be inferred: does one gene regulate the expression of another? Do two animals who physically co-locate have a social bond? Who infected whom in a disease outbreak in a population?
Existing approaches for inferring networks from data are found across many application domains and use specialized knowledge to infer and measure the quality of inferred network for a specific task or hypothesis. However, current research lacks a rigorous methodology which employs standard statistical validation on inferred models. In this survey, we examine (1) how network representations are constructed from underlying data, (2) the variety of questions and tasks on these representations over several domains, and (3) validation strategies for measuring the inferred network's capability of answering questions on the system of interest. | cs.SI | cs |
Network Structure Inference, A Survey: Motivations,
Methods, and Applications
IVAN BRUGERE, University of Illinois at Chicago, USA
BRIAN GALLAGHER, Lawrence Livermore National Laboratory, USA
TANYA Y. BERGER-WOLF, University of Illinois at Chicago, USA
Networks represent relationships between entities in many complex systems, spanning from online social
interactions to biological cell development and brain connectivity. In many cases, relationships between entities
are unambiguously known: are two users 'friends' in a social network? Do two researchers collaborate on a
published paper? Do two road segments in a transportation system intersect? These are directly observable in
the system in question. In most cases, relationship between nodes are not directly observable and must be
inferred: does one gene regulate the expression of another? Do two animals who physically co-locate have a
social bond? Who infected whom in a disease outbreak in a population?
Existing approaches for inferring networks from data are found across many application domains and use
specialized knowledge to infer and measure the quality of inferred network for a specific task or hypothesis.
However, current research lacks a rigorous methodology which employs standard statistical validation on
inferred models. In this survey, we examine (1) how network representations are constructed from underlying
data, (2) the variety of questions and tasks on these representations over several domains, and (3) validation
strategies for measuring the inferred network's capability of answering questions on the system of interest.
1 INTRODUCTION
Networks represent relationships between entities in many complex systems, spanning from online
social interactions to biological cell development and brain connectivity. In many cases, relationships
between entities are unambiguously known: are two users 'friends' in a social network? Do two
researchers collaborate on a published paper? Do two road segments in a transportation system
intersect? These are directly observable in the system in question [104]. In most cases, however,
relationships between entities are not directly observable and must be inferred: does one gene
regulate the expression of another? Do two animals who physically co-locate have a social bond?
Who infected whom in a disease outbreak in a population?
Networks are mathematical representations (i.e., models) used to answer these types of questions
about data collected on individual entities. There is a broad range of the questions over application
domains and a variety of ways in which networks are used to answer these questions. How do
we know whether a particular network on data is the most useful representation for answering a
given question? What is the "right" network representation and how do we compare the utility of
many possible representations for our particular question? Finally, how can we measure whether
networks are the correct models to answer a particular question on the system of interest?
Various approaches that use specialized knowledge to infer and measure the quality of inferred
network for a specific task or hypothesis are found across many application domains. The rigor
of these methodologies varies across domains and currently there are no common best-practices
for evaluating the quality of networks inferred from data. Such practices would measure some
combination of general statistical properties, including model significance-testing and unique-
ness, sensitivity (i.e., the change in quality relative to underlying data measurements and model
parameters), and generalizability (i.e., network quality measured over multiple hypotheses or tasks).
Authors' addresses: Ivan Brugere, University of Illinois at Chicago, Chicago, IL, 60607, USA, [email protected]; Brian
Gallagher, Lawrence Livermore National Laboratory, Livermore, CA, 94550, USA; Tanya Y. Berger-Wolf, University of
Illinois at Chicago, Chicago, IL, 60607, USA, [email protected].
, Vol. 1, No. 1, Article . Publication date: January 2018.
In this survey, we examine: 1) how network representations are constructed from underlying
data; 2) the variety of questions and tasks on these representations over several domains; and 3)
validation strategies for measuring the inferred network's capability for answering questions on
the system of interest.
1.1 Motivation: Networks Represent Complex Relationships
Networks are a natural choice of data representation across many domains. First, networks by
design represent higher-order structure emerging from dyadic relationships, which serve as units of
further analysis. These structures include neighborhoods, ego-nets, communities/modules, and
connected components. For example, in the computational biology domain, clusters and motifs
often represent shared biological function. The mutual connectivity provides stronger evidence for
the common function than individual pairwise relationships. Individual, dyadic, neighborhood, or
aggregate population analysis may be the most appropriate depending on the question of interest.
Second, networks represent heterogeneity among entities in the local network topology. Rather
than analysis on population aggregates (e.g., histograms), networks allow local querying of complex,
non-metric attribute and feature spaces. Homophily yields correlation in node attributes among
entities close in the network. However, these correlations also tend to be non-monotonic: the most
similar node to a query entity may be arbitrarily distant in the network. Due to this correlation,
network topology often represents local clusters as overlapping, heterogeneous relationships. For
example, a user's 'friends' in an online social network often cluster into functional units: friends
from work, school, from the user's hometown etc., where nodes within each cluster are correlated
in some–often unknown–attribute. The effectiveness of simple heuristics such as counting common
neighbors in the link prediction problem [117] shows the latent information within social networks.
Third, networks are interpretable models for further analysis and hypothesis generation. Re-
searchers can visually explore small networks and examine relationships between nodes to compare
against their knowledge-base and intuition from the domain. Furthermore, a shared vocabulary
of descriptive network measures enables researchers to compare networks according to density,
degree distribution, clustering coefficient, centralities, diameter, average path length, triangle counts
[90, 181], and graphlet distributions [142]. Many higher-level network measures have also recently
been developed including robustness [37, 144], local information efficiency [7], and routing effi-
ciency [114, 189]. Using these shared measures, researchers can compare properties across classes
of networks and generate hypotheses explaining similarities or differences.
Finally, networks are common models for data and can be re-used in multiple studies. The
breadth of tools and support for network analysis allows researchers of various disciplines to apply
sophisticated off-the-shelf analysis and visualization techniques, as well as easier storage, querying,
and portability in graph databases. Researchers also have a common vernacular developed in the
area of "network science," across biology, physics, and computer science [24].
A cautionary note, however: when inferring networks from data, researchers ought to consider
whether higher-order structures are meaningful and which descriptive measures are appropriate on
the inferred network. Available tools and convenience can motivate researchers to translate their
problem into a network formulation, whether or not a network is the best model for the question
of interest. This survey aims to clarify when network models are appropriate and how they are
inferred.
1.2 Inferring Network Models from Data
Inferred networks are a class of networks where the node and/or edge definitions are inferred from
non-explicitly relational data. Work in network science often focuses on applications of explicit
networks: network representations where the meaning of nodes and edges is unambiguous and
2
categorical. For example, in the Facebook network, two adjacent users are categorically "friends." In
weighted networks such as a road transportation network, nodes represent road intersections and
edges represent the road segments between them. These edges are unambiguous, change with low
frequency, and have strict spatial constraints for new edge appearance. Measuring weights (e.g.,
travel time) is a matter of sensing/measuring traffic over the network, but these measurements are
constrained to adjacent nodes on the known topology. In general, estimating weights in explicit
network applications is a matter of accurately measuring a known relationship on a known topology,
rather than learning a hypothesized relationship on an unknown topology.
Seemingly explicit networks often also have biases and arbitrary choices (e.g., thresholding,
see: Section 2.5.1) in the collection or construction of the network. These choices are out of the
control of researchers using these networks. Starting from underlying data and translating data to a
network model enables researchers to measure and account for these biases to ensure the network
model actually represents the appropriate characteristics of the system.
1.3 Challenges
Inferring networks from data presents several challenges:
– Noisy measurements: The underlying relationships of interest within real datasets are
often noisy and confounded by overlapping relationships at varying scales (e.g., temporal,
spatial). Furthermore, such errors are propagated when measuring higher-order properties of
the inferred network (e.g., path lengths, triangle counts, network centralities, communities).
– Lack of ground truth and/or model assumptions: Determining whether a particular
method accurately encodes the relationship of interest in the network requires: (1) ground
truth data, (2) model assumptions (e.g., Exponential Random Graph Model), or (3) some
stability assumption (e.g., predictability over time). In many instances, no such assumptions
or data are available and researchers are left with an under-determined problem and ad-hoc
tuning of network model parameters [161].
– Large parameter spaces and sensitivity: Many network inference methods have thresh-
olds or other parameters which define a large space of possible networks. Often this leads
to ad-hoc selection or parameter-space sampling (see: Section 2.5.1). Although sensitivity
analysis is routine for method parameters of the subsequent task on the network (e.g., pre-
diction, classification), most evaluation methodologies do not incorporate inferred network
structure(s) into the sensitivity analysis.
– Varying model complexity: Descriptive interpretation of edges, paths, and communities
is increasingly challenging with additional model complexity. For example, a social network
defined via thresholding on who-calls-whom call record data is more interpretable than a
linear regression on node feature vectors. Determining the validity and interpretability of
these higher-order features is crucial to the many analyses that use them.
1.4 Outline of This Survey
This survey organizes recent work focusing on inferring networks from data. We draw from several
domains where these methods are applied and general method development from machine learning.
The study of inferring networks from data is largely unstructured. In Section 2, we first organize
the work under a common problem formulation, taxonomy, and terminology. In Section 3, we
examine various application domains to highlight unique challenges found in these areas.
1.5 Audience
Our survey is best suited for domain researchers using network inference in applications, as well
as machine learning researchers interested in methods and methodology on networks. For novices
3
Fig. 1. An overview of related areas in machine learning and network science for this survey, several surveyed
domains, and principle surveys and introductory work for these sub-areas.
in the networks space, Section 1.6 structures many introductory surveys related to our work.
Our survey is also relevant to the broader network science community working on traditional
explicit networks. These networks often represent an aggregation of longitudinal interactions which
are not informative to explain the current behavior of the population. Closer scrutiny of edges
in the network 'as given' may yield more appropriate representations and affect all aspects of
downstream analysis [29]. Researchers routinely construct networks from 'behavior' (i.e., node
features) or other data to evaluate against their explicit network. Much of the work in scientific
domains (including biology, ecology, chemistry) learn dynamic interaction networks in the absence
of ground truth. This work has developed varied strategies to evaluate the quality of networks in
general for prediction, classification, or the discovery of robust edge relationships over time or
question(s) of interest.
1.6 Meta-Review: Comparison to Existing Surveys
In this section, we provide a brief meta-review of existing surveys and work that is related but
distinct from network structure inference. See Section 2.3 for how these areas relate to our proposed
taxonomy of related work within our problem.
Figure 1 provides a map of research in related but distinct network science problems. Kolaczyk
[103] is the most relevant work to our survey. The author organizes related work in three categories:
(1) the link prediction problem, where some edges and all nodes are known and the task is to
infer new edges, (2) interaction networks where all nodes are known and the task is to infer edge
relationships (e.g., by correlation), and (3) network tomography where some edges and nodes are
known, and the task is to infer unobserved 'interior' nodes and edges [76, 133, 206]. Of these,
(2) is primarily within the scope of what we define as the network structure inference; we focus
with much greater depth on the network inference methodology and applications, where no edge
definition is known a priori.
We define network structure inference as distinct from the large body of work in relational
learning. One branch contains attribute inference and prediction on networks. Given a network,
these methods infer missing attributes using local estimates [159, 195], or link prediction: predicting
4
Network Structure InferenceKolaczyk 2009Temporal NetworksAggarwal and Subbing 2014Holme and Saramaki 2012Holme 2015Relational LearningKimmig et al. 2015Sen et al. 2008 Xiang and Neville 2008Link predictionHasan and Zaki 2011Liben-Nowell and Kleinberg 2007Relational InferenceNetwork ModelingGoldenberg et al. 2010Parametric InferenceDomainsda Fontoura Costa et al. 2011Havlin et al. 2012NeuroscienceBielza and Larrañaga 2014Bullmore and Sporns 2009Rubinov and Sporns 2010Simpson et al. 2013Ecology Krause et al. 2013Farine and Whitehead 2015Pinter-Wollman et al. 2013Computational Biology Hecker et al. 2009Marbach et al. 2012 Sima et al. 2009Yu et al. 2013…Epidemiology Danon et al. 2010Keeling and Eames 2005Welch et al. 2011Predictive Inferenceedges at a later time-step or by node attribute similarity [79, 117, 118]. These are two fundamental
tasks which serve as evaluation methodologies for many network inference methods.
A second branch in relational learning focuses on inferring probabilistic relational models from
data [65, 97]. While graphical models are one strategy applied to our problem, generally these
models treat attributes or variables as nodes. Previous work in probabilistic relational models
learns relationships between explicit input and output graphs, using node attribute inference, entity
resolution, and link prediction tasks in a supervised setting [130].
Other recent surveys cover broad statistical network modeling [66] and multi-layer networks
[22, 98]. Our survey draws on parametric network models, which is one class of model inferring
parameters according to a particular distribution (e.g., attribute-edge joint distributions, [137]).
Research in network synthesis on multi-layer networks is one case of network structure inference
for a particular task, where input data is a collection of networks.
Many network structure inference applications define edges by association measures over time
(e.g., correlation in time series), so dynamics and temporal networks are an important aspect
of network models for prediction tasks [2, 87, 88]. Finally, "network representation learning" is
typically used to describe graph embedding methods. This is a rapidly growing area which aims to
learn a low-dimensional representation of the network structure of a given network [40, 70, 78],
which preserves desired structural properties. These models are used for comparison of nodes or
networks, or predictive tasks in the embedded representation.
Our survey draws on several application areas. For a more exhaustive and general survey of
complex networks in different application domains, da Fontoura Costa et al. [41], Havlin et al.
[81] provide more breadth. However, we focus specifically on comparing motivations, evaluation
methodologies, and challenges in several of these areas. Recent domain-focused meta-studies [120]
and surveys in computational biology [83, 116, 162, 197], ecology [60, 106, 139, 141], neuroscience
[19, 31, 152, 163], political science [112], and epidemiology [43, 95, 190] all have significant discus-
sion of network topology inference specific to the domain. However, few have network structure
inference as a methodological focus and are limited to discussion of the single domain. Our survey
focuses on challenges across each of these areas. We provide value to domain researchers both
within and across fields, as well as to researchers in machine learning interested in predictive model
development on networks.
2 PROBLEM DESCRIPTION
We give a high-level formulation of network structure inference to clarify the methodologies often
encountered for this problem. This definition is very broad and not meant to be novel or exhaustive.
We use this formalization for added precision of defining the constituent elements we will discuss.
2.1 Preliminaries
We define a network G = ⟨V, E, A⟩ as a tuple containing a set V of n nodes, vi ∈ V, a set E of m
node pairs, eij ∈ E, and set A containing node and/or edge attribute sets. A particular attribute, the
weight of an edge wij is a scalar value, wij ≤ 1, where wij = 0 denotes the absence of an edge. An
unweighted network is a special case of a weighted network where wij ∈ {0, 1}. Edge and node
features are a particular type of attribute, derived by a function measuring some local edge or node
property (e.g., node degree). Time-varying networks are defined as a t-length sequence of static
network snapshots: G = (G1, ...Gk , ...Gt), with time-varying attributes and/or edges.1
1While there are other representations of time-varying (or temporal, dynamic) networks [88], the time series of static
networks is by far the most common.
5
Fig. 2. A common methodology for data science, with a focus on networks as models of underlying data. A
researcher typically (1) uses relevant data and appropriate data models to formalize a particular question.
(2) Traditional domain science (top, orange) typically combines direct observation and simple statistical
models. Data-driven science with machine learning (bottom, purple) augments this intuition, hypotheses and
statistical models with sophisticated features and patterns, yielding additional challenges for visualization,
hypothesis testing and generation. (3) The output of this analysis is a plausible explanation or some supported
hypothesis. (4) The result of data-driven science are considered to be shrinking this 'gap' in understanding,
toward robust and verifiable answers to the original question (see: Cao [35], Hey et al. [84]).
2.2 Data Science Motivations for Network Structure Inference
We organize network structure inference through the perspective of hypothesis-driven data science
[35, 84]. Under this perspective, the value of a network can be stated simply: for a question of
interest on the underlying system and its relevant data, are networks an informative and useful
data model for better answering the question?
Figure 2 gives an overview of a general data science methodology and introduces all the relevant
terms to our taxonomy. We start with a broad question of interest and try to (1) locate or collect the
data relevant to computationally modeling our question. There are several possible data sources,
collection processes, and modalities for analysis, coupled with several possible representations (e.g.,
networks, tensors). Our choice of data representation informs and constrains our hypotheses about
the question of interest. (2) Domain science (orange, top) and machine learning (purple, bottom)
generate complimentary analyses for hypothesis generation. (3) Novel computational methods are
developed to test these hypotheses. These tested models serve as a solution approaching an answer,
(4) closing the gap in understanding for many questions in novel ways. For example, data-driven
science has developed novel, large-scale methodologies relevant across scientific domains, including
experimental design [8, 74, 102] and randomization techniques [56, 99].
Figure 2 highlights several levels of modeling which can impact the final capability for answering
a question of interest. Often different individuals will be responsible for generating and collecting
the underlying data, inferring or defining the network, and developing the predictive models.
For example, machine learning researchers will rarely control the underlying sampling rate of
specialized data collection processes in bioinformatics, neuroscience, or climate science. One novel
approach in bioinformatics uses feedback from the network with active learning to guide the often
costly and labor intensive data collection and experimentation process [177].
6
GapData ModelingQuestionDataData ModelGPS, Proximity, SensorsSocial, Images, VideoTensorsTime Series,SequencesAvailable Tools,Data, ExpertiseDomain Knowledge,Observation,Statistical AnalysisPatterns, Clusters,Models, OptimizationHypothesis GenerationStatistically Testable, Parsimonious,Predictive or DescriptiveAnswerExperiments,Model DevelopmentModel/Hypothesis TestingVisualization NetworksExplicit, Discrete, Inferred RelationshipsKnown or Inferred EntitiesMethod of Inference (e.g. Correlation)Surveys, FieldnotesPlausible ExplanationsSupported HypothesesProblemComputational ScienceProcessDomain ScienceMachine Learning1234In the machine learning community, there is a great deal of sensitivity analysis for the subsequent
downstream predictive models on a network, without testing the parameters of the underlying
network representation. This strategy is effective at producing sophisticated models "given a
network," but is less suited at answering our scientific questions on the original system. Previous
work demonstrates that the incorrect network representation for a particular question can have
a large impact on performance [30]. Therefore the correct network representation may be more
important than developing the best predictive model.
2.3 A Taxonomy for Network Structure Inference
Below, we taxonomize work for the network inference problem according to:
(1) The varying difficulty of defining edges and nodes, given the nature of the underlying data.
(2) The type of method (e.g., mutual information, correlation) used for network inference.
(3) The types of hypotheses and tasks used to evaluate the quality of the network representation.
2.3.1 Explicit, Discrete, and Inferred Edge Definitions. Networks model three broad types of
relationships (i.e., edges), typically based on a measure of interaction between entities. Categorical,
explicit relationships are unambiguously known in the system–such as the 'friend' or 'follower'
relations in online social networks. Discrete interactions denote unambiguous transactions occurring
between two entities–such as phone calls or text messages in mobile device data. The primary task
of defining edges on these interactions is to select an appropriate threshold to measure the strength
of the relationship. Inferred interactions denote some statistical measure of similarity, beyond
simple transaction counts. For example, the definition of a spatiotemporal co-location interaction
between two entities can be inferred by specifying "how close" for "what duration," both of which
are continuous thresholds. This is a more challenging to measure relative to discrete interactions.
2.3.2 Explicit and Inferred Node Definitions. Similarly, inferring nodes is of varying difficulty
in different domains. In most applications, nodes are explicit in two ways: (1) the node definition
is unambiguous (e.g., a 'user', 'animal', or 'gene' is represented by a node) and (2) there is a node
correspondence between time-steps in the data (e.g., this particular node corresponds to a user
'ivan' at each time step). Functional brain networks and climate networks are two examples of
domains where the node definition is neither explicitly given nor is consistent over time. Here,
nodes correspond to groups of two-dimensional earth surface pixels, or three-dimensional brain
voxels. The scale of node definition can dramatically change the performance of predictive models
and the stability of descriptive statistics derived from the network [33].
2.3.3 Hypotheses and Tasks on Inferred Networks. Figure 2 (2–3) illustrates the core novelty in
machine learning and data science for hypothesis generation, model development, and testing.
In machine learning, there is typically a bias toward evaluating models using a novel prediction
tasks. However, typically these models do little to explain the underlying system and are more
useful for generating new hypotheses. In the statistics domain and many natural sciences, there
is a bias toward descriptive modeling, where the 'task' is parameter inference on an assumed
parametric (or non-parametric, but still with parameters, [188]) statistical model on the data. These
parameters are useful at interpreting the underlying system, such as fitting the exponent of degree
distributions, or reporting other aggregate statistics on a network. Both of these aspects have a
role for understanding the mechanisms of the underlying system.
Applications driven by descriptive models aim to reconstruct and describe the 'hidden' relational
structure with the greatest fidelity, relative to the domain knowledge base. A typical example
is gene regulatory networks (GRNs). These networks are inferred on data measuring individual
genetic expression over different experimental settings. In these networks, nodes represent genes
7
or functional gene families and edges represent inferred positive or negative gene expression
relationships (e.g., "gene A reduces the expression of gene B under some context"). Inference of
these networks typically identifies new, high quality candidate regulation relationships given high
accuracy of inferring known edges. These interactions can be experimentally tested to build greater
understanding of cellular processes and to develop potential personalized medical treatments.
In contrast, predictive methods aim to discover network structure which maximizes predictive
performance and may not reconstruct the underlying process with the highest fidelity. Instead, they
may focus on those aspects or modalities which are most predictive. Modeling the predictive aspects
of the data allows researchers to learn regular relationships between modalities (e.g., call, text, and
location in mobile phone data) or over time (e.g., periodicities). This informs further hypothesis
generation to understand the mechanism underlying the predictive relationships. However, often
highly predictive relationships are also uninteresting and can drive the structure of the inferred
network. Several domains such as climate science tend to remove known periodic dynamics as
preprocessing of the underlying data, prior to inferring the network structure.
2.3.4 Models for Network Structure Inference. We organize related work broadly along the type
of network structure inference model used, including parametric, non-parametric, and thresholded
interaction/correlation measures. In these groups, we categorize the type of task performed on the
network, including edge and attribute prediction, descriptive analysis, and model selection.
Table 1 summarizes work across several domains, introducing an example scientific question
driving the analysis, as well as the network structure inference model used to realize the network.
In Table 1 (Column 'Model'), we label these models under two broad categories.
First, parametric models make assumptions on the distribution of edges in the network. We
identify graphical models (GM) and other network models using maximum likelihood methods
(ML), relative to the assumption on the input data (e.g., the information flow between nodes [68]).
Causal models (CM) typically generate causal networks–a special case of graphical models–use
Granger causality [71] or other causal definitions [119, 124]. These networks represent strong
relationships between nodes which control for confounding factors of possible adjacent nodes.
Second, non-parametric models tend to directly measure interactions between nodes and use
statistical tests to determine appropriate edge weights (see Section 2.5.1). We categorize work
related to novel and 'ad-hoc' interaction measures (I) between the data associated with pairs of
nodes, correlation networks (IC) which measure linear, cross, or some other correlation, entropy
(IE), frequency domain measures (IF), and regression (R). The edge definition may be defined by
an underlying parametric model (e.g., linear correlation), however we refer to these models as
'non-parametric' because they don't have a model for the edge structure as a whole.
Table 1 (Column 'Task') categorizes rows within each domain by the type of task performed,
under the caveat that one study may use several evaluation strategies, or that the actual task may
be loosely described as the canonical task (e.g., edge prediction).
First, we denote predictive tasks, including edge prediction (PE) and attribute prediction (PA).
Attribute prediction can also describe prediction of the original data, or tasks such as change-point
prediction [62] and rank prediction, which are higher-order attribute tasks. Predictive models are
relatively rare across application domains because researchers are interested in descriptive and
interpretable models which give insight into the underlying system. We observe some specialization
in both information networks and epidemiology, which aims to predict the extent or timing of an
epidemic over a population in varying contact models.
Second, descriptive analysis is broken by node-oriented statistics (DN), which includes reporting
distributions of simple node statistics, such as degree distribution, clustering coefficient, correlation
distributions, etc. This often constitutes the base-level exploratory analysis and qualitative evalua-
8
tion of the inferred network. Role-oriented analysis (DR) aims to characterize nodes using network
features by the structural roles they play in the system (e.g., bridges between social communities).
This may also include factor analysis and interpretation. Other high-order analysis (DH) examines
communities and larger subgraph structures beyond node and edge-based descriptive statistics.
In descriptive and predictive cases, we find a sizable collection of work in model selection (MS).
This work uses varying network representations with some evaluation criteria over models. These
varying models correspond to different hypotheses to how the network may have been generated.
2.3.5 Evaluating Networks and Tasks. Evaluation strategies over the entire methodology of
Figure 2 measure the performance of the final task (prediction or statistical inference). In this
context, the network serves as a model of the data. However, the fidelity of this model in terms
of fitting error, or reconstruction against a partial ground truth network does not measure the
network's usefulness for answering questions on the original system. It is more appropriate to
think of the space of networks as possible representations with some utility for answering a specific
question. 'The network' is typically seen as uncovering the true relational structure of the data
with some error [187], rather than one of many representations for a particular purpose or question.
Most scientific domains use an evaluation strategy focused on a final task (a network for location
prediction, brain activity response, etc.), because there is no evaluation framework for comparing
the inferred network structure. For example, we simply cannot survey baboons [59] as we can
humans [53] to discover their real friendships. Furthermore, uncovering a general-purpose, robust
network from complex data may not appropriately model the overlapping modalities of the data. For
example, the existence of many contexts may mean that functional brain networks are inherently
probabilistic. Discovering the most general network model will be less informative in any particular
question because it does not account for this complexity [30].
2.4 Network Structure Inference
The network structure inference problem represents some input data as a network and validates
this network relative to performance on some task(s) or hypothesis. Often, model selection is
done offline and we only see the result of the final network representation evaluated on the task.
Currently, there exists no standardized methodology for evaluation of networks inferred from data.
Our work structures this problem, particularly in the absence of network validation data.
The network topology inference problem combines two basic models: first, a network model
R(D, α) → G constructs network G on input data D under some parameters α. This model may
be parametric statistical models (e.g., Exponential Random Graph Models) or non-parametric and
threshold-based interaction networks. Second, the problem uses a task model T(G, β) → p1, p2...
on input G under some parameters, with task outputs (e.g. prediction 'pi'). These approximate the
unknown ideal function T ∗(G) of a network task (e.g., classification, prediction) with error e().
This formulation may seem overly simplistic. However, it succinctly clarifies the relationships
between input data, the network model, and the task model. It explicitly formulates network G as
a model on data D for task T ∗, approximated by T . This formulation captures simple interaction
network methodologies (see: Section 2.5.1) which separately infer the network (often by hand-tuned
thresholds) and validate task performance, as well as parametric inference methods which learn
the network model parameters. To our knowledge, all network structure inference methodologies
can be broadly formulated in this pattern and all network inference models should be formulated
relative to a particular task or hypothesis. In much of the existing work, the network or task models
will not be formulated explicitly, or possible model combinations may be sparsely-explored.
We can instantiate several tasks within this formulation. In the context of network prediction
tasks, our predictive model can output predictions of (1) edges, (2) attributes, or (3) the original
9
data. For one instantiation, on a validation edge-set E∗, we can evaluate:
e(T(R(D, α), β), E∗)
argmin
G
(1)
This infers G over network model parameters α and task model parameters β. Practically, this
might be done by a model selection over a grid search of parameter pairs [30], or an iterative
re-training [122]. In this context, the suitability of both the network model, task model, and the
appropriate error function will determine the performance of the inferred network. Network model
selection methodologies mitigate some of the biases from offline, hand-tuned network construction
by exploring many possible model combinations.
This formulation highlights two key challenges in network structure inference. First, the param-
eter space of possible G from R(D, α) may be large and parameter search will likely be non-convex
with respect to the performance of the task of interest. Second, well-performing models in the
parameter-space may yield very different network topologies. Summarizing and reconciling these
differences may be important for interpreting which network model is most suitable. This prolif-
eration of plausible task and network models makes further hypothesis generation and testing
more challenging for the researcher; more plausible models means additional interpretations of the
mechanisms involved in the underlying behavior of the system.
2.5 Network Models and Inference Methodologies
Our problem description is flexible enough to incorporate varying types of network models (e.g.,
regression, correlation, parametric network models) and tasks (e.g., prediction, descriptive statistics
and hypothesis testing). Below, we describe several formulations for network structure inference
according to their network model and task model.
2.5.1
Interaction Networks. The most prevalent class of network topology inference is measuring
pairwise interactions (e.g., correlations) between nodes and choosing a threshold to define a
sufficient degree of interaction. This threshold may be chosen by some statistical test, by tuning
on some desired criteria (e.g., a desired network density), or ad-hoc offline testing. This has been
discussed in the context of discrete interactions as described above:
"Inferring networks from pairwise interactions of cell-phone call or email records simply
reduces down to selecting the right threshold τ such that an edge (u, v) is included in
the network if u and v interacted more than τ times in the dataset. Similarly, inferring
networks of interactions between proteins in a cell usually reduces to determining the
right threshold." [129]
Researchers often make several application-specific decisions around these thresholds:
"From this complete correlation graph, only the edges with significant correlation (>
0.5) were retained. But using the same threshold for positive and negative correlations is
not appropriate as negative correlations are usually weaker and many nearby locations
have high positive correlation" [93]
"We let δ as a user-controlled parameter, where larger δ values correspond to less
predicted regulations, and only focus on designing a significance score s(t, д) that leads
to 'good' prediction for some values of δ" [80]
These methods typically produce a fixed network model and explore networks under varying
threshold settings in an offline trial-and-error fashion. Unfortunately, these negative results are
rarely reported, so we often only have a description of the final network definition.
We use our formulation for this process. Assume the interaction threshold τ is given by hand-
tuning or domain knowledge; we have some feature matrix D that has some similarity between
10
features, measured by R(), and T() is an edge prediction task evaluated on E∗. This method is
expressed as:
R(D, τ) → G; argmin
e(T(G, β), E∗)
β
(2)
When these interaction networks are evaluated in the absence of ground truth, the network
may be measured through autocorrelation. In this case, the same network inference is applied,
R(D∗, α) → G∗ for some hold-out data D∗.
2.5.2 Parametric Network Models and Parameter Inference. Maximum-likelihood methods assume
some parametric model family to represent relationships between nodes, such as time between
interaction, likelihood of information transmission over time. For clarity, we work through one
specific application, in epidemiology and information networks such as blogs, although the pattern
is similar in other applications. Structure inference methods on disease transmission networks
share the assumption that we are observing the 'arrival' of infection or information/attribute value
at nodes (i.e., computers, blog pages, individuals) over time, but are unable to observe the topology
which transmitted the information. For an edge eij, the likelihood of information transmission
(or infection, in the epidemiology context) time difference tj − ti is given by an information
transmission/infection model, yielding the likelihood that vi transmitted information to vj [129].
Where input data D are infection times of each node, we can formulate these methods as:
R(D, α) → G; argmin
e(T(G, β), E∗)
argmin
(3)
In information network applications, E∗ is typically provided by a known network. Processes are
simulated on this network to generate input data for the maximum-likelihood relational data model
R(). This method is used to 'reconstruct' E∗ only from input data D.
α
β
2.5.3 Learning Network Structure and Task Model Parameters. Previous work in statistical rela-
tional learning on explicit networks has focused on learning relationships between (categorical)
attributes and a predictive task, such as link prediction [69, 130], and distinguishing correlated
effects between these processes [108].
Previous work has also used a methodology for the network structure inference problem which
maximizes performance of particular task(s) on the inferred network [45, 59]. Consider interaction
networks over varying thresholds τ. A naive solution for this type of approach is to explore the
parameter space of R(D, τ) and evaluate the task performance on each inferred network. However,
this is very costly, especially as R() requires more parameters.
Learning network structure paired with task parameters T() yields both the network and task
definition according to some optimization or model selection criteria. For example, previous work
has learned network models that iteratively discover features in a supervised LDA model, and
the logistic regression weights that perform well for an edge prediction task [122]. Other work
uses model selection to select task and network models by performance [30, 183], or minimum
description length (MDL) encoding cost [28]. A related area of work treats dynamic networks as a
sampling process over varying sampling rates [148], where network models are evaluated according
to the most predictive representation for the given task [62, 174].
In Equation 1, we have already formulated paired evaluation of network and task parameters:
(4)
With more context we now see R() can construct networks of varying interaction measures,
sampling rate criteria, etc., and this methodology selects the G() corresponding to minimum error
on T(). Therefore this simple formulation defines a very general model selection methodology.
e(T(R(D, α), β), E∗)
argmin
G
11
Domain
Computational
Biology
Example
Discover
interactions
between genes
in cellular
processes
Climate
Neuroscience
Epidemiology
Ecology
Mobile
Describe
relationships in
environmental
system
dynamics
Model
relationships
between brain
regions,
physiological
structure, and
function
Model hidden
networks from
observed
infections
Describe and
predict animal
behavior
social
on
Predict
influence
individual
mobility
Sec. Model
Task
Citations
I
IE
GM
R
CM
IC
IE
CM
GM
R
IC
IF
CM
ML
I
GM
ML
I
IE
R
I
3.1
3.2
3.3
3.4
3.5
3.6
DH, DR
PE
DN, PA
DN
DN, MS
PA
PA, MS
Zhang and Horvath [204]
Butte and Kohane [32], Faith et al.
[57], Meyer et al. [125]
Allen and Liu [4], Lebre et al. [113], Mani
and Cooper [119], Mukherjee and Speed
[128], Toh and Horimoto [178]
Haury et al. [80], Yuan and Lin [199]
Barzel and Barabasi [14], Feizi et al. [61]
Kawale et al. [92], Paluš et al.
[134], Steinhaeuser et al. [170], Tsonis and
Roebber [179], Tupikina et al.
[182], Yamasaki et al. [196]
Donges et al. [50], Hlinka et al. [85]
Ebert-Uphoff and Deng [55], Kretschmer
et al. [107], Runge et al. [153]
Zerenner et al. [202]
Zhou et al. [205]
Bialonski et al. [18], Zalesky et al. [200]
Lachaux et al. [109], Pfurtscheller and
Andrew [138], Ponten et al. [140], Zhan
et al. [203]
David et al. [44], Dhamala et al. [48], Friston
et al. [64], Ramsey et al. [145], Roebroeck
et al. [150], Rosa et al. [151]
Cao et al. [34], Papalexakis et al. [135]
Adar and Adamic [1], Haydon et al. [82]
Britton and O'Neill [26], Groendyke et al.
[73], Stack et al. [168]
Du et al. [51], Gomez-Rodriguez et al.
[67, 68], Myers and Leskovec
[129], Netrapalli and Sanghavi [132]
DH, MS
DN
PE
PE, DN
Aplin et al. [6], Haddadi et al. [75], Psorakis
et al. [143], Spiegel et al. [165]
Barrett et al. [12]
Farine [58], Whitehead and James [193]
Farine et al. [59], Fletcher et al. [63]
De Choudhury et al. [45], Eagle and
Pentland [53], Mastrandrea et al.
[121], Sekara and Lehmann [158]
Interaction, IC: Correlation, IE: Entropy, IF: Frequency, I: Novel measures
CM: Causal model GM: Graphical model, ML: Maximum likelihood, R: Regression
Descriptive Analysis, DN: Nodes, DR: Roles, DH: Other high-order, MS: Model Selection
Prediction, PA: Attributes, PE: Edges
Table 1. A summary of related work, across domains
3 APPLICATIONS OF NETWORK STRUCTURE INFERENCE
Applications of network structure inference are too numerous to meaningfully cover. Instead,
we look closely at a few applications where inferring networks from data is illustrative of the
challenges and expertise in these domains.
3.1 Computational Biology: Discovering New Genetic Regulation
Networks are constructed in computational biology to model many different processes. Protein-
protein interaction (PPI) is the most common type of network in this domain, constructed mostly
12
Fig. 3. A consensus gene regulatory network (GRN) of Staphylococcus aureus generated from microarray data
in the DREAM5 challenge ensemble methodology (see: Figure 4). Network modules in agreement with Gene
Ontology (GO) database are colored and labeled according to their shared function (grey are not coherent in
GO). The detail (right) shows inferred gene regulation related to pathogenesis. (From Marbach et al. [120]).
experimentally through, for example, yeast two-hybrid experiments others that physically test
for binding of one protein to another or other types of physical interactions. Metabolic networks
are process networks that model relationships between enzymes, metabolites (typically nodes)
on processes (typically edges) such as reactions or pathways. We focus only on gene regulation
networks (GRNs) and gene co-expression networks (GCNs), which infer relationships between
genes under different experimental scenarios (for further reading, see: [162]).
3.1.1 Underlying Data in Gene Regulatory Networks. Next-generation high-throughput microar-
ray technologies allow the sequencing of genomes and measuring the expression of particular
genes at a large scale and low cost [160]. 'Expression' is the measurement of how groups of genes
produce different phenotypic specializations through the production of different proteins. In cellular
development, different gene co-expression can be responsible for RNA translation or nucleotide
metabolism, yielding many complex functions from gene interaction (see: [13]). Figure 3 illustrates
a small network with annotated functional clusters.2
The output of microarray analysis (with notable simplification) is a 2D data matrix of numeric
values measuring the expression of a gene (row), on a particular experimental design, subject, or
time step (column) [10]. Defining edges between genes simplifies to comparing expression profiles
across the different columns of the data.
3.1.2 Discovering New Gene Interactions From Data. The high-level 'task' for gene regulatory
networks is link prediction on the network learned from data, to discover unknown gene regulation
candidates which can be experimentally tested. The network model inferred from data should
agree with databases of biologically-known interactions and function, while providing few verified
false-positive regulations.
Table 1 illustrates that the inference of GRNs is very mature relative to other domains, since the
inferred network is clearly verifiable according to current domain knowledge, and directs future
investigation and hypothesis generation. One unique challenge in gene regulation is the issue of
confounding factors, including indirect and transitive associations, resulting in many spurious
2All figures reprinted with permission and attribution.
13
Fig. 4. The general methodology design for the DREAM5 network inference challenge. This methodology
(1-2) generates one simulation dataset and three experimental microarray datasets from three well-studied
species. The 29 participating inference methods all (3) generate inferred network output, (4) a consensus
network is constructed for each dataset, and then (5) validated against known edges in synthetic networks
and against experimentally known edges in two of the real datasets. (From Marbach et al. [120]).
edges. Recent work has measured these 'direct' (e.g., causal) edges in noisy expression datasets
[14, 61].
3.1.3 Translating Gene Expression Data to Interaction Discovery. Marbach et al. [120] introduce
an ensemble approach associated with the DREAM5 network inference challenge. The authors
present 29 different network inference methods across different model types, including regression,
mutual information, correlation (a.k.a. 'relevance networks' in this domain), Bayesian networks,
ensembles, and other novel approaches (e.g., random forests, neural networks, Gaussian mixture
models, etc.) This list demonstrates the maturity and variety of methods applied to this problem.
These methods use pairwise (e.g., gene-to-gene correlation) or group-wise (e.g., many-to-one group
LASSO) measures of interaction intensity, which yield a directed, unweighted network signifying
"gene A regulates gene B."
Figure 4 illustrates an ensemble methodology for the DREAM5 network structure inference
challenge. The authors (1) generate a ground truth network on three species using experimental
trials as well as synthetic network data. In (2), these experiments yield four different datasets of
biologically-tested networks of gene regulation, as well as the raw (non-relational) gene expression.
The collection of inference methods produce (3) inferred networks on each of the four datasets.
The authors (4) integrate these 29 different inferred networks to produce an ensemble network.
This network is (5) validated against the ground-truth networks generated in step (1). Finally, the
authors show that the ensemble method discovered 59 potential interactions, of which 29 show
some support and 20 show strong support for being biologically significant.
We examine this process in such detail to demonstrate the 'complete' methodology for network
structure inference, from input data, to network representation, to a final output (learning the
regulatory network). Within our formulation, this methodology does not have an explicit task model,
as the network itself is the object of interest. Therefore, this application is typically descriptive
modeling against evaluation data. Although these models do 'predict' new potential gene regulation
via unknown edges, these interactions are usually checked manually through experimentation.
3.2 Environmental Science: Discovering Climate Relationships and Predicting
Outcomes
Networks inferred to understand climate dynamics are among the most difficult to model of any
domain, with much of the work to formalize and validate these networks still in early development.
14
Within this domain, researchers want to discover robust, causal relationships between climatic
variables, over different spatial regions of earth. This modeling can improve prediction of changing
hydrological processes, land-cover, ecosystem productivity, and polar or sea ice cover, which are key
aspects for climate change mitigation. Two unique challenges exist for inferring climate networks:
(1) Input data is typically noisy, highly spatially-autocorrelated, multivariate time series of
climatic variables collected over varying regimes and sensor (e.g., satellite) quality. Domain
scientists produce a consistent"reanalysis" data products which attempt to mitigate problems
of varying sensors and errors in data. However, inferring accurate networks from these data
requires significant understanding of the data ingestion process [115, 155] and its introduced
biases and variability.
(2) The structure of climate networks is not well understood aside from a handful of climate
indices–coarse spatial locations on earth where dynamics are well-studied and regulate
or correlate with other environmental processes (e.g., El Niño and La Niña oscillation cy-
cles). Therefore, validating correctness of the inferred network is suitable for unsupervised
strategies such as relational or predictive modeling of the original data.
3.2.1 Network Inference Methods in Climate and Environmental Science. Nearly all studies con-
structing climate networks use some time series similarity as an underlying relational measurement.
Previous work has used linear correlation [49, 170, 179, 196] or mutual information [49, 85], either a
hand-picked [49, 179] or a simple statistical test [196] to set similarity threshold τ–where similarity
greater than τ is considered a binary edge in the network.
There is considerable focus on formulating these simple pairwise comparison methods and often
the 'recipe' of the network, according to parameter settings and preprocessing choices, varies
greatly from study to study. These networks are typically binary rather than weighted, because the
final output of interest is a binary decision on the similarity distribution: (e.g., ["significant", "not
significant"]). However, typically these measures will have no 'natural' threshold which gives this
binary classification. Instead, these networks can be gradually densified or sparsified by weakening
or strengthening the similarity threshold.
Descriptive statistical work has been very popular downstream from these varying network
'recipes.' Donges et al. [49] reports clustering coefficient, betweenness centrality, closeness cen-
trality on correlation and mutual information networks (Equation 5–6). Tsonis et al. [180] reports
community structure which tends to cluster in spatially-contiguous locations, on account of the
autocorrelation present in these networks. Little work focuses on evaluating these networks as
predictive models for the input data. Steinhaeuser et al. [170] use both descriptive statistics and
predictive performance to evaluate the inferred network.
As work utilizing network models grows in this climate and environmental science, researchers
have developed more sophisticated techniques for determining edge significance [92], or conditional
dependencies using causality [55, 107, 153].
3.2.2 A Methodology for Translating Environmental Sensing Data to Interaction Network. We will
step through a concrete example of constructing a climate network from spatially-gridded time
series data of global surface air temperature (SAT) [49]. The authors measure the similar dynamics
of pairwise earth locations (corresponding to nodes ni , nj) and construct edges between locations
with 'significant' similarity. The authors use two standard measures, linear correlation and mutual
15
Pij =
Xi
(cid:115)Xi
B
t =1
(Xi,t − ¯Xi)(Xj,t − ¯Xj)
(cid:115)Xj
(Xj,t − ¯Xj)2
t =1
(Xi,t − ¯Xi)2
pb(Xi , Xj)log pb(Xi , Xj)
pb(Xi)pb(Xj)
t =1
(5)
(a) Pi j vs. distance
(b) Mi j vs. distance
(c) Pi j vs. Mi j
Fig. 5. On the input data of averaged global surface air temperature (SAT) at different spatial regions, (a)
shows the distribution of pairwise linear correlation measures (Pij ) vs. geographic distance between nodes,
on a logarithmic color bar scale. This illustrates a strong spatial autocorrelation between nearby points. (b)
shows the pairwise distribution for mutual information pairwise calculation vs. geographic distance, showing
less spatial autocorrelation. The horizontal bars indicate thresholds on the Pij and Mij scales which produce
the same network density (ρ = 0.005). (c) shows the linear correlation vs. mutual information. The starred
quadrant (top-left) denotes edges defined by mutual information but not by correlation. (From Donges et al.
[49]).
information between time series Xi and Xj:
b=1
Mij =
(6)
Equation 5 is the sample Pearson correlation between two time series, where ¯Xi is the sample
mean of time series Xi. The denominator represents the product of the sample standard deviations
of Xi and Xj. This measures linear relationship of Xi and Xj over the length of the time series.
Equation 6 is the discrete mutual information estimate between two time series, where pb(Xi , Xj)
is the joint cumulative distribution of the b-th discretization window, and pb(X) is the marginal
cumulative distribution of the b-th discretization window. This measure compares the shape of the
joint and marginal probability density functions. When the joint distribution is equal to the product
of marginal distributions: log(1) = 0 yields no mutual information (e.g., Xi and Xj are independent).
Varying similarity threshold τ produces networks of varying edge densities ρ and other network
measures. The authors select thresholds for correlation and mutual information (τcorr = 0.682 and
τMI = 0.398) such that they produce the same network density (ρ = 0.005).
Figure 5(a) shows the density of pairwise linear correlation measures (Pij) vs. geographic distance
between nodes, on a logarithmic color bar scale. This illustrates a strong spatial autocorrelation
between nearby points. Figure 5(b) shows the pairwise distribution for mutual information pairwise
calculation vs. geographic distance, showing less spatial autocorrelation. The horizontal bars
indicate thresholds on the Pij and Mij scales which produce the same network density (ρ = 0.005).
Figure 5(c) shows the linear correlation vs. mutual information. The starred quadrant (top-left)
denotes edges defined by mutual information but not by correlation. This demonstrates that under
a fixed network density, the chosen similarity measure can yield a very different network structure.
16
(a) Betweenness vs. Degree (b) Betweenness vs. Closeness
Fig. 6. (a) the distribution of betweenness centrality of nodes vs. degree of nodes. (b) the distribution of
betweenness centrality of nodes vs. closeness centrality of nodes. (From Donges et al. [49]).
While several methods have been developed to test edge significance, little work has focused on
the validity of higher-order structures such as paths or communities. While the graph definition of
paths or communities are valid on these networks, no known work in this domain measures the
interpretation of these relationships with respect to the original time series data.
Figure 6 explores the sub-spaces of different node measures on the inferred network. Figure
6(a) shows the distribution of betweenness centrality per node, vs. the degree per node. Similarly,
6(b) shows betweenness centrality and closeness centrality. The authors demonstrate that degree-
preserving edge re-wiring randomization indeed destroys the rank-order correlation between the
marginal distributions of the node measures.
There are two drawbacks of this analysis which re-occur across domains. First, while this
methodology tests some global relational structure of the network, we are unable to interpret the
relationship between any two nodes at a high geodesic distance (≥ 2). This means that we cannot
measure properties we associate with networks, such as flow or routing. Second, significance
analysis is done at a particular threshold setting, without a sensitivity analysis on the original
threshold choice. In the machine learning settings, the parameter sensitivity will often be on the
prediction model parameters at a particular network definition threshold.
3.3 Neuroscience: Describing Functional Brain Structure and Its Connections
Biological research suggests that the brain activates interconnected, often spatially distant, regions
along neuronal pathways [166]. This interconnected complexity makes networks a very natural
model to study the brain. These studies are broadly in two areas: structural and functional brain
networks. Structural networks (also known as 'effective connectivity', tractography, or the brain
connectome) map the physical axon pathways between neurons, which may be relatively long and
spatially distant. With some simplification, these networks are analogous to the physical layer in
communication networks, where nodes are explicitly connected by cables and routers. Functional
networks are analogous to the logical layer in communication networks. These networks model
how neuronal signals (i.e. 'traffic') flows over this physical layer in order to activate other neurons
(i.e. 'resources') to perform different types of behavior such as auditory, visual, or motor behaviors.
Researchers are only starting to understand the underlying routing and information-seeking on
this physical network, and the complex contexts which change how the behavior is realized within
the functional layer. Researchers aim to better understand and predict this routing, as well as the
collective activation dynamics in different areas of the brain.
Much work compares the topology of structural and functional networks using descriptive
17
Fig. 7. A methodology for constructing brain networks. (1) for a subject or population of subjects, (2) sensing
techniques such as Diffusion Tensor Imaging (DTI) or functional Magnetic Resonance Imaging (fMRI) are
used to sense connectivity or activity of the brain, respectively. (3) Given sensed data at recording sites
(nodes), edges are inferred by different measures on the underlying data (see: Section 3.3.2). (4) Subsequent
scientific study is conducted, using the network as a data model. (From Sporns [166]).
network statistics and higher-order structures, such as cluster and communities [147, 152, 167],
especially under different experimental conditions that may affect these structures, such as spinal
cord injuries, epilepsy, or schizophrenia. However, all of these studies infer the network models
differently, therefore it is an open challenge to rigorously synthesize these results.
3.3.1 Underlying Data in Brain Networks. The underlying data for structural or function networks
are primarily derived from two sources. First, bio-medical imaging technologies, including Magnetic
Resonance Imaging (MRI), functional MRI (fMRI), and Diffusion Tensor Imaging (DTI), detect
structure of varying densities and water content. These procedures produce a flat two-dimensional
image of pixels, or a three-dimensional space of voxels (often as a series of imaging over time). For
example, DTI is used to construct structural networks. These images can accurately trace axon
tissue connectivity by measuring flow vector orientation through the voxel space. fMRI similarly
measures blood flow to voxels, a surrogate for 'activity' at this location. Inferring a functional
network on fMRI data then amounts to measuring statistical interactions (e.g., correlation) between
activations in different brain areas. Second, non-invasive sensors, including electroencephalography
(EEG) and magnetoencephalography (MEG), measure and localize electrical current at a probed
location. Typically, these probes yield fewer and spatially coarser nodes than those defined from
fMRI voxel data. These techniques produce time-series estimating electrical current (a measure for
'activity') at reference locations.
Figure 7 illustrates defining both structural and functional networks, from (1) the data collection
on individual subjects to (4) the final analysis task. The left path of Figure 7 illustrates constructing
18
structural networks. (2) Anatomical parcellation techniques use DTI or similar imaging to determine
physical connectivity in the brain. These techniques are very accurate in recovering tracts of
connectivity, unambiguously. (3) these tracts are translated into nodes and edges, where previous
work shows significant effects of node definition on descriptive measures such as average path
length and clustering coefficient [201]. Finally, (4) researchers use the networks as models to ask
questions about the brain of the original subject or population.
The right path of Figure 7 illustrates inferring functional networks from sensed neuronal activity.
This activity can be for a range of stimulus such as music preferences [194], image/language
associations [135] or for experimental conditions such as an Alzheimer's patient cohort [175]. (2)
fMRI, EEG, or MEG sensors measure activity at different recording sites (contact locations, pixel
or voxel locations). As in structural network construction, pixel aggregation or node definition
mapping may be applied. (3) These activity response signals are compared between recording
sites (nodes) with time series similarity measures (e.g., cross-correlation). 'Sufficiently' similar time
series are interpreted as latent connections between nodes, yielding the final functional network.
One class of experiments focuses on functional networks from fMRI, coupled with a particular
experimental user task (e.g., speaking, listening, motor). Another class focuses on inferring resting-
state networks (RSNs) of the brain [72]. These networks are constructed in much the same way as
other functional networks, except this resting connectivity is informative of very robust functional
clusters. Functional networks for different user tasks can then be characterized at a higher level
(e.g., cognitively 'difficult' tasks) by comparing to the resting-state network (RSN).
Another network of particular research interest is the 'rich-club' structural sub-networks [184–
186]. This network is essentially a k-core decomposition of the structural network, which indicates
the global 'backbone' of connectivity (where k > 10 is set in comparison to degree-preserving
randomized networks). Nodes within the rich-club network are used to characterize the broader
network into 'rich-club edges' connecting two rich-club nodes, 'feeder edges' connecting exactly one
rich-club node, and 'local edges' which connect two non rich-club nodes (see: Figure 8). Analogous
to routing in communication networks, information can flow locally within one local region for a
particular behavior, or routed through backbones to physically distant regions.
3.3.2 Methods for Inferring Networks. Neuroimaging time series are the dominant underlying
data in neuroscience, therefore methods for constructing functional brain networks are almost
exclusively in the domain of thresholded pairwise similarity measures, with some exceptions of
parametric network modeling [100]. Sakkalis [156] provides an in-depth review of these different
measures, including cross-correlation [18, 200], frequency domain analysis such as discrete Fourier
transform (DFT) and discrete wavelet transform (DWT) and domain-driven 'coherence' measures
[109, 138, 140, 203]. Finally, significant work focuses on causal models [145], including Granger
causality [48, 150] and dynamic causal models (DCM) [44, 64, 151].
Where these methods have threshold parameters, τ, they are often validated by measuring
robustness of network statistics across varying thresholds [105], then using these thresholds for
distinguishing patient cohorts by label or network statistic distribution. For example, previous work
uses a paired t-test or other simple statistical test [176]. Kramer et al. [104] proposes a bootstrapping
[56] method in the frequency domain, providing more general p-values without model assumptions.
3.3.3 Dynamic Functional Brain Networks. Since the underlying data of functional brain networks
is often time series, a time series of networks (dynamic networks, or time-evolving networks) are a
natural extension in this domain [89]. Network construction using time-series similarity measures
(e.g., cross-correlation) generalize to the dynamic setting, computing on time-series subsequences.
The advantage of introducing the complexity of dynamics is discovering distinct connectivity
'states' over the course of the experiment. Because fMRI response can change very quickly as
19
Fig. 8. A study methodology comparing structural and functional brain networks. (a) a schematic of the
rich-club structural network. Blue nodes indicate the k-core decomposition of the structural network (k > 10),
grey nodes indicate non-rich nodes. Red ('rich-club') edges connect two rich-club nodes, orange ('feeder')
edges connect exactly one rich-club and one non-rich node, yellow ('local') edges connect two non-rich nodes.
(b) the network with colored nodes and edges, visualized in a brain coordinate system. (c) an adjacency matrix
comparing structural topology sensed from Diffusion Tensor Imaging with rich-club edge coloring (left) to
three thresholded values of functional connections for resting brain state inferred from fMRI for the same
node-set (right). These nodes are ordered according to brain function in different regions of the brain. (d) the
distribution of rich-club nodes within these different labeled regions. (From Sporns [166]).
activity occurs over the brain, these states are lost under global time series measures [42, 149, 198].
Challenges of network validation generalize to this dynamic setting, with the added challenge of
appropriate temporal scale [62, 174].
3.3.4 Comparing Functional and Structural Brain Networks. Figure 8 illustrates a complete case
study summarizing many of the topics discussed above. This work integrates structural networks
across 75 individuals, sensed from Diffusion Tensor Imaging (DTI) with functional networks
sensed from fMRI in resting state using Pearson correlation. These different views of the network
enable researchers to study how function and physical connectivity are correlated. (a) illustrates a
schematic layout of rich-club nodes, feeder, and local nodes. (b) shows the layout of these nodes in a
brain coordinate system, with the same node and edge coloring. (c) illustrates an adjacency matrix
comparing structural connections (left) with three thresholded values of functional connections
within the same node-set (right). Furthermore, nodes in different spatial regions of the brain (e.g.,
default mode network, motor, auditory, frontal) are labeled according to primary function, showing
structural and functional edges between these regions. (d) shows the distribution of rich-club nodes
within these different labeled regions.
3.4 Epidemiology, Blogs, Information Networks: Modeling Virus Spread and
Information Flow
3.4.1 Networks in Epidemiology. Networks are used in epidemiology to simulate the spread
of disease over a family of parametric network models (e.g., random, small-world, exponential
random graphs) representing contact between entities over time [95]. Network structure inference
in epidemiology and information networks aims to discover an unobservable network (e.g., physical
20
(a)
(b)
(c)
(d)
Fig. 9. Examples of networks inferred from data, or modeled in the epidemiology domain. (a) depicts a contact
network where squares are respondents and edges are sexual or drug contact which might transmit HIV [16].
(b) a sexual network derived from snowball sampling of respondents (squares), where the edges between
non-respondents (circle nodes) are unknown. (c) a network of households (cliques) and their interconnections
for modeling infection in realistic social contact networks. (d) The 'small-world' network property modeled
through a lattice with sparse edges connecting distant nodes. (From Danon et al. [43]).
contact networks, sexual networks, malware transmission) over which information or infection is
spread. We observe the effects of transmission on the infected node (e.g symptoms), but not the
edges over which they spread. The focus in this domain is therefore parametric inference for these
models from data.
Modeling contact networks allows researchers to simulate different outbreaks on these networks.
Figure 9 illustrates types of network data and models used in the epidemiology domain [43]. Figure
9(a) visualizes a contact network from survey data, where squares are respondents and edges
identify the transmission risk for HIV through contact by drug use or sex [16]. Figure 9(b) shows a
snowball sample of respondents (as squares) and their partners. In this example, edges between
circle nodes are unknown. Subsequent modeling for edges between circle nodes can test the spread
over this population under different unobserved contact assumptions. Figure 9(c) illustrates a model
of households (cliques), sparsely connected to others. This is intended to model contact networks
and potential spread through family-unit environments. Finally, 9(d) illustrates a lattice network
with sparse edges outside of the local neighborhood. This model was previously used to capture
the 'small-world' property of information and disease spread [23].
Historically, inferring networks in this area focuses largely on parametric graphical modeling
using Markov Chain Monte Carlo (MCMC) [27] and maximum likelihood methods, incorporating
modeling assumptions in transmission and interaction rates.
Given a compartmental transmission model [25] (e.g., the susceptible-infected-recovered SIR
model or susceptible-exposed-infected-recovered SEIR model), these methods measure the likeli-
hood of possible sequences, or trees of infection, where infection times from a root are monotonically
increasing. Let ti and tj denote the infection times of nodes ni and nj, then the transmission model
yields the likelihood P("j infected i"tj − tj).
3.4.2 Contact Network Inference. Early work in the epidemiology domain focused on the infer-
ence of either spread parameters (e.g., infection rate) or network model parameters on random
graphs [26], Poisson, and power-law networks [126], as well as fitting of real-world data to a contact
network model [9]. In these analytical and simulation results, the network model is known and no
structural inference is necessary. These studies generally model the spread of an epidemic under
possible individuals in contact (called 'contact tracing') [136] and discovering the root individual(s)
of the infection (called 'transmission tracing'). Early work also formulates association network
heuristics based on time and distance of potential contacts [82].
21
(a)
(b)
Fig. 10. (a) illustrates constructing network G∗ on a collection of cascades c1, c2...ck . For a source node s,
these methods estimate the likelihood of infecting i given the observation of information arrival ('infection')
at node i. (b) An estimated network inferred from hyperlink arrival times at nodes. (From Gomez-Rodriguez
et al. [68]).
3.4.3
Infection-Time Cascades. Previous work in machine learning uses network structure
inference to represent the spread of information between nodes, where the edges of transmission
are unobservable. Maximum-likelihood methods have focused on learning a network under assumed
transmission rate models, using statistical inference for these parameters [129].
Figure 10(a) illustrates the intuition of network construction by information propagation through
unobservable edges. To recover the unobservable true network G∗, each sequence of non-decreasing
infection times (e.g., "cascades") supports the possible transmission between nodes with sufficiently
close infection times. The key step of this work is learning the parameters of a transmission model
which measures the likelihood of a cascade according to differences in "adjacent" infection times in
the network.
Myers and Leskovec [129] use convex programming to learn a maximum-likelihood network
under a fixed transmission time probability distributions w(t) and recovery-time distribution r(t). To
learn the transmission weight matrix A, the authors use an Independent Cascade model [96] where
an uninfected node ni is exposed to infection by adjacent infected nodes nj at each time step using
a Bernoulli process with a probability Aj,i. The authors present a convex optimization formulation
of their likelihood function, with regularization. This model, and most of the subsequent work, is
evaluated on synthetic network models where the underlying network is explicitly known. The
'task' is the accurate reconstruction of the network which simulated these infection times. Similar
to gene regulatory networks, the final evaluation of the network is the network itself, rather than a
subsequent task on the inferred network. These methods then also typically present qualitative
results on real-world datasets.
Gomez-Rodriguez et al. [68] scales this previous work by fixing a global edge transmission
probability β and solving this simplified problem. For many applications, this fixed transmission
probability assumption can be made. The primary insight under this assumption is that we can
simply use the most likely propagation tree over a set of nodes in a cascade c (see: Figure 10). Given
a cascade set C, the authors marginalize their likelihood function relative to edge selection and
prove this function is monotonic and submodular. Therefore, edges can be greedily selected with
an approximation factor of (1 − 1/e) [131].
The transmission model of [129] assumes repeated Bernoulli trials of fixed probability. Gomez-
Rodriguez et al. [67] introduce transmission likelihood functions which vary over time. Given a
set of cascades C, the method infers the parameters of transmission rate models for each edge.
The model uses a hazard function H(τiτj; αj,i) that measures the instantaneous infection rate on
node ni from infected node nj, given the parametric function on α. The authors present three
22
Fig. 11. Transmission histograms, showing poor fit of exponential and Raleigh models. (From Du et al. [51]).
different transmission model functions: Exponential, Power-law, and Rayleigh, and prove that the
optimization for transmission rates matrix A is convex.
In many real-world applications, information can propagate in a multitude of ways. Older
information might be promoted by an influential node, causing multi-modal spikes in propagation
after some delays. Therefore, these transmission rates may not decay monotonically, nor according
to any simple parametric function.
Figure 11 illustrates this intuition on real transmission data between blog sites. The figure
reports the probability density function (y-axis) over varying time delays between post creations
on different nodes (x-axis). The data poorly fits any single exponential or Rayleigh transmission
model. Du et al. [51] extends previous work to address this limitation. The key addition of this
work is to kernelize the hazard function H(τ∗τj , αj,i) over m different kernels. These kernels serve
as a piecewise approximation of the time-lag distribution, which can then be used to estimate the
likelihood of transmission between nodes, given observed 'infection' data.
We have dug deeper into the technical details in this section to demonstrate the added modeling
complexity accounting for richer assumptions of the underlying transmission process. However,
there is still an important gap. Previous work does not typically account for null modeling. In this
instance the underlying process may not be a network, but a confounding process which might
individually 'infect' nodes.
3.5 Ecology: Inferring Animal Social Networks to Explain Social Behavior
3.5.1 Networks in Ecology. Networks in ecology model systems at differing levels of abstraction.
In systems ecology, traditional graphical models are used to model an ecosystem at a high level,
with relationships between species, environmental variables, services, and other processes [127].
For example, food webs model who-eats-whom within an ecosystem [141]. A second application
of networks in behavioral ecology model social systems of animal populations [60, 191]. These
networks are the focus of this section.
Analogous to sociology and political science, traditional fieldwork data in ecology are collected
from direct observation and 'surveys,' measuring interactions or other relationships among individ-
uals in the population [12, 173], particularly over time [47, 123, 139]. Networks serves as models to
summarize and describe these social or behavioral relationships within these populations.
Direct observation of populations allows researchers to incorporate their own intuition and
experience into the definition of these networks. In practice, much of the work in this area uses
ad-hoc, intuitive network definitions with some sensitivity analysis. These networks derived from
direct observation are typically categorical (e.g., kinship relations) or discrete (e.g., thresholding on
number of interactions, where interactions are implicitly decided by observers). Methodological
consideration are well established in the field on these data, including edge strength thresholding
[38], sampling, hypothesis testing [39], and randomization strategies [75, 91]. Each of these provide
several different choices for validating the definition of these networks. These networks are tightly
23
0102030405000.10.20.3t(hours)pdf histogramexprayleighKernelCascade0204000.020.040.060.080.1t(hours)pdf histogramexprayleighKernelCascade05010000.020.040.060.080.1t(hours)pdf histogramexprayleighKernelCascadecoupled with a particular hypothesis and experimental cohorts in the population.
Two networks of interest in animal social networks measure affiliations and associations between
individuals [193]. Affiliations describe intentional social relationships between individuals [39, 192]
(e.g., grooming pairs of primates), while associations describe a broader set of interactions, which
might be driven by structural factors rather than social affinity (e.g. environmental resources,
sex, age, and other individual attributes) [15]. Whitehead and James [193] introduce a generalized
affiliation index using a linear regression model, using it to remove sets of predictive structural
features. The resulting model by subtraction is the affiliative network model.
3.5.2
Instrumentation and Sensing of Animal Populations. Recent instrumentations of individuals
and the environment allow the observation of ecosystems and populations at an unprecedented
scale using geo-location sensors such as GPS, proximity sensors, radio-telemetry, and Passive
Integrated Transponder (PIT) tags [94, 106, 154], as well as individual identification by photographs
[17]. This instrumentation allows the study of detailed individual behavior and social dynamics that
are outside the direct observation of researchers. This abundance of data requires novel statistical
techniques for inferring networks from implicit interactions.
Defining meaningful 'interactions' directly from data is non-trivial. No known work compares
the biases of interaction and/or affiliation sampling via traditional direct observation fieldwork,
against the interaction or affiliation inference from underlying data. Presently, these sensors are
most effective at recording simple co-location or trajectories. Challenging independent problems
such as activity recognition (e.g., grooming, conflict) are much more easily identified by direct
observation by researchers than by data, but these direct observations do not scale. Future research
will likely integrate the strengths of these modalities to improve fieldwork data collection.
3.5.3
Studies and Network Inference Methods on Instrumented Data. The key difference between
data from traditional fieldwork and from instrumented technologies is that the former tend to be
discrete counts (e.g., number of co-locations or grooming events), while the latter are continuous
data without these higher-level labels (e.g., relative distances between individuals). To translate to
discrete co-location events–and subsequently a network–requires defining "how close" for "which
duration" constitutes a co-location edge, or "how correlated" for "which duration" constitutes a
higher-order edge in the network.
The simplest method for setting these closeness and persistence thresholds for co-location is by
domain knowledge, or by sampling the parameter-space in some way. Haddadi et al. [75] use this
strategy in GPS data from sheep, ranging from individuals co-locating for 1 minute at 1 meter, to 5
minutes at 3.5 meters. The authors have some known 'affiliations' (as described above), which are
used to validate network accuracy at these different thresholds when the individuals are mixed into
a larger population. Aplin et al. [6] collected data from passive integrated transponder (PIT) tags
of individuals sensed by radio-frequency identification (RFID) antennae at feeder sites. This work
defines associations as two individuals co-occurring at the site within 30 seconds before or after
the other on a sliding 75 second window. Co-occurrence is categorical due to the physical design of
feeders, so only the 'persistence' of interaction need be defined. This threshold generates a stream
of pairwise associations which is then thresholded again (τ ≥ 0.02) to produce an aggregated
association network.
Psorakis et al. [143] define edges using Gaussian mixture models (GMM) on co-occurrence data
for a similar feeder system. This approach mitigates the 'persistence' threshold by fitting Gaussian
distributions to a one-dimensional space of occurrence counts (and generalized to continuous two-
dimensional geographic space, [59]). These distributions capture events of co-occurrence among
several individuals. Hamede et al. [77] used a randomization approach to define non-random
associations on proximity sensors on a population of wild Tasmanian devils (Sarcophilus harrisii).
24
(a)
(b)
(c)
Fig. 12. Networks inferred from co-location at feeding stations sensed using RFID over three different
populations. These edges are colored showing learned behavior (red edges) of obtaining food through an
instrumented puzzle mechanism, the trained individuals (yellow nodes), and affiliated individuals using the
default strategy (black edges). (From Aplin et al. [5]).
Internal thresholds on these sensors detect co-location within 30 centimeters. This work studies
disease transmission through physical contact of the animals, so this thresholding is appropriate.
We enumerate several instances to demonstrate that these network constructions are typically 'ad-
hoc' from domain knowledge. In each case, the sensitivity of downstream hypotheses is not tested
against the choice of network threshold parameters. This may result in inadvertent fine-tuning of
parameters and incorrect conclusions.
3.5.4 Translating Co-Location Data to Innovation Spread in Networks. Aplin et al. [5] proposed a
network inference task to measure the learning of a feeding behavior in a population of great tits
(Parus major). In this experiment, feeders were instrumented with RFID antennae and recorded the
visitation of each unique bird using PIT tags. The feeders had a sliding door that needed to be open
to the left or right to access the food. The feeder recorded the bird's puzzle solution. The authors
investigated whether birds learn by example from others at the feeding sites. Figure 12 shows a
thresholded, aggregated network over individuals, weighted by the frequency of co-location events
at any feeder, using the Gaussian mixture model (GMM) method described above for interaction
'events'. Yellow nodes represent trained individuals, red nodes represent individuals that have
learned the correct behavior to solve the feeder by the end of the study.
These networks visually show strong network modules between red and black individuals. Figure
12(b) shows a strong network separation between the two behaviors, where trained individuals are
within the red cluster. Figure 12(c) shows two strong red clusters around both trained individuals,
but also that the correct behavior has spread across a component of untrained individuals.
3.5.5 Testing Biological Hypotheses Using Networks as Models. Farine et al. [59] evaluates net-
works inferred from geo-location data of individual olive baboons (Papio anubis) within a troop.
The authors evaluate varying networks for their ability to be used as models for predicting the
future location of individuals.
Figure 13 shows an affiliation network inferred on a large time-scale. Individual baboons are
fitted with high-resolution GPS collars and are represented as nodes. Edge weights indicate the
proportion of time two individuals are within 1.5 meters for at least 1 minute, over much of the
course of data collection. The authors also generate an alternative k-nearest neighbor network
model over varying k at shorter time-scales. For a given node, the location centroid of neighbors in
each of these networks is used as a prediction of the individual's location.
This collection of networks represents different hypotheses for the mechanism of predictable
interactions between baboons: how many individuals do baboons pay attention to at a time? How
25
Fig. 13. A "co-sitting" network inferred from geo-location data on a population of baboons. Edge weights are
proportional to the time two individuals are within 1.5 meters for at least 1 minute. (From Farine et al. [59]).
long do these relationships persist? And do individuals have fixed preferences which are more
predictive than interactions over time?
This study finds that a k-nearest neighbor network of k = 4, 5, 6 are most predictive and
statistically significant. This is biologically meaningful and agrees with previous work showing
grooming cliques in baboons tend to be size 4–8 [52]. This size indicates the biological capability of
baboons to manage attention and social relationships at a given time. The study also finds that at
longer time scales on the order of 10 minutes, the network of long-term affiliations becomes more
predictive. So, different networks are more appropriate models of behavior on different time scales.
3.6 Mobile Social Networks: Studying Human Mobility Through Social Relationships
3.6.1 Underlying Data in Mobile Networks. Phones and other mobile devices are among the most
versatile and informative sensors of personal and social activity [110]. The modeling of mobile
phone data as networks is motivated by the complex, overlapping, and dynamic modalities which
are sensed by these devices. Mobile devices collect physical proximity (bluetooth, WiFi), physical
location (GPS), direct communication (SMS, voice), interactions with applications, interactions
through other online social networks and email [101]. Integrating these modalities promises to give a
rich picture of large-scale human mobility, dynamics and scale [157], geography and communication
[21, 146], and offline face-to-face social networks.
While much of this underlying data is similar to data collected for animal social networks (prox-
imity, location, discrete interactions), there are notable trade-offs between privacy and experimental
design within these domains. While animals are not due rights to data privacy, they are also unable
to comply with instructions or be surveyed for ground truth network edges.
In human experiments, contact diaries [121] or Facebook friends [158] have been collected to
validate networks inferred from proximity sensors. Experiments on mobile users are necessarily
less invasive, while topics such as disease spread and sexual contact networks are often sensed
in animal populations. Data privacy requires careful, informed consent and secure storage [171];
location has been shown very effective to uniquely identify users using only a few data points [46].
Several mobile datasets have been collected for the purposes of social research [20]. The "Reality
Mining" dataset is the first large-scale collection, on 100 participants (faculty and students) in the
MIT Media Laboratory [54]. This anonymized dataset contains call logs, Bluetooth device proximity,
cell tower ID (a proxy for location), and other fields. Similar mobile data collection projects followed,
including the Lausanne Data Collection Campaign on 170 student participants [111], the Social
fMRI study on 130 participants [3], and the SensibleDTU project of 1,000 participants [172]. These
subsequent studies collected more detailed user activity, surveys, online social network activity,
and detailed user demographics, addressing the limitations of previous efforts.
26
adult maleadult femalesubadult malesubadult femalejuvenile(a)
(b)
Fig. 14. (a) a weighted latent network inferred by Bluetooth proximity and call records on the population of
Reality Mining users. (b) the self-reported ground-truth friendship network. (From Eagle and Pentland [53]).
Finally, the SocioPatterns platform [11, 36] uses a specialized proximity sensor design to record
face-to-face interactions. These sensors have been deployed in an academic conference setting
[164], elementary schools [169], high schools [121], and several other environments. The specificity
of these sensors for detecting individual interactions between users addresses the challenges of
using general proximity sensors (e.g., Bluetooth) for population studies.
3.6.2
Studies and Methods on Mobile Data. The primary task in inferring networks from mobile
data is related to comparison across modalities, for edge or attribute prediction. Previous work
focuses on predicting Facebook friends from Bluetooth co-location [158], as well as survey-reported
friends from proximity and call record data [53].
Figure 14 examines this latter task. The network in Figure 14(a) is inferred using principle
components analysis of Bluetooth proximity counts across different times and locations (e.g., work,
off-campus, weekday, weekend). The authors assign edge weights according to the PCA factor that
by inspection corresponded to "non-work" hours (e.g., "close friends are those co-located outside
of work"). Figure 14(b) reports the ground-truth social network, self-reported from a user survey,
accurately reconstructed by the inferred network.
While the discovery that friends meet or call after work is not particularly surprising, this
demonstrates the integration approach of these modalities for the simple edge prediction task. The
principle components measure to infer the network edges also incorporates domain knowledge
of work schedules. Previous work shows that human mobility in urban environments is highly
periodic between a small set of locations (e.g., home and work) [53]. Therefore, incorporating these
periodicities explicitly is a key aspect of this domain.
De Choudhury et al. [45] revisit the discussion of setting similarity threshold τ for an interaction
measure calculated on data. Even under a fixed interaction measure, varying τ realizes many possible
networks. In Figure 15, from left to right the number of required emails exchanged increases in
order to define an edge, thus reducing the resulting network density. Any predictive task on this
network balances novelty against the task difficulty: at a low threshold, a dense graph is realized
and edge prediction may not perform better than random because the definition of the edge is
simply noise. However, a very high threshold may infer a very sparse network, where edges are
trivially easy to predict (but uninteresting).
The authors generate one-year aggregated networks in a university email dataset and the Enron
email dataset (note that the time-scale is arbitrarily set). The authors tune the global threshold τ
according to performance across several different classification tasks on sets of node-level features
27
(a) A network inferred from a university email corpus
(b) A network inferred from the Enron email corpus
Fig. 15. Two networks inferred over varying network thresholds τ , creating sparser networks from left to
right as the threshold criteria becomes more strict (e.g., more than τ email interactions for an edge between
individuals vi and vj ). (From De Choudhury et al. [45]).
from each inferred network. These tasks include classification of node class (e.g., undergraduate,
graduate, faculty, staff), gender, "community" (with class labels provided by stochastic block model-
ing, [86]), where each of these tasks may be independently of interest. If these node demographics
and communities were separable as a set of behaviors at some "natural" threshold, this analysis
would discover the threshold yielding the maximal classification accuracy. The authors also predict
future communication activity using simple linear regression, reporting the accuracy at these
same τ. Each of these tasks yield a similar range of high performing τ thresholds, suggesting that
classification and prediction agree across multiple views of the network.
4 CONCLUSION
This survey aims to provide a vocabulary and structure to the problem of inferring networks from
data. Typically, this problem is addressed in data preprocessing, often with several artful steps
of parameter tuning or feature selection. We propose investigation of this problem using a more
general and rigorous methodology for building networks appropriate for data science questions.
We survey several domains in order to illustrate their varying questions, challenges and how
the nature of the data drives the methodological specializations in the areas. For example–with
some simplification–we observe that gene regulatory networks are methodologically very mature,
with a breadth of interaction measures appropriate for multivariate, matrix data (e.g., microarray)
including regression and graphical models. Climate networks and brain networks are mature
in time series interaction measures, including causal and frequency-based analysis, respectively.
The problems in each of these areas are still exploratory, focusing on integrating and validating
networks from different data (e.g., structural and functional brain networks) to develop data science
tools downstream from these robust network models. Animal social networks inherit traditional
direct observation data in relatively simple formats, with instrumented sensing now becoming
more feasible. This yields relatively simple network models over straightforward parameters (e.g.,
distance and persistence), with a focus on experimental design. Epidemiology historically studies
observed infection data spreading across a hidden contact network. Therefore, modeling these
transmission functions is a key to this area. We hope that this data-driven summary might help
locate models and expertise on networks derived from different underlying data modalities.
Previous work often assumes that the objective of network inference is uncovering "the network"
representation which is obscured by noise. Often in this context, the network inference method
28
tries to reconstruct known ground-truth networks from data. In contrast, our work treats a network
as a model to perform a particular task, where we often cannot access the ground truth network, or
assume its parametric form. Analogous to clustering for a classification task, there are many possible
clusterings which are only as valuable as the accuracy improvement they provide of a downstream
task (e.g., classification) or question. Conceptualizing network inference within the complete data
science methodology–from data (to network) to task models for particular questions–focuses on a
tighter coupling of network models constructed from data and task models.
There are several methodologies across domains which use randomization, causality, and signifi-
cance testing strategies to rigorously learn the network model under some assumptions. While
these networks are appropriate according to their structural assumptions, they may not be the
most informative for the question/task(s) of interest. Currently, no general, statistically rigorous
methodology exists to learn and evaluate networks over particular task(s). Furthermore, there is
little understanding of the criteria for network models and predictive models which would make
them appropriate for this paired evaluation. We anticipate this will be an exciting area of future
research and look forward to the followup publications.
5 ACKNOWLEDGEMENTS
This work was performed under the auspices of the U.S. Department of Energy by Lawrence
Livermore National Laboratory under Contract DE-AC52-07NA27344 (LLNL-JRNL-703477), and
with support of National Science Foundation grants III-1514126 (Berger-Wolf), CNS-1248080 (Berger-
Wolf), and IGERT CNS-1069311 (Brugere).
REFERENCES
[1] Eytan Adar and Lada A. Adamic. 2005. Tracking information epidemics in blogspace. In Proceedings of the 2005
IEEE/WIC/ACM International Conference on Web Intelligence. 207–214. https://doi.org/10.1109/WI.2005.151
[2] Charu Aggarwal and Karthik Subbian. 2014. Evolutionary Network Analysis: A Survey. ACM Comput. Surv. 47, 1
(May 2014), 10:1–10:36. https://doi.org/10.1145/2601412
[3] Nadav Aharony, Wei Pan, Cory Ip, Inas Khayal, and Alex Pentland. 2011. Social fMRI: Investigating and Shaping
Social Mechanisms in the Real World. Pervasive Mob. Comput. 7, 6 (Dec. 2011), 643–659. https://doi.org/10.1016/j.
pmcj.2011.09.004
[4] Genevera I. Allen and Zhandong Liu. 2012. A Log-Linear Graphical Model for Inferring Genetic Networks from
High-throughput Sequencing Data. In Proceedings of the 2012 IEEE International Conference on Bioinformatics and
Biomedicine (BIBM) (BIBM '12). IEEE Computer Society, 1–6. https://doi.org/10.1109/BIBM.2012.6392619
[5] Lucy M. Aplin, Damien R. Farine, Julie Morand-Ferron, Andrew Cockburn, Alex Thornton, and Ben C. Sheldon. 2015.
Experimentally induced innovations lead to persistent culture via conformity in wild birds. Nature 518, 7540 (Feb.
2015), 538–541. https://doi.org/10.1038/nature13998
[6] Lucy M. Aplin, Damien R. Farine, Julie Morand-Ferron, and Ben C. Sheldon. 2012. Social networks predict patch
discovery in a wild population of songbirds. Proceedings of the Royal Society of London B: Biological Sciences (2012).
https://doi.org/10.1098/rspb.2012.1591
[7] Mahmoudreza Babaei, Przemyslaw Grabowicz, Isabel Valera, Krishna P. Gummadi, and Manuel Gomez-Rodriguez.
2016. On the Efficiency of the Information Networks in Social Media. In Proceedings of the Ninth ACM International
Conference on Web Search and Data Mining (WSDM '16). ACM, 83–92. https://doi.org/10.1145/2835776.2835826
[8] Lars Backstrom and Jon Kleinberg. 2011. Network Bucket Testing. In Proceedings of the 20th International Conference
on World Wide Web (WWW '11). ACM, 615–624. https://doi.org/10.1145/1963405.1963492
[9] Shweta Bansal, Bryan T. Grenfell, and Lauren Ancel Meyers. 2007. When individual behaviour matters: homogeneous
and network models in epidemiology. J. Royal Soc. Interface 4, 16 (2007), 879–891. https://doi.org/10.1098/rsif.2007.1100
[10] Ziv Bar-Joseph, Anthony Gitter, and Itamar Simon. 2012. Studying and modelling dynamic biological processes using
time-series gene expression data. Nature Reviews Genetics 13, 8 (Aug. 2012), 552–564. https://doi.org/10.1038/nrg3244
[11] Alain Barrat, Ciro Cattuto, Vittoria Colizza, Jean-François Pinton, Wouter Van den Broeck, and Alessandro Vespignani.
2008. High Resolution Dynamical Mapping of Social Interactions With Active RFID. ArXiv e-prints (Nov. 2008).
http://arxiv.org/abs/0811.4170v2
[12] Louise Barrett, Peter Henzi, and David Lusseau. 2012. Taking sociality seriously: the structure of multi-dimensional
social networks as a source of information for individuals. Philosophical Transactions of the Royal Society of London B:
Biological Sciences 367, 1599 (2012), 2108–2118. https://doi.org/10.1098/rstb.2012.0113
[13] Tanya Barrett, Stephen E. Wilhite, Pierre Ledoux, Carlos Evangelista, Irene F. Kim, Maxim Tomashevsky, Kimberly A.
Marshall, Katherine H. Phillippy, Patti M. Sherman, Michelle Holko, Andrey Yefanov, Hyeseung Lee, Naigong Zhang,
29
Cynthia L. Robertson, Nadezhda Serova, Sean Davis, and Alexandra Soboleva. 2013. NCBI GEO: archive for functional
genomics data sets–update. Nucleic Acids Research 41, D1 (2013), D991–D995. https://doi.org/10.1093/nar/gks1193
[14] Baruch Barzel and Albert-Laszlo Barabasi. 2013. Network link prediction by global silencing of indirect correlations.
Nature Biotechnology 31, 8 (Aug. 2013), 720–725. https://doi.org/10.1038/nbt.2601
[15] Lars Bejder, David Fletcher, and Stefan Bräger. 1998. A method for testing association patterns of social animals.
Animal Behaviour 56, 3 (1998), 719–725. https://doi.org/10.1006/anbe.1998.0802
[16] David C. Bell, John S. Atkinson, and Jerry W. Carlson. 1999. Centrality measures for disease transmission networks.
Social Networks 21, 1 (1999), 1–21. https://doi.org/10.1016/S0378-8733(98)00010-0
[17] Tanya Y. Berger-Wolf, Daniel I. Rubenstein, Charles V. Stewart, Jason A. Holmberg, Jason Parham, Sreejith Menon,
Jonathan Crall, Jon Van Oast, Emre Kiciman, and Lucas Joppa. 2017. Wildbook: Crowdsourcing, computer vision, and
data science for conservation. ArXiv e-prints (Oct. 2017). https://arxiv.org/abs/1710.08880
[18] Stephan Bialonski, Martin Wendler, and Klaus Lehnertz. 2011. Unraveling Spurious Properties of Interaction Networks
with Tailored Random Networks. PLoS ONE 6, 8 (Aug. 2011), e22826. https://doi.org/10.1371%2Fjournal.pone.0022826
[19] Concha Bielza and Pedro Larrañaga. 2014. Bayesian networks in neuroscience: a survey. Frontiers in Computational
Neuroscience 8 (Oct. 2014), 131. https://doi.org/10.3389/fncom.2014.00131
[20] Vincent D. Blondel, Adeline Decuyper, and Gautier Krings. 2015. A survey of results on mobile phone datasets
analysis. EPJ Data Science 4, 1 (2015), 1–55. https://doi.org/10.1140/epjds/s13688-015-0046-0
[21] Vincent D. Blondel, Gautier Krings, and Isabelle Thomas. 2010. Regions and borders of mobile telephony in Belgium
and in the Brussels metropolitan zone. Brussels Studies (2010). https://doi.org/2078.1/95261
[22] Stefano Boccaletti, Ginestra Bianconi, Regino Criado Herrero, Charo I. del Genio, Jesus Gómez-Gardeñes, Miguel
Romance, Irene Sendiña-Nadal, Zhen Wang, and Massimiliano Zanin. 2014. The structure and dynamics of multilayer
networks. Physics Reports 544, 1 (2014), 1–122. https://doi.org/10.1016/j.physrep.2014.07.001
[23] Michael Boots and Akira Sasaki. 1999.
"Small worlds" and the evolution of virulence: infection occurs locally
and at a distance. Proceedings of the Royal Society of London B: Biological Sciences 266, 1432 (1999), 1933–1938.
https://doi.org/10.1098/rspb.1999.0869
[24] Ulrik Brandes, Garry Robins, Ann Mccranie, and Stanley Wasserman. 2013. What is network science? Network Science
[25] Fred Brauer. 2008. Compartmental Models in Epidemiology. Springer Berlin Heidelberg, Berlin, Heidelberg, 19–79.
1, 1 (2013), 1–15. https://doi.org/10.1017/nws.2013.2
https://doi.org/10.1007/978-3-540-78911-6_2
[26] Tom Britton and Philip D. O'Neill. 2002. Bayesian Inference for Stochastic Epidemics in Populations with Random
Social Structure. Scandinavian Journal of Statistics 29, 3 (Sept. 2002), 375–390. https://doi.org/10.1111/1467-9469.00296
[27] Steve Brooks, Andrew Gelman, Galin Jones, and Xiao-Li Meng. 2011. Handbook of Markov Chain Monte Carlo. CRC
Press. https://books.google.com/books?id=qfRsAIKZ4rIC
[28] Ivan Brugere and Tanya Y. Berger-Wolf. 2017. Network Model Selection Using Task-Focused Minimum Description
Length. ArXiv e-prints (Oct. 2017). https://arxiv.org/abs/1710.05207
[29] Ivan Brugere, Chris Kanich, and Tanya Y. Berger-Wolf. 2017. Evaluating Social Networks Using Task-Focused
Network Inference. In Proceedings of the 13th International Workshop on Mining and Learning with Graphs (MLG).
https://arxiv.org/abs/1707.02385
[30] Ivan Brugere, Chris Kanich, and Tanya Y. Berger-Wolf. 2017. Network Model Selection for Task-Focused Attributed
Network Inference. In 2017 IEEE International Conference on Data Mining Workshop (ICDMW). https://arxiv.org/abs/
1708.06303
[31] Ed Bullmore and Olaf Sporns. 2009. Complex brain networks: graph theoretical analysis of structural and functional
systems. Nature Reviews Neuroscience 10, 3 (Mar. 2009), 186–198. https://doi.org/10.1038/nrn2575
[32] Atul J. Butte and Isaac S. Kohane. 2000. Mutual Information Relevance Networks: Functional Genomic Clustering
Using Pairwise Entropy Measurements. Pacific Symposium on Biocomputing 5 (2000), 415–426. https://doi.org/10.
1142/9789814447331_0040
[33] Leila Cammoun, Xavier Gigandet, Djalel Meskaldji, Jean Philippe Thiran, Olaf Sporns, Kim Q Do, Philippe Maeder,
Reto Meuli, and Patric Hagmann. 2012. Mapping the human connectome at multiple scales with diffusion spectrum
MRI. Journal of Neuroscience Methods 203, 2 (2012), 386–397. https://doi.org/10.1016/j.jneumeth.2011.09.031
[34] Bokai Cao, Lifang He, Xiaokai Wei, Mengqi Xing, Philip S. Yu, Heide Klumpp, and Alex D. Leow. 2017. t-BNE:
Tensor-based Brain Network Embedding. 189–197. https://doi.org/10.1137/1.9781611974973.22
[35] Longbing Cao. 2017. Data Science: A Comprehensive Overview. ACM Comput. Surv. 50, 3, Article 43 (June 2017),
42 pages. https://doi.org/10.1145/3076253
[36] Ciro Cattuto, Wouter Van den Broeck, Alain Barrat, Vittoria Colizza, Jean-François Pinton, and Alessandro Vespignani.
2010. Dynamics of Person-to-Person Interactions from Distributed RFID Sensor Networks. PLOS ONE 5, 7 (July 2010),
e11596. https://doi.org/10.1371/journal.pone.0011596
[37] Hau Chan, Hanghang Tong, and Leman Akoglu. 2014. Make It or Break It: Manipulating Robustness in Large
Networks. In Proceedings of the 2014 SIAM International Conference on Data Mining. 325–333. https://doi.org/10.1137/
1.9781611973440.37
[38] Darren P. Croft, Jens Krause, Safi K. Darden, Indar W. Ramnarine, Jolyon J. Faria, and Richard James. 2009. Behavioural
Trait Assortment in a Social Network: Patterns and Implications. Behavioral Ecology and Sociobiology 63, 10 (2009),
1495–1503. https://doi.org/10.1007/s00265-009-0802-x
[39] Darren P. Croft, Joah R. Madden, Daniel W. Franks, and Richard James. 2011. Hypothesis testing in animal social
30
networks. Trends in Ecology & Evolution 26, 10 (2011), 502–507. https://doi.org/10.1016/j.tree.2011.05.012
[40] Peng Cui, Xiao Wang, Jian Pei, and Wenwu Zhu. 2017. A Survey on Network Embedding. ArXiv e-prints (Nov. 2017).
https://arxiv.org/abs/1711.08752
[41] Luciano da Fontoura Costa, Osvaldo N Oliveira Jr., Gonzalo Travieso, Francisco Aparecido Rodrigues, Paulino
Ribeiro Villas Boas, Lucas Antiqueira, Matheus Palhares Viana, and Luis Enrique Correa Rocha. 2011. Analyzing and
modeling real-world phenomena with complex networks: a survey of applications. Advances in Physics 60, 3 (2011),
329–412. https://doi.org/10.1080/00018732.2011.572452
[42] E. Damaraju, E.A. Allen, A. Belger, J.M. Ford, S. McEwen, D.H. Mathalon, B.A. Mueller, G.D. Pearlson, S.G. Potkin,
A. Preda, J.A. Turner, J.G. Vaidya, T.G. van Erp, and V.D. Calhoun. 2014. Dynamic functional connectivity analysis
reveals transient states of dysconnectivity in schizophrenia. NeuroImage: Clinical 5 (2014), 298–308. https://doi.org/
10.1016/j.nicl.2014.07.003
[43] Leon Danon, Ashley P Ford, Thomas House, Chris P Jewell, Matt J Keeling, Gareth O Roberts, Joshua V Ross, and
Matthew C Vernon. 2011. Networks and the Epidemiology of Infectious Disease. In Interdisciplinary Perspectives on
Infectious Diseases, Vol. 2011. https://doi.org/10.1155/2011/284909
[44] Olivier David, Isabelle Guillemain, Sandrine Saillet, Sebastien Reyt, Colin Deransart, Christoph Segebarth, and Antoine
Depaulis. 2008. Identifying Neural Drivers with Functional MRI: An Electrophysiological Validation. PLoS Biology 6,
12 (Dec. 2008), e315. https://doi.org/10.1371/journal.pbio.0060315
[45] Munmun De Choudhury, Winter A. Mason, Jake M. Hofman, and Duncan J. Watts. 2010. Inferring Relevant Social
Networks from Interpersonal Communication. In Proceedings of the 19th International Conference on World Wide Web
(WWW '10). ACM, 301–310. https://doi.org/10.1145/1772690.1772722
[46] Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen, and Vincent D. Blondel. 2013. Unique in the Crowd:
The privacy bounds of human mobility. Nature Scientific Reports 3 (Mar 2013), 1376. https://doi.org/10.1038/srep01376
[47] Shermin de Silva, Ashoka D.G. Ranjeewa, and Sergey Kryazhimskiy. 2011. The dynamics of social networks among
female Asian elephants. BMC Ecology 11, 1 (2011), 1–16. https://doi.org/10.1186/1472-6785-11-17
[48] Mukeshwar Dhamala, Govindan Rangarajan, and Mingzhou Ding. 2008. Analyzing information flow in brain networks
with nonparametric Granger causality. NeuroImage 41, 2 (2008), 354–362. https://doi.org/10.1016/j.neuroimage.2008.
02.020
[49] Jonathan F. Donges, Yong Zou, Norbert Marwan, and Juergen Kurths. 2009. Complex networks in climate dynamics.
The European Physical Journal Special Topics 174, 1 (2009), 157–179. https://doi.org/10.1140/epjst/e2009-01098-2
[50] Jonathan F. Donges, Yong Zou, Norbert Marwan, and Juergen Kurths. 2009. The backbone of the climate network.
EPL (Europhysics Letters) 87, 4 (2009), 48007. https://doi.org/10.1209/0295-5075/87/48007
[51] Nan Du, Le Song, Ming Yuan, and Alex J Smola. 2012. Learning Networks of Heterogeneous Influence. In Advances
in Neural Information Processing Systems 25, F Pereira, C J C Burges, L Bottou, and K Q Weinberger (Eds.). 2780–2788.
http://papers.nips.cc/paper/4582-learning-networks-of-heterogeneous-influence
[52] Robin M. Dunbar. 1992. Time: a hidden constraint on the behavioural ecology of baboons. Behavioral Ecology and
Sociobiology 31, 1 (01 Jul 1992), 35–49. https://doi.org/10.1007/BF00167814
[53] Nathan Eagle and Alex Sandy Pentland. 2009. Eigenbehaviors: identifying structure in routine. Behavioral Ecology
and Sociobiology 63, 7 (2009), 1057–1066. https://doi.org/10.1007/s00265-009-0739-0
[54] Nathan Eagle and Alex (Sandy) Pentland. 2006. Reality mining: sensing complex social systems. Personal and
Ubiquitous Computing 10, 4 (Mar. 2006), 255–268. https://doi.org/10.1007/s00779-005-0046-3
[55] Imme Ebert-Uphoff and Yi Deng. 2012. Causal Discovery for Climate Research Using Graphical Models. Journal of
Climate 25, 17 (Feb. 2012), 5648–5665. https://doi.org/10.1175/JCLI-D-11-00387.1
[56] Bradley Efron and R.J. Tibshirani. 1993. An Introduction to the Bootstrap. Chapman & Hall.
[57] Jeremiah J. Faith, Boris Hayete, Joshua T. Thaden, Ilaria Mogno, Jamey Wierzbowski, Guillaume Cottarel, Simon
Kasif, James J. Collins, and Timothy S. Gardner. 2007. Large-Scale Mapping and Validation of Escherichia coli
Transcriptional Regulation from a Compendium of Expression Profiles. PLoS Biology 5, 1 (Jan. 2007), e8. https:
//doi.org/10.1371/journal.pbio.0050008
[58] Damien R. Farine. 2017. A guide to null models for animal social network analysis. Methods in Ecology and Evolution
8, 10 (2017), 1309–1320. https://doi.org/10.1111/2041-210X.12772
[59] Damien R. Farine, Ariana Strandburg-Peshkin, Tanya Y. Berger-Wolf, Brian Ziebart, Ivan Brugere, Jia Li, and Mar-
garet C. Crofoot. 2016. Both Nearest Neighbours and Long-term Affiliates Predict Individual Locations Dur-
ing Collective Movement in Wild Baboons, In Nature Scientific Reports. Scientific Reports 6, 27704.
https:
//doi.org/10.1038/srep27704
[60] Damien R. Farine and Hal Whitehead. 2015. Constructing, conducting and interpreting animal social network analysis.
Journal of Animal Ecology 84, 5 (2015), 1144–1163. https://doi.org/10.1111/1365-2656.12418
[61] Soheil Feizi, Daniel Marbach, Muriel Medard, and Manolis Kellis. 2013. Network deconvolution as a general method
to distinguish direct dependencies in networks. Nature Biotech. 31, 8 (Aug. 2013), 726–733. https://doi.org/10.1038/
nbt.2635
[62] Benjamin Fish and Rajmonda S. Caceres. 2017. A task-driven approach to time scale detection in dynamic networks. In
Proceedings of the 13th International Workshop on Mining and Learning with Graphs (MLG). http://www.mlgworkshop.
org/2017/paper/MLG2017_paper_17.pdf
[63] Robert J. Fletcher, Miguel A. Acevedo, Brian E. Reichert, Kyle E. Pias, and Wiley M. Kitchens. 2011. Social network
models predict movement and connectivity in ecological landscapes. Proceedings of the National Academy of Sciences
31
108, 48 (2011), 19282–19287. https://doi.org/10.1073/pnas.1107549108
[64] Karl J Friston, Baojuan Li, Jean Daunizeau, and Klaas E Stephan. 2011. Network discovery with DCM. NeuroImage 56,
3 (Jun. 2011), 1202–1221. https://doi.org/10.1016/j.neuroimage.2010.12.039
[65] Lise Getoor, Nir Friedman, Daphne Koller, Avi Pfeffer, and Ben Taskar. 2007.
Models.
introduction-statistical-relational-learning
Introduction to Statistical Relational Learning (2007), 129.
Probabilistic Relational
https://mitpress.mit.edu/books/
[66] Anna Goldenberg, Alice X. Zheng, Stephen E. Fienberg, and Edoardo M. Airoldi. 2010. A Survey of Statistical Network
Models. Foundations and Trends in Machine Learning 2, 2 (Feb. 2010), 129–233. https://doi.org/10.1561/2200000005
[67] Manuel Gomez-Rodriguez, Jure Leskovec, David Balduzzi, and Bernhard Schölkopf. 2014. Uncovering the structure
and temporal dynamics of information propagation. Network Science 2, 1, 26–65. https://doi.org/10.1017/nws.2014.3
[68] Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Krause. 2012. Inferring Networks of Diffusion and Influence.
ACM Trans. on Knowledge Discovery from Data 5, 4 (Feb. 2012), 21:1--21:37. https://doi.org/10.1145/2086737.2086741
[69] Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov,
Elaine (Runting) Shi, and Dawn Song. 2014. Joint Link Prediction and Attribute Inference Using a Social-Attribute
Network. ACM Trans. Intell. Syst. Technol. 5, 2 (Apr. 2014), 27:1--27:20. https://doi.org/10.1145/2594455
[70] Palash Goyal and Emilio Ferrara. 2017. Graph Embedding Techniques, Applications, and Performance: A Survey.
CoRR abs/1705.02801 (2017). http://arxiv.org/abs/1705.02801
[71] Clive W.J. Granger. 1969.
Investigating Causal Relations by Econometric Models and Cross-spectral Methods.
Econometrica 37, 3 (1969), 424–438. https://doi.org/10.2307/1912791
[72] Michael D. Greicius, Ben Krasnow, Allan L. Reiss, and Vinod Menon. 2003. Functional connectivity in the resting
brain: A network analysis of the default mode hypothesis. Proceedings of the National Academy of Sciences 100, 1
(2003), 253–258. https://doi.org/10.1073/pnas.0135058100
[73] Chris Groendyke, David Welch, and David R. Hunter. 2011. Bayesian Inference for Contact Networks Given Epidemic
Data. Scandinavian Journal of Statistics 38, 3 (Sept. 2011), 600–616. https://doi.org/10.1111/j.1467-9469.2010.00721.x
[74] Huan Gui, Ya Xu, Anmol Bhasin, and Jiawei Han. 2015. Network A/B Testing: From Sampling to Estimation. In Proc.
of the 24th Intl. Conference on World Wide Web. ACM, 399–409. https://doi.org/10.1145/2736277.2741081
[75] Hamed Haddadi, Andrew J. King, Alison P. Wills, Damien Fay, John Lowe, A. Jennifer Morton, Stephen Hailes, and
Alan M. Wilson. 2011. Determining association networks in social animals: choosing spatial-temporal criteria and
sampling rates. Behavioral Ecology and Sociobiology 65, 8 (2011), 1659–1668. https://doi.org/10.1007/s00265-011-1193-3
[76] Hamed Haddadi, Miguel Rio, Gianluca Iannaccone, Andrew Moore, and Richard Mortier. 2008. Network topologies:
inference, modeling, and generation. Communications Surveys Tutorials, IEEE 10, 2 (2008), 48–69. https://doi.org/10.
1109/COMST.2008.4564479
[77] Rodrigo K. Hamede, Jim Bashford, Hamish McCallum, and Menna Jones. 2009. Contact networks in a wild Tasmanian
devil (Sarcophilus harrisii) population: using social network analysis to reveal seasonal variability in social behaviour
and its implications for transmission of devil facial tumour disease. Ecology Letters 12, 11 (2009), 1147–1157. https:
//doi.org/10.1111/j.1461-0248.2009.01370.x
[78] William L. Hamilton, Rex Ying, and Jure Leskovec. 2017. Representation Learning on Graphs: Methods and Applica-
tions. ArXiv e-prints (Sept. 2017). https://arxiv.org/abs/1709.05584
[79] Mohammad Al Hasan and Mohammed J. Zaki. 2011. A Survey of Link Prediction in Social Networks. In Social Network
Data Analytics SE - 9, Charu C Aggarwal (Ed.). Springer US, 243–275. https://doi.org/10.1007/978-1-4419-8462-3_9
[80] Anne-Claire Haury, Fantine Mordelet, Paola Vera-Licona, and Jean-Philippe Vert. 2012. TIGRESS: Trustful Inference
https://doi.org/10.1186/
of Gene REgulation using Stability Selection. BMC Systems Biology 6, 1 (2012), 145.
1752-0509-6-145
[81] S. Havlin, D.Y. Kenett, E. Ben-Jacob, A. Bunde, R. Cohen, H. Hermann, J.W. Kantelhardt, J. Kertész, S. Kirkpatrick, J.
Kurths, J. Portugali, and S. Solomon. 2012. Challenges in network science: Applications to infrastructures, climate,
social systems and economics. The European Physical Journal Special Topics 214, 1 (2012), 273–293. https://doi.org/10.
1140/epjst/e2012-01695-x
[82] D.T. Haydon, M. Chase-Topping, D.J. Shaw, L. Matthews, J.K. Friar, J. Wilesmith, and M.E.J. Woolhouse. 2003. The
construction and analysis of epidemic trees with reference to the 2001 UK foot-and-mouth outbreak. Proceedings of
the Royal Society of London B: Biological Sciences 270, 1511 (Jan. 2003), 121–127. https://doi.org/10.1098/rspb.2002.2191
[83] Michael Hecker, Sandro Lambeck, Susanne Toepfer, Eugene van Someren, and Reinhard Guthke. 2009. Gene
regulatory network inference: Data integration in dynamic models–A review. Biosystems 96, 1 (2009), 86–103.
https://doi.org/10.1016/j.biosystems.2008.12.004
[84] Anthony Hey, Stewart Tansley, and Kristin Tolle. 2009. The Fourth Paradigm: Data-Intensive Scientific Discovery.
[85] Jaroslav Hlinka, David Hartman, Martin Vejmelka, Jakob Runge, Norbert Marwan, Jürgen Kurths, and Milan Paluš.
2013. Reliability of Inference of Directed Climate Networks Using Conditional Mutual Information. Entropy 15, 6
(2013), 2023. https://doi.org/10.3390/e15062023
[86] Jake M. Hofman and Chris H. Wiggins. 2008. Bayesian Approach to Network Modularity. Physical Review Letters 100,
25 (Jun. 2008), 258701. https://doi.org/10.1103/PhysRevLett.100.258701
[87] Petter Holme. 2015. Modern temporal network theory: a colloquium. The European Physical Journal B 88, 9 (2015),
1–30. https://doi.org/10.1140/epjb/e2015-60657-4
[88] Petter Holme and Jari Saramäki. 2012. Temporal networks. Physics Reports 519, 3 (2012), 97–125. https://doi.org/10.
1016/j.physrep.2012.03.001
32
[89] R Matthew Hutchison, Thilo Womelsdorf, Elena A. Allen, Peter A. Bandettini, Vince D. Calhoun, Maurizio Corbetta,
Stefania Della Penna, Jeff H. Duyn, Gary H. Glover, Javier Gonzalez-Castillo, Daniel A. Handwerker, Shella Keilholz,
Vesa Kiviniemi, David A. Leopold, Francesco de Pasquale, Olaf Sporns, Martin Walter, and Catie Chang. 2013.
Dynamic functional connectivity: Promise, issues, and interpretations. NeuroImage 80 (Oct. 2013), 360–378. https:
//doi.org/10.1016/j.neuroimage.2013.05.079
[90] Alon Itai and Michael Rodeh. 1978. Finding a Minimum Circuit in a Graph. SIAM J. Comput. 7, 4 (Nov. 1978), 413–423.
https://doi.org/10.1137/0207033
[91] Richard James, Darren P. Croft, and Jens Krause. 2009. Potential banana skins in animal social network analysis.
Behavioral Ecology and Sociobiology 63, 7 (2009), 989–997. https://doi.org/10.1007/s00265-009-0742-5
[92] Jaya Kawale, Snigdhansu Chatterjee, Dominick Ormsby, Karsten Steinhaeuser, Stefan Liess, and Vipin Kumar. 2012.
Testing the Significance of Spatio-temporal Teleconnection Patterns. In Proc. of ACM SIGKDD 2012 (KDD '12). ACM,
642–650. https://doi.org/10.1145/2339530.2339634
[93] Jaya Kawale, Stefan Liess, Arjun Kumar, Michael Steinbach, Peter Snyder, Vipin Kumar, Auroop R. Ganguly, Nagiza F.
Samatova, and Fredrick Semazzi. 2013. A graph-based approach to find teleconnections in climate data. Statistical
Analysis and Data Mining 6, 3 (2013), 158–179. https://doi.org/10.1002/sam.11181
[94] Roland Kays, Margaret C. Crofoot, Walter Jetz, and Martin Wikelski. 2015. Terrestrial animal tracking as an eye on
life and planet. Science 348, 6240 (2015). https://doi.org/10.1126/science.aaa2478
[95] Matt J. Keeling and Ken T.D. Eames. 2005. Networks and epidemic models. Journal of The Royal Society Interface 2, 4
(Sept. 2005), 295–307. https://doi.org/10.1098/rsif.2005.0051
[96] David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the Spread of Influence Through a Social Network.
In Proc. of ACM SIGKDD 2003 (KDD '03). ACM, 137–146. https://doi.org/10.1145/956750.956769
[97] Angelika Kimmig, Lilyana Mihalkova, and Lise Getoor. 2014. Lifted graphical models: a survey. Machine Learning 99,
1 (2014), 1–45. https://doi.org/10.1007/s10994-014-5443-2
[98] Mikko Kivelä, Alex Arenas, Marc Barthelemy, James P. Gleeson, Yamir Moreno, and Mason A. Porter. 2014. Multilayer
networks. Journal of Complex Networks 2, 3 (2014), 203–271. https://doi.org/10.1093/comnet/cnu016
[99] Ariel Kleiner, Ameet Talwalkar, Purnamrita Sarkar, and Michael I. Jordan. 2014. A scalable bootstrap for massive data.
Journal of the Royal Stat. Soc.: Series B (Statistical Methodology) 76, 4 (2014), 795–816. https://doi.org/10.1111/rssb.12050
[100] Florian Klimm, Danielle S. Bassett, Jean M. Carlson, and Peter J. Mucha. 2014. Resolving Structural Variability in
Network Models and the Brain. PLoS Comput Biol 10, 3 (Mar. 2014), e1003491. https://doi.org/10.1371/journal.pcbi.
1003491
[101] Bryan Klimt and Yiming Yang. 2004. The enron corpus: A new dataset for email classification research. In Machine
learning: ECML 2004. Springer, 217–226. https://doi.org/10.1007/978-3-540-30115-8_22
[102] Ron Kohavi, Alex Deng, Brian Frasca, Toby Walker, Ya Xu, and Nils Pohlmann. 2013. Online Controlled Experiments
at Large Scale. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining (KDD '13). ACM, New York, NY, USA, 1168–1176. https://doi.org/10.1145/2487575.2488217
[103] Eric D. Kolaczyk. 2009. Network Topology Inference. In Statistical Analysis of Network Data SE - 7. Springer New
York, 1–48. https://doi.org/10.1007/978-0-387-88146-1_7
[104] Mark A. Kramer, Uri T. Eden, Sydney S. Cash, and Eric D. Kolaczyk. 2009. Network inference with confidence from
multivariate time series. Physical Review E 79, 6 (Jun. 2009), 61916. https://doi.org/10.1103/PhysRevE.79.061916
[105] Mark A. Kramer, Eric D. Kolaczyk, and Heidi E. Kirsch. 2008. Emergent network topology at seizure onset in humans.
Epilepsy Research 79, 2–3 (2008), 173–186. https://doi.org/10.1016/j.eplepsyres.2008.02.002
[106] Jens Krause, Stefan Krause, Robert Arlinghaus, Ioannis Psorakis, Stephen Roberts, and Christian Rutz. 2013. Reality
mining of animal social systems. Trends in Ecology & Evolution 28, 9 (Sept. 2013), 541–551. https://doi.org/10.1016/j.
tree.2013.06.002
[107] Marlene Kretschmer, Dim Coumou, Jonathan F. Donges, and Jakob Runge. 2016. Using Causal Effect Networks to
analyze different Arctic drivers of mid-latitude winter circulation. Journal of Climate (Mar 2016). https://doi.org/10.
1175/JCLI-D-15-0654.1
[108] Timothy La Fond and Jennifer Neville. 2010. Randomization Tests for Distinguishing Social Influence and Homophily
Effects. In Proc. of the 19th Intl. Conference on World Wide Web. ACM, 601–610. https://doi.org/10.1145/1772690.1772752
[109] Jean-Philippe Lachaux, Antoine Lutz, David Rudrauf, Diego Cosmelli, Michel Le Van Quyen, Jacques Martinerie, and
Francisco Varela. 2002. Estimating the time-course of coherence between single-trial brain signals: an introduction to
wavelet coherence. Neurophysiologie Clinique/Clinical Neurophysiology 32, 3 (Jun. 2002), 157–174. https://doi.org/10.
1016/S0987-7053(02)00301-5
[110] N.D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A.T. Campbell. 2010. A survey of mobile phone sensing.
IEEE Communications Magazine 48, 9 (Sept. 2010), 140–150. https://doi.org/10.1109/MCOM.2010.5560598
[111] Juha K. Laurila, Daniel Gatica-Perez, Imad Aad, Jan Blom, Olivier Bornet, Trinh Minh Tri Do, Olivier Dousse, Julien
Eberle, and Markus Miettinen. 2013. From big smartphone data to worldwide research: The Mobile Data Challenge.
Pervasive and Mobile Computing 9, 6 (Dec. 2013), 752–771. https://doi.org/10.1016/j.pmcj.2013.07.014
[112] David Lazer. 2011. Networks in Political Science: Back to the Future. PS: Political Science & Politics 44, 01 (2011),
61–68. https://doi.org/10.1017/S1049096510001873
[113] Sophie Lebre, Jennifer Becq, Frederic Devaux, Michael Stumpf, and Gaelle Lelandais. 2010. Statistical inference of the
time-varying structure of gene-regulation networks. BMC Systems Biology 4, 1 (2010), 130. https://doi.org/10.1186/
1752-0509-4-130
33
[114] Jure Leskovec and Eric Horvitz. 2014. Geospatial Structure of a Planetary-Scale Social Network. IEEE Trans. on
Computational Social Systems 1, 3 (Sept. 2014), 156–163. https://doi.org/10.1109/TCSS.2014.2377789
[115] S. Levitus, J.I. Antonov, O.K. Baranova, T.P. Boyer, C.L. Coleman, H.E. Garcia, A.I. Grodsky, D.R. Johnson, R.A.
Locarnini, A.V. Mishonov, J.R. Reagan, C.L. Sazama, D. Seidov, I. Smolyar, E.S. Yarosh, and M.M. Zweng. 2013. The
World Ocean Database. Data Science Journal 12 (2013), WDS229–WDS234. https://doi.org/10.2481/dsj.WDS-041
[116] Huai Li, Jianhua Xuan, Yue Wang, and Ming Zhan. 2008. Inferring regulatory networks. Frontiers in Bioscience 13
(2008), 263–275. https://doi.org/10.2741/2677
[117] David Liben-Nowell and Jon Kleinberg. 2007. The link-prediction problem for social networks. Journal of the American
Society for Information Science and Technology 58, 7 (May 2007), 1019–1031. https://doi.org/10.1002/asi.20591
[118] Linyuan Lü and Tao Zhou. 2011. Link prediction in complex networks: A survey. Physica A: Statistical Mechanics and
its Applications 390, 6 (2011), 1150–1170. https://doi.org/10.1016/j.physa.2010.11.027
[119] Subramani Mani and Gregory F Cooper. 2004. Causal discovery using a Bayesian local causal discovery algorithm.
Studies in Health Technology and Informatics 107, Pt 1 (2004), 731–735. https://doi.org/10.3233/978-1-60750-949-3-731
[120] Daniel Marbach, James C. Costello, Robert Kuffner, Nicole M. Vega, Robert J. Prill, Diogo M. Camacho, Kyle R. Allison,
Manolis Kellis, James J. Collins, and Gustavo Stolovitzky. 2012. Wisdom of crowds for robust gene network inference.
Nature Methods 9, 8 (Aug. 2012), 796–804. https://doi.org/10.1038/nmeth.2016
[121] Rossana Mastrandrea, Julie Fournet, and Alain Barrat. 2015. Contact Patterns in a High School: A Comparison
between Data Collected Using Wearable Sensors, Contact Diaries and Friendship Surveys. PLoS ONE 10, 9 (Sept.
2015), e0136497. https://doi.org/10.1371/journal.pone.0136497
[122] Julian McAuley, Rahul Pandey, and Jure Leskovec. 2015. Inferring Networks of Substitutable and Complementary
Products. In Proc. of ACM SIGKDD 2015 (KDD '15). ACM, 785–794. https://doi.org/10.1145/2783258.2783381
[123] David B. McDonald. 2007. Predicting fate from early connectivity in a social network. Proceedings of the National
Academy of Sciences 104, 26 (Jun. 2007), 10910–10914. https://doi.org/10.1073/pnas.0701159104
[124] Christopher Meek. 1995. Causal Inference and Causal Explanation with Background Knowledge. In Proceedings of
the Eleventh Conference on Uncertainty in Artificial Intelligence (UAI'95). Morgan Kaufmann Publishers Inc., 403–410.
http://dl.acm.org/citation.cfm?id=2074204
[125] Patrick Meyer, Kevin Kontos, Frederic Lafitte, and Gianluca Bontempi. 2007. Information-Theoretic Inference of
Large Transcriptional Regulatory Networks. EURASIP Journal on Bioinformatics and Systems Biology 2007, 1 (2007),
79879. https://doi.org/10.1155/2007/79879
[126] Lauren Ancel Meyers, Babak Pourbohloul, M.E.J. Newman, Danuta M. Skowronski, and Robert C. Brunham. 2005.
Network theory and SARS: predicting outbreak diversity. Journal of Theoretical Biology 232, 1 (2005), 71–81. https:
//doi.org/10.1016/j.jtbi.2004.07.026
[127] Isobel Milns, Colin M. Beale, and V. Anne Smith. 2010. Revealing ecological networks using Bayesian network
inference algorithms. Ecology 91, 7 (Feb. 2010), 1892–1899. https://doi.org/10.1890/09-0731.1
[128] Sach Mukherjee and Terence P. Speed. 2008. Network inference using informative priors. Proceedings of the National
Academy of Sciences 105, 38 (Sept. 2008), 14313–14318. https://doi.org/10.1073/pnas.0802272105
[129] Seth Myers and Jure Leskovec. 2010.
On the Convexity of Latent Social Network Inference.
In
http://papers.nips.cc/paper/
Advances
Information Processing Systems
4113-on-the-convexity-of-latent-social-network-inference
in Neural
23. 1741–1749.
[130] Galileo Mark Namata, Ben London, and Lise Getoor. 2015. Collective Graph Identification. ACM Transactions on
Knowledge Discovery from Data. https://doi.org/10.1145/2818378
[131] G.L. Nemhauser, L.A. Wolsey, and M.L. Fisher. 1978. An analysis of approximations for maximizing submodular set
functions–I. Mathematical Programming 14, 1 (1978), 265–294. https://doi.org/10.1007/BF01588971
[132] Praneeth Netrapalli and Sujay Sanghavi. 2012. Learning the Graph of Epidemic Cascades. SIGMETRICS Perform. Eval.
Rev. 40, 1 (Jun. 2012), 211–222. https://doi.org/10.1145/2318857.2254783
[133] Jian Ni, Haiyong Xie, Sekhar Tatikonda, and Yang Richard Yang. 2010. Efficient and Dynamic Routing Topology
Inference from End-to-end Measurements. IEEE/ACM Transactions on Networking 18, 1 (Feb. 2010), 123–135. https:
//doi.org/10.1109/TNET.2009.2022538
[134] M. Paluš, D. Hartman, J. Hlinka, and M. Vejmelka. 2011. Discerning connectivity from dynamics in climate networks.
Nonlinear Processes in Geophysics 18, 5 (2011), 751–763. https://doi.org/10.5194/npg-18-751-2011
[135] Evangelos E. Papalexakis, Alona Fyshe, Nicholas D. Sidiropoulos, Partha Pratim Talukdar, Tom M. Mitchell, and
Christos Faloutsos. 2014. Good-enough Brain Model: Challenges, Algorithms and Discoveries in Multi-subject
Experiments. In Proc. of ACM SIGKDD 2014 (KDD '14). ACM, 95–104. https://doi.org/10.1145/2623330.2623639
[136] D.M. Patrick, M.L. Rekart, A. Jolly, S. Mak, M. Tyndall, J. Maginley, E. Wong, T. Wong, H. Jones, C. Montgomery, and
R.C. Brunham. 2002. Heterosexual outbreak of infectious syphilis: epidemiological and ethnographic analysis and
implications for control. Sexually Transmitted Infections 78, suppl 1 (2002), i164–i169. https://doi.org/10.1136/sti.78.
suppl_1.i164
[137] Joseph J. Pfeiffer III, Sebastian Moreno, Timothy La Fond, Jennifer Neville, and Brian Gallagher. 2014. Attributed
Graph Models: Modeling Network Structure with Correlated Attributes. In Proceedings of the 23rd International
Conference on World Wide Web (WWW '14). ACM, 831–842. https://doi.org/10.1145/2566486.2567993
[138] Gert Pfurtscheller and Colin Andrew. 1999. Event-Related changes of band power and coherence: methodology
and interpretation. Journal of Clinical Neurophysiology 16, 6 (Nov. 1999), 512–519. http://dx.doi.org/10.1097/
00004691-199911000-00003
34
[139] Noa Pinter-Wollman, Elizabeth A. Hobson, Jennifer E. Smith, Andrew J. Edelman, Daizaburo Shizuka, Shermin de
Silva, James S. Waters, Steven D. Prager, Takao Sasaki, George Wittemyer, Jennifer Fewell, and David B. McDonald.
2013. The dynamics of animal social networks: analytical, conceptual, and theoretical advances. Behavioral Ecology
(2013). https://doi.org/10.1093/beheco/art047
[140] S.C. Ponten, F. Bartolomei, and C.J. Stam. 2016. Small-world networks and epilepsy: Graph theoretical analysis
of intracerebrally recorded mesial temporal lobe seizures. Clinical Neurophysiology 118, 4 (Apr. 2016), 918–927.
https://doi.org/10.1016/j.clinph.2006.12.002
[141] Stephen R. Proulx, Daniel E.L. Promislow, and Patrick C. Phillips. 2005. Network thinking in ecology and evolution.
Trends in Ecology & Evolution 20, 6 (2005), 345–353. https://doi.org/10.1016/j.tree.2005.04.004
[142] Nataša Pržulj, Derek G. Corneil, and Igor Jurisica. 2004. Modeling interactome: scale-free or geometric? Bioinformatics
20, 18 (2004), 3508–3515. https://doi.org/10.1093/bioinformatics/bth436
[143] Ioannis Psorakis, Stephen J. Roberts, Iead Rezek, and Ben C. Sheldon. 2012. Inferring social network structure in
ecological systems from spatio-temporal data streams. Journal of The Royal Society Interface 9, 76 (2012), 3055–3066.
https://doi.org/10.1098/rsif.2012.0223
[144] Manish Purohit, B. Aditya Prakash, Chanhyun Kang, Yao Zhang, and V.S. Subrahmanian. 2014. Fast Influence-based
Coarsening for Large Networks. In Proc. of ACM SIGKDD 2014 (KDD '14). ACM, 1296–1305. https://doi.org/10.1145/
2623330.2623701
[145] J.D. Ramsey, S.J. Hanson, C. Hanson, Y.O. Halchenko, R.A. Poldrack, and C. Glymour. 2010. Six problems for causal
inference from fMRI. NeuroImage 49, 2 (2010), 1545–1558. https://doi.org/10.1016/j.neuroimage.2009.08.065
[146] Carlo Ratti, Stanislav Sobolevsky, Francesco Calabrese, Clio Andris, Jonathan Reades, Mauro Martino, Rob Claxton,
and Steven H Strogatz. 2010. Redrawing the Map of Great Britain from a Network of Human Interactions. PLoS ONE
5, 12 (Dec. 2010), e14248. https://doi.org/10.1371/journal.pone.0014248
[147] Jaap C Reijneveld, Sophie C Ponten, Henk W Berendse, and Cornelis J Stam. 2007. The application of graph
theoretical analysis to complex networks in the brain. Clinical Neurophysiology 118, 11 (Dec. 2007), 2317–2331.
https://doi.org/10.1016/j.clinph.2007.08.010
[148] Bruno Ribeiro, Nicola Perra, and Andrea Baronchelli. 2013. Quantifying the effect of temporal resolution on time-
varying networks. Scientific Reports 3 (Oct. 2013), 3006. http://dx.doi.org/10.1038/srep03006
[149] Lucy F. Robinson, Lauren Y. Atlas, and Tor D. Wager. 2015. Dynamic functional connectivity using state-based
dynamic community structure: Method and application to opioid analgesia. NeuroImage 108 (2015), 274–291. https:
//doi.org/10.1016/j.neuroimage.2014.12.034
[150] Alard Roebroeck, Elia Formisano, and Rainer Goebel. 2005. Mapping directed influence over the brain using Granger
causality and fMRI. NeuroImage 25, 1 (2005), 230–242. https://doi.org/10.1016/j.neuroimage.2004.11.017
[151] M.J. Rosa, K. Friston, and W. Penny. 2012. Post-hoc selection of dynamic causal models. Journal of Neuroscience
Methods 208, 1 (2012), 66–78. https://doi.org/10.1016/j.jneumeth.2012.04.013
[152] Mikail Rubinov and Olaf Sporns. 2010. Complex network measures of brain connectivity: Uses and interpretations.
NeuroImage 52, 3 (Sept. 2010), 1059–1069. https://doi.org/10.1016/j.neuroimage.2009.10.003
[153] Jakob Runge, Vladimir Petoukhov, and Jürgen Kurths. 2013. Quantifying the Strength and Delay of Climatic
Interactions: The Ambiguities of Cross Correlation and a Novel Measure Based on Graphical Models. Journal of
Climate 27, 2 (Sept. 2013), 720–739. https://doi.org/10.1175/JCLI-D-13-00159.1
[154] Christian Rutz, Zackory T. Burns, Richard James, Stefanie M.H. Ismar, John Burt, Brian Otis, Jayson Bowen, and
James J.H. St Clair. 2012. Automated mapping of social networks in wild birds. Current Biology 22, 17 (2012), R669 –
R671. https://doi.org/10.1016/j.cub.2012.06.037
[155] Suranjana Saha, Shrinivas Moorthi, Xingren Wu, Jiande Wang, Sudhir Nadiga, Patrick Tripp, David Behringer, Yu-Tai
Hou, Hui-ya Chuang, Mark Iredell, Michael Ek, Jesse Meng, Rongqian Yang, Malaquías Peña Mendez, Huug van den
Dool, Qin Zhang, Wanqiu Wang, Mingyue Chen, and Emily Becker. 2014. The NCEP Climate Forecast System Version
2. Journal of Climate 27, 6 (2014), 2185–2208. https://doi.org/10.1175/JCLI-D-12-00823.1
[156] Vangelis Sakkalis. 2011. Review of Advanced Techniques for the Estimation of Brain Connectivity Measured with
EEG/MEG. Comp. in Biology and Medicine 41, 12 (2011), 1110–1117. https://doi.org/10.1016/j.compbiomed.2011.06.020
[157] Jari Saramäki and Esteban Moro. 2015. From seconds to months: an overview of multi-scale dynamics of mobile
telephone calls. The European Physical Journal B 88, 6 (2015), 1–10. https://doi.org/10.1140/epjb/e2015-60106-6
[158] Vedran Sekara and Sune Lehmann. 2014. The Strength of Friendship Ties in Proximity Sensor Data. PLoS ONE 9, 7
(July 2014), e100915. https://doi.org/10.1371/journal.pone.0100915
[159] Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Galligher, and Tina Eliassi-Rad. 2008. Collective
Classification in Network Data. AI Magazine 29, 3 (2008), 93. http://hdl.handle.net/1903/7546
[160] Jay Shendure and Hanlee Ji. 2008. Next-generation DNA sequencing. Nature Biotechnology 26, 10 (Oct. 2008),
1135–1145. https://doi.org/10.1038/nbt1486
[161] Caroline Siegenthaler and Rudiyanto Gunawan. 2014. Assessment of Network Inference Methods: How to Cope with
an Underdetermined Problem. PLOS ONE 9, 3 (03 2014), 1–7. https://doi.org/10.1371/journal.pone.0090481
[162] Chao Sima, Jianping Hua, and Sungwon Jung. 2009. Inference of gene regulatory networks using time-series data: a
survey. Current Genomics 10, 6 (Sept. 2009), 416–429. https://doi.org/10.2174/138920209789177610
[163] Sean L. Simpson, F. DuBois Bowman, and Paul J. Laurienti. 2013. Analyzing complex functional brain networks:
Fusing statistics and network science to understand the brain. Statistics Surveys 7 (2013), 1–36. https://doi.org/10.
1214/13-SS103
35
[164] Timo Smieszek, Stefanie Castell, Alain Barrat, Ciro Cattuto, Peter J. White, and Gérard Krause. 2016. Contact
Diaries Versus Wearable Proximity Sensors in Measuring Contact Patterns at a Conference: Method Comparison and
Participants' Attitudes. BMC Infectious Diseases 16, 1 (2016), 1–14. https://doi.org/10.1186/s12879-016-1676-y
[165] Orr Spiegel, Stephan T. Leu, Andrew Sih, and C. Michael Bull. 2016. Socially interacting or indifferent neighbours?
Randomization of movement paths to tease apart social preference and spatial constraints. Methods in Ecology and
Evolution 7, 8 (2016), 971–979. https://doi.org/10.1111/2041-210X.12553
[166] Olaf Sporns. 2014. Contributions and challenges for network models in cognitive neuroscience. Nature Neuroscience
17, 5 (May 2014), 652–660. https://doi.org/10.1038/nn.3690
[167] Olaf Sporns and Richard F. Betzel. 2016. Modular Brain Networks. Annual Review of Psychology 67, 1 (Jan. 2016),
613–640. https://doi.org/10.1146/annurev-psych-122414-033634
[168] J. Conrad Stack, Shweta Bansal, V.S. Anil Kumar, and Bryan Grenfell. 2013.
Inferring population-level contact
heterogeneity from common epidemic data. Journal of The Royal Society Interface 10, 78 (2013). https://doi.org/10.
1098/rsif.2012.0578
[169] Juliette Stehlé, François Charbonnier, Tristan Picard, Ciro Cattuto, and Alain Barrat. 2013. Gender Homophily
from Spatial Behavior in a Primary School: A Sociometric Study. Social Networks 35, 4 (2013), 604 – 613. https:
//doi.org/10.1016/j.socnet.2013.08.003
[170] Karsten Steinhaeuser, Nitesh V. Chawla, and Auroop R. Ganguly. 2011. Complex networks as a unified framework
for descriptive analysis and predictive modeling in climate science. Statistical Analysis and Data Mining 4, 5 (2011),
497–511. https://doi.org/10.1002/sam.10100
[171] Arkadiusz Stopczynski, Riccardo Pietri, Alex Pentland, David Lazer, and Sune Lehmann. 2014. Privacy in Sensor-Driven
Human Data Collection: A Guide for Practitioners. ArXiv e-prints (Mar. 2014). https://arxiv.org/abs/1403.5299
[172] Arkadiusz Stopczynski, Vedran Sekara, Piotr Sapiezynski, Andrea Cuttone, Mette My Madsen, Jakob Eg Larsen, and
Sune Lehmann. 2014. Measuring Large-Scale Social Networks with High Resolution. PLoS ONE 9, 4 (Apr. 2014),
e95978. https://doi.org/10.1371/journal.pone.0095978
[173] Cédric Sueur, Armand Jacobs, Frédéric Amblard, Odile Petit, and Andrew J King. 2011. How can social network
analysis improve the study of primate behavior? American Journal of Primatology 73, 8 (Aug. 2011), 703–19. https:
//doi.org/10.1002/ajp.20915
[174] Rajmonda Sulo, Tanya Berger-Wolf, and Robert Grossman. 2010. Meaningful Selection of Temporal Resolution for
Dynamic Networks. In Proceedings of the Eighth Workshop on Mining and Learning with Graphs (MLG '10). ACM, New
York, NY, USA, 127–136. https://doi.org/10.1145/1830252.1830269
[175] Kaustubh Supekar, Vinod Menon, Daniel Rubin, Mark Musen, and Michael D. Greicius. 2008. Network Analysis
of Intrinsic Functional Brain Connectivity in Alzheimer's Disease. PLoS Comput Biol 4, 6 (2008), 1–11. https:
//doi.org/10.1371/journal.pcbi.1000100
[176] Kaustubh Supekar, Vinod Menon, Daniel Rubin, Mark Musen, and Michael D Greicius. 2008. Network Analysis of
Intrinsic Functional Brain Connectivity in Alzheimer's Disease. PLoS Computational Biology 4, 6 (Jun. 2008), e1000100.
https://doi.org/10.1371/journal.pcbi.1000100
[177] Yuriy Sverchkov and Mark Craven. 2017. A review of active learning approaches to experimental design for uncovering
biological networks. PLOS Computational Biology 13, 6 (2017), 1–26. https://doi.org/10.1371/journal.pcbi.1005466
[178] Hiroyuki Toh and Katsuhisa Horimoto. 2002. Inference of a genetic network by a combined approach of cluster analysis
and graphical Gaussian modeling. Bioinformatics 18, 2 (2002), 287–297. https://doi.org/10.1093/bioinformatics/18.2.287
[179] Anastasios A. Tsonis and Paul J. Roebber. 2004. The architecture of the climate network. Physica A: Statistical
Mechanics and its Applications 333, 0 (2004), 497–504. https://doi.org/10.1016/j.physa.2003.10.045
[180] Anastasios A. Tsonis, Geli Wang, Kyle L. Swanson, Francisco A. Rodrigues, and Luciano da Fontura Costa. 2011.
Community structure and dynamics in climate networks. Climate Dynamics 37, 5-6 (2011), 933–940. https://doi.org/
10.1007/s00382-010-0874-3
[181] Charalampos E. Tsourakakis, U Kang, Gary L. Miller, and Christos Faloutsos. 2009. DOULION: Counting Triangles in
Massive Graphs with a Coin. In Proc. of ACM SIGKDD 2009. ACM, 837–846. https://doi.org/10.1145/1557019.1557111
[182] Liubov Tupikina, Nora Molkenthin, Cristóbal López, Emilio Hernández-García, Norbert Marwan, and Jürgen Kurths.
2016. Correlation Networks from Flows. The Case of Forced and Time-Dependent Advection-Diffusion Dynamics.
PLOS ONE 11, 4 (04 2016), 1–12. https://doi.org/10.1371/journal.pone.0153703
[183] Toni Vallès-Català, Tiago P. Peixoto, Roger Guimerà, and Marta Sales-Pardo. 2017. On the consistency between model
selection and link prediction in networks. ArXiv e-prints (May 2017). https://arxiv.org/abs/1705.07967
[184] Martijn P. van den Heuvel, René S. Kahn, Joaquín Goñi, and Olaf Sporns. 2012. High-cost, high-capacity backbone
for global brain communication. Proceedings of the National Academy of Sciences 109, 28 (July 2012), 11372–11377.
https://doi.org/10.1073/pnas.1203593109
[185] Martijn P. van den Heuvel and Olaf Sporns. 2011. Rich-club organization of the human connectome. The Journal of
Neuroscience 31, 44 (Nov. 2011), 15775–15786. https://doi.org/10.1523/jneurosci.3539-11.2011
[186] Martijn P. van den Heuvel and Olaf Sporns. 2015. Network hubs in the human brain. Trends in Cognitive Sciences 17,
12 (Dec. 2015), 683–696. https://doi.org/10.1016/j.tics.2013.09.012
[187] Dan J. Wang, Xiaolin Shi, Daniel A. McFarland, and Jure Leskovec. 2012. Measurement error in network data: A
re-classification. Social Networks 34, 4 (2012), 396–409. https://doi.org/10.1016/j.socnet.2012.01.003
[188] Larry Wasserman. 2006. All of Nonparametric Statistics (Springer Texts in Statistics). Springer New York. https:
//doi.org/10.1007/0-387-30623-4
36
[189] Duncan J. Watts and Steven H. Strogatz. 1998. Collective dynamics of 'small-world' networks. Nature 393, 6684 (Jun.
1998), 440–442. https://doi.org/10.1038/30918
[190] David Welch, Shweta Bansal, and David R. Hunter. 2011. Statistical inference to advance network models in
epidemiology. Epidemics 3, 1 (Mar. 2011), 38–45. https://doi.org/10.1016/j.epidem.2011.01.002
[191] Tina Wey, Daniel T. Blumstein, Weiwei Shen, and Ferenc Jordán. 2008. Social network analysis of animal behaviour:
a promising tool for the study of sociality. Animal Behaviour 75, 2 (2008), 333–344. https://doi.org/10.1016/j.anbehav.
2007.06.020
[192] Hal Whitehead, Lars Bejder, and C. Andrea Ottensmeyer. 2005. Testing association patterns: issues arising and
extensions. Animal Behaviour 69, 5 (2005), e1 –. https://doi.org/10.1016/j.anbehav.2004.11.004
[193] Hal Whitehead and Richard James. 2015. Generalized affiliation indices extract affiliations from social network data.
Methods in Ecology and Evolution 6, 7 (2015), 836–844. https://doi.org/10.1111/2041-210X.12383
[194] R.W. Wilkins, D.A. Hodges, P.J. Laurienti, M. Steen, and J.H. Burdette. 2014. Network Science and the Effects of Music
Preference on Functional Brain Connectivity: From Beethoven to Eminem. Scientific Reports 4 (Aug. 2014), 6130.
https://doi.org/10.1038/srep06130
[195] Rongjing Xiang and Jennifer Neville. 2008. Pseudolikelihood EM for Within-network Relational Learning. In Proc. of
the 8th IEEE Intl. Conference on Data Mining (ICDM 2008). 1103–1108. https://doi.org/10.1109/ICDM.2008.148
[196] K. Yamasaki, A. Gozolchiani, and S. Havlin. 2008. Climate Networks around the Globe are Significantly Affected by
El Niño. Phys. Rev. Lett. 100, 22 (Jun. 2008), 228501. https://doi.org/10.1103/PhysRevLett.100.228501
[197] Donghyeon Yu, MinSoo Kim, Guanghua Xiao, and Tae Hyun Hwang. 2013. Review of Biological Network Data and
Its Applications. Genomics & Informatics 11, 4 (Dec. 2013), 200–210. https://doi.org/10.5808/GI.2013.11.4.200
[198] Qingbao Yu, Erik B. Erhardt, Jing Sui, Yuhui Du, Hao He, Devon Hjelm, Mustafa S. Cetin, Srinivas Rachakonda,
Robyn L. Miller, Godfrey Pearlson, and Vince D. Calhoun. 2015. Assessing dynamic brain graphs of time-varying
connectivity in fMRI data: Application to healthy controls and patients with schizophrenia. NeuroImage 107 (2015),
345–355. https://doi.org/10.1016/j.neuroimage.2014.12.020
[199] Ming Yuan and Yi Lin. 2006. Model selection and estimation in regression with grouped variables. J. Royal Stat. Soc:
Series B (Statistical Methodology) 68, 1 (Feb. 2006), 49–67. https://doi.org/10.1111/j.1467-9868.2005.00532.x
[200] Andrew Zalesky, Alex Fornito, and Ed Bullmore. 2012. On the use of correlation as a measure of network connectivity.
NeuroImage 60, 4 (2012), 2096–2106. https://doi.org/10.1016/j.neuroimage.2012.02.001
[201] Andrew Zalesky, Alex Fornito, Ian H. Harding, Luca Cocchi, Murat Yücel, Christos Pantelis, and Edward T. Bullmore.
2010. Whole-brain anatomical networks: Does the choice of nodes matter? NeuroImage 50, 3 (Apr. 2010), 970–983.
https://doi.org/10.1016/j.neuroimage.2009.12.027
[202] Tanja Zerenner, Petra Friederichs, Klaus Lehnertz, and Andreas Hense. 2014. A Gaussian graphical model approach
to climate networks. Chaos 24, 2 (2014). https://doi.org/10.1063/1.4870402
[203] Yang Zhan, David Halliday, Ping Jiang, Xuguang Liu, and Jianfeng Feng. 2006. Detecting time-dependent coherence
between non-stationary electrophysiological signals–A combined statistical and time-frequency approach. Journal of
Neuroscience Methods 156, 1-2 (Sept. 2006), 322–332. https://doi.org/10.1016/j.jneumeth.2006.02.013
[204] Bin Zhang and Steve Horvath. 2005. A General Framework for Weighted Gene Co-Expression Network Analysis.
Statistical Applications in Genetics and Molecular Biology 4, 1 (2005). https://doi.org/10.2202/1544-6115.1128
[205] Dong Zhou, Avi Gozolchiani, Yosef Ashkenazy, and Shlomo Havlin. 2015. Teleconnection Paths via Climate Network
Direct Link Detection. Phys. Rev. Lett. 115, 26 (Dec. 2015), 268501. https://doi.org/10.1103/PhysRevLett.115.268501
[206] Hui Zhou, Wencai Du, Shaochun Xu, and Qinling Xin. 2011. An Empirical Study of Network Topology Inference.
In Computer and Information Science 2011 SE - 17, Roger Lee (Ed.). Studies in Computational Intelligence, Vol. 364.
Springer Berlin Heidelberg, 213–225. https://doi.org/10.1007/978-3-642-21378-6_17
37
|
1505.06286 | 1 | 1505 | 2015-05-23T08:08:54 | An Effective Marketing Strategy for Revenue Maximization with a Quantity Constraint | [
"cs.SI"
] | Recently the influence maximization problem has received much attention for its applications on viral marketing and product promotions. However, such influence maximization problems have not taken into account the monetary effect on the purchasing decision of individuals. To fulfill this gap, in this paper, we aim for maximizing the revenue by considering the quantity constraint on the promoted commodity. For this problem, we not only identify a proper small group of individuals as seeds for promotion but also determine the pricing of the commodity. To tackle the revenue maximization problem, we first introduce a strategic searching algorithm, referred to as Algorithm PRUB, which is able to derive the optimal solutions. After that, we further modify PRUB to propose a heuristic, Algorithm PRUB+IF, for obtaining feasible solutions more effciently on larger instances. Experiments on real social networks with different valuation distributions demonstrate the effectiveness of PRUB and PRUB+IF. | cs.SI | cs |
An Effective Marketing Strategy for Revenue Maximization
with a Quantity Constraint
Ya-Wen Teng #1, Chih-Hua Tai ∗2, Philip S. Yu †3, Ming-Syan Chen #4
# EE Dept., National Taiwan University, Taipei, Taiwan
1 [email protected], 4 [email protected]
∗ CSIE Dept., National Taipei University, New Taipei, Taiwan
2 [email protected]
† CS Dept., University of Illinois at Chicago, Chicago, IL 60607
3 [email protected]
ABSTRACT
Recently the influence maximization problem has received
much attention for its applications on viral marketing and
product promotions. However, such influence maximization
problems have not taken into account the monetary effect
on the purchasing decision of individuals. To fulfill this
gap, in this paper, we aim for maximizing the revenue by
considering the quantity constraint on the promoted com-
modity. For this problem, we not only identify a proper
small group of individuals as seeds for promotion but also
determine the pricing of the commodity. To tackle the rev-
enue maximization problem, we first introduce a strategic
searching algorithm, referred to as Algorithm PRUB, which
is able to derive the optimal solutions. After that, we further
modify PRUB to propose a heuristic, Algorithm PRUB+IF,
for obtaining feasible solutions more efficiently on larger in-
stances. Experiments on real social networks with differ-
ent valuation distributions demonstrate the effectiveness of
PRUB and PRUB+IF.
1.
INTRODUCTION
Due to the advance of the Web 2.0 techniques, various
kinds of websites have become parts of our life. Most peo-
ple nowadays are used to sharing, seeking and obtaining
information, and interacting with others through various
social networking websites such as Digg, Slashdot, Face-
book, and Twitter, to name a few. As more and more peo-
ple join these social websites, the phenomenon of immense
quantity of information flow and influence spread becomes
prominent. This then motivates the utilization of this phe-
nomenon, known as the "word-of-mouth" effect, to bring sig-
nificant potential benefits in many types of business such as
viral marketing and innovation promotion. For example, a
company can effectively promote its brand and new prod-
ucts by involving a group of influential people spreading the
good words over social websites. Hence, in very recent years,
there is active research [3, 7, 15, 19] exploring the problem
of influence maximization.
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00.
Existing works studied the influence maximization prob-
lem generally based on two kinds of diffusion models, the
Linear Threshold (LT) and the Independent Cascade (IC)
models.
In the LT model, the influence strength between
a pair of individuals is modeled as a fixed weight, and the
influence on an individual is described as cumulative. An
individual is activated when the sum of the weights propa-
gated from his/her activated neighbors exceeds his/her own
threshold. The IC model assumes that each influence of one
to another is an independent chance to activate the latter
with a probability. On both models, the problem of influ-
ence maximization aims at identifying a proper group (of a
specified size) of individuals as seeds to have the number of
activated people maximized. However, note that such in-
fluence maximization problems have not taken into account
the monetary aspect, which usually plays a crucial factor in
people's purchase decisions. That is, maximizing the influ-
ence spread does not necessarily bring maximum revenue, as
an individual may be very interested in a new smartphone,
but does not purchase the smartphone due to its high price.
According to the studies in the fields of social psychology
[2, 8] and economics [10, 14, 20], one's valuation towards a
commodity will be positively influenced by those that have
purchased the commodity, which is known as the herd men-
tality or positive network externalities. In other words, peo-
ple tend to imitate others in their consumer behaviors, which
will result in irrational valuations of the commodity, i.e.,
higher valuations beyond their inherent valuations. Based
on these phenomena, Mirrokni et al. [17] addressed the Rev-
enue Maximization problem by incorporating the mon-
etary concept into the maximization problem of influence
spread based on the LT model. In the monetary LT model,
the influence strength (or said weight) is transformed into
the valuation concept, and the individual threshold is re-
garded as the inherent valuation. One's valuation of a com-
modity is thus the sum of his/her inherent valuation and
the valuation increment from social influences. An individ-
ual then pays for a commodity and propagates his/her in-
fluence whenever her/his valuation is larger than or equal to
the pricing of the commodity. Consider the network shown
in Figure 1 as an example, where the number contained in
each node is the inherent valuation and the number on an
edge from one node to another is the weight, i.e., the influ-
ence strength. For the ease of illustration, without loss of
generality, the function F (x) = x is used to transform the
effects of the social influences cumulated on an individual
a($2)
2
5
1
3
b($0)
4
c($3)
3
d($1)
e($2)
5
f ($0)
4
2
1
2
2
Figure 1: A network with the monetary concept.
into the valuation concept in this example. If f purchases
the commodity, c's valuation is increased to $3 + F (1) = $4.
If a, e, and f all purchase the commodity, the valuation in-
crement for c is F (3 + 2 + 1) = $6 and c's valuation thus
becomes $3 + $6 = $9. The objective of the revenue max-
imization problem thus aims at determining the pricing of
the commodity and identifying a seed group of individuals
for promotion so that the total revenue is maximized.
However, to the best of our knowledge, none of the existing
works has taken a quantity constraint on commodities into
account. Note that due to the consideration of marketing
strategies or practical conditions, quantities of commodities
are often constrained in the real world. For example, the
scarcity fallacy usually makes commodities more desirable
[21], as a company may want to release limited edition com-
modities to boost customer desire. Another example is the
case of promoting a concert, where the quantity of the con-
cert tickets is constrained by the number of available seats.
In this case, due to the schedules of the musicians or singers,
it is hard to add more shows and the total number of concert
tickets. Hence, selecting seeds to receive free commodities
will reduce the quantities of commodities that can be sold.
This makes the prior works unapplicable to determine the
proper pricing and obtain maximum revenue. For example,
suppose that the network shown in Figure 1 is considered,
where the diffusion model with the monetary concept in the
work [17] is adopted and the function F (x) = x is used to
transform the effects of the social influence into the valuation
concept. Without consideration of the commodity quantity,
the maximum revenue is $28 obtained at the pricing of $7
with the seed group {d, f }. With the influence from {d, f },
a and e are the first to purchase the commodity, since both
their valuations $2 + F (5) = $7 are equal to the pricing
of $7. Then, b and c will subsequently purchase the com-
modity due to their valuations $0 + F (2 + 4 + 4) = $10
and $3 + F (3 + 2 + 1) = $9, respectively. However, if the
quantity of commodities is limited to 4, the revenue will de-
crease to $14 since two free commodities given to the seeds
d and f should be taken off first. In this case, letting the
commodity be priced at $6 and choosing only d as the seed
will be the best. Under the influence of d, a first purchases
the commodity since its valuation $2 + F (5) = $7 is larger
than the pricing of $6. Then, both b and c purchase the
commodities due to their valuations $0 + F (2 + 4) = $6 and
$3 + F (3) = $6, respectively. Finally, since a, b, and c all
pay for the commodity sold at the price of $6, the maximum
revenue is $18. Therefore, when the quantity of commodi-
ties is limited, we argue the need of new approaches for the
revenue maximization problem.
Specifically, we address the revenue maximization problem
with a quantity constraint on commodities. Given a limited
quantity of commodities and a social network with mone-
tary concept regarding to the commodity, the problem is to
determine the pricing of the commodity and identify a small
group of people, i.e., a seed group, to be the initial customers
receiving freebies to help promote the commodity at the be-
ginning, so that the total revenue is maximized.
In this
paper, we investigate this problem on the monetary-concept
incorporated LT-model [17], and propose Algorithm PRUB
(Pricing searching strategy using Revenue Upper Bound)
to derive the optimal solutions. Then, we further revise
PRUB to propose a heuristic Algorithm PRUB+IF (Pricing
searching strategy using Revenue Upper Bound with Impor-
tance Feedback) for better efficiency. Experiments on real
social networks show the good effectiveness of PRUB and
PRUB+IF, demonstrating the revenue maximization with
and without a quantity constraint differs from each other.
In summary, the contributions of this paper are:
1. We are the first to address the general case of the rev-
enue maximization problem. Note that the previous
work of the revenue maximization without a quantity
constraint is a special case of our problem with the
quantity set as the total number of individuals on the
social network.
2. For the addressed problem, we proposed the optimal
PRUB as well as a heuristic PRUB+IF.
3. Experiments on real social networks demonstrate the
effectiveness of the proposed approaches for both gen-
eral and special cases of the revenue maximization
problem. Note even in the case without a commod-
ity constraint, the proposed approach outperforms the
state of the art approach that incorporates the mone-
tary concept [17].
2. PROBLEM FORMULATION
To formulate the revenue maximization problem, in this
section, we first describe the social network with the mone-
tary concept, then explain how the social influences propa-
gate over the network using the monetary-concept incorpo-
rated LT-model [17], and finally define the revenue and the
revenue maximization problem formally.
Given a commodity, a social network with the monetary
concept, referred to as a monetizing social network, is
a weighted digraph G = (V, X, E, W, F ), where V is the set
of individuals and for each individual v ∈ V , his/her in-
herent valuation χv is carried in X. Usually, the valuation
information X can be estimated and learned from question-
naires or historical sales data, with regard to the commodity
[13]. For any individuals u, v ∈ V , if u's purchase will di-
rectly encourage v's desire for the commodity, an edge from
u to v, denoted as euv ∈ E (E standing for the edge set),
represents the existance of the influence, and wuv ∈ W rep-
resents the influence strength as the weight on euv. Adopt-
ing the Concave Graph Model in the work [17], we con-
sider a non-negative, non-decreasing, and concave function
F : R+ → R+ with F (0) = 0 to transform the weights into
the valuation concept. That is, given a set of individuals S
directly exerting influences on an individual v, v's valuation
towards a commodity will become χv + F (Pi∈S wiv).
Based on the monetary-concept incorporated LT-model
[17], the propagation of social influences over the monetiz-
ing social network happens whenever individuals adopt the
commodity. An individual adopts the commodity if and only
if 1) the pricing of the commodity is less than or equal to
his/her valuation, or 2) this individual is an initial customer
receiving a freebie. After an individual adopts the com-
modity, he/she will then exert influences on his/her out-
neighbors to encourage them and raise their valuations for
adoption. The following shows an example of social influ-
ences propagating over the monetizing social network.
Example 1. Given the monetizing social network in Fig-
ure 1 and the concave influence function F (x) = x, consider
the promotion of a concert. Suppose that the pricing of the
concert tickets is $7 and the seed group is A = {d}. Influ-
enced by d, the valuations of a, b, and f are increased by
F (5) = $5, F (4) = $4, and F (2) = $2, respectively. The val-
uations of a, b and f thus become $2+$5 = $7, $0+$4 = $4,
and $0 + $2 = $2, respectively. Then, note that as the val-
uation of a is equal to the pricing of the concert tickets $7,
a also adopts the concert ticket and exerts influences on
its out-neighbors b and c. The valuations of b and c thus
increase to $0 + F (4 + 2) = $6 and $3 + F (3) = $6, respec-
tively. After that, as no other individuals adopt the concert
ticket, the influence propagation stops. Consequently, under
d's influence, a will also adopt the concert ticket, and the
valuations of b, c and f become $6, $6, and $2, respectively.
Consider another example of the seed group A = {d, f }.
Under the influence of d and f , the valuations of a, b, c and
e are raised to $7, $4, $4, and $7, respectively. (Here d's
influence on f is neglected since f as an initial customer has
already adopted the concert ticket.) Hence, a and e adopt
the concert tickets and exert influences. Consequently, the
valuations of b and c become:
b : $0 + F (4(from d) + 2(from a) + 4(from e)) = $10
c : $3 + F (1(from f ) + 3(from a) + 2(from e)) = $9
In the end, a, b, c, and e all adopt the concert tickets since
their final valuations are larger than or equal to the pricing
of the concert tickets $7.
(cid:4)
Here we define that the revenue comes from the number
of people paying for the commodity and the pricing of the
commodity. Recall Example 1 where the pricing is $7 and
the seed group is {d, f }, and suppose that the quantity of
the concert tickets is 4. The revenue is $7 × 2 = $14, since
two concert tickets are used as free tickets given to d and f ,
and only two concert tickets are left for sale (even though a,
b, c, and e all want to purchase these concert tickets).
Formally, given the quantity of commodities n, the pricing
p of the commodity, and the seed group A, the revenue is
defined as follows.
Definition 1. Revenue function. Given the quantity n,
the revenue at the pricing of p with the seed group A is
R(n, p, A) = p × min{σ(A) \ A, n − A},
where σ(A) ⊇ A is the set of individuals adopting the com-
modity under the influences of A.
as initial customers that can bring maximum revenue. The
proposed problem is formally defined as follows.
Definition 2. The RMw/QC Problem: Revenue Max-
imization with a Quantity Constraint. Given a mon-
etizing social network G = (V, X, E, W, F ), a set of input
prices P ⊆ R+, and a quantity of commodities n, the prob-
lem is to determine the pricing pmax ∈ P of the commodity
and find a seed group Amax ⊆ V as initial customers, where
Amax ≤ n, such that the revenue R(n, p, A) is maximized,
i.e., (pmax, Amax) = argmax
R(n, p, A).
p,A
Note that the revenue function R(n, p, A) is not single-
peaked with respect to the pricing, which means the ap-
proaches such as the binary search and the gradient decent
search are not applicable to finding out the optimal pric-
ing. For example, following the setting of Example 1 and
letting the quantity of the concert tickets be 4, we obtain
the highest revenue at pricing of $6, $7, and $8 as $18, $14,
and $16, respectively (with the seed groups {d}, {d, f }, and
{d, e}, accordingly). Obviously, with respect to the pricing,
R(n, p, A) is not single-peaked.
Furthermore, the RMw/QC problem can be proved to be
NP-hard. To show this, we first introduce a special case of
RMw/QC, and then prove that this special case is NP-hard.
As the special case is NP-hard, RMw/QC is thus NP-hard.
Definition 3. SpecialRM. This problem is a special case
of RMw/QC, and asks for only one input price and a sufficient
quantity of commodities for the population. That is, given
G, P = {p}, and n = V , SpecialRM is to determine a seed
group A such that R(V , p, A) is maximized.
Theorem 1. The problem of SpecialRM is NP-hard.
Proof. We reduce the Minimum Vertex Cover (MVC)
problem to the SpecialRM problem. Given every instance
of MVC involving an undirected graph G′ = (V ′, E′), we can
construct a corresponding instance G = (V, X, E, W, F ) of
SpecialRM as follows. (1) Set V = V ′; (2) set X = {χv∀v ∈
V, χv = 0}; (3) direct all edges in both directions, i.e., for
each euv ∈ E′, euv ∈ E and evu ∈ E; (4) for each euv ∈ E,
define wuv = p
din(v) , where din(v) is the in-degree of v in G;
and (5) set F (x) = x. For the instance of SpecialRM, if
there exists a minimum set A that maximizes the revenue,
we can obtain another set A′ = A ∪ (V \ σ(A)). Then, it can
be shown that A′ is the minimum vertex cover of G′ since
σ(A′) ⊇ σ(A) ∪ σ(V \ σ(A)) ⊇ σ(A) ∪ (V \ σ(A)) = V.
Theorem 1 is thus proved.
3. ALGORITHM
To increase the revenue, finding the proper pricing p and
identifying a proper seed group A is important. Consider
the same setting mentioned above, but with an empty seed
group and the pricing set as $1. The revenue is R(4, $1, ∅) =
$1 × 4 = $4, which is less than R(4, $7, {d, f }) = $14. Since
any company will expect to earn as higher revenue as possi-
ble given a fixed amount of commodities, in this paper, we
are interested in looking for such pricing and a seed group
In this section, for the revenue maximization problem, we
first propose Algorithm PRUB (Pricing searching strategy
using Revenue Upper Bound) that is able to derive the opti-
mal solutions. Note that finding the optimal pair of pmax and
Amax in the revenue maximization problem is exhausted.
Then, for better efficiency, a heuristic Algorithm PRUB+IF
(PRUB with Importance Feedback) is introduced following
the framework of PRUB.
Table 1: (a) The maximum valuations; (b) the upper
bounds of maximum revenue.
(a)
v Xmax(v)
a
b
c
d
e
f
$8
$10
$9
$4
$7
$4
(b)
Rbound(4, p)
$4
$8
$12
$16
$20
$24
$28
$24
$18
$10
p
$1
$2
$3
$4
$5
$6
$7
$8
$9
$10
3.1 Algorithm PRUB
To tackle the RMw/QC problem, Algorithm PRUB is de-
signed to obtain the optimal solutions. As mentioned pre-
viously, finding a proper pair of pricing and seed group is
critical in this problem, since the revenue comes from the
pricing of the commodity and the number of people paying
for the commodity. A naıve approach for finding the optimal
pair of pricing pmax and seed group Amax is to search at all
p ∈ P , enumerate all seed groups A, and calculate the cor-
responding revenue R(n, p, A). The rationale of Algorithm
PRUB is based on this naıve approach and prunes the search
space by 1) progressively filtering out non-candidate pricing
and 2) deriving an upper bound of the size of seed groups
for each price. We illustrate the two ideas of pruning in the
following.
Non-candidate Pricing Filtering. The first idea is to
prune the searching on non-candidate pricing. Motivated by
the concern of only maximum revenue, this pruning derives
an upper bound of maximum revenue at each price, and
utilizes an achievable global revenue rglobal that records the
maximum revenue discovered so far to progressively filter
out the pricing that will not result in higher revenue. That
is, if an upper bound of maximum revenue at each price
can be derived, PRUB then does not need to seek the seed
group for maximum revenue at a specific price when the
upper bound at this price is less than or equal to rglobal.
When rglobal is updated and increased progressively after the
successful searching of the seed group at each price, the non-
candidate pricing is also progressively detected and filtered
out.
In order to infer the upper bound of maximum revenue
at a specific price, the maximum number of individuals who
have potential for adopting the commodity at this price is
needed. To find out whether or not an individual has this po-
tential, it needs to estimate the valuation of the individual.
Therefore, in the following, we first introduce the definitions
of maximum valuations and potential buyers for defining the
upper bound of maximum revenue.
Definition 4. Maximum valuation. The maximum val-
uation of an individual v is the valuation under the influences
from all v's in-neighbors, which is denoted as
Xmax(v) = χv + F ( X
u∈v's in-neighbors
wuv).
Definition 5. Potential buyer. An individual v is re-
garded as a potential buyer at a specific price p if v has po-
tential for adopting the commodity at p, i.e., Xmax(v) ≥ p.
Definition 6. Upper bound of maximum revenue.
Given a quantity constraint n, the upper bound of maxi-
mum revenue at a price p is
Rbound(n, p) = p × min{n, mp},
(1)
where mp is the number of potential buyers at p, i.e., mp =
{vv ∈ V, Xmax(v) ≥ p}.
Example 2. Given the monetizing social network in Fig-
ure 1, the concave influence function F (x) = x, and a set
of input prices P = {pp ∈ I+, 1 ≤ p ≤ 10}, consider the
promotion of a concert. Table 1(a) shows the maximum val-
uation of each individual. Suppose the quantity of the con-
cert tickets is set as 4. The corresponding upper bounds of
maximum revenue for all prices are listed in Table 1(b). (cid:4)
In addition, to have better effectiveness of pruning by uti-
lizing the upper bound of maximum revenue, PRUB searches
the prices in a descending order of the upper bounds. Then,
once PRUB discovers a price, at which the upper bound is
less than or equal to the achievable global revenue rglobal,
the searching for the following prices (including the current
price) can be ignored. Therefore, in the above example,
PRUB will start the examination of the prices from p = $7,
p = $6, p = $8, · · · , and so on.
Bound of Seed Group's Size. The second idea for
pruning search space is to avoid enumerating useless seed
groups under a specific price. The inspiration is, under
the consideration of a specific price p, it involves more than
rglobal
quantities of commodities to be sold for finding the
revenue higher than the achievable global revenue rglobal
obtained so far. When considering the price p, Algorithm
PRUB then bounds the size of the seed groups as
p
A < n −
rglobal
p
,
(2)
since the quantity of commodities is limited. Follow Exam-
ple 2, and suppose the achievable global revenue rglobal =
$10.
In order to find the revenue higher than $10, when
searching at the price p = $7, PRUB expects more than 10
7
concert tickets left for sale and enumerates only the seed
groups of sizes less than or equal to 2 (since the quantity of
the concert tickets is set as 4). The searching on the seed
groups of sizes 3 and 4 is thus pruned.
Note that incorporating the two pruning methods is sat-
isfactory to the accuracy. Therefore, Algorithm PRUB is
still able to derive the optimal solutions, even though the
search space is reduced. The details of PRUB are presented
in Algorithm 1.
In the following, we show an example to
illustrate how PRUB figures out the optimal pair of pmax
and Amax.
Example 3. Follow Example 2, and initialize pmax, Amax,
and rglobal as $0, an empty set, and $0, respectively. Accord-
ing to the upper bounds of maximum revenue in Table 1(b),
PRUB will consider the prices in the following order: p = $7,
p = $6, p = $8, · · · , and so on.
Beginning from the price $7, PRUB checks whether or not
Rbound(4, $7) > rglobal. Since $28 > $0, PRUB looks for the
maximum revenue at the price $7 by enumerating all the
seed groups whose size is bounded by Equation (2) (includ-
ing the size 0). First, for the empty seed group, no individ-
ual adopts the concert ticket at $7. So PRUB goes to the
size 1. Then, PRUB lists all the seed groups of size 1 since
Algorithm 1: PRUB
Input: A monetizing social network G = (V, X, E, W, F ); a
set of input prices P ; a quantity of commodities n.
Output: The pricing pmax; the seed group Amax.
1 pmax ← 0, Amax ← ∅, rglobal ← 0
2 Derive Rbound(n, p) for all p ∈ P
3 Sort all p ∈ P descendingly by Rbound(n, p)
4 for p ∈ P do
5
6
7
8
9
10
if p is non-candidate pricing then
return pmax, Amax
Enumerate all the seed groups whose size is bounded by
Equation (2) (including the size 0)
Compute R(n, p, A) for those enumerated seed groups
if any R(n, p, A) > rglobal then
pmax = p, Amax = A, rglobal = R(n, p, A)
11 return pmax, Amax
1 < 4 − 0
7 = 4. Among all the seed groups of size 1, PRUB
finds the highest revenue R(4, $7, {d}) = $7 (referred to Ex-
ample 1). As $7 is higher than rglobal = $0, PRUB updates
pmax = $7, Amax = {d}, and rglobal = $7. Before seeking the
seed groups of size 2 for maximum revenue, PRUB ensures
2 < 4 − 7
7 = 3. After all seed groups of size 2 are enu-
merated, the highest revenue R(4, $7, {d, f }) = $14 is found
(referred to Example 1). Because $14 > rglobal = $7, PRUB
updates pmax = $7, Amax = {d, f }, and rglobal = $14. Later,
note that 3 > 4 − 14
7 = 2. The searching for the maximum
revenue at the price $7 stops. The next price considered is
$6. A similar process is performed until PRUB finds such a
price p that rglobal ≥ Rbound(4, p). In the end, the maximum
revenue is R(4, $6, {d}) = $18, where the pair of pmax = $6
and Amax = {d} is the optimal solution.
(cid:4)
Theorem 2. The time complexity of PRUB is O(2V V 2P ).
group is n. In total, there are thus
Proof. We first show that PRUB costs O(2V V 2) time
at a specific price for searching the maximum revenue. Given
the quantity of commodities n, the largest size of the seed
i (cid:1) seed groups. For
a seed group of size i, there are i seeds exerting influences on
the other O(V − i) individuals that are not seeds. Due to
the influence cascade, it costs O((V −i)2) time to figure out
the influence spread of a seed group of size i. Therefore, the
total time complexity for searching the maximum revenue
by enumerating seed groups is
Pi=0(cid:0)V
n
O(
n
n
n
= O(
= O(
Pi=0(cid:0)V
Pi=0
Pi=0
= O(V 2
i (cid:1)(V − i)2)
(V −i)!i! (V − i)2)
V 2(V −1)!
(V −i−1)!i! − V (V −1)(V −2)!
(V −i−1)!(i−1)! )
Pi=0(cid:0)V −2
Pi=0(cid:0)V −1
i−1 (cid:1) + V
= O(2V −1V 2 − 2V −2V 2 + 2V −2V )
= O(2V V 2).
(cid:1) − V 2
n
n
V !
i
n
Pi=0(cid:0)V −2
i−1 (cid:1))
As searching at a price costs O(2V V 2), the total time
complexity of PRUB is thus O(2V V 2P ). Theorem 2 is
proved.
Note that the high complexity of Algorithm PRUB indi-
cates the poor scalability of the optimal algorithm for real
social networks which are usually large. Therefore, in the
following subsection, we propose a heuristic based on the
framework of PRUB to obtain the feasible solutions on larger
instances.
3.2 Algorithm PRUB+IF
In this section, the heuristic algorithm PRUB+IF (PRUB
with Importance Feedback) is proposed as a feasible solu-
tion. The heuristic PRUB+IF differs from PRUB at the
way of finding the most proper seed group at each price. Fol-
lowing the framework of PRUB, PRUB+IF introduces the
concept of pricing-sensitive importance, accompanying the
contribution feedback from the out-neighbors, for selecting
seeds in a heuristic manner, instead of listing all seed groups.
The main idea of PRUB+IF is that, an individual with
greater potential for making others adopt the commodity
should be regarded as more important. Selecting the most
important individuals as seeds greedily is able to lead to a
feasible solution. Then, the question is how to evaluate one's
potential for making others adopt the commodity. The intu-
ition is about how many others will be encouraged and how
much their valuations can be increased for approaching the
pricing, under one's influence. We then accumulate these
effects to calculate one's importance. Here only the effects
on potential buyers should be included in the accumulation
since only the potential buyers have possibilities of paying
for the commodity. In addition, note that the individuals
who newly adopt the commodity under one's (direct and
indirect) influence will further spread their influences to en-
courage more others in adoption. In order to estimate one's
importance more carefully, the effects through influence cas-
cades should also be included in the accumulation. There-
fore, PRUB+IF introduces the pricing-sensitive importance
that sums up the consideration of the normalized weights,
the influence propagation, and the potential buyers in the
measurement of one's advantage in the commodity promo-
tion at the given pricing. Then, the strategy is to select
seeds in accordance with the pricing-sensitive importance.
In the following, we introduce the three key points, Nor-
malized Weight, Feedback of Influence Propagation, and
Potential-Buyer Filtering, in measuring the pricing-sensitive
importance. Briefly, for each individual u, 1) the Normalized
Weight is used to evaluate u's importance according to u's
direct effect on another individual v's adoption; 2) the Feed-
back of Influence Propagation is incorporated to evaluate u's
importance towards v by considering also the indirect effects
through influence cascades; 3) the Potential-Buyer Filtering
is considered to derive u's pricing-sensitive importance from
accumulating all u's direct and indirect effects on all the
other potential buyers.
1. Normalized Weight.
By intuition, for commodity promotion, an individ-
ual u's importance towards another individual v can
be evaluated from how much v's valuation approaches
the pricing due to u's effect. Inspired by this intuition,
PRUB+IF calculates the normalized weight wuv, indi-
cating u's importance towards v's adoption, as follows.
wuv =
0,
min{1,
F (wuv + P
wiv )−F ( P
wiv )
i∈σ(A)
i∈σ(A)
p−XA(v)
if p ≤ XA(v)
,
},
otherwise
(3)
wiv) is v's valuation of
where XA(v) = χv + F ( Pi∈σ(A)
the commodity under the current seed group A's ef-
fects. In the case of p ≤ XA(v), it means v has adopted
the commodity. So the normalized weight wuv = 0, in-
dicating that u's importance towards v is none due to
no impact from u on v's adoption of the commodity.
For the other case, the normalized weight from u to v
is bounded by 1, and is the portion of u's impact on
v's adoption of the commodity.
Example 4. Given the monetizing social network in
Figure 1 and the concave influence function F (x) = x,
consider the promotion of a concert. Given p = $7
and A = {}, no one has adopted the concert tickets.
Under this condition, X{}(a) = $2 is less than the
pricing of $7, and the normalized weight from d to a is
wda = min{1, $5−$0
$7−$2 } = 1. This means that selecting d
into the seed group {} can make a adopt the concert
ticket immediately. Similarly,
wdb = 4
7 ,
wdc = 0,
wde = 0,
wdf = 2
7 . (cid:4)
2. Feedback of Influence Propagation.
Note that the effect of influence propagation is impor-
tant in the commodity promotion. To carefully es-
timate one's advantage in the promotion, PRUB+IF
further takes the importance feedback from those indi-
viduals i into account on u's importance, if i adopts the
commodity due to u's direct or indirect effect and thus
devotes to the propagation of u's effect. Therefore, u's
importance towards v will be derived recursively as
follows.
IF (k+1)(u, v) =
0,
(k)
u
u
wiv},
if u 6= v
, (4)
otherwise
min{1, IF (k)(u, v) + Pi∈V
where IF (0)(u, v) = wuv and V (k)
contains the indi-
viduals who newly adopt the commodity by u's effects
at kth propagation, i.e., V (k)
u = {ii ∈ V, IF (k)(u, i) =
1 ∧ ∀k′ < k, IF (k′)(u, i) < 1}. As the influence prop-
agates, there are multiple updates for u's importance
towards v. When the propagation stops, i.e., V (k)
u =
∅, the final importance of u towards v is denoted as
IF (u, v). In other words, Equation (4) evaluates the
advantage of selecting u into the current seed group
from the aspect of v's adoption, by considering the
direct effect IF (0)(u, v) = wuv derived by Equation
(3) and the indirect effects Pk Pi∈V
wiv propagated
(k)
u
through individuals i.
In addition, Equation (4) en-
sures that the importance of u towards v is bounded
by 1, even though there may be many direct and indi-
rect impacts from u to v.
Example 5. Follow Example 4 and consider the indi-
vidual d. Initially, V (0)
d = {a}, because IF (0)(d, a) =
wda = 1. IF (1)(d, ·) for all individuals (excluding d
itself) are thus calculated as follows.
Algorithm 2: PRUB+IF
Input: A monetizing social network G = (V, X, E, W, F ); a
set of input prices P ; a quantity of commodities n.
Output: The pricing pmax; the seed group Amax.
1 pmax ← 0, Amax ← ∅, rglobal ← 0
2 Derive Rbound(n, p) for all p ∈ P
3 Sort all p ∈ P descendingly by Rbound(n, p)
4 for p ∈ P do
5
6
7
8
9
10
11
12
13
14
15
16
17
18
if p is non-candidate pricing then
return pmax, Amax
A ← ∅
Compute R(n, p, A)
if R(n, p, A) > rglobal then
pmax = p, Amax = A, rglobal = R(n, p, A)
while A < n − rglobal
p
do
for u ∈ V has not adopted the commodity do
Compute Ψ(u) according to Equation (5)
s ← the individual with the greatest Ψ(·)
A ← A ∪ {s}
Compute R(n, p, A)
if r > rglobal then
pmax = p, Amax = A, rglobal = R(n, p, A)
19 return pmax, Amax
IF (1)(d, a) = min{1, 1 + waa} = 1
IF (1)(d, b) = min{1, 4
7 + wab} = 6
7
IF (1)(d, c) = min{1, 0 + wac} = 3
4
IF (1)(d, e) = min{1, 0 + wae} = 0
IF (1)(d, f ) = min{1, 2
7 + waf } = 2
7
Since no other individuals newly adopt the concert
ticket, i.e., V (1)
d = ∅, the propagation stops. Finally,
IF (d, ·) = IF (1)(d, ·) are as above.
(cid:4)
3. Potential-Buyer Filtering.
Once the advantage of selecting an individual as a seed
can be estimated from the aspect of another's adop-
tion, intuitively, the importance of an individual can
be derived by summing up his/her importance towards
all the others. However, counting one's importance
towards all the others may be misleading, since the
advantage estimated from those who will never adopt
the commodity at this price is also counted. To avoid
overestimating the importance of an individual in the
promotion, PRUB+IF thus incorporates the concept of
potential buyers into the pricing-sensitive importance
which is formally defined below.
Ψ(u) = X
i∈Vpotential
IF (u, i)
(5)
where Vpotential is the set of potential buyers at this
price, i.e., the individuals whose maximum valuation
is larger than or equal to the price (the same as intro-
duced in Section 3.1). As a result, only if an individual
is a potential buyer who has potential for adopting the
commodity at the price, the increase of his/her valua-
tion will be regarded as important.
Example 6. Follow Example 5. Since the potential
buyers at the pricing of $7 are a, b, c, and e (referred
to Table 1(a)), the pricing-sensitive importance of d is
Ψ(d) = 1 + 6
(cid:4)
4 + 0 = 73
28 .
7 + 3
The algorithm of PRUB+IF is presented in Algorithm 2.
PRUB+IF uses the framework of PRUB as a base, and dif-
fers from PRUB at the strategy for seed selection (Algo-
rithm 2 Lines 12-15). In the following, we go through the de-
tails of PRUB+IF. Similarly to PRUB, PRUB+IF initializes
pmax, Amax, and rglobal, compute the upper bounds of max-
imum revenue for all prices, and then considers the prices
one-by-one in a descending order of the upper bounds of
maximum revenue (Lines 1-3). At a specific price p, PRUB
enumerates all seed groups while PRUB+IF iteratively picks
up a seed until the size of the seed group A reaches the
bound in Equation (2) (Line 11). Specifically, when con-
sidering a price p, PRUB+IF first checks whether or not p
is non-candidate pricing that has no chance to yield higher
revenue than the achievable global revenue rglobal (Line 5).
If p passes the pruning, PRUB+IF first calculates the rev-
enue regarding to the empty seed group (Lines 7-8). Af-
ter that, PRUB+IF expands the seed group by one seed at
a time according to the pricing-sensitive importance Ψ(·)
in Equation (5) (Line 13). Each time the individual who
has not yet adopted the commodity and has the greatest
pricing-sensitive importance will be selected into the cur-
rent seed group (Lines 12-15). In the case of the newly ob-
tained revenue higher than rglobal, PRUB+IF updates pmax,
Amax, and rglobal similarly to PRUB (Lines 17-18). Once
the size of the seed group reaches the bound in Equation
(2) (Line 11), PRUB+IF considers the next price. After all
prices are examined, pmax and Amax are returned as the so-
lution. The following example demonstrates the searching
process of PRUB+IF.
Example 7. Follow Example 2, and initialize pmax, Amax,
and rglobal as $0, an empty set, and $0, respectively. Accord-
ing to the upper bounds of maximum revenue in Table 1(b),
the first price considered is $7. Since Rbound(4, $7) = $28 >
rglobal = $0, PRUB+IF tries to seek for higher revenue at
the price $7. First, for A = {}, there is no revenue since the
inherent valuations of all individuals are less than $7. After
that, for selecting the first seed, PRUB+IF computes the
pricing-sensitive importance of all individuals in a similar
way as shown in Example 6:
Ψ(a) = 29
Ψ(d) = 73
28 , Ψ(b) = 1
28 , Ψ(e) = 15
5 , Ψ(c) = 0,
14 , Ψ(f ) = 65
28 .
Hence, the first seed selected is d and the corresponding
revenue will be R(4, $7, {d}) = $7 (referred to Example 1).
As $7 > rglobal = $0, PRUB+IF performs the updates of
pmax = $7, Amax = {d}, and rglobal = $7. Until now,
the process for the first seed finishes, and PRUB+IF checks
whether or not to continue selecting the second seed. Since
A = {d} = 1 < n − rglobal
7 = 3, the pricing-
sensitive importance of all individuals, except the individ-
uals who have adopted the concert tickets, i.e., a and d, is
calculated with respect to the current seed group A = {d}:
= 4 − 7
p
Ψ(b) = 0, Ψ(c) = 0, Ψ(e) = 2, Ψ(f ) = 3.
Accordingly, f will be selected as the second seed and the
revenue is R(4, $7, {d, f }) = $14 (referred to Example 1),
which leads to the updates of pmax = $7, Amax = {d, f },
and rglobal = $14. Until now, the process for the second seed
finishes, and PRUB+IF checks whether or not to continue
selecting the third seed. However, A = 2 reaches the bound
n − rglobal
7 = 2 so that the searching at the price
$7 stops.
p = 4 − 14
The searching at the remaining prices p = $6, p = $8, · · · ,
and so on, is performed in the same manner as that at the
price $7. In the end, PRUB+IF will report the pricing of $6
and the seed group {d} as the answer.
(cid:4)
Theorem 3. The time complexity of PRUB+IF is O(nV 3P ).
Proof. We first show that PRUB+IF costs O(nV 3)
time at a specific price for searching the maximum revenue.
Given the quantity of commodities n, the largest size of the
seed group is n. When i seeds have been selected, it takes
O((V − i)2) time to compute the pricing-sensitive impor-
tance for each of the other O(V − i) nodes. Therefore, the
total time complexity for searching the maximum revenue is
O(
n−1
X
i=1
(V − i)3) = O(nV 3).
As searching at a price costs O(nV 3), the total time com-
plexity of PRUB+IF is thus O(nV 3P ). Theorem 3 is
proved.
4. EXPERIMENTS
In this section, we first provide the evidence that the rev-
enue maximization problem with a quantity constraint dif-
fers from that without a quantity constraint. Besides, we
also show the approximation performance of PRUB+IF to
PRUB. In order to demonstrate the effectiveness of PRUB+IF,
we further conduct experiments on larger real social net-
works and compare PRUB+IF with other heuristics. All
the programs are implemented in Java with version 1.6.0 27.
The experiments are performed on a quad-core Intelr Xeonr
X5450 3.00GHz PC with 8GB RAM using Ubuntu 8.04.2.
Datasets. We use three real social networks as follows.
1) The dataset highschool (sampled from the dataset [6] due
to poor scalability of PRUB and the compared approach) is
a friendship network for the boys in a small highschool in
Illinois.1 The nodes are boys in the highschool, and each
directed edge represents a boy choosing another as a friend
in questionnaires. 2) The dataset digg [4] is a reply network
of Digg.2 Each node is a user in Digg and each directed edge
stands for a user replying to another. 3) The dataset face-
book [22] is the communication network of Facebook.3 The
nodes are the users in Facebook while each directed edge rep-
resents that a user posts an article on another user's wall.
For these datasets, the self-loops and isolated nodes are re-
moved, and the edge weights are derived from the number of
choices, replies, and articles of one to another, respectively.
Both the degree distributions and weight distributions of
all the datasets follow the well-known power law [5]. More
details are shown in the left five columns of Table 2.
Valuation Distributions. Note that there is lack of
valuation information in these publicly available datasets.
A naıve way is to learn the valuation information through
questionnaires or historical sales data toward a specific com-
modity. However, note that the valuation distributions vary
with commodities. In this paper, we then explore the per-
formance under different valuation distributions as follows.
1http://moreno.ss.uci.edu/data.html#high
2http://www.public.asu.edu/~mdechoud/datasets.html
(The reply system has been out of service since 2012, but
the data were collected in 2008.)
3http://socialnetworks.mpi-sws.org/data-wosn2009.html
#nodes #edges Avg. degree Avg. weight Avg. clustering coeff.
Table 2: Summaries of real datasets and the parameters of each valuation distribution.
M-shape
σ2
1.78
0.44
0.44
Normal
σ2
µ
10
8.16
2.04
5
5
2.04
140
85,155
183,412
50
30,360
45,813
0.4754
0.0053
0.1106
µ
4
2
2
µ
16
8
8
σ2
1.78
0.44
0.44
Dataset
highschool
digg
facebook
5.60
5.61
8.01
37.29
6.07
4.66
)
s
r
a
l
l
o
d
d
e
r
d
n
u
h
(
e
u
n
e
v
e
r
.
x
a
M
30
20
10
0
RandomizedUSM
RandomizedUSM(p)
PRUB+IF
PRUB
0.05 0.1 0.15 0.2 0.25 0.3 1
n
V
)
s
r
a
l
l
o
d
d
e
r
d
n
u
h
(
e
u
n
e
v
e
r
.
x
a
M
30
20
10
0
RandomizedUSM
RandomizedUSM(p)
PRUB+IF
PRUB
0.05 0.1 0.15 0.2 0.25 0.3 1
n
V
(a) highschool (N)
(b) highschool (M)
Figure 2: The comparison for maximum revenue.
• Normal distribution (N): Most people have similar val-
uations and a few people have extremely higher or
lower valuations toward a commodity.
• M-shape distribution (M) [18]: People do not have con-
sensus on the value of a commodity. One group of
people have higher valuations and the other group of
people have lower valuations toward the commodity.
In our experiments, we implement the M-shape distribution
using two Normal distributions, where the valuation of each
individual follows one of the Normal distributions with equal
probabilities. The parameters for generating the valuations
are listed in the right three columns of Table 2.
Concave influence function. As introduced in Sec-
tion 2, any non-negative, non-decreasing, and concave func-
tion can be applied to the concave influence function. In our
experiments, we consider the function F (x) = x to transform
the weights into the valuation concept for simplicity.
Input prices. By considering different currencies, costs,
and cultures in different countries, the pricing of a commod-
ity may be different. For simplicity, we set the prices as
input parameters in the experiments. For highschool, the
input prices are all integers (as the unit of the dollars) in
[1, 300], due to the smaller size of the network. For digg and
facebook, the input prices are all integers in [1, 2000].
4.1 Consideration of Quantity Constraints
In this subsection, we first show that the consideration
of a quantity constraint in the revenue maximization prob-
lem makes it differ from the original problem by comparing
PRUB with the previous work [17], referred to as Random-
izedUSM in this paper. Due to poor scalability of PRUB
and RandomizedUSM, these experiments are conducted on
the small dataset highschool with Normal and M-shape val-
uation distributions. In addition, note that since Random-
izedUSM does not consider a quantity constraint, we derive
the revenue with two kinds of post-processes as follows.
• RandomizedUSM: Given the solution pair of p and A
RandomizedUSM reports, this post-process considers
the quantity constraint n by calculating the quanti-
ties left for sale and computing the revenue as p ×
min{σ(A) \ A, n − A}, where σ(A) ⊇ A is the set of
individuals adopting the commodity under A's effects.
• RandomizedUSM(p): This post-process considers the
quantity constraint n at each price and then returns
the highest revenue among all prices. For each price p
and the corresponding seed group Ap obtained by Ran-
domizedUSM, the revenue is p × min{σ(Ap) \ Ap, n −
Ap}, where σ(Ap) ⊇ Ap is the set of individuals
adopting the commodity under Ap's effects.
n
Figure 2 shows the maximum revenue reported by Ran-
domizedUSM, RandomizedUSM(p), PRUB+IF and PRUB
with respect to different ratios of the quantity of commodi-
ties to the number of population, i.e.,
V . Accordingly,
the revenue reported by RandomizedUSM and Randomize-
dUSM(p) is, on average, less than 70% of that obtained by
PRUB. Moreover, note that RandomizedUSM has the poor-
est performance and even brings zero revenue at the cases
of the supply ratio below 0.2. These results demonstrate
that the capability of the previous approach [17] (even with
the post-processes) is limited for the RMw/QC problem. On
the other hand, even for the special case that the quantity is
not constrained, i.e., the ratio of the quantity of commodities
to the number of population n
V = 1, PRUB+IF still out-
performs RandomizedUSM and RandomizedUSM(p). This
is because PRUB+IF selects seeds in order of the pricing-
sensitive importance while RandomizedUSM and Random-
izedUSM(p) consider the seeds in arbitrary order.
On the same datasets, we then also explore the approxi-
mation of PRUB+IF to PRUB (which derives the optimal
solutions). According to the results in Figure 2, the per-
formance of PRUB+IF is very close to that of PRUB, i.e.,
about 96% on average, and outperforms both Randomize-
dUSM and RandomizedUSM(p). This implies that the pro-
posed pricing-sensitive improtance of PRUB+IF is highly
effective to identity the crucial individuals as seeds.
4.2 Performance of the PRUB+IF heuristic
In this subsection, we conduct experiments on larger datasets
digg and facebook to further show the performance of Algo-
rithm PRUB+IF in terms of effectiveness, pricing, and effi-
ciency. Here PRUB+IF is compared with two other heuris-
tics PRUB+R and PRUB+SW. These two heuristics also
take the PRUB approach as the framework while applying
different strategies for seed selection. Specifically, PRUB+R
(R standing for Random) selects seeds randomly; PRUB+SW
(SW meaning Sum of the Weights) always picks up the in-
dividual with the maximum sum of out-weights from those
who have not yet adopted the commodity. Besides, in order
to demonstrate the advantage of each part of PRUB+IF, the
heuristics PRUB+N, PRUB+F, and PRUB+P represent the
approaches that incorporate Normalized Weight, Feedback
of Influence Propagation, and Potential-buyer Filtering, re-
spectively, for seed selection.
Effectiveness. Here we use the maximum revenue ob-
tained without consideration of social influences (NoSocial),
i.e., the adoption of an individual only depends on his/her in-
e
u
n
e
v
e
r
.
x
a
M
)
l
a
i
c
o
S
o
N
o
t
o
i
t
a
r
e
h
t
(
4
3
2
1
e
u
n
e
v
e
r
.
x
a
M
)
l
a
i
c
o
S
o
N
o
t
o
i
t
a
r
e
h
t
(
4
3
2
1
PRUB+IF
PRUB+SW
PRUB+R
e
u
n
e
v
e
r
.
x
a
M
)
l
a
i
c
o
S
o
N
o
t
o
i
t
a
r
e
h
t
(
4
3
2
1
PRUB+IF
PRUB+SW
PRUB+R
e
u
n
e
v
e
r
.
x
a
M
8
6
4
2
)
l
a
i
c
o
S
o
N
o
t
o
i
t
a
r
e
h
t
(
PRUB+IF
PRUB+SW
PRUB+R
e
u
n
e
v
e
r
.
x
a
M
8
6
4
2
)
l
a
i
c
o
S
o
N
o
t
o
i
t
a
r
e
h
t
(
PRUB+IF
PRUB+SW
PRUB+R
0.05 0.1 0.15 0.2 0.25 0.3
0.05 0.1 0.15 0.2 0.25 0.3
0.05 0.1 0.15 0.2 0.25 0.3
0.05 0.1 0.15 0.2 0.25 0.3
n
V
(a) digg(N)
n
V
n
V
(b) digg(M)
(c) facebook (N)
Figure 3: The effectiveness comparison.
n
V
(d) facebook (M)
PRUB+IF
PRUB+N
PRUB+F
PRUB+P
e
u
n
e
v
e
r
.
x
a
M
)
l
a
i
c
o
S
o
N
o
t
o
i
t
a
r
e
h
t
(
4
3
2
1
PRUB+IF
PRUB+N
PRUB+F
PRUB+P
e
u
n
e
v
e
r
.
x
a
M
8
6
4
2
)
l
a
i
c
o
S
o
N
o
t
o
i
t
a
r
e
h
t
(
PRUB+IF
PRUB+N
PRUB+F
PRUB+P
e
u
n
e
v
e
r
.
x
a
M
8
6
4
2
)
l
a
i
c
o
S
o
N
o
t
o
i
t
a
r
e
h
t
(
PRUB+IF
PRUB+N
PRUB+F
PRUB+P
0.05 0.1 0.15 0.2 0.25 0.3
0.05 0.1 0.15 0.2 0.25 0.3
0.05 0.1 0.15 0.2 0.25 0.3
0.05 0.1 0.15 0.2 0.25 0.3
n
V
(a) digg(N)
n
V
n
V
n
V
(b) digg(M)
(c) facebook (N)
(d) facebook (M)
Figure 4: The advantage of each part of PRUB+IF.
herent valuation, as the baseline, and show the effectiveness
of the heuristics in ratios to the baseline. Figure 3 reports
the effectiveness with respect to different ratios of the quan-
tity of commodities to the number of population, i.e., n
V .
For these results, we have two observations as follows. First,
on digg and facebook with both Normal and M-shape valu-
ation distributions, PRUB+IF is the best, and PRUB+SW
outperforms PRUB+R only in the cases of small n
V . The
reason is that, to estimate the advantage of selecting an indi-
vidual in the promotion, PRUB+IF introduces the pricing-
sensitive importance, which considers the normalized effects
of the influence propagated through the social network, while
PRUB+SW only takes the sum of weights on one's direct
out-neighbors. RRUB+R picks the seeds blindly. Second, as
n
V decreases, the performance of PRUB+IF becomes even
more noticeable (compared to PRUB+SW and PRUB+R).
This is because the number of potential buyers reduces when
the pricing of the commodity increases due to scarcity. The
less the number of potential buyers is, the more challenging
the seed selection is. Hence, the results demonstrate that
the strategy of PRUB+IF for the seed selection outperforms
those of PRUB+SW and PRUB+R.
In order to demonstrate the advantage of each part of
PRUB+IF, Figure 4 shows the effectiveness of PRUB+IF,
PRUB+N, PRUB+F, and PRUB+P with respect to dif-
ferent ratios of the quantity of commodities to the num-
ber of population, i.e., n
V . Accordingly, the three parts of
PRUB+IF are more or less all equally important.
Pricing. In addition to the demonstration of effectiveness
by maximum revenue, whether or not the suggested pricing
complies with the common sense is also an interesting ques-
tion. For answering this question, we plotted the trend of the
pricing suggested by PRUB+IF, PRUB+SW, PRUB+R,
and NoSocial with respect to different ratios of the quan-
tity of commodities to the number of population, i.e., n
V ,
in Figure 5. Accordingly, PRUB+IF suggests higher pric-
ing in most cases than the other approaches to gain higher
maximum revenue (as shown in Figure 3) in all cases. This
implies that PRUB+IF performs the most elegant strategy
for seed selection. The smart utilization of word-of-mouth
effects can help the promotion of commodities in higher pric-
ing, which complies with the common sense. Furthermore,
for all methods, there is a upward trend in the pricing as
n
V decreases. The less the quantity is, the more precious
the commodity could be, which also complies with the com-
mon sense. There are some exceptions to this pricing trend:
PRUB+IF at 0.25 on digg(M), and both PRUB+SW and
PRUB+R at 0.25 or 0.3 on facebook (N). The reason is that a
quantity of supply is used as freebies. This may allow higher
pricing in some cases by leaving less quantities for sale. The
tiny example in Figure 6 explains such a case in more de-
tails. (F (x) = x is used as the concave influence function.)
For the case of the quantity of the concert tickets as 2, the
maximum revenue is R(2, $3, ∅) = $6 (i.e., b and c adopt
the concert tickets). Now consider that the quantity of the
concert tickets is increased to 3. The maximum revenue is
R(3, $7, {a, c}) = $7 (i.e., b adopts the concert ticket under
the impact of a and c). The pricing is higher even though
the quantity increases. This is because 2 out of 3 concert
tickets are used as free tickets and only 1 concert ticket is
left for sale. Hence, according to these results, PRUB+IF is
capable of suggesting elegant marketing strategies.
Efficiency. Now we compare the efficiency of the three
heuristics. Figure 7 shows the runtime with respect to dif-
ferent ratios of the quantity of commodities to the number of
population, i.e., n
V , on digg(N), digg(M), facebook (N), and
facebook (M). PRUB+IF spends more execution time than
PRUB+SW and PRUB+R in all cases, since PRUB+IF con-
siders the influence propagation in the derivation of pricing-
sensitive importance for seed selection. PRUB+R generally
100
g
n
i
c
i
r
P
50
0
PRUB+IF
PRUB+SW
PRUB+R
NoSocial
0.05 0.1 0.15 0.2 0.25 0.3
n
V
(a) digg(N)
PRUB+IF
PRUB+SW
PRUB+R
NoSocial
0.05 0.1 0.15 0.2 0.25 0.3
100
g
n
i
c
i
r
P
50
0
100
g
n
i
c
i
r
P
50
0
PRUB+IF
PRUB+SW
PRUB+R
NoSocial
0.05 0.1 0.15 0.2 0.25 0.3
100
g
n
i
c
i
r
P
50
0
PRUB+IF
PRUB+SW
PRUB+R
NoSocial
0.05 0.1 0.15 0.2 0.25 0.3
n
V
n
V
n
V
(b) digg(M)
(c) facebook (N)
(d) facebook (M)
Figure 5: The pricing comparison.
a($1)
2
b($3)
c($3)
2
Figure 6: An example for the exception to the pric-
ing trend.
spends a little bit more time than PRUB+SW due to the
blind seed selection (that makes PRUB+R need to search
more prices for finding maximum revenue). Nevertheless,
the runtime of all the three heuristics is not sensitive to n
V .
For PRUB+IF, other factors such as the local structure of
potential buyers and the influence cascades will also affect
the runtime.
5. RELATED WORKS
Influence Maximization. The influence maximization
problem aims at identifying a group of seeds so that the num-
ber of the active people is the largest [3, 7, 15, 19]. To the
best of our knowledge, the first study could be traced to the
work [7], where Domingos et al. studied the influence maxi-
mization problem as an algorithmic problem. Then, Kempe
et al. [15] formally modeled the problem as a discrete op-
timization, which is to identify k seeds for maximizing the
influence spread over the social network. Meanwhile, Kempe
et al. also showed that the influence maximization problem
is NP-hard under both the Linear Threshold (LT) and the
Independent Cascade (IC) models, and proposed a greedy
strategy with approximation guarantees. Specifically, in the
LT model, the influences on an individual are cumulative,
and each individual has his/her own activation threshold.
An individual becomes active if the sum of weights from
his/her active neighbors is larger than or equal to his/her
activation threshold. Then, this active individual will also
propagate influences to his/her inactive neighbors.
In the
IC model, each influence an individual receives is indepen-
dent. For each influence, there is one and only one chance to
activate the individual with a probability. If the individual
becomes active, he/she futher spreads his/her influence in
the same mannar. In the work [3], Chen et al. showed that,
given seeds, computing the influence spread under the LT
model is #P-hard, and provided a scalable heuristic based
on the fast computation for directed acyclic graphs (DAGs).
Singer [19] concerned the inherent costs of making individ-
uals as seeds and followed the incentive compatible mecha-
nism to extract the true information about individuals' costs
for identifying and rewarding the seeds. As mentioned in
Section 1, all these influence maximization problems do not
take the monetary effects on people's purchase decisions into
account, and thus differ from our problem.
Revenue Maximization. The problem of revenue max-
imization is to derive the marketing strategy that brings
the optimal revenue under the social influence, and was first
addressed by Hartline et al. [11]. As a solution, Hartline et
al. [11] proposed a marketing strategy, named influence-and-
exploit (IE), to tackle the problem in two steps. In the influ-
ence step, IE identifies a group of customers as seeds. After
that, in the exploit step, IE visits the remaining customers in
a random order and offers each of them the optimal (myopic)
pricing of the product in order to maximize the revenue. The
decision whether or not an individual purchases the product
depends on the pricing offered and the individual's valua-
tion, which takes the social influences into consideration.
Hartline et al. [11] also discussed the inferences of the val-
uations from social influences by Uniform Additive Model,
Symmetric Model, and Concave Graph Model. Later, Fo-
takis et al. [9] proposed a polynomial-time approach to ap-
proximate the maximum revenue in the Uniform Additive
Model. Another work [16] distinguishes between activation
and adoption. When an individual is active by the social in-
fluence, he/she will then determine whether or not to adopt
the product with respect to the pricing and his/her valua-
tion. The marketing strategy of all these works is to deter-
mine customized pricing for different customers.
Mirrokni et al. [17] argued that offering the product at
fixed pricing is more reasonable since offering customized
pricing is hard to implement in the real world. Hence, their
objective is to discover a seed group with the fixed pricing
to maximize the revenue. Mirrokni et al. [17] adopted the
Concave Graph Model proposed in the work [11] to incor-
porate the social influence into the valuation, and presented
a (1/2)-approximation based on the randomized linear time
approximation algorithm for the Unconstrained Submodular
Maximization problem.
However, all the works above assumed that there is an
unlimited supply of commodities, whereas we consider the
scenario with limited supply such as limited edition com-
modities and concert tickets. As shown in Sections 1 and 4.1,
it is unapplicable for these works to determine the proper
marketing strategies.
6. CONCLUSION
In this work, we addressed the revenue maximization prob-
lem with a quantity constraint on a monetizing social net-
work. To maximize the revenue, the marketing strategy is
to determine the pricing of the commodity and find a seed
group of individuals as the initial customers. Hence, we pro-
vided Algorithm PRUB to derive the pricing and the seed
group for the optimal revenue. For better efficiency, we fur-
105
103
)
e
t
u
n
i
m
(
PRUB+IF
PRUB+SW
PRUB+R
105
103
)
e
t
u
n
i
m
(
PRUB+IF
PRUB+SW
PRUB+R
105
103
)
e
t
u
n
i
m
(
PRUB+IF
PRUB+SW
PRUB+R
105
103
)
e
t
u
n
i
m
(
PRUB+IF
PRUB+SW
PRUB+R
e
m
T
i
101
e
m
T
i
101
e
m
T
i
101
e
m
T
i
101
0.05 0.1 0.15 0.2 0.25 0.3
0.05 0.1 0.15 0.2 0.25 0.3
0.05 0.1 0.15 0.2 0.25 0.3
0.05 0.1 0.15 0.2 0.25 0.3
n
V
(a) digg(N)
n
V
n
V
(b) digg(M)
Figure 7: The runtime comparison.
(c) facebook (N)
n
V
(d) facebook (M)
Review 75: 424-440, 1985.
[15] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximizing
the Spread of Influence through a Social Network. In
ACM SIGKDD, 2003.
[16] W. Lu and L. V. Lakshmanan. Profit Maximization
over Social Networks. In IEEE ICDM, 2012.
[17] V. S. Mirrokni, S. Roch, and M. Sundararajan. On
Fixed-Price Marketing for Goods with Positive
Network Externalities. In WINE, 2012.
[18] K. Ohmaa. The Impact of Rising Lower-Middle Class
Population in Japan. Tokyo: Kodan-sha Publishing
Company, 2006.
[19] Y. Singer. How to Win Friends and Influence People,
Truthfully: Influence Maximization Mechanisms for
Social Networks. In ACM WSDM, 2012.
[20] A. Sundararajan. Local Network Effects and Complex
Network Structure. The BE Journal of Theoretical
Economics 7(1), 2007.
[21] S. Worchel, J. Lee, and A. Adewole. Effects of Supply
and Demand on Ratings of Object Value. Journal of
Personality and Social Psychology 32.5 (1975): 906.
[22] B. Viswanath, A. Mislove, M. Cha, and K. P.
Gummadi. On the Evolution of User Interaction in
Facebook. In ACM WOSN, 2009.
ther proposed Algorithm PRUB+IF as a heuristic algorithm
based on the framework of PRUB for a feasible solution. The
experiments on real datasets with different valuation distri-
butions showed the effectiveness of PRUB and PRUB+IF.
7. REFERENCES
[1] D. Arthur, R. Motwani, A. Sharma, and Y. Xu.
Pricing Strategies for Viral Marketing on Social
Networks. In WINE, 2009.
[2] S. E. Asch. Effects of Group Pressure on the
Modification and Distortion of Judgments. In H.
Guetzkow (Ed.), Groups, leadership and men(pp.
177-190). Pittsburgh, PA:Carnegie Press, 1951.
[3] W. Chen, Y. Yuan, and L. Zhang. Scalable Influence
Maximization in Social Networks under the Linear
Threshold Model. In IEEE ICDM, 2010.
[4] M. D. Choudhury, H. Sundaram, A. John, D. D.
Seligmann. Social Synchrony: Predicting Mimicry of
User Actions in Online Social Media. In IEEE CSE,
2009.
[5] A. Clauset, C. R. Shalizi, and M. E. J. Newman.
Power-law Distributions in Empirical Data. In SIAM
review 51.4, 2009.
[6] J. S. Coleman. Introduction to Mathematical
Sociology. London Free Press Glencoe, 1964.
[7] P. Domingos and M. Richardson. Mining the Network
Value of Customers. In ACM SIGKDD, 2001.
[8] D. Easley and J. Kleinberg. Information Cascades. In
Networks, Crowds, and Markets: Reasoning about a
Highly Connected World (chap. 16, pp. 483-508).
Cambridge University Press, 2010.
[9] D. Fotakis and P. Siminelakis. On the Efficiency of
Influence-and-Exploit Strategies for Revenue
Maximization under Positive Externalities. In WINE,
2012.
[10] H. Fromlet. Predictability of Financial Crises: Lessons
from Sweden for Other Countries. Business Economics
47.4, 2012.
[11] J. Hartline, V. S. Mirrokni, and M. Sundararajan.
Optimal Marketing Strategies over Social Networks. In
ACM WWW, 2008.
[12] B. Hu, M. Jamali, and M. Ester. Learning the
Strength of the Factors Influencing User Behavior in
Online Social Networks. In IEEE ASONAM, 2012.
[13] S. Y. Jung, J.-H. Hong, and T.-S. Kim. A Statistical
Model for User Preference. In IEEE TKDE, 2005.
[14] M. L. Katz and C. Shapiro. Network Externalities,
Competition, and Compatibility. American Economic
|
1308.5168 | 1 | 1308 | 2013-08-23T16:14:15 | Is Somebody Watching Your Facebook Newsfeed? | [
"cs.SI"
] | With the popularity of Social Networking Services (SNS), more and more sensitive information are stored online and associated with SNS accounts. The obvious value of SNS accounts motivates the usage stealing problem -- unauthorized, stealthy use of SNS accounts on the devices owned/used by account owners without any technology hacks. For example, anxious parents may use their kids' SNS accounts to inspect the kids' social status; husbands/wives may use their spouses' SNS accounts to spot possible affairs. Usage stealing could happen anywhere in any form, and seriously invades the privacy of account owners. However, there is no any currently known defense against such usage stealing. To an SNS operator (e.g., Facebook Inc.), usage stealing is hard to detect using traditional methods because such attackers come from the same IP addresses/devices, use the same credentials, and share the same accounts as the owners do.
In this paper, we propose a novel continuous authentication approach that analyzes user browsing behavior to detect SNS usage stealing incidents. We use Facebook as a case study and show that it is possible to detect such incidents by analyzing SNS browsing behavior. Our experiment results show that our proposal can achieve higher than 80% detection accuracy within 2 minutes, and higher than 90% detection accuracy after 7 minutes of observation time. | cs.SI | cs | Is Somebody Watching Your Facebook Newsfeed?
1Shan-Hung Wu, 2Man-Ju Chou, 3Ming-Hung Wang,
4Chun-Hsiung Tseng, 2Yuh-Jye Lee, and 3Kuan-Ta Chen
1Dept. of Computer Science, National Tsing Hua University
2Dept. of Computer Science, National Taiwan University of Science and Technology
2Inst. of Information Science, Academia Sinica
3Dept. of Information Management, Nanhua University
3
1
0
2
g
u
A
3
2
]
I
S
.
s
c
[
1
v
8
6
1
5
.
8
0
3
1
:
v
i
X
r
a
ABSTRACT
With the popularity of Social Networking Services (SNS),
more and more sensitive information are stored online and
associated with SNS accounts. The obvious value of SNS ac-
counts motivates the usage stealing problem -- unauthorized,
stealthy use of SNS accounts on the devices owned/used
by account owners without any technology hacks. For ex-
ample, anxious parents may use their kids' SNS accounts
to inspect the kids' social status; husbands/wives may use
their spouses' SNS accounts to spot possible affairs. Usage
stealing could happen anywhere in any form, and seriously
invades the privacy of account owners. However, there is
no any currently known defense against such usage stealing.
To an SNS operator (e.g., Facebook Inc.), usage stealing is
hard to detect using traditional methods because such at-
tackers come from the same IP addresses/devices, use the
same credentials, and share the same accounts as the owners
do.
In this paper, we propose a novel continuous authentica-
tion approach that analyzes user browsing behavior to de-
tect SNS usage stealing incidents. We use Facebook as a
case study and show that it is possible to detect such inci-
dents by analyzing SNS browsing behavior. Our experiment
results show that our proposal can achieve higher than 80%
detection accuracy within 2 minutes, and higher than 90%
detection accuracy after 7 minutes of observation time.
1.
INTRODUCTION
Many people use Social Networking Services (SNS, such
as Facebook) daily, and have associated a lot of personal
and sensitive information with their SNS accounts. These
information generally include friend lists, feeds from their
friends, non-public posts/photos, private interactions with
others (such as chats and messages), purchased apps/items,
etc., and its obvious value makes the SNS accounts one of
the most targeted online resources by hackers to steal. To
protect user privacy, SNS sites today have done a lot to pre-
vent account stealing. For example, Facebook records the
regular IP addresses and devices used by each account. If an
account logs in with an unusual IP address or device, the ac-
count is prompted to either answer some secret questions [1]
or enter a security code sent to the account owner's mobile
device [2] in order to verify if the login is authentic. Face-
book also allows users to report account stealing manually
if they suspect that their accounts have been stolen.
Despite of all the efforts to prevent account stealing, user
privacy can also be compromised by another form of breach
called usage stealing -- unauthorized, stealthy use of SNS ac-
counts on the devices owned/used by account owners with-
out any technology hacks. Usage stealing could happen any-
where in any form. For example, anxious parents may use
their kids' SNS accounts to inspect the kids' social status;
husbands/wives may use their spouses' SNS accounts to spot
possible affairs. Similarly, colleges, supervisors, friends, or
siblings, just to name a few, may also have their own motives
to use acquaintances' accounts for different reasons.
Usage stealing is common in practice due to the follow-
ing reasons. First, when using their own computers, people
tend to choose "yes" when the browsers ask whether they
would like to save their (SNS) passwords for automatic lo-
gins in the future. This is especially true when users are
using their mobile devices because it is cumbersome to in-
put passwords [22, 15]. Mobile devices also ease the usage
stealing in other aspects, in that they can be physically ac-
cessed by acquaintances or strangers [29], and that most of
them are not locked by PINs [10]. In addition, many SNS
sites use cookies to save the trouble of future account au-
thentications within a short time. For example, once logged
into Facebook, a user need not login again during at most
60 following days [5]. From the above, if someone (mostly
an acquaintance) can access the computer or mobile devices
of an SNS user, it is likely that the person, without the need
of technical background, can peep the information associated
with the SNS account.
However, there is no any currently known defense against
such usage stealing. To an SNS site, usage stealing is hard to
detect using traditional methods because the attackers come
from the same IP addresses/devices, use the same creden-
tials, and share the same accounts as the owners do. More-
over, because users normally do not see the logs, victims can
hardly sense and report the stealthy usage.
Contributions.
In this paper, we identify the usage
stealing problem in SNS and propose a novel continuous au-
thentication approach [19, 20] that analyzes users' browsing
behavior to detect usage stealing incidents. We use Face-
book as a case study, and show that it is possible to detect
such incidents by analyzing their browsing behavior on the
SNS sites, namely, clicks on newsfeeds1, friend lists, profiles,
likes, messages, photos/videos, and comments. Our user
study shows that our proposed scheme can achieve above
80% accuracy with a high confidence within 2 minutes, and
higher than 90% accuracy after 7 minutes of observation
time.
Deployment. Our detection approach is designed to
run on SNS servers and to serve as the first line of defense
against account usage stealing. The deployment is straight-
forward: an SNS server collects the behavior of an account's
session and feeds it into a detection model in real time. The
model determines whether the user of the session is suspi-
cious, and if so, the SNS server can either 1) trigger more
sophisticated analysis/monitoring, and/or 2) challenge the
session user immediately by secret questions or via a second
channel such as mobile phone authentication [2]. Note that
since we are at the first line of defense, there is no need for an
100% accurate detection model, rather, a reasonable detec-
tion power is sufficient and the key is a prompt and efficient
detection. Also, please note that the proposed methodology
is neither tied to a specific SNS site nor to a certain learning
technique as it is based on the standard supervised learn-
ing framework. For example, while we adopt the smooth
SVM [14] as the detection model in this paper, the service
operators (e.g., Facebook Inc.) may choose the asymmetric
SVM [26] or similar methods if they wish to further reduce
the false positive rates.
Implications. We believe that the usage stealing prob-
lem, while not being well studied so far, will be much more
critical in the future, as people put more and more sensitive
information online. In fact, this problem may not only oc-
cur in the social services, but also online email services such
as Gmail and Outlook.com, time management services such
as Google Calender and Remember The Milk, photo album
services such as Instagram, and much more. Except asking
users to repeatedly authenticate themselves (practically pro-
hibited by usability issues), continuous authentication seems
to be the only feasible solution for attacks of this kind.
The rest of this paper is organized as follows. We review
the related work in Section 2. Section 3 discusses the ra-
tionale behind detecting usage stealing based on browsing
behavior. In Section 4, we describe our user study on Face-
book and analyze the users' behavior. Section 5 elaborates
our detection methodology. We evaluate the performance of
our scheme in Section 6, and analyze the security issues in
Section 7. Finally, Section 8 concludes the paper.
2. RELATED WORK
In this section, we review existing studies on the privacy
issues on SNS and continuous authentication.
SNS Privacy. Privacy is always a concern for SNS users.
Many efforts have been devoted to protect user privacy. He
et al., Zheleva et al., and Tang et al. [11, 21, 30] observe
a privacy hole that attackers can infer private information
(such as sexual orientation) of a user from his/her public
SNS records/activities. Felt et al. and Wishart et al. [7, 24]
prevent privacy leaks from SNS developer APIs and from
1A Facebook newsfeed, which locates at the center column
of one's home page, is a constantly updated list summarizing
the status of people that one follows on Facebook.
the software based on them. Mahmood et al. [16] focus on
another type of privacy attacks called the frequent account
deactivation. Meanwhile, in the industry, Facebook takes
a vector of measures to protect user privacy. For example,
it provides an official page [4] to educate users about the
correct privacy and security settings, and records the IP ad-
dresses, web browsers, and devices used by each account [6].
If an account logs-in with unknown records, Facebook will
challenge the user either by secret questions [1] or via mo-
bile phone authentication [2]. Facebook also allows users to
report account stealing incidents manually.
However, none of the above attempts can protect user
privacy when the attackers sneak in using the same devices
owned by the victims. Since the passwords, credentials, and
cookies are usually stored in users' devices to avoid repeated
account authentication [5, 15, 22], attackers who have phys-
ical access to these devices can easily bypass all the above
detection schemes and obtain the sensitive information as-
sociated with the SNS accounts.
Continuous Authentication. Continuous authentica-
tion is an implicit, automatic re-authentication method that
analyzes the follow-up user actions after his/her initial au-
thentication to make sure if the user is still authentic. The
actions can be keyboard typing behavior [20], mouse move-
ments [19], operations on mobile devices [28], facial char-
acteristics (if a webcam is available) [17], or any other soft
biometric traits [18, 27].
However, the above analyses are per-person-based; that
is, a detection model is required for each user. This may
be cost-prohibitive on SNS servers given that an SNS site
usually have more than millions of users2. The continu-
ous authentication method proposed in this paper analyzes
web browsing behavior performed by only three predefined
user groups. The detection model is universal to all users
and it introduces low data collection and computation over-
head. Another advantage of our proposal is that the scheme
can be applied to a new account whose associated biomet-
ric behavior is not yet clear. Note that our proposal is
not a replacement for existing continuous authentication ap-
proaches. Rather, it can serve a low-cost filter for suspicious
accounts, with which the servers can trigger more sophisti-
cated, personalized analysis whenever necessary.
3. RATIONALE BEHIND OUR DETECTION
APPROACH
Nowadays, an SNS service such as Facebook is not merely
a place for people to maintain their friend lists. They are
more like a platform where people engage various social ac-
tivities, such as posting own status, reading others' com-
ments on news, chatting, and meeting new people, etc. Stud-
ies [9, 13] show that there is no typical user behavioral pat-
tern on a complicated, open platform like Facebook, as every
single user seems to have his/her own behavioral tendency
on an SNS service. For example, some people tend to fulfill
their desire on self-presentation, so they spend most time on
sharing their own latest status and posting the latest pho-
tos/events. In the meantime, some people may manage to
engage new friends online; some chat with familiar friends;
some spend time discovering new social games; and some
others like to stalk certain other users.
2For example, Facebook has more than a billion monthly
active users as of December 2012.
Given the diversity in user behavioral patterns determined
by users' personal characteristics and social status, it is hard
to profile every user's browsing behavior when they are us-
ing an SNS service. However, we argue that users would
normally exhibit significantly different behavior when they
are browsing their own and others' pages.
In the context of usage stealing, each user can have one
of the three following roles when using an SNS service: 1)
owner, when he/she is using his/her own account; 2) ac-
quaintance (as a stalker), when he/she is using the account
of someone he/she knows; and 3) stranger (as a stalker),
when he/she is using the account of an unknown person.
Intuitively, when checking the Facebook newsfeed as the
owner, a user would focus more on the latest information
of friends and use the "like" or "share" function to interact
with others. On the other hand, when browsing a news-
feed as a stalker (either an acquaintance or a stranger), the
user may be interested in earlier information that is more
interesting to the stalker. He/she may not interact with
others because he/she does not want the owner to discover
the stealthy usage later. In summary, we believe that users
would normally behave differently at different roles because
• The way people treat familiar information (or infor-
mation from familiar friends) would be different than
the way they treat unfamiliar information;
• People at different roles would have different inten-
tions;
• In order not to be found by the account owners, people
as the stalkers may behave differently with the time
pressure.
We call the above differences in users' browsing behavior
as the role-driven behavioral diversity. We conjecture that
Facebook users, as well as users of the other SNS services,
possess such diversity, and this serves as the main rationale
behind our detection scheme.
In the following, we shall prove that the role-driven be-
havioral diversity indeed exists using the datasets we collect
in a user study on Facebook (Section 4) and then show that
our detection scheme can rely on this property to classify
account owners from stalkers (Section 5).
4. FACEBOOK USER BEHAVIOR
We use Facebook as a case study on users' role-driven
behavior.
4.1 Data Collection
To capture the role-driven behavioral diversity, we hire
a number of Facebook users to be our subjects and design
experiments in which subjects browse Facebook newsfeed at
different roles. In other words, we ask each subject to browse
1) his/her own newsfeed, 2) his/her friend's newsfeed, and
3) a stranger's newsfeed.
To conduct the experiment, we hire pairs of subjects from
an one-million-user Internet community. Each pair of sub-
jects must be with at least one of the following relationships:
friends, family members, colleagues, classmates, and cou-
ples. Each subject is paid 10 USD and we get the subject's
permission to record all actions (e.g., clicks, typing, page
views, etc.) he/she performs when browsing a newsfeed. A
Account A
A
Account B
B
Account C
C
Account D
D
Round 1
Round 2
Round 3
A
C
D
B
B
A
C
D
D
B
A
C
30 minutes
30 minutes
30 minutes
time
(A, B) and (C, D) are pairs of acquain-
Figure 1:
tances. Each experiment comprises 3 rounds.
In
each round, each subject is assigned to an account
randomly ; overall, each subject is guaranteed to
browse his/her own account, the account of acquain-
tance, and an account of stranger in the three rounds
with a randomized order.
Property
# experiments
Total time
# subjects
# male subjects
# female subjects
# sessions
# self-usage
# acquaintance-usage
# stranger-usage
Avg. session length
Avg. action rate
Avg. page switching rate
Value
28
9302 min
112
56
44
278
100
81
97
30 min
3.0 action/min
0.7 page/min
Table 1: A summary of the experiments and raw
dataset.
subject is hired only if he/she is an active Facebook user --
the subject must have more than 50 friends and consistently
stay on Facebook longer than 4 hours per week.
Each experiment comprises 3 rounds.
In each round, a
subject is asked to browse the newsfeed of an account (ei-
ther of his/her, his/her friend's, or a stranger's own) for 30
minutes. The subjects and accounts are paired randomly,
but each subject is guaranteed to play all the 3 roles in the 3
rounds, as shown in Figure 1. During each round, the users
can perform any action they like (e.g., uploading photos,
leaving comments, etc.), but not including sabotage activi-
ties (e.g., changing the account password). Actions to follow
external links (such as videos) are allowed, but the subjects
are asked not to stay with external content for longer than
1 minute each time.
In order to capture the subjects' activities performed on
Facebook, we use Fiddler, a free Web debugging proxy, to
monitor all the HTTP/HTTPS GET/POST requests issued
Actions
Interactive
Page-
Switching
√
√
√
√
√
√
√
√
√
√
Expand Comments
Likes
View Cards
View Likes
View Messages
View Photos
To Friend List Page
To Note Page
To Photo Page
To Wall Page
To Fan Page
To Feed Page
To Group Page
To Message Page
Add Comments
Delete Comments
Click Hyper-links
Expand Page
√
√
√
√
√
√
√
√
Table 2: 18 types of common user actions we col-
lected on Facebook.
Time stamp
Action
Target Person
1345837539249.47
1345837568519.15
1345837586398.26
1345837732512.73
1345837756445.03
1345837770260.55
1345837773293.04
1345837828598.01
1345837875240.45
Likes
View Cards
Add Comment
Group page
Likes
View Cards
View Message
Likes
Expand Page
Friend A
Account Owner
Friend A
Friend B
Non-Friend C
Friend A
Non-Friend C
Table 3: An exemplary list of the collected actions.
by a browser. By parsing the HTTP/HTTPS request logs,
we are able to capture every action performed by a user (to
be explained later). Table 1 summarizes the experiments
and the raw dataset we collect. Note that, although we have
administrators overseeing the experiment process, some sub-
jects do not follow the contract to browse the given Face-
book newsfeeds. Out of 311 sessions, we remove 33 "noisy
sessions" of those subjects who are obviously not focusing on
the newsfeeds, i.e., sessions with any idle, non-active period
longer than 5 minutes.
We categorize the common user activities on Fcebook into
18 different actions, as shown in Table 2. Among these ac-
tions we can identify 2 groups: 1) interactive actions: those
by which the user interacts with a certain person; and 2)
page-switching actions: those lead the browser to switch to
another Facebook page. By parsing the HTTP/HTTPS re-
quest logs, we obtain a chronological action list for each
session, as exemplified in Table 3. Each record in the list
contains the action name, the occurrence time stamp, and,
if the action is interactive, the target person the user inter-
acts with. Based on the account owner's profile and friend
list, we annotate the target person with either the "account
owner," "friend," or "non-friend."
4.2 Defining Features
Next, we define a number of features and obtain their val-
ues for every session we collect so that the machine learning
algorithms can be applied. Even we have a perfect learning
algorithm, without features that encode information about
who is controlling a session, the algorithm will have no way
to distinguish the account owners from stalkers. How to de-
fine features that we need is a key issue in this work, and
is usually challenging because it requires insights, domain
knowledge, creativity, and even "black arts" [3].
We interview heavy users of Facebook about their regu-
lar usage patterns and the ways they discover and explore
interesting information. Based on the results, we define 139
features. All the features of a particular session can be ex-
tracted from the session's action list (see Table 3). Our
features can be basically summarized as follows:
1. f.<action>:
the frequency of a certain action (per
minute). The <action> can be any action defined in
Table 2. We also keep f.acts and f.acts.excluding.
page.expand, the frequencies of all actions and all ac-
tions except the "expand page3" action respectively.
The reason we capture the latter feature is that we
want to determine how much a user really does in ad-
dition to merely browsing pages.
2. f.<target_type>.<action>: the frequency of a cer-
tain action targeting a certain target user type. The
<action> is an interactive action in Table 2 and <target_type>
can be self (if the target person is the account owner),
friend (if the target person is a friend of the account
owner), or nonfriend (if the target person is not a
friend).
3. b.<xxx>: the binary version of all the above features;
i.e., b.<xxx>= 1 iff f.<xxx> is greater than 0. For
example, b.<action> denotes whether or not a certain
action occurs during the session.
4. f.act.<target_type>: the frequency of all interactive
actions performed on a certain target user type.
5. ts.page.<page_type>: the time the session user spends
on a certain page type. The <page_type> can be feed
(the account's newsfeed), msg (the account's message
box), self (pages, such as the wall/friend list/note/photos,
of the account owner), friend (pages of friends), nonfriend
(pages of non-friends), or public (fans or groups pages).
6. f.act.page.<page_type>: the frequency of all actions
performed on a certain page type. We also keep f.act.
expand.page.<page_type> and f.act.non.expand.page.
<page_type>, the frequencies of the "expand page" ac-
tion and all other actions performed on a certain page
type respectively.
7. n.act.person: the number of target people the user
interacts with during the session.
8. n.act.person.<statistics>: the statistics of the counts
of visits to different users' pages during the session.
The <statistics> include mean, standard_deviation,
3In Facebook, some pages (e.g., newsfeeds, walls, etc.)
and page items (e.g., comments, notifications lists, etc.)
are expandable. For clarity, these pages/items show ear-
lier/detailed information only upon expansion.
median, and maximum. For example, suppose that the
user visits his/her own pages 1 time, friend A's pages
3 times, friend B's pages 1 time, and non-friend C's
pages 2 times, then we obtain mean= 1.75, standard_
deviation= 0.96, median= 1.5, and maximum= 3. The
reason we capture these features is that we want to de-
termine whether a user pays attention to any specific
person.
After extracting the features for each session, we obtain a
dataset ready for analysis. Each session is labeled with ei-
ther "owner," "acquaintance," or "stranger," depending on
the user's role for the session in the experiment.
4.3 Role-Driven Behavioral Diversity
To justify the existence of the role-driven behavioral diver-
sity between the account owners, acquaintances, and strangers,
we carry out some analysis of the user behavior performed at
different roles. Our observations are summarized as follows.
General Diversity. As shown in Figure 2(a), all ses-
sions controlled by the three user roles have similar values in
f.acts. However, in f.acts.excluding.page.expand (Fig-
ure 2(b)), the sessions controlled by the account owners ex-
hibit higher values than those by the acquaintances, which
in term give higher values than those by strangers. This
implies that the acquaintances/strangers usually pay more
attention to reading/searching for interesting information.
They also care more about earlier information, as the con-
tent hidden by expandable pages/items by default are older.
The sessions used by acquaintances/strangers also yield
much lower values in f.act_add_comment (Figure 2(c)) and
f.act_like (Figure 2(d)) than those by the account owners.
The reason is obvious: Acquaintances/strangers normally do
not want to leave a clue of their peeping behavior.
What Stalkers Do Not Care. Although the acquain-
tances/strangers expand pages more frequently (Figure 2(b)),
they do not expand the comment lists as commonly as the
account owners do. This is because the acquaintances/strangers
may not know the people leaving the comments, therefore
showing less interest to them. Due to similar reasons, ac-
quaintances/strangers also express less interests in the fans/
groups pages (Figure 2(e)) and who likes a post (Figure
2(f)); in addition, they also spend less time in the accounts'
newsfeeds (Figure 2(g)). In particular, strangers tend to ig-
nore most of the newsfeeds because they generally do not
know people whose information appear in the feeds (Figure
2(h)).
What Acquainted Stalkers Care. As compared with
the other roles, the acquaintances pay more attention to the
accounts' friend lists (Figure 2(i)). This is because an ac-
quaintance may know the account owner's friends and be
curious about these friends' status (especially the status of
those people who are not currently a friend of the acquain-
tance). The acquaintances are generally most interested in
the message boxes (Figure 2(j)) and the profile cards of the
accounts' friends (Figure 2(k)) due to similar reasons.
What Stranger Stalkers Care. Interestingly, the ac-
count owners' profiles (Figure 2(l)) and photos (Figure 2(m))
are most viewed by strangers rather than the account own-
ers' friends or the owners themselves. This is because the
strangers do not know the account owners, so they are usu-
ally curious about who the owners are and how they look
like. The strangers are also less affected by the account own-
ers' social relationship. For example, they are more willing
User
SNS Client
SNS Server
Detection Model
(1) Start session.
(2) Collect actions for n minutes
(6) If yes, challenge user.
(3) Extract features
(4) Feed inn
(5) Suspicious?.
Figure 3: The flow chart of our detection scheme.
to check out non-friends (Figure 2(n)) and external links
(Figure 2(o)).
We believe that the above findings suffice to prove the
existence of the role-driven behavioral diversity. Next, we
show how this diversity can be further utilized to implement
a low-cost detector for usage stealing.
5. DETECTION SCHEME
This section introduces a scheme for detecting the usage
stealing on SNS sites.
In our dataset, each session is labeled with either "account
owner," "acquaintance," or "stranger." Since our goal is to
distinguish stalkers from the account owners, in the follow-
ing, we replace the "acquaintance" and "stranger" labels with
a single "stalker" label.
Figure 3 gives an overview of our detection scheme. After
a user starts a session (by either logging-in newly or us-
ing existing authentication cookies, Step 1), the SNS server
monitors and collects a list of actions performed by the user
for an observation period of n minutes, where n is a con-
figurable parameter (Step 2). After the observation period,
the SNS server extracts the features of the monitored session
based on the recorded action list (Step 3), where the features
are defined in Section 4.2. It then feeds the session features
into a detection model (Step 4), which determines whether
the session owner is suspicious by predicting the label of the
session (Step 5). If the predicted label is "stalker," the SNS
server can challenge the user by secret questions or via a
second channel such as mobile phone authentication (Step
6). Alternatively, the server can trigger a more sophisticated
(but costly) detection scheme.
Note that the scheme has low runtime cost on an SNS
server because it requires only one detection model for all
SNS users, taking the advantage of the role-driven behav-
ioral diversity. Also note that, although we employ a two-
class detection model to distinguish stalkers from the ac-
count owners, the scheme can be readily extended to iden-
tify the account owners, acquaintances, and strangers if a
multi-class detection model is adopted.
We obtain our detection model by training it using the
labeled sessions we collected. Clearly, the effectiveness of
our detection scheme largely depends on the quality of pre-
dictions made by the detection model. In order to obtain
high-quality predictions, we take rigorous steps in training
the model, as summarized below.
0
3
.
0
2
.
0
1
.
.
0
0
5
1
0
.
0
1
.
0
5
0
.
0
0
0
0
.
8
0
.
6
.
0
4
.
0
2
.
0
0
.
0
f.acts
f.acts.excluding.page.expand
f.act_add_comment
f.act_like
f.page_group
5
2
.
0
2
.
.
5
1
0
1
.
5
.
0
.
0
0
2
1
.
0
8
0
.
0
4
0
0
.
0
0
0
.
0
2
.
0
0
1
0
.
0
0
0
.
Self
Friend
Stranger
Self
Friend
Stranger
Self
Friend
Stranger
Self
Friend
Stranger
f.friend.view_likes
ts.page.feed
f.page_feed
f.page_friends
0
0
6
0
0
4
0
0
2
0
0
2
.
0
5
1
0
.
0
1
.
0
5
0
0
.
0
0
0
.
4
0
.
0
2
0
0
.
0
0
0
.
Self
Friend
Stranger
f.page_message
3
0
.
0
2
0
.
0
1
0
0
.
0
0
0
.
0
2
.
0
5
1
0
.
0
1
0
.
5
0
0
.
0
0
0
.
Self
Friend
Stranger
Self
Friend
Stranger
Self
Friend
Stranger
Self
Friend
Stranger
Self
Friend
Stranger
f.view_card
f.self.page_wall
f.self.view_photo
ts.page.nonfriend
f.act_follow_link
0
2
.
0
5
1
.
0
0
1
.
0
5
0
.
0
0
0
.
0
0
2
0
0
.
0
1
0
.
0
0
0
0
.
0
0
5
1
0
0
1
0
5
0
6
0
.
0
4
0
.
0
2
0
.
0
0
0
.
0
Self
Friend
Stranger
Self
Friend
Stranger
Self
Friend
Stranger
Self
Friend
Stranger
Self
Friend
Stranger
Figure 2: The evidence of role-driven behavioral diversity.
5.1 Model Development
For ease of numeric operations, we treat the labels "stalker"
and "account owner" as 1 and −1 respectively. Given a train-
ing dataset D of size n, D = {(x1, y1), (x2, y2), · · · , (xn, yn)},
where xi ∈ Rd is a labeled instance (i.e., session) with d fea-
tures and yi ∈ {1, −1} is the corresponding label, our goal
is to obtain a function f : Rd → R such that given a new
instance x′ with an unknown label y′, we have f (x′) > 0 iff
y′ = 1. The function f is the detection model in our scheme.
In Figure 3(4), the SNS server feeds the session x′ into f .
In Figure 3(5) the SNS server gets f (x′) and determines
whether the session is suspicious by sgn(f (x′)).
We obtain f based on the Support Vector Machine (SVM)
technique. The SVM is a very popular and promising ma-
chine learning algorithm for binary classification problems.
The idea is to let f be a linear function, i.e., f (x) = w⊤x+ b
for some w ∈ Rd and b ∈ R, and then find w and b such that
the hyperplane {x : w⊤x+ b = 0} separates the positive and
negative instances in D while leaving the largest "margin"
between {x : w⊤x + b = 1} and {x : w⊤x + b = −1},
i.e., w⊤xi + b ≥ 1 for all (xi, yi) ∈ D ∧ yi = 1 and
w⊤xi + b ≤ −1 for all (xi, yi) ∈ D ∧ yi = −1 (or equiva-
lently, yi(w⊤xi +b) ≥ 1 for all (xi, yi) ∈ D if we combine the
two inequations), as shown in Figure 4. Simple calculation
shows that the margin equals
. Therefore, to maximize
the margin, we can instead minimize kwk2, which leads to
the objective below:
kwk2
2
arg min
w,b,ξ
kwk2
2
s.t. yi(w⊤xi + b) ≥ 1 for i = 1, 2, · · · , n.
(1)
In practice, the training dataset D usually contains instances
that are noises or outliers (i.e., instances with wrong labels).
To tolerate these instances, the SVM does not insist the
positive and negative instances to be placed exactly at the
two sides of the margins. It introduces a slack variable ξi,
ξi ≥ 0, for each instance xi in D and requires only yi(w⊤xi+
b) ≥ 1 − ξi. So noises and outliers can be placed inside the
margin or even at opposite sides. This gives the objective
of linear SVM:
arg min
w,b,ξ
n
kwk2
2 + C
X
ξi
i=1
(2)
s.t. yi(w⊤xi + b) ≥ 1 − ξi and
ξi ≥ 0, for i = 1, 2, · · · , n.
Note that the slacks are minimized as well (in the term
Pn
i=1 ξi) in order to penalize the noises and outliers and
keep their numbers small. The hyperparameter C controls
the trade-off between maximizing the margin and minimiz-
ing the number of noises/outliers.
The linear SVM can be extended to nonlinear SVM by
utilizing the kernel trick. Define a function φ : Rd → Rd′
,
d′ > d, that maps an instance x to a point in a higher (pos-
sibly infinite) dimensional space, the nonlinear SVM finds
a separating hyperplane in that space. Since d′ > d, the
found hyperplane may not be linear anymore in the origi-
nal d-dimensional input space. It can be shown that, if we
choose φ carefully such that the inner product φ(a)⊤φ(b)
can be represented by a kernel function K : Rd × Rd → R
(i.e., φ(a)⊤φ(b) = K(a, b)) for any a, b ∈ Rd, then we can
solve the objective of nonlinear SVM in a manner whose
Feature Extraction
Candidate Features Set Selection
(1-norm SVM)
Detection Model
(SSVM)
Forward Feature Selection
Figure 5: The steps in training a detection model.
[31] to determine a candidate set of features. In the second
stage, we use the forward feature selection [25] algorithm to
determine the best final features from the candidate set for
training the detection model.
Unlike the SVM which minimizes kwk2
(2)), the 1-norm SVM minimizes kwk2
2 in its objective
(Eq.
1 (called the
LASSO penalty [23]) instead. We employ the 1-norm SVM
to determine the candidate set because it usually finds a
sparse w (i.e., w that tends to have zeros) thanks to its
"compressed sensing" interpretation [8]. We obtain the can-
didate set by keeping only those features that correspond to
the non-zeros in w, as the features corresponding to zeros
are usually redundant or noise features [31].
And then, we use the forward feature selection algorithm
to determine the final features from the candidate set. The
algorithm starts with an empty set for keeping the final fea-
tures. At each step, one feature from the candidate set that
improves the prediction accuracy4 of SSVM most is added
to this set. The algorithm then repeats the above step until
the candidate set becomes empty or there is no feature in
the candidate set that improves the accuracy.
6. PERFORMANCE EVALUATION
In this section, we evaluate the performance of the pro-
posed detection model.
6.1 Settings and Metrics
After data cleaning (described in Section 4.1), there are
278 instances (i.e., sessions) in D, among which 178 in-
stances are positive (i.e., labeled by +1, which denotes "ac-
quaintance" or "stranger") and 100 instances are negative
(i.e., labeled by −1, which denotes "account owner"). Each
instance is presented by 139 feature values.
To the best of our knowledge, currently there is no other
detection scheme for the usage stealing problem in SNS ser-
vices. Thus we compare the detection model to itself by
imposing different observation periods. Specifically, given
an observation period L, we extract the feature values of a
session only from those actions that are performed within
L minutes after the start of the session. We study the
performance of the detection model given L = 1, 2, · · · , 25
minutes. Although a subject was asked browse an SNS ac-
count for 30 minutes during each round of the experiment
described in Section 4.1, we set the maximal value of L to
25 rather than 30 because some subjects appear to lose pa-
tience and become idle after 25 minutes. Under the premise
of data consistency, we consider L ≤ 25 here.
As described in Sections 5.2 and Section 5.1, to obtain our
detection model, we first employ the 1-norm SVM to get the
candidate features, and then use the forward feature selec-
tion and SSVM with 10-fold cross validation to find the best
4We use the 10-fold cross validation [25] to measure the
accuracy.
Figure 4: The separating hyperplane and margin of
SVM.
complexity is independent of the higher dimension d′. This
is known as the kernel trick. The nonlinear SVM usually
makes better predictions than the linear SVM does when
the input dimension d is not very high.
Practical Considerations. The objective of conven-
tional SVM (either linear or nonlinear) can be solved by
standard quadratic programming software. However, when
applied to an SNS service like Facebook, the solver needs to
deal with an extremely large D due to the huge user base
owned by the SNS service. To speed up the training pro-
cess, we adopt the Smooth SVM (SSVM) [14] in this paper.
The SSVM, a variant of SVM, adds b
2 into the objective of
SVM and employs the squares of slacks ξ2
i to penalize the
noises/outliers. The SSVM utilizes the KKT optimization
condition to convert the conventional SVM to an uncon-
strained minimization problem that can be solved efficiently
using the Newton's method with an Armijo stepsize.
2
The kernel trick applies to the SSVM too. In our experi-
ment, we pair up the nonlinear SSVM with the RBF kernel,
which is defined as K(a, b) = e−γka−bk2
2 .
There are 2 hyperparameters we have to determine in the
nonlinear SSVM: the penalty coefficient C and γ in the RBF
kernel function. We use the uniform design model selection
method [12] with 9-13 stages to search for an appropriate
combination of these hyperparameters.
5.2 Feature Selection
The training of SSVM is preceded by a feature selection
process [25], where we select only a subset of features in
D for the training. This process is necessary because 1)
given a tremendous amount of sessions (Figure 3(1)) that
will be monitored by the SNS servers, it helps the SSVM
scale up in making predictions by considering only a small
set of features; 2) the selected features give us a hint on
what is useful to distinguish the stalkers from the account
owners. By ignoring those features that are not helpful, we
can collect fewer actions (Figure 3(2)) and save the cost of
feature extraction (Figure 3(3)) on each SNS server; and 3)
our results show that it improves the prediction accuracy of
the final SSVM we obtain.
The feature selection precess is divided into two stages, as
shown in Figure 5. In the first stage, we use the 1-norm SVM
Predicted
Pos.
Neg.
Real
Pos. #True Positives (TP) #False Negatives (FN)
Neg. #False Positives (FP) #True Negatives (TN)
Table 4: The confusion matrix.
With Oversampling Without Oversampling
With
Feature
Selection
F -score
Without
Feature
Selection
F -score
Acc: 93.53%
FPR: 5.00%
FNR: 7.30%
0.9483
Acc: 91.37%
FPR: 6.00%
FNR: 10.11%
0.9302
Acc: 90.29%
FPR: 18.00%
FNR: 5.06%
0.9260
Acc: 87.77%
FPR: 22.00%
FNR: 6.74%
0.9071
Table 5: The results achieved under various condi-
tions.
final features and best combination of the hyperparameters
C and γ. We report the performance of our model by using
the leave-one-out cross validation [25] on D5.
To measure the performance, we first obtain a confusion
table shown in Table 4 by counting the numbers of True
Positives (TP), False Positives (FP), True Negatives (TN),
and False Negatives (FN) made by the model when predict-
ing the labels of instances in the testing dataset. And then
we calculate the following metrics:
Accuracy =
T P +T N
T P +T N +F P +F N ,
F P R =
F N R =
T P R =
P recision =
Recall =
F P
T P
F N
T N +F P ,
T P +F N ,
T P +F N ,
T P +F P ,
T P +F N ,
T P
T P
F -score = 2 ∗ P recision∗Recall
P recision+Recall ,
with various observation periods.
6.2 Detection Performance at 25 Minutes
We first study the performance of our detection model
when L = 25 minutes. Table 5 shows the results achieved
by the model with and without feature selection. As we can
see, feature selection does improve the performance by giv-
ing higher accuracy/F -scores and lower FPR/FNR. This is
because the noisy features are successfully eliminated. Fig-
ure 6 shows that there are only 60 features remain after the
applying the 1-norm SVM for candidate set selection.
We notice that the dataset D is imbalanced -- the ratio of
positive instances to negative ones is 1.78 : 1. Since there
are more positive than negative instances, we tend to obtain
a higher FPR. To overcome this issue, we adopt an over-
sampling approach by randomly selecting and duplicating
78 negative instances to balance the ratio between positive
and negative instances. The effect of duplicating an instance
is to double the penalty if we misclassify the instance. So
5We do not partition D into the training, validation, and
testing sets because D is not large enough.
t
i
h
g
e
W
4
3.5
3
2.5
2
1.5
1
0.5
0
0
20
40
60
80
100
120
140
Number of ranked features
Figure 6: The weights in w found by the 1-norm
SVM over the corresponding features. The features
are ranked by their weights. Only 60 features re-
main in the candidate feature set.
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
AUC = 0.9620
0
0
0.1
0.2
0.3
0.4
0.6
False positive rate
0.5
0.7
0.8
0.9
1
Figure 7: The ROC curve and AUC given by the
model at 25-minutes.
by duplicating negative instances in D we can avoid aliasing
and reduce the FPR. Note that because there exists random-
ness when applying the oversampling technique, we train 10
models and average their results. Table 5 shows the re-
sults achieved by our model with and without oversampling.
We can see that the oversampling successfully controls the
trade-off between FPR and FNR.
Figure 7 shows the ROC curve and AUC of our model
when both the feature selection and oversampling are ap-
plied. We get a fairly high AUC (0.962). In particular, the
ROC curve shows that we can achieve 90% TPR at 4.5%
FPR.
6.3 Early Detection Performance
To prevent the leak of sensitive information, we should
perform the usage stealing detection as early as possible for
each session. To see how our model performs with time
limits, we vary L from 1 to 25 minutes and train respective
models for each L with feature selection and oversampling.
Figure 8 shows the accuracy achieved by these models. After
7 minutes, we can get stable and reasonably good results,
with the accuracy rate higher than 90% with L ≥ 7 minutes.
Even at 2 minutes, we obtain an accuracy above 80%, which
is still satisfactory when the scheme is used as a trigger for
more sophisticated analysis.
1
0.95
0.9
0.85
0.8
0.75
y
c
a
r
u
c
c
A
0.7
0
5
10
15
Observation period (minutes)
Minute
Mean
Std.
Mean
Std.
Mean
Std.
Mean
Std.
20
25
2
3
4
5
6
7
81.9% 83.2% 85.3% 87.5% 88.8% 89.2%
0.7%
0.5%
0.8%
0.5%
0.8%
1.0%
8
9
10
11
12
13
91.3% 92.9% 92.2% 91.5% 91.0% 92.0%
0.3%
0.4%
0.5%
0.4%
0.4%
0.6%
14
15
16
17
18
19
90.8% 92.7% 93.6% 92.6% 92.0% 92.0%
0.5%
0.6%
0.4%
0.4%
0.3%
0.5%
20
21
22
23
24
25
92.5% 93.3% 93.3% 92.1% 93.5% 92.6%
0.4%
0.8%
0.4%
0.7%
0.5%
0.4%
Figure 8: Accuracy for every minute. It shows that
our detection model can achieve stable and reason-
ably good results after 7 minutes.
1
0.95
0.9
0.85
0.8
0.75
y
c
a
r
u
c
c
A
0.7
0
5
10
15
Observation period (minutes)
20
25
Figure 9: The accuracy achieved by 20 models
trained using the 10-fold cross validation on 20 ran-
domly permuted datasets. The thick line represents
the average accuracy.
To test the robustness of our model, we randomly per-
mute D for 20 times and train one model using the 10-fold
cross validation [25] for each of the 20 permutations. Fig-
ure 9 and Table 6 show the mean accuracy and standard
deviation given by the 20 models. The results indicate that
the accuracy has a very low standard deviation regardless
of L.
In addition, comparing Figure 9 with Figure 8, we
can see that our model performs consistently no matter it is
trained (using the 10-fold cross validation) or tested (using
the leave-one-out cross validation), which means the perfor-
mance of our detection scheme is very robust.
7. SECURITY ANALYSIS
As shown in Figure 3, all the data collection, processing,
decision, and follow-up actions (such as challenges and pun-
ishment) in our scheme can all be performed on the server
side. So there is no way for attackers to compromise the
scheme from the clients.
Since our detection methodology is running at the server
side (i.e., at operators), the attackers cannot evade our de-
tection scheme -- once logged-in, each user (including the at-
tacker) must be monitored by an SNS server running our
scheme. The only way for an attacker to continuously use
Table 6: Mean and standard deviation of the accu-
racy given by the models trained using the 10-fold
cross validation on 20 randomly permuted datasets.
the victim's account is to evade the detection model.
The detection model does not rely on any cryptography
technology and is completely user-behavior-based. So, in
order not to be detected by the model, attackers have to 1)
mimic the owners' actions; or 2) do as few actions as possible
and run away. The attackers of the first kind are less likely
because the owner's action model is not well known [13].
Even if some attackers read this paper and successfully mimic
the owners, they are forced to spend time on something they
are not really interested and skip some information they de-
sire more. This makes the attacks less harmful. For the at-
tackers of the second kind, our scheme imposes a high time
pressure because the detection model can achieve close to
80% accuracy even if an attackers browse the victims' news-
feeds for only 1 minute. Again, the time pressure makes
the attacks less harmful because the attackers may not be
able to find the information they want within such a limited
time.
Note that our detection scheme is not tied to any spe-
cific detection model. For example, a personalized detection
model can be particularly helpful to identify the attackers
of the first kind because it is even harder to imitate each
individual's behavior. Also, a detection model that takes
the timestamp of each action into account may be helpful
to identify the attackers of the second kind, because users
(either the account owners or stalkers) often take actions in
some order they are used to. In fact, while this work firstly
points out a new direction for future research against the us-
age stealing, it is certainly possible to develop more sophis-
ticated detection models to fight against the ever-smarter
attackers.
8. CONCLUSION
In this paper, we have proposed a novel continuous au-
thentication approach for SNS that analyzes users' browsing
behavior to detect usage stealing incidents. We use Face-
book as a case study and show that 1) the role-driven be-
havioral diversity does exist; 2) based on the so-called role-
driven behavioral diversity property, we can design a low-
cost detection scheme applicable to all users; and 3) the
scheme is hard to evade and it renders reasonable detection
performance after an observation period of 2 minutes.
As future work, we plan to study the browsing behavior
of individuals and develop personalized detection models.
7
6
5
4
3
2
1
s
e
m
T
i
0
n,act.person.m ean
n.act.person.m ed
f.act.page.friend
f.friend.page_wall
f.expand_page
f.friend.view_card
f.act.expand.page.public
f.self.expand_co m m ents
f.act.expand.page.feed
f.self.view_card
Figure 10: Top-3 features used to identify the posi-
tive instances (stalkers) in the first 7 minutes.
7
6
5
4
3
2
1
s
e
m
T
i
0
b.act_add_co m m ent
b.friend.act_like
f.friend.view_likes
n.act.person.m ean
n.act.person.m ed
f.friend.view_card
f.act.expand.page.public
Figure 11: Top-3 features used to ientify the nega-
tive instances (owners) in the first 7 minutes.
These models can be triggered only when needed and serve
as the detailed analyzers for suspicious sessions. We also
plan to improve our low-cost detection model to give higher
detection accuracy within the first 7 minutes. Such an im-
provement is possible because we see different user behav-
ior in short- and long-term. To share our observation, we
count features corresponding to the 3 most positive and 3
most negative weights in w identified by SSVM when the
observation period L varies from 1 to 7. Figures 10 and 11
show the histograms of counts of the 3 most positively- and
negatively-weighted features respectively. Some features are
rather surprising as they are not prominent in the full 30-
minute traces discussed in Section 4.3. We hope this study
can motivate in-depth studies on developing more sophisti-
cated models against usage stealing issues.
9. REFERENCES
[1] Josh Constine. Facebook has users identify friends in
[2] Josh Constine. Facebook asks every user
for a verified phone number to prevent security disaster.
http://techcrunch.com/2012/06/14/facebook-security-tips/,
2012. Online; accessed 2012.
[3] Pedro Domingos. A few useful things to know about
machine learning. Communication of the ACM,
55(10), 2012.
[4] Facebook. Facebook security.
http://www.facebook.com/security. Online;
accessed 2012.
[5] Facebook. Removal of offline_access permission.
https://developers.facebook.com/roadmap/offline-access-removal/.
Online; accessed 2012.
[6] Facebook. Facebook's privacy policy - 2. information
we receive. http://www.facebook.com/note.php,
2009. Online; accessed 2012.
[7] A. Felt and D. Evans. Privacy protection for social
networking apis. 2008 Web 2.0 Security and Privacy
(W2SP), 2008.
[8] Mario Figueiredo, Robert Nowak, and Stephen
Wright. Gradient projection for sparse reconstruction:
Application to compressed sensing and other inverse
problems. IEEE Journal of Selected Topics in Signal
Processing, 1(4):586 -- 597, 2007.
[9] Keith Hampton. Social networking sites and our lives
part 2: Who are social networking site users?
http://pewinternet.org/Reports/2011/Technology-and-social-networks/Part-2/Facebook-activities.aspx,
2011. Online; accessed 2012.
[10] Ed Hans-
berry. Most consumers don't lock mobile phone via pin.
http://www.informationweek.com/mobility/security/most-consumers-dont-lock-mobile-phone-vi/231700155,
2011. Online; accessed 2012.
[11] J. He, W. Chu, and Z. Liu. Inferring privacy
information from social networks. Intelligence and
Security Informatics, pages 154 -- 165, 2006.
[12] Chien-Ming Huang, Yuh-Jye Lee, Dennis Lin, and
Su-Yun Huang. Model selection for support vector
machines via uniform design. Computational Statistics
& Data Analysis, 52(1):335 -- 346, 2007.
[13] Adam N Joinson. Looking at, looking up or keeping
up with people?: motives and use of facebook. In
Proc. of the SIGCHI conf. on Human Factors in
Computing Systems, pages 1027 -- 1036, 2008.
[14] Yuh-Jye Lee and Olvi Mangasarian. SSVM: A smooth
support vector machine for classification.
Computational Optimization and Applications,
20(1):5 -- 22, 2001.
[15] Paul Mah. Stored passwords add to mobile security
risks.
http://www.itbusinessedge.com/cm/blogs/mah/stored-passwords-add-to-mobile-security-risks/?cs=47183,
2011. Online; accessed 2012.
[16] S. Mahmood and Y. Desmedt. Your facebook
deactivated friend or a cloaked spy. In Proc. of the
10th IEEE Int'l Conf. on Pervasive Computing and
Communications Workshops (PERCOM Workshops),,
pages 367 -- 373, 2012.
[17] Koichiro Niinuma and Anil K Jain. Continuous user
photos to verify accounts, prevent unauthorized
access.
http://www.insidefacebook.com/2010/07/26/facebook-photos-verify/,
2010. Online; accessed 2012.
authentication using temporal information. In Proc. of
Biometric Technology for Human Identification VII,
page 76670L, 2010.
[18] Koichiro Niinuma, Unsang Park, and Anil K Jain.
Soft biometric traits for continuous user
authentication. IEEE Trans. on Information Forensics
and Security, 5(4):771 -- 780, 2010.
[19] Maja Pusara and Carla E Brodley. User
re-authentication via mouse movements. In Proc. of
the ACM Workshop on Visualization and data mining
for computer security, pages 1 -- 8, 2004.
[20] SJ Shepherd. Continuous authentication by analysis of
keyboard typing characteristics. In European
Convention on Security and Detection, pages 111 -- 114,
1995.
[21] C. Tang, K. Ross, N. Saxena, and R. Chen. What's in
a name: A study of names, gender inference, and
gender behavior in facebook. Database Systems for
Adanced Applications, pages 344 -- 356, 2011.
[22] Credant Technologies. Phone data makes 4.2 million*
brits vulnerable to id theft.
http://www.credant.com/news-a-events/press-releases/69-phone-data-makes-42-million-brits-vulnerable-to-id-theft.html.
Online; accessed 2012.
[23] Rob Tibshirani. Regression shrinkage and selection via
the lasso. Journal of the Royal Statistical Society.
Series B (Methodological), pages 267 -- 288, 1996.
[24] R. Wishart, D. Corapi, A. Madhavapeddy, and
M. Sloman. Privacy butler: A personal privacy rights
manager for online presence. In Proc. of the 8th IEEE
Int'l Conf. on Pervasive Computing and
Communications Workshops (PERCOM Workshops),
pages 672 -- 677, 2010.
[25] Ian Witten, Eibe Frank, and Mark Hall. Data Mining:
Practical Machine Learning Tools and Techniques.
Morgan Kaufmann, 2005.
[26] Shan-Hung Wu, Keng-Pei Lin, Chung-Min Chen, and
Ming-Syan Chen. Asymmetric support vector
machines: low false-positive learning under the user
tolerance. In Proc. of the 14th ACM SIGKDD Int'l
Conf. on Knowledge Discovery and Data Mining,
pages 749 -- 757, 2008.
[27] Roland HC Yap, Terence Sim, Geraldine XY Kwang,
and R Ramnath. Physical access protection using
continuous authentication. In Proc. of IEEE Conf. on
Technologies for Homeland Security, pages 510 -- 512.
IEEE, 2008.
[28] Sausan Yazji, Xi Chen, Robert P Dick, and Peter
Scheuermann. Implicit user re-authentication for
mobile devices. In Proc. of the 6th Int'l Conf. on
Ubiquitous Intelligence and Computing, pages
325 -- 339, 2009.
[29] Roger Yu. Lost cellphones added up fast in 2011.
http://usatoday30.usatoday.com/tech/news/story/2012-03-22/lost-phones/53707448/1,
2012. Online; accessed 2012.
[30] E. Zheleva and L. Getoor. To join or not to join: the
illusion of privacy in social networks with mixed
public and private user profiles. In Proc. of the 18th
Int'l Conf. on World Wide Web (WWW), pages
531 -- 540, 2009.
[31] Ji Zhu, Saharon Rosset, Trevor Hastie, and Rob
Tibshirani. 1-norm support vector machines. In
Advances in Neural Information Processing Systems,
volume 16, pages 49 -- 56, 2003.
|
1604.07781 | 1 | 1604 | 2016-04-26T18:19:47 | The dynamics of publishing of posts and comments on facebook (the russian segment, the first five months of 2013) | [
"cs.SI"
] | The article presents a study of some characteristics of post and comment publishing in the Russian segment of Facebook. A number of non-trivial results has been obtained. For example, a significant anomaly has been detected in the number of user accounts with the rate of publishing posts of approximately two posts per three days. The analysis has been carried out at the level of basic characteristics that are shared by most social media platforms. It makes possible a direct comparison of obtained results with data from other platforms. The article presents an approach to formalization and ordering of structural and informational elements on social media platforms. The approach is based on the representation of these structural elements in the form of a coherent hierarchy of container objects and their relations. This method allows to structure and analyze raw data from different social media platforms in a unified algorithmic design. The described approach is more formal, universal and constructive than other known approaches. | cs.SI | cs | ArXiv.org
PACS: 89.20.Hh, 89.65.-s, 89.75.Fb, 05.45.-a, 05.45.Tp.
THE DYNAMICS OF PUBLISHING OF POSTS AND COMMENTS ON FACEBOOK
(THE RUSSIAN SEGMENT, THE FIRST FIVE MONTHS OF 2013)
A. V. Makarenko
Constructive Cybernetics Research Group,
P.O. Box 560, Moscow, 101000, Russia
Institute of Control Sciences RAS,
ul. Profsoyuznaya 65, Moscow, 117997, Russia
e-mail: [email protected]
Received November 14, 2013
Abstract. The article presents a study of some characteristics of post and comment publishing in the Russian
segment of Facebook. A number of non-trivial results has been obtained. For example, a significant anomaly
has been detected in the number of user accounts with the rate of publishing posts of approximately two
posts per three days. The analysis has been carried out at the level of basic characteristics that are shared by
most social media platforms. It makes possible a direct comparison of obtained results with data from other
platforms. The article presents an approach to formalization and ordering of structural and informational
elements on social media platforms. The approach is based on the representation of these structural elements
in the form of a coherent hierarchy of container objects and their relations. This method allows to structure
and analyze raw data from different social media platforms in a unified algorithmic design. The described
approach is more formal, universal and constructive than other known approaches.
Keywords: social media, data representation scheme, Facebook, dynamics of publishing, posts, comments.
DOI:
1. Introduction
There is no doubt about the high degree of informatization of today's society. Its scope is so
vast that a significant proportion (both in content and in volume terms) of various data about
individuals and social groups is available on social media and public repositories of digital data.
Social media is a set of online technologies that allow users to communicate with each other [1, 2].
This communication can take many forms: users can share their views, experience and knowledge,
can interact with each other making new contacts, and can share news, information, photos, videos,
music and hyperlinks to various content. In this context, content manipulation functions on the
ideological and technological base of Web 2.0 (user-created content) [3].
The described phenomenon gives rise to various social processes with far-reaching
implications. These processes manifest in various aspects: financial, political, cultural, scientific,
etc. Comprehensive research of social media is essential for understanding current events, making
forecasts and keeping negative tendencies in check. At the initial stage, it requires studying social
media behavior at the levels of individuals, social groups, nations and of humanity as a whole.
The present paper focuses on the study of some characteristics of information activity of
social media user accounts. The object of the study is the Russian segment of Facebook in the first
four months of 2013. The study was carried out at the level of posts and comments on these posts.
Specific properties of Facebook (such as "Likes") were not included in order to facilitate
comparison of obtained results with data from other social media platforms.
This article is organized as follows. Section 2 describes the methodology of analysis and the
format of input data presentation. Section 3 presents the results of the analysis of the dynamics of
publishing of posts and comments. Section 4 presents general conclusions.
2
A. V. Makarenko
2. Methodology of Analysis and Initial Data
The approach to studying the dynamics of publishing of posts and comments that we have
chosen is quite universal. First, a model has been developed for structuring and comparing data
from different social media platforms within the framework of a unified construction. Second, the
analysis has been carried out at the level of basic characteristics that are shared by most social
media platforms. These solutions make it possible to directly compare the obtained results to data
from different platforms.
We have implemented formalization and ordering of informational elements of social media
in the form of a hierarchy of containers (see Fig. 1a):
E – (enviroment);
P – (platform) – a single social media platform;
A – (account) – a message published from a specific account;
M – (message) – a message from a specific user account (posts and comments);
B – (block) – a logically complete section of a message.
(a)
E
P
…
P
A
…
A
(b)
X
P
A
P
(c)
A
A
A
M
M
B
B
B
B
M
B
M
B
B
B
A
B
M
B
M
…
M
B
…
B
CD
MD
D
D
S
S
D
D
S
S
Ex
Im
X
…
(d)
1
…
N
X
X
1
…
N
1
N
1
…
N
X
1
…
N
X
Fig. 1. Basic concepts of the approach to structuring and collation of data from different social media
platforms: (a) – hierarchy of container objects; (b) – decomposition scheme of a container object; (c) –
example of possible relations between objects; (d) – two types of relations (directional and non-directional).
Next, containers are decomposed according to the following scheme (see Fig. 1b). Each
container consists of two constituents:
CD – (contents);
MD – (metadata).
Each of the constituents can contain the following components:
D – (data) – facts, information, indicators;
S – (sence) – sense, meaning, opinion.
Each of the components can be of two types:
Ex – (explicit) – explicitly given (at the level of formal semantic markup);
Im – (implicit) – implicitly given (inferred with varying level of confidence).
Apart from container objects and their constituents, connections between objects (relations
of various kinds) are also an important structural component of social media and it is important to
The dynamics of publishing of posts and comments on facebook…
3
two-point – a relation where each elementary link unites two objects;
understand that these relations are established at the level of decomposition of objects (CD/MD,
D/S). Usually these relations are:
• elementary – a relation has the one target identity;
•
• horizontal – a relation that combines objects at the same level of the hierarchy, see Fig. 1c;
• homogeneous – a relation that unites identical constituents/components.
By fixing relations (their target identity) on the set of container objects (and/or their
constituents/components), we obtain a graph of relations. It stands to mention that all the edges in
the graph (at a fixed target identity) are either directional or non-directional (mixing is prohibited,
see Fig. 1d). The graph can then be marked and weighed both by edges and by vertices, depending
on the purpose of analysis and target identity of relations. Multiple edges (if any) are then replaced
by a single edge, but the weights of multiple edges and degree of multiplicity are recorded as
additional parameters into the weight of the final edge.
The approach to the representation of structural elements of social media as a hierarchy of
container objects and their relations is more formal, universal and constructive than other known
approaches [4, 5].
The hierarchy of objects and the relations between them are encoded as a tabular key-value
store, as a relational database, or as RDF triples, depending on configuration of data and the
purpose of analysis [6]. In particularly difficult cases, all three methods of data representation are
usually combined (with regard to their ranges of adequacy). We implement full transition from
character identifiers to variable size unsigned integer identifiers for encoding (from bit fields up to
64-bit number representation). It significantly speeds up the processing of data (including
processing on GPU, clusters and GRID systems), allows to manage memory flexibly and to use
standard tools for storage and processing. A detailed description of the encoding methods and of
data processing is beyond the scope of this article and it is not included.
#
1
…
N
ID of post
ID of post's author
Time of publication
of post
(a)
MessageID
(unsigned INT64)
UserAccountID
(unsigned INT64)
TimeMessageCreate
(Unix Time)
…
…
…
MessageID
(unsigned INT64)
UserAccountID
(unsigned INT64)
TimeMessageCreate
(Unix Time)
ID of comment
MessageID
(unsigned INT64)
…
ID of comment's
author
UserAccountID
(unsigned INT64)
…
Time of publication
of comment
ID of post
(or ID of parental comment)
(b)
TimeMessageCreate
(Unix Time)
MessageID
(unsigned INT64)
…
…
MessageID
(unsigned INT64)
UserAccountID
(unsigned INT64)
TimeMessageCreate
(Unix Time)
MessageID
(unsigned INT64)
#
1
…
N
#
1
…
N
ID of post's or
comment's author
UserAccountID
(unsigned INT64)
…
URL of post's or
comment's author
UserAccountURL
(string)
…
UserAccountID
(unsigned INT64)
UserAccountURL
(string)
(c)
#
1
…
N
ID of post or
comment
MessageID
(unsigned INT64)
…
MessageID
(unsigned INT64)
URL of post or
comment
MessageURL
(string)
…
MessageURL
(string)
Fig. 2. of the representation of input data: (a) – posts; (b) – comments; (c) – reference tables.
4
A. V. Makarenko
For the purposes of this article, we have analyzed one social media platform (Facebook) and
two levels of hierarchy (user accounts and messages). Messages have been divided into two types:
posts and comments. The content of messages has not been analyzed. Two metadata parameters
have been included into the analysis: author and date of publishing. The analysis has been limited to
the posts published by the users on their own timelines (account pages). The initial data was
provided by "Digital Society Laboratory (DSL)" under the agreement of cooperation with the
Institute of Control Sciences RAS. These data have been processed and presented as arrays, as seen
in Fig. 2a and 2b. These arrays are used as input data for the processing program. Numeric IDs have
been associated with actual URLs by means of reference tables (see Fig. 2c).
3. Results and Discussion
Summary information on the analyzed period (for posts) is shown in Table 1.
Summary information on the analyzed period (for posts)
Table 1.
Parameter
Date of publication of the first analyzed post
Date of publication of the last analyzed post
Duration of the analyzed period
Number of published posts
Number of active user accounts
the number of posts:
Representation Value
pst
bT
pst
eT
pst
beT
pstN
uac
pstN
January 1, 2013, 00:00:01 UTC
July 2, 2013, 01:10:01 UTC
~ 152 days
96 745 854
2 864 213
Table 1 can be used to determine basic performance (rate of publishing) for user accounts by
pst
S
uac
=
N
N
pst
uac
pst
≈
34
.
9
In fact, there is a strong variation in performance (4 orders of magnitude). Figure 3a shows the
distribution
. The
median of
uac
pstδ of the number of user accounts by the number of published posts
pst
uacS
max pst
uac
uacS
P = , see Fig. 3b. Maximum performance of
)
(
pst
uac
uacSδ
pst
In Figure 3a, we see a local maximum in dependence
(area
f100). Detailed analysis indicates that the area of the anomaly f100, as a first-order approximation,
f100 = [85,160]
has the following limits:
, see Fig. 3c. They are detected by a deviation in the
monotony and smoothness of dependence of
. Excluding area f100, this dependence can
uac
pst
uacSδ
pst
be approximated with acceptable adequacy by the following formula:
35922
=
.
in the area
pst
uacS
pst
uacS
pst
uacS
102
=
)
(
uac
δ
pst
(
S
pst
uac
)
=
41
−
0
(
S
pst
uac
)
1
−
295376
(
2.78
0.1
+
S
pst
uac
−
1.545
)
1
+
1
.
Whereby the relative error of approximation does not exceed 0.137 on the interval of 1
For
underscore that the interval of 1
the error increases (due to the increased fluctuations of
covers 98.22 % of all user accounts.
245
.
uac
pstδ ). It is necessary to
245
pst
uacS
245
pst
uacS≤
≤
>
≤
Figure 3d shows the difference:
′
uac
δ
pst
pst
uacS≤
uac
δ δ
pst
uac
pst
−
=
As a first-order approximation, the summation of
.
pstδ′
uac
value in area f100 gives us an estimate
The dynamics of publishing of posts and comments on facebook…
5
0
96623+
5181
−
of
analysis to identify specific user accounts in area f100.
for the total of abnormal user accounts. At the moment, we are performing the
f100
(a)
1
10
100
1000
104
pst
uacS
data
uac
pstδ
(c)
uac
pstP
1.0
0.8
0.6
0.4
0.2
pstδ′
uac
5000
4000
3000
2000
1000
(b)
1
10
100
pst
uacS
1000
104
(d)
lb, rb – bounds of f100
lb
rb
uac
pstδ
105
104
1000
100
10
1
uac
pstδ
6000
5000
4000
3000
2000
1000
0
60
80
100
140
120
pst
uacS
(
uac
pst
uacSδ
pst
)
160
180
0
60
80
100
120
pst
uacS
140
160
180
Fig. 3. (a) – dependence
; (b) – cumulative share of user accounts, depending on the increase in
performance
area f100.
pst
uacS
; (c) – a close up of the area of anomaly f100; (d) – graph of relative value
pstδ′
uac
in
Share distribution of published posts
pstp (of the total
pstN ) as a function of the
performance of user accounts
pst
uacS
is very informative. The distribution is defined by:
(
pst
uac
pst
uac
S
pst
uac
(
S
.
=
S
)
)
pst
p
uac
δ
pst
N
pst
(b)
0.008
pstp
0.006
0.004
0.002
0.000
f100
(a)
a8
1
10
100
1000
104
pst
uacS
1.0
pstP
0.8
0.6
0.4
0.2
0.0
Fig. 4. (a) – Distribution of the share of posts
of
; (b) – cumulative share of posts
pst
uacS
pstP in function
pst
uacS
.
f100
1
10
100
1000
104
pst
uacS
pstp corresponding to the accounts with the performance
10
1
1
10 min.
100
1 hour
1 day
104
106
pst
uacτ
6
A. V. Makarenko
pst
uacS
9
Figure 5 is shows
pst
8
= ,
The distribution is shown in Fig. 4a where both areas f100 and a8, with the maximum of
can be seen. In view of the discrete nature of the variables, the value of this maximum is consistent
with the value of
= . Figure 4b shows that the median
P =
112
.
pst
uacS
pst
pst
uacS
pst
pst
3
max
43703
uacτ =
uacτ =
1291507
uacτ , i.e. the distribution of time intervals (in seconds) between publishing
seconds (about 12 hours). The
of posts for individual user accounts. The median
(about 149.48 days). There is a considerable
maximum registered interval
proportion of intervals equal to 0, in total – 365349 intervals. Apparently, these 0 intervals are
registered, because UnixTime has the resolving power of 1 second.
p
τδ
uac
105
104
103
102
fortnight
1 week
2 days
Fig. 5. The distribution of time intervals (in seconds) between publishing of posts by individual user
accounts.
Figure 5 shows that the most common time intervals between posts of individual user accounts are
1 hour, 1 day, 2 days, 1 week and 2 weeks. The interval of 1 week is much more common than the
intervals of 3, 4, 5 days and even than 2 days.
To illustrate the scope of performance values of various accounts, we make the following
basic estimates, with normalization to the duration of analysis period:
• 10 posts per user account, about 1 post every two weeks;
• 100 posts per user account, about 2 posts every three days;
• 35 922 posts per user account (the registered maximum), a post every six minutes.
The following points are worth mentioning:
1. The performance of 1 post per week (two weeks) is a typical performance of regular users,
writing on topics important to them.
2. The performance of 1-2 posts a day (two days) is a typical performance of professional
copywriters or users who actively share photos via their mobile devices.
3. User accounts with higher performance values (over 1 post per hour) are usually communities,
news agencies or advertising spam bots.
Summary information on publishing of comments is presented in Table 2.
The dynamics of publishing of posts and comments on facebook…
7
Summary information on the analyzed period (for comments)
Table 2.
Parameter
Date of publication of the first analyzed comment
Date of publication of the last analyzed comment
Duration of the analyzed period
Number of posts with comments
Number of authors of posts that have comments.
Number of published comments
Number of commentators
comments:
Representation Value
cmt
bT
cmt
eT
1 Janurary 2013, 0:0:2 UTC
2 June 2013, 0:11:9 UTC
pst
beT
pst cN
uac
pst cN
cmtN
uac
cmtN
~ 152 days
5 893 995
660 961
21 366 037
2 030 855
Table 2 can be used to determine basic performance for user accounts by the number of
(b)
1
10
100
1000
104
cmt
uacS
(d)
1
10
100
1000
104
cmt
uacS
(c)
cmt
uacS
104
1
10
1000
100
(
Fig. 6. (a) – dependence
; (b) – cumulative share of user accounts, depending on the increase in
)
cmt
uacSδ
; (d) – cumulative share of published comments, depending
performance
on the increase in the user account performance.
)
; (c) – dependence
uac
cmt
uacSδ
cmt
cmt
uacS
cmt
(
In fact, there is a significant variation in performance values (4 orders of magnitude). Figure 6a
cmtδ , depending on the number of published
shows the distribution of the number of user accounts
uac
P = ,
2
see Fig. 6b. Maximum performance
comments
cmt
. The median of
cmt
uacS
cmt
uac
uac
S
cmt
S
uac
=
N
N
cmt
uac
cmt
≈
10.5
.
(a)
10
100
1000
104
cmt
uacS
uac
cmtP
1.0
0.9
0.8
0.7
0.6
0.5
1.0
cmtP
0.8
0.6
0.4
0.2
0.0
uac
cmtδ
106
105
104
103
102
10
1
1
106
cmtδ
105
104
103
8
A. V. Makarenko
=
cmt
uacS
of max
function of user performance
8408
cmtδ is the distribution of the number of published comments in the
. In Fig. 6c,
cmt
uacS
:
cmt
δ
S
cmt
uac
uac
δ
cmt
(
S
cmt
uac
)
,
(
S
cmt
uac
)
=
, see Fig. 6d.
the median of
cmt
uacS
cmt
P
=
71
receive comments:
Table 2 can be used to make a basic estimate of the number of comments on posts that
S
cmt
pst c
=
N
N
cmt
pst
cmt
≈
3.6
.
Figure 7a presents the real distribution
cmt
pst cS
the number of comments
registered aggregation of max
published comments in the function of the number of comments per post
pst cδ of the number of posts with comments, depending on
= , see Fig. 7b. The maximum
cmtδ of the number of
cmt
pst cS
. The median of
cmt
pst cS
. Figure 7c shows distribution
4756
cmt
pst cS
pst c
P
=
2
:
the median of
cmt
pst cS
cmt
P
cmt
(
S
δ
)
=
= , see Fig. 7d.
cmt
pst c
7
S
cmt
pst c
pst c
δ
S
cmt
pst c
(
)
,
(b)
1
10
100
1000
cmt
pst cS
1
10
100
1000
cmt
pst cS
(c)
1.0
cmtP
0.8
0.6
0.4
0.2
(d)
1000
cmt
pst cS
1
10
100
1000
cmt
pst cS
1
10
100
(
)
pst c
cmt
pst cSδ
Fig. 7. (a) – dependence
increase in the number of comments per post
published comments, depending on the increase in the number of comments per post
; (b) – cumulative share of posts with comments, depending on the
; (d) – cumulative share of
; (c) – dependence
cmt
pst cSδ
cmt
pst cS
)
(
cmt
cmt
pst cS
.
(a)
pst cP
1.0
0.9
0.8
0.7
0.6
0.5
pst cδ
106
105
104
103
102
10
1
cmtδ
106
105
104
103
The dynamics of publishing of posts and comments on facebook…
9
Figure 8a shows distribution
cmt s
pst cS
number of comments per post
median of
cmt s
pst cS
pst c
P
pst cδ of the number of posts with comments, depending on the
registering only the comments by the author of the post. The
= , see Fig. 8b. The maximum registered aggregation of max
0
cmt s
pst cS
=
688
.
(b)
pst cδ
106
104
100
1
0
1
5
10
uac
pst cδ
105
104
103
102
10
1
cmtδ
105
104
103
(a)
1.0
pst cP
0.9
0.8
0.7
0.6
uac
pst cP
(a)
1.0
0.9
0.8
0.7
0.6
0.5
0.4
0.3
1.0
cmtP
0.8
0.6
0.4
0.2
0.0
Fig. 8. (a) – dependence
increase in the number of comments per post
cmt s
pst cSδ
pst c
50 100
)
(
500
cmt s
pst cS
; (b) – cumulative share of posts with comments, depending on the
cmt s
pst cS
50 100
500
5
10
0
1
cmt s
pst cS
registering only the comments by the author of the post.
1
10
100
1000
(b)
104
S
cmt
uac p
(d)
1
10
100
1000
104
S
cmt
uac p
(c)
1000
)
1
10
100
104
S
cmt
uac p
1
10
100
1000
104
S
cmt
uac p
Fig. 9. (a) – dependence
depending on
(c) – dependence
in the number of comments made by the author of the post
(
uac
Sδ
pst c
increase
the
)
(
cmt
Sδ
cmt
uac p
in number of comments made by
; (b) – cumulative share of the authors of the posts with comments,
cmt
pst cS
;
; (d) – cumulative share of the published comments, depending on the increase
the author of
the post
cmt
uac p
cmt
pst cS
.
Table 2 can be used to make a basic estimate of the number of comments made by the
author of the post with comments:
10
A. V. Makarenko
cmt
S
uac p
=
N
N
cmt
uac
cmt
≈
32
.
Figure 9a shows the real distribution
S
comments they received
registered aggregation of max
published comments in the function of the number of comments
comments by the author of the post:
(
S
uac
pst cδ of the number of authors, depending on the number of
= , see Fig. 9b. The maximum
cmtδ of the number of
registering only the
. Figure 9c shows distribution
cmt
pst cS
. The median of
cmt
uac p
cmt
uac p
S
33585
uac
P
pst c
cmt
uac p
cmt
uac p
cmt
uac p
uac
pst c
δ
=
S
4
,
S
(
)
)
the median of
S
cmt
uac p
cmt
P
=
Figure 10a shows distribution
δ
321
cmt
=
cmt
uac p
S
, see Fig. 9d.
number of commentators they attracted
maximum observed aggregation of max
uac c
pst cS
uac c
pst cS
=
. The median of
2252
.
pst cδ of the number of posts with comments, depending on the
1
= , see Fig. 10b. The
pst c
P
uac c
pst cS
pst cδ
106
105
104
103
102
10
1
(a)
1.0
pst cP
0.9
0.8
0.7
0.6
0.5
(b)
1
5
10
50 100
uac c
pst cS
500 1000
; (b) – cumulative share of posts with comments, depending on the
5
1
10
uac c
pst cS
Fig. 10. (a) – dependence
increase in the number of comments per post.
50 100
(
500 1000
)
uac c
pst cSδ
pst c
Figure 11a shows distribution
depending on the number of commentators they attracted
S
uac c
S
Fig. 11b. The maximum registered aggregation of max
uac p
uac c
uac p
=
. The median of
12263
.
uac
pst cδ of the number of authors of posts with comments,
= , see
S
3
uac
P
pst c
uac c
uac p
uac
pst cδ
105
104
103
102
10
1
1
10
100
1000
uac
pst cP
(a)
1.0
0.9
0.8
0.7
0.6
0.5
0.4
0.3
(b)
Fig. 11. (a) – dependence
depending on the increase in the number of commentators per post.
uac c
uac p
(
Sδ
uac
pst c
)
104
1
10
100
1000
uac c
S
uac p
; (b) – cumulative share of authors of posts with comments,
uac c
uac p
S
104
The dynamics of publishing of posts and comments on facebook…
11
Figure 12a shows distribution
S
number of posts per commentator
maximum registered number of posts per one commentator is max
cmtδ of the number of authors of comments, depending on the
uac
P = , see Fig. 12b. The
pst c
uac cS
cmt
=
. The median of
2
4068
pst c
uac c
S
.
uac c
uac p
uac
uac
cmtδ
106
105
104
103
102
10
1
1
10
(a)
uac
cmtP
1.0
(b)
0.9
0.8
0.7
0.6
0.5
1000
pst c
uac cS
1
10
100
1000
pst c
uac cS
100
(
)
Fig. 12. (a) – dependence
increase in the number of posts made by the author of a comment.
uac
pst c
uac cSδ
cmt
; (b) – cumulative share of the authors of comments, depending on the
Figure 13a shows distribution
uac p
number of authors of posts per commentator
uac c
maximum registered number of authors of posts per commentator is max
cmtδ of the number of authors of comments, depending on the
uac
P = , see Fig. 13b. The
cmt
uac p
uac cS
. The median of
1
521
=
uac p
uac cS
S
.
uac
uac
cmtδ
106
105
104
103
102
10
1
1
5
10
50
(a)
uac
cmtP
1.0
(b)
0.9
0.8
0.7
0.6
uac p
uac cS
500
1
5
10
50
100
uac p
uac cS
500
100
)
(
Fig. 13. (a) – dependence
increase in the number of authors of posts per author of a comment.
uac
uac p
uac cSδ
cmt
; (b) – cumulative share of authors of comments, depending on the
pst
f cτ . The median
Figure 14a shows distribution
pst cδ of the number of posts with comments, depending on
the time delay from the moment of publication of the post to the publication of the first
seconds (about 51 minutes). The maximum registered
comment
time delay max
seconds (about 5 years 9 months), see Fig. 14b. The most
common time delay is 50 seconds (see area g50 in Fig. 14a). Time delay intervals of 0 – 86 seconds
have been registered. Apparently, these 0 intervals are registered, because UnixTime has the
resolving power of 1 second.
f c Pτ
182274110
pst
f cτ =
3076
pst c
=
pst
12
pst cδ
1000
100
10
1
g50
1
100
104
A. V. Makarenko
1.0
pst cP
0.8
(a)
(b)
0.6
0.4
0.2
0.0
108
pst
f cτ
1
100
104
106
pst
f cτ
108
106
)
(
δ τ ; (b) – cumulative share of posts with comments, depending on the
Fig. 14. (a) – dependence
increase in the delay between the moment of publication of the post and the time of publication of the first
comment.
pst
f c
pst c
pst
pst c
pst
:
τ
f c
< =
11901711
for negative
It stands to mention that negative values of
the posts with comments. The median
180523
−
pst
f cτ = −
f cτ have been registered, 18273 in total or
time values
0.31 % of all
pst
Pτ
0
seconds (about 2 days 2 hours), see Fig. 15. The maximum registered
f c
negative delay time min
seconds, whereby the publishing of a comment precedes
the publishing of the post by about 4 months 17 days. A bug in Facebook can be one of the possible
causes [7].
pst cδ
14
12
10
8
6
4
2
0
pst c
(
pst
f c
time values between
)
δ τ
Fig. 15. Dependence
for negative
delay
the moment of
publication of the post and the time of publication
of the first comment.
pst
f cτ
-106
-104
-100
-1
104
103
102
10
1
h21
1 day
2 days
7 das
8 days
1
100
104
106
cmt
uacτ
Fig. 16. The distribution of time intervals (in seconds) between publishing of comments by different user
accounts.
The dynamics of publishing of posts and comments on facebook…
13
Distribution
cmt
uacτ of the time intervals (in seconds) between the publishing of comments by
uacτ =
seconds (about 86 minutes).
different user accounts is shown in Fig. 18. The median
1
1290045
The maximum registered interval
(about 149.311 days). There is a
considerable number of 0 intervals, 3265613 in total. Apparently, these 0 intervals are registered,
because UnixTime has the resolving power of 1 second.
cmt
uacτ =
Figure 16 shows that the most common intervals are from 1 to 8 days with 24 hour
increments. There is a notable local maximum of 21 seconds (h21).
cmt
5163
max
4. Conclusion
The article presents the results of the analysis of Facebook, which has been carried out from
the standpoint of the dynamics of publishing of posts and comments. The object of the study is the
Russian segment of the network in the period from 1.01.2013 to 02.06.2013. The content of posts
and comments has not been analyzed. Two initial parameters have been used in the analysis: author
and time of publication of a message.
The analysis and the calculations have yielded a set of descriptive values that provide insight
into the processes of publishing of posts and comments by the users of Facebook. Several
distinguished features have been identified:
1) A significant anomaly in the number of user accounts with the performance of approximately
two posts per three days has been detected. The total number of such accounts exceeds the
theoretical value by
. The theoretical value has been calculated by approximated
power distribution.
0
96623+
5181
−
2) About 50 % of all posts are published by users with the performance of no more than three
posts per two days.
3) The average time interval (median) between publishing of posts for individual user accounts is
about 12 hours.
4) About 50% of all comments are published by users with the performance of no more than one
comment per two days.
5) About 50% of the posts that have at least one comment have no more than two comments.
6) About 50% of all comments are made on posts that receive no more than 7 comments.
7) About 55% of posts with at least one comment are not commented by the authors themselves.
8) About 50 % of users with posts that receive at least one comment, in total, get no more than
4 comments each (during the period of the analysis ~ 152 days).
9) About 50 % of all comments are received by authors of posts (with at least one comment) that,
in total, receive no more than 321 comments each (during the period of the analysis).
10) About 50% of the posts that have at least one comment have no more than one commentator.
11) About 50 % of all comments are received by authors of posts (with at least one comment) that
have no more than three commentators.
12) About 50% of all commentators commented on no more than one post each (during the period
of the analysis ~ 152 days).
13) About 50% of all commentators commented on posts of no more than one other user account
each (during the period of the analysis ~ 152 days).
14) About 50% of the posts receive the first comment within 51 minutes after the publication of the
post. The most probable time of first comment is 50 seconds after the publication of the post.
14
A. V. Makarenko
The maximum registered delay time between the publication of the post and the first comment
is 5 years 9 months.
15) We have determined that 18273 posts have negative time difference between their publication
moment and the first comment [7]. About 50% of these posts have negative delay time of up to
20 days 2 hours.
16) About 50% of the commentators (with two or more subsequent comments) publish comments at
the interval of no more than 86 minutes. This interval have a notable local maximum of
21 seconds.
Our results allow to assess the dynamics of publishing of posts and comments in the Russian
segment of Facebook. These results are important for addressing a number of other issues,
including:
• Studying the structural (topological and metric) characteristics of network-describing links
between commentators and posts authors.
Identifying sustainable communities of users from the standpoint of the stationary nature of
their relations when commenting on posts.
Identifying the most efficient user accounts using the criterion of their information activity
(their appeal to the community of users).
•
•
• Developing an adequate quantitative model for studying and forecasting informational activity
of Facebook users (in terms of writing posts and comments).
The author is grateful to Professor D. A. Novikov for his support and interest to this study,
as well as to Ph.D. D. A. Gubanova for the preparation of the initial data.
Acknowledgements
References
1. Ahlqvist T., Bäck, A., Halonen M. and Heinonen S. Social media road maps exploring the futures
triggered by social media // VTT Research Notes (2008) 2454:13.
2. Kaplan A.M. and Haenlein M. Users of the world, unite! The challenges and opportunities of social
3. Governor J., Hinchcliffe D. and Nickull D. Web 2.0 Architectures: What Entrepreneurs and Information
media. // Business Horizons (2010) 53:1. p. 61.
Architects Need to Know. O'Reilly (2009).
4. Hassanien A.E., Abraham A. and Snsel V. Computational Social Network Analysis Trends, Tools and
Research Advances. New York: Springer (2009).
5. Bing L. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data. New York:
Springer (2011).
6. Resource Description Framework (RDF) Model and Syntax Specification. Eds: O. Lassila and Ralph R.
Swick // W3C Proposed Recommendation 05 January 1999.
7. FaceBook Developers: Bugs created_time incorrect in Posts (2013, Nov.). [Online]. Available:
URL: https://developers.facebook.com/bugs/514380435304761
Andrey V. Makarenko – was born in 1977, since 2002 -- Ph. D. of Cybernetics. Founder and leader of the
Research & Development group "Constructive Cybernetics". Author and coauthor of more than 60 scientific
articles and reports. Member IEEE (IEEE Signal Processing Society Membership; IEEE Computational
Intelligence Society Membership). Research interests: Analysis of the structure dynamic processes,
predictability; Detection, classification and diagnosis is not fully observed objects (patterns); Synchronization
and self-organization in nonlinear and chaotic systems; System analysis and math. modeling of economic,
financial,
systems and processes; Convergence of Data Science,
Nonlinear Dynamics and Network-Centric.
social and bio-physical
|
1310.4899 | 1 | 1310 | 2013-10-18T03:33:35 | Laplacian Spectral Properties of Graphs from Random Local Samples | [
"cs.SI",
"cs.DM",
"math.OC"
] | The Laplacian eigenvalues of a network play an important role in the analysis of many structural and dynamical network problems. In this paper, we study the relationship between the eigenvalue spectrum of the normalized Laplacian matrix and the structure of `local' subgraphs of the network. We call a subgraph \emph{local} when it is induced by the set of nodes obtained from a breath-first search (BFS) of radius $r$ around a node. In this paper, we propose techniques to estimate spectral properties of the normalized Laplacian matrix from a random collection of induced local subgraphs. In particular, we provide an algorithm to estimate the spectral moments of the normalized Laplacian matrix (the power-sums of its eigenvalues). Moreover, we propose a technique, based on convex optimization, to compute upper and lower bounds on the spectral radius of the normalized Laplacian matrix from local subgraphs. We illustrate our results studying the normalized Laplacian spectrum of a large-scale online social network. | cs.SI | cs |
Laplacian Spectral Properties of Graphs from Random Local Samples
Zhengwei Wu
Victor M. Preciado
Abstract
The Laplacian eigenvalues of a network play an impor-
tant role in the analysis of many structural and dynam-
ical network problems. In this paper, we study the re-
lationship between the eigenvalue spectrum of the nor-
malized Laplacian matrix and the structure of 'local'
subgraphs of the network. We call a subgraph local
when it is induced by the set of nodes obtained from
a breath-first search (BFS) of radius r around a node.
In this paper, we propose techniques to estimate spec-
tral properties of the normalized Laplacian matrix from
a random collection of induced local subgraphs. In par-
ticular, we provide an algorithm to estimate the spec-
tral moments of the normalized Laplacian matrix (the
power-sums of its eigenvalues). Moreover, we propose
a technique, based on convex optimization, to compute
upper and lower bounds on the spectral radius of the
normalized Laplacian matrix from local subgraphs. We
illustrate our results studying the normalized Laplacian
spectrum of a large-scale online social network.
1 Introduction
Understanding the relationship between the structure
of a network and its eigenvalues is of great relevance in
the field of network science (see [3], [16] and references
therein). The growing availability of massive databases,
computing facilities, and reliable data analysis tools
has provided a powerful
framework to explore this
relationship for many real-world networks. On the other
hand, in many cases of practical interest, one cannot
efficiently retrieve and/or store the exact full topology
of a large-scale network. Alternatively, it is usually easy
to retrieve local samples of the network structure. In
this paper, we focus our attention on local sample of
the network structure given in the form of a subgraph
induced by the set of nodes obtained from a breath-first
search (BFS) of small radius r around a particular node.
We study the relationship between the normalized
Laplacian spectrum of a graph and a random collection
of
local subgraphs. We show how local structural
information contained in these localized subgraphs can
be efficiently aggregated to infer global properties of the
normalized Laplacian spectrum. Our analysis reveals
that certain spectral properties, such as the so-called
spectral moments (the power-sums of the eigenvalues),
can be efficiently estimated from a random collection
of localized subgraphs. Furthermore, applying recent
results connecting the classical moment problem and
convex optimization, we propose a series of semidefinite
programs (SDP) to compute upper and lower bounds on
the Laplacian spectral radius from a collection of local
structural samples.
1.1 Previous Work Studying the relationship be-
tween the structure of a graph and its eigenvalues is
the central topic in the field of algebraic graph theory
[1],[3],[5],[12]. In particular, the spectrum of the Lapla-
cian matrix has a direct connection to the behavior of
several networked dynamical processes, such as random
walks [10], consensus dynamics [16], and a wide variety
of distributed algorithms [11].
In many cases of practical interest it is unfeasible to
exactly retrieve the complete structure of a network of
contacts, making it impossible to compute the graph
spectrum directly. However,
in most cases one can
easily retrieve local subgraphs obtained via BFS of
small radius. To estimate spectral properties from
localized structural samples, researchers have proposed
a variety of random network models in which they can
prescribe features retrieved from these samples, such
as the degree distribution [4],[15],
local correlations
[13],[17], or clustering [14].
Although random networks are the primary tool
to study the impact of local structural features on
spectral network properties [4], this approach presents a
major flaw: Random network models implicitly induce
structural properties that are not directly controlled
in the model construction, but can have a strong
influence on the eigenvalue spectrum. For example, it
is possible to find two networks having the same degree
distribution, but with very different eigenvalue spectra.
1.2 Our contribution In this paper, we develop a
mathematical framework, based on algebraic graph the-
ory and convex optimization, to study how localized
samples of the network structure can be used to com-
pute spectral properties of the normalized Laplacian
matrix of (possibly weighted) graphs. The following are
our main contributions:
• We develop a sublinear time algorithm to estimate
the spectral moments (power-sums of the eigenval-
ues) of the normalized Laplacian matrix of a graph
from a random set of local subgraphs samples. In
our analysis, we use Hoeffding inequality to provide
quality guarantees of our estimators as a function
of the number of samples.
• We provide a convex program to compute, in lin-
ear time1, upper and lower bounds on the Lapla-
cian spectral radius from a random set of local sub-
graph samples. Our results are based on recent re-
sults connecting the classical moment problem with
semidefinite programs (SDP).
2 Problem Formulation.
2.1 Notation and Preliminaries. Let G := (V,E)
be an undirected unweighted graph (or network), where
V := {v1, v2, ...vn} represents the set of nodes and
E ⊆ V×V represents the set of edges2. The neighborhood
of vi ∈ V is defined as Ni := {vj ∈ V : {vi, vj} ∈ E}.
The degree of node vi is di := Ni. A weighted graph
is defined as the triad H := (V,E,W), where W is
a weight function W : E → R+ that assigns a real
positive weight to each edge in E. We define the weight
coefficient as wij := W({vi, vj}) if {vi, vj} ∈ E, and
wij = 0 otherwise. The weighted degree of node vi in a
weighted graphs is defined as dH
i
j=1 wij .
A walk of length k from node vi0 to vik is defined as
an ordered sequence of vertices p := (vi0 , vi1 , . . . , vik ),
where {vil, vil+1} ∈ E, l = 0, 1, . . . , k − 1. If vi0 = vik ,
the walk is said to be closed. Given a walk p =
(vi0 , vi1 , . . . , vik ) in a weighted graph H, its weight is
defined as the product of the edge weights, ωH(p) :=
wi0i1 wi1i2 ....wik−1ik . The distance δij between nodes vi
and vj is defined as the minimum number of hops from
vi to vj.
:=Pn
The adjacency matrix of an unweighted network G
is defined as the n× n Boolean symmetric matrix AG :=
[aij], defined entry-wise as aij = 1 if vi is connected to
vj, and aij = 0 otherwise. The adjacency matrix of a
weighted graph H is defined as the symmetric matrix
WH := [wij ], where wij are the weight coefficients. The
degree matrix of a weighted graph H is the diagonal
matrix of its weighted degrees, i.e., DH = diag(dH
i ).
The normalized Laplacian matrix of a weighted graph
H is defined as
(2.1)
−1/2WHDH
−1/2.
LH := I − DH
1Our algorithm runs in linear time assuming that the size of
the local subgraphs are much smaller than n.
2We consider only graphs with no self-loops (i.e., edges of the
type {vi, vi}).
The normalized Laplacian LH is a symmetric, positive
semidefinite matrix [3]. Thus,
it has n nonnegative
eigenvalues λ1 ≥ λ2 ≥ . . . ≥ λn ≥ 0 and a full
set of orthogonal eigenvectors v1, . . . , vn. The largest
eigenvalue λ1 is called the spectral radius of LH, which
satisfies λ1 ≤ 2, [3]. Given a n × n symmetric matrix
M with (real) eigenvalues ν1, . . . , νn, we define the k-th
spectral moment of M as
(2.2)
mk(M ) :=
1
n
nXi=1
νk
i .
We now provide graph-theoretical elements to char-
acterize the information contained in local subgraphs
of the network. Given a weighted graph H, we de-
fine the r-th order neighborhood around node vi as the
subgraph Hi,r = (Ni,r,Ei,r,W) with node-set Ni,r :=
{vj ∈ V : δi,j ≤ r} and edge-set Ei,r := {{v, w} ∈ E s.t.
v, w ∈ Ni,r}. Notice that Hi,r is the subgraph of H
induced3 by the set of nodes that are at a distance r or
less from vi. This set of nodes can be found using a BFS
of radius r starting at node vi. Motivated by this in-
terpretation, we call Hi,r the egonet of radius r around
node vi. Egonets can be algebraically represented via
submatrices of the weighted adjacency matrix WH, as
follows. Given a set of k nodes K ⊆ V, we denote by
WH (K) the k × k submatrix of WH formed by selecting
the rows and columns of WH indexed by K.
In par-
ticular, given the egonet Hi,r, we define its adjacency
matrix as Wi,r(H) := WH (Ni,r). By convention, we as-
sociate the first row and column of the submatrix Wi,r
with node vi ∈ V (the 'center' of the egonet), which can
be done via a simple permutation of Wi,r.
2.2 Problem Statement. The Laplacian eigenval-
ues of a graph can be efficiently computed for graphs
of small and medium size. In graphs of large size, this
computation is much more challenging. Furthermore,
in many real-world networks, one cannot retrieve the
complete network structure due to, for example, pri-
vacy and/or security constrains (e.g. Facebook). Al-
ternatively, it is usually easy to retrieve local samples
of the graph structure in the form of egonets. For ex-
ample, one can acquire information about the network
structure by extracting egonets of radius r around a ran-
dom sample of nodes. Therefore, it is realistic to assume
that one does not have access to the complete topology
of a large-scale network; instead, one can access only a
(relatively small) number of egonets in the network.
Clearly, egonets do not completely describe the
it is impossible to compute
network structure; thus,
3An induced subgraph is a subset of the vertices of a graph G
together with any edges whose endpoints are both in this subset.
exactly the graph spectrum from local egonets.
In
this paper, we show that, despite this limitation, we
are able to compute many spectral graph properties
from the egonets. We show that given a (sufficiently
large) random collection of egonets of radius r, one
can efficiently estimate the spectral moments of the
normalized Laplacian matrix, mk(LH), for k ≤ 2r + 1.
Furthermore, we show that, given a truncated sequence
of spectral moments, one can derive bounds on relevant
spectral properties, such as the spectral radius of the
Laplacian. As part of our analysis, we provide quality
guarantees for all the estimators and bounds herein
proposed.
3 Spectral Moments for Random Egonets
We start our analysis assuming the (unrealistic) situ-
ation in which one can access all the egonets in the
network. Under this assumption, we shall derive ex-
pressions for the spectral moments of the normalized
Laplacian matrix. Afterwards, we shall relax our as-
sumptions and consider the more realistic case in which
one can only access a (relatively small) number of ran-
dom egonets.
In this case, we propose estimators for
the spectral moments and analyze their quality using
Hoeffding inequality.
3.1 Spectral Moments as Averages. We derive
an expression for the k-th spectral moments of the
normalized Laplacian matrix of a weighted graph, LH,
from local egonets of radius r, Hi,r. In our derivations,
we use the following lemma from algebraic graph theory
[1]:
Lemma 3.1. Let H be an undirected, weighted graph
with adjacency matrix WH = [wij ], then
(3.3)
H(cid:3)ii = Xp∈Pi,k
(cid:2)W k
ωH(p),
where (cid:2)W k
H(cid:3)ii is the (i, i)-th entry of the k-th power of
the adjacency WH and Pi,k is the set of all closed walks
of length k starting and finishing at node vi.
Using Lemma 3.1, we can compute the spectral
moments of the weighted adjacency matrix WH, as
follows:
Theorem 3.1. Consider a weighted, undirected graph
H with adjacency matrix WH. Let Wi,r(H) be the
(weighted) adjacency matrix of the egonet of radius r
around node vi, Hi,r. Then, the spectral moments of
WH can be written as
(3.4)
mk (WH) =
1
n
nXi=1(cid:2)W k
i,r (H)(cid:3)11
,
for k ≤ 2r + 1.
Proof. Since the trace of a matrix is the sum of its
eigenvalues, we can expand the k-th spectral moment
of the adjacency matrix as follows:
nXi=1(cid:2)W k
H(cid:3)ii .
(cid:2)W k
H(cid:3)ii
(3.5)
mk (WH) =
1
n
H(cid:1) =
Trace(cid:0)W k
1
n
that
From Lemma
3.1, we have
Pp∈Pk,i
=
ωH(p). Notice that for a fixed value of k,
closed walks of length k in H starting at node vi can
only touch nodes within a certain distance r (k) of
vi, where r (k) is a function of k. In particular, for k
even (resp. odd), a closed walk of length k starting
at node i can only touch nodes at most k/2 (resp.
⌊k/2⌋) hops away from vi. Therefore, closed walks of
length k starting at vi are always contained within
the neighborhood of radius ⌊k/2⌋.
In other words,
the egonet Hi,r of radius r contains all closed walks
of length up to 2r + 1 starting at node vi. We can
count these walks by applying Lemma 3.1 to the local
ωH(p)
adjacency matrix Wi,r.
(since, by convention, node 1
in the local egonet Hi,r corresponds to node i in the
graph H). Therefore, for k ≤ 2r + 1, we have that
(3.6)
is equal to (cid:2)W k
i,r (H)(cid:3)11
(cid:2)W k
i,r (H)(cid:3)11
In particular, Pp∈Pk,i
H(cid:3)ii .
ωH(p) =(cid:2)W k
= Xp∈Pk,i
Then, substituting (3.6) into (3.5), we obtain the state-
ment of our Theorem.
to
us
The
above
theorem allows
com-
pute a truncated sequence of
spectral moments
{mk (WH) , k ≤ 2r + 1}, given all the egonets of radius
r, {Hi,r, vi ∈ V}. According to (3.4), the k-th spec-
tral moment is simply the average of the quantities
, i = 1, ..., n. For a fixed k, each value
, i = 1, . . . , n, can be computed in time
(cid:2)W k
i,r (H)(cid:3)11
(cid:2)W k
i,r (H)(cid:3)11
O(cid:16)Ni,r3(cid:17), where Ni,r is the number of nodes in the
local egonet Hi,r. Notice that, if Ni,r = o (n), we
can compute the k-th spectral moments in linear time
(with respect to the size of the network) using (3.4).
In what follows, we use the above results to compute
the spectral moments of the Laplacian matrix of a
weighted graph, LH. Before we present our results, we
define the so-called Laplacian graph:
Definition 3.1. Given a weighted graph H, we define
its Laplacian graph as L (H) := (cid:16)V,E ∪eE, Π(cid:17), where
eE := {{v, v} : v ∈ V} (the set of all self-loops), and the
weight function Π : E ∪eE → R is defined as:
Π ({vi, vj}) :=
for vi = vj,
for {vi, vj} ∈ E, vi 6= vj
otherwise,
1,
−wij√dH
0,
is the weighted degree of node vi in H.
(3.7)
where dH
i
i dH
,
j
Notice that the weighted adjacency matrix of the
Laplacian graph L (H), denoted by WL(H),
is equal
to the normalized Laplacian matrix of the weighted
graph H, LH. Thus, mk(LH) = mk(cid:0)WL(H)(cid:1) and we
can compute the spectral moments of the normalized
Laplacian matrix using weighted walks in the Laplacian
graph. In particular, the Laplacian spectral moments
satisfy
=
mk(LH) = mk(cid:0)WL(H)(cid:1)
L(H)iii
nXi=1hW k
nXi=1(cid:2)W k
i,r (L (H))(cid:3)11
1
n
1
n
=
(3.8)
i,r (L (H))(cid:3)11
where (cid:2)W k
graph L (H). Notice that (cid:2)W k
is the (1, 1)-th entry of the k-
th power of the weighted adjacency matrix representing
the egonet of radius r around node vi in the Laplacian
is a real
number that depends solely on the structure of the
egonet Wi,r(H); thus,
it is a variable that can be
computed using local information about the structure
of the network around node vi.
i,r (L (H))(cid:3)11
Thus, φ(k)
is a local variable associated to the r-th
i,r
neighborhood around node vi. According to (3.8), the
k-th Laplacian spectral moment can be computed as the
average,
(3.10)
mk(LH) =
1
n
nXi=1
φ(k)
i,r ,
Let us now assume that we do not have access to φ(k)
i,r ,
for all vi ∈ V; instead, we only have access to φ(k)
i,r for
vi ∈ S, where S ⊂ V is a subset of randomly sampled
nodes. Since the spectral moment is a global average,
we propose the following estimator of mk(LH):
(3.11)
1
S Xvi∈S
φ(k)
i,r .
emk(LH) :=
In what follows, we establish the quality of this estima-
tor using Chernoff-Hoeffding inequality.
Lemma 3.2. (Hoeffding Inequality) Let X1, X2, . . . , Xk
be independent random variables with P (Xi ∈ [a, b]) = 1
for 1 ≤ i ≤ k. Define the mean of these variables as
X = 1
i=1 Xi, then for any positive t, the following
inequality holds
kPk
P r{(cid:12)(cid:12)X − E(X)(cid:12)(cid:12) ≥ t} ≤ 2 exp(cid:18) −2kt2
(b − a)2(cid:19) ,
where E(X) is the expected value of X.
(3.12)
In order to apply the above lemma, we need the
following result:
In theory, if we had access to all the egonets in the
graph, we could calculate W k
i,r (L (H)) for all vi ∈ V,
and compute the spectral moments of the Laplacian
matrix in linear time (under certain sparsity assump-
tions). However, it is often impractical to traverse all
the egonets of a real-world large-scale network because
of high computational cost. In the following subsection,
we introduce a method to approximate the spectral mo-
ments of a network in sublinear time from a random
collection of s egonets and analyze the quality of our
approximation as a function of s.
i,r ≤ 2k−1
i,r satisfies 0 ≤ φ(k)
Lemma 3.3. The variable φ(k)
for all i ∈ [n], k ≥ 1.
Proof. Let λi and vi denote the eigenvalues and eigen-
vectors of the Laplacian matrix LH, for i = 1, 2, . . . , n.
Since LH is symmetric is always diagonalizable and it
has a complete set of orthonormal eigenvectors. Fur-
thermore, LH is also positive semidefinite; thus,
its
eigenvalues are nonnegative. Define the matrix V whose
columns are the eigenvectors vi, and the diagonal ma-
trix Λ = diag(λ1, λ2..., λn). Then, LH = V ΛV T , and
3.2 Sampling Egonets and Moment Estimation.
Define the following 'local' variable
(3.13)
Lk
H = V ΛkV T =
j vj vT
λk
j .
nXj=1
(3.9)
φ(k)
i,r :=(cid:2)W k
i,r (L (H))(cid:3)11
, k ≤ 2r + 1.
Notice that φ(k)
i,r is a function of the egonet of radius
r around node vi, since Wi,r (L (H)) is the weighted
adjacency matrix of the egonet in the Laplacian graph.
Denoting the i-th element of vector vj as vj,i, we have
(3.14)
[Lk
H]ii =
λk
j v2
j,i.
nXj=1
From (2.1), we have that [LH]ii = 1. Thus,
(3.15)
[LH]ii =
λj v2
j,i = 1.
nXj=1
According to [3], the eigenvalues satisfy 0 ≤ λi ≤ 2 for
any i ∈ [n]. Thus,
[Lk
H]ii =
λjv2
j,i · λk−1
j
nXj=1
≤
nXj=1
≤
nXj=1
= 2k−1,
λjv2
λjv2
1
j,i λk−1
j,i 2k−1
where we have used the fact that 2 ≥ λ1 ≥ λi, for all
i. Also, notice from (3.14), that every element in the
summation is nonnegative, then [Lk
H]ii is nonnegative.
From Lemmas 3.3 and 3.2, we obtain the following
quality guarantee on our estimator:
k S
Theorem 3.2. Consider a set S ⊂ V of nodes chosen
the k-th Laplacian spectral moment defined in (3.11)
satisfies
uniformly at random. Then, the estimator emk(LH) for
4k (cid:19) .
Pr{emk(LH) − mk(LH) ≥ tk} ≤ 2 exp(cid:18)−8t2
i,r for Xi and (cid:2)0, 2k−1(cid:3) for [a, b].
Proof. The proof is a direct application of Lemma 3.2
after substituting φ(k)
Using this result, we can calculate the number of
samples S needed to achieve a particular error in our
moment estimation with a given probability. For each
value of k, we denote by sk the sample size needed to
achieve an error tk with a probability less or equal to
4k (cid:17). Let us define the normalized error
εk := tk
samples, we
achieve an error tk with probability at most δk, i.e.,
2k−1 , then taking sk = 1
δk = 2 exp(cid:16) −8t2
Pr{emk(LH) − mk(LH) ≥ tk} ≤ δk.
4 Moment-Based Spectral Analysis.
2 ε−2
k ln 2
δk
ksk
Using Theorem 3.1, we can get a truncated sequence
of approximated spectral moments of the Laplacian
matrix LH, {mk(LH)}k≤2r+1, from a set of local egonets
of radius r. We now present a convex optimization
framework to extract information about the largest
eigenvalue of the weighted adjacency matrix, λ1 (LH),
from this sequence of moments.
4.1 Moment-Based Spectral Bounds We can
state the problem solved in this subsection as follows:
Problem. Given a truncated sequence of Laplacian
spectral moments {mk(LH)}k≤2r+1, find tight upper
and lower bounds on the largest eigenvalue λ1 (LH).
Our approach is based on a probabilistic interpreta-
tion of the eigenvalue spectrum of a given network. To
present our approach, we first need to introduce some
concepts:
Definition 4.1. Given a weighted, undirected Lapla-
cian matrix LH with (real) eigenvalues λ1, ..., λn, the
Laplacian spectral density is defined as,
(4.16)
µLH (x) ,
1
n
nXi=1
δ (x − λi) ,
where δ (·) is the Dirac delta function.
The spectral density can be interpreted as a discrete
probability density function with support 4 on the set of
eigenvalues {λi, i = 1...n}. Let us consider a discrete
random variable X whose probability density function
is µLH. The moments of this random variable satisfy
the following [19]:
EµLH(cid:0)X k(cid:1) = mk (LH) ,
for all k ≥ 0.
We now present a convex optimization framework
that allows us to find bounds on the endpoints of
the smallest interval
[a, b] containing the support of
a generic random variable X ∼ µ given a sequence
of moments (M0, M1, ..., M2r+1), where Mk , ´ xkdx.
Subsequently, we shall apply these results to find bounds
on λ1 (LH). Our formulation is based on the following
matrices:
Definition 4.2. Given
of moments
M2r+1 = (M0, M1, ..., M2r+1),
let H2r (M2r+1) and
H2r+1 (M2r+1) ∈ R(r+1)×(r+1) be the Hankel matrices
defined by5:
sequence
a
(4.17)
[H2r]ij
, Mi+j−2,
[H2r+1]ij
, Mi+j−1.
The above matrices are called the moment matrices
associated with the sequence M2r+1.
4Recall that the support of a finite Borel measure µ on R,
is the smallest closed set B such that
denoted by supp (µ),
µ (R\B) = 0.
5For simplicity in the notation, we shall omit the argument
M2r+1 whenever clear from the context.
Given a truncated sequence of moments of a proba-
bility distribution, we can compute a bound on its sup-
port as follows [8][7]:
Given a sequence of spectral moments, we can com-
pute upper bounds on the largest eigenvalue λ1 (LH)
using the following result [18][19]:
Theorem 4.1. Let µ be a probability density function
on R with associated sequence of moments M2r+1 =
(M0, M1, ..., M2r+1), all finite, and let [a, b] be the small-
est interval which contains the support of µ. Then,
b ≥ β∗ (M2r+1), where
β∗
r (M2r+1) := minx x
(4.18)
s.t. H2r (cid:23) 0,
x H2r − H2r+1 (cid:23) 0.
where
Theorem 4.3. Let LH be the normalized Laplacian
matrix of a weighted, undirected graph with (real) eigen-
values λ1 ≥ ... ≥ λn. Then, given a truncated se-
quence of
its Laplacian spectral moments m2r+1 =
(m0, m1, ..., m2r+1), we have that
Observe that,
for a given sequence of moments
M2r+1, the entries of xH2r − H2r+1 depend affinely on
the variable x. Then β∗ (m2r+1) is the solutions to a
semidefinite program6 (SDP) in one variable. Hence,
β∗ (M2r+1) can be efficiently computed using standard
optimization software, e.g.
[6], from a truncated se-
quence of moments.
Applying Theorem 4.1 to the spectral density
µLH of a given graph H with spectral moments
(m0, m1, ..., m2r+1), we can find a lower bound on its
largest eigenvalue, λ1 (LH), as follows [19]:
Theorem 4.2. Let LH be the normalized Laplacian
matrix of a weighted, undirected graph with (real) eigen-
values λ1 ≥ ... ≥ λn. Then, given a truncated
sequence of the spectral moments of LH, m2r+1 =
(m0, m1, . . . , m2r+1), we have that
(4.19)
λ1 (LH) ≥ β∗
r (m2r+1) ,
where β∗
r (m2r+1) is the solution to the SDP in (4.18).
Using the optimization framework presented above,
we can also compute upper bounds on the spectral
radius of H from a sequence of its spectral moments,
as follows. In this case, our formulation is based on the
following set of Hankel matrices:
Definition 4.3. Given the Laplacian matrix of a
weighted, undirected graph LH with n nodes and
spectral moments m2r+1 = (m0, m1, ..., m2r+1),
∈
let
T2r+1 (y; m2r+1, n)
R(r+1)×(r+1) be the Hankel matrices defined by7:
T2r (y; m2r+1, n)
and
(4.20)
(4.21)
[T2r]ij :=
[T2r+1]ij :=
n
n
n−1 mi+j−2 − 1
n−1 mi+j−1 − 1
n−1 yi+j−2,
n−1 yi+j−1.
6A semidefinite program is a convex optimization problem that
can be solved in time polynomial in the input size of the problem;
see e.g. [20].
7We shall omit the arguments from T2r and T2r+1 whenever
λ1 ≤ δ∗
r (m2r+1, n) ,
δ∗
r (m2r+1, n) := maxy
y
(4.22)
s.t. T2r (cid:23) 0,
yT2r − T2r+1 (cid:23) 0,
T2r+1 (cid:23) 0.
The optimization program in (4.22) is not an SDP,
since the entries of the matrices T2r (y; m2r+1, n) and
T2r+1 (y; m2r+1, n) are not affine functions in y. Never-
theless, the program is clearly quasiconvex [2] and can
be efficiently solved using a simple bisection algorithms.
In summary, using Theorems 3.1, 4.2, and 4.3, we
can compute upper and lower bounds on the largest
eigenvalue of the normalized Laplacian matrix of a
weighted, undirected network, λ1 (LH), from the set
of local egonets with radius r, as follows:
(Step 1 )
Using (3.4), compute the truncated sequence of mo-
ments {mk(LH)}k≤2r+1 from the egonets, and (Step 2 )
using Theorems 4.2 and 4.3, compute the upper and
lower bounds, δ∗
r (m2r+1), respec-
tively. However, the approach presented in this section
is based on the assumption that we have access to all
the egonets in the network. In Subsection 3.2, we have
provided estimators of the spectral moments from a ran-
dom sample of egonets. In the following subsection, we
will illustrate how to use these estimators to derive up-
per and lower bounds on the Laplacian spectral radius
from a random sample of egonets.
r (m2r+1, n) and β∗
4.2 Bounds on Spectral Radius from Sampling
Egonets From Theorem 3.2, we have that the k-th
Laplacian spectral moment mk = mk (LH) satisfies
4k (cid:19) ,
Pr{mk ∈ [emk − tk,emk + tk]} ≤ 2 exp(cid:18)−8t2
where emk = emk(LH) was defined in (3.11)8. Then,
the probability of a truncated sequence of moments
k S
8We shall omit the arguments LH from mk and emk unless
clear from the context.
there is need for specification.
if
(4.23)
tk =
2k−1
ln1/2
4r
1 − ∆
.
Proof. First, we have that
Pr 2r+1\k=2
k = 2, . . . , 2r + 1, satisfies the following proposition
(notice that m1 = 1, for any LH):
Proposition 4.1. For a given ∆ ∈ [0, 1], we have that
(mk)k≤2r+1 satisfying mk ∈ [emk − tk,emk + tk] for
{mk ∈ [emk − tk,emk + tk]}! ≥ ∆,
p2 S
Pr 2r+1\k=2
{mk ∈ [emk − tk,emk + tk]}!
= 1 − Pr 2r+1[k=2
{mk /∈ [emk − tk,emk + tk]}!
2r+1Xk=2
Pr (mk /∈ [emk − tk,emk + tk])
exp(cid:18)−8t2
4k (cid:19) .
2r+1Xk=2
≥ 1 − 2
≥ 1 −
k S
The last probability can be made equal to a desired ∆
by choosing t2
k/4k = α for all k = 2, . . . , 2k + 1 with α
satisfying ∆ = 1 − 4r exp (−8αS). Or equivalently,
α = 1
1−∆ , which implies the statement of the
Proposition, after simple algebraic manipulations.
8S ln 4r
We can then apply the result in Theorem 4.2 to
compute a probabilistic lower bound on the spectral
radius by solving a modified version of the SDP in
(4.18), as follows. First, given a sample set of nodes
S, we extract the corresponding egonets of radius r.
Then, using (3.11) and (3.9), we compute a sequence of
estimators emk for k = 2, . . . , 2r+1. Finally, according to
Proposition 4.1, we modify the SDP in (4.18) to obtain
our main result.
Theorem 4.4. Given a uniform sample set S ⊂ V
and the egonets of radius r around the nodes in S,
the spectral radius of the normalized Laplacian matrix
satisfies
x H2r − H2r+1 (cid:23) 0,
k = 2, . . . , 2r + 1,
emk − tk ≤ mk ≤ emk + tk,
Pr(cid:16)λ1 (LH) ≥ eβr(cid:17) ≥ ∆,
where
eβr := minx x
s.t. H2r (cid:23) 0,
H2r+1 defined in (4.17), and tk defined in (4.23).
with mk and emk defined in (3.9) and (3.11), H2r and
The proof of the above theorem is a direct adapta-
tion of Theorem 4.2 using Proposition 4.1. The same
adaptation can be applied to derive an upper bound on
the spectral radius of the normalized Laplacian matrix
from Theorem 4.3 and Proposition 4.1.
5 Numerical Analysis
In this section, we will present the numerical analysis
of spectral radius estimation, and verify the quality of
estimation based on sampled nodes. In our simulations,
we will use data from the Euro-Email network [9].
The network is composed of 36,692 nodes, which are
connected by 183,831 edges. Here we consider the
network as unweighted, undirected simple graph. Two
nodes are connected as long as either user sent email
to another. From the simple graph, we can construct
the weighted Laplacian graph that corresponds to the
simple graph.
To be able to compute the spectral radius, we
extract a small network with 5000 nodes via BFS, so
that we could compare the performance of sampling
with the accurate computation. The subgraph with
5000 nodes will be the object of our analysis.
The nodes are assigned with indexes without con-
sideration about their topology. To get a uniform sam-
pling, the indexes are picked randomly, which compose
the collection of sampled nodes.
In Figure 1, we take different number of samples
from the network to estimate the bounds of the spectral
radius based on egonet with radius r0 = 3.
In the
simulation, the normalized error bound for the elements
tk
in the moment sequence is fixed, i.e.
2k−1 = 0.08. Here
we assume that the moments for k = 1, 2...5 can be
accurately computed, because it does not cost much
to compute the power of the Laplacian matrix up to
5-th order. However, for the 6-th and 7-th moment,
we take uniform samples from the whole network and
approximate the moment using the estimator proposed
in the previous sections,
using average of the
sampled egonets to approximate the global average.
i.e.
Thus for each k > 5, mk ∈ [fmk − tk,fmk + tk]. With
the size of the sampled nodes increasing, the quality
(accuracy guarantee) of the estimator increases.
From the upper part of the figure, it can be seen
that the lower bound does not change much when the
number of samples changes. For the upper bound,
when the number of samples increases, the bound gets
looser, but the accuracy guarantee that the spectral
radius is within the bounds increase. The dotted lines
are the bounds calculated by considering the egonets
t
e
e
n
a
r
a
u
G
y
c
a
r
u
c
c
A
2.5
2
1.5
1
0.5
0
0
Lower Bound
Upper Bound
Spectral Radius
100
200
300
400
500
600
Number of Samples
Figure 1: Estimation when the size of the samples
varies. (1) The normalized error for each moment are
the same. Samples with different sizes give different
estimations of the bounds. (2) Quality guarantee is a
function of the size of the sample. When the number of
sample increases, the quality of the estimator increases.
i
s
u
d
a
R
l
a
r
t
c
e
p
S
f
o
n
o
i
t
a
m
i
t
s
E
2
1.8
1.6
1.4
1.2
1
0
5
10
15
20
25
Trial
30
35
40
45
Figure 2: Spectral bounds for trials with the same
sample size S = 21. When the number of samples are
the same,
25
20
15
10
5
0
1.65
Wrong Estimation: 14%
Accurate Estimation: 86%
1.7
1.75
1.8
1.85
1.9
1.95
2
2.05
2.1
Distribution of Estimation
of every nodes in the network. And the circles are
the estimated bounds when different sets of nodes are
taken as samples. The lower part of Figure 1 gives the
curve for the number of samples versus the accuracy
guarantee. Though the network has 5000 nodes, taking
600 samples will give the estimation with nearly 100
percent.
In Figure 2, we take different samples with the same
sample size to verify the quality of estimation. The
normalized error is set to be εk = 0.2, and δk = 0.4,
thus the sample size needed is S = 21. From the figure,
it can be seen that the lower bound is much loose, and
almost the same when the sample pool are different.
Checking whether the estimation range is correct for
each trial, we can see from Figure 3 that the accuracy
rate is 86%, which is much higher than the theoretical
accuracy probability 1 − δk = 0.6.
Figure 3: Distribution of estimation when the size of
the sample is the same.
6 Conclusion
In this paper, we apply graph theories and convex op-
timization techniques to study the spectrum property
of the normalized Laplacian matrix. Instead of analyz-
ing the whole network, we focus on localized structural
features with radius r.
Due to the high cost of traversing all the nodes, we
have proposed to take uniform samples from the net-
work pool and use the sampled egonets to estimate the
moments of the normalized Laplacian. With Hoeffding
inequalities, we characterize the quality of the estima-
tors in terms of normalized error and size of the sam-
ple. In addition, we have derived the lower and upper
bounds of the spectral radius by solving a series of SDP
problems, based on the collection of random subgraphs.
The combination of quality guarantee of moment se-
quence and the optimization problems provides us with
the estimation guarantee of the spectral radius.
References
[1] N. Biggs, Algebraic Graph Theory, Cambridge Uni-
versity Press, 1993.
[2] S. Boyd and L. Vandenberghe, Convex Optimiza-
tion, Cambridge university press, 2004.
[3] F. Chung, Spectral Graph Theory, vol. 92, AMS
Bookstore, 1997.
[4] F. Chung, L. Lu, and V. Vu, Spectra of random
graphs with given expected degrees, Proceedings of the
National Academy of Sciences, 100 (2003), pp. 6313–
6318.
[5] D. Cvetkovi´c, P. Rowlinson, and S. Simi´c, An In-
troduction to the Theory of Graph Spectra, Cambridge
University Press Cambridge, 2010.
[6] M. Grant, S. Boyd, and Y. Ye, Cvx: Matlab
software for disciplined convex programming, 2008.
[7] J.-B. Lasserre, Moments, Positive Polynomials and
Their Applications, vol. 1, World Scientific, 2009.
[8]
, Bounding the support of a measure from its
marginal moments, Proceedings of the American Math-
ematical Society, 139 (2011), pp. 3375–3382.
[9] J. Leskovec, Stanford large network dataset collec-
tion. http://snap.stanford.edu/data/index.html.
[10] L. Lov´asz, Random walks on graphs: A survey, Com-
binatorics, Paul erdos is eighty, 2 (1993), pp. 1–46.
[11] N.A. Lynch, Distributed algorithms, Morgan Kauf-
mann, 1996.
[12] B. Mohar and Y. Alavi, The laplacian spectrum of
graphs, Graph theory, combinatorics, and applications,
2 (1991), pp. 871–898.
[13] M. Newman, Assortative mixing in networks, Physical
review letters, 89 (2002), p. 208701.
[14]
, Random graphs with clustering, Physical review
letters, 103 (2009), p. 058701.
[15] M. Newman, S. Strogatz, and D. Watts, Random
graphs with arbitrary degree distributions and their
applications, Physical Review E, 64 (2001), p. 026118.
[16] R. Olfati-Saber, Flocking for multi-agent dynamic
systems: Algorithms and theory, IEEE Transactions on
Automatic Control, 51 (2006), pp. 401–420.
[17] R. Pastor-Satorras, A. V´azquez, and A. Vespig-
nani, Dynamical and correlation properties of the in-
ternet, Physical review letters, 87 (2001), p. 258701.
[18] V.M Preciado and A. Jadbabaie, Moment-based
spectral analysis of
large-scale networks using local
structural information, ACM/IEEE Transactions on
Networking, 21 (2013), pp. 373–382.
[19] V.M Preciado, A. Jadbabaie, and G.C. Vergh-
ese, Structural analysis of laplacian spectral properties
of large-scale networks, IEEE Transactions on Auto-
matic Control, 58 (2013), pp. 2338–2343.
[20] L. Vandenberghe and S. Boyd, Semidefinite pro-
gramming, SIAM review, 38 (1996), pp. 49–95.
|
1610.00086 | 1 | 1610 | 2016-10-01T04:59:05 | Consistency Ensuring in Social Web Services Based on Commitments Structure | [
"cs.SI",
"cs.AI"
] | Web Service is one of the most significant current discussions in information sharing technologies and one of the examples of service oriented processing. To ensure accurate execution of web services operations, it must be adaptable with policies of the social networks in which it signs up. This adaptation implements using controls called 'Commitment'. This paper describes commitments structure and existing research about commitments and social web services, then suggests an algorithm for consistency of commitments in social web services. As regards the commitments may be executed concurrently, a key challenge in web services execution based on commitment structure is consistency ensuring in execution time. The purpose of this research is providing an algorithm for consistency ensuring between web services operations based on commitments structure. | cs.SI | cs | Consistency Ensuring in Social Web Services Based on
Commitments Structure
Marzieh Adelnia
Department of Computer Engineering
University of Isfahan
Isfahan, Iran
[email protected]
Mohammad Reza Khayyambashi
Department of Computer Engineering
University of Isfahan
Isfahan, Iran
[email protected]
Abstract - Web Service is one of the most significant current
discussions in information sharing technologies and one of the
examples of service oriented processing. To ensure accurate
execution of web services operations, it must be adaptable with
policies of the social networks in which it signs up. This
adaptation implements using controls called "Commitment".
This paper describes commitments structure and existing
research about commitments and social web services, then
suggests an algorithm for consistency of commitments in social
web services. As regards the commitments may be executed
concurrently, a key challenge in web services execution based on
commitment structure is consistency ensuring in execution time.
The purpose of this research is providing an algorithm for
consistency ensuring between web services operations based on
commitments structure.
Index Terms– Commitment, Social Commitment, Consistency,
Social Network, Social Web Service, Web Service.
I.
INTRODUCTION
Web is the largest transformable-information framework.
Many research has been accomplished about the web and
related technologies in the past two decades. Web 1.0 as a
web of cognition, web 2.0 as a web of communication, web
3.0 as a web of co-operation and web 4.0 as a web of
integration are introduced as four generation of the web since
the advent of the web.
"Web 2.0 was presented in 2004 as a read-write web. The
technologies of web 2.0 allow assembling and handling large
global crowds with common interests in social interactions"
[1].
Today, web services have become one of the most
important information sharing technologies on the web and
one of the examples of service oriented processing. A Web
service is a software designed to support interoperable
machine-to-machine interaction over a network. It has an
interface described in a format that is processed by machine.
Other systems communicate with the web service in a format
of SOAP messages, typically conveyed using HTTP with an
XML serialization in conjunction with other web-related
standards. In fact a web service is an abstract notion that must
be implemented by a concrete agent. The agent is the base
component of software or hardware that sends and receives
messages, while the service is the resource characterized by
the abstract set of functionality that is provided. Although if
the agent changes, the web service don't change. According
to the W3C, a web service "is a software application
identified by a URI, whose interfaces and binding are capable
of being defined, described, and discovered by XML artifacts
and supports direct
interactions with other software
applications using XML based messages via Internet-based
applications".
In recent years, many users have registered in various
social networks that use web services. Regarding the growth
of social networks and the tendency of users for registering
on them, web services can be studied from a social computing
viewpoint. Social computing is an area of computer science
that is concerned with the intersection of social behavior and
computational systems. Social computing is basically the use
of a computer for social goals. A prime example for these
processes is applications based on web 2.0 like social
networks and blogs.
With merging service oriented computing and social
computing, social web services are produced that are more
complicated than regular web services. To ensure accurate
execution of web services operations, they must be adaptable
with the policies of the social networks in which they sign up.
This adaptation is implemented using controls called
"Commitment". In other words, transactions between web
services components and social networks lead to the creation,
management and use of commitments [2].
As regards to the concurrent execution of social web
services and commitments in a social network, consistency of
commitments is one of the most important challenges in this
topic. In previous research [3], commitments structure is
analyzed and based on their attributes classified. In this paper,
the algorithm is designed. In addition to this, supplemental
commitments are defined to optimizing the social web
services operation and the algorithm is checked with
Facebook dataset.
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201669https://sites.google.com/site/ijcsis/ ISSN 1947-5500 contracting. In SweetDeal approach, a business contract is a
set of activities that can be decomposed into sub-activities.
The terms of contracts use a set of commitments to execute
operation by agents. The algorithm uses a coordination
method to manage agent activities [9].
In 2005, Bentahar et al. presented a new persuasion
dialogue game for agent communication. They modeled
dialogue game by a framework based on social commitments
and arguments, named CAN1. CAN framework allows to
model dynamic communication in levels of activities that
agents apply to commitments and in levels of argumentation
relations. This dialogue game is specified by indicating its
entry, dynamic and exit conditions. They proposed a set of
algorithms for the implementation of the persuasion protocol
and discussed their termination, complexity and correctness
[10].
In 2006, Carabelea et al. studied the one of the main
challenge in multi agent system. This challenge was the
coordination ensuring of autonomous agent
in open
heterogeneous system. They used social commitments to
solve this challenge. In fact they combined two models of
coordinating agent, commitment-based interactions and
organizations. They described how one can use social
commitments to represent the expected behavior of an agent
playing a role
in an organization. They defined an
organizational structure as a collection of roles, where a role
is considered to be the subject of different types of social
commitments and policies [11].
In 2008, Narendra defined a contract as a collection of the
participant's commitments
toward each other. The
interactions that take place in a contract are understood in
terms of how they operate on the participant's commitments.
The operation on a commitment cause its state changes
according to a life cycle [12].
in
terms of
low
"existing
regards
formulated
In 2009, Singh et al. advocated for examining Service-
Oriented Architecture (SOA) principles from a commitment
service-oriented
perspective. As
architectures are
level
abstractions far removed from business services", In CSOA2,
the components are business services and the connectors are
patterns, considered as commitments, which protect key
elements of service engagements. Each participant is
implemented as an agent; interacting agents perform a service
engagement by creating and elaborating commitments to one
another [13].
In 2010, El-Menshawy et al. showed that current methods
fail to capture the meaning of interactions that arise in real-
life business scenarios and proofed commitments increase
flexibility and intuitively in protocols. They presented an
exploder definition for commitments for using in a larger
level.
their definition, a new grammar named
"Computation Tree Logic" (CTL) and terms like 𝑆𝐶𝑃 for
unconditional commitments and 𝑆𝐶𝐶
for conditional
In
II.
BACKGROUND
Many research exists about social web services,
commitments and consistency in web services. This section
provides an overview on these topics. The section is
partitioned into three groups and each group is assigned to
one topic.
A. Overview on Social Web Services.
The synergy between social computing and service
oriented computing has eventuated into social web services.
Existing research focuses on adoption of web services to
social networks.
In 2010, Maaradji proposed a social constructor named
"SoCo" that suggests and helps users for next their operations
(like selecting specific web service). So users may like to
perform an operation that their friends have done in social
networks [4].
In the other research in 2011, Maamar et al. categorized
social networks to three groups including [5]:
Collaboration social networks. "By emerging their
respective functionalities, social Web services have
the capacity to work together and response to
complex user requests. In fact, a social Web service
manages its own network of collaborators".
Substitution social networks. "Although social web
services compete against each other, they can still
help each other when they fail as long as they offer
similar functionalities."
Competition social networks. "Social web services
compete against each other when they offer similar
functionalities. Their non-functional properties
differentiate
them when users' non-functional
requirements must be satisfied."
Maamar also purposed an approach for weaving social
networks operation using web services. The results of his
research lead to creating social web services [6].
In 2013, Maamar et al. studied the social qualities that
web services present at run time to identify and assign
adequate social qualities to communities that host these web
services. They discussed the binding of communities of web
services to social qualities like selfishness. The quality of
communities is presented based on how web services respond
to the scenarios like collaboration, delegation, competition
and coopetition [7].
B. Overview on commitments
Fornara and Colombetti are the first who studied and used
for
formula
commitments. They defined a general
commitments and used them for speech evaluation [8].
In 2003, Grosof et al. proposed a rule-based method for
representation of e-contracting. It is named "SweetDeal" and
uses XML rules and ontologies for simulating business
1 Commitment and Argument Network
2 Commitment - based Service Oriented Architecture
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201670https://sites.google.com/site/ijcsis/ ISSN 1947-5500 commitments are added. CTL
tree and
commitments are the nodes of tree that are organized in the
tree base on logical regulation in transaction execution time
[14].
logical
is a
In 2012, Maamar et al. implemented social web services
using commitments. They presented
the architecture
implementing social web services installation in terms of
monitoring level, social level and service level. They
introduced "Responsibility" concept in social web services
and based on this concept, designed commitments for
responsibility of social web services [2].
In 2013, Maamar et al. presented a set of responsibilities
for social web services based on commitments and defined
requirement commitments for responsibilities. A key
challenge in this research is consistency ensuring between
commitments in social web services that this paper has
proceeded it [15].
In 2014, Sultan et al. merged knowledge and social
commitments and presented a new framework to model and
alter stochastic multi-agent systems. They defined a new
multi model logic called PCTLkc 1. The PCTLkc merge
probabilistic logic of knowledge (PCTLK) and probabilistic
logic of commitments (PCTLC) [16].
In 2015, Nardi et al. proposed a commitment-based
account of the concept of service that uses a core reference
ontology [17]. This mechanism called UFO-S2. UFO consists
of three base element as follows:
1. UFO-A. It is an ontology of objects.
2. UFO-B. It is an ontology of event.
3. UFO-C. It is an ontology of social entities based
on UFO-A and UFO-B.
C. Overview on Consistency in Web Services
In 2004, Heckel et al. discussed an approach to model
consistency management for component-based architectures
and its application to web service architectures. They
proposed an algorithm that receives activity diagram of web
service and translate it into CSP3. The CSP analyzes it for
deadlock freedom [18].
In 2005, Greenfield et al. proposed a protocol to checking
dynamic consistency. Their protocol can be run at the
termination of a service-based application. The key of their
work is establishing a relationship between internal service
states, messages and application-level protocols. This
protocol is based on the way that the reflection and transfer
of critical state within messages links the local consistency
expressions for each of the participating services. It should let
verify global consistency at termination without needing
global consistency expressions and an overall coordinator to
evaluate them [19].
1 Probabilistic Computation Tree Logic of Knowledge and Commitments
2 Unified Foundational Ontology - Service
3 Communicating Sequential Processes
In 2008, Choi et al. suggested a mechanism to ensure
consistency for web services transactions. This mechanism
recognizes inconsistent states of transactions and replaces
them with consistent states. Mechanism operation is designed
by a waiting graph of web services transactions and a
coordinator that check waiting graph. If coordinator is
certified about deadlock lack, allows transaction to execute.
Also if deadlock occurred, coordinator recognizes a safe state
using waiting graph and replaces it instead deadlock state.
Based on this mechanism, WTDP4 is designed [20].
In 2011, Shan-liang discussed a model for transactions
processing coordination based on BPEL. In this model a
coordinator is used for web services transactions and if
deadlock occurred, coordinator rollbacks operations [21].
In 2011, also Hemel et al. studied consistency checking
of web applications as a problem. Regards to parts of an
application are defined with separate domain-specific
languages, which are not checked for consistency with the
rest of the application, they presented a declarative, rule-
based approach to linguistic integration and consistency
checking in web application. They argued that domain-
specific languages should be designed from the ground up
with static verification and cross-aspect consistency checking
in mind, providing linguistic integration of domain-specific
sublanguages [22].
In 2014, Adelnia et al. proposed an approach for
commitment classification based on commitment structure.
The
between
commitments is designed based on attributes of commitments
structure [3].
consistency
algorithm
for
ensuring
III.
COMMITMENTS DEFINITION
This section describes commitments. First commitments
types are explained then the commitments structure are
expanded. In this section the responsibilities are required in
social networks, are presented and their commitments are
defined and expounded.
A. Commitments Types
Two types of commitments are defined [15]:
1. Social Commitments: Responsibilities bonded by
one agent to another agent. Agents are usually the
web services in social networks. Social commitments
guarantee the proper use of the social networks in
which they sign up.
2. Business Commitments: Arise when social web
services take part in compositions and guarantee the
proper development of composite web services in
response to users' requests.
4 Web service Transaction Dependency management Protocol
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201671https://sites.google.com/site/ijcsis/ ISSN 1947-5500 B. Commitments Structure
Maamar et al. suggested a standard formula for social
commitments based on Fornara's formula. Fornara and
Colombetti note that "...intuitively a social commitment is
made by an agent (the debtor) to another agent (the creditor),
that some fact holds or some action will be carried out (the
content)". In addition to this formula, Maamar also presented
a
list of responsibilities for social web services. A
commitment structure is defined as: 𝐶𝑅𝑒𝑠𝑝𝑖 (debtor, creditor,
content [condition]). Condition parameter is optional [2].
Social commitments defined by Maamar et al. are listed
as follows [15]:
to
1. Resp1. "Collecting any detail (d) in a social network
would require indicating the purpose (p) of this
collection
(o)". This
responsibility formula can be represented as:
Permission(Collect(d, o, valid(p))). The commitment
of this responsibility is defined as: CResp1 ( swsi, swsj
,Collect( d, swsj) valid(pd)).
this detail's owner
2. Resp2. "Posting any detail (d) on a social network
should be correct." This responsibility formula can
be represented as Obligation( Post( d, true)). The
commitment of this responsibility is defined as:
CResp2 (swsi, snauth, Post( dself )).
3. Resp3. "Collecting any detail (d) from a social
network should not be tampered after information
collection." This responsibility can be represented as
Obligation( not-Tamper( d, o, collection (d))) and its
commitments is defined as: CResp3 (swsi, swsj, not-
Tamper( dpublic, swsj ).
It
can
4. Resp4. "Signing off from a social network would
require the completion of all the pending assignments
as
(ass).
Permission(Signoff(status(ass))). Sign-off
the
action and status is a function that assesses the
progress (e.g., ongoing, complete, and failed) of
ass." And the commitment for it is defined as:
CResp4(swsi, snauth, Sign-off()status(ass)).
represented
be
is
represented
indefinitely,
5. Resp5. "Revealing any public detail (d) to the non-
members (not(m)) of a social network should not be
authorized
as
Obligation(not-Reveal(d, o, m, collection(d))). not-
Reveal is the action, m corresponds to the non-
members of a social network, and collection is a
function that checks if collecting d is approved in
compliance with Resp1." The commitment of this
responsibility defined as: CResp5 (swsi, snauth, not-
Reveal(dpublic, o, nm)collection(dpublic)).
Business commitments structure are defined like social
commitments. They are expounded in [15].
IV.
SUPPLEMENTAL COMMITMENTS
As for increasing the variety of activities in social
networks, commitments may be added or changed. In this
section, two commitments that can optimize and complete
social web services operation, are added and described as
follows:
be
can
and
defined
valid(p)))
1. Resp6. Sharing any information in a social network
would require specifying the goal of this action. This
responsibility
as:
Permission(Share(Info, o,
its
commitment is: CResp6 (swsi, swsj, Share (Info,
swsj)valid(pInfo)). Permission is the function that
checks the goal, Share is the action of social web
service, Info is the information which would be
shared in social network like a video or a text from
other social networks, o is the writer of info like a
social web service, valid is the method that checks
purpose of social web service and p is the purpose of
social web service. This responsibility checks the
goal of social web service and if its goal is valid,
allows to social web services to share information on
an account.
2. Resp7. Posting any activity of user in other social
networks must be correct. This responsibility can be
defined as: Obligation( PostActivity( act, true)) and
its commitment is: CResp7( swsi, PostActivity( act,
swsj) valid(pact)). PostActivity is the action of social
web service, act is the activity of the user in other
social networks, swsi is the social web service that
posts the activity of user in a social network and
valid(pact) is the function that checks purpose of this
action and if it is valid, allows the social web service
to be execute.
V.
COMMITMENTS CLASSIFICATION
For achieving consistency of commitments, commitments
are classified based on their effect on databases and
information of social network into [3]:
1. Reader Commitments:
"this
category
of
commitments don't change the information of
database and social network and usually act as an
information collector for other social networks or
purpose checker in social web services. Note that
the goal of social web services that use reader
commitments must be valid. Also privacy must be
protected."
social networks. They
2. Writer Commitments: "unlike reader commitments,
this category can change the information of
database and
share
Information and post activity on other social
networks. So writer commitments are more effective
than reader commitments in social web service
transactions. Like reader commitments, in writer
commitments, privacy must be controlled."
This classification of commitments is showed in Fig.1.
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201672https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Commitments
Reader
Commitments
Writer
Commitments
Figure 1. Commitments Classes
Information
Collecting
Goal Checking
Infoarmation
sharing
Post Activity
Sharing
VI.
CONSISTENCY GUARANTOR ALGORITHM
As farther described, the action of the social web service
is implemented using commitments and as regards both
reader and writer commitments may be executed on social
networks concurrently, a major problem that must be
considered is consistency ensuring of commitments in social
web services.
To designing the consistency guarantor algorithm, three
concepts are considered as follows:
1. Friend: Commitments are Friend if they are reader
commitments. So they are consistent in all states and
database is in the safe state. It can be formulated as:
isReader(Ci) isReader(Cj) → IsFriend(Ci ، Cj).
These commitments may collect the information of
social networks or check the goal of social web
services. For example if CResp1 and CResp3 are
executed on an account in a social network, they are
Friend.
Family: Commitments are Family if they are writer
commitments. In fact they effect on the state of
database and information. It can be formulated as:
isWriter(Ci) isWriter(Cj) → IsFamily(Ci ، Cj).
These commitments may share the information of
social networks. For example if execute two or more
CResp2 concurrently on an account in a social
network, they are Family.
2. Strange: If commitments neither Friend nor Family
are Srange. In this state, commitments may be
reader or writer. It can be formulated as:
isReader(Ci) isWriter(Cj) → IsStrange(Ci ، Cj).
For example if CResp1 and CResp2 are executed
concurrently on an account in a social network they
are Strange.
Since writer commitments
impress database and
information, so if arrival commitments of the social web
services and active commitment that is running, be Family or
Strange, conflict may occur. In this state, consistency must
be guaranteed and if deadlock happened it would be removed
and system needs to be recovered.
Suppose that a web service signs up in a social network,
first authority component recognizes it. If the web service is
valid in social network, it can sign up in the social network
and a specific responsibility is assigned it. Also its
commitments will be created based on its responsibility. This
time, consistency checking between commitments is critical.
Because of another commitment is executing on same
account in social network, they may be inconsistent and
conflict may happen. To guarantee consistency, first,
condition of current commitment is checked towards active
commitment that is executing. Three conditions may occur
between concurrent commitments on an account in a social
network:
1.
2.
3.
change
they don't
IsFriend: If current commitment that has arrived
recently and active commitment that is running are
Friend, both can be executed concurrent. They are
consistent because
the
information.
IsFamily: If current commitment that has arrived
recently and active commitment that is running are
Family, current commitment would wait until active
commitment execution is finished. Regards to both
commitments change the information and database,
if they are executed concurrently, inconsistency may
happen.
IsStrange: If current commitment that has arrived
recently and active commitment that is running are
Strange, current commitment would wait until the
execution of active commitment is finished. In this
state if reader commitment reads the information
that may be changed by writer commitment, conflict
may occur.
The three states are described, are summarized in Fig.2.
Friend
• isReader(Ci) isReader(Cj)
Family
• isWriter(Ci) isWriter(Cj)
Strange
• isReader(Ci) isWriter(Cj)
Figure 2. Commitments States
Sometimes several commitments can be created
concurrently in a time slice. In this state, commitments can
be executed based on two policy:
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201673https://sites.google.com/site/ijcsis/ ISSN 1947-5500 1. FCFS1: Commitments are serviced based on
creation time in social network. This policy is
fairness. In this policy commitments are pushed in
waiting queue based on creation time and next
commitment is selected from front of queue. So all
commitments are created, can be executed.
2. Priority: Commitments are serviced by priority. The
priority of commitment is assigned by social
network and can change based on the social network
policies. In this policy next commitment is selected
based on its priority. In fact it uses a priority queue
for waiting commitments.
Note
that
from waited
commitments is reader, algorithm can be executed as follows:
if selected commitment
1. In FCFS policy, all reader commitments in front of
waiting queue, are selected for execution, because they
are Friend and they can be executed concurrently.
2. In Priority policy, all reader commitments that have
same priority of selected commitment, are selected for
execution, because they are Friend and they can be
executed concurrently.
Figure 3. Implementation UI
SoundCloud: It is a music social network. Some
activity like play music, like and share music on
other social network can be done in it.
Facebook: This section is central social network in
this implementation that communicates with other
social networks. The user activities in other social
network can receive and display in this section.
When social web services sign up in Facebook
social network, commitments are created and
consistency guarantor algorithm is executed.
Commitments Monitoring: For monitoring the state
of the commitments in any time, this section is
designed and shows the number and state of all
VII.
IMPLEMENTATION
This paper uses the application designed for suggestion
algorithm in previous research [3]. The user interface
application is shown in Fig 3. In this application five sections
have been considered as follows:
LinkedIn: This section simulates LinkedIn social
network. This social network receives some
information like contact list from Facebook social
network.
YouTube: This section simulates YouTube social
network operation. In this simulation, the user can
share the videos on Facebook social network.
1 First Come, First Serve
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201674https://sites.google.com/site/ijcsis/ ISSN 1947-5500 commitments for all active social web services in a
social network.
The algorithm is checked with Facebook wall posts
datasets. Experiments show that the algorithm is efficient for
ensuring consistency between commitments in social web
services. Also based on the experiments, the number of
Friend, Family and Strange states are completely haphazard
and depend on the time and order of incoming social web
services in social networks. Figure 4 illustrates this result.
Also the number of commitments that are waited in queue
showed in Figure 5.
n
o
i
t
u
c
e
x
E
s
t
n
e
m
t
i
m
m
o
C
35
30
25
20
15
10
5
0
s
t
n
e
m
t
i
m
m
o
C
d
e
t
i
a
W
f
o
r
e
b
m
u
N
30
30
30
19
12
7
12
8
3
16
5
4
Friend
Family
Strange
Authority
Exp. 1
Exp. 2
Exp. 3
Experiments
Figure 4: Number of States between Commitments in 3 Experiments
25
20
15
10
5
0
5
10
3
20
23
15
8
30
40
50
Number of Web Services
Figure 5: Number of Waited Commitments in Five Experiments
When a web service signs up in a social network, if it is
authenticated by an authority component, it will be registered
in the social network and changed to a social web service.
Based on its operation, one or several responsibilities are
assigned to this social web service. For each responsibility,
commitments are defined that can accomplish tasks of social
web services. For a user account in social networks, if no
commitment is active, commitments of responsibility could
be active and execute their operations. But if another
commitment is active on this user account, consistency must
be protected. Thus the algorithm checks the state of current
commitments towards active commitments and decides
whether commitments should be executed or waited.
For example in Fig.3, user activity are as follows:
1. Share a video on Facebook social network
2. Like a music on SoundCloud social network
3. Retrieve some information from Facebook Social
network for LinkedIn account
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201675https://sites.google.com/site/ijcsis/ ISSN 1947-5500 The order of commitment execution is:
1. CResp6
2. CResp2
3. CResp7
4. CResp1
First user shares a video on Facebook social network and
then like a music on SoundCloud social network and collect
information from his account of Facebook. If these actions
are executed in a time slice, consistency must be guaranteed.
Regards to first CResp6 and CResp2 for information sharing are
created, first, goal of social web service is checked and then
social web service shares the video. Also CResp7 and CResp1
have been created and are waiting for execution. Because of
CResp2 is active commitment, CResp7 and CResp2 are Family.
Also CResp2 and CResp1 are Strange. When CResp2 is finished,
CResp7 is selected from waiting commitments and will be
executed. After CResp7 execution is finished, CResp1 is selected
from waiting queue and will be executed. Some of results
showed in Table 1.
Time of
YouTube
Sharing
Time of
LinkedIn
Collect
Information
Time of
SoundClou
d Like
Table 1: Result of Algorithm
Time of
Status
Order of Commitments execution
SoundCloud
Play
Node Type
Node Type
Node Type Node Type
2013-06-18
2013-06-18
2013-06-18
16:15:07
16:15:05 UTC
16:15:09
UTC
Users of
Youtube
website
Robot
UTC
Individual
Persons
2014-02-03
04:35:22
UTC
Users of
Youtube
website
2014-02-03
04:35:20
UTC
Individual
Persons
2014-07-18
2014-07-18
02:21:14
02:21:10 UTC
Robot
UTC
Users of
Youtube
website
2014-07-18
02:21:18
UTC
SoundCloud
User Account
Inconsistent CResp1: Collects Information is Active
CResp2: Shares Information is Waiting
CResp6: Post Activity is Waiting
CResp1: Collects Information is Deactivate
CResp2: is Signal
CResp2: Shares Information is Active
CResp2: Shares Information is Deactivate
CResp6: is Signal
CResp6: Post Activity is Active
CResp6: Post Activity is Deactivate
Inconsistent CResp6: Post Activity is Active
CResp2: Shares Information is Waiting
CResp6: Post Activity is Deactivate
CResp2: is Signal
CResp2: Shares Information is Active
CResp2: Shares Information is Deactivate
Consistent
CResp1: Collects Information is Active
CResp1: Collects Information is Deactivate
CResp2: Shares Information is Active
CResp2: Shares Information is Deactivate
CResp6: Post Activity is Active
CResp6: Activity is Deactivate
VIII.
CONCLUSION
This study set out to present an algorithm to ensure the
consistency of commitments in social web services. Also two
commitments are considered and added to base commitments
for optimizing. In consistency guarantor algorithm, first,
commitments are classified into two groups containing
Reader Commitments and writer commitments. Based on this
classification and inspiration of main concepts in social
networks like "Family" and "Friend", the algorithm is
designed. If commitments don't change the information and
database, they are called Reader Commitments and if they
affect and change information and database, they are called
Writer Commitment. Commitments can have three states into
each other. They may be Friend, Family or Strange based on
their operations. The algorithm manages different states that
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201676https://sites.google.com/site/ijcsis/ ISSN 1947-5500 may occur in commitment execution of a social web service
operation. Facebook dataset is used for algorithm checking.
There are several research directions in future works of
this paper. One of the future works is weaving suggested
algorithm for consistency ensuring in business commitments.
Also this algorithm must be checked on the professional
social networks and other social networks with special
performance.
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
REFERENCES
S. Aghaei, M. A. Nematbakhsh and H. Khosravi Farsani,
"EVOLUTION OF THE WORLD WIDE WEB: FROM WEB 1.0
TO WEB 4.0," International Journal of Web & Semantic
Technology (IJWesT), vol. 3, no. 1, January 2012.
Z. Maamar, N. Faci, M. Luck and S. Hachimi, "Specifying and
Implementing Social Web Services Operation using Commitments,"
SAC, pp. 1955-1960, ACM 2012.
M. Adelnia and M. R. Khayyambashi, "Consistency of
Commitments in Social Web Services," (IJCSIS) International
Journal of Computer Science and Information Security, vol. 12, no.
11, pp. 1-5, November 2014.
A. Maaradji, H. Hacid, J. Daigremont and N. Cresp, "Towards a
Social Network Based Approach for Services Composition," in 2010
IEEE International Conference on Communications (ICC'2010),
2010.
Z. Maamar, H. Yahyaoui, E. Lim and P. Thiran, "Social Engineering
of Communities of Web Services," in the 11th Annual International
Symposium on Applications and the Internet (SAINT'2011), Munich,
Germany, 2011.
Z. Maamar, H. Hacid and M. N. Huhns, "Why Web Services Need
Social Networks," IEEE Internet Computing, vol. 15, no. 2, pp. 90-
94, 2011.
Z. Maamar, N. Faci, E. Kajan, A. Pljasković, E. Ugljanin and F.
Akhter, "From Social Web Services to Social Communities of Web
Services," Advances in Information Sciences (AIS), vol. 1, no. 1, pp.
22-37, 2013.
N. Fornara and M. Colombetti, "Operational Specification of a
Commitment-Based Agent Communication Language,"
in
AAMAS'02, Bologna, Italy, July 15-19, 2002.
B. N. Grosof and T. C. Poon , "SweetDeal: Representing Agent
Contracts With Exceptions using XML Rules, Ontologies, and
international conference on,
Process Descriptions,"
Budapest, Hungary, 2003.
in 12th
[10] J. Bentahar, B. Moulin and B. Chaib-draa, "Specifying and
Implementing a Persuasion Dialogue Game Using Commitments
and Arguments," in Argumentation in Multi-Agent System, 2005, pp.
130-148.
[11] C. Carabelea and O. Boissier, "Coordinating Agents
in
Organizations Using Social Commitments," Electronic Notes in
Theoretical Computer Science, vol. 150, no. 3, p. 73–91, May 2006.
[12] N. C. Narendra, "Generating Correct Protocols from Contracts: A
Commitment-based Approach," SERVICES I, pp. 407-414, IEEE
Computer Society 2008.
[13] M. P. Singh, A. K. Chopra and N. Desai, "Commitment-Based
Service-Oriented Architecture," Computer, vol. 42, no. 11, pp. 72-
79, Nov 2009.
[14] M. El-Menshawy, J. Bentahar and R. Dssouli, "Verifiable Semantic
Model for Agent Interactions using Social Commitments," in
Languages, Methodologies and Developement Tools for Multi-
Agents Systems, 2010, pp. 128-152.
[15] Z. Maamar, N. Faci, K. Boukadi, Q. Z. Sheng and L. Yao,
"Commitments to Regulate Social Web Services Operation," IEEE
Transaction on Service Computing, vol. 7, no. 2, pp. 154-167, 2013.
[16] k. Sultan, J. Bentahar, W. Wan and F. Al-Saqqar, "Modeling and
verifying probabilistic Multi-Agent Systems using knowledge and
social commitments," Expert Systems with Applications, p. 6291–
6304, 2014.
[17] J. C. Nardi, J. P. A. Almeida, G. Guizzardi, L. F. Pires, M. J. van
Sinderen, N. Guarino, C. M. Fonseca and R. A.Falbo, "A
commitment-based reference ontology for services," Information
Systems, 2015.
[18] H. Reiko, V. Hendrik, J. KUSTER and S. THONE, "Towards
Consistency of Web Service Architectures," University of
Paderborn, Paderborn, Germany, 2004.
[19] P. Greenfield, D. Kuo, S. Nepal and A. Fekete, "Consistency for
Web Services Applications," 31st international conference on Very
large data bases(VLDB), pp. 1199-1203, 2005.
[20] S. Choi, H. Kim, H. Jang, J. Kim, S. M. Kim, J. Song and Y.-J. Lee,
"A framework for ensuring consistency of Web Services
Transactions," Information and Software Technology, no. 50, p.
684–696, 2008.
[21] P. Shan-liang, L. Ya-Li and L. Wen-juan, "A framework for ensuring
consistency of Web Services Transactions based on WS-BPEL,"
Modern Education and Computer Science, no. 4, pp. 47-54, 2011.
[22] Z. Hemel, D. M. Groenewegen, L. C. Kats and E. Visser, "Static
consistency checking of web applications with WebDSL," Journal
of Symbolic Computation, vol. 46, no. 2, pp. 150-182, 2011.
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201677https://sites.google.com/site/ijcsis/ ISSN 1947-5500 |
1602.05744 | 1 | 1602 | 2016-02-18T10:18:00 | Benchmarking Measures of Network Influence | [
"cs.SI",
"physics.soc-ph"
] | Identifying key agents for the transmission of diseases (ideas, technology, etc.) across social networks has predominantly relied on measures of centrality on a static base network or a temporally flattened graph of agent interactions. Various measures have been proposed as the best trackers of influence, such as degree centrality, betweenness, and $k$-shell, depending on the structure of the connectivity. We consider SIR and SIS propagation dynamics on a temporally-extruded network of observed interactions and measure the conditional marginal spread as the change in the magnitude of the infection given the removal of each agent at each time: its temporal knockout (TKO) score. We argue that the exhaustive approach of the TKO score makes it an effective benchmark measure for evaluating the accuracy of other, often more practical, measures of influence. We find that none of the common network measures applied to the induced flat graphs are accurate predictors of network propagation influence on the systems studied; however, temporal networks and the TKO measure provide the requisite targets for the hunt for effective predictive measures. | cs.SI | cs |
Benchmarking Measures of Network Influence
Aaron Bramson1 2 3
Benjamin Vandermarliere 2 4
July 2, 2021
Abstract
Identifying key agents for the transmission of diseases (ideas, technology, etc.) across
social networks has predominantly relied on measures of centrality on a static base network
or a temporally flattened graph of agent interactions. Various measures have been proposed as
the best trackers of influence, such as degree centrality, betweenness, and k-shell, depending
on the structure of the connectivity. We consider SIR and SIS propagation dynamics on a
temporally-extruded network of observed interactions and measure the conditional marginal
spread as the change in the magnitude of the infection given the removal of each agent at each
time: its temporal knockout (TKO) score. We argue that the exhaustive approach of the TKO
score makes it an effective benchmark measure for evaluating the accuracy of other, often more
practical, measures of influence. We find that none of the common network measures applied to
the induced flat graphs are accurate predictors of network propagation influence on the systems
studied; however, temporal networks and the TKO measure provide the requisite targets for the
hunt for effective predictive measures.
keywords: networks, temporal webs, centrality, influence, immunization
1. Introduction
There are two main strategies to identifying the key agents for disease/idea spread: (1) the discovery
of "super-spreaders" (Kempe et al. 2005, Wang et al. 2010, Kimura et al. 2010, Chen et al. 2012,
Saito et al. 2012) and (2) finding effective immunization/removal targets (Chen et al. 2008, Yu et al.
2010, Kuhlman et al. 2010). The difference is not the goal of the analysis; both approaches seek
to ascertain the actual or potential influence of each node on the propagation of a property across
the network by performing an isolated contingency analysis. The first approach is some version of
variably seeding an infection and determining how well it spreads in each setup (Newman 2002,
Newman et al. 2002, Dekker 2013). The second approach is some version of setting nodes as
firewalls and measuring changes in how the property/idea/disease spreads with different firewalls
(Chen et al. 2008). By toggling the status of any one node and examining the differences it generates
one can ask, "How much of the propagation is this node responsible for?" Here we propose a
knockout sensitivity analysis on temporally extruded networks that combines the spreading and
1Laboratory for Symbolic Cognitive Development, Riken Brain Science Institute
2Department of General Economics, Ghent University
3Department of Software and Information Systems, University of North Carolina at Charlotte
4Department of Physics and Astronomy, Ghent University
1
removal approaches for use as a benchmark test for evaluating the ability of network measures to
capture or predict system influence.
The dominant technique to assess individual influence is to take a set of agents and a network
of potential interactions among them and simulate the propagation of a property using a variation
of SI/SIR/SIS dynamics across the network to see how far and how fast it spreads. There are vari-
ations in the (generated or empirical) network structure used, the number and placement of initial
infections, the disease parameters, and with these there are variations in the identified best measure
of influence (see Danon et al. (2011) for an extensive review on the possible variations). The most
important lesson from these analyses is that different structures make different targets more effec-
tive for immunization. For example, connectivity on some network structures is resilient to random
node removals but sensitive to targeted removal of nodes with certain properties, such as high de-
gree agents in scale-free networks (Albert et al. 2000, Callaway et al. 2000, Pastor-Satorras and
Vespignani 2002). For other network structures, high degree is not the best measure of importance;
betweenness, k-core, and other measures have been proposed as capturing key individuals in certain
specific network structures and real-world datasets (Kitsak et al. 2010).
In order to evaluate network measures' ability to track influence one must have an independent
assessment of that influence -- the ground truth to be matched. A common way to measure this is to
seed the initial infection at each node and measure the resulting spread, typically as cumulative cases
for SIR. However, an individual's impact on the dynamics of propagation on complex networks is
more nuanced than these simple propagation measures indicate. Even when a disease starts at node
x, some later-infected node y may be more responsible for the scope of the spread. In actual disease
propagation dynamics (Hufnagel et al. 2004, Brockmann and Helbing 2013) it is also possible that
an agent being infected early reduces the eventual scope of the infection by altering the set of
individuals that agent comes in contact with while infected.
In light of these possibilities it is clear that one must analyze how the full dynamics unfold in
order to correctly assess influence over those dynamics. To incorporate the temporal aspect into
our influence analysis we capture the infection propagation in a temporally extruded network struc-
ture called a "temporal web" -- a variant of temporal networks (Holme and Saramakid 2012, Holme
2015) in which the interactions extend across time creating a single acyclic digraph rather than
layered networks (Bramson and Vandermarliere 2015, Michail 2015, Speidel et al. 2015). This tem-
poral web provides a time-extruded version of cumulative cases that we call "magnitude" combining
both the number of infected individuals and the length of their infections (Saito et al. 2012).
To perform the isolated contingency analysis we propose a measure called "temporal knockout"
(TKO) that combines the super-spreader and immunization approaches and also includes the timing
of infections to more accurately measure each agent's influence/impact on the propagation. TKO is
not an alternative network measure for approximating influence, but rather an all-things-considered
empirical measurement of each agent's time-dependent potential to change propagation outcomes
for use as a benchmark in evaluating network measures.
First we explain the temporal web construction in more detail, then we describe the process
to calculate the disease magnitude and temporal knockout score. Because the temporal knockout
score calculation is computationally expensive, it is desirable to have a simpler proxy measure, or
set of proxy measures, that accurately reflects agent influence. Toward this end we run a battery of
experiments on small world and scale-free networks and evaluate the effectiveness of some standard
flat/static network measures to capture influence using the TKO scores as a benchmark measure.
Although the limited evaluation of network measures presented here is indicative of the need for
improved ways to capture propagation influence, our focus here is the presentation of TKO as a
standardized benchmark metric for performing such investigations.
2
2. Approach
Our analysis proceeds through the following steps: (1) create collections of scale-free and small
world base networks; (2) build temporal webs encapsulating a fixed set of potential interactions
for each one; (3) simulate propagation dynamics across each temporal web for each agent of each
network; (4) calculate the temporal knockout of each node in the temporal web; (5) generate the
flattened network and analyze the flat networks using centrality measures; (6) examine the degree
to which the flat network measures capture the agents influence as measured by TKO.
2.1 Network and Disease Parameters
We simulate the spread of an infectious disease using an agent-based model realizing SIR and SIS
dynamics. Our networks have 200 agents connected in either a small world or scale free network
with 800 and 784 edges respectively.1 For each combination of network type and interaction prob-
ability - 0.10, 0.15, and 0.20 -, we generate 25 instantiations (150 total). We note that the SIR
and SIS versions of a given combination run on the same instantiations, thus using the same link
activations at each time step2. There is one initially-infected agent per run and we perform a run
of the model using each agent as the initial agent for each of the 25 instantiations of each network
type. Each infectious agent has a probability to infect susceptible network neighbors and as already
mentioned we run the full battery of simulations using probabilities 0.10, 0.15, and 0.20. In each
period, the probability of infectious agents converting to recovered/susceptible (I→R and I→S for
SIR and SIS models respectively) is 1/15. Each run lasts 200 periods; this is typically sufficient for
SIR dynamics to run their course, and is used for SIS models for parsimony of analysis.
2.2 Building a Temporal Web
We run our simulations using simultaneous updating so that each agents' state at t + 1 depends on
their state at t and interactions initiated at t. When represented as an intertemporal network the
interaction edges therefore run across time from agents at t to other agents at t + 1 in addition to
"inheritance edges" from each agent at t to its t + 1 self (see Figure 1). We call this version of
intertemporal networks a "temporal web" because it produces a single acyclic directed graph across
time rather than connected layers.
We first build the temporal web "skeleton" that includes all of the state changing and interaction
probabilities which may be needed for any particular run. With non-adaptive interaction probabili-
ties, who interacts with whom and when all become fixed for those runs. Therefore when we run the
simulation using each agent as the initially infected agent, the overall dynamics are kept constant
while we monitor the propagation so that the only difference is the initial agent.
1The small world base networks are undirected connected Watts-Strogatz networks where each agent is connected
to k = 8 neighbors and the probability of rewiring is set to p = 0.025. The scale-free base networks are undirected
Barabasi-Albert networks with m = 4 as the number of edges to attach from a new node to an existing one. The
networks were generated using the implementation of the python package NetworkX Hagberg et al. (2008).
2In each iteration of the model, the probability that a given link is activated is
−1
j(cid:80)
k
pij =
−1
n
k
Ki
with kj being the undirected degree of agent j, and the summation in the denominator is over each network neighbor (n)
of node i (written Ki).
3
Figure 1: A simplified example of building a "temporal web" style intertemporal network from
state-change and interaction data for an SIR model. This procedure differs from temporally layered
networks in that the interaction edges are cross-temporal to capture simultaneous updating in the
generated data, thus creating a single acyclic directed graph across time.
2.3 Disease Magnitude
The temporal structure facilitates a variety of new measures, which are defined and explored else-
where (Nicosia et al. 2013, Pfitzner et al. 2013, Bramson and Vandermarliere 2015). Specifically
for epidemiology it becomes natural to switch to a temporally extended refinement of the standard
cumulative cases measure. Rather than (or in addition to) reporting the number of agents that are
ever infected, the disease magnitude is calculated as the number of agent-times (i.e., nodes in the
temporal web) that are in the infectious (or exposed) state. It is equivalent to the cumulative sum of
the number of infectious agents across iterations (Saito et al. 2012). This measure better captures
disease morbidity because it accounts for both the number of infections and how long the infections
persist -- a large number of very short infections could be considered preferable to a few persistent
long-term infections. Depending on the application, the node count or a normalized version may be
preferable -- the number of nodes is the same for all of our experiments described below, so we use
the "raw magnitude."
2.4 Calculating the Temporal Knockout Scores
Temporal knockout (TKO) measures influence by aggregating two levels of contingency. First we
select an agent from the population to be initially infected and run the disease model while capturing
each agent's state and interactions at each iteration in a temporal web. The resulting collection of
infectious nodes (agent-times) embodies the magnitude of the illness contingent on that agent being
the initially infected one. Then for each node in the temporal web we perform a knockout analysis:
remove that node and run the same infection dynamics and measure the difference in the disease
magnitude. Thus for each node we capture the change in disease magnitude contingent upon that
agent being removed at that time, contingent upon that particular initially infected agent.
The initially infected agent at the t0 iteration will have a marginal infection effect equaling the
whole magnitude. Note that removing a noninfectious node at t0 still prevents it from being infected
later, which affects the marginal infection score of that agent at t0; however, the pre-infection time
nodes for an agent will have the same TKO as the first infected time node; thus the calculation can be
performed on just the infected subset and backtracked to earlier times. Perhaps counter-intuitively
this effect can be negative; i.e., it is possible to remove an agent from the system at a particular time
4
and have the overall disease spread increase. This can happen when agents that are infected by the
knocked out agent would normally have quickly lead to dead ends, but when instead infected later
by other agents they spread the disease to many more others.
We perform this knockout analysis for every node in the temporal web to get the marginal
infection score conditional on that initial agent. We repeat this process using each of the agents as
the initially infected agent and set each node's TKO score as the average marginal infection score
across those runs. Thus we have the conditional marginal infection spread for each agent at each
time step for all possible single-agent disease carrier initial conditions. This algorithm therefore
captures the potential for each agent at each period to influence the spread of the disease.
Because TKO is an overt counting of infected agent-times given the contingent hypothetical-
empirical results instead of a summary measure we believe that it stands as a reliable benchmark
for the influence of each agent (in networked epidemiological systems). Also note that TKO's
hypothetical-empirical approach means that the change in total infection after a knockout of agent
Ai at any time tτ cannot be calculated except through the resimulation of the infection dynamics
across the rest of the temporal web. Because of this TKO is thoroughly descriptive, but it is not
predictive.
2.5 Base and Flattened Graphs
In order to predict which agents are most likely to facilitate diffusion, we wish to compare the
TKO identification with measures on flat, non-temporal networks. Specifically we would like to
know how well each of various centrality measures does in capturing each agent's network influ-
ence as benchmarked by TKO. Two versions of flat graphs are relevant here: (1) the base potential
interaction network from which the actual interactions were probabilistically generated and (2) the
flattened empirically observed interactions. Our results for the base network and weighted and un-
weighted flattened networks are nearly identical, so we focus on the base network here and leave
the flattened network for the supplementary materials. We have twenty-five distinct base networks
for each scenario (although each SIR and SIS pair use the same networks) and for every node in
each one we calculate the following centrality measures: k-core, degree, closeness, betweenness,
eigenvector, and Katz centralities.
3. Results
The infection dynamics in our model match other models with similar network structures and dis-
ease parameters (Rahmandad and Sterman 2008, Danon et al. 2011). We briefly summarize the
contagion results in order to provide context for the centrality measures and to facilitate compar-
isons to other models. For our SIR models the cumulative cases and magnitude measures are nearly
perfectly correlated (0.99458) because the fixed 1/15 probability of I→R transitions implies a uni-
form expected/average infection duration time of 15 iterations. For SIS models reinfection can
multiply an agent's contribution to magnitude but still only be counted once by the number of cu-
mulative cases, so the correlation is reduced (0.93595), but is still high due to the relatively short
time horizon for our SIS simulations (200-iterations).
As seen in Table 4 both network types show high variation in magnitude depending on the initial
agent; however, when aggregated across the 25 implementations of each network type they reveal
similar magnitude profiles (see supplementary material for details). For ease of reading we present
the raw (non-normalized) magnitude scores (i.e., the number of infectious nodes in the temporal
web). As you can see in figure 3 there are a large number of runs in which the disease never catches
5
on (what we call "duds") and although these outcomes drag the mean magnitude down and raise the
variance, for our purposes there is no benefit in separating out the duds and, for example, testing the
remaining infections for matches to known distributions.
Infection Type Network Type
Infection Probability Mean Magnitude Magnitude StDev Percent Duds
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
Scale Free
Scale Free
Scale Free
Small World
Small World
Small World
Scale Free
Scale Free
Scale Free
Small World
Small World
Small World
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
143.352
584.744
1296.44
88.9266
227.321
445.033
548.746
5003.03
10800.6
308.734
2526.97
7036.79
288.549
774.628
1142.24
131.743
324.207
559.017
1155.19
5237.44
8150.76
536.106
2839.26
5623.18
0.625
0.482
0.380
0.584
0.457
0.352
0.593
0.445
0.344
0.557
0.433
0.333
Table 1: Results summary of infection spread for each model variation. Each row aggregates 5000
runs (one run initialized at each of 200 agents for each of the 25 base network implementations).
Duds are defined as runs in which the raw magnitude is fewer than 50 agent-times.
3.1 TKO vs Magnitude Correlations Results
We first compare the TKO score of each agent to the initial-agent resulting magnitude in order to
evaluate whether this standard measure of influence effectively captures a node's ability to spread
disease. The TKO algorithm accounts for the idiosyncrasies of the agent interactions across time,
but as a result it assigns scores across time as well. In order to compare TKO node scores to initial-
agent-spread scores we first need to aggregate them to the individual agents.
For each node we determine two versions of TKO: (1) the proportional change in the number of
infectious nodes and (2) the change in the fraction of nodes that become infectious. The proportional
change of node i is calculated as the number of agents that are infected when node i has been
removed divided by the number of nodes that were originally infected, and then that subtracted from
one so that a value of one means that no nodes become infected if this one is removed. Alternatively
the delta fraction is the fraction of infected nodes in the original run minus the fraction of nodes
that become infected when node i is removed. For both versions negative values occur when more
nodes become infected contingent upon i's removal compared to the original run. An agent that was
never infected will have a TKO value of zero for all its temporal nodes. For each of these temporal
node-based measures we aggregate them to agents by considering both the maximum value an agent
achieves across time and its average TKO score across time.
The Pearson correlations for agent TKO scores and magnitude appear in Table 2; in the most
correlated scenario (SIR smallworld 0.10 infection rate) the best match is to maximum TKO with
a correlation coefficient just under 0.50 (marked with *). Although we initially believed that the
Spearman rank correlations would be higher, they are actually very similar and not consistently
better or worse (a table of Spearman correlations appears in the Supplementary Materials). For
example, the best-case scenario for the Spearman correlation is the same, with a Spearman rho
value of 0.51658. For both types of correlation the performance drops dramatically as the disease
magnitude increases (via higher infection rates), indicating that the large proportion of runs with
6
almost no spread ("duds") are trivially improving the correlations and overstating the ability of
agent-initiated magnitude to measure propagation impact.
Disease Type Network Type
InfectionRate MaxProportion MaxDeltaFraction AveProportion AveDeltaFraction
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.402831
0.0674457
0.0457449
0.494424∗
0.043098
0.0297556
0.346553
0.0566606
0.0446214
0.404204
0.0240389
0.0502245
0.404905
0.246309
0.219299
0.471569
0.264589
0.19209
0.375933
0.247974
0.233998
0.417726
0.201376
0.190489
0.288126
0.0644679
0.0781154
0.366466
0.0770296
0.0154106
0.268197
0.0838702
0.0585834
0.353329
0.0452133
0.0420603
0.292081
0.157114
0.158489
0.363984
0.188738
0.118696
0.282026
0.153358
0.107849
0.370916
0.149954
0.10682
Table 2: The mean Pearson correlations coefficients across the 25 network instantiations of the
disease magnitude given an agent is the initially infected agents and the TKO scores for that agent.
The low correlations imply that using the disease spread based on initial infection is a poor measure
of influence.
The poor correlations between TKO and agent-initiated magnitude have multiple explanations.
To understand the relationship better we present a few select plots of the agent TKO scores across
time in Figure 2. These plots present the change in magnitude resulting from removing each in-
fectious agent at each time averaged across the 200 runs initialized with each agent being infected.
So a value of m means that on average removing this agent at this time decreases morbidity by m
agent-times. As we saw, there are many dud runs in which the disease doesn't spread beyond a few
initial agents; such cases bring down the average values. A TKO score of twenty might mean 500
saved agent-times in one run and none in the others, or 50 in ten runs, etc. So TKO scores can be
small if the disease tends not to spread much because no agent at no time will be a key player in
the localized infections. On the other hand, when the infection rate is 0.20 the disease spreads to
many more agents across time, enough that no single agent could be responsible for the scale of the
infection across multiple initializations. There are just too many infection paths for any one agent
to be a key player on enough of them to have a high knockout effect.
Up to this point we have argued that temporal magnitude is more accurate than cumulative cases
as a measure of disease morbidity because it accounts for variations in the length of infection and
also reinfection. A network measure's ability to capture an agent's influence on disease is standardly
compared to the eventual spread of the disease contingent upon it starting at that agent, but our
analysis of correlations with TKO shows that this standard measure of impact itself fails to capture
how much disease spread that agent is responsible for because it lacks sensitivity to the structure of
the interactions across time. From these results we tentatively conclude that TKO stands as the best
measure of an agent's influence on network propagation. We now turn to testing the ability of static
network measures to identify a system's high-impact agents.
3.2 Predicting Temporal Knockout from the Static Interaction Network
The temporally extruded network structure captures the system dynamics in a way that facilitates
contingency analyses, however one must already have the data across time to measure those prop-
erties, including TKO. For predictive purposes we would like to know if there is some property of
7
Figure 2: Plot of TKO scores across time for SIR dynamics and a scalefree network. These examples
shows that the most influential agent-times often do not occur during the initial phases of a disease,
but can indicate bottlenecks in the spread of the disease. This also shows the appearance of negative
TKO agents, the removal of which actually increases the morbidity of the disease.
the known interaction structure that can identify key players (Yu et al. 2010). Although temporal
networks are gaining popularity (see (Holme 2015) for a review), most network analysis is still per-
formed on flat networks because there are already measures available with known interpretations.
The question here is whether any flat graph property can accurately predict the conditional marginal
infection as measured by agent-aggregated temporal knockout.
We ran the three comparisons between the four aggregated TKO measures five network central-
ity measures. Both Pearson and Spearman correlations were calculated. Furthermore, because the
standard network centrality measures only purport to capture the highest value agents properly; i.e.,
rather than a claim to assigning accurate values to all nodes we also compared the overlap between
the ten agents (5%) with the top TKO scores with the ten agents with the top centrality scores Kitsak
et al. (2010). We compared the maximum proportional and maximum delta fraction TKO as well
as the average proportional and average delta fraction TKOs with degree, closeness, betweenness,
eigenvector, and Katz centrality (k-core values were too undifferentiated on our base networks to
be meaningful). The full output of the analysis appears in the Supplementary Materials.
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.12721
0.12514
0.13992
−0.00492
0.04866
0.06674
0.13528
0.16164
0.23309
0.02536
0.06834
0.12315
Closeness Betweenness Eigenvector
0.10583
0.09557
0.11872
0.03076
0.07044
0.12695
0.08851
0.09822
0.16747
0.0545
0.10208
0.17406
Katz
0.09757
0.07997
0.0977
0.08398
0.11485
0.10137
−0.00766 −0.01483
0.06403
0.08047
0.05665
0.02619
0.06804
0.09088
0.10646
0.08486
0.16756
0.13834
−0.0126
0.0042
0.05613
0.02545
0.0522
0.12552
0.09908
0.10187
0.11503
0.01898
0.08208
0.10153
0.11109
0.127
0.19103
0.01982
0.11029
0.24128∗
Table 3: The Pearson correlations between the mean proportional TKO score with each of five base
network agent centrality scores. Other results tables appear in the Supplementary Materials.
8
We find that neither the Pearson or the Spearman correlations are systematically higher, nor
is any one of the network measures consistently better than all the others (although eigenvector
and Katz centrality are consistently worse). Although the correlations are typically positive, the
correlation coefficients and Spearman Rhos are almost entirely below 0.20. Differences between
the proportional and delta fraction TKOs are small (as expected), but not negligible; delta fractional
correlations tend to be better but not in every case. Similarly, the correlations with mean TKO tend
to be slightly higher than maximum TKO, but the differences are small and inconsistent. For the
top ten overlap comparison we find that the centrality measures only rarely manage to find one of
the top ten TKO agents; eigenvector and Katz centrality never do.
There are other patterns in the results that may offer clues to where to look for improved net-
work measures. For example, for each disease type, each network type, and each TKO version the
correlations of all measures tend to be higher with larger infection rates. Unsurprisingly, degree
centrality typically performs better on the scalefree networks than the small world networks. How-
ever, any such pattern may be spurious because the correlation values are too low and similar for
our sample size to provide adequate power. In summary, the result is that none of the five centrality
measures on the flat interaction network can predict which agents have the greatest influence on
spreading a disease.
4. Conclusions
In this paper we have argued that using temporal networks to capture disease spread has the benefits
of incorporating the details of the interaction timing which is necessary for judging each agent's
level of influence/impact on the spread. The number of infectious agent-time nodes, a measure we
call magnitude, is a superior to cumulative cases because it captures both the length of infections
and reinfection. However, adapting the standard measures of influence -- eventual spread contin-
gent upon the starting agent or blocked spread contingent upon removing the agent -- to magnitude
is insufficient to properly capture an agent's overall level of influence. Although eliminating the
initial agent is a sure-fire way to stop the spread, that is not informative for deciding whom to re-
move before the disease starts. What is needed is the change in the spread of disease contingent
upon each agent being removed generalized over all possible initial agents. But the degree of in-
fluence is also dependent on when the agent is removed because the interaction dynamics of these
systems are complex: removing an agent early can increase the eventual spread. We present the
temporal knockout measure to capture all these contingencies and provide a general benchmark for
propagation influence.
One key insight from this study is that an agent's influence depends on how the dynamics unfold
through time, which cannot be accurately predicted by historic interaction data or known communi-
cation channels. Nascent measures on temporal network structure (i.e., ones that operate on the full
temporal web) can accurately track the TKO property with considerably less computational time,
but they still require knowing the complete interaction structure over time ?. Thus, they work as
effective proxy measures, but are not viable predictor measures. Although we do not have improved
static network measures to offer at this stage, we believe that having a proper benchmark for such
measures provides the foundation necessary for developing them.
For most realistic health applications, by the time an intervention occurs there are already several
infectious individuals, and for this reason there is interest in measures/strategies for scenarios with
multiple initially infected agents (Danon et al. 2011). The problem is in the combinatorics; e.g.,
instead of 200 runs per network, with two initial agents it becomes(cid:0)200
just three initial agents it becomes 1,313,400 runs. Because TKO generalizes marginal conditional
(cid:1) = 19, 900 runs -- for
2
9
spread of every agent-time across all initially infected agents, the TKOs scores can be combined post
hoc without needing to rerun the simulations. So, although the TKO algorithm is computationally
intense compared to the single initial agent runs, There would be considerable time savings when
compared to testing every combination of initially infected agents.
As noted by Kitsak et al. (2010), when using cumulative cases to capture the influence of partic-
ular agents it makes sense to keep the infection probabilities small enough that the disease typically
will not spread to the whole population -- otherwise the role of any single individual will be difficult
to discern. TKO does not suffer from this limitation because the disease magnitude measure also
detects delays in infection even if the whole population does eventually get infected. Again, the
timing of the interactions is important, so in addition to facilitating a reduction in morbidity, TKO
is useful for developing adaptive intervention strategies.
Recent papers have introduced new measures with claims of increased accuracy (at least in cer-
tain contexts). However, those accuracy claims are based on how well their own measure matched
their own chosen metric on their own chosen network and spread parameters. We propose that TKO,
in its exhaustive marginal contingent effect calculation, can act as a benchmark metric against which
the performance of proposed measures can be judged -- essentially establishing a ground truth for
the influence of each agent (at each time) in a network.
We acknowledge that the version of temporal knockout presented here is not the only option
for benchmarking epidemiological network studies. One direction to look for further improvement
is increasing the refinement of the measures through, for example, another layer of contingency.
Another direction is to expand the breadth of the simulations to more closely approach an exhaustive
analysis of interaction possibilities. We visit these ideas in follow-up research to establish shared
benchmarks for evaluating measures of network influence on a variety of standardized networks
similar to how Zachary's Karate Club has been used to test community detection methods. Before
such benchmark networks can be established, we as a community must agree on what counts as a
measure of influence. We propose that temporal knock out may fill that role, and at the very least is
a useful step in the right direction.
Acknowledgements
We would like to thank Koen Schoors for making this collaboration possible. This work is supported
by the Research Foundation Flanders (FWO-Flanders).
References
R´eka Albert, Hawoong Jeong, and Albert-L´aszl´o Barab´asi. Error and attack tolerance of complex
networks. Nature, 406:378 -- 382, 2000.
Aaron Bramson and Benjamin Vandermarliere. Dynamical properties of interaction data. Journal
of Complex Networks, page cnv009, 2015.
Dirk Brockmann and Dirk Helbing. The hidden geometry of complex, network-driven contagion
phenomena. Science, 342(6164):1337 -- 1342, 2013.
Duncan S. Callaway, M. E. J. Newman, Steven H. Strogatz, and Duncan J. Watts. Network robust-
ness and fragility: Percolation on random graphs. Physical Review Letters, 85, 25:5468 -- 5471,
2000.
10
Duanbing Chen, Linyuan Lu, Ming-Sheng Shang, Yi-Cheng Zhang, and Tao Zhou.
Identifying
influential nodes in complex networks. Physica a: Statistical mechanics and its applications,
391(4):1777 -- 1787, 2012.
Yiping Chen, Gerald Paul, Shlomo Havlin, Fredrik Liljeros, and H Eugene Stanley. Finding a better
immunization strategy. Physical review letters, 101(5):058701, 2008.
Leon Danon, Ashley P Ford, Thomas House, Chris P Jewell, Matt J Keeling, Gareth O Roberts,
Joshua V Ross, and Matthew C Vernon. Networks and the epidemiology of infectious disease.
Interdisciplinary perspectives on infectious diseases, 2011, 2011.
A H Dekker. Network centrality and super-spreaders in infectious disease epidemiology. In 20th
International Congress on Modelling and Simulation (MODSIM2013), 2013.
Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. Exploring network structure, dynamics, and
function using NetworkX. In Proceedings of the 7th Python in Science Conference (SciPy2008),
pages 11 -- 15, Pasadena, CA USA, August 2008.
Petter Holme. Modern temporal network theory: a colloquium. The European Physical Journal B,
88(9):1 -- 30, 2015.
Petter Holme and Jari Saramakid. Temporal networks. Physics Reports, 519(3):97 -- 125, 2012.
Lars Hufnagel, Dirk Brockmann, and Theo Geisel. Forecast and control of epidemics in a globalized
world. Proceedings of the National Academy of Sciences of the United States of America, 101
(42):15124 -- 15129, 2004.
David Kempe, Jon Kleinberg, and ´Eva Tardos.
Influential nodes in a diffusion model for social
networks. In Automata, languages and programming, pages 1127 -- 1138. Springer, 2005.
Masahiro Kimura, Kazumi Saito, Ryohei Nakano, and Hiroshi Motoda. Extracting influential nodes
on a social network for information diffusion. Data Mining and Knowledge Discovery, 20(1):70 --
97, 2010.
Maksim Kitsak, Lazaros K. Gallos, Shlomo Havlin, Fredrik Liljeros, Lev Muchnik, H. Eugene Stan-
ley, and Hern´an A. Makse. Identification of influential spreaders in complex networks. Nature
Physics, 6:888 -- 893, 2010.
Chris J Kuhlman, VS Anil Kumar, Madhav V Marathe, SS Ravi, and Daniel J Rosenkrantz. Finding
In Machine
critical nodes for inhibiting diffusion of complex contagions in social networks.
Learning and Knowledge Discovery in Databases, pages 111 -- 127. Springer, 2010.
Othon Michail. An introduction to temporal graphs: An algorithmic perspective. In Algorithms,
Probability, Networks, and Games, pages 308 -- 343. Springer, 2015.
Mark EJ Newman. Spread of epidemic disease on networks. Physical review E, 66(1):016128,
2002.
Mark EJ Newman, Stephanie Forrest, and Justin Balthrop. Email networks and the spread of com-
puter viruses. Physical Review E, 66(3):035101, 2002.
Vincenzo Nicosia, John Tang, Cecilia Mascolo, Mirco Musolesi, Giovanni Russo, and Vito Latora.
Graph metrics for temporal networks. arXiv:1306.0493 [physics.soc-ph], 1306, 2013.
11
R. Pastor-Satorras and A. Vespignani. Immunization of complex networks. Physical Review E, 65:
036104, 2002.
Ren´e Pfitzner, Ingo Scholtes, Antonios Garas, Claudio J. Tessone, and Frank Schweitzerk. Between-
ness preference: Quantifying correlations in the topological dynamics of temporal networks.
Physical Review Letters, 110:198701 1 -- 5, 2013.
Hazhir Rahmandad and John Sterman. Heterogeneity and network structure in the dynamics of
diffusion: Comparing agent-based and differential equation models. Management Science, 54
(5):998 -- 1014, May 2008.
Kazumi Saito, Masahiro Kimura, Kouzou Ohara, and Hiroshi Motoda. Efficient discovery of in-
fluential nodes for sis models in social networks. Knowledge and information systems, 30(3):
613 -- 635, 2012.
Leo Speidel, Taro Takaguchi, and Naoki Masuda. Community detection in directed acyclic graphs.
The European Physical Journal B, 88(8):1 -- 10, 2015.
Yu Wang, Gao Cong, Guojie Song, and Kunqing Xie. Community-based greedy algorithm for min-
ing top-k influential nodes in mobile social networks. In Proceedings of the 16th ACM SIGKDD
international conference on Knowledge discovery and data mining, pages 1039 -- 1048. ACM,
2010.
Yintao Yu, Tanya Y Berger-Wolf, Jared Saia, et al. Finding spread blockers in dynamic networks.
In Advances in Social Network Mining and Analysis, pages 55 -- 76. Springer, 2010.
12
Supplementary Material
Model Scenarios and Infection Sizes:
Includes a 3D histogram with a row for each scenario
showing the frequency of infections of each size. We also have a set of twelve 3D histograms (one
for each scenario) with a row for each of the 25 skeletons showing the disease variation resulting
from network structure; however, in consideration of space and the real focus of this paper they
are excluded (available upon request). We also provide a table of the mean and standard deviations
of the raw magnitudes for each scenario. When excluding the duds the distributions approximate
normal distributions, but the large numbers of duds make the normal approximation inappropriate
and it is not the case that the disease results follow any single distribution with the mean and stan-
dard deviations in the table. The mean and standard deviation do, however, capture the relative
all-things-considered expected infection sizes for each scenario.
Correlations between Agent-Initialized Magnitude and TKO Measures:
The Pearson and
Spearman correlation coefficients between (a) the disease magnitude reached when agent i is the
initial agent and (b) four different versions of the TKO aggregated across time for agent i. The
correlations are performed separately for each scenario between the lists of values for all 200 agents
combined across all 25 network skeletons. With the highest scores near 0.50 and most much lower,
the result is that measuring an agent's impact using the super-spreader approach alone is not accu-
rate in capturing an agent's actual influence compared to TKO.
Comparisons of Network Measures to TKO scores: This section starts with one page of further
methodological description, especially about the flattened observed interaction dynamics networks.
Following that are eight pages of table triplets each showing the Pearson, Spearman, and Top Ten
comparisons between each of five common network centrality measures. Each of the four TKO
variation has it's one page of tables for both the base and the flattened networks. Because the
base and unweighted flattened networks are nearly identical, so are the correlations. The weighted
versions of the flattened measure are excluded in consideration of the space to describe them in light
of the result that they also do not significantly covary with any TKO measures.
13
Model Scenarios and Infection Sizes
Figure 3: Results histogram of infection spread in terms of the number of temporal nodes infected
(raw magnitude) across 5000 runs for each scenario (one run initialized at each of 200 agents for
each of the 25 base network implementations). Notice that a very large proportion of runs are
"duds" in which the infection fails to spread beyond 50 temporal nodes. The SIS models naturally
have greater magnitude values due to reinfection. These dynamics are typical of SIR and SIS models
with similar parameters.
Infection Type Network Type
Infection Probability Mean Magnitude Magnitude StDev Percent Duds
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
Scale Free
Scale Free
Scale Free
Small World
Small World
Small World
Scale Free
Scale Free
Scale Free
Small World
Small World
Small World
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
143.352
584.744
1296.44
88.9266
227.321
445.033
548.746
5003.03
10800.6
308.734
2526.97
7036.79
288.549
774.628
1142.24
131.743
324.207
559.017
1155.19
5237.44
8150.76
536.106
2839.26
5623.18
0.625
0.482
0.380
0.584
0.457
0.352
0.593
0.445
0.344
0.557
0.433
0.333
Table 4: Results summary of infection spread for each model variation. Each row aggregates 5000
runs (one run initialized at each of 200 agents for each of the 25 base network implementations).
Duds are defined as runs in which the raw magnitude is fewer than 50 agent-times.
14
Correlations between Agent-Initialized Magnitude and TKO Measures
Disease Type Network Type
InfectionRate MaxProportion MaxDeltaFraction AveProportion AveDeltaFraction
Pearson Correlations of Agent-Initialized Magnitude and TKO Measures.
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.402831
0.0674457
0.0457449
0.494424∗
0.043098
0.0297556
0.346553
0.0566606
0.0446214
0.404204
0.0240389
0.0502245
0.404905
0.246309
0.219299
0.471569
0.264589
0.19209
0.375933
0.247974
0.233998
0.417726
0.201376
0.190489
0.288126
0.0644679
0.0781154
0.366466
0.0770296
0.0154106
0.268197
0.0838702
0.0585834
0.353329
0.0452133
0.0420603
0.292081
0.157114
0.158489
0.363984
0.188738
0.118696
0.282026
0.153358
0.107849
0.370916
0.149954
0.10682
Table 5: The mean Pearson correlations coefficients of (a) the disease magnitude given an agent is
the initially infected agent and (b) the TKO score for that agent. The on-average low correlations
imply that using the disease spread based on initial infection is a poor measure of influence. Further-
more, the correlations are nearly always worse with increasing infection rates (and hence increasing
magnitudes and fewer dud runs) implying that much of the ability to match TKO relies on the cases
in which both scores are near zero.
Disease Type Network Type
InfectionRate MaxProportion MaxDeltaFraction AveProportion AveDeltaFraction
Spearman Correlations of Agent-Initialized Magnitude and TKO Measures.
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.40153
0.0630928
0.0277719
0.516584∗
0.0671833
0.0375412
0.296555
0.0487628
0.0370982
0.335403
0.0256655
0.0449195
0.305474
0.221007
0.203116
0.420064
0.292652
0.222854
0.252962
0.198384
0.184936
0.280811
0.190925
0.187943
0.388263
0.105923
0.0667476
0.461123
0.149355
0.0577158
0.277245
0.0806729
0.027529
0.29627
0.0797812
0.0447358
0.308888
0.193733
0.168757
0.404163
0.270376
0.171541
0.235637
0.13593
0.069931
0.255873
0.160578
0.11443
Table 6: The mean Spearman Rank correlation coefficients (rho) of (a) the disease magnitude given
an agent is the initially infected agent and (b) the TKO score for that agent. The correlations reveal
similar values and a similar pattern to the Pearson correlations, reinforcing that using the disease
spread based on initial infection is a poor measure of influence.
15
Comparisons of Network Measures to TKO scores
The following twelve sets of three data tables present the results of determining how well common
network centrality measures capture agent influence. Although the main result is that none of the
network measures successfully capture/predict agent influence as measured by four versions of TKO
in any scenario, the specific changes in the data reveal patterns -- and those patterns may point to
improved measures.
Although the paper focuses on the base network analysis, we also analyzed the network gener-
ated by flattening the observed interactions. We record who interacts with whom over time in the
temporal network skeleton, then we flatten this skeleton to achieve both a weighted by interaction
frequency and an unweighted flat network representation. If the model runs long enough the ob-
served interactions converge to the base network of potential interactions, but in many applications
the flattened network is observable/derivable from data while the base network is unknown and/or
theoretical. In our simulations, because the probability that a given link is active in a time step is
∝ 1/k, k is low (typically single digit except a few agents in the scale free networks), and there are
200 time steps, the base and unweighted flattened graphs are nearly identical.
Because for each base network we generate the skeleton including all transition and interaction
probabilities, the empirically derived flattened network connections are always the same for each
run of the same skeleton (i.e., starting from each agent). In the current model the infection state
does not alter the interaction probability. If it did, then the observed transitions would vary from
run to run even using the same network skeleton because what is stored in the skeleton is a set
of draws from probability distributions rather than a fixed interaction structure. If, for example,
being infectious reduced the probability of interaction, then the probability stored in the skeleton
would be compared to a different interaction threshold and thus could alter which interactions occur.
However, using the same skeletons for multiple runs of different dynamics on the same structure
at least satisfies the Markov condition for these simulations, which is not maintained when running
the dynamics independently for each initial agent run.
Flattened graphs are potentially better at tracking influence because they allow one to create
weighted networks from the observed interaction frequencies. However, in our experiments the
correlation valued between TKO and the weighted network centrality measures were no better,
although they were slightly different. For this reason and considerations of space we have excluded
them from this paper.
16
Maximum TKO and Base Interaction Network
Pearson Correlations of Centrality Measures and Maximum TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.12254
0.1475
0.14354
0.00727
0.05936
0.08282
0.13835
0.11807
0.09523
0.02154
0.0637
0.11755
Closeness Betweenness Eigenvector
0.09622
0.11315
0.11432
0.0654
0.0854
0.17901
0.09571
0.08243
0.07743
0.07993
0.11582
0.13727
Katz
0.08855
0.06909
0.11531
0.09876
0.11355
0.09922
0.00047 −0.0051
0.0749
0.08465
0.07405
0.03241
0.07816
0.09935
0.0866
0.07341
0.07262
0.06029
−0.01334
0.00489
0.05537
0.02679
0.06551
0.13365
0.09557
0.127
0.11925
0.03754
0.11007
0.1399
0.11868
0.09698
0.07644
0.03546
0.11384
0.22958
Spearman Correlations of Centrality Measures and Maximum TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.19228
0.19853
0.21217
0.01237
0.05613
0.08772
0.18963
0.18795
0.19385
0.01626
0.08308
0.11411
Closeness Betweenness Eigenvector
0.10423
0.10738
0.12175
0.02756
0.09342
0.17172
0.0922
0.08439
0.08551
0.04382
0.15921
0.16911
Katz
0.09346
0.06062
0.10471
0.07401
0.11573
0.08827
0.03103
0.01127
0.06225
0.04637
0.07409
0.08572
0.08388
0.0518
0.08274
0.05498
0.08034
0.04848
−0.00418 −0.00617
0.05083
0.03365
0.13965
0.09623
0.18884
0.17779
0.20802
0.03768
0.09055
0.10234
0.18953
0.17362
0.19045
0.02805
0.14567
0.20342
Top Ten Overlap of Centrality Measures and Maximum TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.004
0.004
0.008
0.
0.004
0.004
0.008
0.
0.008
0.
0.016
0.02
Closeness Betweenness Eigenvector
0.012
0.008
0.004
0.008
0.004
0.004
0.012
0.004
0.012
0.008
0.004
0.008
0.008
0.004
0.016
0.004
0.02
0.008
0.012
0.
0.004
0.012
0.012
0.028
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Katz
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Table 7: The Pearson and Spearman correlations as well as the average percent of matching Top
Ten agents between the maximum proportional TKO score with each of five base network agent
centrality scores.
17
Maximum TKO and Flattened Interaction Network - Unweighted
Pearson Correlations of Unweighted Centrality Measures and Maximum TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.12308
0.14731
0.14399
0.00727
0.05936
0.08282
0.13867
0.11804
0.09568
0.02154
0.0637
0.11755
Closeness Betweenness Eigenvector
0.09402
0.11036
0.11477
0.0654
0.0854
0.17901
0.09368
0.07891
0.07786
0.07993
0.11582
0.13727
Katz
−0.01539
0.071
0.05439
0.01392
0.03457
0.00323
−0.03346 −0.0077
0.04161 −0.00132
−0.02131
0.01624
0.00385
0.07499
0.06998
0.02266
0.02772
0.01391
−0.00236 −0.00627
0.01076
0.00063
−0.03648
0.02426
0.09698
0.1275
0.12008
0.03754
0.11007
0.1399
0.11945
0.09743
0.07724
0.03546
0.11384
0.22958
Spearman Correlations of Unweighted Centrality Measures and Maximum TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.19227
0.19851
0.2122
0.01237
0.05613
0.08772
0.18963
0.1879
0.19386
0.01626
0.08308
0.11411
Closeness Betweenness Eigenvector
0.10395
0.10683
0.12236
0.02756
0.09342
0.17172
0.09154
0.08214
0.08589
0.04382
0.15921
0.16911
Katz
0.06804 −0.01847
0.02382
0.06697
0.03882
0.00276
−0.05264 −0.00279
0.05751 −0.00228
0.01547
0.02494
0.05854 −0.00145
0.06379
0.03914
0.02634
0.01455
−0.01907 −0.01421
0.00706
0.04287
−0.0002
0.0116
0.18916
0.18072
0.20727
0.03768
0.09055
0.10234
0.19067
0.17613
0.18989
0.02805
0.14567
0.20342
Top Ten Overlap of Unweighted Centrality Measures and Maximum TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.004
0.
0.008
0.
0.004
0.004
0.008
0.004
0.008
0.
0.016
0.02
Closeness Betweenness Eigenvector
0.004
0.008
0.
0.008
0.004
0.004
0.016
0.004
0.012
0.008
0.004
0.008
0.004
0.012
0.016
0.004
0.02
0.008
0.012
0.
0.004
0.012
0.012
0.028
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Katz
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Table 8: The Pearson and Spearman correlations as well as the average percent of matching Top
Ten agents between the maximum proportional TKO score with each of five flattened observed
interaction network agent centrality scores.
18
Maximum Delta Fraction TKO and Base Interaction Network
Disease Type Network Type
InfectionRate
Pearson Correlations of Centrality Measures and Maximum Delta TKO on Base Network
Closeness Betweenness Eigenvector
0.08344
0.13195
0.12103
0.08652
0.1837
0.20727
0.08506
0.10067
0.08954
0.11559
0.23611
0.20109
Katz
0.07491
0.05781
0.13926
0.12469
0.1196
0.10376
−0.00663 −0.00979
0.09028
0.07832
0.10154
0.04081
0.0728
0.08919
0.1063
0.09209
0.08694
0.07255
−0.00982
0.00079
0.07326
0.04475
0.07395
0.15273
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
Degree
0.10286
0.16692
0.15331
0.00478
0.08566
0.11087
0.11816
0.13843
0.11433
0.01778
0.08102
0.14115
0.08
0.15128
0.12757
0.04694
0.14683
0.16839
0.10179
0.11605
0.09371
0.04528
0.15822
0.26869
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
Disease Type Network Type
InfectionRate
Spearman Correlations of Centrality Measures and Maximum Delta TKO on Base Network
Closeness Betweenness Eigenvector
0.10484
0.12246
0.13404
0.05484
0.17675
0.24107
0.08878
0.09828
0.09769
0.07497
0.26058
0.23591
Katz
0.09269
0.05831
0.11981
0.08953
0.1246
0.09275
0.0346
0.00932
0.07697
0.06284
0.07399
0.08672
0.07923
0.04705
0.0964
0.06375
0.08987
0.05166
−0.01973 −0.0145
0.06764
0.05387
0.14568
0.09482
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
Degree
0.19207
0.22213
0.23221
0.01617
0.06147
0.09899
0.18397
0.22487
0.22593
0.01798
0.08985
0.13121
0.19034
0.21438
0.2258
0.0493
0.09661
0.14145
0.18672
0.21779
0.22199
0.04538
0.16032
0.23906
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Top Ten Overlap of Centrality Measures and Maximum Delta TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.008
0.016
0.004
0.004
0.02
0.004
0.016
0.008
0.008
0.008
0.008
0.028
Closeness Betweenness Eigenvector
0.012
0.004
0.004
0.008
0.008
0.008
0.004
0.004
0.016
0.016
0.004
0.012
0.008
0.016
0.012
0.004
0.024
0.02
0.016
0.004
0.008
0.016
0.024
0.024
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Katz
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Table 9: The Pearson and Spearman correlations as well as the average percent of matching Top
Ten agents between the maximum change in fractional TKO score with each of five base network
agent centrality scores.
19
Maximum Delta Fraction TKO and Flattened Interaction Network - Unweighted
Pearson Correlations of Unweighted Centrality Measures and Maximum Delta TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.10322
0.16637
0.15391
0.00478
0.08566
0.11087
0.1181
0.13813
0.11505
0.01778
0.08102
0.14115
Closeness Betweenness Eigenvector
0.08126
0.12859
0.12173
0.08652
0.1837
0.20727
0.08238
0.09611
0.09018
0.11559
0.23611
0.20109
Katz
−0.00984
0.0504
0.06161
0.02626
0.04181
0.00983
−0.03715 −0.00275
0.00211
0.07864
−0.0042
−0.00451
0.00915
0.06581
0.08351
0.02489
0.03574
0.01906
−0.01955
0.00412
0.01473
0.03885
−0.04363
0.01438
0.08119
0.15112
0.12867
0.04694
0.14683
0.16839
0.102
0.11633
0.09494
0.04528
0.15822
0.26869
Disease Type Network Type
InfectionRate
Spearman Correlations of Unweighted Centrality Measures and Maximum Delta TKO on Flattened Network
Katz
0.06511 −0.02302
0.01792
0.07393
0.00736
0.05252
−0.05967
0.00591
0.00537
0.11312
0.02893
0.0099
0.00408
0.05192
0.0759
0.03789
0.04268
0.02456
−0.01514 −0.01234
0.10784
0.0099
0.00745 −0.01646
Closeness Betweenness Eigenvector
0.10443
0.12175
0.13514
0.05484
0.17675
0.24107
0.08785
0.09573
0.09808
0.07497
0.26058
0.23591
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
Degree
0.19206
0.22211
0.23223
0.01617
0.06147
0.09899
0.18396
0.22485
0.22593
0.01798
0.08985
0.13121
0.19097
0.21708
0.22504
0.0493
0.09661
0.14145
0.18809
0.22064
0.22135
0.04538
0.16032
0.23906
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Top Ten Overlap of Unweighted Centrality Measures and Maximum Delta TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.008
0.012
0.004
0.004
0.02
0.004
0.016
0.008
0.012
0.008
0.008
0.028
Closeness Betweenness Eigenvector
0.012
0.004
0.
0.008
0.008
0.008
0.008
0.004
0.008
0.016
0.004
0.012
0.012
0.016
0.012
0.004
0.024
0.02
0.016
0.004
0.012
0.016
0.024
0.024
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Katz
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Table 10: The Pearson and Spearman correlations as well as the average percent of matching Top
Ten agents between the maximum change in fractional TKO score with each of five flattened ob-
served interaction network agent centrality scores.
20
Mean TKO and Base Interaction Network
Pearson Correlations of Centrality Measures and Mean TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.12721
0.12514
0.13992
−0.00492
0.04866
0.06674
0.13528
0.16164
0.23309
0.02536
0.06834
0.12315
Closeness Betweenness Eigenvector
0.10583
0.09557
0.11872
0.03076
0.07044
0.12695
0.08851
0.09822
0.16747
0.0545
0.10208
0.17406
Katz
0.09757
0.07997
0.0977
0.08398
0.11485
0.10137
−0.00766 −0.01483
0.06403
0.08047
0.05665
0.02619
0.06804
0.09088
0.10646
0.08486
0.16756
0.13834
−0.0126
0.0042
0.05613
0.02545
0.0522
0.12552
0.09908
0.10187
0.11503
0.01898
0.08208
0.10153
0.11109
0.127
0.19103
0.01982
0.11029
0.24128
Spearman Correlations of Centrality Measures and Mean TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.1905
0.20983
0.22161
0.00607
0.05186
0.05635
0.20006
0.27654
0.32109
0.00761
0.06719
0.11495
Closeness Betweenness Eigenvector
0.09194
0.11228
0.13071
0.01531
0.08794
0.15674
0.08366
0.10011
0.13576
0.02375
0.15883
0.20274
Katz
0.08058
0.04674
0.1079
0.07657
0.12272
0.09371
0.02495
0.00735
0.07049
0.05397
0.05611
0.05825
0.07421
0.03927
0.09862
0.05359
0.12637
0.07313
−0.01435 −0.01696
0.04759
0.0364
0.11563
0.0699
0.19137
0.19027
0.21508
0.0249
0.08288
0.0957
0.2032
0.26282
0.31428
0.01917
0.13379
0.21729
Top Ten Overlap of Centrality Measures and Mean TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.012
0.012
0.02
0.004
0.008
0.016
0.012
0.012
0.016
0.004
0.02
0.012
Closeness Betweenness Eigenvector
0.008
0.02
0.004
0.008
0.024
0.008
0.008
0.008
0.028
0.004
0.012
0.016
0.012
0.
0.016
0.004
0.008
0.016
0.016
0.008
0.02
0.016
0.016
0.032
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Katz
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Table 11: The Pearson and Spearman correlations as well as the average percent of matching Top
Ten agents between the mean proportional TKO score with each of five base network agent centrality
scores.
21
Mean TKO and Flattened Interaction Network - Unweighted
Pearson Correlations of Unweighted Centrality Measures and Mean TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.12815
0.12567
0.14023
−0.00492
0.04866
0.06674
0.13606
0.16208
0.23404
0.02536
0.06834
0.12315
Closeness Betweenness Eigenvector
0.10446
0.09498
0.11871
0.03076
0.07044
0.12695
0.08709
0.09486
0.16759
0.0545
0.10208
0.17406
Katz
−0.0147
0.06
0.06054 −0.00984
0.01406
0.04537
−0.0322
−0.01334
0.04724 −0.00565
−0.00722
0.01564
0.01291
0.08012
0.01734
0.09913
0.10685
0.01614
0.00807
0.00569
0.0242
0.01523
0.00142 −0.004
0.10138
0.10378
0.1158
0.01898
0.08208
0.10153
0.11292
0.12839
0.19278
0.01982
0.11029
0.24128
Spearman Correlations of Unweighted Centrality Measures and Mean TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.19049
0.20984
0.22161
0.00607
0.05186
0.05635
0.20004
0.27653
0.32109
0.00761
0.06719
0.11495
Closeness Betweenness Eigenvector
0.09173
0.11246
0.13124
0.01531
0.08794
0.15674
0.08303
0.09826
0.13629
0.02375
0.15883
0.20274
Katz
0.05292 −0.0181
0.02852
0.07219
0.04265 −0.00284
−0.04346
0.00171
0.00793
0.05263
0.03002
0.00901
0.00635
0.05261
0.07858
0.04579
0.05399
0.02333
−0.01027 −0.00899
0.06029
0.00663
0.02264 −0.00918
0.19154
0.19295
0.2144
0.0249
0.08288
0.0957
0.2042
0.26503
0.31345
0.01917
0.13379
0.21729
Disease Type Network Type
InfectionRate
Top Ten Overlap of Unweighted Centrality Measures and Mean TKO on Flattened Network
Closeness Betweenness Eigenvector
0.004
0.016
0.012
0.008
0.024
0.008
0.02
0.008
0.02
0.004
0.012
0.016
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
Degree
0.008
0.008
0.016
0.004
0.008
0.016
0.012
0.016
0.016
0.004
0.02
0.012
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
0.008
0.004
0.02
0.004
0.008
0.016
0.012
0.004
0.02
0.016
0.016
0.032
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Katz
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Table 12: The Pearson and Spearman correlations as well as the average percent of matching Top
Ten agents between the mean TKO score with each of five flattened observed interaction network
agent centrality scores.
22
Mean Delta Fraction TKO and Base Interaction Network
Pearson Correlations of Centrality Measures and Mean Delta TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.11126
0.14889
0.16805
−0.00009
0.07554
0.10399
0.1261
0.18292
0.24463
0.02352
0.09169
0.14818
Katz
0.07232
0.11078
0.12793
Closeness Betweenness Eigenvector
0.09799
0.11732
0.14606
0.04849
0.15629
0.17922
0.08495
0.11692
0.17563
0.08397
0.22063
0.2428
0.0877
0.12374
0.14173
−0.01346 −0.015
0.0855
0.08021
0.0903
0.03744
0.06882
0.08869
0.12508
0.10177
0.17664
0.14665
−0.01187
0.00138
0.07855
0.04315
0.0684
0.15092
0.08769
0.12976
0.13956
0.0285
0.11958
0.14133
0.10497
0.14573
0.20131
0.02964
0.15242
0.2825
Spearman Correlations of Centrality Measures and Mean Delta TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.1898
0.21847
0.22746
0.01018
0.0516
0.0699
0.19765
0.29223
0.32746
0.00888
0.07207
0.11845
Closeness Betweenness Eigenvector
0.09614
0.12032
0.13761
0.03939
0.14602
0.21156
0.08699
0.10894
0.13763
0.05328
0.24837
0.25568
Katz
0.08385
0.04946
0.11745
0.08826
0.1287
0.09995
0.02556
0.00609
0.0788
0.0599
0.05664
0.06476
0.07697
0.04237
0.10884
0.06348
0.12769
0.07348
−0.02485 −0.02329
0.05916
0.05486
0.11974
0.07612
0.1907
0.20791
0.21875
0.03931
0.08077
0.12171
0.2017
0.28278
0.32083
0.03496
0.14039
0.22694
Top Ten Overlap of Centrality Measures and Mean Delta TKO on Base Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.016
0.028
0.024
0.008
0.012
0.02
0.012
0.024
0.024
0.012
0.012
0.012
Closeness Betweenness Eigenvector
0.012
0.016
0.012
0.
0.02
0.02
0.024
0.004
0.044
0.008
0.02
0.012
0.012
0.032
0.02
0.
0.008
0.012
0.016
0.012
0.028
0.02
0.032
0.028
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Katz
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Table 13: The Pearson and Spearman correlations as well as the average percent of matching Top
Ten agents between the mean change in fractional TKO score with each of five base network agent
centrality scores.
23
Mean Delta Fraction TKO and Flattened Interaction Network - Unweighted
Pearson Correlations of Unweighted Centrality Measures and Mean Delta TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.11209
0.14898
0.16834
−0.00009
0.07554
0.10399
0.12659
0.18318
0.24569
0.02352
0.09169
0.14818
Closeness Betweenness Eigenvector
0.09676
0.11589
0.14605
0.04849
0.15629
0.17922
0.08274
0.11273
0.17587
0.08397
0.22063
0.2428
Katz
0.04575 −0.00955
0.07341
0.00383
0.05829
0.01177
−0.03495 −0.00892
0.06106 −0.00153
−0.00044
0.00307
0.01533
0.07632
0.1164
0.02053
0.11365
0.01806
−0.00576
0.01179
0.01275
0.04087
−0.00623
0.00016
0.08987
0.13081
0.14042
0.0285
0.11958
0.14133
0.10637
0.14702
0.20314
0.02964
0.15242
0.2825
Spearman Correlations of Unweighted Centrality Measures and Mean Delta TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.18978
0.21847
0.22745
0.01018
0.0516
0.0699
0.19763
0.29223
0.32746
0.00888
0.07207
0.11845
Closeness Betweenness Eigenvector
0.09581
0.12017
0.13857
0.03939
0.14602
0.21156
0.08611
0.10699
0.13833
0.05328
0.24837
0.25568
Katz
0.05107 −0.02437
0.02238
0.06814
0.00276
0.04818
−0.05202
0.00721
0.01342
0.09211
0.03232
0.00737
0.01168
0.05174
0.08752
0.04597
0.05933
0.02361
−0.00993 −0.00835
0.11152
0.00933
0.01745 −0.01791
0.19107
0.21048
0.21806
0.03931
0.08077
0.12171
0.20295
0.28511
0.31985
0.03496
0.14039
0.22694
Top Ten Overlap of Unweighted Centrality Measures and Mean Delta TKO on Flattened Network
Disease Type Network Type
InfectionRate
SIR
SIR
SIR
SIR
SIR
SIR
SIS
SIS
SIS
SIS
SIS
SIS
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
scalefree
scalefree
scalefree
smallworld
smallworld
smallworld
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
0.10
0.15
0.20
Degree
0.016
0.024
0.028
0.008
0.012
0.02
0.012
0.02
0.028
0.012
0.012
0.012
Closeness Betweenness Eigenvector
0.02
0.008
0.024
0.
0.02
0.02
0.016
0.004
0.024
0.008
0.02
0.012
0.012
0.024
0.016
0.
0.008
0.012
0.012
0.012
0.02
0.02
0.032
0.028
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Katz
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Table 14: The Pearson and Spearman correlations as well as the average percent of matching Top
Ten agents between the mean change in fractional TKO score with each of five flattened observed
interaction network agent centrality scores.
24
|
1610.07772 | 1 | 1610 | 2016-10-25T07:56:43 | Visual Themes and Sentiment on Social Networks To Aid First Responders During Crisis Events | [
"cs.SI"
] | Online Social Networks explode with activity whenever a crisis event takes place. Most content generated as part of this activity is a mixture of text and images, and is particularly useful for first responders to identify popular topics of interest and gauge the pulse and sentiment of citizens. While multiple researchers have used text to identify, analyze and measure themes and public sentiment during such events, little work has explored visual themes floating on networks in the form of images, and the sentiment inspired by them. Given the potential of visual content for influencing users' thoughts and emotions, we perform a large scale analysis to compare popular themes and sentiment across images and textual content posted on Facebook during the terror attacks that took place in Paris in 2015. Using state-of-the-art image summarization techniques, we discovered multiple visual themes which were popular in images, but were not identifiable through text. We uncovered instances of misinformation and false flag (conspiracy) theories among popular image themes, which were not prominent in user generated textual content, and can be of particular inter- est to first responders. Our analysis also revealed that while textual content posted after the attacks reflected negative sentiment, images inspired positive sentiment. To the best of our knowledge, this is the first large scale study of images posted on social networks during a crisis event. | cs.SI | cs | Visual Themes and Sentiment on Social Networks To Aid
First Responders During Crisis Events
Prateek Dewan1, Varun Bharadhwaj2∗, Aditi Mithal1∗, Anshuman Suri1∗,
Ponnurangam Kumaraguru1
1Indraprastha Institute of Information Technology - Delhi (IIIT-D)
2National Institute of Technology, Tiruchirappalli, India
1{prateekd,aditim13122,anshuman14021,pk}@iiitd.ac.in, [email protected]
6
1
0
2
t
c
O
5
2
]
I
S
.
s
c
[
1
v
2
7
7
7
0
.
0
1
6
1
:
v
i
X
r
a
ABSTRACT
Online Social Networks explode with activity whenever a
crisis event takes place. Most content generated as part of
this activity is a mixture of text and images, and is partic-
ularly useful for first responders to identify popular topics
of interest and gauge the pulse and sentiment of citizens.
While multiple researchers have used text to identify, ana-
lyze and measure themes and public sentiment during such
events, little work has explored visual themes floating on
networks in the form of images, and the sentiment inspired
by them. Given the potential of visual content for influenc-
ing users' thoughts and emotions, we perform a large scale
analysis to compare popular themes and sentiment across
images and textual content posted on Facebook during the
terror attacks that took place in Paris in 2015. Using state-
of-the-art image summarization techniques, we discovered
multiple visual themes which were popular in images, but
were not identifiable through text. We uncovered instances
of misinformation and false flag (conspiracy) theories among
popular image themes, which were not prominent in user
generated textual content, and can be of particular inter-
est to first responders. Our analysis also revealed that while
textual content posted after the attacks reflected negative
sentiment, images inspired positive sentiment. To the best
of our knowledge, this is the first large scale study of images
posted on social networks during a crisis event.
1.
INTRODUCTION
"Use a picture. It's worth a thousand words."
Tess Flanders, 1911
The last decade has witnessed a revolution in commu-
nication technology with the introduction of Online Social
Networks like Facebook and Twitter. Especially during cri-
sis events like earthquakes, bomb blasts, terror attacks etc.,
∗These authors contributed equally to the paper.
ACM ISBN 978-1-4503-2138-9.
DOI: 10.1145/1235
people switch to social media to share updates, experiences,
and stay up to date [7, 13]. All of this user generated content
makes OSNs a crucial source of information for first respon-
ders to get a sense of the pulse and sentiment of the public
on a global scale in almost real time.
In the last few years, multiple researchers have analyzed
the textual part of the content to identify and analyze sen-
timent and popular topics of discussion among the masses
on OSNs during crisis event, for example, [1, 8, 10, 16, 21].
Sentiment and topic analysis of textual content on OSNs
is widely used by researchers and first responders to gauge
the pulse of citizens and make decisions accordingly. How-
ever, all OSN content is not necessarily in textual format.
Researchers have reported high percentage of posts gener-
ated during real world events to contain only images, and no
text at all. 1 This points to the fact that the methodology
adopted for most of the aforementioned research misses out
on such sections of content, which do not contain text. More-
over, even if a post contains text along with an image, the
text may not be representative of the topic or sentiment de-
picted by the accompanying image. Consider the post in Fig-
ure 1 for instance. While sentiment analysis on text would
reveal positive sentiment for this post, the sentiment associ-
ated with the image is contrasting. Considering the human
brain's affinity towards visual content, 2 it is likely that the
pulse and sentiment of user generated content as perceived
by researchers through text, differs from the true sentiment,
since most past research does not consider images to draw
inferences.
In this paper, we study a large dataset of over 57,000 im-
ages posted on Facebook during the terrorist attack in Paris
in November, 2015. We employ state-of-the-art image anal-
ysis techniques for mining and measuring the themes and
sentiment of content posted through images on a large scale,
and compare the findings with similar analysis performed on
textual content. Results of this measurement reveal sizeable
differences in topics, themes, and sentiment drawn from im-
ages and text. We observed that textual content embedded
in images, as well as text contained in posts depicted neg-
ative sentiment. On the other hand, images in general were
found to inspire positive sentiment. Upon manual inspection,
we observed that this contrasting behavior was largely due
to the popularity of images offering support and solidarity
to the victims of the attacks. Using a Convolutional Neural
1http://precog.iiitd.edu.in/blog/2016/08/
imagesononlinesocialmedia/
2http://changingminds.org/explanations/learning/active
learning.htm
2. RELATED WORK
There exists prior literature in the space of studying im-
ages during crisis events on a small scale on OSNs, as well
as studying crisis events on OSNs otherwise. Our work con-
tributes towards enhancing the work done in both these cat-
egories, as we discuss below.
2.1
Images on OSNs during crisis events
Multiple
researchers have attempted to study images
posted on OSNs to analyze crisis events. Gupta et al. at-
tempted to identify and characterize the spread of fake im-
ages on Twitter during Hurricane Sandy in 2013. Although
the paper was focused on identifying fake images, the method-
ology adopted by the authors did not involve image analysis.
Authors manually identified a set of fake images from news
articles and blogs, and used the URLs of these fake images
to expand their dataset of tweets containing fake images.
This dataset was used to extract user and tweet level fea-
tures to automatically identify tweets containing fake image
URLs from tweets containing real image URLs [9]. Vis et
al. conducted an exploratory analysis of images shared on
Twitter during the 2011 UK riots. Similar to Gupta et al.'s
approach, authors manually classified images into 14 cate-
gories for characterization [23]. More similar work includes
empirical analysis of Twitter images during the 2012 Israeli-
Hamas conflict, where authors examined images shared by
two Twitter accounts over a 2 month time frame. A total
of 243 images were captured, and studied manually to dis-
cover prominent themes and frames, human characters, etc.
present in the images [18]. Kharroub et al. studied 581 Twit-
ter images from the 2011 Egyptian revolution and found
more images depicting crowds and protest activity as com-
pared to images depicting violent content. In addition to
most prominent visual themes, authors of this work tried
to find whether user information helps in predicting image
retweets, and whether image themes vary across different
phases of the event [11].
As evident from prior research, images play a crucial role
in measuring public sentiment during crisis and mass emer-
gency events like terror attacks, and in cases of detecting
online radicalization. All aforementioned research however,
is restricted to small scale, because of the manual effort in-
volved in measurement and analysis. The use of images for
analyzing events on a large scale remains largely unexplored.
We attempt to bridge this gap to an extent, by exploring
automated methods to extract meaningful information from
images posted on Facebook during the Paris Attacks in 2015.
2.2 Crisis event related studies on OSNs
Numerous researchers have looked at textual content to
study crisis events on OSNs. Hughes et al. studied the use
of the Twitter social network during four emergency events,
and compared how this behavior was different from general
Twitter use. Authors found that Twitter messages sent dur-
ing these types of events contained more displays of infor-
mation broadcasting and brokerage as compared to general
Twitter messages. Textual features like replies, URLs, and
presence of certain keywords were used to draw these find-
ings [10]. Gupta et al. presented a study to identify and char-
acterize communities from a set of users who post messages
on Twitter during three major crisis events in that took place
in 2011. Authors used textual content similarity in addition
to link (network) and location similarity to identify clus-
Figure 1: Example of a Facebook post where sentiment as-
sociated with the post text is in contrast with the sentiment
associated with the text embedded in the image.
Network (CNN) based image summarization model, we ex-
tracted visual themes from images and found that two of the
top 10 most popular themes among images were associated
with instances of misinformation and were not prominent
in textual content. Further, textual content extracted from
images revealed multiple (potentially sensitive) topics asso-
ciated with "refugees", "passports", etc. which were popular
in image text, but not in post text.
These findings indicate the presence of useful information
in the form of images posted on OSNs during crisis events,
which haven't been widely explored in literature. Such infor-
mation can be vital for first responders to get a better sense
of the pulse and sentiment of the masses, and identify and
monitor instances of misinformation and sensitive informa-
tion flowing on the network in the form of images. To the
best of our knowledge, this is the first large scale study to
understand visual themes and sentiment on social networks
during crisis events. Further, the resulting methodology de-
veloped during our analysis scales to a generalizable model
that can be applied to any similar crisis event in the future.
About the event: A series of coordinated terrorist at-
tacks took place in Paris on November 13, 2015 at 21:20
Central European Time. Suicide bombers and gunmen at-
tacked a stadium in Saint-Denis, Paris. This was followed by
mass shootings, and a suicide bombing, at cafes and restau-
rants. Gunmen carried out another mass shooting and took
hostages at a concert in the Bataclan theatre, leading to
a stand-off with police. The attackers were shot or blew
themselves up when police raided the theatre. A total of
130 people were killed, and 368 others were injured. News
about the event spread instantly on all OSN platforms in-
cluding Facebook. Hundreds of users posted live pictures of
the event, and thousands posted messages offering condo-
lence and support. 3
3http://www.bbc.com/news/world-europe-34818994
ters of users similar users [8]. Rudra et al. proposed a novel
framework to assign tweets posted during mass emergency
events into different situational classes, and then summarize
those tweets. Similar to Hughes et al's approach of using
textual features, authors of this work also extracted features
like numerals, nouns, locations, verbs, etc. present in tweet
text to identify and extract event summary [16]. Thelwall et
al. studied sentiment of English tweets during a month long
period and found that popular events were normally associ-
ated with increases in negative sentiment strength. Authors
completely relied on tweet text to extract sentiment strength
and draw inferences [21].
All aforementioned research used textual content to study
events on OSNs and draw inferences, thereby missing out on
a large section of content pertaining to images. As discussed
previously, researchers have tried to look at images on OSNs
using manual techniques, and reported interesting findings.
The aforementioned research highlights the need for auto-
mated large scale techniques to study and mine images to
extract sentiment, themes, and other similar useful informa-
tion that can be used by researchers to better understand
the users' reactions with respect to crisis events on OSNs
and draw more accurate inferences.
3. METHODOLOGY
3.1 Data collection
We collected data using Facebook's Graph API Search
endpoint [6] between November 14, and November 25, 2015.
Until April 2015, Facebook provided developers with the ca-
pability to search for public posts given a keyword using the
Graph API version 1.0. This feature was disabled with ef-
fect from April 30, 2015, with the introduction of version
2.0 of the Graph API. However, in early 2015, a vulnera-
bility discovered in the Graph API highlighted that access
tokens generated by Facebook's mobile apps had some extra
permissions which were not documented by Facebook. 4 On
further exploration, we discovered that access tokens gen-
erated by Facebook's mobile apps were able to access the
post search endpoint of the Graph API version 1.0 even af-
ter April 30, 2015. We used this work-around to query and
collect data from the Graph API in November 2015. Table 1
provides the detailed description of our dataset.
Keywords used
Unique posts
Unique users
Posts with images
Unique users posting images
Total images extracted
Unique images extracted
#ParisAttacks, #PrayForParis
131,548
106,275
75,277
67,570
57,748
15,123
Table 1: Descriptive statistics of our dataset we collected
from Facebook during the Paris Attacks in 2015.
The Graph API returns posts in JSON format (JavaScript
Object Notation), and each post has a type associated with
it. We filtered out all posts of type "photo" and re-queried the
Graph API in February 2016 to obtain the actual images in
these posts. Upon re-querying the Graph API, we noticed
that some of the posts had been deleted from Facebook,
and were no longer accessible. Also, posts with entire photo
albums were also categorized as type "photo", and images
4http://www.7xter.com/2015/02/how-i-hacked-your-facebook-
photos.html
inside these albums were not directly accessible via the API.
Eventually, we were able to collect 57,748 images in total.
We identified duplicates using the difference hash (dHash)
image hashing algorithm 5 and obtained a total of 15,123
unique images (Table 1).
3.2
Image characterization
Understanding and interpreting images is a complex task.
As discussed in Section 2.1, past research on studying the
role of images on OSNs has largely relied on manual methods
to perform measurement studies on images [9, 15, 23]. This
methodology is time consuming and not scalable for bigger
datasets containing more than a few hundred images. With
millions of images generated on OSNs every day 6, manually
looking at images is a futile way to understand visual content
and draw any meaningful conclusions.
To overcome this drawback, we attempt to use automated
methods to characterize images in our dataset. We use Ten-
sorFlow implementation of Google's Inception-v3 model for
image classification [20]. Inception-v3 is trained for the Im-
ageNet Large Visual Recognition Challenge using the data
from 2012, and tries to classify images into 1,000 classes [17].
This model reports a state-of-the-art top-1 error rate of
17.2%, signifying that the most probable label predicted
by this model is correct in 82.8% of the cases in the test
dataset. However, it is important to note that the generated
label comes from a fixed set of 1,000 labels, which is not large
enough for characterizing the wide variety of images we usu-
ally come across on social networks in practice. To establish
the accuracy of this model on our dataset, we recruited hu-
man annotators and got a random sample of 2,545 unique
images annotated by two or more annotators. The job of
each annotator was to mark whether they agreed with the
label generated by the Inception-v3 model for the given im-
age, or not. Using majority voting, we found that the model
achieved an accuracy of 38.87% on our data sample. Given
that there are 1,000 possible output labels, this accuracy
value is much better than random guessing; assuming equal
class sizes, the probability of a random guess being correct
is 0.1%. However, through a small manual exercise, we were
able to boost this accuracy significantly.
We hypothesized that images in our dataset with the same
labels are highly likely to be similar, regardless of the labels
associated with them being correct or not. This is because
of the fact that CNNs model the vision system in animals,
and are likely to group similar images together. We tested
this hypothesis for the images associated with the top 20
most frequently occurring labels in our dataset, and found
it to hold true. For example, the "Peace for Paris" symbol
created by French graphic designer Jean Jullien, was labeled
"bolo tie" by the model (Figure 2). Using this observation, we
renamed 8 out of the top 20 labels to better suit the images
under each of these labels. Table 2 shows the 8 out of the 20
most common labels that were generated by the Inception-
v3 model for our dataset, and the labels we replaced them
with. This exercise of renaming labels boosted the accuracy
of the model to 51.34% on our random sample. We used
these modified labels for our analysis.
5http://www.hackerfactor.com/blog/?/archives/529-Kind-of-
Like-That.html
6http://www.businessinsider.in/Facebook-Users-Are-
Uploading-350-Million-New-Photos-Each-Day/articleshow/
22709734.cms
Label generated by Inception-v3
Label they were replaced with
book jacket, dust cover, dust jacket, dust wrapper Poster
bolo tie, bolo, bola tie, bola
church, church building
obelisk
envelope
stupa, tope
drilling platform, offshore rig
radio telescope, radio reflector
Jean Jullien's "Peace for Paris" symbol
Eiffel tower
Eiffel tower
Poster
Eiffel tower
Eiffel tower
Eiffel tower
No. of occurrences in our
dataset of unique images
1,024
350
258
210
204
173
137
68
Table 2: List of labels generated by the Inception-v3 model, and the labels they are renamed with. This renaming process
boosted the accuracy of the model on our dataset by almost 13%.
(a) What a "bolo tie" looks
like
(b) Jean Jullien's "Peace for
Paris" symbol
Figure 2: Visual similarity between a bolo tie and the fa-
mous 'Peace for Paris' symbol. This similarity (in addition
to others) is captured by the Inception-v3 model, and can
be exploited to increase accuracy.
3.3 Text extraction from images
Past studies on analysing topics, events, sentiment, etc.
on OSNs have been largely limited to using textual content
generated by users to draw inferences [8, 10, 16, 21]. This
technique however, misses out on a large section of textual
information embedded in images, making it prone to missing
out on being able to capture the complete picture. Figure 3
shows an example of textual content embedded in an image
in our dataset.
We tested and evaluated two optical character recogni-
tion (OCR) libraries – PyTesseract 7 (Python wrapper for
Tesseract OCR 8), and OCRopy 9 – to extract text from
the images in our dataset. To compare the performance of
the two libraries, we first established a ground truth dataset
by manually extracting text from a random sample of 1,000
images from our dataset. We then used five string similarity
metrics (Jaro Winkler distance, Jaccard index, Cosine simi-
larity, Hamming distance, and Levenshtein distance) to com-
pare the results produced by PyTesseract and OCRopy with
the ground truth, separately. Scores from all five metrics in-
dicated that PyTesseract performed better on our dataset
than OCRopy (p-value < 0.01 for all five metrics), so we
used PyTesseract for our final analysis. In all, we were able
to extract text from a total of 31,869 images in our dataset.
7https://pypi.python.org/pypi/pytesseract/
8https://github.com/tesseract-ocr/tesseract
9https://pypi.python.org/pypi/ocropy
Figure 3: Example of text embedded in an image posted
on Facebook during the Paris Attacks in 2015. We found
thousands of images containing text in our dataset.
3.4
Identifying image sentiment
Sentiment derived from textual content generated by users
on OSNs has been widely used by researchers in various con-
texts [2, 19, 21, 22]. However, few attempts have been made
to understand the sentiment associated with images posted
on OSNs [24, 25, 26]. Studies suggests that the human brain
is hardwired to recognize and make sense of visual infor-
mation more efficiently. 10 Thus, it is likely that sentiment
extracted from textual content alone may not be represen-
tative of the overall sentiment associated with a theme or
event. To this end, we attempt to extract sentiment from
images using state-of-the-art supervised learning techniques
and datasets.
The Inception-v3 model (discussed in Section 3.2) can be
retrained to perform other visual recognition tasks using
features extracted by the model during the training phase.
This concept is known as transfer learning, and is available
in the form of an open-source implementation, called Deep
Convolutional Activation Feature (DeCAF). 11 DeCAF is
a state-of-the-art deep CNN architecture for transfer learn-
ing based on a supervised pre-training phase [5]. We use
this open-source implementation to retrain the Inception-v3
model on the SentiBank dataset to identify image sentiment.
The SentiBank database comprises of a total of half mil-
10https://www.eyeqinsights.com/power-visual-content-images-
vs-text/
11https://www.tensorflow.org/versions/r0.8/how tos/image
retraining/index.html
lion Flickr images, extracted by querying the network using
Adjective-Noun Pairs (ANPs) [3]. Since noun queries such
as "dog", "baby", or "house" do not portray a well-defined
emotion, these queries were prefixed with adjectives to form
ANPs like "happy dog", "adorable baby", "abandoned house"
etc., which associate these nouns with a strong emotion. We
manually segregated these ANPs (and therefore, the images
associated with them) into positive and negative classes for
binary sentiment classification, and skipped the ANPs which
did not fit clearly into a positive or negative sentiment. This
exercise left us with a total of 305,100 positive sentiment im-
ages and 133,108 negative sentiment images. We performed
a 10-fold random subsampling to balance the classes, and ob-
tain an unbiased model. For each fold, we split the dataset
into three parts in a 80:10:10 ratio for training, validation,
and testing respectively, and achieved a maximum accuracy
of 69.8%.
4. ANALYSIS AND RESULTS
Themes and sentiment are two of the most widely studied
aspects of OSN content during crisis events in literature [4,
12]. We therefore focus on these two aspects of the images
in our dataset, and present our findings.
4.1 Most prominent visual themes featured mis-
informative images
Using our methodology for characterizing images as de-
scribed in Section 3.2, we assigned a label to all 57 thou-
sand images we collected (Table 1). Table 3 shows a list of
the most commonly occurring image labels, along with their
description according to our dataset. We manually browsed
through images corresponding to each of the top 20 labels,
and found that the most common types of images comprised
of posters, banners, screenshots of Facebook posts, Twit-
ter tweets, etc. Cartoons and animated posters resembling a
comic book were also very popular. More examples include
the Pray for Paris peace symbol by French artist Jean Jul-
lien (label: Bola Tie), images of candles and lamps offering
support to the victims of the attacks (label: Candle wax-
light), and images of the Eiffel Tower under varying lights,
angles, and from various distances, that became very popu-
lar (labels: Obelisk, Crane, etc.).
We were also able to identify some peculiar topics and
themes which were popular on the network during the event.
The "Malinois" label appearing in the top 20 (see Table 3)
corresponded to the breed of the police dog that died during
the attacks, and evidently became very popular. However,
the cause of death of the dog was incorrectly quoted in mul-
tiple such images. Figure 4a shows one such picture of the
police dog and states that the dog was killed when a suicide
bomber detonated her explosive vest. However the real cause
of the dog's death, as later clarified by French police, was
multiple gunshot wounds caused by the French police forces'
"Brenneke" bullets. 12 We collected all such images quoting
misinformation in our dataset and found that these images
had gathered over 1.1 million likes, 321 thousand shares, and
38 thousand comments.
Similarly, one of the blasts during the attacks took place
outside a football stadium, whose pictures quoted incorrect
12http://www.dailymail.co.uk/news/article-3446511/Confirmed-
Diesel-hero-police-dog-Paris-attacks-shot-dead-wounded-
innocent-neighbours-reckless-shooting.html
Label
Website
Count Description
12,416 Images of posts, tweets, banners,
etc.
5,383 Posters, banners, etc.
3,803 Cartoons, animated posters
1,264
1,248 Posters, banners, etc.
1,246 People wearing suit-like clothes
1,135
Fountains at various locations
speeches,
Book jacket
Comic book
Fountain
Envelope
Suit (clothing)
Stage
Candle waxlight
1,021
Malinois
Scoreboard
Microphone
Menu
Bola Tie
Bell cot
Jersey, T-shirt
Crane
Memorial
Tablet
Church
Palace
Obelisk
995
971
906
868
781
745
743
677
633
629
586
547
Stages during public
mass gathering events, etc.
Lit candles and lamps offering sup-
port to victims
Police dog who died during the at-
tack
Images of sports stadium
Individuals addressing the masses,
reporters, etc. using microphones
Images containing well formatted
text
Peace for Paris symbol originally
created by Jean Jullien
Various buildings
People wearing t-shirts
Images of Eiffel Tower during twi-
light
Variety of posters, hand written
messages on boards, etc.
Dark and grey scale images of Eiffel
Tower
Large buildings,
Tower from a distance
Eiffel Tower
including Eiffel
Table 3: Top 20 most common image labels in our dataset.
Majority of the images comprised of posters, banners, art
work, etc. offering support for victims.
information and became viral. These pictures were captured
using the "Scoreboard" label; manual verification of images
marked with this label revealed that most of these images
captured the sports stadium. Figure 4b shows one such pic-
ture of the stadium and states that a Muslim security guard
named Zouhier stopped a suicide bomber from entering the
Stade de France stadium, thus saving hundreds of innocent
lives of people inside the stadium. It was later confirmed
by BBC that it wasn't actually him who turned away the
bomber. Instead, Zouheir was stationed elsewhere in the sta-
dium, and related what he heard from colleagues who were
closer to the bomb blast. 13 All instances of this misinforma-
tive image in our dataset garnered over 21 thousand likes,
11 thousand shares, and 450 comments.
This technique of automatic identification of themes and
topics from images on a large scale can be particularly help-
ful for first responders to identify popular instances of mis-
information spread through images. Slight modifications to
Convolutional Neural Network (CNN) based labeling models
like Inception-v3, can aid in identifying potentially harmful
and sensitive content such as guns, blood, etc. in images,
and help monitor the flow of such images, and react in a
timely manner, if needed.
4.2 Text embedded in images featured sensi-
tive topics and reflected negative sentiment
Applying optical character recognition (OCR) on images
in our dataset revealed 31,869 images (55% of all images
in our dataset) which contained text embedded in them (as
described in Section 3.3).
13http://www.bbc.com/news/blogs-trending-34845882
and post text had less than 45% overlap, highlighting that
popular words among image text were considerably different
from those in post text.
Text extracted from posts was dominated by words like
"prayers", "prayfortheworld", "life", "support", "god" etc., de-
picting support and solidarity for the victims. Text extracted
from images however, revealed some potentially sensitive
topics like refugees, passports, etc. which were not amongst
the most talked about topics in post text. The terms "refugees"
and "texas" in Table 4 captures the scanned image of a letter
from the Governor of Texas to the president of the United
States, which went viral. The letter stated that Texas would
not accept any refugees from Syria in the wake of the attacks.
Other similar examples of images containing text comprised
of quotes from famous personalities including The Dalai
Lama, Stacy Washington, Barrack Obama, Martin Luther
King Jr., etc. We also uncovered a popular conspiracy the-
ory surrounding the Syrian "passports" that were found by
French police near the bodies of terrorists who carried out
the attacks, and were allegedly used to establish the iden-
tity of the attackers as Syrian citizens. Text embedded in
images depicting this theme questioned how the passports
could have survived the heat of the blasts and fire. This
conspiracy theory was then used by miscreants to label the
attacks as a false flag operation, influencing citizens to ques-
tion the policies and motives of their own government. The
popularity of such memes on OSN platforms can have un-
desirable outcomes in the real world, like protests and mass
unrest. It is therefore vital for first responders to be able to
identify such content and counter / control its flow to avoid
repercussions in the real world.
All such popular textual content in the form of images
is a rich source of information which is capable of playing
an important role in driving the pulse of the audience, but
has been largely untapped in literature so far. Interestingly,
8,273 of these 31,869 images (25.95%) did not contain any
user generated textual content otherwise, indicating that
most prior work on event analysis using text on OSNs would
have entirely missed this set of data during their analysis,
as discussed previously [10, 8, 21, 16].
Text sentiment: Researchers in the past have looked at
text sentiment to draw inferences about the overall senti-
ment and emotion of users about a topic on OSNs. How-
ever, as we just discussed, there is a large volume of tex-
tual content flowing through the network in the form of im-
ages, which differs from conventional textual content posted
by users. Since most modern content monitoring techniques
also focus on textual content, obfuscating sensitive textual
content like hate speech and propaganda by embedding it
in images is a lucrative way for malicious entities to avoid
detection. Thus, we hypothesize that the sentiment of text
embedded in images would be very different from the senti-
ment of textual content posted by users in the conventional
form. To confirm our hypothesis, we employed Linguistic
Enquiry and Word Count (LIWC) [14] to determine and
compare the emotion of the image text and post text in our
dataset. We found that text embedded in images was neg-
ative on average, and twice in magnitude as post emotion
(Mann Whitney U test: p−value < 0.01). Figure 5 shows the
distribution of emotions across the two classes (image text
and post text). Although we found more negative emotion in
both images and posts as compared to positive emotion, the
magnitude of negative emotion as compared to positive emo-
(a) Diesel the dog who was allegedly
killed by terrorists
(b) Zouheir, the security guard who was claimed to have
stopped a terrorist from entering the stadium
Figure 4: Rumors spread on Facebook in the form of im-
ages during the Paris Attacks in 2015. We used CNN based
image summarization techniques to identify image themes
and discovered that some of the most popular image themes
were associated with rumors.
Prominent topics: Table 4 shows a mutually exclusive
set of the 20 most frequently occurring relevant words in
the text we extracted from images and posts. We picked 500
most commonly occurring words in images that were not
present in post text, and vice versa, to identify prominent
themes among image and post text independently. We no-
ticed that the most commonly occurring words among image
Top words in posts
Word
retweeted
1.
time
2.
prayers
3.
news
4.
prayfortheworld
5.
life
6.
let
7.
support
8.
9.
god
10. war
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
thoughts
need
last
lives
said
place
country
city
everyone
live
Norm.
freq.
0.0055
house
0.0052
safety
0.0050
washington
0.0047
sisters
0.0044
learned
0.0043 mouth
0.0042
0.0042
0.0040
0.0039
0.0038
0.0038
0.0037
0.0037
0.0034
0.0034
0.0033
0.0032
0.0032
0.0032
Top words in images
Norm.
Word
freq.
0.0045
0.0044
0.0042
0.0039
0.0038
0.0038
0.0037
0.0037
0.0036
0.0035
0.0028
0.0027
0.0026
0.0026
0.0026
0.0025
0.0025
0.0025
0.0025
0.0025
stacy
passport
americans
refugee
japan
texas
born
dear
syrians
similar
deadly
services
accept
necessary
Table 4: Mutually exclusive set of 20 most frequently occur-
ring relevant keywords in post and image text, with their
normalized frequency. We identified some potentially sensi-
tive topics among image text, which were not present in post
text. Word frequencies are normalized independently by the
total sum of frequencies of the top 500 words in each class.
tion was much higher in images as compared to text. We also
noticed that positive emotion in posts was 2.6 times higher
in magnitude than positive emotion in images. For negative
emotion, this magnitude dropped down to 1.25.
These results indicate that textual content flowing on the
network in the form of images is a critical source of informa-
tion that needs to be taken into consideration and analyzed
thoroughly while making a judgement on the pulse and sen-
timent of the audience about any topic or event.
during crisis events, incorrect judgement of citizen sentiment
can lead to undesirable consequences in the real world, like
mass unrest and public protests, which can otherwise be
stopped by law and order agencies if they are able to capture
a complete picture of the situation in time.
4.3
Images inspired positive sentiment
Inferring image sentiment through the sentiment of text
embedded in it (as discussed previously), is a small part of
understanding the sentiment associated with an image. Text
is only a part of the overall sentiment that an image may
reflect. Moreover, there may be no text present in an image
at all. Researchers have acknowledged the problem of un-
derstanding image sentiment, and come up with some solu-
tions recently [24, 25, 26]. Using some of the most advanced
techniques in the domain of image sentiment extraction (as
described in Section 3.4), we performed sentiment analysis
of images in our dataset.
Contrary to text sentiment, we found that images, on av-
erage, portrayed a positive sentiment. Figure 6 shows the
normalized sentiment scores of all the images in our dataset.
As is evident from the figure, we observed that close to 60%
of the 57 thousand images in our dataset depicted a positive
sentiment. However, as discussed in Section 3.4, the accu-
racy of our image sentiment model wasn't too high (approx-
imately 70%). Therefore, to verify the validity of our obser-
vations, we recruited human annotators to manually mark
a small random sample of 2,545 images from our dataset as
positive, negative, or neutral. Participants were also given
an option to skip. Each image was annotated by at least 2
(and at most 3) participants. After removing the skipped
images and using majority voting, we found that 50.95%
images were marked as positive, whereas only 16.21% im-
ages were marked as negative. The remaining images were
marked as neutral. This exercise confirmed our findings and
affirmed the dominance of positive sentiment images in our
dataset.
Figure 5: Distribution of positive, negative, and neutral text
emotion in our dataset of images containing text, and posts.
We found more negative emotion in both categories, but
the magnitude of negative emotion as compared to positive
emotion was higher in images.
Differences in text sentiment obtained from images and
posts highlight that studying images is essential to correctly
gauge the sentiment of users about a topic on OSNs. With
the large volume and popularity of images on OSNs in recent
times, it is imminent that results drawn from text alone fail
to accurately capture the pulse of the audience. Especially
Figure 6: Cumulative distribution of sentiment values ob-
tained from our image sentiment prediction model for all 57
thousand images in our dataset. A value over 0.5 depicts pos-
itive sentiment. We observed that close to 60% of all images
depicted positive sentiment.
This observation can be attributed to the large number of
pictures depicting support and solidarity for the victims of
the attacks, which included posters, banners, people holding
lit candles and lamps, the famous Peace for Paris symbol,
etc. Such images inspire a positive sentiment on the viewer,
as confirmed by our human annotators as well as the pre-
trained sentiment prediction model.
Interestingly, we came across a substantial number of in-
0%20%40%60%80%100%ImagesPostsPositiveNegativeNeutral0.00.20.40.60.81.0Sentiment value020406080100Percent images (CDF)Sentimentstances where image sentiment conflicted with the sentiment
of the text present in the post. Consider the post shown in
Figure 7 for example. While the text in the post reads, "Hor-
rible news.. No words :( :(" reflecting highly negative sen-
timent, the image depicts the Eiffel tower lit up in French
colors, signifying support for the victims and reflecting a pos-
itive sentiment. We observed that, out of the 19,954 posts in
our dataset which contained user generated textual content
as well as an image, 25.33% of the posts (5,056 posts) had
conflicting image and text sentiments. Out of these, 10.98%
of the posts (2,192 posts) contained an image depicting a
negative sentiment, whereas the textual content present in
the post reflected positive sentiment. Similarly, 14.35% of
the posts (2,864 posts) contained an image depicting a pos-
itive sentiment, whereas the textual content present in the
post reflected negative sentiment.
Figure 7: Example of a post published during the Paris at-
tacks, showing conflicting sentiments across image and text.
This post was published by a verified page, garnering over
65 thousand likes and was shared 1,774 times.
Through this analysis, we uncovered a new dimension for
mining sentiment from user generated content on OSNs,
which has been largely unexplored in prior OSN related lit-
erature. Our results shed light on the varying sentiment de-
picted by images and text during the Paris attacks. While
textual sentiment analysis revealed negative sentiment, we
found that images shared on Facebook during the event de-
picted positive sentiment. We also found a considerable pro-
portion of posts where textual sentiment and image senti-
ment depicted opposite polarity. It is important to note that
while text has been widely accepted in literature as a means
to infer user sentiment during crisis events (and otherwise)
on OSNs, the sentiment perceived by users is not restricted
to text only. Instead, given the affinity of the human mind
towards visual content, images are likely to contribute much
more to the perceived sentiment of users as compared to
text.
5. LIMITATIONS
We understand that our image labeling (Inception-v3)
and sentiment detection models are not completely accurate.
However, these models are trained using CNNs, which form
the basis for one of the most advanced state-of-the-art tech-
niques for learning features from visual media in the modern
age. These models can be further improved by feeding them
true positive datasets of images. Generating a big enough
dataset for such models is however, a challenging task, and
out of scope of this work.
Text extracted using Tesseract is limited by the perfor-
mance of modern OCR techniques. We came across instances
in our dataset where we were manually able to recognize
text, but the OCR failed to identify this text. Most such in-
stances involved the presence of calligraphic text, and noisy
background. The percentage of such instances was low as
compared to the number of images for which we were able
to identify and extract text.
6. DISCUSSION
Images are an integral part of OSN content, and are nat-
urally more appealing to the human mind than text. OSN
statistics explicitly support this phenomenon and makes im-
ages an interesting avenue for researchers to explore. In this
paper, we discovered a new dimension of content on Face-
book through images. This study highlights the vast amount
of information that can be mined from images alone, by mak-
ing use of some modern image analysis techniques. We also
highlight how this information may be different from textual
content that has been previously used in literature to infer
users' pulse and sentiment.
Pictures posted on OSNs are a critical source of informa-
tion that can be useful for law and order organizations to
understand public sentiment, especially during crisis events.
With the enormous volume and velocity of data being gen-
erated on OSNs, it is extremely difficult to monitor visual
media at present, because of lack of automated methods for
measurement and analysis of such content. Through our ap-
proach, we propose a semi-automated methodology for min-
ing knowledge from visual content and identifying popular
themes and citizens' pulse during crisis events. Although
this methodology has its limitations, it can be very effective
for producing high level summaries and reducing the search
space for organizations with respect to content that may
need attention. We also described how our methodology can
be used for automatically identifying (potentially sensitive)
misinformation spread through images during crisis events,
which may lead to major implications in the real world.
Various researchers have used text to measure the sen-
timent and mood of users in diverse contexts like natural
calamities, politics, sports, etc. We believe that the results
drawn from all these studies can be improved by taking vi-
sual content into consideration.
Brands and organizations invest heavily in social media
marketing and rely on textual responses generated by users
to gauge their reactions, and in turn, the performance of
their products. Being able to understand the users' pulse
through images is likely to help such organizations mea-
sure the response to their products much better, and cover
a larger section of the audience. Moreover, while analyzing
sentiment and emotion through text is largely limited by
language, such a barrier does not exist for images.
7. REFERENCES
[1] A. Acar and Y. Muraki. Twitter for crisis
communication: lessons learned from japan's tsunami
disaster. International Journal of Web Based
Communities, 7(3):392–402, 2011.
[2] J. Bollen, H. Mao, and X. Zeng. Twitter mood
predicts the stock market. Journal of Computational
Science, 2(1):1–8, 2011.
ACM Conference on Hypertext and Social Media,
pages 137–147. ACM, 2016.
[17] O. Russakovsky, J. Deng, H. Su, J. Krause,
S. Satheesh, S. Ma, Z. Huang, A. Karpathy,
A. Khosla, M. Bernstein, A. C. Berg, and L. Fei-Fei.
ImageNet Large Scale Visual Recognition Challenge.
International Journal of Computer Vision (IJCV),
115(3):211–252, 2015.
[3] D. Borth, T. Chen, R. Ji, and S.-F. Chang. Sentibank:
[18] H. Seo. Visual propaganda in the age of social media:
An empirical analysis of twitter images during the
2012 israeli–hamas conflict. Visual Communication
Quarterly, 21(3):150–161, 2014.
[19] S. Stieglitz and L. Dang-Xuan. Political
communication and influence through
microblogging–an empirical analysis of sentiment in
twitter messages and retweet behavior. In System
Science (HICSS), 2012 45th Hawaii International
Conference on, pages 3500–3509. IEEE, 2012.
[20] C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and
Z. Wojna. Rethinking the inception architecture for
computer vision. CoRR, abs/1512.00567, 2015.
[21] M. Thelwall, K. Buckley, and G. Paltoglou. Sentiment
in twitter events. Journal of the American Society for
Information Science and Technology, 62(2):406–418,
2011.
[22] A. Tumasjan, T. O. Sprenger, P. G. Sandner, and
I. M. Welpe. Predicting elections with twitter: What
140 characters reveal about political sentiment. In
Proceedings of the fourth international AAAI
conference on weblogs and social media, pages
178–185, 2010.
[23] F. Vis, S. Faulkner, K. Parry, Y. Manyukhina, and
L. Evans. Twitpic-ing the riots: analysing images
shared on twitter during the 2011 uk riots. Twitter
and Society, pages 385–398, 2013.
[24] C. Xu, S. Cetintas, K.-C. Lee, and L.-J. Li. Visual
sentiment prediction with deep convolutional neural
networks. arXiv preprint arXiv:1411.5731, 2014.
[25] Q. You, J. Luo, H. Jin, and J. Yang. Robust image
sentiment analysis using progressively trained and
domain transferred deep networks. arXiv preprint
arXiv:1509.06041, 2015.
[26] J. Yuan, S. Mcdonough, Q. You, and J. Luo.
Sentribute: image sentiment analysis from a mid-level
perspective. In Proceedings of the Second International
Workshop on Issues of Sentiment Discovery and
Opinion Mining, page 10. ACM, 2013.
large-scale ontology and classifiers for detecting
sentiment and emotions in visual content. In
Proceedings of the 21st ACM international conference
on Multimedia, pages 459–460. ACM, 2013.
[4] M. Cheong and V. C. Lee. A microblogging-based
approach to terrorism informatics: Exploration and
chronicling civilian sentiment and response to
terrorism events via twitter. Information Systems
Frontiers, 13(1):45–59, 2011.
[5] J. Donahue, Y. Jia, O. Vinyals, J. Hoffman, N. Zhang,
E. Tzeng, and T. Darrell. Decaf: A deep convolutional
activation feature for generic visual recognition. In
ICML, pages 647–655, 2014.
[6] Facebook Developers. Facebook graph api search.
https:// developers.facebook.com/ docs/ graph-api/ using-
graph-api/ v1.0#search, 2013.
[7] J. D. Fraustino, B. Liu, and Y. Jin. Social media use
during disasters: a review of the knowledge base and
gaps. 2012.
[8] A. Gupta, A. Joshi, and P. Kumaraguru. Identifying
and characterizing user communities on twitter during
crisis events. In Proceedings of the 2012 Workshop on
Data-driven User Behavioral Modelling and Mining
from Social Media, DUBMMSM '12, pages 23–26, New
York, NY, USA, 2012. ACM.
[9] A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi.
Faking sandy: characterizing and identifying fake
images on twitter during hurricane sandy. In
Proceedings of WWW companion, pages 729–736,
2013.
[10] A. L. Hughes and L. Palen. Twitter adoption and use
in mass convergence and emergency events.
International Journal of Emergency Management,
6(3):248–260, 2009.
[11] T. Kharroub and O. Bas. Social media and protests:
An examination of twitter images of the 2011 egyptian
revolution. New Media & Society, page
1461444815571914, 2015.
[12] M. Mendoza, B. Poblete, and C. Castillo. Twitter
under crisis: Can we trust what we rt? In Proceedings
of the first workshop on social media analytics, pages
71–79. ACM, 2010.
[13] L. Palen. Online social media in crisis events.
Educause Quarterly, 31(3):76–78, 2008.
[14] J. W. Pennebaker, C. K. Chung, M. Ireland,
A. Gonzales, and R. J. Booth. The development and
psychometric properties of liwc2007, 2007.
[15] R. Q. Redondo. The image use on twitter during the
2015 municipal election campaign in spain. Revista
Latina de Comunicaci´on Social, 71:85–107, 2016.
[16] K. Rudra, S. Banerjee, N. Ganguly, P. Goyal,
M. Imran, and P. Mitra. Summarizing situational
tweets in crisis scenario. In Proceedings of the 27th
|
1707.05150 | 1 | 1707 | 2017-07-13T18:10:40 | Information diffusion in interconnected heterogeneous networks | [
"cs.SI",
"physics.soc-ph"
] | In this paper, we are interested in modeling the diffusion of information in a multilayer network using thermodynamic diffusion approach. State of each agent is viewed as a topic mixture represented by a distribution over multiple topics. We have observed and learned diffusion-related thermodynamical patterns in the training data set, and we have used the estimated diffusion structure to predict the future states of the agents. A priori knowledge of a fraction of the state of all agents changes the problem to be a Kalman predictor problem that refines the predicted system state using the error in estimation of the agents. A real world Twitter data set is then used to evaluate and validate our information diffusion model. | cs.SI | cs | INFORMATION DIFFUSION IN INTERCONNECTED HETEROGENEOUS NETWORKS
Shahin Mahdizadehaghdam, Han Wang, Hamid Krim
North Carolina State University,
Department of Electrical and Computer Engineering,
Raleigh, NC
Liyi Dai
Army Research Office,
RTP, Raliegh, NC
ABSTRACT
In this paper, we are interested in modeling the diffusion of in(cid:173)
formation in a multilayer network using thermodynamic dif(cid:173)
fusion approach. State of each agent is viewed as a topic mix(cid:173)
ture represented by a distribution over multiple topics. We
have observed and learned diffusion-related thermodynami(cid:173)
cal patterns in the training data set, and we have used the es(cid:173)
timated diffusion structure to predict the future states of the
agents. A priori knowledge of a fraction of the state of all
agents changes the problem to be a Kalman predictor prob(cid:173)
lem that refines the predicted system state using the error in
estimation of the agents. A real world Twitter data set is then
used to evaluate and validate our information diffusion model.
Index Terms- Multilayer networks, Kalman-Bucy filter,
predictor, diffusion network
1. INTRODUCTION
Different topics are discussed/diffused in social networks and
because of the distinct dynamics of these diffusions, agents
in the social networks are affected in different extents. The
temporal and spatial dynamics of diffusion have been stud(cid:173)
ied through sequences of activation nodes and observed as
spreading cascades in a network [1].
The information diffusion process models can be classi(cid:173)
fied into three major groups, probabilistic models, thermo(cid:173)
dynamic models, and counting models. NETINF [2], NE(cid:173)
TRATE [3] and INFOPATH [4] are the probabilistic mod(cid:173)
els which infer the underlying diffusion network among in(cid:173)
formation sources using consecutive hit times of the nodes
by a specific cascade. The main idea behind the thermody(cid:173)
namic models [5, 6, 7, 8] is that heat will propagate from a
warmer region to a colder region or gas will move from the
region with higher density to the region with lower density.
Modeling the information as heat or gas, we can write the
rate at which information is changing in agent i as: dft' =
D Lj A(i, j)('I/Jj - 'I/Ji )- Where '1/J; (t) is the state of the i th
agent at time t, D is the diffusion constant which reflects the
amount of information passing from an agent to another agent
in a small interval of time, and A( i, j) is the i, j element of
adjacency matrix. The counting models [9] form counting
processes to find the number of nodes in each group of sus(cid:173)
ceptible or infected nodes. SIS [ 10] and SIR [ 11] models are
two of the well-known ones in this group.
One central challenge in modeling information diffusion
is to understand the structure of the cascades; the existence
of unknown external influence factors and unclear graph con(cid:173)
nections obscures this query. In this paper, we have for the
first time modeled the simple diffusion on a general multi(cid:173)
layer network and applied the model to publication networks
and social media data.
The multilayer network connectivity structure has been
proposed and studied in [12, 13, 14, 15, 16], in particular, a
two-layer network has been studied in [7] under the Lapla(cid:173)
cian dynamics. However, the information flow following a
Laplacian process on a multilayer network in its most general
form has yet to be studied. A multilayer network (illustrated
in Fig. I) takes into consideration additional connection possi(cid:173)
bilities when the true connections for the agents are uncertain.
For example, social media such as biogs consist of a set of
documents generated by bloggers over time; these documents
may share some topical similarities in spite of the different
sources they are generated from. It is possible to structure
the document similarities into the relational property as a net(cid:173)
work of documents. Then one can further associate this layer
of connection with the connection of bloggers ( e.g., according
to following-follower connection). This leads to a multilayer
network model where information diffuse both within a single
layer and across the inter-layers. The additional paths due to
the multilayer structure will diffuse the information at a sec(cid:173)
ondary degree, specifically, an absence of a direct connection
between two bloggers may be reestablished by counting the
topical similarities between the documents they are associated
with. We will refer to the resulting network from a multilayer
construction as an interconnected network of heterogeneous
nodes.
In a community-like network setting with common inter(cid:173)
est, such as a network of professors with their publications,
online forum community, we have observed diffusion related
thermodynamical patterns. It turns out that the simple diffu(cid:173)
sion model on the interconnected network structure is very
effective in predicting the future state of the agents.
(a) Single layer network
(b) Multiplex network
( c) Interconnected network
Fig. 1: a) A single layer. Dashed edges show connections among bloggers. b) A multiplex network. The top layer is based on the hyperlink inter-connectivity
of the bloggers, and the bottom layer is the friendship network between the bloggers. The straight inter-layer edges are showing that the bloggers are the same
people in both layers. c) An interconnected network of heterogeneous nodes of agents and documents. The dotted edges are showing which blogger (agent)
has produced which document.
The paper is organized as follows: We propose our new
approach in Section 2, and present substantiating experimen(cid:173)
tal results in Section 3. We finally provide the concluding
remarks in Section 4.
2. THE PROPOSED METHOD
In closed systems, all changes in the states of agents are a
result of interaction of the agents in the network. In a single
layer network, a diffusion process based on heat equation has
been studied in [5 , 6, 7, 8). Independent of the nodes in a
multilayer network being agents or documents, we generalize
the single layer diffusion process to:
The D (i) is the intra-layer diffusion constant of nodes in layer
i, and L (M) is the Laplacian matrix of the intra-layer connec(cid:173)
tivity of layer M . The inter-layer supra-Laplacian can be
written as .C.1 = I:~=l (JC'f - W'f ), where the K'f is the
diagonal inter-layer degree matrix of layer o:, showing the
inter-layer degree of the nodes in layer o: and the W'f is the
inter-layer connectivity matrix of the nodes in layer o: with
the nodes in the other layers. The JC'f and W'f are formally
defined in Eqns. (4 and 5) respectively:
K'f = e co:.o:J ® ( L D (o:,f3J x (o:,f3J) ,
M
/3=1/3,;fo:
W'f = L (e(o:,/3) ® (D (o:,/3) w (o:,/3))),
M
(4)
(5)
dX - = - .C.X.
dt
(I)
/3=1/3,;fo:
Where X is a N x T matrix, N being the number of nodes
in the multilayer network, and each row of X is storing a T(cid:173)
dimensional state vector for each node . .C. is a N x N supra(cid:173)
Laplacian matrix defined in proposition(!).
Proposition 1 We can generally write the supra-Laplacian
matrix of an M layer multiplex network with N nodes in each
layer as Eqn. (2). Where .C.L is the supra-Laplacian matrix
of the intra-layer connectivity and .C. 1 is the supra-Laplacian
matrix of the inter-layer connectivity.
.C.L may be in turn,
written as direct sum of the Laplacian matrices of the inde(cid:173)
pendent intra-layer connectivities:
.C. = .C.L + .C.1 ,
[ D<' IL <'I
M
C L= EB D ("') L (a) =
o=l
(2)
DIMILIM) ] ·
(3)
where D (o:,/3) is the inter-layer diffusion constant of agents
from layer o: to agents in layer /3, K (o:,/3) is the diagonal ma(cid:173)
trix reflecting the degree of each node in the inter-layer con(cid:173)
nectivity between layer o: and layer /3, w<o: ,/3) quantifies the
inter-layer connectivity of the layer o: nodes to the layer /3
nodes and e(a,/3) is an all 0, M x M, matrix with an only 1
element in ( o:, /3). ® denotes the kronecker product.
Proof of proposition (1) can be found in the extended ver(cid:173)
sion of the paper [17].
Much of the existing work in information diffusion mod(cid:173)
els have a limited scope (of agents, documents, parameters)
when predicting the future state of the nodes. More specifi(cid:173)
cally, agent states may be varied by external sources which are
not captured in the network, or by some agent actions which
may even to some extent, conflict with the model prediction.
Considering an interconnected network with supra-Laplacian
matrix .C., to address this additional auxiliary input, we are
further generalizing Eqn. (I) to an open system model as fol(cid:173)
lows:
dX(t) = - .C.X(t)dt + :EdB(t).
(6)
B(t) is a T x T matrix, whose columns are T-dimensional
vectors with components as independent standard Brownian
motions of variances u i and :E is N x T matrix, and each
row shows the u i vector for agent i. Inspired by the Ornstein(cid:173)
Uhlenbeck (0.U.) process [18], Eqn. (6) describes the veloc(cid:173)
ity of the topical-state of the nodes as a Brownian motion in
presence of friction. In other words, to describe the uncer(cid:173)
tainty due to external effects, we proceed to view the whole
system as a massive Brownian particle. The drift term (first
term in right-hand side of Eqn. (6)), however, moves the ve(cid:173)
locity from a martingale state of u idB( t) towards a consen(cid:173)
sus (captured by the drift term). Solution of the differential
equation in Eqn. (6), can be expressed as: given the states of
nodes at time t0 we can predict the states at time t 1 , t 1 > t 0
as follows:
Where e.C(s-t, +to) is a matrix exponential and itself is a N x
N matrix.
Our proposed learning procedure will evaluate the diffu(cid:173)
sion constants in the supra-Laplacian matrix C as well as the
:E matrix. To that end, we proceed to minimize the Frobenius
norm of the difference between X and it's predict X, resulting
from,
(8)
Solving this optimization problem helps us decompose the
predicted matrix into two main components on the right-hand
side of Eqn. (7), the first term representing the interactions
in the network, while the second quantifying the uncertainty
which results from auxiliary inputs into the system.
2.1. Diffusion Network Estimation (Leaming the Supra(cid:173)
Laplacian Matrix)
The supra-Laplacian matrix C which we use in Eqn. (6) for
state prediction, is a result of the network connectivity (refer
to Eqn. (2)). In practice, hidden connections are pervasive, in(cid:173)
troducing uncertainty in the prediction, which are causing the
information diffusion to require more than the predefined, ex(cid:173)
plicit connections from the network. To that end, consider ob(cid:173)
servations ofX(t) overt E [O, t 1J, denote x(t) := vec(X(t)),
the vectorization of X(t) to obtain a vector differential system
in order to learn the supra-Laplacian matrix C of Eqn. (6):
t(t) = Ax(t) + w(t) , o :S t :S ti,
and we have A = Ir @ (- C), the Kronecker product of T(cid:173)
by-T identity matrix with (-C) and w(t) is the vectorization
ofw(t) = :Ed!~t).
We consider the simple cost function J = !t:r E, where
E = x - i, and hence for the estimation A we have A = 'Y(x -
i)xr (derivative of J with respect to x), where the estimation
i(t + 1) = cAx(t) , and~/ > 0 is chosen appropriately as the
scaling gain. In optimization iterations, the estimated value
of A at ith iteration is as follows:
We use A.0 =Ir @ (-C), the graph Laplacian of the explicit
following-follower network (as initialization). The learned A
may, however, not be exactly structured as Ir @ (-C), due
to dependence of topics in the state space, as well as the non(cid:173)
linearity and non-homogeneity of the diffusion. The resulting
error E shall be considered for the estimation of the noise in
the Kalman-Bucy filter as discussed next.
2.2. A Refined Prediction: Kalman-Bucy Filtering
In prediction applications, the actual states of some of the
nodes are sometimes known, and we want to predict those
of all remaining nodes. An example of this may be seen in
social networks, where state of the hub nodes, such as fa(cid:173)
mous people or users with less restrictive privacy policies are
known to the public, and one is interested in predicting the
state of other less accessible users. Having partial knowledge
of the states of a fraction of the nodes in the network, changes
the state prediction problem to a Kalman predictor problem,
and helps to refine the predicted states using a Kalman filter.
We propose a Kalman-Bucy filter as the optimal linear pre(cid:173)
dictor for our system, and we write the observation equation
as y(t) = (Ir @H)x(t) +v(t), with Has a diagonal indicator
matrix with 1 in all the observed entries, and O in all other
entries. A having been learned (see above Section), Kalamn(cid:173)
Bucy equations may be written as:
t(t) = Ax(t) + w(t) ,
y(t) = 1lx(t) + v(t) ,
(9)
(10)
where 1l = Ir @ Hand the noises w(t) and v(t) are zero(cid:173)
mean white (temporally) processes, i.e, E(w(t)w(sf) =
Qtc5(t - s), E(v(t)v(sf) = Rtc5(t - s), E(w(t)v(sf) = O.
By considering small time intervals on discretization of the
linear continues time system ( c5t = 1 ), one can write the state
equation as x(t + 1) = Fx(t) + w(t), where F =I+ A.
Having Eqn. (10) and x(t + 1) = Fx(t) + w(t) as the
state and observation equations respectively, we can predict
and refine the predicted states of the nodes using Algorithm
( 1 ). The "learning phase" of the Algorithm (1) is estimating
the supra-Laplacian matrix A (see above Section). The sec(cid:173)
ond phase of the algorithm, is refining the estimated state of
the nodes. Note that Rt is the covariance of the observational
error, and Xt 2 1t, denotes the linear prediction of x at time t 2
given observations up to and including time t 1 • The state co(cid:173)
variance Ilt satisfies the Riccati equation:
•
A
r
Ilt = Ailt + IltA + Qt - GtRtGt .
Ar
(11)
Algorithm 1
Leaming phase:
1: x(t) +- vec(X(t))
2: A f- Ir 0 (-C)
3: repeat:
i(t + 1) +- eAx(t)
4:
s: A +- , (x -. i)xr
6:
7: until f fx - if f 2 < r,.
Kalman filter prediction on test data:
A +-A + A
t> Initial state.
•
. . ,~~ .. - - )
• .1 • Oi!ll<enc:e_...::onsi..,... ... 1n_
+ OJ,el,•)"119fflprlO!icllon{TIYM-i0,)'W-)
• n.- .... iem
.. .. ,, ..... ,.
.. .
.
•
•
0.0582000
2002
20(),I
""" ""'
Time
(a)
t> Convergence criteria.
I: Re,t f- Rt + 1lIItlt- l1lT
2: xt 1t +- xt it-1 + rrt1t-11lrR;,; [j\ -1lxt1t-1l
3: Iltlt f- Iltlt- 1 - II11t- 11lTR;,;1lIItlt- 1
4: Ff- I+ A
t> Updating.
t> Predicting.
While the Gt is the Kalman gain Gt = IIt 1lTRt 1
simplicity, we further assumed that the errors in the state pre(cid:173)
diction and observation are Gaussian processes.
. For
The designed algorithm shows the discrete time, state up(cid:173)
date of the Kalman predictor. The estimated states of the
available nodes, 1li(t), are compared with the state of the
available nodes, y(t) , as measurements observed over time,
to evaluate the extent of statistical noise and other inaccura(cid:173)
cies in predicting phase.
3. EXPERIMENTS
Fig. (2a) shows the prediction based on a network of 79 pro(cid:173)
fessors. A three-layer network is formed with the first layer
showing if the two professors have ever published in the same
venue or not. The second layer being the research group
membership of these professors and the third layer showing
the similarity network between the papers published by these
professors (extracted by LDA [19] topic modeling of the ab(cid:173)
stract of the papers with dimension I 0). State of the agents
are the I 0-dimensional topical vectors which are the mean
of the topical representation of the documents produced by
the agents. Over time more documents are getting added and
the topical state of the agent are changing. The error measure
used in all the experiments is the Frobenius norm of the differ(cid:173)
ence of the estimated state of the nodes and ground truth state
of the nodes normalized by the Frobenius norm of the ground
truth matrix. As may be seen in Fig. (2a), the prediction
method based on a three-layer network achieves a lower er(cid:173)
ror than the prediction based on a single-layer network. Note,
the single-layer network does not help in predicting the top(cid:173)
ical states of the agents. The reason is that there are only 79
agents in this experiment and the co-authorship network be(cid:173)
tween the agents is not particularly suited to predict the future
008.' · - - - - · , . ,~ . . . .
ooe
• . ,~
•
. , . - -~ ·
• .,.-...
. 0"'----·(cid:173)
41111\
• Open•:,1arnpn,c1,c;1.,.,(~i.y.r,.-_..)
+ Open•:,1-pt90ic<,on{l"_,..._)
0 Openoyo...,pn,dict.,.,(T_,..._.)_~l
~
Time
(b)
Fig. 2: (a) Experiment for college professor network with
1000 publication documents. (b) Experiment over Twitter
network with 5000 agents and 8 Hashtags.
state of the agents.
Fig. (2b) is an experiment based on 5000 Twitter users.
The first layer is a network among users and the second
layer is a network between eight Hashtags used in June 2009.
The Hashtags are as follows: #jobs, #spymaster, #neda,
#l40mafia, #tcot, #musicmonday, #lranelection, #iremember
showing how much these Hashtags are similar to each other
by counting and normalizing the number of times they have
appeared in the same tweet. The average prediction improve(cid:173)
ment achieved by the two-layer network is about 13 percent.
The prediction by first estimating the Laplacian matrix, has
about 15 percent improvement over the single layer prediction
method.
Fig. (3) displays the results of an experiment in a small
single layer dataset with 300 Twitter agents available. Figs.
(3a), (3b), (3c) and (3d) are the same experiments with dif(cid:173)
ferent observation sizes of 10 percent, 15 percent, 20 percent
and 25 percent of state of all the agents in the network re(cid:173)
spectively. As may be seen in the figures , the prediction error
based on the estimated Laplacian matrix yields a lower error
than fully trusting the connectivity structure in the network.
This as expected, is due to static connectivity network (usu(cid:173)
ally demonstrates the physical or online relation among the
agents), falling short on affecting the actual underlying diffu(cid:173)
sion structure on the network. Having a prior partial knowl(cid:173)
edge of the agents enabled us to use a Kalman predictor to
further refine our prediction.
,oe••o'
(a)
,oe ' '0"' .... . .. ..
.;· .... ,
- •.•,.••!':.. ........ • :· ••
10• :
•
!02
• . . ~. . , . , . . , •• •• · · .-.
•
. , .... ,
• . .
•
10 •o~ "°
~ 'O ..q, ., ... co,oeq, ,
.
e 11 00 ~ ~ OO QO ~ O ~ Q) 0
0
,.e
... --!(-(cid:173)
. .,,
.. . ~ ~..._
• w'w,,; v,wry~w,, ~ w ", •
· - - a h a.!L
o --..,..-L
,1 ••
~
•
(b)
~
TimP
(c)
T ime
(d)
Fig. 3: Experiment over Twitter network with 300 agents.
Predicting the state of the agents using a fixed Laplacian ma(cid:173)
trix, using an estimated Laplacian matrix, and Prediction us(cid:173)
ing Kalman filter with IO percent, 15 percent, 20 percent, and
25 percent of observation of state of all the agents in Figs. (a),
(b), (c) and (d) respectively.
4. CONCLUSIONS
ther refine our state prediction by learning over the prediction
error of the observed subset. In future work, we will explore
the information diffusion problem with a goal to develop nec(cid:173)
essary tools to analyze diffusion in more complex network
structures.
5. REFERENCES
[I] A. Guille, "Information diffusion in online social net(cid:173)
works," in Proceedings of the 2013 SIGMOD!PODS Ph.
D. symposium. ACM, 2013, pp. 31-36.
[2] M. Gomez Rodriguez, J. Leskovec, and A. Krause, "In(cid:173)
ferring networks of diffusion and influence," in Proceed(cid:173)
ings of the 16th ACM S/GKDD international conference
on Knowledge discovery and data mining. ACM, 20 I 0,
pp. 1019-1028.
[3] M. G. Rodriguez, D. Balduzzi, and B. Scholkopf, "Un(cid:173)
covering the temporal dynamics of diffusion networks,"
arXiv preprint arXiv: I 105.0697, 2011.
[4] M. Gomez Rodriguez, J. Leskovec, and B. Scholkopf,
"Structure and dynamics of information pathways in
online media," in Proceedings of the sixth ACM inter(cid:173)
national conference on Web search and data mining.
ACM, 2013, pp. 23-32.
[5] M. Newman, Networks: an introduction. Oxford Uni(cid:173)
versity Press, 2010.
[6] F. Escolano, E. R. Hancock, and M. A. Lozano, "Heat
diffusion: Thermodynamic depth complexity of net(cid:173)
works," Physical Review E, vol. 85, no. 3, p. 036206,
2012.
[7] S. Gomez, A. Diaz-Guilera, J. Gomez-Gardefies, C. J.
Perez-Vicente, Y. Moreno, and A. Arenas, "Diffusion
dynamics on multiplex networks," Physical review let(cid:173)
ters, vol. 110, no. 2, p. 028701, 2013.
[8] A. Sole-Ribalta, M. De Domenico, N. E. Kouvaris,
A. Diaz-Guilera, S. Gomez, and A. Arenas, "Spectral
properties of the laplacian of multiplex networks," Phys(cid:173)
ical Review E, vol. 88, no. 3, p. 032807, 2013.
[9] H. W. Hethcote, "The mathematics of infectious dis(cid:173)
eases," SIAM review, vol. 42, no. 4, pp. 599-653, 2000.
In this paper, we proposed a signal processing technique to
model and predict states in a multilayer network. The actual
diffusion network has been learned by looking at previous dif(cid:173)
fusion data and has been applied to predicting the future states
of agents in the network. Having partial observation of the
state of the agents changes the state-space dynamics model to
a Kalman filter problem. The Kalman filter allows us to fur-
[ 10] I. Nasell, "The quasi-stationary distribution of the
closed endemic sis model," Advances in Applied Proba(cid:173)
bility, pp. 895-932, 1996.
[ 11] B. Shulgin, L. Stone, and Z. Agur, "Pulse vaccination
strategy in the sir epidemic model," Bulletin of Mathe(cid:173)
matical Biology, vol. 60, no. 6, pp.1123-1148, 1998.
[12] M. De Domenico, A. Sole-Ribalta, E. Cozzo, M. Kivela,
Y. Moreno, M. A. Porter, S. Gomez, and A. Arenas,
"Mathematical formulation of multilayer networks,"
Physical Review X, vol. 3, no. 4, p. 041022, 2013.
[13] S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Genio,
J. G6mez-Gardefies, M. Romance, I. Sendifia-Nadal,
Z. Wang, and M. Zanin, "The structure and dynamics of
multilayer networks," Physics Reports, vol. 544, no. 1,
pp. 1-122, 2014.
[14] F. Battiston, V. Nicosia, and V. Latora, "Structural
measures for multiplex networks," Physical Review E,
vol. 89,no. 3,p. 032804,2014.
[15] B. Oselio, A. Kulesza, and A. Hero, "Information ex(cid:173)
traction from large multi-layer social networks," in 2015
IEEE International Conference on Acoustics, Speech
IEEE, 2015 , pp.
and Signal Processing (JCASSP).
5451-5455.
[16] B. Oselio, A. Kulesza, and A. 0 . Hero, "Multi-layer
graph analysis for dynamic social networks," IEEE
Journal of Selected Topics in Signal Processing, vol. 8,
no. 4,pp.514-523,2014.
[17] S. Mahdizadehaghdam, H. Wang, H. Krim, and L. Dai,
"Information Diffusion of Topic Propagation in Social
Media," ArXiv e-prints, Feb. 2016.
[18] G. E. Uhlenbeck and L. S. Ornstein, "On
the
theory of
the brownian motion," Phys. Rev.,
vol. 36, pp. 823-841, Sep 1930. [Online]. Avail(cid:173)
able: http://link.aps.org/doi/l 0.1103/PhysRev.36.823
[19] D. M. Blei, A. Y. Ng, and M.
I. Jordan, "La(cid:173)
tent dirichlet allocation," J. Mach. Learn. Res.,
vol. 3, pp. 993-1022, Mar. 2003. [Online] . Available:
http://dl.acm.org/citation.cfm ?id=9449 l 9 .944937
|
1509.00556 | 2 | 1509 | 2017-09-28T17:01:27 | Efficient Detection of Communities with Significant Overlaps in Networks: Partial Community Merger Algorithm | [
"cs.SI",
"physics.soc-ph"
] | Detecting communities in large-scale networks is a challenging task when each vertex may belong to multiple communities, as is often the case in social networks. The multiple memberships of vertices and thus the strong overlaps among communities render many detection algorithms invalid. We develop a Partial Community Merger Algorithm (PCMA) for detecting communities with significant overlaps as well as slightly overlapping and disjoint ones. It is a bottom-up approach based on properly reassembling partial information of communities revealed in ego networks of vertices to reconstruct complete communities. Noise control and merger order are the two key issues in implementing this idea. We propose a novel similarity measure between two merged communities that can suppress noise and an efficient algorithm that recursively merges the most similar pair of communities. The validity and accuracy of PCMA is tested against two benchmarks and compared to four existing algorithms. It is the most efficient one with linear complexity and it outperforms the compared algorithms when vertices have multiple memberships. PCMA is applied to two huge online social networks, Friendster and Sina Weibo. Millions of communities are detected and they are of higher qualities than the corresponding metadata groups. We find that the latter should not be regarded as the ground-truth of structural communities. The significant overlapping pattern found in the detected communities confirms the need of new algorithms, such as PCMA, to handle multiple memberships of vertices in social networks. | cs.SI | cs | ZU064-05-FPR
pcma
9 August 2017
22:51
Under consideration for publication in Network Science
1
Efficient Detection of Communities with
Significant Overlaps in Networks: Partial
Community Merger Algorithm
Elvis H.W. Xu and Pak Ming Hui
Department of Physics, The Chinese University of Hong Kong,
Shatin, New Territories, Hong Kong, China
(e-mail: {hwxu,pmhui}@phy.cuhk.edu.hk)
Abstract
Detecting communities in large-scale networks is a challenging task when each vertex may belong to
multiple communities, as is often the case in social networks. The multiple memberships of vertices
and thus the strong overlaps among communities render many detection algorithms invalid. We
develop a Partial Community Merger Algorithm (PCMA) for detecting communities with signifi-
cant overlaps as well as slightly overlapping and disjoint ones. It is a bottom-up approach based
on properly reassembling partial information of communities revealed in ego networks of vertices
to reconstruct complete communities. Noise control and merger order are the two key issues in
implementing this idea. We propose a novel similarity measure between two merged communities
that can suppress noise and an efficient algorithm that recursively merges the most similar pair of
communities. The validity and accuracy of PCMA is tested against two benchmarks and compared
to four existing algorithms. It is the most efficient one with linear complexity and it outperforms
the compared algorithms when vertices have multiple memberships. PCMA is applied to two huge
online social networks, Friendster and Sina Weibo. Millions of communities are detected and they
are of higher qualities than the corresponding metadata groups. We find that the latter should not be
regarded as the ground-truth of structural communities. The significant overlapping pattern found in
the detected communities confirms the need of new algorithms, such as PCMA, to handle multiple
memberships of vertices in social networks.
Keywords: Community Detection, Community Structure, Overlapping Community, Partial Commu-
nity, Social Networks, Vertex Memberships, Metadata Groups, Linear Complexity
7
1
0
2
p
e
S
8
2
]
I
S
.
s
c
[
2
v
6
5
5
0
0
.
9
0
5
1
:
v
i
X
r
a
1 Introduction
Community structure is commonly found in networked systems in nature and society (Girvan & Newman, 2002).
While it is almost common sense to realize the existence of communities, extracting such
mesoscopic structures efficiently and accurately remains a challenging task and yet it is
crucial to the understanding of the functionality of these systems. Although the definition
of community remains ambiguous and a commonly accepted definition is lacking, many
detection algorithms have been developed in the past decade (Fortunato, 2010) with most
of them motivated by an intuitive notion that there should be more edges within the com-
munity than edges connecting to the outside (Seidman, 1983; Girvan & Newman, 2002;
ZU064-05-FPR
pcma
9 August 2017
22:51
2
Elvis H.W. Xu and Pak Ming Hui
Radicchi et al., 2004). This viewpoint on what a community is about implies that com-
munities are almost disjoint, and it is behind the design of non-overlapping community
detection algorithms. However, it was soon found by empirical studies that it is common for
communities to overlap, i.e. each vertex may have multiple memberships (Palla et al., 2005)
and thus it may be shared by communities. Several approaches have been proposed for
detecting overlapping communities, including clique percolation (Palla et al., 2005), link
partitioning (Evans & Lambiotte, 2009; Evans & Lambiotte, 2010; Ahn et al., 2010), local
expansion and optimization (Baumes et al., 2005; Lancichinetti et al., 2009; Lancichinetti et al., 2011),
and label propagation (Raghavan et al., 2007; Gregory, 2010; Xie et al., 2011). Some of
them inherit the notion of non-overlapping communities and then loose constraint to allow
vertices to be shared by communities. For example, algorithms of local expansion and
optimization usually use a fitness function that is positively correlated to the ratio between
the number of internal and external edges of a community. We remark that the fitness
function is fine with disjoint or slightly overlapping communities, but is not applicable to
significantly overlapping communities of which most vertices have multiple memberships.
For example, if most members of a community have more than one membership, it is
very likely that the community has much more edges to the outside than edges within the
community, which is often the case in social networks. We think a new concept fundamen-
tally different from non-overlapping communities is needed that imposes no constraints
or implications on the fraction of overlapping vertices and the number of communities a
vertex may have. Taking the two aspects into consideration, we propose a general concept
of overlapping community that each member of a community should connect to a certain
fraction of the other members. There are no constraints on whether the community has
more internal than external edges or whether a member devotes most of its edges to
this community. This intuitive idea is similar to k-core, but it is fraction-based and we
name it f -core. Unlike k-core that cannot overlap, an f -core allows its members to belong
to arbitrary number of f -cores and thus it is suitable to be a definition of overlapping
community. Yet, f -core only focuses on edge densities and does not specify how members
are connected to each other. To make it a useful concept in the context of communities, a
further constraint that a community has members who are densely connected to each other
and thus a relatively high value of clustering coefficient will prove effective.
Structurally, communities with significant overlaps are hidden under dense and messy
edges, unlike the cases of disjoint and slightly overlapping communities. Identifying such
communities is highly non-trivial from a global or top-down viewpoint. Starting locally
from a vertex, however, it is easier to identify which groups a vertex belongs to in the
subnetwork consisting of the vertex itself and its neighbors, i.e. the ego network of a
vertex, as illustrated in Fig. 1 using data from an online social network. Several com-
munity detection algorithms that take advantage of such local community structure in ego
networks have been developed in recent years. Coscia et al. proposed a method DEMON
(Coscia et al., 2012; Coscia et al., 2014) that let each vertex vote for the communities it
sees in its ego network democratically and then merges similar communities repeatedly
if the overlap between two communities is above a threshold. The method EgoCluster-
ing by Rees et al. (Rees & Gallagher, 2012) follows a very similar idea with a different
merger criterion. Later on Soundarajan and Hopcroft proposed the Node Perception algo-
rithm (Soundarajan & Hopcroft, 2015), which is a general algorithm template consisting of
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
3
three steps: firstly detect subcommunities in the neighborhood of each vertex; then create
a new network of which each vertex represents a subcommunity and the edges represent
some relationship between subcommunities; and finally detect communities in the network
of subcommunity. Since the merger of similar subcommunities can be reinterpreted as the
second and the third step, DEMON and EgoClustering can be regarded as implementations
and special cases of the template. This intuitive local-first approach is easy to conceive.
The key to success lies in how to implement it, especially for the latter two steps, i.e.
finding a proper way of merging similar communities. There are two key issues to be
addressed: merger order and noise control. In DEMON, a community A is immediately
merged with another community B if the overlap between them is above a threshold,
without considering whether there exists a better candidate C to be merged with A. This
would lead to less accurate results, and we think always merging with the best candidate is
preferable. Also, the detected communities in ego networks may contain noise, i.e. vertices
that are misclassfied into these communities. The noise accumulates quickly as the merger
proceeds and the similarity measure, i.e. the overlap between two merged communities
used in DEMON and EgoClustering, becomes less and less accurate. It eventually leads
to poor accuracy, as we will show in benchmarking in Sec. 3. Taking these aspects into
account, we develop a Partial Community Merger Algorithm (PCMA) based on the same
local-first approach for detecting communities with significant overlaps as well as slightly
overlapping and disjoint ones. We propose a sophisticated yet efficient similarity measure
between merged communities that can trace the merger history and suppress noise ac-
cumulated during the process. The mathematical properties of the measure allow us to
design a linear complexity merger algorithm that always merges the most similar pair
of communities. The variables used in the measure can be utilized to establish a set of
thresholds for further reducing noise after merger. Besides the efficiency and accuracy
ensured by the proposed similarity measure, our method is also equipped with many fea-
tures that are essential to dealing with large-scale real networks. Like other algorithms
based on local approaches, the method does not require an input of the total number
of communities to be detected. Most importantly, the assumption of disjoint or slightly
overlapping communities is abandoned and the method is designed to handle the possibility
of multiple memberships of a vertex and detect significantly overlapping communities. Our
method also allows vertices to be isolated, i.e., they do not belong to any communities.
Community detection algorithms must be able to distinguish real communities from pseudo
communities (Bianconi et al., 2009; Lancichinetti et al., 2010). We are well aware of the
issue and our method sifts out real communities by applying proper thresholds. All these
advantages make the method uniquely capable of detecting communities with significant
overlaps efficiently in large-scale real networks with hundreds of millions of vertices.
The plan of the paper is as follows. In Sec. 2, we introduce the details of the algorithm,
including similarity measure, merger of similar communities, thresholds, and applicability.
In Sec. 3, the method is tested against two benchmarks and its performance in accuracy
and efficiency is compared with four other recently proposed algorithms. In Sec. 4, we
apply the method to two huge social networks and compare the communities detected with
the metadata groups. We show that significantly overlapping communities are common in
social networks. Results are summarized in Sec. 5.
ZU064-05-FPR
pcma
9 August 2017
22:51
4
Elvis H.W. Xu and Pak Ming Hui
Fig. 1. (Color online) An ego network of a vertex provides the local information and
reveals several partial communities. The network was constructed from data collected
from Sina Weibo, an online social network akin to the hybrid of Facebook and Twitter.
The partial communities are found by an existing algorithm as described in Appendix A.
PCMA is an efficient and accurate algorithm for detecting complete communities in a huge
network by properly merging partial communities revealed by the ego networks of all the
vertices.
2 Partial Community Merger Algorithm
2.1 General Principle
We aim to detect communities in a network in which vertices could span from being
isolated to belonging to multiple communities. This renders many top-down algorithms
invalid. We first give a physical picture of our algorithm. Consider a community in which
every member is connected to a certain fraction of the other members. At the local level of
the members, they only known their own neighbors and have no knowledge of the complete
community. They are given the task of compiling a roster of the community and identify
who the core members are. To complete the task, each member shares its local information
consisting of a name list including itself and all its neighbors. A complete roster can in
principle be derived by merging these individual name lists skillfully. Those who appear
frequently on the lists are the core members, while those with less occurrence are on
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
5
the periphery of the community. This merger process is the core idea of our method of
detecting communities.
Practically, we start with exploring the ego network of a vertex, i.e. the subnetwork
consisting of the vertex itself and its neighbors, and identifying the communities hidden
in it. This is illustrated in Fig. 1 for a vertex (the central one) in an online social network.
This local view lets us see the communities clearly. Since a vertex may not know all the
members in each of its communities, the identified communities in the ego network of a
vertex are incomplete. We refer to them as the partial communities from the viewpoint
of the vertex. This process can be carried out for every vertex. Although each member
only helps reveal part of the whole picture, the idea is that aggregating local information
should reveal the complete communities, i.e., every community with all its members. With
the partial communities revealed by different vertices, the next step is to determine which
ones are actually different parts of the same community. It is a technically difficult task
as the number of partial communities may even be greater than the number of vertices in
the whole network and vertices may be misclassified into partial communities that they
actually do not belong to. Merger of corresponding partial communities in principle recon-
structs the complete community. It, however, also causes the noise in partial communities to
be accumulated. A cleaning process or post-processing scheme is then invoked to eliminate
the misclassified vertices and sift out the real and complete communities.
Our method thus consists of three steps:
1. Find the partial communities in the ego network of each of the vertices.
2. Merge partial communities that are parts of the same community to reconstruct
complete communities.
3. Clean the merged communities to sift out real communities.
For easy reference, we call the method Partial Community Merger Algorithm or PCMA in
short. For Step 1, many existing algorithms are available and we use the one proposed by
Ball et al. (Ball et al., 2011), with details given in Appendix A. The new elements are Step
2 and Step 3. Below, we introduce our implementation of Steps 2 and 3 in detail.
2.2 PCMA Step 2: Merger
The merger process aims to reassemble partial communities that are part of the same
complete community. As discussed in Sec. 1, care must be taken over the merger order and
noise control to make the process effective. We propose an efficient hierarchical clustering
based algorithm that always merges the most similar pair of communities and it can handle
noise properly.
The key here is to find a suitable similarity measure between communities, each of
which is represented by a set of vertices. The Jaccard index is a commonly used similarity
measure. It is defined to be the size of the intersection divided by the size of the union
of two sets. A drawback of the index is that the members are assumed equal. A merged
community, however, contains core members, peripheral members, and even misclassified
ones. They should be treated differently. Here we propose a novel similarity measure
that incorporates the different importance of members and hence reduce significantly the
interference of the misclassified vertices on the measure.
ZU064-05-FPR
pcma
9 August 2017
22:51
6
Elvis H.W. Xu and Pak Ming Hui
For a Vertex i in Community C, let Si,C be a score that represents its importance in C.
Without loss of generality, we define Si,C = 0 if i /∈ C. Let lC be the number of partial
communities that have merged to form Community C. Before the merger, the partial com-
munities identified by Step 1 all have l = 1 and all members carry an initial score of 1.
When two communities A and B merge into one, e.g. C = A∪ B, the quantities Si,C and lC
are given by
Si,C = Si,A + Si,B
lC
= lA + lB
(1)
(2)
Physically, Si,C traces the number of occurrences of Vertex i in the lC partial communities
that have merged to form Community C. Vertices with a high value of S/l are regarded as
core members, and those with a small S, say less than 3, are very likely vertices that are
misclassified.
Consider two communities A and B. We define an asymmetric measure f (A, B) to take
into account the different importance of members as
f (A, B) = ∑
i
Si,B
lB ·
Si,A
wA
,
(3)
where wA = ∑
i
Si,A. The term Si,B/lB represents a normalized importance of Vertex i in B,
ranging from 0 to 1, and Si,A/wA is a weighting factor of Vertex i in A. So f (A, B) measures
the weighted average importance of A's members in B. The product Si,B· Si,A ensures that f
will not be affected much by the misclassified vertices, i.e. those with small values of S. A
large value of f (A, B) indicates that the core members of A are also core members of B, but
not vice versa as f (A, B) 6= f (B, A) in general. This measure has the following properties:
(4)
f (A, B) +
f (A,C)
lB
f (A, B∪ C) =
lB + lC
lC
lB + lC
f (B∪ C, A) =
wB
wB + wC
f (B, A) +
wC
wB + wC
f (C, A) ,
(5)
which can be readily shown. Let {A} ({B}) denote the set of partial communities that form
the Community A (B). It follows from Eqs. (4) and (5) that
f (A, B) = f (∪x∈{A}x,∪y∈{B}y) = ∑ x∈{A}
y∈{B}
wx
wAlB
f (x, y) .
(6)
Recall that x and y are partial communities and thus f (x, y) is the portion of members of x
who are also members of y, i.e.
f (x, y) = x∩ y
x
.
(7)
Equation (6) indicates that f (A, B) is actually a weighted average of the overlap portion
f (x, y) over all combinations of partial communities forming A and B, i.e. with {(x, y), x ∈
{A}, y ∈ {B}}.
The merger of two communities A and B is different from either A absorbing B or B
absorbing A. Thus, a symmetric analogy of f (A, B) is preferred for deciding a merger.
To motivate the construction of such a parameter, we introduce a measure g(C) of a
Community C in a way similar to Eq. (6) that compares members in the partial communities
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
forming C:
7
(8)
g(C) =( 1
∑ x,y∈{C}
x6=y
if lC = 1
if lC > 1
wx f (x,y)
wC(lC−1)
It gives the average portion of overlap between partial communities in a merged commu-
nity. Its physical meaning can be seen by considering the special case that C is an ER
random network G(n, p) with members randomly connected with a probability p. A partial
community now consists of a vertex and all its neighbors. The expected portion of overlap
between two partial communities f (x, y) is roughly p, giving g(C) ≈ p. This indicates
that g(C) is approximately a measure of the fraction of other members that a member
is connected to. A larger g(C) implies denser internal edges in the community and thus
members are connected tightly to each other. It can be used as an indicator on whether a
merged community is a real community or just a wrongly merged set of vertices.
For the case C = A∪ B, g(C) satisfies
g(C) =
where
1
wC(lC−1) {wA(lA − 1)g(A) + wB(lB − 1)g(B)
+(wAlB + wBlA) fs(A, B)} ,
fs(A, B) =
wAlB f (A, B) + wBlA f (B, A)
wAlB + wBlA
=
2 ∑i Si,A · Si,B
wAlB + wBlA
.
(9)
(10)
There are three terms in Eq. (9) for g(C). The first and second terms give the overlap
portions within A and within B, respectively.
The third term in Eq. (9) measures the overlap between A and B. It is important to note
that a symmetric measure fs(A, B), as defined in Eq. (10), emerges. It is a weighted average
of the asymmetric measures f (A, B) and f (B, A) and yet itself satisfies fs(A, B) = fs(B, A).
It follows from Eq. (10) that fs(A, B∪ C) is given by a weighted average of fs(A, B) and
fs(A,C), and thus
fs(A, B∪ C) 6 max{ fs(A, B), fs(A,C)} .
(11)
We are thus led to apply fs as a symmetric similarity measure between two communities
that accounts for the different importance of the members. We remark that fs is not the
only option but it is a good one because of its many advantages: fs has a clear physical
meaning that measures the average overlap portion of partial communities between A and
B; it respects the different importance of members of a community; it is linear and easy
to calculate; and its mathematical property expressed in Eq.( 11) allows us to optimise the
merger process to be of linear complexity as we will discuss shortly.
Based on the idea of agglomerative hierarchical clustering, the merger process using fs
as the similarity measure can be implemented as follows. Given a set C of communities to
be merged, a straightforward way is to:
1. Calculate fs for each pair of communities in C and maintain a priority queue of fs
in descending order.
2. Merge the pair with the largest fs and update the priority queue.
3. Repeat 2 until the largest fs in the priority queue falls below a threshold t fs .
The time complexity of this algorithm is O(n2 log n), where n is the number of communities
in C . The space complexity is O(n2) as we need to maintain the priority queue of fs. For
ZU064-05-FPR
pcma
9 August 2017
22:51
8
Elvis H.W. Xu and Pak Ming Hui
detecting communities in large-scale networks, a more efficient algorithm is desirable. In
what follows, we propose two optimizations to reduce both the time and space complexity
to O(n).
We define the best merger candidate of a community A as
bmc(A) = arg max
X∈C /A
fs(A, X) .
(12)
We argue that the algorithm above is equivalent to:
1: given a set of communities C
2: repeat
choose a community A from C
B ← bmc(A)
while bmc(B) 6= A do
A ← B
B ← bmc(A)
end while
if fs(A, B) > t fs then
3:
4:
5:
6:
7:
8:
9:
10:
11:
merge A and B
remove A and B, add A∪ B to C
end if
12:
13: until no communities can be merged anymore
14: return C
The algorithm makes use of the property of fs given in Eq. (11). If A and B are the best
merger candidates of each other, there does not exist a community C that gives fs(A,C) >
fs(A, B), where C can be any combination of communities in C /A. Therefore, even if
fs(A, B) is not at the top of the fs priority queue, the merger of A and B can be moved
forward since other mergers higher on the priority queue that would take part will not
affect the merger of A and B. An advantage is that merges are not required to proceed in
order in the algorithm, and thus there is no need to maintain the fs priority queue. The
space complexity is reduced from O(n2) to O(n).
The search on bmc(A) is formally within the set C /A. Practically, the search area can be
reduced significantly, as most of the communities in C /A do not even share a single mem-
ber with A in sparse networks. A good approximation is to limit the search to the partial
communities from the viewpoints of A's members and the merged communities containing
these partial communities. As such, the time complexity of calculating bmc(A) does not
scale with n, providing that the community size and the number of partial communities
per vertex are independent of the network size. The number of iterations of finding a pair
of communities to merge should also be independent of n. The repeated loop requires a
time complexity of O(n). Since n usually scales linearly with the network size, it can also
be regarded as the network size. We thus argue that the time complexity of our optimized
merger algorithm is approximately O(n). This is verified numerically in Sec. 3.
The choice of the value of t fs depends on the networks being analyzed, and one's subjec-
tive view of how dense the internal edges of a community should be. There is no standard
answer. For example, setting t fs = 0.1 means we aim to detect communities of which the
members know more than 10% of the other members on average. Using a higher value
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
9
means PCMA will focus on communities with denser internal edges or the cores inside
them, and those with a lower density are not acknowledged as communities. Lowering
t fs would bring in more peripheral vertices as members and would cause further merger
of similar communities. Tuning t fs from high to low may extract the core-periphery and
possible hierarchical structure of communities. It is another important topic that is beyond
the scope of the present work, we leave it to future work. We think t fs = 0.1 is a good choice
for social communities and it is harsh enough for those with a large size. However, it can
easily be satisfied by small ones. For example, two partial communities of size 10 only
need one common member to satisfy the threshold. Since partial communities detected in
PCMA Step 1 may contain a lot of misclassified members, such loose threshold for small
partial communities may result in a lot of mergers of partial communities that are actually
not part of the same complete community. We suppress such unwanted mergers of small
partial communities by forcing the similarity fs (A, B) = 0 if ∑i Si,A· Si,B/ max{lA, lB} < t f0 .
It means two partial communities can merge only if the number of their common members
is no less than t f0 . A better solution is to use a dynamic t fs that depends on the sizes of
communities and we leave it to future work.
2.3 PCMA Step 3: Post-processing
After merging communities, a cleaning process is needed to handle two types of noise.
First, we need to identify which merged communities are real communities and which
are simply merged sets of vertices by coincidence. The latter usually contain only a small
number of partial communities because they are merged by accidents. The more partial
communities a merged community contains, the more likely it is a real community. Thus,
the parameter l of a community can be used as a measure of whether a detected community
is trustful. A way to sift out real communities is to set a threshold tl and require all real
communities to have l > tl. The threshold can be set in many ways, e.g. setting tl based
on each community's size, as a larger community usually caries a larger l. Second, we
need to identify and eliminate vertices that are misclassified into partial communities in
Step 1. Recall that Si,C is the number of occurrences of Vertex i in lC partial communities
that formed the Community C. Excluding Vertex i's own partial communities (if any),
the remaining score S′i,C can roughly be interpreted as the number of other members that
Vertex i is connected to in Community C. Usually S′i,C = Si,C − 1. If the probability of
Vertex i being misclassified into a partial community is 10%, then being misclassified into
S′i,C partial communities of C is 0.1S′i,C. Therefore, the probability of Vertex i being a false
member drops sharply with increasing S′i,C. Thus, a threshold tS′ can be set to eliminate
vertices with S′ < tS′ . Normally tS′ = 4 is sufficiently stringent and it should not be less
than 2. There remain vertices with S′ > tS′ but S′/l ≈ 0. They may still not be members
since they know too few other members. The ratio S′/l gives an estimate on the fraction of
the other members that a member is connected to. Another criterion S′/l > tS′/l becomes
useful, with tS′/l being a threshold that requires each member be connected to at least
tS′/l × 100% of the other members. This criterion echoes the concept of f -core discussed
in Sec 1. The threshold tS′/l can either be set uniformly for all communities or individually
for each community based on the value of g, which reflects the average portion that a
member is connected to the other members. Since different kinds of networks may have
ZU064-05-FPR
pcma
9 August 2017
22:51
10
Elvis H.W. Xu and Pak Ming Hui
different community structures, the choice of tS′/l depends on the nature of communities
of a specific network under study.
2.4 Applicability
PCMA works under two conditions: Existence of partial communities (Step 1) and ad-
equate overlap between partial communities for mergers (Step 2). Usually, the second
condition is satisfied automatically when the network under study meets the first condition.
For the first condition, the existence of partial communities from the viewpoint of a vertex
requires that there are sufficient number of neighbors and a high density of edges among
the neighbors, i.e., a high local clustering coefficient of the vertex.
We expect a community detected by PCMA to have the following properties:
1. Two members with common neighbors are highly likely neighbors of each other. As
a consequence, the community has a relatively high value of clustering coefficient.
2. The shortest distances between most pairs of members are generally short and not
longer than 3. Thus, most members are connected to each other either directly or via
one/two intermediate member(s).
3. Each member is connected to at least a certain fraction of the other members.
From another perspective, these properties can be taken as a broad descriptive definition
of community, and are well suited for describing communities with significant overlaps.
PCMA is designed to detect this kind of communities, which are important in large-scale
systems with vertices typically having multiple memberships.
3 Benchmarking
We tested PCMA using two benchmark models to illustrate its performance and applicabil-
ity. Results are compared with DEMON (Coscia et al., 2012), which shares the same gen-
eral idea as that of PCMA, and also three other fast and accurate overlapping community
detection algorithms that are among the best (Xie et al., 2013): namely OSLOM (Lancichinetti et al., 2011),
SLPA (Xie et al., 2011), and BIGCLAM (Yang & Leskovec, 2013b).
First, a simple benchmark model in the spirit of the planted ℓ-partition model (Condon & Karp, 2001)
is used. The network is generated as follows:
1. Generate an ER random network of n vertices with a mean degree hki that serves as
background noise.
2. Randomly sample s vertices as a community, with s satisfying the Poisson distribu-
tion with an expected value of hsi. Connect each pair of members with a probability
p.
3. Repeat the step to generate n·hci communities. Here, hci is the expected number of
communities that a vertex belongs to.
This model is flexible in that the total number, size, and intra-community edge density,
as well as the background noise level can be directly controlled. In addition, vertices can
belong to an arbitrary number of communities, including zero. There is no guarantee that
there are more edges within a community than edges going out. These features make many
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
11
existing community detection algorithms invalid. They reflect the challenges posed by
real social networks, in which a person often simultaneously belongs to many groups, on
community detection. PCMA is designed to solve the problem.
Consider a network with n = 105, hki = 20, p = 0.3, hsi = 40, and hci = 2 generated as
described. The threshold t fs = 0.1 is chosen for the merger process. Fig. 2 shows the actual
community size distributions generated by the model (diamonds). The results as detected
by PCMA before (circles) and after post-processing (squares) are shown for comparison.
As discussed in Sec. 2.3, the merged communities without post-processing are noisy. The
results show a peak at a small community size due to many coincidentally merged sets of
vertices, which are targeted for removal in post-processing. The results also show a bump
in the distribution at large community sizes. Although these are real communities, the
many misclassified vertices make their sizes bigger than their actual sizes. Hence, results
before post-processing could be misleading. By setting the thresholds properly, as given in
Table A 2 in Appendix B, the distribution after post-processing is in good agreement with
the actual community size distribution.
n
o
i
t
u
b
i
r
t
s
i
D
0.07
0.06
0.05
0.04
0.03
0.02
0.01
0.00
0
Generated distribution
Detected distribution
(before post-processing)
Detected distribution
(after post-processing)
50
100
150
200
Community Size
Fig. 2. (Color online) Community size distribution as generated by the benchmark model
(diamonds) described in the text. The corresponding results as detected by our method
before (circles) and after (squares) applying the post-processing scheme are shown for
comparison. The thresholds are given in Table A 2 in Appendix B.
To qualify the accuracy of PCMA, we adopt the widely used Normalized Mutual Infor-
mation (NMI) (Danon et al., 2005) as extended by Lancichinetti et al. (Lancichinetti et al., 2009)
to compare overlapping communities. As a recent study showed there may be cases in
which NMI is biased (Zhang, 2015), we use two additional measures, namely the Omega
Index (Murray et al., 2012) and F1 Score, to make the evaluation more comprehensive. The
F1 Score in the present work is defined as
F1(D, G ) =
2· Precision(D, G )· Recall(D, G )
Precision(D, G ) + Recall(D, G )
,
(13)
ZU064-05-FPR
pcma
9 August 2017
22:51
12
Elvis H.W. Xu and Pak Ming Hui
Precision(D, G ) =
1
D
∑
D∈D
max
G∈G
D∩ G
D∪ G
,
Recall(D, G ) = Precision(G , D) ,
(14)
(15)
where D and G are the detected communities and the ground-truth, respectively.
Fig. 3(a) compares the performance of DEMON, OSLOM, BIGCLAM, and PCMA on
synthetic networks with different intra-community edge densities. Results of SLPA are not
shown because the method cannot detect isolated vertices.
DEMON failed to detect communities generated by this benchmark as values of the
NMI and Omega Index are almost zero. As discussed in Sec. 1, a main reason is that the
misclassified vertices invalidate the similarity measure in DEMON which is based on the
overlap between two communities. Fig. A 2 shows an example of a merged community
containing two times more misclassified vertices than true members. It indicates clearly
that a similarity measure capable of tracing the different importance of vertices in a merged
community, such as the one used in PCMA, is essential for the effectiveness of the merger.
The accuracy of OSLOM depends strongly on the number of iterations. We use the de-
fault value r = 10 suggested in Ref. (Lancichinetti et al., 2011), unless specified otherwise.
BIGCLAM and PCMA are shown to be sensitive to the intra-community edge density p.
For PCMA, it is because p affects the existence of partial communities, which is a criterion
for the applicability of PCMA (see Sec. 2.4). In the benchmark model, the probability p
promotes partial communities. PCMA works well when
hknni = [(hsi− 1)p− 1] p > 2 ,
(16)
where (hsi−1)p is the expected number of neighbors of a member and hknni is the expected
number of edges of a neighbor connecting to other neighbors of the member. The neighbors
start to be strongly connected, i.e. partial communities emerge, when hknni > 2. From
Fig. 3(a), PCMA performs better than OSLOM for p > 0.28, corresponding to hknni > 2.78
for the case of hsi = 40.
Fig. 3(b) shows the dependence of the performance on hci, which controls the expected
number of communities that a vertex belongs to. A larger hci corresponds to more edges
connecting the communities and thus a denser and more complex network. The perfor-
mance of DEMON is far worse than the other methods (similar to what is shown in
Fig. 3(a)) and the result is not shown. For a system with n = 104 members, the accu-
racy of OSLOM falls rapidly with increasing hci. For PCMA, the accuracy remains high
throughout, with a slight drop due to the finite size of the network instead of hci. This is
verified by the performance of PCMA in a bigger system of n = 105 (circles in Fig. 3(b)).
Recall that many existing algorithms become invalid in problems that a vertex may belong
to many communities, but PCMA handles them well.
We also tested PCMA with the widely used LFR benchmark model (Lancichinetti et al., 2008).
The results are shown in Fig. 3(c). In the LFR model, a vertex has a degree chosen from a
distribution that follows a power-law of exponent τ1 in a range of degrees kmin 6 k 6 kmax
corresponding to a mean degree hki. A tunable fraction of vertices are chosen to belong
to more than one communities. They are the overlapping vertices. The remaining vertices
have only one community. For a vertex of degree k, a parameter µ sets the fraction of
the edges to be connected to vertices outside the community(ies) that the vertex belongs
n
o
i
t
a
m
r
o
f
n
I
l
a
u
t
u
M
d
e
z
i
l
a
m
r
o
N
1.0
0.8
0.6
0.4
0.2
(a)
DEMON
OSLOM, r = 1
OSLOM, r = 10
BIGCLAM
PCMA
0.0
0.15
0.20
0.25
p
0.30
0.35
1.0
0.9
0.8
0.7
0.6
0.5
0.4
(b)
(c)
1.0
0.8
0.6
0.4
0.2
0.0
0.0
DEMON
SLPA
OSLOM
BIGCLAM
PCMA
0.2
0.4
0.6
0.8
1.0
Fraction of overlapping vertices
OSLOM
BIGCLAM
PCMA, n = 104
PCMA, n = 105
1
2
3
4
5
6
hci
Fig. 3. (Color online) Performance comparisons of DEMON, SLPA, OSLOM, BIGCLAM, and PCMA in a simple benchmark model and the LFR
benchmark model. Unless stated otherwise, parameters of our simple benchmark model in (a) and (b) are: n = 104, hki = 20, p = 0.3, hsi = 40,
hci = 3. Parameters of the LFR benchmark model in (c) are: n = 104, hki = 40, kmax = 100, µ = 0.3, τ1 = 2, τ2 = 1, cmin = 20, cmax = 100,
each overlapping vertex has two communities. The thresholds of PCMA are given in Table A 2 in Appendix B. For (b), the number of partial
communities set to be found in PCMA Step 1 is K = 10. For DEMON, the default value of the parameter ε = 0.25 is used. The number of
iterations of OSLOM is set to r = 10. For SLPA, the program applies different thresholds ranging from 0.01 to 0.5 by default and we select the
best result. BIGCLAM is informed of the actual number of communities generated by the benchmark models. Each data point is an average of 10
realizations. If not shown, the error bar is smaller than the size of the symbol.
Z
U
0
6
4
-
0
5
-
F
P
R
p
c
m
a
9
A
u
g
u
s
t
2
0
1
7
2
2
:
5
1
P
a
r
t
i
a
l
C
o
m
m
u
n
i
t
y
M
e
r
g
e
r
A
l
g
o
r
i
t
h
m
1
3
Z
U
0
6
4
-
0
5
-
F
P
R
p
c
m
a
9
A
u
g
u
s
t
2
0
1
7
2
2
:
5
1
x
e
d
n
I
a
g
e
m
O
e
r
o
c
S
1
F
1.0
0.8
0.6
0.4
0.2
(a)
DEMON
OSLOM, r = 1
OSLOM, r = 10
BIGCLAM
PCMA
0.0
0.15
0.20
0.25
0.30
0.35
1.0
0.8
0.6
0.4
0.2
DEMON
OSLOM, r = 1
OSLOM, r = 10
BIGCLAM
PCMA
0.0
0.15
0.20
0.25
p
0.30
0.35
1.0
0.9
0.8
0.7
0.6
0.5
0.4
1.0
0.9
0.8
0.7
0.6
0.5
0.4
(b)
(c)
1
4
1.0
0.8
0.6
0.4
0.2
0.0
0.0
1.0
0.8
0.6
0.4
0.2
0.0
0.0
DEMON
SLPA
OSLOM
BIGCLAM
PCMA
0.2
0.4
0.6
0.8
1.0
DEMON
SLPA
OSLOM
BIGCLAM
PCMA
0.2
0.4
0.6
0.8
1.0
Fraction of overlapping vertices
OSLOM
BIGCLAM
PCMA, n = 104
PCMA, n = 105
1
2
3
4
5
6
OSLOM
BIGCLAM
PCMA, n = 104
PCMA, n = 105
1
2
3
4
5
6
hci
.
.
E
l
v
i
s
H
W
X
u
a
n
d
P
a
k
M
i
n
g
H
u
i
Fig. 3 (Cont.). (Color online) Performance comparisons of DEMON, SLPA, OSLOM, BIGCLAM, and PCMA in a simple benchmark model and
the LFR benchmark model (continued). All parameters are the same as those stated in the caption of Fig. 3.
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
15
to. The remaining fraction (1 − µ) of edges are evenly divided among the communities,
if the vertex is chosen to have multiple communities. As such, the community sizes also
follow a power-law with an exponent τ2 within a range of communities sizes between
cmin and cmin. The combinations of parameters in the LFR model give a class of tunable
structures for the resulting networks. The parameters used in benchmarking are based
on the empirical networks we studied. We use the mean degree hki = 40 of the two
real social networks shown in Table 1. The selection of the mixing parameter µ and the
range of community size is close to what we observed in the two networks. Fig. 3(c)
shows OSLOM, SPLA, and PCMA work very well when there are very few overlapping
vertices. When communities overlap more, PCMA achieved higher values of the NMI and
F1 Score than the other four methods over a wide range of the fraction of overlapping
vertices, except for the last data point in Fig. 3(c) in comparison with OSLOM. In the LFR
model, the degree assignment does not distinguish single-community vertices from multi-
community vertices. As a result, a vertex belonging to multiple communities has fewer
edges connecting to each of its communities. In PCMA, however, members are expected
to be connected to at least a certain fraction of the other members before establishing their
membership. This leads to the gradual drop in PCMA's NMI with increasing number of
overlapping vertices, which are members according to the benchmark model but may not
be acknowledged by PCMA. We remark that it is actually not a problem of accuracy, but
more about what a community should be.
We also studied the time complexity of the methods numerically based on the LFR
benchmark model (Lancichinetti et al., 2008). Calculations were performed on a work-
station with Intel Xeon E5-2609 @ 2.40GHz (4 cores / 8 threads). The programs were
allowed to use all threads if they were parallelized. Fig. 4 shows how the execution time
scales with the network size. SLPA and PCMA are very efficient, while OSLOM and
BIGCLAM are a few hundred times slower. DEMON is written in Python, which by nature
is much slower than programs written in C/C++. In the log-log plot in Fig. 4, the slopes for
SLPA, OSLOM, BIGCLAM, and PCMA are 1.09, 1.09, 1.20, and 0.99, respectively. It is,
therefore, numerically verified that the time complexity of PCMA is O(n).
In summary, the benchmark tests showed that PCMA is an efficient algorithm specifi-
cally suitable for detecting communities in networks in which the vertices may belong to
multiple communities.
4 Empirical Analysis
Having established the efficiency and accuracy of PCMA, we tested it against two huge
online social networks, Friendster (Yang & Leskovec, 2013a) and Sina Weibo. The basic
information is listed in Table 1. Friendster is one of the earliest social network service
websites, allowing people to maintain contacts and interact with each other. The net-
work data of Friendster is downloaded from SNAP Datasets (Leskovec & Krevl, 2014).
It comes with metadata groups (Hric et al., 2014), or the so called ground-truth commu-
nities (Yang & Leskovec, 2013a; Yang & Leskovec, 2014), providing us with a reference
to evaluate the accuracy of detection algorithms. Sina Weibo is a directed network like
Twitter for fast information spreading and it also has characteristics of Facebook for in-
teractions with friends. We focused on the embedded undirected friendship network with
ZU064-05-FPR
pcma
9 August 2017
22:51
16
Elvis H.W. Xu and Pak Ming Hui
104
103
102
101
s
d
n
o
c
e
s
/
e
m
T
i
100
104
DEMON
OSLOM
SLPA
BIGCLAM
PCMA
105
106
Network Size
107
Fig. 4. (Color online) Comparison on time complexity. Tests are conducted on LFR
benchmark model. The fraction of overlapping vertices is set to 50%. Other parameters
are the same as those in Fig. 3. Each data point is an average over 10 realizations. Error
bars are smaller than the size of the symbols.
only reciprocal edges. The network we sampled from the Internet contains about 80 million
vertices and 1.0 billion reciprocal edges, with only 1.2% of the edges being connected to
vertices that are not sampled. The sampled network can thus be roughly regarded as the
whole network.
Both networks are huge and have very high values of the clustering coefficient. Detecting
communities accurately within reasonable time in such huge networks is a great challenge
for many detection algorithms. PCMA, however, successfully detected millions of commu-
nities in both networks within 1 or 2 days, using only several ordinary workstations. The
details of the parameters used in detection are given in Appendixes A and B.
Table 1. Information of the two analysed huge social networks
Dataset
n
m
hki
CWS
c
T1
Friendster
Sina Weibo
65.6M 1806M 55.1
79.4M 1046M 26.4
0.205
0.155
1.6M 24.9h / node × 7 nodes
1.2M 17.5h / node × 7 nodes
T2+3
14.2h
5.1h
M stands for million, h stands for hour. n, m, hki, and CWS are the number of vertices, the number of
edges, average degree, and the average local clustering coefficient, respectively. c is the number of
communities detected by PCMA. T1 and T2+3 are the time spent for PCMA Step 1 and Step 2 & 3,
respectively. Step 1 was set to repeat r = 10 times and pick the best results. It was parallelized on 7
computing nodes with each equipped with 2×Intel Xeon E5-2670 @ 2.60GHz. This step could be
10 times faster if r = 1 is used, just as we did in benchmarking.
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
δ
y
t
i
s
n
e
d
e
g
d
e
y
t
i
n
u
m
m
o
c
-
a
r
t
n
I
1.0
0.8
0.6
0.4
0.2
0.0
0
Sina Weibo (detected)
20
40
60
80
100
1.0
0.8
0.6
0.4
0.2
0.0
0
Friendster (detected)
20
40
60
80
100
1.0
0.8
0.6
0.4
0.2
0.0
0
Friendster (metadata groups)
20
40
60
80
100
17
1.0
0.8
0.6
0.4
0.2
0.0
Community Size
Community Size
Community Size
Fig. 5. (Color online) Intra-community edge density δ is used to evaluate the quality of a
community. Histograms of δ and community size are shown for the detected communities
with size no less than tl in both social networks and the metadata groups of Friendster.
To show the patterns clearly, the values in each vertical cut are rescaled by mapping the
highest value to unity. The 0.96 million metadata groups are of low quality compared to
the 1.6 million communities detected by PCMA in Friendster.
4.1 Detected Structural Communities v.s. Metadata Groups
In this subsection, we show that the millions of communities detected by PCMA in both
networks are of high quality, and the metadata groups should not be treated as the ground-
truth of the structural communities, of which the definition is purely based on network
topology.
The number of metadata groups provided in Friendster dataset is about 0.96 million,
while PCMA detected a lot more, 1.6 million communities. We calculated the Normalized
Mutual Information (NMI) between them and the result was approximately 0.004. It means
either PCMA failed to detect the communities or the metadata groups are not the true
ground-truth of the structural communities we aim to detect. To figure it out, we adopted
the intra-community edge density δ to evaluate the quality of the detected communities
as well as the metadata groups. The density δ is defined as the number of edges within a
community over the maximum number of possible edges there could be. Fig. 5 shows the
results for communities detected in both networks, and the metadata groups of Friendster.
Surprisingly, we find that the majority of the metadata groups have very low quality. For
example, a group of size 20 with δ = 0.1 means each member knows only 1.9 other
members on average. The group could not even be connected. On the contrary, PCMA
successfully controlled the quality of the detected communities in both networks, as we
can see that the densities of these communities are reasonably high and seem no lower
than some specific value. This successfulness is rooted in the design of PCMA. Recall
that g(C) introduced in Sec. 2.2 can roughly be regarded as δ and it is guaranteed to be
no less than the threshold t fs used in PCMA Step 2. That means t fs effectively sets a soft
lower bound of the intra-community edge density, i.e. δ ≈ g > t fs . In this analysis, we used
t fs = 0.1. Fig. 5 also shows that some of the metadata groups are of high quality, but they
seem not in the same place of the plot of the detected communities. One explanation is
that these high quality groups are cores of communities. PCMA does not only find the core
members of a community, but may also include peripheral members as long as δ remains
relatively high compared to the given t fs . To verify this speculation, we screened about
ZU064-05-FPR
pcma
9 August 2017
22:51
18
0.23 million high quality groups with s > 10 and δ > 1/√s, where s is the group size, then
calculated the recall score for each of them
Elvis H.W. Xu and Pak Ming Hui
R(G) = max
C∈D
G∩ C
G
,
(17)
where G represents one of the screened metadata groups, D is the set of the detected
communities of Friendster. In contrast to the very low NMI, the average recall score hRi
reached 0.7, meaning the detected communities already included on average 70% of each
of the screened high quality groups. In fact, PCMA not only included these groups, but
also detected a lot more high quality communities that are not presented in the metadata
groups, as we can see in Fig. 6 that the number of detected communities of size above 20
is much greater than the number of metadata groups. We checked carefully whether some
of the detected communities were duplicate by calculating the overlap between any pair of
these communities. Only a tiny fraction of the pairs have overlap. Among them 86% and
8% of the overlaps are just 1 or 2 vertices, respectively. Thus the 1.6 million communities
detected by PCMA are considered authentic and unique.
60000
50000
40000
30000
20000
10000
s
e
i
t
i
n
u
m
m
o
C
f
o
r
e
b
m
u
N
0
0
Metadata groups
Detected communities
Communities detected
by PCMA but not
presented in the
metadata groups
20
40
60
80
100
Community Size
Fig. 6. (Color online) The size distribution of the metadata groups and the structural
communities detected by PCMA in Friendster dataset. The first 4 data points of the
metadata groups staring from (3, 209764) are beyond the shown area of the figure.
We conclude that most of the metadata groups of Friendster are of low quality or too
small size, while PCMA detected a lot high quality communities that are not in them. The
metadata groups may be taken as a reference, but not the ground-truth of the structural
communities.
4.2 Significant Overlaps in Social Communities
The detected communities also confirm the multiple memberships of vertices and thus the
significant overlaps among communities. Fig. 7 gives an example of a complete community
that is only partially revealed in the ego network in Fig. 1. The number on a vertex in
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
19
Fig. 7 gives the number of communities that the vertex belongs to. To illustrate the multiple
memberships of vertices, we picked a vertex labeled 6 (the same vertex centered in Fig. 1)
and visualized the 6 communities it belongs to in Fig. 8. For clarity, the vertex itself and the
edges to its neighbors (vertices with deeper colors) are not shown. The purple community
is the same community shown in Fig. 7. It overlaps with the other 5 communities through
the picked vertex (not shown). In other words, the vertex acts as a bridge that connects its 6
communities. Most members of the community, just like the picked vertex, have multiple
memberships. They make the community overlap with nearly 200 other communities while
its size is only 54, resulting in the number of edges going out of the community (ex-
community edges) 5139 to be much larger than the number of reciprocal edges within the
community (intra-community edges) 702× 2. It is not an exceptional case, in fact more
than 99% of the communities detected in both social networks are found to have more ex-
community than intra-community edges. This confirms that detection algorithms based on
concepts for disjoint or slightly overlapping communities do not work in social networks,
and new algorithms that can handle multiple memberships of vertices, such as PCMA, are
called.
13
13
6
4
6
2
1
3
6
3
1
2
4
3
1
4
6
6
6
7
4
1
3
3
3
5
5
22
3
9
15
6
4
4
2
3
7
4
4
6
2
3
3
2
1
1
4
5
3
3
3
2
6
3
Fig. 7. A real community consisting of 54 members identified by PCMA in Sina Weibo
friendship network. It is the corresponding complete community of the purple partial
community shown in Fig. 1. The label on a vertex gives the number of different
communities that the vertex belongs to. The number of reciprocal intra-community edges
(counted twice) is 702× 2, and the number of ex-community edges (not shown) connecting
to the outside is 5139.
We proposed and implemented a Partial Community Merger Algorithm specifically de-
signed for detecting communities in large-scale networks in which a member may have
5 Summary
ZU064-05-FPR
pcma
9 August 2017
22:51
20
Elvis H.W. Xu and Pak Ming Hui
Fig. 8. (Color online) The communities that the center vertex in Fig. 1 belongs to. For
clarity, the vertex itself and the edges to its neighbors (vertices with deeper colors) are
not shown. The vertex is a core member of 3 communities (blue, green, purple) as it is
connected to a considerable number of their members. These deeper color members are just
the 3 partial communities shown in Fig. 1 in the same color. PCMA not only reconstructed
the complete communities of these 3 partial communities, but also found another 3 that
cannot be seen in Fig. 1 of which the vertex is a peripheral member. The positions of the
vertices calculated by an independent algorithm are in good agreement with the colors
determined by PCMA.
multiple memberships. The structure of these communities is signified by a large number
of overlaps in members and thus a community may have many more edges connecting to
the outside compared to those within the community. Such structures make many existing
community detection algorithm invalid, but yet they often show up in real-world systems.
Through PCMA, we provided a conceptual framework as well as a practical algorithm
and significantly advanced the techniques in dealing with these systems. Details of imple-
menting PCMA were discussed. We used two benchmark models and compared results
with four algorithms to establish the efficiency and accuracy of PCMA. We also tested
the method on two huge social networks and millions of high quality communities were
detected. The metadata groups are of low quality compared to the detected and we showed
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
21
that they should not be considered as the ground-truth of the structural communities that
detection algorithms usually aim to detect. We also verified that the multiple memberships
of vertices and significant overlaps are extremely common in the detected communities.
Thus new algorithms that can detect communities with these complex structures, such as
PCMA, are essential and urgently needed.
PCMA does not need a prior knowledge of the total number of communities to search
for and it is capable of analyzing communities in large-scale networks in linear time. In
addition to identifying the communities, PCMA also gives who the key members are in a
community and how many different communities a member belongs to. The high accuracy
and linear time complexity makes PCMA a promising tool for detecting communities with
significant overlaps in huge social networks, which cannot be handled by most existing
algorithms.
We end with a few remarks. Although we described and implemented PCMA only
for unweighted networks, the approach is flexible and it can be readily extended to treat
weighted networks. Another extension is to properly tune the threshold t fs for exploring
the hierarchical structure of communities. Like any other algorithm, PCMA also has its
limitations. It is not designed to detect small communities and it will not work in networks
that are too sparse. There is also the common problem among algorithms on distinguishing
real communities from false ones. This is actually a deeper question because whether there
really exists a clear boundary, i.e. a set of thresholds, for distinguishing "real communities"
from "false ones" is questionable. A more practically approach would be to explore meth-
ods of choosing the thresholds properly or constructing a credibility function involving g,
l, and community size to make the detected communities more trustful. These quantities
in the PCMA framework provide us with vast space for further improvement in post-
processing and in-depth analysis of community structure.
Finally, the source code of PCMA is released as free software under the GNU General
Public License version 2 or any later version (Xu, 2016).
Acknowledgements
One of us (EHWX) gratefully acknowledges the support from the Research Grants Council
of Hong Kong through a Hong Kong PhD Fellowship.
We thank an anonymous reviewer for informative suggestions on related work in the
computer science literature.
A Searching for Partial Communities
PCMA Step 1 is to search for partial communities in the ego network of each vertex. We
adopt an efficient community detection algorithm proposed by Ball et al. (Ball et al., 2011)
for the purpose. Starting from an ego network of size n, the algorithm takes the number
K of communities to be found as an input. The output is an n × K matrix, with the K
numbers in a row that signifies the belonging coefficients (Gregory, 2011) of a vertex for
the K communities. For example, we set out to find K = 5 communities in an ego network,
labelled by C1 to C5. Then each row has 5 numbers, e.g. 0.64, 0.29, 0, 0.07, 0 for the
j-th row, denoting that the vertex j has a portion of 64% belonging to C1, 29% to C2,
ZU064-05-FPR
pcma
9 August 2017
22:51
22
Elvis H.W. Xu and Pak Ming Hui
and 7% to C4. To convert the fuzzy assignment (Gregory, 2011) of members to definite
assignment, we impose a threshold that a community carries a vertex j as its member only
if the belonging coefficient of the vertex j for the community is above a certain value.
If the threshold is 0.2, only communities C1 and C2 have the vertex j as a member. For
the central vertex of the ego network, as the communities are its partial communities, it
is treated as a default member of all the communities regardless of the threshold. Partial
communities can then be derived from every ego network. We remark that although the
number of partial communities in an ego network is not known in prior to the search, it
can easily be estimated for small networks. An appropriate overestimation is necessary as
isolated vertices in an ego network also need to be accommodated by some communities.
Such overestimation is harmless as the false partial communities can be handled properly
in the merger and post-processing steps that follow. It is reasonable to assume the number
of partial communities to be proportional to the ego network size, optionally with an upper
and a lower bound. The overestimation will not cause problem, as the true communities
can be merged when they have a considerable overlap. For the example in Fig. 1, we set
out to find 10 communities and obtained 3 apparent partial communities (colored purple,
blue and green) and 2 possible ones (red and yellow). The green one actually consists of
3 highly overlapping communities which should be regarded as one. We merge a pair of
partial communities if either one shares more than a certain fraction of the members of the
other.
It is important to note that PCMA does not require a high accuracy in this step of finding
all the partial communities. Any error generated in this step can be greatly reduced by
the mergers and post-processing step, as discussed in Sec. 2.3. For example, the detection
algorithm we used in this step needs to try r = 10 to 100 random initial conditions to get
relatively good results, as suggested by the authors of the algorithm (Ball et al., 2011).
We used only one in benchmarking, yet PCMA still performed very well. Increasing the
number of random initial conditions could get even better results, although with the im-
provement not be much. For empirical analysis, we used r = 10 to get more accurate results.
The parameters used in empirical analysis are summarized in Table A 1. For benchmarking,
K = 5, , r = 1, b = 0.2, m = 0.3. Parameter c and d are not used.
B Thresholds in PCMA Step 2 & 3
The thresholds used in PCMA Step 2 & 3 for both benchmarking and empirical analysis are
summarized in Table A 2. For more information about the physical meanings and proper
use of the thresholds, see Sec. 2.3 and Sec. 2.2. Here we briefly illustrate how the applied
thresholds remove false communities and false members.
Fig. A 1 shows the histograms for the detected communities as a function of their value
of g and community size, under two different thresholds tl = 10 and 2. The quantity g is
another community quality indicator in addition to the intra-community edge density δ.
Usually a smaller community would have a higher g. Choosing a low threshold of tl = 2
gives an abnormal plunge in g at small community sizes as shown in Fig. A 1(a). The low
threshold leads to many false communities that are merged only a few times, as discussed
in Sec. 2.3. Raising tl from 2 to 10 successfully removes most false communities, as shown
in Fig. A 1(b). And the number of communities detected in Friendster and Sina Weibo
Table A 1. Parameters of PCMA Step 1 used in the empirical analysis
Parameter
Value
Description
K
r
b
m
c
d
-
10
0.2
0.2
0.05
10
The number of partial communities set to be found in a vertex's ego network is K = min{3 + k/10, 20}, where k is the
degree of the vertex
Repeat the detection of partial communities for r times, pick the best result
A vertex is regarded as a member of a partial community if its belonging coefficient to this community is above b
Merge partial communities of the same vertex if the overlap between two partial communities is above the threshold
Discard partial communities of which the clustering coefficient (treat the community as a subnetwork) is below c
Skip vertices with degree lower than d as it is less likely to find partial communities in these vertices' ego networks
Table A 2. Thresholds used in PCMA Step 2 & 3 for both benchmarking and empirical analysis
Threshold
Value
Description
t fs
t f0
tl
tS′/l
tS′
0.1
4
10
0.1
2
A pair of partial communities can be merged only if the similarity fs between them is above t fs
Used to suppress unwanted mergers of small partial communities
A merged community must contain at least tl partial communities to be regarded as a real complete community
The score S′ of a member (its own contribution excluded) must be greater than tS′/l · l
The score S′ of a member (its own contribution excluded) must be no less than tS′
Z
U
0
6
4
-
0
5
-
F
P
R
p
c
m
a
9
A
u
g
u
s
t
2
0
1
7
2
2
:
5
1
P
a
r
t
i
a
l
C
o
m
m
u
n
i
t
y
M
e
r
g
e
r
A
l
g
o
r
i
t
h
m
2
3
ZU064-05-FPR
pcma
9 August 2017
22:51
24
Elvis H.W. Xu and Pak Ming Hui
0.5
0.4
g
0.3
0.2
0.1
0.4
g
0.3
0.2
0.1
(a) tl = 2
(b) tl = 10
Sina Weibo
Sina Weibo
Friendster
Friendster
0
50
100 150 200
0
50
100 150 200
Community Size
Community Size
1.0
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
Fig. A 1. (Color online) The histogram of communities as a function of their value of g and
community size provides an alternative to inspect the quality of the detected communities.
Each vertical cut gives the distribution of g for communities of the same size. The values
in each cut are rescaled by mapping the highest value to unity.
is reduced from 9.0 million to 1.6 million, 4.7 million to 1.2 million, respectively. This
success is accompanied by the drawback that real communities with less than tl = 10
vertices are also removed. Note that there is no best answer to the value of tl because
the boundary between true and false communities itself is indistinct. A more practically
approach is to find a function involving g, l, and community size to evaluate the credibility
of a detected community, instead of labelling them either true or false. We leave it to future
work.
For tS′/l and tS′ , there is no standard answer to which values are the best either. It depends
on the network being analyzed, and one's subjective view of what a community is. Fig. A 2
illustrates a merged community that is the same community shown in Fig. 7 but with false
members not removed. Since l = 54 and tS′/l = 0.1, only vertices with S′ > 6 are considered
members (colored blue). As we can see in Fig. A 2, the thresholds successfully sift out
the core of the community. It is, however, hard to say whether vertices in the periphery
with S′ = 5 or 4 are members or not. In fact, there does not exist a clear boundary of the
community. A better solution is to assign each vertex a belonging coefficient representing
its degree of affinity to the community, e.g. S′/l, instead of forcing each vertex to be either
in or not in the community.
The quantities S′, l, g, and fs introduced in the PCMA framework have sound physical
meanings and they provide us with vast space for further improvement in post-processing
and in-depth analysis of community structure.
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
25
1
1
1
1
1
1
1
1
1
1
1
1
1
2
1
1
1
1
2
1
4
1
2
8
1
1
2
3
4
1
1
1
23
4
1
1
1
1
1
1
1
1
1
1
2
1
22
25
1
1
1
2
15
20
1
1
1
4
1
6
1
5
3
2
1
1
1
11
3
11
15
13
8
10
39
47
43
24
22
27
32
22
15
21
36
40
40
36
37
37
48
21
37
29
30
38
37
27
34
28
46
37
36
15
28
29
39
21
22
28
5
4
1
2
2
2
28
7
1
3
2
2
1
1
11
1
1
18
11
4
2
1
1
1
1
1
1
1
3
1
1
1
1
1
1
1
1
1
1
1
2
1
1
2
1
1
1
1
1
1
Fig. A 2. (Color online) A merged community with false members not removed. It is
merged from l = 54 partial communities and has 160 vertices before post-processing. The
size (area) of each vertex represents its degree in this subnetwork. The label on each vertex
(zoom in to see the numbers) gives the score S′ of the vertex. The grey vertices with S′ < 6
fail to meet the threshold tS′/l = 0.1 so they are not considered members. The remaining
54 blue vertices are members of the community.
References
Ahn, Yong-Yeol, Bagrow, James P, & Lehmann, Sune. (2010). Link communities reveal multiscale
complexity in networks. Nature, 466(7307), 761 -- 764.
Ball, Brian, Karrer, Brian, & Newman, M. E. J. (2011). Efficient and principled method for detecting
communities in networks. Physical Review E, 84(3), 036103.
Baumes, Jeffrey, Goldberg, Mark, Krishnamoorthy, Mukkai, Magdon-Ismail, Malik, & Preston,
Nathan. 2005 (Feb.). Finding communities by clustering a graph into overlapping subgraphs.
Pages 97 -- 104 of: Proceedings of the IADIS International Conference on Applied Computing.
Bianconi, G, Pin, P, & Marsili, M. (2009). Assessing the relevance of node features for network
structure. Proceedings of the National Academy of Sciences of the United States of America,
106(28), 11433 -- 11438.
Condon, Anne, & Karp, Richard M. (2001). Algorithms for graph partitioning on the planted
partition model. Random Structures and Algorithms, 18(2), 116 -- 140.
Coscia, Michele, Rossetti, Giulio, Giannotti, Fosca, & Pedreschi, Dino. (2012). DEMON: a Local-
First Discovery Method for Overlapping Communities. Pages 615 -- 623 of: Proceedings of the
18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New
York, New York, USA: ACM Press.
Coscia, Michele, Rossetti, Giulio, Giannotti, Fosca, & Pedreschi, Dino. (2014). Uncovering
Hierarchical and Overlapping Communities with a Local-First Approach. ACM Transactions on
Knowledge Discovery from Data, 9(1), 1 -- 27.
ZU064-05-FPR
pcma
9 August 2017
22:51
26
Elvis H.W. Xu and Pak Ming Hui
Danon, Leon, D´ıaz-Guilera, Albert, Duch, Jordi, & Arenas, Alex. (2005). Comparing community
structure identification. Journal of Statistical Mechanics: Theory and Experiments, Sept., P09008 --
P09008.
Evans, T S, & Lambiotte, R. (2009). Line graphs, link partitions, and overlapping communities.
Physical Review E, 80(1), 016105.
Evans, T S, & Lambiotte, R. (2010). Line graphs of weighted networks for overlapping communities.
The European Physical Journal B, 77(2), 265 -- 272.
Fortunato, Santo. (2010). Community detection in graphs. Physics Reports, 486(3-5), 75 -- 174.
Girvan, M, & Newman, M. E. J. (2002). Community structure in social and biological networks.
Proceedings of the National Academy of Sciences of the United States of America, 99(12), 7821 --
7826.
Gregory, Steve. (2010). Finding overlapping communities in networks by label propagation. New
Journal of Physics, 12(10), 103018.
Gregory, Steve. (2011).
Fuzzy overlapping communities in networks.
Journal of Statistical
Mechanics: Theory and Experiments, Feb., P02017.
Hric, Darko, Darst, Richard K, & Fortunato, Santo. (2014). Community detection in networks:
Structural communities versus ground truth. Physical Review E, 90(6), 062805.
Lancichinetti, Andrea, Fortunato, Santo, & Radicchi, Filippo. (2008). Benchmark graphs for testing
community detection algorithms. Physical Review E, 78(4), 046110.
Lancichinetti, Andrea, Fortunato, Santo, & Kert´esz, J´anos. (2009). Detecting the overlapping and
hierarchical community structure in complex networks. New Journal of Physics, 11(3), 033015.
Lancichinetti, Andrea, Radicchi, Filippo, & Ramasco, Jos´e J. (2010). Statistical significance of
communities in networks. Physical Review E, 81(4), 046110.
Lancichinetti, Andrea, Radicchi, Filippo, Ramasco, Jos´e J, & Fortunato, Santo. (2011). Finding
Statistically Significant Communities in Networks. PLoS ONE, 6(4), e18961.
Leskovec, Jure, & Krevl, Andrej. 2014 (June). SNAP Datasets: Stanford large network dataset
collection. http://snap.stanford.edu/data.
Murray, Gabriel, Carenini, Giuseppe, & Ng, Raymond. 2012 (June). Using the omega index
for evaluating abstractive community detection. Pages 10 -- 18 of: Proceedings of workshop on
evaluation metrics and system comparison for automatic summarization.
Palla, Gergely, Der´enyi, Imre, Farkas, Ill´es, & Vicsek, Tam´as. (2005). Uncovering the overlapping
community structure of complex networks in nature and society. Nature, 435(7043), 814 -- 818.
Radicchi, F, Castellano, C, Cecconi, F, Loreto, V, & Parisi, D. (2004). Defining and identifying
communities in networks. Proceedings of the National Academy of Sciences of the United States
of America, 101(9), 2658 -- 2663.
Raghavan, Usha Nandini, Albert, R´eka, & Kumara, Soundar. (2007). Near linear time algorithm to
detect community structures in large-scale networks. Physical Review E, 76(3), 036106.
Rees, Bradley S, & Gallagher, Keith B. (2012). EgoClustering: Overlapping Community Detection
via Merged Friendship-Groups. Pages 1 -- 20 of: The Influence of Technology on Social Network
Analysis and Mining. Vienna: Springer Vienna.
Seidman, Stephen B. (1983). Internal cohesion of ls sets in graphs. Social Networks, 5(2), 97 -- 107.
Soundarajan, Sucheta, & Hopcroft, John E. (2015). Use of Local Group Information to Identify
Communities in Networks. ACM Transactions on Knowledge Discovery from Data, 9(3), 1 -- 27.
Xie, Jierui, Szymanski, Boleslaw K, & Liu, Xiaoming. (2011). SLPA: Uncovering Overlapping
Communities in Social Networks via a Speaker-Listener Interaction Dynamic Process. Pages 344 --
349 of: Proceedings of the 2011 IEEE 11th International Conference on Data Mining Workshops.
IEEE.
Xie, Jierui, Kelley, Stephen, & Szymanski, Boleslaw K. (2013). Overlapping community detection
in networks. ACM Computing Surveys, 45(4), 1 -- 35.
ZU064-05-FPR
pcma
9 August 2017
22:51
Partial Community Merger Algorithm
27
Xu, Elvis H. W. (2016). https://hwxu.net/research/pcma.
Yang, Jaewon, & Leskovec, Jure. (2013a). Defining and evaluating network communities based on
ground-truth. Knowledge and Information Systems, 42(1), 181 -- 213.
Yang, Jaewon, & Leskovec, Jure. (2013b). Overlapping community detection at scale. Pages 587 --
596 of: Proceedings of the 6th ACM International Conference on Web Search and Data Mining.
ACM Press.
Yang, Jaewon, & Leskovec, Jure. (2014). Structure and Overlaps of Ground-Truth Communities in
Networks. ACM Transactions on Intelligent Systems and Technology, 5(2), 1 -- 35.
Zhang, Pan. (2015). Evaluating accuracy of community detection using the relative normalized
mutual information. Journal of statistical mechanics: Theory and experiments, 2015(11), P11006.
ZU064-05-FPR
pcma
9 August 2017
22:51
|
1610.01561 | 1 | 1610 | 2016-10-05T18:39:53 | Summarizing Situational and Topical Information During Crises | [
"cs.SI",
"cs.CL"
] | The use of microblogging platforms such as Twitter during crises has become widespread. More importantly, information disseminated by affected people contains useful information like reports of missing and found people, requests for urgent needs etc. For rapid crisis response, humanitarian organizations look for situational awareness information to understand and assess the severity of the crisis. In this paper, we present a novel framework (i) to generate abstractive summaries useful for situational awareness, and (ii) to capture sub-topics and present a short informative summary for each of these topics. A summary is generated using a two stage framework that first extracts a set of important tweets from the whole set of information through an Integer-linear programming (ILP) based optimization technique and then follows a word graph and concept event based abstractive summarization technique to produce the final summary. High accuracies obtained for all the tasks show the effectiveness of the proposed framework. | cs.SI | cs |
Summarizing Situational and Topical Information
During Crises
Koustav Rudra
IIT Kharagpur, India
[email protected]
Pawan Goyal
IIT Kharagpur, India
[email protected]
Siddhartha Banerjee
The Pennsylvania State
University, USA
[email protected]
Niloy Ganguly
IIT Kharagpur, India
[email protected]
Muhammad Imran
Qatar Computing Research
Institute, HBKU, Doha, Qatar
[email protected]
Prasenjit Mitra
The Pennsylvania State
University, USA∗
[email protected]
ABSTRACT
The use of microblogging platforms such as Twitter during crises
has become widespread. More importantly, information dissemi-
nated by affected people contains useful information like reports
of missing and found people, requests for urgent needs etc. For
rapid crisis response, humanitarian organizations look for situa-
tional awareness information to understand and assess the sever-
ity of the crisis. In this paper, we present a novel framework (i)
to generate abstractive summaries useful for situational awareness,
and (ii) to capture sub-topics and present a short informative sum-
mary for each of these topics. A summary is generated using a two
stage framework that first extracts a set of important tweets from the
whole set of information through an Integer-linear programming
(ILP) based optimization technique and then follows a word graph
and concept event based abstractive summarization technique to
produce the final summary. High accuracies obtained for all the
tasks show the effectiveness of the proposed framework.
CCS Concepts
•Information systems → Information retrieval diversity; Infor-
mation extraction; Clustering and classification; Summariza-
tion; Web and social media search;
Keywords: Disaster events; Twitter; situational information; clas-
sification; summarization; topic search.
1.
INTRODUCTION
Microblogging platforms such as Twitter provide rapid access to
situation-sensitive information that people post during mass con-
vergence events such as natural disasters. Rapid crisis response
can be aided by processing these tweets [22] in real-time. Different
stake-holders (e.g. different humanitarian organizations) have dif-
ferent informational needs. For example, to better understand the
severity and status of an event, most of these organizations rely on
situational awareness information. Some others look for informa-
tion on a specific concern like reports of damage to key infrastruc-
ture in the area such as airports, bridges, buildings, communication
infrastructure, etc.
Typically, the first step in extracting situational awareness in-
formation from these tweets involves classifying them into differ-
ent informational categories such as infrastructure damage, shelter
∗This work was done when the author was at Qatar Computing
Research Institute, HBKU, Doha, Qatar.
needs or offers, relief supplies, etc. For instance, one such applica-
tion, AIDR [9], classifies Twitter messages into different categories
in real time. However, even after the automatic classification step,
each category still contains thousands of messages many of which
are important. Additional in-depth analysis is required to create a
coherent situational awareness summary for disaster managers to
understand the situation, which can be rapidly changing.
In this paper, we seek to extract important topical information
from microblogging platforms and generate summaries for the iden-
tified topics. For example, within the tweets categorized as infras-
tructure damage related, the reader can examine the status of air-
ports, buildings, bridges, etc. provided this information has been
reported. Drilling down into sub-topics and examine the set of
tweets from which the information was extracted, we must group
tweets dealing with similar information into sets. These sets should
be labeled with a concept name.
Summarizing Messages in Disaster-related Categories: Sum-
marizing tweets is significantly more challenging than summariz-
ing news articles. The difficulty arises because tweets are often
written in informal and non-standard language as opposed to the
formal language used in news articles. To address the real-time
nature of our application and the need for a more readable, more
informative, and more easily understandable summary, we propose
a novel two-step summarization process that uses a fast extractive
summarization technique [5] followed by an abstractive summa-
rization step that improves the information coverage and readability
of the final summary. Rudra et al. used extractive summarization
to summarize a set of tweets [20]. For example, consider the fol-
lowing tweets collected during the Nepal earthquake in 2015:
1. Tribhuvan international airport closed after the quake
2. Airport closed after 7.9 Earthquake in Kathmandu
An abstractive summary of these tweets would be as follows:
Tribhuvan international airport closed
after 7.9 earthquake in Kathmandu. Note that the lat-
ter is more compact freeing up words that can be used for additional
information coverage.
Information coverage can be improved in a summary by includ-
ing as many content words as possible. For example, Rudra et al.
have showed that maximizing the coverage of content words pro-
duces effective summaries of disasters [20]. However, we observed
that many such content words are semantically similar and cap-
turing one of those in final summary will suffice to provide ade-
quate information coverage. Hence, in this work, we collate similar
nouns and verbs to develop concept and event clusters. We propose
a word-graph based abstractive summarization technique that com-
bines information from semantically similar tweets (extracted in
first step) and applies an ILP-based1 content word (numeral, loca-
tion, concept, event) coverage method to generate the summary.
Although abstractive summarization [16] produces more com-
pact and informative sentences, the algorithms in general are time-
consuming. Hence, if the abstractive approach is run over the entire
incoming set of tweets, it may not be possible to produce the results
in real-time (which is one of the important requirements during dis-
asters). In order to circumvent this problem, first we extract a set
of important tweets from the whole set using a fast but effective
extractive summarization approach. In the second step, we use ab-
stractive summarization to choose and rewrite the most important
tweets among them, remove redundancy and improve the readabil-
ity of the tweets.
Identification and Summarization of Micro-topics: To provide
information about events at a finer granularity such as when an air-
port has been shut, or re-opened, school suspended, communication
cut or restored etc. that happen during a crisis situation, our method
first identifies micro-topics (i.e., small-scale events) and then gener-
ates summaries for each of these micro-topics at a finer granularity
level.
In this work, we use the Nepal earthquake dataset [15] compris-
ing of several million tweets collected and initially classified by the
AIDR platform [9]. Our contribution lies in the two-step extractive-
abstractive summarization approach (Section 4) that is efficient and
yet generates better summaries with respect to information cover-
age, diversity, coherence, and readability. Experimental results in
Section 5 also confirm that our extracted topics and summaries re-
lated to those topics outperform traditional LDA based methodolo-
gies. Finally, we conclude our paper in Section 6.
2. RELATED WORK
Real-time information posted by affected people on Twitter helps
improve disaster relief operations [3, 8]. However, relief organiza-
tions can plan more effectively if they have access to crucial infor-
mation from the tweets [12].
Kedzie et al. [11] proposed an extractive summarization method
to summarize disaster event-specific information from news arti-
cles. In contrast, several researchers have attempted to utilize infor-
mation from Twitter to retrieve important situational updates from
millions of posts on disaster-specific events [21]. More recently,
sophisticated methods for automatically generating summaries by
extracting the most important tweets on the event [20] have been
proposed. To generate summaries in real-time, a few approaches
for online summarization of tweet streams have recently been pro-
posed [20].
The methods mentioned above generate extractive summaries
that are merely a collection of tweets. Ideally, we prefer an abstrac-
tive summary composed of important content from tweets instead
of the whole tweets. Such a summary should also be more readable
than a collection of tweets. Furthermore, the summaries should not
contain redundant information. To this end, Olariu [16] proposed
a bigram word-graph-based summarization technique, which is ca-
pable of handling online streams of tweets in real-time and also
generates abstractive summaries. Each bigram represents a node
in the graph and new words are added in real-time from incom-
1Henceforth we represent integer linear programming approach as
ILP-based approach
ing new tweets. However, the method does not consider POS-tag
information of nodes and thus can spuriously fuse tweets having
the same bigram but are otherwise unrelated. Furthermore, it is a
general method that does not consider the typicality of disaster re-
lated tweets, for example earlier Rudra et al [20] showed that during
disasters content words (nouns, verbs, numerals) vary quite slowly
compared to any other general events like sports, movies etc. In our
proposed abstractive summarization framework, we have incorpo-
rated such domain dependent features to make the summary more
coherent, informative, and useful. Banerjee, Mitra, and Sugiyama
proposed a graph-based abstractive summarization method on news
articles [2]. Several new sentences are generated using a graph
where words are nodes, edges are added between two consecutive
words present in a sentence and an optimization problem is formu-
lated that selects the best sentences from the new sentences to opti-
mize the overall quality of the summary. The optimization problem
ensures that redundant information is not conveyed in the final gen-
erated summary. However, the graph construction and path genera-
tion is computationally expensive and cannot be used in real-time.
We combine the positive aspects of the above studies - (a) we
employ extractive summarization to reduce the number of tweets,
and on the reduced set run an algorithm adapated from the tech-
nique proposed by Banerjee et al. [2] for tweet fusion (b) we use
POS tags along with the words in each bigram to avoid spurious
tweet fusions and (c) we employ disaster-specific content words to
determine the importance of a disaster-related tweet [20]. Further,
we also focus on template-based topic extraction and summarizing
information over those topics.
3. DATASET AND CLASSIFICATION OF MES-
SAGES
We use the Nepal Earthquake 2015 Twitter data from CrisisNLP [10].
The dataset consists of 27 million messages from April 25th to
April 27th obtained using different keywords (e.g. Nepal Earth-
quake, NepalQuake, NepalQuakeRelief, NepalEarthquake, Kath-
manduQuake, QuakeNepal, EarthquakeNepal, · · · , etc.).
In this work, we selected AIDR [9] classified messages from
three categories for which the machine confidence was ≥ 0.80. The
selected classes and messages in each of the three classes are as fol-
lows:
1. Missing, trapped, or found people: 10,751 2. Infrastruc-
ture and utilities: 16,842 3. Shelter and supplies: 19,006 mes-
sages.
4. AUTOMATIC SUMMARIZATION
Given the machine-categorized messages by AIDR, in this section
we present our two step automatic summarization approach to gen-
erate summaries from each class. We consider the following key
characteristics/objectives while developing an automatic summa-
rization approach:
1. A summary should be able to capture most situational updates
from the underlying data. That is, the summary should be rich
in terms of information coverage.
2. As most of the messages on Twitter contain duplicate informa-
tion, we aim to produce summaries with less redundancy while
keeping important updates of a story.
3. Twitter messages are often noisy, informal, and full of grammat-
ical mistakes. We aim to produce more readable summaries as
compared to the raw tweets.
4. The system should be able to generate the summary in real-time,
i.e., the system should not be heavily overloaded with computa-
tions such that by the time the summary is produced, the utility
of that information is marginal.
The first three objectives can be achieved through abstractive
summarization and near-duplicate detection, however, it is very dif-
ficult to achieve that in real-time (hence violating the fourth con-
straint). In order to fulfill these objectives, we follow an extractive-
abstractive framework to generate summaries. We define our over-
all summarization framework as CONcept based ABstractive Sum-
marization (CONABS). In the first phase (extractive phase), we use
the approach proposed by Rudra et al. [20] and select a subset of
tweets that cover most of the information produced and then run
abstractive summarization over that. We generate the paths using
the extractive-abstractive framework proposed by Rudra et al [19].
Our goal is to select the best paths from these generated tweet paths
with the objective of generating a readable and informative sum-
mary. To this end, we formulate an ILP based technique that selects
final paths and generates the summary.
Concept and event extraction: Given that AIDR classified mes-
sages into the categories mentioned above, we extract important
concepts and events associated with them. For example, the 'infras-
tructure' class contains information about building collapse, tem-
ples and whether the airport is open or closed. We observed that
such micro-level information mainly consists of two core nuggets,
a noun part which we call as a concept (e.g., airport) and a verb part,
which we call as an event (e.g., closed). In our summarization pro-
cess, we capture information about these concepts by using nouns,
because concepts are in general denoted by the nouns [14]. For
this purpose, (i) extract all the nouns from the dataset, (ii) develop
a complete undirected weighted graph where nouns are nodes and
weight of the edge between two nouns is their semantic similarity
score (we have used lin similarity measure), and (iii) run affinity
clustering method to cluster semantically similar nouns (e.g., air-
port, flight). Each of the identified clusters represents a particular
concept.
Ritter et al [18] proposed a method to extract events from tweets but
this method takes significant amount of time to tag large stream of
tweets. This creates a bottleneck in real-time summarization pro-
cess. Hence, we cannot use their method directly in our proposed
summarization approach. We observed that main verbs generally
represent such events like 'collapsed', 'killed', 'injured', 'blocked'.
We construct a complete undirected weighted graph by taking the
verbs and apply clustering technique over the graph (similar to con-
cept extraction). Each cluster of verbs represents one event. For ex-
ample, verbs like 'injured', 'wounded' are clubbed into one cluster
and represent one event.
ILP Formulation
For abstractive summarization phase, we redefine the content words.
Content words consist of numerals, places (this is similar to that
adopted during the extractive phase), concepts, and events. The
ILP-based technique optimizes based upon three factors - (i) Pres-
ence of content words: The formulation tries to maximize the num-
ber of these parameters in the final summary which in turn takes
care of diversity by reducing the probability of choosing the same
content word multiple times. (ii) Informativeness of a path, i.e.,
finding importance of a path based on centroid-based ranking [17],
and (iii) Linguistic Quality Score that captures the readability of a
path using a trigram confidence score [7].
Table 1: Notations used in the summarization technique
Notation
L
n
m
i
j
xi
yj
Length(i)
I(i)
LQ(i)
Tj
Ci
Meaning
Desired summary length (number of words)
Number of tweet-paths considered for summariza-
tion (in the time window specified by user)
Number of distinct content words included in the
n tweet-paths
index for tweet-paths
index for content words
indicator variable for tweet-path i (1 if tweet-path
i should be included in summary, 0 otherwise)
indicator variable for content word j
number of words present in tweet-path i
Informativeness score of the tweet-path i
Linguistic quality score of a tweet-path
set of tweet-paths where content word j is present
set of content words present in tweet-path i
The summarization of L words is achieved by optimizing the fol-
lowing ILP objective function, whereby the highest scoring tweet-
paths are returned as output of summarization, The equations are
as follow:
max(
n
X
LQ(i).I(i).xi +
i=1
subject to the constraints
m
X
j=1
yj)
n
X
i=1
xi · Length(i) ≤ L
xi ≥ yj, j = [1 · · · m]
X
i∈Tj
yj ≥ Ci × xi, i = [1 · · · n]
X
j∈Ci
(1)
(2)
(3)
(4)
where the symbols are as explained in Table 1. The objective func-
tion considers both the number of tweet-paths included in the sum-
mary (through the xi variables) as well as the number of important
content-words (through the yj variables) included. The constraint
in Eqn. 2 ensures that the total number of words contained in the
tweet-paths that get included in the summary is at most the desired
length L (user-specified) while the constraint in Eqn. 3 ensures that
if the content word j is selected to be included in the summary, i.e.,
if yj = 1, then at least one tweet-path in which this content word is
present is selected. Similarly, the constraint in Eqn. 4 ensures that
if a particular tweet-path is selected to be included in the summary,
then the content words in that tweet-path are also selected.
We use the GUROBI Optimizer [6] to solve the ILP. After solv-
ing this ILP, the set of tweet-paths i such that xi = 1, represent the
summary at the current time.
4.1 Experimental Setup and Results
In this section, we compare the performance of our proposed
framework with state-of-the-art abstractive and disaster-specific sum-
marization techniques. Given the AIDR classified messages from
three classes, we perform date-wise split starting from 25th April
to 27th April.
Baseline approaches: We use three state-of-the-art summariza-
tion approaches described below:
1. COWTS: an extractive summarization approach specifically de-
signed for generating summaries from disaster-related tweets [20].
)
l
l
a
c
e
r
1
−
E
G
U
O
R
(
e
r
o
c
s
t
n
e
m
e
v
o
r
p
m
I
60
50
40
30
20
10
0
COWTS
APSAL
TOWGS
Infrastructure
Missing
Shelter
Classwise distribution
Figure 1: Improvement in ROUGE-1 recall score (averaging over three
days) by CONABS over baseline methods (COWTS, APSAL, TOWGS)
2. APSAL: an affinity clustering based summarization technique
proposed by Kedzie et al. [11].
It mainly considers news ar-
ticles and focuses on human-generated information nuggets to
assign salience score to those news articles while generating
summaries.
3. TOWGS: an online abstractive summarization approach pro-
posed by Olariu [16].
It is designed for informal texts like
tweets. They consider bigrams as nodes and build word graph
using these nodes. To generate a summary, they start from most
frequent bigrams to explore different paths.
In our case, we
modified it to generate event-specific summaries as it was orig-
inally not proposed to do so.
Evaluation using expert generated data We took summaries gen-
erated by experts from the disaster management domain. During
Nepal earthquake, UN OCHA (United Nations Office for the Co-
ordination of Humanitarian Affairs) among other humanitarian or-
ganizations used AIDR's output (i.e., machine classified messages)
for their disaster response efforts. In this case, the experts were
given the machine classified messages that they analyzed to gener-
ate a situational awareness report for each informational category.
We consider these reports as our gold standard summaries.
Figure 1 shows the improvement by our method over baseline
techniques in terms of ROUGE-1 recall score which basically in-
dicates in percentage the amount of more (important) information
covered in the generated summaries. We can see that CONABS
performs significantly better compared to other three baselines -
the improvement ranges from 10% to 40%.
Evaluation using crowdsourcing: We perform crowdsourced eval-
uation using the CrowdFlower 2 crowdsourcing platform. We take
summaries generated from each class using our proposed method
and all three baselines for each day-in total we use 9 summaries.
A crowdsourcing task, in this case, consists of four summaries (i.e.,
one proposed and three from baseline methods) and the four crite-
ria with their description (as described below) along with a scale
from 1 (very bad) to 5 (very good) for each criterion. For each task,
we asked five different annotators to read each summary carefully
and provide scores for each criterion. The exact description of the
crowdsourcing task is as follows:
"The purpose of this task is to evaluate machine-generate sum-
maries using tweets collected during the Nepal Earthquake hap-
pened in 2015. Each task given below has 4 summaries of length
200 words generated by 4 different algorithms on the same set
of tweets (thousands in this case) belonging to a particular topic.
Given the summaries and their topic, we are interested in compar-
ing them based on the following criteria: Information coverage,
Diversity and Readability".
2http://www.crowdflower.com/
The definitions of various criteria we used in the task and discus-
sion of the results are as follows:
Information coverage corresponds to the richness of information
a summary contains. For instance, a summary with more informa-
tive sentences (i.e., crisis-related information) is considered better
in terms of information coverage. Our proposed method is able
to capture very good situational information/updates in case of In-
frastructure and Missing classes for both of the days chosen while
it performs fairly in the shelter class. In 4 cases, it performs bet-
ter than the three competing techniques, and it performs equally
well with COWTS, TOWGS, and APSAL in 3, 1, 1 cases respec-
tively. Figure 2 shows the detailed ratings of users for 25th and
26th April 3.
)
e
g
a
r
e
v
o
c
n
o
i
t
a
m
r
o
f
n
I
(
e
r
o
c
s
r
e
s
U
6
5
4
3
2
1
0
CONABS
TOWGS
COWTS
APSAL
Infrastructure
Missing
Shelter
Classwise distribution(25th April)
(a) 25th (info. coverage)
)
e
g
a
r
e
v
o
c
n
o
i
t
a
m
r
o
f
n
I
(
e
r
o
c
s
r
e
s
U
6
5
4
3
2
1
0
CONABS
TOWGS
COWTS
APSAL
Infrastructure
Missing
Shelter
Classwise distribution(26th April)
(b) 26th (info. coverage)
Figure 2: Results of the crowdsourcing based evaluation based on the
information coverage
Diversity corresponds to the novelty of sentences in a summary.
A good summary should contain diverse informative sentences.
While we do not apply any direct parameter in our ILP framework
to control diversity, in our abstractive ILP method, we not only
rely on the importance score of paths but also coverage of different
content words, which helps in capturing information from various
dimensions. This is also quite clear from Figure 3. In seven out of
nine cases, CONABS generated summaries that are comparable to
other baseline techniques.
i
)
y
t
i
s
r
e
v
D
(
e
r
o
c
s
r
e
s
U
6
5
4
3
2
1
0
CONABS
TOWGS
COWTS
APSAL
Infrastructure
Missing
Shelter
Classwise distribution(25th April)
(a) 25th (info. diversity)
i
)
y
t
i
s
r
e
v
D
(
e
r
o
c
s
r
e
s
U
6
5
4
3
2
1
0
CONABS
TOWGS
COWTS
APSAL
Infrastructure
Missing
Shelter
Classwise distribution(26th April)
(b) 26th (info. diversity)
Figure 3: Results of the crowdsourcing based evaluation based on the
information diversity
Readability measures how easy it is to read the summary. A good
summary should be easily readable, well formed, coherent, and
have fewer grammatical errors. We used a linguistic quality score in
our final ILP framework to generate coherent summaries. Our sys-
tem chooses paths with higher linguistic scores. Summaries gen-
erated by CONABS were rated to be equal or better than the other
baselines in 8 (of nine) cases. Figure 4 shows that our summaries'
lowest readability score was 3. Its performance is particularly good
on 26th April where it is marked 4 (good) for all cases.
CONABS performs as well or better than other baseline tech-
niques in most of the cases.
Table 2 shows summaries generated by CONABS and COWTS
(both disaster-specific methodologies) from the same set of mes-
3We only keep two dates to maintain clarity and brevity
Table 2: Summary of length 50 words(excluding #,@,RT,URLs), generated from the situational tweets of the infrastructure class (26th April) by
(i) CONABS (proposed methodology), (ii) COWTS.
Summary by CONABS
Times of india live blog earthquake in katmandu , 25 04 2015. Chairs
follow-up meeting to review situation following earthquake in decades.
5 commercial flights have landed in kathmandu was painted in 1850
ad. Iaf's c-130j aircraft carrying 55 passengers , including four infants
, lands at delhi's palam airport. Nepal quake photos show historic
buildings reduced to rubble as survivor search continues.
Summary by COWTS
#PM chairs follow-up meeting to review situation following #earth-
quake in #Nepal @PMOlndia #nepalquake. @SushmaSwaraj @MEA-
controlroom Plz open help desk at kathmandu airport. @Suvasit
thanks for airport update. #NepalQuake. Pakistan Army Rescue Team
comprising doctors, engineers & rescue workers shortly after arrival
at #Kathmandu Airport http://t.co/6Cf8bgeort. RT @cnnbrk: Nepal
quake photos show historic buildings reduced to rubble as survivor
search continues. http://t.co/idVakR2QOT http://t.co/Z.
)
y
t
i
l
i
b
a
d
a
e
R
(
e
r
o
c
s
r
e
s
U
6
5
4
3
2
1
0
CONABS
TOWGS
COWTS
APSAL
Infrastructure
Missing
Shelter
Classwise distribution(25th April)
(a) 25th (readability)
)
y
t
i
l
i
b
a
d
a
e
R
(
e
r
o
c
s
r
e
s
U
6
5
4
3
2
1
0
CONABS
TOWGS
COWTS
APSAL
Infrastructure
Missing
Shelter
Classwise distribution(26th April)
(b) 26th (readability)
Figure 4: Results of the crowdsourcing based evaluation based on the
readability
sages (i.e tweets form infrastructure class posted on 26th April).
The two summaries are quite distinct. We find that summary re-
turned by COWABS is more informative and diverse in nature com-
pared to COWTS. For instance, we can see the COWABS summary
contains information about flights, damages of buildings, and infor-
mation sources.
In this approach, we have measured semantic LIN similarity based
on wordnet for nouns and verbs. However, we observe that in case
of verbs this similarity metric does not perform well. As a result,
some unrelated verbs may be clustered and some important infor-
mation may be missed in final summary. In future, we try to use
better semantic similarity measures to resolve this problem.
Time taken for summarization: As stated earlier, one of our pri-
mary objectives is to generate the summaries in real time. Hence,
we analyze the execution times of the various techniques. For
infrastructure, missing, and shelter classes, our proposed method
CONABS takes 25.947, 17.915, and 26.663 seconds on average
(over three days) respectively, to generate the summaries. The time
taken by CONABS is comparable with other real time summariza-
tion methods like COWTS, and TOWGS. However, APSAL re-
quires more time due to large nonnegative matrix factorization and
computation of large similarity matrices.
5.
IDENTIFICATION OF SUB-TOPICS AND
SUMMARIZATION
Following a major crisis, a number of small-scale sub-events
such as 'power outage', 'bridge closure' etc. happen. Normal
LDA based topic detection techniques do not capture micro-level
sub-events. Moreover, according to UN OCHA, such LDA topics
are too general to act upon [22]. In this section, we capture sub-
events/topics from messages classified in a particular category (e.g.
infrastructure damage). We define a sub-topic as a combination
of a noun and a verb where noun represents a concept and verb
represents an event (as described in the previous section). How-
ever, in this section we seek dependency relations between nouns
and verbs, which is important to declare some information as an
event/topic. Table 3 provides examples of some sub-topic phrases
from various AIDR classes. These sub-topics show important yet
very specific events after the major earthquake crisis. For example,
these include 'shut down of airports', 'resume of flight operation',
emergency declared etc.
Most of the existing topic detection methodologies represent top-
ics as a bag of words. In our case we try to capture the semantics
between nouns and events using dependency relationships. For in-
stance, in Table 3, 'flight' is related to 'shut', and 'road' is related
to 'crack'. To the best of our knowledge, no prior work on process-
ing tweet streams during disasters has attempted to combine nouns
and events to generate such micro-level topic phrases.
Table 3: Popular topic phrases posted on the first day of the Nepal
earthquake (Apr 25, 2015)
Class
Infrastructure
Injured
Missing
Shelter
Topic phrases
'service affect', 'shut flight', 'crack road', 'wa-
ter report', 'topple tower'
'casualty grow', 'victim treat', 'hospital ac-
commodate', 'man trap', 'casualty injure'
'family stuck', 'tourist strand', 'rescue loca-
tion', 'database track', 'contact number'
'field clean', 'water equip', 'emergency de-
clare', 'deploy transport', 'deploy aircraft'
Assigning nouns to events: In the sub-topic extraction methodol-
ogy, we have found that it is often non-trivial to associate nouns to
the context of an event in a tweet. For example, the words 'says'
and 'toppled' in the sentence '#China media says buildings toppled
in #Tibet http://t.co/O7VSYWTGsk' were identified as events [18].
The noun 'building' is related to the term 'toppled' but it is not re-
lated to the verb 'says'. Hence, ('building','toppled') forms a valid
topic phrase whereas ('building','says') is not a topic phrase. It is
observed that sometimes such nouns may not always appear prior
or adjacent to the events in a tweet. For example, in 'India sent
4 Ton relief material, Team of doctors to Nepal', ('relief','sent')
forms a valid topic phrase but the noun 'relief' appears after the
event 'sent'.
If a noun is directly associated/connected with an event (edge ex-
ists between noun and event in dependency tree), we associate that
noun with the event. We use POS tagger [4], event detector [18],
and dependency parser [13] for tweets to extract the association
information.
Ranking topic phrases:
In this part, we rank the identified topic
phrases. We only keep those topic phrases for which its constituent
noun and event occur more than a certain threshold value - in
this case we set it as 10. Next, we compute Szymkiewicz-Simpson
overlap score between noun (N) and event (E) as follows:
• (Q3) Which method shows less redundant topics (M1 or M2);
Overlap(N, E) =
X ∩ Y
min(X, Y )
(5)
• (Q4) Which method generates more semantically meaningful topic
(M1 or M2);
where X indicates the set of tweets containing N and Y indicates
the set of tweets containing E. Finally, we rank the topic phrases
based on the similarity scores computed as per Equation 5.
Summarizing topic phrases: After identifying topic phrases, we
try to summarize the tweets corresponding to each of these topic
phrases. Basically, we search the words present in topic phrases
and retrieve those tweets that match. Finally, content words (nouns,
numerals, verbs) based extractive summarization [20] technique is
applied over the retrieved tweets to generate a summary for each of
the identified topics. Table 4 provides examples of identified topic
phrases and their summaries.
Table 4: Popular topic phrases and its summary for topics posted on
first day of Nepal Earthquake (25th April)
Topic phrase
Topic Summary
communication cut @AlwaysActions:
flight cancel
China's
#Tibet
severely affected by #NepalEarthquake;
houses collapsed, communications cut
off #Nepal
Flights to Kathmandu hit: Flight ser-
vices to Kathmandu were today can-
celled or put on ho; Kathmandu air-
port closed Saturday after a strong earth-
quake struck the country. All flights
canceled.
The micro-level topics and summaries can be useful for vari-
ous stakeholders in a disaster scenario. For instance, Communi-
cation cut can help government to plan, airline held, flight cancel
can facilitate stranded foreigners to make proper departure plan-
ning while medicine send may enable the relief agency to connect
supply to demand center.
Evaluating topic phrases: To measure the accuracy of our pro-
posed method for topic phrases identification, we check what frac-
tion of nouns are correctly associated with the corresponding events.
For this purpose, we compared the accuracy of our algorithm with
a simple baseline algorithm in which nouns occurring within a win-
dow of 3 words on either side of the event were selected as being
related to the event. Averaging over all the different classes (infras-
tructure, missing, shelter), the baseline algorithm obtains precision
of 0.72, whereas our method obtains precision of 0.95.
Next, we evaluate the importance and utility of our identified
topics. For this purpose, we performed user studies. For each day,
we extract top ten topics based on our proposed methodology for
each of the three classes. In a similar way, we identified ten top-
ics using the LDA based topic summarization approach proposed
by Arora et al [1]. Each topic is represented by two words hav-
ing the highest probability of belonging to that topic. We use a
crowdsource based evaluation methodology to judge the utility of
our topic based summarization approach over the LDA based tech-
nique. We asked five question to the workers on crowdflower as
follows:
• (Q1) Relevance of the generated topics to the high-level cate-
gory. (on a scale: from 1 (not related at all) to 5 (highly related));
• (Q2) Which method provides more situational awareness (M1 or
M2);
• (Q5) Usefulness of topic keywords for situational awareness (scale:1-
5).
By showing the top ten topics from both methods, we asked 15
different workers to answer each question.
e
r
o
c
s
e
c
n
a
v
e
e
R
l
4
3.5
3
2.5
2
1.5
1
0.5
0
PRO
LDA
Infrastructure
Missing
Shelter
Classwise distribution(25th April)
e
r
o
c
s
s
s
e
n
e
r
a
w
a
l
a
n
o
i
t
a
u
t
i
S
4
3.5
3
2.5
2
1.5
1
0.5
0
PRO
LDA
Infrastructure
Missing
Shelter
Classwise distribution(25th April)
(a) Relevance
(b) Situational awareness
Figure 5: Results of the crowdsourcing based evaluation based on the
relevance and situational awareness (25th April)
With reference to the relevance to the high-level topics (i.e., Q1)
and usefulness of topic keywords (i.e., Q5), out of nine cases, our
method performs better than the baseline in six cases and in rest of
the three cases it is on par with the baseline. Figure 5 shows de-
tailed ranking of users for 25th April for Q1 and Q2. For questions
2, 3, 4, and 5, our method performs better than the baseline in six
cases which demonstrates utility of our proposed topic detection
scheme during crisis scenario.
6. CONCLUSION
A large number of tweets are posted during disaster events. For
better situational awareness, a concise, categorical as well as multi-
faceted representation of the tweets is necessary. We presented a
novel framework to summarize information in crisis-related tweets
in two different forms: (a) general situation update summary and
(b) specific flash point activity reports thus producing pointed in-
formation about a place and/or an event. To present such a diverse
yet coherent picture, a deep understanding of the tweets posted dur-
ing such scenario is necessary - we believe the series of innovations
that have been undertaken in this work has been an outcome of thor-
ough analysis of such tweets. We also have performed extensive
evaluation using experts to determine the useful of our approach.
In future, we will deploy the system so that it can be of help for any
future disaster event.
Acknowledgement
K. Rudra was supported by a fellowship from Tata Consultancy
Services.
7. REFERENCES
[1] R. Arora and B. Ravindran. Latent dirichlet allocation based
multi-document summarization. In Proc. AND, pages 91–97.
ACM, 2008.
[2] S. Banerjee, P. Mitra, and K. Sugiyama. Multi-document
abstractive summarization using ilp based multi-sentence
compression. In Proc. IJCAI, 2015.
[3] H. Gao, G. Barbier, and R. Goolsby. Harnessing the
crowdsourcing power of social media for disaster relief.
Intelligent Systems, IEEE, 26(3):10–14, 2011.
[4] K. Gimpel, N. Schneider, B. O'Connor, D. Das, D. Mills,
J. Eisenstein, M. Heilman, D. Yogatama, J. Flanigan, and
N. Smith, A. Part-of-speech tagging for twitter: Annotation,
features, and experiments. In Proc. ACL, 2011.
[5] V. Gupta and G. S. Lehal. A survey of text summarization
extractive techniques. Journal of Emerging Technologies in
Web Intelligence, 2(3):258–268, 2010.
[6] Gurobi – The overall fastest and best supported solver
available, 2015. http://www.gurobi.com/.
[13] L. Kong, N. Schneider, S. Swayamdipta, A. Bhatia, C. Dyer,
and N. A. Smith. A Dependency Parser for Tweets. In Proc.
EMNLP, 2014.
[14] L. Li and T. Li. An empirical study of ontology-based
multi-document summarization in disaster management.
Systems, Man, and Cybernetics: Systems, IEEE Transactions
on, 44(2):162–171, 2014.
[15] 2015 Nepal earthquake – Wikipedia, April 2015.
http://en.wikipedia.org/wiki/2015_Nepal_earthquake.
[7] K. Heafield. Kenlm: Faster and smaller language model
[16] A. Olariu. Efficient online summarization of microblogging
queries. In Proceedings of the Sixth Workshop on Statistical
Machine Translation, pages 187–197. Association for
Computational Linguistics, 2011.
[8] M. Imran, C. Castillo, F. Diaz, and S. Vieweg. Processing
social media messages in mass emergency: a survey. ACM
Computing Surveys (CSUR), 47(4):67, 2015.
[9] M. Imran, C. Castillo, J. Lucas, P. Meier, and S. Vieweg.
AIDR: Artificial intelligence for disaster response. In
Proceedings of the companion publication of the 23rd
international conference on World wide web companion,
pages 159–162, 2014.
[10] M. Imran, P. Mitra, and C. Castillo. Twitter as a lifeline:
Human-annotated twitter corpora for nlp of crisis-related
messages. In Proceedings of the Tenth International
Conference on Language Resources and Evaluation (LREC
2016), may 2016.
[11] C. Kedzie, K. McKeown, and F. Diaz. Predicting salient
updates for disaster summarization. In Proc. ACL, pages
1608–1617, Beijing, China, July 2015.
[12] B. Klein, X. Laiseca, D. Casado-Mansilla, D. López-de
Ipiña, and A. P. Nespral. Detection and extracting of
emergency knowledge from twitter streams. In Ubiquitous
Computing and Ambient Intelligence, pages 462–469.
Springer, 2012.
streams. In Proc. EACL, pages 236–240, 2014.
[17] D. R. Radev, H. Jing, M. Sty´s, and D. Tam. Centroid-based
summarization of multiple documents. Information
Processing & Management, 40(6):919–938, 2004.
[18] A. Ritter, Mausam, O. Etzioni, and S. Clark. Open domain
event extraction from twitter. In KDD, 2012.
[19] K. Rudra, S. Banerjee, N. Ganguly, P. Goyal, M. Imran, and
P. Mitra. Summarizing situational tweets in crisis scenario. In
Proceedings of the 27th ACM Conference on Hypertext and
Social Media, pages 137–147. ACM, 2016.
[20] K. Rudra, S. Ghosh, N. Ganguly, P. Goyal, and S. Ghosh.
Extracting situational information from microblogs during
disaster events: a classification-summarization approach. In
Proc. CIKM, 2015.
[21] S. Verma, S. Vieweg, W. J. Corvey, L. Palen, J. H. Martin,
M. Palmer, A. Schram, and K. M. Anderson. Natural
Language Processing to the Rescue? Extracting "Situational
Awareness" Tweets During Mass Emergency. In Proc. AAAI
ICWSM, 2011.
[22] S. Vieweg, C. Castillo, and M. Imran. Integrating social
media communications into the rapid assessment of sudden
onset disasters. In Social Informatics, pages 444–461.
Springer, 2014.
|
1507.01272 | 1 | 1507 | 2015-07-05T20:53:26 | VEWS: A Wikipedia Vandal Early Warning System | [
"cs.SI",
"physics.soc-ph"
] | We study the problem of detecting vandals on Wikipedia before any human or known vandalism detection system reports flagging potential vandals so that such users can be presented early to Wikipedia administrators. We leverage multiple classical ML approaches, but develop 3 novel sets of features. Our Wikipedia Vandal Behavior (WVB) approach uses a novel set of user editing patterns as features to classify some users as vandals. Our Wikipedia Transition Probability Matrix (WTPM) approach uses a set of features derived from a transition probability matrix and then reduces it via a neural net auto-encoder to classify some users as vandals. The VEWS approach merges the previous two approaches. Without using any information (e.g. reverts) provided by other users, these algorithms each have over 85% classification accuracy. Moreover, when temporal recency is considered, accuracy goes to almost 90%. We carry out detailed experiments on a new data set we have created consisting of about 33K Wikipedia users (including both a black list and a white list of editors) and containing 770K edits. We describe specific behaviors that distinguish between vandals and non-vandals. We show that VEWS beats ClueBot NG and STiki, the best known algorithms today for vandalism detection. Moreover, VEWS detects far more vandals than ClueBot NG and on average, detects them 2.39 edits before ClueBot NG when both detect the vandal. However, we show that the combination of VEWS and ClueBot NG can give a fully automated vandal early warning system with even higher accuracy. | cs.SI | cs | VEWS: A Wikipedia Vandal Early Warning System
Srijan Kumar
Computer Science Dep.
University of Maryland
UMIACS
University of Maryland
Francesca Spezzano
V.S. Subrahmanian
Computer Science Dep.
University of Maryland
College Park, 20742 MD, USA
[email protected]
College Park, 20742 MD, USA
[email protected]
College Park, 20742 MD, USA
[email protected]
5
1
0
2
l
u
J
5
]
I
S
.
s
c
[
1
v
2
7
2
1
0
.
7
0
5
1
:
v
i
X
r
a
ABSTRACT
We study the problem of detecting vandals on Wikipedia
before any human or known vandalism detection system re-
ports flagging potential vandals so that such users can be
presented early to Wikipedia administrators. We leverage
multiple classical ML approaches, but develop 3 novel sets of
features. Our Wikipedia Vandal Behavior (WVB) approach
uses a novel set of user editing patterns as features to classify
some users as vandals. Our Wikipedia Transition Probabil-
ity Matrix (WTPM) approach uses a set of features derived
from a transition probability matrix and then reduces it via
a neural net auto-encoder to classify some users as vandals.
The VEWS approach merges the previous two approaches.
Without using any information (e.g. reverts) provided by
other users, these algorithms each have over 85% classifica-
tion accuracy. Moreover, when temporal recency is consid-
ered, accuracy goes to almost 90%. We carry out detailed
experiments on a new data set we have created consisting
of about 33K Wikipedia users (including both a black list
and a white list of editors) and containing 770K edits. We
describe specific behaviors that distinguish between vandals
and non-vandals. We show that VEWS beats ClueBot NG
and STiki, the best known algorithms today for vandalism
detection. Moreover, VEWS detects far more vandals than
ClueBot NG and on average, detects them 2.39 edits before
ClueBot NG when both detect the vandal. However, we
show that the combination of VEWS and ClueBot NG can
give a fully automated vandal early warning system with
even higher accuracy.
Categories and Subject Descriptors
H.2.8 [Database applications]: Data mining
Keywords
Wikipedia, vandal detection, behavior modeling, early de-
tection
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
KDD'15, August 11-14, 2015, Sydney, NSW, Australia.
c(cid:13) 2015 ACM. ISBN 978-1-4503-3664-2/15/08 ...$15.00.
DOI: http://dx.doi.org/10.1145/2783258.2783367.
1.
INTRODUCTION
With over 4.6M articles, 34M pages, 23M users, and 134K
active users, English Wikipedia is one of the world's biggest
information sources, disseminating information on virtually
every topic on earth. Versions of Wikipedia in other lan-
guages further extend its reach. Yet, Wikipedia is compro-
mised by a relatively small number of vandals -- individuals
who carry out acts of vandalism that Wikipedia defines as
"any addition, removal, or change of content, in a deliberate
attempt to compromise the integrity of Wikipedia" [1]. Van-
dalism is not limited to Wikipedia itself, but is widespread in
most social networks. Instances of vandalism have been re-
ported in Facebook (vandalism of Martin Luther King, Jr.'s
fan page in Jan 2011), WikiMapia and OpenStreetMaps [2].
There has been considerable work on identifying vandal-
ized pages in Wikipedia. For instance, ClueBot NG [3],
STiki [4], and Snuggle [5] use heuristic rules and machine
learning algorithms to flag acts of vandalism. There is also
linguistic work on finding suspicious edits by analyzing edit
content [6, 7, 8, 9, 10]. Most of these works use linguistic
features to detect vandalism.
Our goal in this paper is the early identification of van-
dals before any human or known vandalism detection system
reports vandalism so that they can be brought to the atten-
tion of Wikipedia administrators. This goes hand-in-hand
with human reporting of vandals. But this information is
not used in any of our three algorithms.1
This paper contains five main contributions.
1. We define a novel set of "behavioral features" that
capture edit behavior of Wikipedia users.
2. We conduct a study showing the differences in behav-
ioral features for vandals vs. benign users.
3. We propose three sets of features that use no human
or known vandal detection system's reports of vandalism to
predict which users are vandals and which ones are benign.
These approaches use the behavioral features from above
and have over 85% accuracy. Moreover, when we do a clas-
sification using data from previous n months up to the cur-
rent month, we get almost 90% accuracy. We show that our
VEWS algorithm handily beats today's leaders in vandalism
detection - ClueBot NG (71.4% accuracy) and STiki (74%
1Just for completeness, Section 4.3 reports on differences between
vandals and benign users when reverts are considered. Our ex-
periments actually show that using human or known vandalism
detection system generated reversion information improves the
accuracy of our approaches by only about 2%, but as our goal is
early detection, VEWS ignores reversion information.
accuracy). Nonetheless, VEWS benefits from ClueBot NG
and STiki - combining all three gives the best predictions.
4. VEWS is very effective in early identification of van-
dals. VEWS detects far more vandals (15,203) than ClueBot
NG (12,576). On average, VEWS predicts a vandal after it
makes (on average) 2.13 edits, while ClueBot NG needs 3.78
edits. Overall, the combination of VEWS and ClueBot NG
gives a fully automated system without any human input
to detect vandals (STiki has human input, so it is not fully
automated).
5. We develop the unique UMDWikipedia data set that
consists of about 33K users, about half of whom are on a
white list, and half of whom are on a black list.
Our work is closer in spirit to [14] which studies how hu-
mans navigate through Wikipedia in search of information.
They proposed an algorithm to predict the user's intended
target page, given the click log. In contrast, we study users'
edit patterns and differentiate between users based on the
pages he/she has edited. Other studies look at users' web
navigation and surfing behavior [15, 16] and why users re-
visit certain pages [17]. By using patterns in edit histories
and egocentric network properties, [18] proposes a method to
identify the social roles played by Wikipedia users (substan-
tive experts, technical editors, vandal fighters, and social
networkers), but don't identify vandals.
2. RELATED WORK
To date, almost all work on Wikipedia vandals has focused
on the problem of identifying pages whose text has been
vandalized. The first attempt to solve this problem came
directly from the Wikipedia community with the develop-
ment of bots implementing simple heuristics and machine
learning algorithms to automatically detect page vandalism
(some examples are ClueBot NG [3] and STiki [4]).
The tools currently being used to detect vandalism on
Wikipedia are ClueBot NG and STiki. ClueBot NG is the
state-of-the-art bot being used in Wikipedia to fight vandal-
ism. It uses an artificial neural network to score edits and
reverts the worst-scoring edits. STiki [4] is another tool to
help trusted users to revert vandalism edits using edit meta-
data (editor's timestamp, user info, article and comment),
user reputation score and textual features. STiki leverages
the spatio-temporal properties of edit metadata to assign
scores to each edit, and uses human or bot reverted edits of
the user to incrementally maintain a user reputation score
[7].
In our experiments, we show that our method beats
both these tools in finding vandals.
A number of approaches such as [6, 7, 8, 9, 11] (see [12]
for a survey) use feature extraction (including some linguis-
tic features) and machine learning and validate them on the
PAN-WVC-10 corpus: a set of 32K edits annotated by hu-
mans on Amazon Mechanical Turk. [8] builds a classifier by
using the features computed by WikiTrust [13] which moni-
tors edit quality, content reputation, and content-based au-
thor reputation.2 By combining all the features (NLP, rep-
utation and metadata) from [6, 8] and STiki tool [7], it is
possible to obtain a classifier with better accuracy [9].
Past efforts differ from ours in at least one of the two re-
spects: they i) predict whether an edit is vandalism, and not
whether a user is a vandal, or ii) take into account factors
that involve human input (such as number of user's edits re-
verted). We have not used textual features at all (and there-
fore, we do not rely on algorithms/heuristics that predict
vandalism edits). However, we show that the combination of
linguistic (from ClueBot NG and STiki) and non-linguistic
features (from VEWS algorithm) gives the best classification
results. Moreover, we show that a fully automated (with-
out human input) effective vandal detection system can be
created by combining VEWS and ClueBot NG.
2WikiTrust cannot be used to detect vandals immediately, as it
requires a few edits made on the same article to judge an edit and
modify the user reputation score. WikiTrust was discontinued as
a tool to detect vandalism in 2012 due to poor accuracy and
unreliability.
3. THE UMDWIKIPEDIA DATASET
We now describe the UMDWikipedia dataset3 which cap-
tures various aspects of the edits made by both vandals and
benign users.4 The UMDWikipedia dataset consists of the
following components.
Black list DB. This consists of all 17,027 users that reg-
istered and were blocked by Wikipedia administrators for
vandalism between January 01, 2013 and July 31, 2014. We
refer to these users as vandals.
White list DB. This is a randomly selected list of 16,549
(benign) users who registered between January 01, 2013 and
July 31, 2014 and who are not in the black list.
Edit Meta-data DB. This database is constructed using
the Wikipedia API [19] and has the schema
(U ser, P age, T itle, T ime, Categories, M)
A record of the form (u, p, t, t0, C, m) says that at time
t0, user u edited the page p (which is of type m where m
is either a normal page or a meta-page5), which has title t
and has list C of Wikipedia categories attached to it.6 All
in all, we have 770,040 edits: 160,651 made by vandals and
609,389 made by benign users.
Edited article hop DB. This database specifies, for
each pair (p1, p2) of pages that a user consecutively edited,
the minimum distance in the Wikipedia hyper-link graph7
from p1 to p2. We used the code provided by [20].
Revert DB. Just for the one experiment we do at the
very end, we use the edit reversion dataset provided by
[21] which marks an edit "reverted" if it has been reverted
within next 15 edits on the page.
[22] suggests that 94%
of the reverts are detected by the method used to create
the dataset. Therefore, we use this dataset as ground truth
to know whether the edit was reverted or not. Note that
this information is not needed as a feature in our algorithm
for prediction, but to analyze the property of reversion across
vandals and benign users. Observe that Revert DB also con-
tains the information whether the reversion has been made
by ClueBot NG. We use this to compare with ClueBot NG.
STiki DB. We use the STiki API [23] to collect STiki
vandalism scores, and the raw features used to derive these
3The data set is available at http://www.cs.umd.edu/~vs/vews
4We only studied users with registered user names.
5Wikipedia pages can either be normal article pages or can be
discussion or "talk" pages where users may talk to each other
and discuss edits.
6Note that Wikipedia assigns a category to each article from a
category tree -- this therefore labels each page with the set of
categories to which it belongs.
7This is the graph whose vertices are pages and where there is an
edge from page p1 to p2 if p1 contains a hyper-link to p2.
Whether p2 is a meta-page or normal page.
Time difference between the two edits: less than 3 minutes (very fast edit), less than 15 minutes (fast edit),
more than 15 minutes (slow edit).
Whether or not p2 is the first page ever edited by the user.
Whether or not p2 is a page that has already been edited by the user before (p2 is a re-edit) and, if yes
- Whether or not p1 is equal to p2 (i.e. were two consecutive edits by the same user applied to the same page);
- Whether of not a previous edit of p2 by the user u has been reverted by any other Wikipedia user.
Otherwise, p2 is a page edited for the first time by user u. In this case, we include the following data:
- the minimum number of links from p1 and p2 in the Wikipedia hyper-link graph: more than 3 hops, at most 3 hops,
or not reachable;
- the number of categories p1 and p2 have in common: none, at least one, or null if category information is not available.
Table 1: Features used in the edit_pair and user_log datasets to describe a consecutive edit (p1, p2) made by user u.
behavior is not similar, we do a more in-depth analysis to
distinguish between them. So, we perform a frequent itemset
mining step on the edit_pair and user_log datasets. Figure 2
summarizes the results.
4.1 Similarities between Vandal and Benign
User Behavior (w/o reversion features)
scores (including the user reputation score). We use vandal-
ism and user scores only to compare with STiki.
Edit Pair and User Log Datasets.
To analyze the properties of edits made by vandals and
benign users, we create two additional datasets using the
data in the UMDWikipedia dataset.
Edit Pair Dataset. The edit_pair dataset contains a
row for each edit (u, p1, p2, t), where u is a user id, (p1, p2)
is a pair of Wikipedia pages that are consecutively edited by
user u, and t is the time stamp of the edit made on p2. Note
that p1 and p2 could be the same if the user makes two edits,
one after another, on the same page. Each row contains the
values of the features shown in Table 1 computed for the
edit (u, p1, p2, t). These features describe the properties of
page p2 with respect to page p1.
User Log Dataset. The chronological sequence of each
consecutive pair (p1, p2) of pages edited by the same user u
corresponds to a row in this dataset. Each pair (p1, p2) is
described by using the features from Table 1. This dataset is
derived from the edit_pair dataset. It captures a host of tem-
poral information about each user, suggesting how he/she
navigated through Wikipedia and the speed with which this
was done.
4. VANDAL VS. BENIGN USER BEHAVIORS
In this section, we statistically analyze editing behaviors
of vandals and benign users in order to identify behavioral
similarities and differences.
Figure 1 shows the distributions of different properties
that are observed in the edit_pair dataset. Figures 1a- 1c
show the percentage of users on the y-axis as we vary the
number of edits, number of distinct pages edited and the
percentage of re-edits on the x-axis. These three graphs
show near identical behavior.
Figures 1d- 1f show the percentage of edit pairs (u, p1, p2)
on the y-axis as we vary time between edits, number of com-
mon categories between edited pages p1 and p2 and number
of hops between p1 and p2. The behavior of users in terms
of time taken between edits is nearly identical. The last two
graphs show somewhat different behaviors between vandals
and benign users. Figure 1e shows that the percentage of
edit pairs involving just one, two, or three common cate-
gories is 2-3 times higher for benign users than for vandals.
Likewise, figure 1f shows that for benign users, the percent-
age of edit pairs involving exactly one hop is 1.5 times that
of vandals, but the percentage of edit pairs involving 3-4
hops is much higher for vandals than for benign users.
In all the histograms in Figure 1, the null hypothesis that
the distribution for vandals and benign users have identical
average has p-value > 0.05. As this fails to say that their
and benign user behaviors.
Figures 2a, 2b, and 2c show similarities between vandal
• Both vandals and benign users are much more likely to
re-edit a page compared to editing a new page. We see from
Figure 2a that for vandals, the likelihood of a re-edit is 61.4%
compared to a new edit (38.6%). Likewise, for benign users,
the likelihood of a re-edit is 69.71% compared to a new edit
(30.3%).
• Both vandals and benign users consecutively edit the
same page quickly. The two rightmost bars in Figure 2a
show that both vandals and benign users edit the same page
fast. 77% of such edit pairs (for vandals) occur within 15
minutes -- this number is 66.4% for benign users. In fact,
over 50% of these edits occur within 3 minutes for vandals -
the corresponding number for benign users is just over 40%.
•Both vandals and benign users exhibit similar navigation
patterns. 29% of successively edited pages (for both van-
dals and benign users) are by following links only (no com-
mon category and reachable by hyperlinks), about 5% due
to commonality in categories only between the successively
edited pages (at least one common category and not reach-
able by hyperlinks), and 20-25% with commonality in both
properties and linked. This is shown in Figure 2b.
• In their first few edits, both vandals and benign users
have similar editing behavior: Figure 2c shows just the first
4 edits made by both vandals and benign users. We see
here that the percentage of re-edits and consecutive edits
are almost the same in both cases.
4.2 Differences between Vandals and Benign
User Behavior (w/o reversion features)
tween vandals and benign users.
We also identify several behaviors which differentiate be-
• Vandals make faster edits than benign users. On aver-
age, vandals make 35% of their edits within 15 minutes of
the previous edit while benign users make 29.79% of their
edits within 15 minutes (Figure 2d). This difference is sta-
tistically significant with a p-value of 8.2 × 10−82.
•Benign users spend more time editing a new (to them)
page than vandals. Vandals make 70% of their edits to a page
they have not edited before within 15 minutes of their last
edit, while for benign users the number is 54.3% (Figure 2d).
This may be because a benign user must absorb the content
of a new page before making thoughtful edits, while a vandal
(a)
(b)
(d)
(e)
(c)
(f)
Figure 1: Plots showing the distribution of different properties for UMDWikipedia and edit_pair datasets.
knows what he wants to say in advance and just goes ahead
and says it.
• The probability that benign users edit a meta-page is
much higher than the same probability in the case of vandals.
Figure 2e shows that even in their very first edit, benign
users have a 64.77% chance of editing a meta-page, while this
is just 10.34% for vandals. If we look at the first 4 edits, the
percentage of edits that are on meta-pages is 62% for benign
users and just 11.1% for vandals. And if we look at all the
edits, 40.72% of edits by normal users are on meta-pages,
while only 21.57% of edits by vandals are on meta-pages.
4.3 Differences between Vandals and Benign
User Behavior (including reversion)
For the sake of completeness, we also analyze the data
looking for differences between vandal and benign user be-
havior when reverts are considered -- however these differ-
ences are not considered in our vandal prediction methods.
• Vandals make more edits driven by reversion than benign
users. Whenever a vandal u re-edits a page p, in 34.36% of
the cases, u's previous edit on p was reverted by others.
This almost never occurs in the case of benign users -- the
probability is just 4.8%. This suggests that benign users are
much more accepting of reversions than vandals.
•The probability that a re-edit by a benign user of a page
is accepted, even if previous edits by him on the same page
were reverted, is much higher than for vandals. Consider the
case when a user edits a page p after some of his prior edits
on p were reverted by other. If the user u is a benign user,
it is more likely that his last edit is accepted. This suggests
that the sequence of edits made by u were collaboratively
edited by others with the last one surviving, suggesting that
u's reverts were constructive and were part of a genuine
collaboration. Among the cases when u re-edits a page after
one of his previous edits on p has been reverted, 89.87% of
these re-edits survive for benign users, while this number is
only 32.2% for vandals.
• Vandals involve themselves in edit wars much more fre-
quently than benign users. A user u is said to participate
in an edit war if there is a consecutive sequence of edits by
u on the same page which is reverted at least two or three
times (we consider both cases). Figure 2f shows that 27.9%
of vandals make two pairs of consecutive edits because their
previous edit was reverted, but only 13.41% of benign users
do so. 12% of vandals make three such pairs of consecutive
edits, compared to 2.9% in the case of benign users.
• The probability that benign users discuss their edits is
much higher than the probability of vandals doing so.
In
31.3% of the cases when a benign user consecutively edits
a page p twice (i.e.
the user is actively editing a page),
he then edits a meta page. With vandals, this probability
is 11.63%. This suggests that benign editors discuss edits
on a meta-page after an edit, but vandals do not (perhaps
because doing so would draw attention to the vandalism). In
addition there is a 24.41% probability that benign users will
re-edit a normal Wikipedia page after editing a meta-page
while this happens much less frequently for vandals (only
6.17% vandals do such edits). This indicates that benign
users, after discussing relevant issues on meta pages, edit a
normal Wikipedia page.
• Benign users consecutively surface edit pages a lot. We
define a surface edit by a user u on page p as: i) a consecu-
tively edit on the same page p twice by u, and ii) the edit is
not triggered by u's previous edit on p being reverted, and
iii) made within 3 minutes of the previous edit by u. 50.94%
benign users make at least one surface edit on a meta page,
while only 8.54% vandals do so. On normal pages, both be-
nign and normal users make such edits - there are 37.94%
(a) Type of edit and time data overall edits (∆t_c
is the elapsed time between edits on the same page).
(b) For a consecutive edit (p1, p2), how users surf
from p1 to the edit of a new page p2.
(c) First 4 edits in users log.
(d) Edit time.
(e) Meta-pages editing.
(f) Edit war (involves reversion).
Figure 2: Analogies and differences between benign users and vandals.
5.1 Wikipedia Vandal Behavior (WVB) Approach
such cases for benign users and 36.94% for vandals. Over all
pages, 24.24% benign users make at least 3 consecutive sur-
face edits not driven by reversion, but only 7.82% vandals
do so.
In conclusion: (i) Vandals make edits at a faster rate than
benign users. (ii) Vandals are much less engaged in edits of
meta pages, i.e. they are less involved in discussions with
the community.
5. VANDAL PREDICTION
In the following sections, we use the insights from the pre-
vious section to classify vandals and benign users. Our van-
dal prediction methods use multiple known classifiers (SVM,
decision trees, random forest and k-nearest neighbors) with
different sets of features. In the accuracies reported in this
section, the results are computed with SVM, as it gives the
highest accuracy as reported in Section 6 using a 10-fold
cross validation. All features used for vandal prediction are
behavior based and include no human generated revert infor-
mation whatsoever. Thus, these approaches form an early
warning system for Wikipedia administrators.
WVB uses features derived from consecutive edits. These
are found by frequent pattern mining of the user_log dataset.
Specifically, we extract the frequent patterns on both benign
and vandal user logs -- then, for each frequent pattern of be-
nign users, we compute the frequency of the same pattern for
vandals and vice versa. Finally, we select the patterns hav-
ing significant frequency difference between the two classes.
The resulting features are described below:
1. Consecutive re-edit, slowly (crs): whether or not
the user edited the same page consecutively with a time gap
exceeding 15 minutes.
2. Consecutive re-edit, very fast (crv): whether or
not the user edited the same page consecutively and less
than 3 minutes passed between the two edits.
3. Consecutive re-edit of a meta-page (crm): the
number of times the user re-edited the same meta-page, con-
secutively.
4. Consecutive re-edit of a non-meta-page (crn):
whether or not the user re-edited the same non-meta-page,
consecutively.
5. Consecutive re-edit of a meta-page, very fast
(crmv): whether or not the user re-edited the same meta-
page, consecutively, and less than 3 minutes passed between
the two edits.
6. Consecutive re-edit of a meta-page, fast (crmf):
whether or not the user re-edited the same meta-page, con-
secutively, and 3 to 15 minutes passed between the two edits.
7. Consecutive re-edit of a meta-page, slowly (crms):
whether or not the user re-edited the same meta-page, con-
secutively, and more than 15 minutes passed between the
two edits.
8. Consecutively re-edit fast and consecutively re-
edit very fast (crf_crv): whether or not the following
pattern is observed in the user log - the user re-edited the
same article within 15 minutes, and later re-edited a (possi-
bly different) article and less than 3 minutes passed between
the second pair of edits.
9. First edit meta-page (fm): whether or not the
first edit of the user was on a meta-page. This in itself is
quite a distinguishing feature, because usually vandals first
edit a non-meta page and benign users first edit a meta-
page. Therefore, this becomes quite an important feature
for distinguishing the two.
10. Edit of a new page at distance at most 3 hops,
slowly (ntus): whether or not the user edited a new page
(never edited by him before) p2 which is within 3 hops or
less of the previous page p1 that he edited and either p1 or
p2's category is unknown8 and the time gap between the two
edits exceeds 15 minutes.
11. Edit of a new page at distance at most 3 hops
slowly and twice (nts_nts): whether or not there are two
occurrences of the following feature in the user log: Edit of
a new page at distance at most 3 hops, slowly (nts), i.e. in
a pair (p1, p2) of consecutive edits, whether or not the user
edited a new page p2 (i.e. never edited before) such that p2
can be reached from p1 link-wise with at most 3 hops, and
more than 15 minutes passed between the edit of p1 and p2.
In predicting vandals, we do not use any feature involv-
ing human identification of vandals (e.g. number of edits
and reversion) because number of edits made has a bias to-
wards benign users as they tend to perform more edits, while
vandals perform fewer edits because they get blocked. Any
feature that has a negative human intervention (number of
reversions, number of warnings given to the user on a talk
page, etc.) already indicates human recognition that a user
may be a vandal. We explicitly avoid such features so that
we provide Wikipedia administrators with a fully automated
vandal early warning system.
Feature importance: We compute the importance of the
features described above by using the fact that the depth of
a feature used as a decision node in a tree captures the rel-
ative importance of that feature w.r.t. the target variable.
Features at the top of the tree contribute to the final pre-
diction decision of a larger fraction of inputs. The expected
fraction of samples they contribute to can be used to esti-
mate their importance. Figure 3 shows the importance of
the different features for the classification task, which was
computed by using a forest of 250 randomized decision trees
(extra-trees [24]). The red bars in the plot show the fea-
ture importance using the whole forest, with their variabil-
8This happens mostly for meta-pages though it can occasionally
also happen for normal (non-meta) pages.
Figure 3: Importance of features (w/o reversion).
Figure 4: Percentage of vandals and benign users with particular
features (w/o reversion).
ity across the trees represented by the blue bars. From the
figure, it is clear that the features - fm, ntus and crmv - are
the three most descriptive features for the classes. These are
shown in greater detail in Figure 4. Let us look into each of
them one by one.
• If the very first page edited by user u is a normal (non-
meta) page, then u is much more likely to be a vandal (64.77%)
than a benign user (10.34%). The f m feature tells us that
when a user's first edit is on a normal page, the user is much
more likely to be a vandal.
• Benign users are likely to take longer to edit a new page
than a vandal (ntus). The probability that a benign user
takes more than 15 minutes to edit the next page in an
edit pair (p1, p2) when p2 is within 3 hops of p1, and p1 or
p2's category is unknown is much higher (54.82%) than for
vandals (7.66%). This suggests that benign users take longer
to edit pages than vandals, possibly because they are careful
and anxious to do a good job. Moreover, as p1 or p2 have
no categories, the page is more likely to be a meta-page.
• Benign users are much more likely to re-edit the same
meta-page quickly (within 3 minutes) than vandals. This
usually happens when there is a minor mistake on the page,
and the user edits to correct it. Note that this again has
the feature that the edit was made on a meta page. Benign
users are much more likely to make such edits (53.13%) than
vandals (9.88%).
The top three features indicate that editing meta versus
normal Wikipedia pages is a strong indicator of whether
the user is benign.
Intuitively, vandals vandalize heavily
accessed pages and so normal pages are their most common
target. On the other hand, benign users interact and discuss
issues with other users about the content of the edit, and
this discussion is done on meta pages.
Accuracy: Using an SVM classifier, the WVB approach
obtains an accuracy of 86.6% in classifying Wikipedia users
as vandals or benign on our entire user_log dataset.
5.2 Wikipedia Transition Probability Matrix
(WTPM) Approach
The Wikipedia Transition Probability Matrix (WTPM)
captures the edit summary of the users. The states in WTPM
correspond to the space of possible vectors of features asso-
ciated with any edit pair (p1, p2) carried out by a user u.
By looking at Table 1, we see that there are 2 options for
whether p2 is a meta-page or not, 3 options for the time dif-
ference between edits (p1, p2), and so forth. This gives us a
total of 60 possible states. Example states include: consecu-
tively re-edit a normal-page within 15 minutes (s1), or edit a
new normal page p2 within 3 hops from p1 and no common
categories within 3 minutes (s2), etc.
k
P
The transition matrix T (u) of user u captures the prob-
ability Tij(u) that user u goes from state si to sj. Tij =
N(si,sj)
N(si,sk), where N(si, sj) is the number of times the user
went from state si to sj. This gives a (usually sparse) tran-
sition matrix of size 60 × 60 = 3600.
The intuition behind using WTPM as features for clas-
sification is that the transition probability from one state
to the other for a vandal may differ from that of a benign
user. Moreover, the states visited by vandals may be dif-
ferent from states visited by benign users (for example, it
turns out that benign users are more likely to visit a state
corresponding to "first edit on meta page", than vandals do).
We create a compact and distributed representation of
T (u) using an auto-encoder[25] -- this representation pro-
vides the features for our SVM classifier. When doing cross-
validation, we train the auto-encoder using the training set
with input from both benign users and vandals. We then
take the value given by the hidden layer for each input as
the feature for training a classifier. For predicting output for
the test set, we give each test instance as input to the auto-
encoder and feed its representation from the hidden layer
into the classifier. Note that the auto-encoder is trained
only on the training set, and the representation for the test
set is derived only from this learned model.
Accuracy: With a neural net auto-encoder of 400 hidden
units and with SVM as the classifier, the WTPM approach
gives an accuracy of 87.39% on the entire dataset.
5.3 VEWS Algorithm
The VEWS approach merges all the features used by both
the WVB approach and the WTPM approach. The resulting
accuracy with a SVM classifier slightly improves the accu-
racy of classification to 87.82%.
6. VANDAL PREDICTION EXPERIMENTS
We used the popularly used machine learning library called
Scikit-learn [26] for our experiments and the deep learning
library Theano [27] for training the auto-encoder.
Experiment 1: Overall Classification Accuracy. Ta-
ble 2 shows the overall classification accuracy of all three ap-
proaches by doing a 10-fold cross validation using an SVM
classifier, together with the true positive, true negative, false
positive, and false negative rates. We see that TP and TN
rates are uniformly high, and FP and FN rates are low,
making SVM an excellent classifier.
WVB
86.6%
WTPM 87.39%
VEWS
87.82%
Accuracy TPR TNR FPR FNR
0.15
0.12
0.13
0.85
0.88
0.87
0.11
0.10
0.08
0.89
0.90
0.92
Table 2: Table showing the accuracy and statistical values de-
rived from the confusion matrix for the three approaches, on the
entire dataset and averaged over 10 folds (without reversion fea-
tures). The positive and negative class represent benign and van-
dal users, respectively.
We use McNemar's paired test to check whether the three
approaches produce different results. For all pairs among
the three approaches, the null hypothesis that they produce
the same results is rejected with p-value < 0.01, showing
statistical significance. Overall, VEWS produces the best
result even though it has slightly lower true positives and
slightly more false negatives than WTPM.
We also classified using the VEWS approach with deci-
sion tree classifier, random forest classifier (with 10 trees)
and k-nearest neighbors classifier (with k = 3) which gave
classification accuracy of 82.82%, 86.62% and 85.4% respec-
tively. We experimented with other classifiers as well, but
they gave lower accuracy.
Experiment 2: Improvement with Temporal Re-
cency. The previous experiment's cross validation randomly
selects samples from the entire dataset for training and val-
idation. But in the real world, a vandal's behavior may be
more closely related to other vandals' recent behavior. To
check this, starting from April 2013, for each month m, we
train our algorithms with data from all the users who started
editing on Wikipedia within the previous three months, i.e.
in months m − 3, m − 2 and m − 1. m is varied until July
2014. We then use the learned model to predict whether a
user is vandal or benign among the users who made their
first edit in month m. The variation of accuracy is shown in
Figure 5. The highest accuracy of 91.66% is obtained with
the VEWS approach, when predicting for users who started
editing in January 2014 and training is done with users from
October-December 2013. The average accuracy for the three
approaches over all the time points is also shown in Figure 5.
The most important observation from Figure 5 is that
temporal classification accuracy for each approach is usually
higher than the base accuracy shown in Table 2 and Figure 7
(described later in Experiment 4). We attribute this to the
fact that in the previous experiment, we use cross-validation
without considering temporal information when creating the
folds. This experiment, on the other hand, predicts vandals
based on what is learned during the previous three months.
Figure 5 shows that the approaches are consistent over
time in separating vandals from benign users. At all times,
the approaches have at least 85% classification accuracy,
with the exception of the case when using WVB during
months May and June, 2013.
Experiment 3: Varying Size of Training Set on
Classification Accuracy. We designed an experiment to
study the affect of varying the size of the training set, while
maintaining the temporal aspect intact. So for testing on
users who made their first edit in the month of July 2014,
we train the classifier on edits made by users who started
editing in the previous n months. We vary n from 1 to 12.
This preserves the temporal aspect in training, similar to the
previous experiment. The variation of accuracy is shown in
Figure 6. There are two interesting observations:
i) the
Figure 5: Plot showing variation of accuracy when training on
edit log of users who started editing within previous 3 months
(without reversion features). The table reports the average accu-
racy of all three approaches.
Figure 6: Plot showing the change in accuracy by varying the
training set of users who started editing Wikipedia at most n
months before July 2014. The testing is done on users who started
editing in July 2014.
accuracy of WTPM and VEWS increases with the number
of (training) months n. ii) In contrast, WVB's accuracy is
hardly affected by the number of months of training data.
This is because: (i) features in WVB are binary and (ii) fm,
which is the most important feature in WVB, does not vary
with time.
Experiments 2 and 3 show strong temporal dependency
of user behavior on prediction of vandals. This may be due
to several factors: Wikipedia may change rules and policies
that affect user behavior, real world events might trigger
users to make similar edits and emulate similar behaviour,
etc. Such behavior traits would be highlighted when observ-
ing recent edits made by newly active users.
Experiment 4: Effect of First k User Edits. We
study the effect of the first-k edits made by the user on
prediction accuracy which is averaged over 10 folds of the
whole dataset. The solid lines in Figure 7 show the variation
in accuracy when k is varied from 1 to 500. As there is little
shift in classification accuracy when k > 20, the situation for
k = 1, . . . , 20 is highlighted. We get an average accuracy of
86.6% for WVB, 87.39% for WTPM, and 87.82% for VEWS
when k = 500. It is clear that the first edit itself (was the
first edit made on a meta-page or not?) is a very strong
classifier, with an accuracy of 77.4%. Accuracy increases
fast when k is increased to 10 for all approaches, after which
it flattens out. This suggests that a user's first few edits are
very significant in deciding whether he/she is vandal or not.
Considering reversion. Figure 7 also shows that accuracy
does go up by about 2% when we allow our three algorithms
to consider reversion information. Please note that this ex-
periment is merely for completeness sake and our proposed
algorithm does not depend on reversion at all. For this ex-
periment, we added additional reversion-driven edit features
to the features used by WVB, WTPM, and VEWS (and
we called these approaches WVB-WR, WTPM-WR, and
VEWS-WR, respectively). These features capture whether
a user edited a page after his previous edit on that page
was reverted. Specifically, we extend the features - crs, crv,
crm, crn, crmv, crmf, crms and crf_crv - to now have two
types of re-edits: one that is reversion driven and one that is
not. Using reversion information would mean that a human
or vandalism detection system has already flagged a poten-
tial vandal. In contrast, our algorithms are able to predict
vandals with high accuracy even without such input.
Figure 7: Plot showing variation of accuracy with the number of
first k edits. The outer plot focuses on the variation of k from 1
to 20. The inset plot shows variation of k from 1 to 500.
Comparison with State-of-the-art tools. Here we
evaluate our work against ClueBot NG [3] and STiki [4] as
they are the primary tools currently used by Wikipedia to
detect vandalism. We recall that these tools are designed to
detect whether the content of an article has been vandalized
or not, while we focus on detecting whether a user is a vandal
or not. We show that VEWS handily beats both ClueBot NG
and Stiki in the latter task. Interestingly, when we combine
VEWS', ClueBot NG's and STiki's features, we get better
accuracy than with either of them alone. All experiments are
done using 10-fold cross validation and SVM as the classifier.
Comparison with ClueBot NG. Given an edit, ClueBot NG
[3] detects and reverts vandalism automatically. We could
use ClueBot NG to classify a user as a vandal if he has
made at least v vandalism edits (edits that were reverted by
ClueBot NG). For comparing this heuristic with VEWS we
use v = 1, 2, 3. Figure 8 shows that the maximum accuracy
achieved by ClueBot NG is 71.4% (when v = 1) and accuracy
decreases as v increases. Therefore, VEWS outperforms this
use of ClueBot NG.
When does VEWS Detect Vandals? Of 17,027 vandals in
our dataset, VEWS detects 3,746 that ClueBot NG does not
detect (i.e. where ClueBot NG does not revert any edits
by this person). In addition, it detects 7,795 vandals before
ClueBot NG -- on average 2.6 edits before ClueBot NG did.
Figure 8: Plot showing the variation of accuracy for vandal de-
tection by considering reversions made by ClueBot NG.
Figure 10: Plot showing the variation of accuracy for vandal
detection by considering article scores given by STiki. RULE: If
the user makes 1 edit in first k that gets score > t, then the user
is a vandal.
In the second experiment, we say that a user is a vandal
after making k edits if the maximum STiki score among
these k edits is more than a threshold t.10 We vary the values
of t from 0 to 1 and the results can be seen in Figure 10. We
also did experiments for the case when we classify a user as
a vandal if the maximum two and three scores are above t,
which yielded lower accuracy scores.
Combining VEWS, Cluebot NG and STiki. VEWS can
be improved by adding linguistic and meta-data features
from ClueBot NG and STiki.
In addition to the features
in VEWS, we add the following features: i) number of edits
reverted11 by ClueBot NG until the kth edit, ii) user repu-
tation score by STiki after the kth edit, and iii) maximum
article edit score given by STiki until the kth edit (we also
did experiments with the average article edit score instead
of maximum, which gave similar results). Figure 11 shows
the variation of average accuracy by using the first-k edits
made by the user to identify it as a vandal. The accuracy of
the VEWS-ClueBot combination is 88.6% (k = 20), which
is higher than either of them alone. Observe that this com-
bination does not consider any human input. The accuracy
of the combination VEWS-ClueBot-STiki improves slightly
to 90.8% (k = 20), but STiki considers human inputs while
calculating its scores.
7. CONCLUSIONS
In this paper, we develop a theory based on edit-pairs and
edit-patterns to study the behavior of vandals on Wikipedia
and distinguish these behaviors from those of benign users.
We make the following contributions.
1. First, we develop the UMDWikipedia dataset which
contains a host of information about Wikipedia users and
their behaviors.
2. Second, we conduct a detailed analysis of behaviors
that distinguish vandals from benign users. Notable dis-
tinctions that do not involve revert information include:
(a) We find that the first page edited by vandals is much
more likely to be a normal page -- in contrast, benign users'
first edits are much more likely to occur on meta-pages.
10We also tested using average instead of maximum with similar
results.
11We allow these reverts to be considered as they are generated
with no human input, so the resulting combination is still fully
automated.
Figure 9: Plot showing the variation of accuracy for vandal de-
tection by considering kth REP_USER score given by STiki.
In 210 cases, ClueBot NG detects a vandal edit 5.29 edits
earlier (on average) than VEWS detects the vandal and there
are 1,119 vandals that ClueBot NG detects but VEWS does
not. Overall, when both detect the vandal, VEWS does it
2.39 edits (on average) before ClueBot NG does.
Instead of reverts made by ClueBot NG, when we con-
sider reverts made by any human or any known vandalism
detection system, VEWS detects the vandal at least as early
as its first reversion in 87.36% cases -- in 43.68% of cases,
VEWS detects the vandal 2.03 edits before the first rever-
sion. Thus, on aggregate, VEWS outperforms both humans
and other vandalism detection system in early detection of
vandals, though there are definitely a small number of cases
(7.8%) on which ClueBot NG performs very well.9
Comparison with STiki. STiki provides a "probability of
vandalism" score to each edit. STiki also maintains a user
reputation score, which is developed by looking at the user's
past edits (the higher the score, the higher the probability
that the user is a vandal). We use both these scores sepa-
rately to compare against STiki.
We first consider a user to be a vandal if his STiki repu-
tation score (REP_USER) after making the kth edit is at
least t. Figure 9 shows the results of this experiment where
we vary t from 0 to 1 in steps of 0.1. We also report the
VEWS curve for comparison. We see that the STiki user rep-
utation score to detect vandals has less than 60% accuracy
and is handily beaten by VEWS. We do not test for values
of t greater than 1 as accuracy decreases as t increases.
9We do not compare with STiki in this experiment, as it does not
automatically revert edits.
[9] B. T. Adler, L. de Alfaro, S. M. Mola-Velasco,
P. Rosso, and A. G. West, "Wikipedia vandalism
detection: Combining natural language, metadata,
and reputation features," in CICLing, 2011, pp.
277 -- 288.
[10] M. Potthast, B. Stein, and R. Gerling, "Automatic
vandalism detection in wikipedia," in ECIR, 2008, pp.
663 -- 668.
[11] M. Sumbana, M. GonÃğalves, R. Silva, J. Almeida,
and A. Veloso, "Automatic vandalism detection in
wikipedia with active associative classification," in
TPDL, 2012, pp. 138 -- 143.
[12] O. Ferschke, J. Daxenberger, and I. Gurevych, "A
survey of nlp methods and resources for analyzing the
collaborative writing process in wikipedia," in The
People's Web Meets NLP. Springer, 2013, pp.
121 -- 160.
[13] http://www.wikitrust.net/.
[14] R. West and J. Leskovec, "Human wayfinding in
information networks," in WWW, 2012, pp. 619 -- 628.
[15] A. Cockburn and B. McKenzie, "What do web users
do? an empirical analysis of web use," International
Journal of human-computer studies, vol. 54, no. 6, pp.
903 -- 922, 2001.
[16] L. D. Catledge and J. E. Pitkow, "Characterizing
browsing strategies in the world-wide web," Computer
Networks and ISDN systems, vol. 27, no. 6, pp.
1065 -- 1073, 1995.
[17] E. Adar, J. Teevan, and S. T. Dumais, "Large scale
analysis of web revisitation patterns," in SIGCHI.
ACM, 2008, pp. 1197 -- 1206.
[18] H. T. Welser, D. Cosley, G. Kossinets, A. Lin,
F. Dokshin, G. Gay, and M. Smith, "Finding social
roles in wikipedia," in iConference, 2011, pp. 122 -- 129.
[19] https://www.mediawiki.org/wiki/API.
[20] http://beta.degreesofwikipedia.com/.
[21] A. Halfaker,
http://datahub.io/dataset/english-wikipedia-reverts.
[22] A. Kittur, B. Suh, B. A. Pendleton, and E. H. Chi,
"He says, she says: Conflict and coordination in
wikipedia," in SIGCHI, 2007, pp. 453 -- 462.
[23] http://armstrong.cis.upenn.edu/stiki_api.php?
[24] P. Geurts, D. Ernst, and L. Wehenkel, "Extremely
randomized trees," Machine learning, vol. 63, no. 1,
pp. 3 -- 42, 2006.
Foundations and trends R(cid:13) in Machine Learning, vol. 2,
no. 1, pp. 1 -- 127, 2009.
[25] Y. Bengio, "Learning deep architectures for ai,"
[26] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel,
B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer,
R. Weiss, V. Dubourg, J. Vanderplas, A. Passos,
D. Cournapeau, M. Brucher, M. Perrot, and
E. Duchesnay, "Scikit-learn: Machine learning in
Python," Journal of Machine Learning Research,
vol. 12, pp. 2825 -- 2830, 2011.
[27] J. Bergstra, O. Breuleux, F. Bastien, P. Lamblin,
R. Pascanu, G. Desjardins, J. Turian,
D. Warde-Farley, and Y. Bengio, "Theano: a CPU and
GPU math expression compiler," in SciPy, Jun. 2010.
Figure 11: Figure showing effect of adding STiki and ClueBot
NG's features to our VEWS features.
(b) We find that benign users take longer to edit a page
than a vandal user.
(c) We find that benign users are much more likely to re-
edit the same page quickly (within 3 minutes) as compared
to vandals, possibly because they wanted to go back and
improve or fix something they previously wrote.
These are just three major factors that allow us to differ-
entiate between vandals and benign users. Many others are
detailed in the paper providing some of the first behavioral
insights that do not depend on reverts that differentiate be-
tween vandals and benign users.
3. We develop three approaches to predict which users are
vandals. Each of these approaches uses SVM with different
sets of features. Our VEWS algorithm provides the best
performance, achieving 87.82% accuracy. If in addition we
consider temporal factors, namely that vandals next month
are more likely to behave like vandals in the last few months,
this accuracy goes up to 89.5%. Moreover, we show that
the combination of VEWS and past work (ClueBot NG and
STiki) increases accuracy to 90.8%, even without any human
generated reversion information. Moreover, VEWS detects
far more vandals than ClueBot NG. When both VEWS and
ClueBot NG predict vandals, VEWS does it 2.39 edits (on
average) before ClueBot NG does.
Acknowledgements. Parts of this work were supported
by ARO grants W911NF11103, W911NF1410358, and
W911NF09102.
8. REFERENCES
[1] http://en.wikipedia.org/wiki/Wikipedia:Vandalism.
[2] P. Neis, M. Goetz, and A. Zipf, "Towards automatic
vandalism detection in openstreetmap," ISPRS
International Journal of Geo-Information, vol. 1,
no. 3, pp. 315 -- 332, 2012.
[3] http://en.wikipedia.org/wiki/User:ClueBot_NG.
[4] http://en.wikipedia.org/wiki/Wikipedia:STiki.
[5] http://en.wikipedia.org/wiki/Wikipedia:Snuggle.
[6] S. M. Mola-Velasco, "Wikipedia vandalism detection
through machine learning: Feature review and new
proposals - lab report for pan at clef 2010." in CLEF,
2010.
[7] A. G. West, S. Kannan, and I. Lee, "Detecting
wikipedia vandalism via spatio-temporal analysis of
revision metadata?" in EUROSEC, 2010, pp. 22 -- 28.
[8] B. T. Adler, L. de Alfaro, and I. Pye, "Detecting
wikipedia vandalism using wikitrust - lab report for
PAN at CLEF 2010," in CLEF, 2010.
|
1702.07784 | 1 | 1702 | 2017-02-24T22:14:30 | Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying | [
"cs.SI",
"cs.AI",
"cs.CY"
] | Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of platforms. In extreme cases, these incidents have evolved into hate, discrimination, and bullying, and even materialized into real-world threats and attacks against individuals or groups. In this paper, we study the Gamergate controversy. Started in August 2014 in the online gaming world, it quickly spread across various social networking platforms, ultimately leading to many incidents of cyberbullying and cyberaggression. We focus on Twitter, presenting a measurement study of a dataset of 340k unique users and 1.6M tweets to study the properties of these users, the content they post, and how they differ from random Twitter users. We find that users involved in this "Twitter war" tend to have more friends and followers, are generally more engaged and post tweets with negative sentiment, less joy, and more hate than random users. We also perform preliminary measurements on how the Twitter suspension mechanism deals with such abusive behaviors. While we focus on Gamergate, our methodology to collect and analyze tweets related to aggressive and bullying activities is of independent interest. | cs.SI | cs | Measuring #GamerGate:
A Tale of Hate, Sexism, and Bullying
Despoina Chatzakou†, Nicolas Kourtellis‡, Jeremy Blackburn‡
Emiliano De Cristofaro(cid:93), Gianluca Stringhini(cid:93), Athena Vakali†
†Aristotle University of Thessaloniki
(cid:93)University College London
[email protected], [email protected], [email protected]
‡Telefonica Research
[email protected], [email protected], [email protected]
7
1
0
2
b
e
F
4
2
]
I
S
.
s
c
[
1
v
4
8
7
7
0
.
2
0
7
1
:
v
i
X
r
a
ABSTRACT
Over the past few years, online aggression and abusive behaviors
have occurred in many different forms and on a variety of plat-
forms. In extreme cases, these incidents have evolved into hate,
discrimination, and bullying, and even materialized into real-world
threats and attacks against individuals or groups. In this paper, we
study the Gamergate controversy. Started in August 2014 in the
online gaming world, it quickly spread across various social net-
working platforms, ultimately leading to many incidents of cyber-
bullying and cyberaggression. We focus on Twitter, presenting a
measurement study of a dataset of 340k unique users and 1.6M
tweets to study the properties of these users, the content they post,
and how they differ from random Twitter users. We find that users
involved in this "Twitter war" tend to have more friends and fol-
lowers, are generally more engaged and post tweets with negative
sentiment, less joy, and more hate than random users. We also
perform preliminary measurements on how the Twitter suspension
mechanism deals with such abusive behaviors. While we focus on
Gamergate, our methodology to collect and analyze tweets related
to aggressive and bullying activities is of independent interest.
1.
INTRODUCTION
With the proliferation of social networking services and always-
on always-connected devices, social interactions have increasingly
moved online, as social media has become an integral part of peo-
ple's every day life. At the same time, however, new instanti-
ations of negative interactions have arisen, including aggressive
and bullying behavior among online users. Cyberbullying, the
digital manifestation of bullying and aggressiveness in online so-
cial interactions, has spread to various platforms such as Twit-
ter [23], Youtube [6], Ask.fm [14, 15], and Facebook [27]. Other
community-based services such as Yahoo Answers [16], and online
gaming platforms are not an exception [18]. Research has showed
that bullying actions are often organized, with online users called to
participate in hateful raids against other social network users [13].
The Gamergate controversy [17] is one example of a coordi-
nated campaign of harassment in the online world. It started with
a blog post by an ex-boyfriend of independent game developer Zoe
Quinn, alleging sexual improprieties. 4chan boards like /r9k/ [1]
and /pol/ [2], turned it into a narrative about "ethical" concerns
in video game journalism and began organizing harassment cam-
paigns [13]. It quickly devolved into a polarizing issue, involving
sexism, feminism, and "social justice," taking place on social me-
dia like Twitter [11]. Although held up as a pseudo-political move-
ment by its adherents, there is substantial evidence that Gamergate
is more accurately described as an organized campaign of hate and
harassment [12]. What started as "mere" denigration of women
in the gaming industry, eventually evolved into directed threats of
violence, rape, and murder [29]. Gamergate came about due to a
unique time in the digital world in general, and gaming in partic-
ular. The recent democratization of video game development and
distribution via platforms such as Steam has allowed for a new gen-
eration of "indie" game developers who often have a more intimate
relationship with their games and the community of gamers that
play them. With the advent of ubiquitous social media and a com-
munity born in the digital world, the Gamergate controversy pro-
vides us a unique point of view into online harassment campaigns.
Roadmap. In this paper, we explore a slice of the Gamergate con-
troversy by analyizing 1.6M tweets from 340k unique users part of
whom engaged in it. As a first attempt at quantifying this contro-
versy, we focus on how these users, and the content they post, differ
from random (baseline) Twitter users. We discover that Gamer-
gaters are seemingly more engaged than random Twitter users,
which is an indication as to how and why this controversy is still
on going. We also find that, while their tweets appear to be aggres-
sive and hateful, Gamergaters do not exhibit common expressions
of online anger, and in fact primarily differ from random users in
that their tweets are less joyful. The increased rate of engagement
of Gamergate users makes it more difficult for Twitter to deal with
all these cases at once, something reflected in the relative low sus-
pension rates of such users. In the struggle to combat existing ag-
gressive and bullying behaviors, Twitter recently took new actions
and is now temporarily limiting users for abusive behavior [25].
Finally, we note that, although our work is focused on Gamergate
in particular, our principled methodology to collect and analyze
tweets related to aggressive and bullying activities on Twitter can
be generalized and it is thus of independent interest.
Paper Organization. Next section reviews related work, then Sec-
tion 3 discusses our data collection methodology. In Section 4, we
present the results of our analysis and lessons we learn from them.
Finally, the paper concludes in Section 5.
2. RELATED WORK
Previous research has studied and aimed at detecting offensive,
abusive, aggressive, and bullying content on social media, includ-
ing Twitter, YouTube, Instagram, Facebook and Ask.fm. Next, we
cover related work on this type of behavior in general, as well as
work related to the Gamergate case.
Detecting abusive behavior. Chen et al. [6] aim to detect offensive
content and potential offensive users by analyzing YouTube com-
ments. Then, Hosseinmardi et al. [14, 15] turn to cyberbullying on
Instagram and Ask.fm. Specifically, in [15], besides considering
1
available text information, they also try to associate the topic of an
image (e.g., drugs, celebrity, sports, etc.) to possible cyberbullying
events, concluding that drugs are highly associated with cyberbul-
lying. Also, in a effort to create a suitable dataset for their analy-
sis, at first the authors collected a large number of media sessions
– i.e., videos and images along with comments – from Instagram
public profiles, with a subset selected for labeling. To ensure that
an adequate number of cyberbullying instances will be present in
the dataset, they selected media sessions with at least one profan-
ity word. Finally, they relied on the CrowdFlower crowdsourcing
platform to determine whether or not such sessions are related with
cyberbullying or cyberaggression. In [14] authors leveraged both
likes and comments to identify negative behavior in the Ask.fm so-
cial network. Here, their dataset was created by exploiting publicly
accessible profiles, e.g. questions, answers, and likes.
Other works aim to detect hate/abusive content on Yahoo Fi-
nance. In [8], the authors use a Yahoo Finance dataset labeled over
a 6-month period. Nobata et al. [20] gather a new dataset from
Yahoo Finance and News comments: each comment is initially
characterized as either abusive or clean (from Yahoo's in-house
trained raters), with further analysis on the abusive comments spec-
ifying whether they contain hate, derogative language, or profanity.
They follow two annotation processes, with labeling performed by:
(i) three trained raters, and (ii) workers recruited from Amazon Me-
chanical Turk, concluding that the former is more effective.
Kayes et al. [16] focus on a Community-based Question-
Answering (CQA) site, Yahoo Answers, finding that users tend
to flag abusive content posted in an overwhelmingly correct way,
while in [7], the problem of cyberbullying is further decomposed
to sensitive topics related to race and culture, sexuality, and in-
telligence, using YouTube comments extracted from controver-
sial videos. Hee et al. [27] also study specific types of cyber-
bullying, e.g., threats and insults, on Dutch posts extracted from
Ask.fm social media. They also highlight three main user behav-
iors, harasser, victim, and bystander – either bystander-defender or
bystander-assistant who support the victim or the harasser, respec-
tively. Their dataset was created by crawling a number of seed sites
from Ask.fm, with a limited number of cyberbullying instances.
They complement the data with more cyberbullying related content
by: (i) launching a campaign where people reported personal cases
of cyberbullying taking place in different platforms, i.e., Facebook,
message board posts and chats, and (ii) by designing a role-playing
game involving a cyberbullying simulation on Facebook. Then,
they ask manual annotators to characterize content as being part of
a cyberbullying event, and indicate the author's role in such event,
i.e., victim, harasser, bystander-defender, or bystander-assistant.
Sanchez et al. [23] use Twitter messages to detect bullying in-
stances and more specifically cases related to gender bullying.
They use a distant supervision approach [10] to automatically label
a set of tweets by using a set of abusive terms used to character-
ize text as expressing negative or positive sentiment. The dataset is
then used to train a classifier geared to finding inappropriate words
in Twitter text and detect bullying – the hypothesis being that bul-
lying instances most probably contain negative sentiment. Finally,
in [3] the authors propose an approach suitable for detecting bul-
lying and aggressive behavior on Twitter. They study the prop-
erties of cuberbullies and aggressors and what distinguishes them
from regular users. To perform their analysis, they build upon the
CrowdFlower crowdsourcing tool to create a dataset where users
are characterized as bullies, aggressors, spammers, or normal.
Even though Twitter is among the most popular social networks,
only a few efforts have focused on detecting abusive content on it.
Here, we propose an approach for building a ground truth dataset,
using Twitter as a source of information, which will contain a
higher density of abusive content (mimicking real life abusive post-
ing activity).
Analysis of Gamergate.
In our work, the hashtag #GamerGate
serves as a seed word to build a dataset of abusive behavior, as
Gamergate is one of the best documented large-scale instances of
bullying/aggressive behavior we are aware of [17]. With individ-
uals on both sides of the controversy using it, and extreme cases
of cyberbullying and aggressive behavior associated with it (e.g.,
direct threats of rape and murder), #GamerGate is a relatively un-
ambiguous hashtag associated with tweets that are likely to involve
abusive/aggressive behavior. Prior work has also looked at Gamer-
gate in somewhat related contexts. For instance, Guberman and
Hemphill [11] used #GamerGate to collect a sufficient number of
harassment-related tweets in an effort to study and detect toxic-
ity on Twitter. Also, Mortensen [18] likens the Gamergate phe-
nomenon to hooliganism, i.e., a leisure-centered aggression where
fans are organized in groups to attack another group's members.
3. METHODOLOGY
In this section, we present our methodology for collecting and
processing a dataset of abusive behavior on Twitter. In this paper,
we focus on the Gamergate case, however, our methodology can be
generalized to other platforms and case studies.
3.1 Data Collection
Seed keyword(s). The first step is to select one or more seed key-
words, which are likely related to the occurrence of abusive inci-
dents. Besides #GamerGate, good examples are also #BlackLives-
Matter and #PizzaGate. In addition to such seed words, a set of
hate- or curse-related words can also be used, e.g., words extracted
from the Hatebase database (HB)1, to start collecting possible abu-
sive texts from social media sources. Therefore, at time t1, the list
of words to be used for filtering posted texts includes only the seed
word(s), i.e., L(t1) =< seed(s) >.
In our case, we focus on Twitter, and more specifically we build
upon the Twitter Streaming API2 which gives access to 1% of all
tweets. This returns a set of correlated information, either user-
based, e.g., poster's username, followers and friends count, profile
image, total number of posted/liked/favorite tweets, or text-based,
e.g., the text itself, hashtags, URLs, if it is a retweeted or reply
tweet, etc. The data collection process took place from June to
August 2016.
Initially, we obtained a 1% of the sample public
tweets and parsed it to select all tweets containing the seed word
#GamerGate, which are likely to involve the type of behavior, and
the case study we are interested in.
Dynamic list of keywords.
In addition to the seed keyword(s),
further filtering keywords are used to select abusive-related con-
tent. The list of the additional keywords is updated dynamically in
consecutive time intervals based on the posted texts during these
intervals. Thus, in T = {t1, t2, ..., tn} the keywords list L(t) has
the following form: L(ti) =< seed(s), kw1, kw2, kwN >, where
kwj is the jth top keyword in time period ∆T = ti − ti−1. De-
pending on the topic under examination, i.e., if it is a popular topic
or not, the creation of the dynamic keywords list can be split to dif-
ferent consecutive time intervals. To maintain the dynamic list of
keywords for the time period ti−1 → ti, we investigate the texts
posted in this time period. We extract N keywords found during
that time, compute their frequency and rank them into a tempo-
rary list LT (ti). We then adjust the dynamic list L(ti) with entries
1 https://www.hatebase.org/
2 https://dev.twitter.com/streaming/overview
2
from the temporary list LT (ti) to create a new dynamic list that
contains the up-to-date top N keywords along with the seed words.
This new list is used in the next time period ti → ti+1 for the
filtering of posted text.
As mentioned, #GamerGate serves as a seed for a snowball sam-
pling of other hashtags likely associated with cyberbullying and
aggressive behavior. We include tweets with hashtags appearing
in the same tweets as #GamerGate (the keywords list is updated
on a daily basis). Overall, we reach 308 hashtags during the data
collection period. A manual examination of these hashtags reveals
that they do contain a number of hate words, e.g., #InternationalOf-
fendAFeministDay, #IStandWithHateSpeech, and #KillAllNiggers.
Random sample. To complement the dataset with cases that are
less likely to contain abusive content, we also crawl a random sam-
ple of texts over the same time period. In our case, we simply crawl
a random set of tweets, which constitutes our baseline.
Remarks. Overall, we have collected two datasets: (i) a random
sample set of 1M tweets, and (ii) a set of 659k tweets which are
likely to contain abusive behavior.
We argue that the our data collection methodology provides sev-
eral benefits with respect to performance. First, it allows for regular
updates of the keyword list, hence, the collection of more up-to-
date content and capturing previously unseen behaviors, keywords,
and trends. Second, it lets us adjust the update time of the dynamic
keywords list based on the observed burstiness of the topics under
examination, thus eliminating the possibility of either losing new
information or collecting repeatedly the same information. Finally,
this process can be parallelized for scalability on multiple machines
using a Map-Reduce script for computing top N keywords list. All
machines maintain local top N keyword lists which are aggregated
globally in a central controller, enabling the construction of a global
dynamic top N keyword list that can be distributed back to the com-
puting / crawling machines.
3.2 Data Processing
We performed preprocessing of the data collected to produce a
'clean' dataset, free of noisy data.
Cleaning. We remove stop words, URLs, numbers, and punctua-
tion marks. Additionally, we perform normalization, i.e., we elimi-
nate repeated letters and repetitive characters which users often use
to express their feelings more intensely (e.g., the word 'hellooo' is
converted to 'hello').
Spam removal. Even though extensive work has been done on
spam detection in social media, e.g., [9, 24, 28], Twitter is still full
of spam accounts [5], often using vulgar language and exhibiting
behavior (repeated posts with similar content, mentions, or hash-
tags) that could also be considered as aggressive or bullying. So,
to eliminate part of this noise we proceeded with a first-level spam
removal process by considering two attributes which have already
been used as filters (e.g., [28]) to remove spam incidents: (i) the
number of hashtags per tweet (often used for boosting the visibility
of the posted tweets), and (ii) posting of (almost) similar tweets. To
find optimal cutoffs for these heuristics, we study both the distribu-
tion of hashtags and the duplication of tweets.
Hashtags. The hashtags distribution shows that users tend to use
from 0 to about 17 hashtags on average. With such information at
hand, we test different cutoffs to set a proper limit, upon which the
user could be characterized as spammer. After a manual inspection
on a sample of posts, we set the limit to 5 hashtags, i.e., users with
more than 5 hashtags, on average, are flagged as spammers, and
their tweets are removed from the dataset.
3
Figure 1: Similarity distribution.
Duplications. We also estimate the similarity of users' posts based
on an appropriate similarity measure. In many cases, a user's tweets
are (almost) the same, while only the listed mentioned users are
modified. So, in addition to the previous presented cleaning pro-
cesses, we also remove all existing mentions. We then proceed to
compute the Levenshtein distance [19], which counts the minimum
number of single-character edits needed to convert one string into
another, averaging it out over all pairs of their tweets. Initially, for
each user, we calculated the intra-tweet similarity, then we set to
out estimate the average intra-tweets similarity. For a user with x
tweets, we use a set of n similarity scores, where n = x(x − 1)/2.
In the end, all users with intra-tweet similarity above 0.8 are ex-
cluded from the dataset. Figure 1 shows that about 5% of the users
have a high percentage of similar posts and which were removed.
4. RESULTS
In this section, we present the results of our measurement-
based characterization, comparing the baseline and the Gamergate
(GG) related datasets across various dimensions, including user at-
tributes, posting activity, content semantics, and Twitter account
status.
4.1 How Active are Gamergaters?
Account age. An underlying question about the Gamergate contro-
versy is what started first: participants tweeting about it or Twitter
users participating in Gamergate? In other words, did Gamergate
draw people to Twitter, or were Twitter users drawn to Gamer-
gate? In Figure 2a, we plot the distribution of account age for
users in the Gamergate dataset and baseline users. For the most
part, GG users tend to have older accounts (mean = 982.94 days,
median = 788 days, ST D = 772.49 days). The mean, me-
dian, and STD values for the random users are 834.39, 522, and
652.42 days, respectively. Based on a two-sample Kolmogorov-
Smirnov test,3 the two distributions are different with a test statistic
D = 0.20142 and p < 0.01. Overall, the oldest account in our
dataset belongs to a GG user, while only 26.64% of baseline ac-
counts are older than the mean value of the GG users. Figure 2a
indicates that GG users were existing Twitter users drawn to the
controversy. In fact, their familiarity with Twitter could be the rea-
son that Gamergate exploded in the first place.
Tweets and Hashtags. In Figure 2b, we plot the distribution of
the number of tweets made by GG users and random users. GG
users are significantly more active than random Twitter users (D =
0.352, p < 0.01). The mean, median, and STD values for the GG
3A statistical test to compare the probability distributions of differ-
ent samples.
(a) Account age distribution.
(b) Posts distribution.
(c) Hashtags distribution.
Figure 2: CDF of (a) Account age, (b) Number of posts, and (c) Hashtags.
(a) Favorites distribution.
(b) Lists distribution.
(c) URLs distribution.
(d) Mentions distribution.
Figure 3: CDF of (a) Number of Favorites, (b) Lists, (c) URLs, (d) Mentions.
(random) users are 135,618 (49,342), 48,587 (9,429), and 185,997
(97,457) posts, resp. Figure 2c reports the CDF of the number
of hashtags found in users' tweets for both GG and the random
sample, finding that GG users use significantly (D = 0.25681,
p < 0.01) more hashtags than random Twitter users.
Other characteristics. Figures 3a and 3b show the CDFs of fa-
vorites and lists declared in the users' profiles. We note that in
the median case, GG users are similar to baseline users, but on the
tail end (30% of users), GG users have more favorites and topi-
cal lists declared than random users. Then, Figure 3c reports the
CDF of the number of URLs found in tweets by both baseline and
GG users. The former post fewer URLs (the median indicates a
difference of 1-2 URLs, D = 0.26659, p < 0.01), while the lat-
ter post more in an attempt to disseminate information about their
"cause," somewhat using Twitter like a news service. Finally, Fig-
ure 3d shows that GG users tend to make more mentions within
their posts, which can be ascribed to the higher number of direct
attacks compared to random users.
Take aways. Overall, the behavior we observe is indicative of GG
users' "mastery" of Twitter as a mechanism for broadcasting their
ideals. They make use of more advanced features, e.g., lists, tend
to favorite more tweets, and share more URLs and hashtags than
random users. Using hashtags and mentions can draw attention to
their message, thus GG users likely use them to disseminate their
ideas deeper in the Twitter network, possibly aiming to attack more
users and topical groups.
4.2 How Social are Gamergaters?
Gamergaters are involved in what we would typically think of
as anti-social behavior. However, this is somewhat at odds with
the fact that their activity takes place primarily on social media.
Aiming to give an idea of how "social" Gamergaters are, in Fig-
(a) Friends distribution.
(b) Followers distribution.
Figure 4: CDF of (a) Number of Friends, (b) Followers.
ures 4a and 4b, we plot the distribution of friends and followers
for GG users vs baseline users. We observe that, perhaps surpris-
ingly, GG users tend to have more friends and followers (D = 0.34
and 0.39, p < 0.01 for both). Although this might be somewhat
counter-intuitive, the reality is that Gamergate was born on social
media, and the controversy appears to be a clear "us vs. them" sit-
uation. This leads to easy identification of in-group membership,
thus heightening the likelihood of relationship formation.
The ease of in-group membership identification is somewhat dif-
ferent than polarizing issues in the real world where it may be diffi-
cult to know a person's views on a polarizing subject, without actu-
ally engaging them on the subject. In fact, people in real life might
be unwilling to express their viewpoint because of social conse-
quences. On the contrary, on social media platforms like Twitter,
(pseudo-)anonymity often removes much of the inhibition people
feel in the real world, and public timelines can often provide per-
sistent and explicit expression of viewpoints.
4
(a) Emoticons distribution.
(b) Uppercases distribution.
(c) Sentiment distribution.
(d) Joy distribution.
Figure 5: CDF of (a) Emoticons, (b) Uppercases, (c) Sentiment, (d) Joy.
4.3 How Different is Gamergater's Content?
Emoticons and Uppercase Tweets. Two common ways to express
emotion in social media are emoticons and "shouting" by using all
capital letters. Based on the nature of Gamergate, we would expect
a relatively low number of emoticon usage, but many tweets that
would be shouting in all uppercase letters. However, as we can
see in Figures 5a and 5b, which plot the CDF of emoticon usage
and all uppercase tweets, respectively, this is not the case. GG
and random users tend to use emoticons at about the same rate (we
are unable to reject the null hypothesis with D = 0.028 and p =
0.96). However, GG users tend to use all uppercase less often (D =
0.212, p < 0.01). As mentioned, GG users are savvy Twitter users,
and generally speaking, shouting tends to be ignored. Thus, one
explanation for this behavior is that GG users avoid such a simple
"tell" as posting in all uppercase, to ensure their message is not so
easily dismissed.
Sentiment. In Figure 5c, we plot the CDF of sentiment of tweets.
In both cases (GG and baseline) around 25% of tweets are posi-
tive. However, GG users post tweets with a generally more nega-
tive sentiment (D = 0.101, p < 0.01). In particular, around 25%
of GG tweets are negative compared to only around 15% for base-
line users. This observation aligns with the fact that the GG dataset
contains a large proportion of offensive posts.
We also compare the offensiveness score of tweets according to
Hatebase, a crowdsourced list of hate words. Each word included in
HB is scored on a [0, 100] scale, which indicates how hateful it is.
Though the difference is slight, GG users use more hate words than
random users (D = 0.006, p < 0.01). The mean and standard
deviation values for HB score are 0.06 and 2.16 for the baseline
users, while for the GG users they are 0.25 and 3.55, respectively.
Finally, based on [4], we extract sentiment values for 6 differ-
ent emotions: anger, disgust, fear, joy, sadness, and surprise. We
note that of these, the 2-sample KS test is unable to reject the null
hypothesis except for joy, as shown in Figure 5d (D = 0.089,
p < 0.01). This is particularly interesting because it contradicts
the narrative that Gamergaters are posting virulent content out of
anger. Instead, GG users are less joyful, and this is a subtle but
important difference: they are not necessarily angry, but they are
apparently not happy.
4.4 Are Gamergaters Suspended More Often?
A Twitter user can be in one of the following three statuses: ac-
tive, deleted, or suspended. Typically, Twitter suspends an account
(temporarily or even permanently, in some cases) if it has been hi-
jacked/compromised, is considered spam/fake, or if it is abusive.4
4 https://support.twitter.com/articles/15790
Baseline
Gamergate
active
67%
86%
deleted
13%
5%
suspended
20%
9%
Table 1: Status distribution.
A user account is deleted if the user-owner of the account deacti-
vates their account. In the following, we examine the differences
among these three statuses with respect to GG and baseline users.
To examine these differences, we focus on a sample of 33k users
from both the GG and baseline datasets. From Table 1, we ob-
serve that, in both cases, users tend to be suspended more often
than deleting their accounts by choice. However, baseline users are
more prone to be suspended (20%) or delete their accounts (13%)
than GG users (9% and 5%, respectively). This seems to be in
line with the behavior observed in Figure 2a, which shows that GG
users have been in the platform for a longer period of time; some-
what surprising given their exhibited behavior. Indeed, a small por-
tion of these users may be spammers who are difficult to detect
and filter out. Nevertheless, Twitter has made significant efforts to
address spam and we suspect there is a higher presence of such ac-
counts in the baseline dataset, since the GG dataset is very much
focused around a somewhat niche topic.
These efforts are less apparent when it comes to the bullying
and aggressive behavior phenomena observed on Twitter in gen-
eral [22, 26], and in our study of Gamergate users in particular.
However, recently, Twitter has increased its efforts to combat the
existing harassment cases, for instance, by preventing suspended
users from creating new accounts [21], or temporarily limiting
users for abusive behavior [25]. Such efforts constitute initial steps
to deal with the ongoing war among the abusers, their victims, and
online bystanders.
5. CONCLUSION
This paper presented a first-of-its-kind effort to quantitatively an-
alyze the Gamergate controversy. We collected 1.6M tweets from
340k unique users using a generic methodology (which can also be
used for other platforms and other case studies). Although focused
on a narrow slice of time, we found that, in general, users tweeting
about Gamergate appear to be Twitter savvy and quite engaged with
the platform. They produce more tweets than random users, and
have more friends and followers as well. Surprisingly, we observed
that, while expressing more negative sentiment overall, these users
only differed significantly from random users with respect to joy.
Finally, we looked at account suspension, finding that Gamergate
5
users are less likely to be suspended due to the inherent difficulties
in detecting and combating online harassment activities.
While we believe our work contributes to understanding large-
scale online harassment, it is only a start. As part of future work,
we plan to perform a more in-depth study of Gamergate, focusing
on how it evolved over time. Overall, we argue that a deeper under-
standing of how online harassment campaigns function can enable
our community to better address them and propose detection tools
as well as mitigation strategies.
Acknowledgements. This work has been funded by the Euro-
pean Commission as part of the ENCASE project (H2020-MSCA-
RISE), under GA number 691025.
6. REFERENCES
[1] Anonymous. "i dated zoe quinn". 4chan.
https://archive.is/qrS5Q.
[2] Anonymous. Zoe Quinn, prominent SJW and indie developer
is a liar and a slut. 4chan. https://archive.is/QIjm3.
[3] D. Chatzakou, N. Kourtellis, J. Blackburn, E. D. Cristofaro,
G. Stringhini, and A. Vakali. Mean Birds: Detecting
Aggression and Bullying on Twitter. arXiv preprint,
arXiv:1702.06877, 2017.
[4] D. Chatzakou, V. A. Koutsonikola, A. Vakali, and
K. Kafetsios. Micro-blogging content analysis via
emotionally-driven clustering. In ACII, 2013.
[5] C. Chen, J. Zhang, X. Chen, Y. Xiang, and W. Zhou. 6
million spam tweets: A large ground truth for timely Twitter
spam detection. In IEEE ICC, 2015.
[6] Y. Chen, Y. Zhou, S. Zhu, and H. Xu. Detecting Offensive
Language in Social Media to Protect Adolescent Online
Safety. In PASSAT and SocialCom, 2012.
[7] K. Dinakar, R. Reichart, and H. Lieberman. Modeling the
detection of textual cyberbullying. The Social Mobile Web,
11, 2011.
[8] N. Djuric, J. Zhou, R. Morris, M. Grbovic, V. Radosavljevic,
and N. Bhamidipati. Hate Speech Detection with Comment
Embeddings. In WWW, 2015.
[9] M. Giatsoglou, D. Chatzakou, N. Shah, A. Beutel,
C. Faloutsos, and A. Vakali. Nd-sync: Detecting
synchronized fraud activities. In Advances in Knowledge
Discovery and Data Mining, 19th Pacific-Asia Conference,
2015.
[10] A. Go, R. Bhayani, and L. Huang. Twitter sentiment
classification using distant supervision. Processing, 2009.
[11] J. Guberman and L. Hemphill. Challenges in modifying
existing scales for detecting harassment in individual tweets.
In System Sciences, 2017.
[12] A. Hern. Feminist critics of video games facing threats in
'gamergate' campaign. The Guardian, Oct 2014.
https://www.theguardian.com/technology/2014/oct/23/
felicia-days-public-details-online-gamergate.
[13] G. E. Hine, J. Onaolapo, E. De Cristofaro, N. Kourtellis,
I. Leontiadis, R. Samaras, G. Stringhini, and J. Blackburn. A
longitudinal measurement study of 4chan's politically
incorrect forum and its effect on the web. arXiv preprint
arXiv:1610.03452, 2016.
[14] H. Hosseinmardi, R. Han, Q. Lv, S. Mishra, and
A. Ghasemianlangroodi. Towards understanding
cyberbullying behavior in a semi-anonymous social network.
In IEEE/ACM ASONAM, 2014.
[15] H. Hosseinmardi, S. A. Mattson, R. I. Rafiq, R. Han, Q. Lv,
and S. Mishra. Analyzing Labeled Cyberbullying Incidents
on the Instagram Social Network. In SocInfo, 2015.
[16] I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi, and
F. Bonchi. The Social World of Content Abusers in
Community Question Answering. In WWW, 2015.
[17] A. Massanari. #gamergate and the fappening: How reddit's
algorithm, governance, and culture support toxic
technocultures. New Media & Society, 2015.
[18] T. E. Mortensen. Anger, fear, and games. Games and
Culture, 2016.
[19] G. Navarro. A Guided Tour to Approximate String Matching.
ACM Comput. Surv., 33(1), 2001.
[20] C. Nobata, J. Tetreault, A. Thomas, Y. Mehdad, and
Y. Chang. Abusive Language Detection in Online User
Content. In WWW, 2016.
[21] Pham, Sherisse. Twitter tries new measures in crackdown on
harassment. CNNtech, February 2017.
http://money.cnn.com/2017/02/07/technology/
twitter-combat-harassment-features/.
[22] Twitter trolls are now abusing the company's bottom line.
http://www.salon.com/2016/10/19/
twitter-trolls-are-now-abusing-the-companys-bottom-line/,
2016.
[23] H. Sanchez and S. Kumar. Twitter bullying detection. ser.
NSDI, 12, 2011.
[24] G. Stringhini, C. Kruegel, and G. Vigna. Detecting
spammers on social networks. In ACSAC, 2010.
[25] A. Sulleyman. Twitter temporarily limiting users for abusive
behaviour. Independent, February 2017.
https://www.theguardian.com/technology/2014/oct/23/
felicia-days-public-details-online-gamergate.
[26] The Guardian. Did trolls cost Twitter 3.5bn and its sale?
https://www.theguardian.com/technology/2016/oct/18/
did-trolls-cost-twitter-35bn, 2016.
[27] C. Van Hee, E. Lefever, B. Verhoeven, J. Mennes,
B. Desmet, G. De Pauw, W. Daelemans, and V. Hoste.
Automatic detection and prevention of cyberbullying. In
Human and Social Analytics, 2015.
[28] A. H. Wang. Don't follow me: Spam detection in Twitter. In
SECRYPT, 2010.
[29] N. Wingfield. Feminist critics of video games facing threats
in 'gamergate' campaign. New York Times, Oct 2014.
https://www.nytimes.com/2014/10/16/technology/
gamergate-women-video-game-threats-anita-sarkeesian.
html.
6
|
1802.02996 | 1 | 1802 | 2018-02-08T18:25:22 | A Longitudinal Study of Google Play | [
"cs.SI",
"cs.CY"
] | The difficulty of large scale monitoring of app markets affects our understanding of their dynamics. This is particularly true for dimensions such as app update frequency, control and pricing, the impact of developer actions on app popularity, as well as coveted membership in top app lists. In this paper we perform a detailed temporal analysis on two datasets we have collected from the Google Play Store, one consisting of 160,000 apps and the other of 87,223 newly released apps. We have monitored and collected data about these apps over more than 6 months. Our results show that a high number of these apps have not been updated over the monitoring interval. Moreover, these apps are controlled by a few developers that dominate the total number of app downloads. We observe that infrequently updated apps significantly impact the median app price. However, a changing app price does not correlate with the download count. Furthermore, we show that apps that attain higher ranks have better stability in top app lists. We show that app market analytics can help detect emerging threat vectors, and identify search rank fraud and even malware. Further, we discuss the research implications of app market analytics on improving developer and user experiences. | cs.SI | cs | A Longitudinal Study of Google Play
Rahul Potharaju∗, Mizanur Rahman†, Bogdan Carbunar†
∗Cloud and Information Services Lab, Microsoft
†Florida International University
1
8
1
0
2
b
e
F
8
]
I
S
.
s
c
[
1
v
6
9
9
2
0
.
2
0
8
1
:
v
i
X
r
a
Abstract-The difficulty of
large scale monitoring of app
markets affects our understanding of their dynamics. This is
particularly true for dimensions such as app update frequency,
control and pricing, the impact of developer actions on app
popularity, as well as coveted membership in top app lists. In this
paper we perform a detailed temporal analysis on two datasets
we have collected from the Google Play Store, one consisting
of 160,000 apps and the other of 87,223 newly released apps.
We have monitored and collected data about these apps over
more than 6 months. Our results show that a high number of
these apps have not been updated over the monitoring interval.
Moreover, these apps are controlled by a few developers that
dominate the total number of app downloads. We observe that
infrequently updated apps significantly impact the median app
price. However, a changing app price does not correlate with
the download count. Furthermore, we show that apps that attain
higher ranks have better stability in top app lists. We show that
app market analytics can help detect emerging threat vectors, and
identify search rank fraud and even malware. Further, we discuss
the research implications of app market analytics on improving
developer and user experiences.
I. INTRODUCTION
The revolution in mobile device technology and the emer-
gence of "app markets", have empowered regular users to
evolve from technology consumers to enablers of novel mobile
experiences. App markets such as Google Play provide new
mechanisms for software distribution, collecting software writ-
ten by developers and making it available to smartphone users.
This centralized approach to software distribution contrasts the
desktop paradigm, where users obtain their software directly
from developers.
Developers and users play key roles in determining the
impact that market interactions have on future technology.
However,
the lack of a clear understanding of the inner
workings and dynamics of popular app markets, impacts both
developers and users. For instance, app markets provide no
information on the impact that developer actions will likely
have on the success of their apps, or guidance to users when
choosing apps, e.g., among apps claiming similar functionality.
This situation is exploited however by fraudulent and mali-
cious developers. The success of Google Play and the incentive
model it offers to popular apps 1, make it an appealing target
for fraudulent and malicious behaviors. Fraudulent developers
have been shown to attempt to engineer the search rank of
their apps [34], while malicious developers have been shown
A preliminary version of this paper appears in ASONAM 2015.
This research was supported in part by NSF grants 1527153, 1526494 and
1450619, and by DoD grant W911NF-13-1-0142.
1 Google offers financial incentives for contribution to app development,
by making revenue sharing transparent for developers (70-to-30 cut, where
developers get 70% of the revenue).
to use app markets as a launch pad for their malware [26],
[28], [33], [20].
Contributions. In this article we seek to shed light on the
dynamics of Google Play,
the most popular Android app
market. We report results from one of the first characteristic
studies on Google Play, using real-world time series data. To
this end, we have developed iMarket, a prototype app market
crawling system. We have used iMarket to collect data from
more than 470,000 Google Play apps, and daily monitor more
than 160,000 apps, over more than 6 months.
We use this data to study two key aspects of Google Play.
First, we seek to understand the dynamics of the market in
general, from an application and developer perspective. For
this, we evaluate the frequency and characteristics of app
updates (e.g., their effects on bandwidth consumption), and
use the results to determine if developers price their apps
appropriately. We show that only 24% of the 160,000 app
that we monitored have received an update within 6 months,
and at most 50% of the apps in any category have received
an update within a year from our observation period. We
conclude that market inactivity has a significant impact on
the price distribution. Therefore, while pricing is an important
and complex task, relying on statistics computed on the entire
population (as opposed to only active apps) may mislead de-
velopers, e.g., to undersell their apps (§VI-A). Also, we show
that typical app update cycles are bi-weekly or monthly. More
frequently updated apps (under beta-testing or unstable) can
impose substantial bandwidth overhead and expose themselves
to negative reviews (§VI-C).
To evaluate the developer impact, we first seek to verify our
hypothesis that a few developers control the app market supply.
Our analysis reveals however that developers that create many
applications are not creating many popular applications. In-
stead, we discovered that a few elite developers are responsible
for applications that dominate the total number of downloads
(§VII). Second, we evaluate the impact of developer actions on
the popularity of their apps. We show that few apps frequently
change prices, and with every subsequent software update,
a developer is more likely to decrease the price. However,
changing the price does not show an observable association
with the app's download count(§VII).
A second key aspect of Google Play that we study is the
temporal evolution of top-k ranked lists maintained by the
market. Top-k lists reveal the most popular applications in
various categories. We show that a majority of apps in top-k
app lists follow a "birth-growth-decline-death" process: they
enter and exit from the bottom part of a list. Apps that attain
higher ranks have better stability in top-k lists than apps that
are at lower ranks (§VIII).
Impact of the study. A longitudinal study of Google Play app
metadata can provide unique information that is not available
through the standard approach of capturing a single app
snapshot. Features extracted from a longitudinal app analysis
(e.g., permission, price, update, download count changes) can
provide insights into fraudulent app promotion and malware
indicator behaviors. For instance, spikes in the number of
positive or negative reviews and the number of downloads
received by an app can indicate app search optimization cam-
paigns launched by fraudsters recruited through crowdsourcing
sites. Frequent, substantial app updates may indicate Denial of
Service (DoS) attacks, while permission changes can indicate
benign apps turning malicious see § IX-A. Features extracted
from a longitudinal app monitoring can be used to train
supervised learning algorithms to detect such behaviors.
In addition, a detailed longitudinal study of Google Play
apps can improve developer and user experiences. For in-
stance, app development tools can help developers optimize
the success of their apps. Such tools can integrate predictions
of the impact that price, permissions and code changes will
have on the app's popularity, as well as insights extracted from
user reviews. In addition, visualizations of conclusions, and
analytics similar to the ones we perform in this paper, can help
users choose among apps with similar claimed functionality.
We include a detailed discussion of the applicability and
future research directions in app market analytics in §IX.
II. RELATED WORK
This article extends our preliminary work [10] with iMarket,
the market crawler we developed and used to collect the data,
new scores to evaluate the evolution and variability of top-k
lists and new experiments and evaluations.
Viennot et al. [35] developed PlayDrone, a crawler to
collect Google Play data. Their main finding is that Google
Play developers often include secret key information in the
released apps, making them vulnerable to attacks. They further
analyze the data and show that Google Play content evolves
quickly in time, that 25% of apps are clones, and that native
experience correlates strongly to popularity. The analysis is
performed over data collected for 3 non-contiguous months
(May/June 2013 and November 2013). In contrast, our analysis
is performed over apps monitored daily over more than 6
months. Furthermore, our analysis includes orthogonal app
market dynamics dimensions, that include the frequency and
cycles of app updates, the developer impact and control on the
app market, and the dynamics of top-k lists.
Zhong and Michahelles [40] analyze a dataset of Google
Play transactions, and suggest that Google Play is more of
a "Superstar" market (i.e., dominated by popular hit prod-
ucts) than a "Long-tail" market (i.e., where unpopular niche
products contribute to a substantial portion of popularity).
In addition, Zhong and Michahelles [40] show that certain
expensive professional apps attract disproportionately large
sales. This is consistent with our finding that a few developers
are responsible for the most popular apps.
Moller et al. [29] use an app they posted on Google Play
to study the correlation between published updates and their
2
actual installations. They show that 7 days after a security
update is published, almost half of the app's users still use
an older, vulnerable version. Liu et al. [25] use a dataset of
1,597 ranked mobile apps to conclude that the "freemium"
strategy is positively associated with increased sales volume
and revenue of the paid apps. Moreover, they show that free
apps that rate higher contribute to higher revenue for the
paid version. We note that our work studies a multitude of
previously unanswered questions about Google Play, regarding
app update frequency and pricing appropriateness, and the
evolution of top-k lists.
Petsas et al. [30] explored mobile app markets in the context
of 4 providers, that do not include Google Play. They show
that the distribution of app popularity deviates from Zipf, due
in part to a strong temporal affinity of user downloads to app
categories. They show that on the markets they studied, paid
apps follow a different popularity distribution than free apps.
In contrast, our work exclusively analyzes Google Play, the
most popular Android app market. In addition, we focus on
different dimensions: (i) app update frequency and its effect on
app pricing and resource consumption, (ii) the control of the
market and the effect of developer actions on the popularity
of their apps and (iii) the evolution in time of top apps and
top-k app lists.
Xu et al. [39] use IP-level traces from a tier-1 cellular
network provider to understand the behavior of mobile apps.
They provide an orthogonal analysis of spatial and temporal
locality, geographic coverage, and daily usage patterns.
Security has been a theme in the large scale collection of
mobile apps. Previous work includes malware detection [42],
malware analysis [41], malicious ad libraries [19], vulner-
ability assessment [15], overprivilege identication [16] and
detection of privacy leaks [14]. While in this paper we focus
on the different problem of understanding the dynamics of
Google Play, we also introduce novel mobile app attacks.
III. GOOGLE PLAY OVERVIEW
App Distribution Channel: Google Play is the app distri-
bution channel hosted by Google. Each app submitted by
a developer gets an entry on the market in the form of a
webpage, accessible to users through either the Google Play
homepage or the search interface. This webpage contains
meta-information that keeps track of information pertaining
to the application (e.g., name, category, version, size, prices).
In addition, Google Play lists apps according to several cate-
gories, ranging from "Arcarde & Action" to "Weather". Users
download and install apps of interest, which they can then
review. A review has a rating ranging from 1 to 5. Each
app has an aggregate rating, an average over all the user
ratings received. The app's webpage also includes its usage
statistics (e.g., rating, number of installs, user reviews). This
information is used by users when they are deciding to install
a new application.
App Development: In order to submit apps to Google Play, an
Android developer first needs to obtain a publisher account for
a one-time fee of $25. The fee encourages higher quality prod-
ucts and reduces spam [18]. Google does not limit the number
SMARTPHONE MARKET
http request
raw app html page
DISTRIBUTED CRAWLER
Scheduler
Request Queue
Ban Detection Engine
Loop Detection Engine
+
Server
Rotator
Proxy
Rotator
RESOURCE POOL
Server Pool
(700 machines)
Proxy Pool
(230 proxies)
hundreds of thousands
of raw html pages
newly discovered
packages
PROCESSING ENGINE
Map-Reduce Parser
Assertion Checker/
Format Invalidator
Raw HTML
App Pages
Formatted
Daily Snapshot
DATA MANAGEMENT
Archived
Storage
raw html
pages
Backup Manager
Database Engine
SQL
Database
Fig. 1. Architecture of iMarket, the developed GooglePlay crawler. It consists
of a distributed crawler, processing engine and data management components.
of apps that can be submitted by developers. As a measure to
reduce spam, Google recently started the Bouncer [3] service,
which provides automated scanning of applications on Google
Play for potential malware. Developers can sell their apps for
a price of their choice, or distribute them for free.
Permission Model: Android follows the Capability-based [24]
security model. Each app must declare the list of capabilities
(permissions) it requires in a manifest file called Android-
Manifest.xml. When a user downloads an app through the
Google Play website, the user is shown a screen that displays
the permissions requested by the application. Installing the
application means granting the application all the requested
permissions i.e. an all-or-none approach.
IV. DATA COLLECTION
We use snapshot to refer to the entire state of the market
i.e., it contains meta information of all apps. We first describe
iMarket, our app market crawler, then describe the datasets
that we collected from Google Play.
A. The iMarket Crawler
iMarket, our prototype market crawling system (see Figure 1
for an overview) consists of three main components. First,
the Distributed Crawler component, which is responsible
for crawling the target market and collecting information on
various apps that are accessible from the current geographical
location. We initially leveraged hundreds of foreign proxies to
address challenge 3 above. However, we later decided to rely
only on local US-based proxies for stability reasons. While
this trades-off completeness for consistency, having continu-
ous information about a few apps improves the accuracy of
most statistical inference tasks compared to having discrete
information about hundreds of thousands of apps.
To seed our distributed crawler, we initially ran it using a
list consisting of about 200 randomly hand-picked apps from
different categories. To address Challenge 1, our app discovery
process is designed as follows: After retrieving each page, the
3
"Similar Apps" portion of the raw HTML page is parsed to
obtain a new list of packages. These packages are queued for
crawling and simultaneously appended to the previous day's
package list. We have also detected a ban detection engine
in place that deactivates servers once it observes a threshold
number of "404 Not Found" messages (Challenge 2) from the
market provider.
The second component, the "Processing Engine" contains
a Map-Reduce Parser component that uses the map-reduce
paradigm [13] to handle parsing of hundreds of thousands of
raw HTML app pages. In the "map" stage, a chunk of files
(≈10K) are mapped onto each of the 700 machines and a
parser (written in Python) parses these HTML and extracts
the meta information. In the "reduce" stage, these individual
files are combined into a single file and de-duplicated to
maintain data integrity. This stage takes ≈1-1.5 hours. After
constructing the aggregate file, we address Challenge 3 using
the assertion checker that takes a best-effort approach to ensure
that all the information has been correctly parsed from the raw
files. Note that despite our best-effort approach, our dataset
still contained some missing information due to temporary
unavailability/maintenance of servers.
The third, "Data Management" component, archives the raw
HTML pages (≈14 GB compressed/day) in a cloud storage to
support any ad hoc processing for other tasks (e.g., analyzing
HTML source code complexity) and subsequently removed
from the main servers. To address Challenge 4, the formatted
daily snapshot (≈200 MB/day) is then inserted into a database
to support data analytics. We setup the relevant SQL Jobs
to ensure that indexes are re-built every two days - this
step significantly speeds up SQL queries. Our six months of
archived raw files consume ≈7 TB of storage and the database
consumes ≈400 GB including index files.
V. DATA
We used iMarket to collect two Google Play datasets, which
we call dataset.2012 and dataset.14-15.
A. Dataset.2012
We have used a total of 700 machines 2 for a period of
7.5 months (February 2012 - November 2012) to collect data
from 470,000 apps. The first 1.5 months are the "warm up"
interval. We do not consider data collected during this period
for subsequent analysis. Instead, we focus on a subset of 160K
apps for which we have collected the following data:
GOOGPLAY-FULL: We used iMarket to take daily snapshots
of Google Play store from April - November, 2012. For each
app, we have daily snapshots of application meta-information
consisting of the developer name, category, downloads (as
a range i.e., 10-100, 1K-5K etc.), ratings (on a 0-5 scale),
ratings count (absolute number of user ratings), last updated
timestamp, software version, OS supported, file size, price, url
and the set of permissions that the app requests. Figure 2(a)
shows the distribution of apps by category. While overall, the
2We have used 700 machines, each with a different IP address and from a
different subnet, in order to avoid getting banned during the crawling process.
y
r
o
g
e
t
a
C
Weather
Travel & Local
Transportation
Tools
Sports Games
Sports
Social
Shopping
Racing
Productivity
Photography
Personalization
News & Magazines
Music & Audio
Medical
Media & Video
Lifestyle
Libraries & Demo
Health & Fitness
Finance
Entertainment
Education
Communication
Comics
Casual
Cards & Casino
Business
Brain & Puzzle
Books & Reference
Arcade & Action
0
10000
20000
# Applications
30000
40000
50000
(a)
4
Free
Paid
Type
Free
Paid
y
r
o
g
e
t
a
C
Weather
Trivia
Travel&Local
Transportation
Tools
Sports
Social
Simulation
Shopping
Racing
Productivity
Photography
Personalization
News&Magazines
Music&Audio
Medical
Media&Video
Lifestyle
Libraries&Demo
Health&Fitness
Finance
Entertainment
Education
Communication
Comics
Casual
Card&Casino
Business
Brain&Puzzle
Books&Reference
Arcade&Action
0
2000
# Applications
4000
(b)
Fig. 2. Distribution of free vs. paid apps, by category, for (a) dataset.2012 and dataset.14-15. The number of free apps exceeds the number of paid ones
especially in dataset.14-15. We conjecture that this occurs due to user tendency to install more free apps than paid apps. Since 2012, developers may have
switched from a direct payment model for paid apps, to an ad based revenue model for free apps.
y
r
o
g
e
t
a
C
Weather
Travel & Local
Transportation
Tools
Sports Games
Sports
Social
Shopping
Racing
Productivity
Photography
Personalization
News & Magazines
Music & Audio
Medical
Media & Video
Lifestyle
Libraries & Demo
Health & Fitness
Finance
Entertainment
Education
Communication
Comics
Casual
Cards & Casino
Business
Brain & Puzzle
Books & Reference
Arcade & Action
0
11/24/2012
365
1 yr
Age Since Last Update (in days)
1095
3 yrs
730
2 yrs
y
r
o
g
e
t
a
C
Weather
Travel & Local
Transportation
Tools
Sports
Social
Shopping
Racing
Brain & Puzzle
Productivity
Photography
Personalization
News & Magazines
Music & Audio
Medical
Media & Video
Lifestyle
Libraries & Demo
Health & Fitness
Finance
Family
Entertainment
Education
Communication
Comics
Casual
Cards & Casino
Business
Books & Reference
Arcade & Action
0
1465
4 yrs
100
200
Age Since Last Update (in days)
300
400
(a)
(b)
Fig. 3. Box and whiskers plot of the time distribution from the last update, by app category, for (a) dataset.2012: at most 50% of the apps in each category
have received an update within a year and (b) dataset.14-15: at most 50% of the apps in each category have received an update within 35 days. This may
occur since new apps are likely to have more bugs and receive more attention from developers.
number of free apps exceed the number of paid apps, several
popular categories such as "Personalization" and "Books &
References" are dominated by paid apps.
GOOGPLAY-TOPK: Google publishes several lists, e.g., Free
(most popular apps), Paid (most popular paid), New (Free)
(newly released free apps), New (Paid) (newly released paid)
and Gross (highly grossing apps). Each list is divided into
≈20 pages, each page consisting of 24 apps. These lists are
typically updated based on application arrival and the schedule
of Google's ranking algorithms. Since we cannot be notified
when the list changes, we took hourly snapshots of the lists.
Our GOOGPLAY-TOPK consists of hourly snapshots of five
top-k lists (≈ 3000 apps) from Jul-Nov, 2012 (≈2880 hours
worth of data).
B. Dataset.14-15
Further, we have used a dataset of more than 87,000 newly
released apps that we have monitored over more than 6
months [32]. Specifically, we have collected newly released
apps once a week, from Google Play's "New Release" links,
to both free and paid apps. We have validated each app based
on the date of the app's first review: we have discarded apps
whose first review was more than 40 days ago. We have
collected 87,223 new releases between July and October 2014,
all having less than 100 reviews.
We have then monitored and collected data from these
87,223 apps between October 24, 2014 and May 5, 2015.
Specifically, for each app we captured "snapshots" of its
Google Play metadata, twice a week. An app snapshot consists
of values for all its time varying variables, e.g., the reviews, the
rating and install counts, and the set of requested permissions.
For each of the 2, 850, 705 reviews we have collected from the
87, 223 apps, we recorded the reviewer's name and id, date of
review, review title, text, and rating.
Figure 2(b) shows the distribution of apps by category. With
the exception of the "Personalization" category, the number of
free apps significantly exceeds the number of paid apps. We
have observed that consistently through our collection effort,
we identified fewer top paid than free new releases. One reason
for this may be that users tend to install more free apps than
paid apps. Thus, not only developers may develop fewer paid
apps, but paid apps may find it hard to compete against free
5
versions. We note that free apps bring revenue through ads.
Class
# download % Dataset.2012 % Dataset.14-15
VI. POPULARITY AND STALENESS
We first evaluate the fraction of apps that are active, and
discuss the implications this can have on app pricing. We
then classify apps based on their popularity, and study the
distribution of per-app rating counts. Finally, we study the
frequency of app updates for apps from various classes and the
implications they can have on end-users. All the analysis pre-
sented in this section is performed using GOOGPLAY-FULL.
A. Market Staleness
An important property of a market is its "activity", or how
frequently are apps being maintained. We say that an app is
stale if it has not been updated within the last year from the
observation period, and active otherwise.
The task of setting the app price is complex. However, rely-
ing on statistics computed on the entire population, as opposed
to only active apps, may mislead developers. For instance,
given that the listing price of apps forms a key component
of its valuation and sale, this becomes an important factor
for fresh developers trying to enter the market. Specifically,
the median price in our dataset is $0.99 when all apps are
considered and $1.31 when considering only active apps. This
confirm our intuition that developers that set their price based
on the former value are likely to sell their apps at lower profits.
Figure 3(a) shows the box and whiskers plot [8] of the
per-app time since the last update, by app category, for
dataset.2012. At most 50% of the apps in each category have
received an update within a year from our observation period.
For instance, most apps in Libraries & Demo have not been
updated within the last 1.5 years. Some categories such as
Arcade & Action, Casual, Entertainment, Books & Reference,
Tools contain apps that are older than three years.
Figure 3(b) plots this data for dataset.14-15. Many freshly
uploaded apps were uploaded more recently: 50% apps in each
category receive an update within 35 days, while apps in the
"Social" and "Tools" categories received updates even within
15 days. This is natural, as new apps may have more bugs and
receive more developer attention.
Several reasons may explain the lack of updates received by
many of the apps we monitored. First, some apps are either
stable or classic (time-insensitive apps, not expected to change)
and do not require an update. Other apps, e.g., e-books,
wallpapers, libraries, do not require an update. Finally, many
of the apps we monitored seemed to have been abandoned.
Unpopular
Popular
Most-Popular
0 – 103
103 – 105
> 105
74.14
24.1
0.7
77.55
18.43
4.00
Popularity classes of apps, along with their distribution. Dataset.14-15 has a
higher percentage of most-popular apps.
TABLE I
Table I shows the criteria for the 3 classes and the distri-
bution of the apps in dataset.2012 and dataset.14-15 in these
classes. The newly released apps have a higher percentage of
unpopular apps, however, surprisingly, they also have a higher
percentage of "most-popular" apps. This may be due to the
fact that the newly released apps are more recent, coming at a
time of higher popularity of mobile app markets, and maturity
of search rank fraud markets (see § IX-A).
Figure 4 (top) depicts the distribution of rating counts of
apps from dataset.2012, split by categories. We observe that
the Business and Comics categories do not have any apps in the
Most-Popular class, likely because of narrow audiences. From
our data, we observed that the median price of apps ($1.99)
in these categories is significantly higher than the population
($1.31) indicating lower competition. The population in other
categories is quite diverse with a number of outliers. For
instance, as expected, "Angry Birds" and "Facebook" are most
popular among the Most-Popular class for Arcade & Action
and Social categories, respectively. On the other hand, the
distribution is almost symmetric in case of Unpopular except
Business and Medical categories where there are a number
of outliers that are significantly different from the rest of the
population. We found that these are trending apps - apps that
are gaining popularity. For instance, the free app "Lync 2010"
from "Microsoft Corporation" in Business has 997 ratings. In
case of Popular, the distributions for most of the categories
are symmetric and span roughly from 1, 000 to 100K ratings
where 75% of apps have less than 10, 000 rating counts except
Arcade & Action category.
Figure 4 (bottom) shows the same distribution for the apps
in dataset.14-15. We emphasize that the distribution is plotted
over the ratings counts at the end of the observation interval.
Since these are newer apps than those in dataset.2012, it is
natural that they receive fewer ratings. We also observe that
several categories do not have apps that are in the "most
popular" category,
including the "Business", "Libraries &
Demo" and "Medical" categories.
C. App Updates
B. App Popularity
We propose to use the download count to determine app
popularity. Higher rating counts mean higher popularity but
not necessarily higher quality (e.g., an app could attract many
negative ratings). Including unpopular apps will likely affect
statistics such as update frequencies: including unpopular apps
will lead to a seemingly counter-intuitive finding, indicating
that most apps do not receive any updates. Therefore, we
classify apps according to their popularity into three classes,
"unpopular", "popular" and "most-popular".
Updates form a critical and often the last part of the software
lifecycle [17]. We are interested in determining if mobile
app developers prefer seamless updating i.e., if they push out
releases within short time periods.
Fig. 5(a) shows the distribution of the number of updates
received by the apps in dataset.2012. Only 24% apps have
received at least one update within our observation period -
nearly 76% have never been updated. In contrast, Fig. 5(b)
shows that 35% of the "fresh" apps in dataset.14-15 have
received at least one update within our observation period.
6
1e+05
1e+05
1e+06
Ratings Count
Most Popular
1e+04
Ratings Count
Popular
y
r
o
g
e
t
a
C
Weather
Travel & Local
Transportation
Tools
Sports Games
Sports
Social
Shopping
Racing
Productivity
Photography
Personalization
News & Magazines
Music & Audio
Medical
Media & Video
Lifestyle
Libraries & Demo
Health & Fitness
Finance
Entertainment
Education
Communication
Comics
Casual
Cards & Casino
Business
Brain & Puzzle
Books & Reference
Arcade & Action
y
r
o
g
e
t
a
C
Weather
Travel&Local
Transportation
Tools
Sports
Social
Shopping
Racing
Productivity
Photography
Personalization
News&Magazines
Music&Audio
Medical
Media&Video
Lifestyle
Libraries&Demo
Health&Fitness
Finance
Family
Entertainment
Educational
Education
Communication
Comics
Casual
Cards&Casino
Business
Brain&Puzzle
Books&Reference
Arcade&Action
10
Ratings Count
Unpopular
1000
1e+03
0
Ratings Count
Unpopular
1e+03
1e+03
Ratings Count
Popular
5e+03
5e+03
5e+04
Ratings Count
Most Popular
1e+05
Fig. 4.
Per app category distribution of rating counts. (Top) Dataset.2012. The distribution is almost symmetric in the case of "unpopular" apps. The
distributions for most of the categories are symmetric in the "popular" class and span roughly from 1, 000 to 100K ratings. The Business and Comics categories
do not have any apps in the "most-popular" class. (Bottom) Dataset.14-15. We observe smaller rating counts compared with the apps in dataset.2012. This is
natural, as these are new apps, thus likely to receive fewer ratings. We also note that while a few "Business", "Libraries & Demo" and "Medical" categories
are unpopular and popular, none are most popular.
)
y
t
i
s
n
e
d
(
s
n
o
i
t
a
c
i
l
p
p
A
1.00
0.75
0.50
0.25
0.00
0
1
)
y
t
i
s
n
e
d
(
s
n
o
i
t
a
c
i
l
p
p
A
0.6
0.4
0.2
0.0
9
10
0 1 2 3 4 5 6 7 8 9
0
1
1
1
2
1
4
1
−
3
1
6
1
−
5
1
8
1
−
7
1
0
2
−
9
1
5
2
−
1
2
0
3
−
6
2
0
4
−
1
3
0
6
−
1
4
6
4
1
−
1
6
Total Updates
(b)
s
n
o
i
t
a
c
i
l
p
p
A
#
1500
1000
500
0
1
2
2
8
Total Updates in last six months
3
6
4
5
7
(a)
# of category changes
4
5
6
3
(c)
Fig. 5.
(a) Histogram of app updates for dataset.2012. Only 24% apps have received at least one update between April-November 2012. (b) Histogram of
fresh app updates for dataset.14-15. Unlike the dataset.2012, 35% of the fresh apps have received at least one update, while 1 app received 146 updates! (c)
Histogram of app category changes. 1.9% apps have received at least one category change between October 24, 2014 and May 5, 2015, while several have
received 6 category changes.
Several apps received more than 100 updates, with one app
receiving 146 updates in a 6 months interval. We conjecture
that this occurs because these are newly released apps, thus
more likely to have bugs, and to receive attention from their
developers.
Figure 6 (top) plots the distribution of the update frequency
of the apps from dataset.2012, across categories based on their
popularity. As expected, Unpopular apps receive few or no
updates. We observed that this is due to the app being new
or abandoned by its developer. For instance, "RoboShock"
from "DevWilliams" in Arcade & Action with good reviews
from 4 users has received only one update on September 28,
2012 since its release in August 2011 (inferred from its first
comment). Another app "Shanju" from "sunjian" in Social has
not been updated since May 27, 2012 even though it received
negative reviews.
Outliers (e.g., "Ctalk" in the Social category) push out
large number of updates (111). Popular apps are updated
more frequently: 75% in each category receive 10 or fewer
updates, while some apps average around 10-60 updates during
our observation period. User comments associated with these
apps indicate that the developer pushes out an update when
the app attracts a negative review (e.g., "not working on my
device!"). In the Most-Popular category, the population differs
significantly. While some apps seldom push any updates, apps
like "Facebook" (Social) have been updated 17 times. The
lower number of updates of most popular apps may be due
to testing: Companies that create very popular apps are more
7
30
90
0
20
Update Frequency
Popular
40
60
0
10
20
Update Frequency
Most Popular
60
Update Frequency
Unpopular
y
r
o
g
e
t
a
C
Weather
Travel & Local
Transportation
Tools
Sports Games
Sports
Social
Shopping
Racing
Productivity
Photography
Personalization
News & Magazines
Music & Audio
Medical
Media & Video
Lifestyle
Libraries & Demo
Health & Fitness
Finance
Entertainment
Education
Communication
Comics
Casual
Cards & Casino
Business
Brain & Puzzle
Books & Reference
Arcade & Action
y
r
o
g
e
t
a
C
Weather
Travel&Local
Transportation
Tools
Sports
Social
Shopping
Racing
Productivity
Photography
Personalization
News&Magazines
Music&Audio
Medical
Media&Video
Lifestyle
Libraries&Demo
Health&Fitness
Finance
Family
Entertainment
Educational
Education
Communication
Comics
Casual
Cards&Casino
Business
Brain&Puzzle
Books&Reference
Arcade&Action
0
30
0
20
40
Update Frequency
Unpopular
60
0
50
Update Frequency
Popular
100
150
0
20
Update Frequency
Most Popular
40
The distribution of update frequency, i.e., the update count for each app per category. (Top) Dataset.2012. Unpopular apps receive few or no
Fig. 6.
updates. Popular apps however received more updates than most-popular apps. This may be due to most-popular apps being more stable, created by developers
with well established development and testing processes. (Bottom) Dataset.14-15. We observe a similar update count distribution among unpopular apps to
dataset.2012. Further, in the popular and most popular classes, most app categories tend to receive fewer updates than the dataset.2012 apps. However, a few
apps receive significantly more updates, with several popular apps receiving over 100 updates.
likely to enforce strict testing and hence may not need as many
updates as other apps.
To identify how frequently developers push these updates,
we computed the average update interval (AUI) per app mea-
sured in days (figure not shown). In Popular and Unpopular
classes, 50% of apps receive at least one update within 100
days. The most interesting set is a class of Unpopular apps
that receive an update in less than a week. For instance, the
developer of "Ctalk" pushed, on average, one update per day
totaling 111 updates in six months indicating development
stage (it had only 50-100 downloads) or instability of the app.
On the other hand, Most-Popular apps receive an update within
20 to 60 days.
Figure 6 (bottom) shows the update frequency for the
newly released apps of dataset.14-15. Compared to the apps in
dataset.2012, new releases exhibit a similar update frequency
distribution, with slightly lower third quartiles. However, a
few newly released popular apps receive significantly more
updates, some more than 100 updates.
Updates, bandwidth and reputation. A high update fre-
quency is a likely indicator of an on-going beta test of a feature
or an unstable application. Such apps have the potential to
consume large amounts of bandwidth. For instance, a music
player "Player Dreams", with 500K-1M downloads, pushed
out 91 updates in the last six months as part of its beta testing
phase (inferred from app description). With the application
size being around 1.8 MB, this app has pushed out ≈164
MB to each of its users. Given its download count of 500K-
1M, each update utilizes ≈0.87-1.71 TB of bandwidth. We
have observed that frequent updates, especially when the app
is unstable, may attract negative reviews. For instance, "Ter-
remoti Italia" that pushed out 34 updates in the observation
interval, often received negative reviews of updates disrupting
the workflow.
Furthermore, app market providers can use these indicators
to inform users about seemingly unstable applications and also
as part of the decision to garbage collect abandoned apps.
D. App Category Changes
In the fresh app dataset.14-15 we found app category change
events, e.g., "Social" to "Communication", "Photography" to
"Entertainment", between different game subcategories. Such
category changes may enable developers to better position
their apps and improve on their install and download count,
as categories may overlap, and apps may stretch over multiple
categories. Fig. 5(c) shows the distribution of the number
of app category changes recorded over the 6 months in
dataset.14-15. Only 1.9% of apps have received at least one
category change.
VII. DEVELOPER IMPACT
In this section, we are interested in understanding what
fraction of popular apps are being controlled by an elite set of
developers and if there is a power-law effect in-place. Next,
we analyze the impact that developer actions (e.g., changing
the price, permissions etc.) can have on the app popularity.
We use dataset.2012 for this analysis.
A. Market Control
To understand the impact that developers have on the mar-
ket, we observe their number of apps, downloads, and review
count. Figure 7 plots these distributions, all showing behavior
consistent with a power-law distribution [27]. We display the
maximum likelihood fit of a power-law distribution for each
scatter plot as well [22], [11]. Figure 7(a) shows that a few
developers have a large number of apps while many developers
have few apps. However, the developers that post the most
apps do not have the most popular apps in terms of reviews
and download counts. Instead, Figure 7(b) shows that a few
developers control apps that attract most of the reviews. Since
Figure 7(c) shows an almost linear relation between review
and download counts (1 review for each 300 downloads), we
conclude that the apps developed by the controlling developers
are popular.
B. Price Dispersion
Menu costs (incurred by sellers when making price changes)
are lower in electronic markets as physical markets incur
product re-labeling costs [23]. In app markets menu costs are
zero. We now investigate if developers leverage this advantage
i.e., if they adjust their prices more finely or frequently.
Figure 8 shows a variation of the complementary cumulative
distribution frequency (CCDF) of the number of price changes
an app developer made during our observation period. Instead
of probabilities, the y axis shows the square root of the number
of apps with a number of price changes exceeding the value
shown on the x axis. We observe that 5.14% of the apps
(≈4000) have changed their price at least once. The tail (>
70 changes) is interesting - about 23 apps are frequently
changing their prices. From our data, we observed that they
are distributed as follows: Travel & Local (11), Sports (5),
Business (2), Brain & Puzzle (2) and one in each of Education,
Finance, and Medical. In this sample, "LogMeIn Ignition",
developed by LogMeIn, has 10K-50K downloads and under-
went 83 price changes (Min:$18.44, Max:$27.80, Avg:$26.01,
Stdev:$2.01). The rest were either recently removed or are
unpopular.
Price dispersion is the spread between the highest and
lowest prices in the market. In our dataset, we used the
coefficient of variation (COV) [38],
the ratio of standard
deviation to the mean, to measure price dispersion. COV= 1
indicates a dispersal consistent with a Poisson process i.e.,
uniformly at random; COV> 1 indicates greater variability
than would be expected with a Poisson process; and COV< 1
indicates less variation. In our dataset, we observed an average
COV (computed for all apps) to be 2.45 indicating a non-
negligible price dispersion, in agreement with results in the
context of other electronic markets [9].
Figure 9 shows the STL decomposition [12] of the average
price time series in the observation interval, for a periodicity of
8
D ↑
0.18
-0.02
0.13
0.34
0.09
0.21
P ↓
0.18
-1.00
0.09
0.89
0.89
0.94
P ↑
-0.02
-1.00
-0.23
0.72
0.51
0.76
RC ↑
SV ↑
TP ↓
0.13
0.09
-0.23
0.73
0.65
0.70
0.34
0.89
0.72
0.73
0.99
1.00
0.09
0.89
0.51
0.65
0.99
-1.00
TP ↑
0.21
0.93
0.76
0.70
1.00
-1.00
D ↑
P ↓
P ↑
RC ↑
SV ↑
TP ↓
TP ↑
TABLE II
Yule association measure for pairs of attributes for dataset.2012. The sample
size is the entire dataset for the observation interval. D is number of
downloads, P is price, RC is review count, SV is software version number
and TP is the total number of permissions. (↑) denotes an increasing
attribute and (↓) denotes a decreasing one.
one month. The gray-bar on the "monthly panel" (see Figure 9)
is only slightly larger than that on the "data" panel indicating
that the monthly signal is large relative to the variation in the
data. In the "trend" panel, the gray box is much larger than
either of the ones on the "data"/"monthly" panels, indicating
the variation attributed to the trend is much smaller than the
monthly component and consequently only a small part of
the variation in the data series. The variation attributed to the
trend is considerably smaller than the stochastic component
(the remainders). We deduce that in our six month observation
period this data does not exhibit a trend.
C. Impact of Developer Actions
Developers have control over several attributes they can
leverage to increase the popularity of their apps, e.g., pricing,
the number of permissions requested from users and the
frequency of updates. In this section we investigate the relation
between such levers and their impact on app popularity. For
instance, common-sense dictates that a price reduction should
increase the number of downloads an app receives.
We study the association between app attribute changes.
We define a random variable for increase or decrease of each
attribute, and measure the association among pairs of variables.
For example, let X be a variable for price increase. For each
h day, app i tuple, we let X be a set of all of the app and day
tuples where the app increased its price that day (relative to
the previous day's value). For this analysis we consider 160K
apps that have changed throughout our observation period,
and we discard the remaining apps. We use the Yule measure
of association[37] to quantify the association between two
attributes, A and B: A∩B∗A∩B−A∩B∗A∩B
A∩B∗A∩B+A∩B∗A∩B
.
A is the complement of A, i.e., each h day, app i tuple where
the attribute does not occur, and A denote the cardinality
of a set (in this case A). This association measure captures
the association between the two attributes: zero indicates
independence, +1 indicates perfectly positive association, and
-1 perfectly negative association. Table II shows the measure
values for all pairs of download count (D), price (P), review
count (RC) and total number of permission (TP) attributes.
Table II shows that a price decrease has a high association
with changes in software version and permissions. However,
similarly high associations are not observed with a price
increase. Thus, when a developer is updating software or
s
r
e
p
o
e
v
e
D
l
f
o
r
e
b
m
u
N
10000
1000
100
10
1
1
10
100
Number of Applications
9
s
r
e
p
o
e
v
e
D
l
f
o
r
e
b
m
u
N
10000
1000
100
10
1
s
g
n
i
t
a
R
1e+05
1e+03
1e+01
1000
1
10
100 1000
Number of Ratings
1e+02
1e+05
Downloads
1e+08
Fig. 7.
axes are log-scaled. A linear curve was fitted with a slope of 0.00341 indicating that an application is rated once for about every 300 downloads.
(a) Distribution of apps per developer. (b) Distribution of total reviews per developer. (c) Scatter plot of downloads vs. ratings in Google Play. Both
(a)
(b)
(c)
8000
6000
4000
2000
1500
1000
500
300
100
)
e
l
a
c
s
t
r
q
s
(
s
n
o
i
t
a
c
i
l
p
p
A
#
5.14% > 1 Change
0.64% > 10 Changes
0
5
10
15
20
25
30
35
0.13% > 40 Changes
0.09% > 70 Changes
45
40
Price Changes
50
55
60
65
70
75
80
85
90
95
Fig. 8.
The (square root) of the number of apps whose number of price
changes exceeds the value on the x axis. Only 5.14% of the apps had a price
change, and 0.09% of the apps had more than 70 changes.
Fig. 9. Monthly trend for the average app price. Over the 6 month observation
interval, the average app price does not exhibit a monthly trend.
permissions they are more likely to decrease the price than
increase the price of an app.
We observed that changing the price does not show sig-
nificant association with the download or review counts. We
randomly sampled 50 apps where this is happening and
observe the following to be the main reasons. First, apps are
initially promoted as free and a paid version is released if
they ever become popular. However, in some cases, the feature
additions are not significant (e.g., ads vs. no ads) and hence
do not cause enough motivation for users to switch to the
paid version. Second, with app markets offering paid apps for
free as part of special offers (e.g., Thanksgiving deals), users
may expect the app to be given out for free rather than take
a discount of a few cents.
VIII. TOP-K DYNAMICS
Metric
Description
DEBUT
HRS2PEAK
PEAK
TOTHRS
EXIT
RANKDYN
Debut rank (rank when it first gets onto the list)
Hours elapsed from debut until peak rank
Highest rank attained during its lifetime on the list
Total number of hours spent on the list
Exit rank (rank during the last hour on the list)
Total ranks occupied during its lifetime on the list
Scores proposed to study the evolution of apps on Top-K lists.
TABLE III
in turn increases the app popularity. To analyze the dynamics
of app in top-k lists, we have used the GOOGPLAY-TOPK
dataset (see §V). Google keeps the ranking algorithms for the
top-k lists secret. In this section we seek answers to several
fundamental questions: How long will an app remain on a top-
k list? Will an app's rank increase any further than its current
rank? How long will it take for an app's rank to stabilize?
A. Top-K App Evolution
We investigate first whether apps follow the "birth-growth-
decline-death" process (inverted bathtub curve [21]). Although
every app's path may be unique, we can summarize its life on
a top-k list using the metrics defined in Table III.
This six-tuple captures a suite of interesting information
contained in each app's list trajectory. To make these sum-
maries comparable, we remove all applications for which we
are unable to compute the DEBUT information. For instance,
the set of applications obtained during the first hour of the
crawl process are removed.
Figures 10(a) and 10(b) show the histograms for the DEBUT
and EXIT ranks, both indicating list positions, for the 3000
apps we monitored. Smaller numbers indicate better perfor-
mance. The plots show that most apps entered and exited from
the bottom part of the list (indicated by the high debut and exit
ranks). This is consistent with the lifetime metaphor discussed
earlier. However, a small number of apps entered the list highly
ranked. For instance, in the Paid category, the best DEBUT
was attained by "ROM Manager", by "Koushik Datta" that
entered at #1 on August 14, 2012, and exited at rank #20 on
October 6, 2012, occupying seven different ranks during its
lifetime on the list. Another noteworthy DEBUT was attained
by "Draw Something", by "OMGPOP" that entered at #2 on
October 1, 2012, peaked to #1 on Oct 25, 2012 and exited
at Nov 6, 2012 at #4. During its lifetime, the worst rank it
achieved was #38.
A higher position in Google's top-k lists (see §V) is desir-
able and often attracts significant media attention [1] which
Figure 10(c) shows the distribution of
the peak rank
achieved in top-k lists (PEAK) and Figure 11(a) shows the
y
c
n
e
u
q
e
r
F
12.5
10.0
7.5
5.0
2.5
0.0
7.5
5.0
2.5
0.0
30
20
10
0
30
20
10
0
10.0
7.5
5.0
2.5
0.0
Free
Gross
New (Free)
New (Paid)
Paid
y
c
n
e
u
q
e
r
F
30
20
10
0
15
10
5
0
100
75
50
25
0
80
60
40
20
0
15
10
5
0
0
0
DEBUT: App's debut rank (Binwidth = 1)
100
200
300
400
Free
Gross
y
c
n
e
u
q
e
r
F
New (Free)
New (Paid)
Paid
400
100
200
300
EXIT: App's exit rank (Binwidth = 5)
75
50
25
0
80
60
40
20
0
200
100
0
200
150
100
50
0
90
60
30
0
10
Free
Gross
New (Free)
New (Paid)
Paid
0
PEAK: Peak rank during lifetime (Binwidth = 10)
100
200
300
400
(a)
(b)
(c)
Fig. 10. Distributions of (a) DEBUT, (b) EXIT and (c) achieved PEAK rank. The y axis is the number of apps whose ranks correspond to the values on
the x axis. Most apps entered and exited from the bottom of the list. The New (Free) and New (Paid) lists choose apps updated within the last 20 days.
distribution of the number of hours required for apps to reach
the peak (HRS2PEAK).
Figure 11(b) shows the total number of hours spent by apps
in the top-k lists (TOTHRS). Figure 11(c) shows the number
of ranks achieved in a top-k list (RANKDYN): very few New
(Free) and New (Paid) apps achieve more than 100 different
ranks, with most apps achieving 50 or fewer. This differs
significantly in the other top-k lists.
Among the many apps with poor DEBUT and EXIT po-
sitions, most had a short, uneventful life (i.e., low TOTHRS,
poor PEAK, low HRS2PEAK), but several were able to reach
a high peak position and/or remain for a long time. One entry,
"PS Touch", by "Adobe", entered at #413 and has been on the
"Gross" list for 2,403 hours (≈ 3 months, although it peaked
only at #206. This app also took a remarkably slow journey
(more than two months) to reach that peak and has occupied
137 distinct ranks. Also note that 67 apps attained their top
rankings in their debut hour (i.e., HRS2PEAK = 1). Many of
these apps stayed on the list for a very short time, but there
are 6 apps that stayed for 100 - 1000 hours, 31 stayed for
more than 1000 hours.
Figure 11(b) shows that New (Free) and New (Paid) apps
do not stay on the list for more than 500 hours (≈ 20 days)
indicating that these lists may be taking into account all those
applications which were last updated in the last 20 days. We
have confirmed this hypothesis also by verifying that indeed
the "last updated" field of these apps is within the last 20
days. From the same figure, for other lists, we also emphasize
the presence of a long tail of apps that have been present
for thousands of hours. We conclude that: (1) a majority of
apps follows a "birth-growth-decline-death" process, as they
enter/exit from the bottom part of a list, (2) most of the apps
with modest DEBUT and EXIT values have a short, eventful
life occupying many ranks quickly, and (3) the New (Free) and
New (Paid) lists choose among apps that were updated within
the last 20 days.
B. Top-K List Variation
We now characterize the changes in the rankings of the top-
k items from the five lists over time.
We use the Inverse Rank Measure to assess the changes over
time in each of the rankings. This measure gives more weight
Pages
List-Type
#items
Top 24
Last
25
Gross
Free
Paid
New (Free)
New (Paid)
Gross
Free
Paid
New (Free)
New (Paid)
57
44
74
128
125
205
186
150
449
485
Omean
23.8953
23.9539
23.8840
23.7974
23.8226
25.3765
25.6145
24.9245
25.1159
24.9245
Omin Mmean
0.9893
0.9970
0.9932
0.9867
0.9889
0.9692
0.9785
0.9780
0.9571
0.9780
18
21
11
15
13
1
10
12
5
2
Msd Of ∩l
12
16
4
0
0
0
4
4
0
0
0.0617
0.0238
0.0537
0.0742
0.0641
0.1299
0.1030
0.1029
0.1502
0.1687
Variability in top-k Lists. Omean, Omin and Of ∩l are the mean and min.
overlap, and that between the first and last lists.
TABLE IV
to identical or near identical rankings among the top ranking
items. This measure tries to capture the intuition that identical
or near identical rankings among the top items indicate greater
similarity between the rankings. Let us assume the following:
kn is the list of top-k apps at time tn, σn(i) is the rank of
app i in kn, Z is the set of items common to kn−1 and kn,
S is the set of items in kn−1 but not in kn, T is the set of
items in kn but not in kn−1. Then, the inverse rank measure
is [7] defined as M (kn−1,kn) = 1 − N (kn−1 ,kn )
N max(kn−1 ,kn ) , where
N (kn−1,kn) = Pi∈Z
σn(i) + Pi∈S
σn−1(i) −
(kn−1+1) , and N max(kn−1,kn) =
(kn+1) + Pi∈T
Pkn−1
1
i=1 1
i=1
Figure 12(a) shows the variation of M kt1 ,kt2 for consecutive
days in the month of September. Note that values above 0.7
indicate high similarity [7]. We observe that the lists are
similar from day to day for Free list but this is not the case
for Paid and Gross. Intuitively, this indicates that the effort to
displace a free app seems to be higher than that of a paid app
or the frequency with which the ranking algorithm is run on
Free list is less than that of the Paid list.
(kn+1) + Pkn
σn−1(i) − 1
(kn−1+1) .
1
i −
1
σn(i) −
i −
1
1
1
1
1
This intuition is difficult to verify without access to Google's
ranking function. To compare the dynamics between the top-24
positions and bottom 25, we computed M kt1 ,kt2 , the amount
of overlap between two subsequent lists for the two cases (see
Table IV). In addition, we also computed the overlap between
the first and the last lists obtained over the observation period.
The overlap between the first and the last observed lists is zero
in the case of the New(Free) and New(Paid) lists, due to the
higher in-flow of apps in these lists.
In all other cases (except Paid top-24 and last-25 cases),
y
c
n
e
u
q
e
r
F
10
1
10
1
10
1
100
10
1
10
1
Free
Gross
New (Free)
New (Paid)
Paid
y
c
n
e
u
q
e
r
F
100
50
0
150
100
50
0
150
100
50
0
150
100
50
0
150
100
50
0
11
Free
Gross
New (Free)
New (Paid)
Paid
y
c
n
e
u
q
e
r
F
200
100
0
100
50
0
600
400
200
0
600
400
200
0
150
100
50
0
0
50
100
150
RANKDYN: Distinct ranks held (Binwidth = 10)
Free
Gross
New (Free)
New (Paid)
Paid
0
HRS2PEAK: Hours to reach peak rank (Binwidth = 1)
250
500
750
1000
0
2500
TOTHRS: Total hours spent on list (Binwidth = 1)
1000
1500
2000
500
(a)
(b)
(c)
Fig. 11. Distributions of (a) required HRS2PEAK, (b) spent TOTHRS and (c) RANKDYN over lifetime. The y axis displays the number of apps whose
hours correspond to the values displayed on the x axis. New (Free) and New (Paid) apps do not stay on the list for more than 500 hours. While few New
(Free) and New (Paid) apps achieve more than 100 different ranks, Gross list apps achieve an almost uniform distribution up to 125 different ranks.
1
50
100
200
400
1.0
0.8
0.6
0.4
0.2
1.0
0.8
0.6
0.4
0.2
1.0
0.8
0.6
0.4
0.2
1.0
0.8
0.6
0.4
0.2
1.0
0.8
0.6
0.4
0.2
)
M
(
e
r
u
s
a
e
M
k
n
a
R
e
s
r
e
v
n
I
Free
Gross
New (Free)
New (Paid)
Paid
s
n
o
i
t
a
c
i
l
p
p
A
450
300
150
450
300
150
450
300
150
450
300
150
450
300
150
Sep 03
Sep 10
Sep 17
Timestamp
Sep 24
Oct 01
0
100
(a)
300
400
200
Rank
(b)
Free
Gross
New (Free)
New (Paid)
Paid
y
t
i
s
n
e
D
0.06
0.04
0.02
0.00
0.03
0.02
0.01
0.00
0.15
0.10
0.05
0.00
0.15
0.10
0.05
0.00
0.05
0.04
0.03
0.02
0.01
0.00
Free
Gross
New (Free)
New (Paid)
Paid
0
25
50
Lifetime (hours)
75
100
(c)
Fig. 12.
apps vs. ranks. (c) Lifetime of apps at various ranks. The average top-k list lifetime is longer for higher ranking than for lower ranking apps.
(a) The Inverse Rank Measure vs. Timestamp. The Free list varies little from day to day, which is not the case for Paid and Gross. (b) Number of
250
200
150
100
50
0
i
s
w
e
v
e
R
#
0
−10
−20
75
50
25
0
i
s
w
e
v
e
R
#
i
s
w
e
v
e
R
#
0
100
200
Time (Days)
300
0
20
40
Time (Days)
60
0
100
200
Time (Days)
300
(a)
(b)
(c)
Fig. 13. Review timeline of "fraud" apps: x axis shows time with a day granularity, y axis the number of daily positive reviews (red, positive direction)
and negative reviews (blue, negative direction). Apps can be targets of both positive and negative search rank fraud campaigns: (a) The app "Daily
Yoga- Yoga Fitness Plans" had days with above 200 positive review spikes. (b) "Real Caller" received suspicious negative review spikes from ground truth
fraudster-controlled accounts. (c) "Crownit - Cashback & Prizes" received both positive and negative reviews from fraudster-controlled accounts.
there is an overlap of at least 50%: apps continue to be popular
for longer periods. In each list-type of last-25 cases, the low
overlap values indicate that the list is highly dynamic and
variable. Also, notice that Mmean for the top-24 is higher than
that of the last-25 indicating that the top-24 is less dynamic
in all cases expect New(Free) and New(Paid).
Figure 12(b) shows the number of apps that occupy a
rank position in 5 different list-types over our observation
period. Note that a lower rank is preferred. For example, the
300th rank position in the New (Free) list is occupied by 441
applications. With the increase in rank, the rate of applications
being swapped is increasing for each category indicating an
increased churn – it is easier for apps to occupy as well as
get displaced on high ranks. For Paid, Gross, and Free, the
number of apps varies from 34 to 142, 30 to 173, and 43 to
163, respectively, from the 1st to the 400th rank.
However, in the case of New (Free) and New(Paid) lists,
the number of apps being swapped for a position is almost
linearly increasing with the increase in rank. This is because
all the applications in these two categories are new and the
competition is higher compared to other list-types.
Figure 12(c) shows the distribution of the lifetime of ap-
plications that occupy a specific rank position. To evaluate
the variation in the distributions we choose the 1st, 50th,
100th, 200th, and 400th rank positions. For each category,
the average lifetime is longer for higher ranking apps then for
lower ranking apps. We can clearly observe this phenomenon
in the case of New (Free) and New (Paid). In both the cases,
the lifetime of the apps at the lowest rank (i.e., 400th) is the
lowest, i.e., ≈6 hours and it starts increasing with the increase
in the ranks. We can attribute this effect to the frequently
changing list of new apps and the relatively easier competitions
to be on the top-400 lists. However, in case of Free apps, the
average lifetime of apps on the 1st rank is 94.2 hours and
decreases to 16.7 hours for the 400th rank. For Paid and Gross
categories, the lifetime changes from 81.6 to 20.6 hours and
65.7 to 17.9 hours, respectively, for the rank 1 → 400. We
attribute these effects to the stability of the apps in these lists.
IX. RESEARCH IMPLICATIONS
We now discuss the implications of longitudinal monitoring
on security and systems research in Android app markets.
A. Fraud and Malware Detection
App markets play an essential role in the profitability of
apps. Apps ranked higher in the app market become more pop-
ular, thus make more money, either through direct payments
for paid apps, or through ads for free apps. This pressure to
succeed leads some app developers to tinker with app market
statistics known to influence the app ranking, e.g., reviews,
average rating, installs [5]. Further, malicious developers also
attempt to use app markets as tools to widely distribute their
malware apps. We conjecture that a longitudinal analysis of
apps can reveal both fraudulent and malicious apps. In the
following we provide supporting evidence.
Search rank fraud. We have contacted Freelancer workers
specializing in Google Play fraud, and have obtained the ids of
2,600 Google Play accounts that were used to write fraudulent
reviews for 201 unique apps. We have analyzed these apps and
found that fraudulent app search optimization attempts often
produce suspicious review patterns. A longitudinal analysis
of an app's reviews, which we call timeline, can reveal such
patterns. For instance, Figure 13(a) shows the review timeline
of "Daily Yoga- Yoga Fitness Plans", one of the 201 apps
targeted by the 15 fraudster-controlled accounts. We observe
several suspicious positive reviews spikes, some at over 200
reviews per day, in contrast with long intervals of under 50
daily positive reviews.
We have observed that Google Play apps can also be
the target of negative review campaigns, receiving nega-
tive reviews from multiple fraudster-controlled accounts. Fig-
ure 13(b) shows the timeline of such an app, "Real Caller",
where we observe days with up to 25 negative reviews, but few
positive reviews. While negative reviews are often associated
with poor quality apps, these particular spikes are generated
from the fraudster-controlled accounts mentioned above. We
conjecture that negative review campaigns are sponsored by
competitors. Further, we identified apps that are the target of
both positive and negative reviews. Figure 13(c) shows the
timeline of such an app, "Crownit - Cashback & Prizes". While
12
the app has received more positive reviews with higher spikes,
its negative reviews and spikes thereof are also significant.
App markets can monitor timelines and notify developers
and their users when such suspicious spikes occur.
In addition, our analysis has shown that several developers
upload many unpopular apps (see §V II), while others tend to
push frequent updates (§VI). We describe here vulnerabilities
related to such behaviors.
Scam Apps. We have identified several "productive" devel-
opers, that upload many similar apps. Among them, we have
observed several thousands of premium applications (priced
around $1.99) that are slight variations of each other and have
almost no observable functionality. Such apps rely on their
names and description to scam users into paying for them, then
fail to deliver. Each such app receives ≈500-1000 downloads,
bringing its developer a profit of $1000-2000.
Malware. While updates enable developers to fix bugs and
push new functionality in a seamless manner, attack vectors
can also leverage them. Such attack vectors can be exploited
both by malicious developers and by attackers that infiltrate
developer accounts. We posit that a motivated attacker can
develop and upload a benign app, and once it gains popularity,
push malware as an update. For instance, Table II shows that
as expected, software version and total permissions are highly
correlated. However, we found that in 5% of cases where
permissions change, the software version does not change.
On the iOS platform, Wang et al. [36] proposed to make
the app remotely exploitable, then introduce malicious control
flows by rearranging already signed code. We propose an
Android variant where the attacker ramps up the permissions
required by the app, exploiting the observation that a user is
more likely to accept them, then to uninstall the app.
To provide an intuition behind our conjecture, we introduce
the concept of app permission timeline, the evolution in time of
an app's requests for new permissions, or decisions to remove
permissions. We have used VirusTotal [6] to test the apks of
7,756 randomly selected apps from the dataset.14-15. We have
selected apps for which VirusTotal raised at least 3 flags and
that have at least 10 reviews. Figure 14 shows the permission
timeline of 3 of these apps, for both dangerous (red bars) and
regular permissions (blue bars).
For instance, the "Hidden Object Blackstone" app (Fig-
ure 14(a)) has a quick succession of permission requests and
releases at only a few days apart. While the app releases
2 dangerous permissions on November 14, 2014, it requests
them again 1 day later, and requests 2 more a month and a half
later. Similarly, the "Top Race Manager" app (Figure 14(b))
has very frequent permission changes, daily for the last 3.
The "Cash Yourself" app (Figure 14(c)) requests 3 dangerous
permissions on November 10 2014, followed by 1 dangerous
permission in both December and January, then releases 1
dangerous permission 4 days later.
Permission changes imply significant app changes. Frequent
and significant permission changes, especially the dangerous
ones may signal malware, or unstable apps. Market owners can
decide to carefully scan the updates of such apps for malware,
and notify developers that something went wrong with their
updates, indicating potential account infiltration.
13
s
n
o
i
s
s
i
m
r
e
P
#
6
3
0
−3
−6
s
n
o
i
s
s
i
m
r
e
P
#
6
3
0
−3
−6
Type
Dangerous
Normal
s
n
o
i
s
s
i
m
r
e
P
#
6
3
0
−3
−6
2014−11−09
2014−11−12
2014−11−14
Date
(a)
2014−11−15
2015−01−29
2014−11−09 2014−11−14 2014−11−25 2014−12−02 2014−12−11 2014−12−12 2014−12−13
Date
(b)
2014−11−10
2014−12−15
Date
2015−01−30
2015−02−03
(c)
Fig. 14. Permission timeline of 3 VirusTotal flagged apps, (a) "Hidden Object Blackstone", (b) "Top Race Manager", and (c) "Cash Yourself". The x axis
shows the date when the permission changes occurred; the y axis shows the number of permissions that were newly requested (positive direction) or removed
(negative direction). The red bars show dangerous permissions, blue bars regular permissions. We observe significant permission changes, even within days.
B. App Market Ecosystem
Analytics-driven Application Development. We envision a
development model where insights derived from raw market-
level data is integrated into the application development. Such
a model is already adopted by websites such as Priceline [4]
through their "Name Your Own Price" scheme where the
interface provides users with hints on setting an optimal
price towards a successful bid. We propose the extension
of development tools like Google's Android Studio [2] with
market-level analytics, including:
• Median price: In §VI-A, we showed that developers may
be settling down for lower profits. The development tools
could provide developers them with hints on the optimal
price for their app based on, e.g., the number of features,
the price of active apps in the same category etc.
• Application risk: Provide predictions on the impact of
permissions and updates on reviews and download count.
• App insights: Present actionable insights extracted from
user reviews (e.g., using solutions like NetSieve [31]),
including most requested feature, list of buggy features,
features that crash the app.
Enriching User Experience. We believe data-driven insights
will be indispensable to enhance the end user experience:
• Analytics based app choice: Visualize app price, update
overhead, required permissions, reviewer sentiment to en-
hance the user experience when choosing among apps with
similar claimed functionality. For instance, develop scores
for individual features, and even an overall "sorting" score
based on user preferences. Scam apps (see §IX-A) should
appear at the bottom of the score based sorted app list.
• Analytics based app quarantine: We envision a quarantine
based approach to defend against "update" attacks. An
update installation is postponed until analytics of variation
in app features indicates the update is stable and benign.
To avoid a situation where all users defer installation, we
propose a probabilistic quarantine. Each user can update the
app after a personalized random interval after its release.
In addition, while we believe that the Google Play market,
the applications it hosts and developers we examined represent
a large body of other third-party markets and their environ-
ments, we do not intend to generalize our results to all the
smartphone markets. The characteristics and findings obtained
in this study are associated with the Google Play market and
its developers. Therefore, the results should be taken with the
market and our data collection methodology in mind.
The goal of our discussion of permission and review time-
lines was to provide early evidence that a longitudinal monitor-
ing and analysis of apps in app markets can be used to identify
suspicious apps. We leave for future work a detailed study of
permission changes to confirm their statistical significance in
detecting search rank fraud and malware.
XI. CONCLUSION
This article studies temporal patterns in Google Play, an in-
fluential app market. We use data we collected from more than
160,000 apps daily over a six month period, to examine market
trends, application characteristics and developer behavior in
real-world market settings. Our work provides insights into the
impact of developer levers (e.g., price, permissions requested,
update frequency) on app popularity. We proposed future
directions for integrating analytics insights into developer and
user experiences. We introduced novel attack vectors on app
markets and discussed future detection directions.
XII. ACKNOWLEDGMENTS
This research was supported in part by NSF grants CNS-
1527153, CNS-1526494 and CNS-1450619.
REFERENCES
[1] Angry Birds Star Wars
tops App Store Chart
in 2.5 hours.
http://goo.gl/ioJWq.
[2] Getting started with Android Studio. http://goo.gl/wgeUok.
[3] Google Bouncer. http://goo.gl/QnC6G.
[4] Priceline. http://priceline.com.
[5] Google
- Getting Discovered
I/O 2013
on Google
Play.
X. LIMITATIONS
This paper seeks to shed light on the dynamics of the Google
app market and also provide evidence that a longitudinal
monitoring of apps is beneficial for users, app developers and
the market owners. However, our datasets were collected in
2012 and 2014-2015, and may not reflect the current trends
of Google Play.
www.youtube.com/watch?v=5Od2SuL2igA, 2013.
[6] VirusTotal
- Free Online Virus, Malware
and URL Scanner.
https://www.virustotal.com/, Last accessed on May 2015.
[7] J. Bar-Ilan, M. Levene, and A. Lin. Some measures for comparing
citation databases. Journal of Informetrics, 1(1):26–34, 2007.
[8] Y. Benjamini. Opening the box of a boxplot. The American Statistician,
42(4):257–262, 1988.
[9] E. Brynjolfsson and M. Smith. Frictionless commerce? a comparison
of internet and conventional retailers. Management Science, 2000.
[10] B. Carbunar and R. Potharaju. A longitudinal study of the google app
market. In Proceedings of the IEEE/ACM ASONAM, 2015.
[11] A. Clauset, C. Shalizi, and M. Newman. Power-law distributions in
empirical data. Arxiv preprint arxiv:0706.1062, 2007.
[12] R. Cleveland, W. Cleveland, J. McRae, and I. Terpenning.
Stl: A
Journal of
seasonal-trend decomposition procedure based on loess.
Official Statistics, 6(1):3–73, 1990.
[13] J. Dean and S. Ghemawat. Mapreduce: simplified data processing on
large clusters. Communications of the ACM, 51(1):107–113, 2008.
[14] W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel,
and A. N. Sheth. Taintdroid: An information-flow tracking system for
realtime privacy monitoring on smartphones. In Proceedings of OSDI,
2010.
[15] W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android
application security. In Proceedings of the 20th USENIX Conference on
Security, 2011.
[16] A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android
permissions demystified. In Proceedings of the ACM CCS, 2011.
[17] C. Ghezzi, M. Jazayeri, and D. Mandrioli. Fundamentals of software
engineering. Prentice Hall PTR, 2002.
[18] Google. Developer Registration. http://goo.gl/wIwpa, 2012.
[19] M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe exposure
analysis of mobile in-app advertisements. In Proceedings of the ACM
WiSec, 2012.
[20] A. Greenberg. Malware Apps Spoof Android Market To Infect Phones.
Forbes Security, 2014.
[21] R. Jiang, P. Ji, and X. Xiao. Aging property of unimodal failure rate
models. Reliability Engineering & System Safety, 79(1):113–116, 2003.
[22] R. Johnson and D. Wichern. Applied multivariate statistical analysis.
Prentice hall, 2002.
[23] D. Levy, M. Bergen, S. Dutta, and R. Venable. The magnitude of menu
costs: direct evidence from large us supermarket chains. The Quarterly
Journal of Economics, 112(3):791–824, 1997.
[24] H. M. Levy.
Capability-Based Computer Systems.
Butterworth-
Heinemann, Newton, MA, USA, 1984.
[25] C. Z. Liu, Y. A. Au, and H. S. Choi. An Empirical Study of the
Freemium Strategy for Mobile Apps: Evidence from the Google Play
Market. In Proceedings of ICICS, 2012.
[26] Z. Miners. Report: Malware-infected Android apps spike in the Google
Play store. PCWorld, 2014.
[27] M. Mitzenmacher. A brief history of generative models for power law
and lognormal distributions. Internet mathematics, 2004.
[28] S. Mlot. Top Android App a Scam, Pulled From Google Play. PCMag,
2014.
[29] A. Moller, F. Michahelles, S. Diewald, L. Roalter, and M. Kranz. Update
behavior in app markets and security implications: A case study in
google play. In Proceedings of the Intl. Workshop on Research in the
Large, 2012.
[30] T. Petsas, A. Papadogiannakis, M. Polychronakis, E. P. Markatos, and
T. Karagiannis. Rise of the planet of the apps: A systematic study of
the mobile app ecosystem. In Proceedings of the 2013 Conference on
14
Internet Measurement Conference, IMC '13, pages 277–290, New York,
NY, USA, 2013. ACM.
[31] R. Potharaju, N. Jain, and C. Nita-Rotaru.
Juggling the jigsaw:
Towards automated problem inference from network trouble tickets. In
Proceedings of USENIX NSDI, 2013.
[32] M. Rahman, M. Rahman, B. Carbunar, and D. H. Chau. FairPlay: Fraud
In Proceedings of the SIAM
and Malware Detection in Google Play.
International Conference on Data Mining (SDM), 2016.
[33] D. Roberts. How to spot fake apps on the Google Play store. Fortune,
2015.
[34] E. Siegel.
Fake Reviews in Google Play and Apple App Store.
Appentive, 2014.
[35] N. Viennot, E. Garcia, and J. Nieh. A measurement study of google play.
In ACM SIGMETRICS Performance Evaluation Review, volume 42,
pages 221–233. ACM, 2014.
[36] T. Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on ios: When
benign apps become evil. In Proceedings of USENIX Security, 2013.
[37] M. J. Warrens. On association coefficients for 2x2 tables and properties
that do not depend on the marginal distributions. volume 73, 2008.
[38] E. Weber, S. Shafir, and A. Blais.
Predicting risk sensitivity in
humans and lower animals: risk as variance or coefficient of variation.
Psychological Review; Psychological Review, 111(2):430, 2004.
[39] Q. Xu, J. Erman, A. Gerber, Z. Mao, J. Pang, and S. Venkataraman.
Identifying diverse usage behaviors of smartphone apps. In Proceedings
of ACM IMC, 2011.
[40] N. Zhong and F. Michahelles. Google play is not a long tail market:
An empirical analysis of app adoption on the google play app market.
In Proceedings of the ACM SAC, 2013.
[41] Y. Zhou and X. Jiang. Dissecting android malware: Characterization
and evolution. In Proceedings of the IEEE S&P, 2012.
[42] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my
market: Detecting malicious apps in official and alternative android
markets. In Proceedings of NDSS, 2012.
Rahul Potharaju is a researcher at Microsoft. He focuses on building
interactive query engines for big data. He earned his CS Ph.D. degree from
Purdue University and CS Masters degree from Northwestern University. He
is a recipient of the Motorola Engineering Excellence award in 2009, the
Purdue Diamond Award in 2014, and the Microsoft Trustworthy Reliability
Computing Award in 2013.
Mizanur Rahman is a Ph.D. candidate at FIU. He has previously held various
positions in KAZ Software, iAppDragon and Prolog Inc. His research interests
include fraud detection in social networks and user experience.
Bogdan Carbunar is an assistant professor in SCIS at FIU. He has held
research positions within Motorola Labs. His interests include security and
privacy for mobile and social networks. He holds a Ph.D. in CS from Purdue.
|
1811.03809 | 1 | 1811 | 2018-11-09T08:01:50 | Football and Beer - a Social Media Analysis on Twitter in Context of the FIFA Football World Cup 2018 | [
"cs.SI"
] | In many societies alcohol is a legal and common recreational substance and socially accepted. Alcohol consumption often comes along with social events as it helps people to increase their sociability and to overcome their inhibitions. On the other hand we know that increased alcohol consumption can lead to serious health issues, such as cancer, cardiovascular diseases and diseases of the digestive system, to mention a few. This work examines alcohol consumption during the FIFA Football World Cup 2018, particularly the usage of alcohol related information on Twitter. For this we analyse the tweeting behaviour and show that the tournament strongly increases the interest in beer. Furthermore we show that countries who had to leave the tournament at early stage might have done something good to their fans as the interest in beer decreased again. | cs.SI | cs | Football and Beer - a Social Media Analysis on Twitter in Context of the
FIFA Football World Cup 2018
Roland Roller, Philippe Thomas, Sven Schmeier
Language Technology Lab, DFKI,
Berlin, Germany
{firstname.surname}@dfki.de
8
1
0
2
v
o
N
9
]
I
S
.
s
c
[
1
v
9
0
8
3
0
.
1
1
8
1
:
v
i
X
r
a
Abstract
In many societies alcohol
is a legal and
common recreational substance and socially
accepted. Alcohol consumption often comes
along with social events as it helps people to
increase their sociability and to overcome their
inhibitions. On the other hand we know that in-
creased alcohol consumption can lead to seri-
ous health issues, such as cancer, cardiovascu-
lar diseases and diseases of the digestive sys-
tem, to mention a few. This work examines al-
cohol consumption during the FIFA Football
World Cup 2018, particularly the usage of al-
cohol related information on Twitter. For this
we analyse the tweeting behaviour and show
that the tournament strongly increases the in-
terest in beer. Furthermore we show that coun-
tries who had to leave the tournament at early
stage might have done something good to their
fans as the interest in beer decreased again.
1
Introduction
Alcohol can lead to serious health issues. For in-
stance, even though there is no apparent threshold,
even one drink of alcohol per day on average can
significantly increase the risk of cancer (Roerecke
and Rehm, 2012).
Studies have shown, that the exposure to media
and commercial communications on alcohol is as-
sociated with the likelihood that adolescents will
start to drink alcohol, and with increased drinking
amongst baseline drinkers (Anderson et al., 2009).
In addition to that social events can have a influ-
ence on drinking behaviour. In course of this Cur-
tis et al. (2018) apply a Twitter analysis and show
that topics such as sporting events, art and food-
related festivals are positively correlated to alco-
hol consumption on US county level.
Various other
studies have also explored
alcohol-related content on social media, particu-
larly Twitter. Abbar et al. (2015) carry out a food
analysis on Twitter and identify weekly periodic-
ities in context of daily volume of tweets men-
tioning food. Moreover, authors show a correla-
tion between state obesity and caloric value of
food (also alcoholic beverages). Instead Culotta
(2013) analyse alcohol sales volume in context of
Twitter messages. Kershaw et al. (2014) investi-
gate regional alcohol consumption patterns in the
UK, while Hossain et al. (2016) explore alcohol
consumption patterns in various areas in the US.
Curtis et al. (2018) target the prediction of exces-
sive drinking rates and Huang et al. (2017) exam-
ine alcohol- and tobacco-related behaviourial pat-
terns. And finally, Moreno et al. (2010) carry out a
content analysis of adolescents on social media.
This work examines alcohol consumption on
Twitter in context of the FIFA Football World Cup
2018. We make use of the results of the above
mentioned works, especially the observed correla-
tion between people's behaviour on Twitter and in
their real life in context of consumption. The study
is carried out across all participating countries of
the tournament and explores the influence of the
event on the drinking behaviour of people.
2 Experimental Setup
The FIFA World Cup 2018 was taking place from
14th of June until 15th of July. Within the group
stage 32 participating teams were playing in 8
groups and completed 3 matches each. After that
the two best teams of each group went to the
knockout stage. A match usually lasts 90 minutes
plus 15 minutes of break (≈2 hours). This work
analyses the tweeting behaviours during a match.
In the following a match is defined as a time pe-
riod of one hour before kick-off and three hours
after the kick-off. The hour before and after the
game are included as supporters might express ex-
citement for the game.
2.1 Data Collection
Tweets over a period between 05/31/2018 and
07/23/2018 were collected, which covers the pe-
riod of the tournament, but also two weeks before
and one week after. As this work analyses mes-
sages from all participating countries of the tour-
nament, messages were crawled containing vari-
ous emojis due to their language independence.
The considered emojis are listed in Table 1. In the
rest of the work we refer to them as BEER, WINE,
SAKE and BALL.
Table 1: Emojis used for Twitter crawling
2.2 Country Assignment
In this work, Tweets are examined according to the
different participating countries. As only a small
number of Tweets contain country related infor-
mation (8.63%), Tweets lacking this information
had to be assigned automatically to the corre-
sponding country of each user. A classifier was
trained based on the approach of Thomas and Hen-
nig (2018), which is able to detect the origin of a
Tweet based on text and meta information.
As sanity check, Tweets which actually con-
tain information about its origin were compared
to the automatically assigned country. On those
messages the model achieves an accuracy of above
91%.
2.3 Preprocessing
Collected Tweets were then mapped to small time
intervals of one hour, according to the target la-
bel (e.g. beer emoji). For instance a message sent
on 06/27/2018 at 5:25 pm (UTC) and containing a
beer emoji is assigned to its country, then assigned
to the set of beer emoji Tweets, and finally mapped
to the time interval 06/27/2018, 5:00 pm. All mes-
sages of a particular label and a particular time in-
terval are summed up. In this way a list for each
target label is generated containing time intervals,
country origin and number of relevant Tweets for
this interval. For the following analysis these lists
are used as input. One line is considered as TCF
(time-country-frequency) triple.
3 Analysis
In the following the different Tweets containing
the target emojis are analysed in detail. All ex-
aminations which include significance testing use
one-sided paired t-test.
3.1 Outside the Tournament
Figure 1 shows the average number of Tweets per
day containing BEER emojis before/after the tour-
nament from the participating countries. Partici-
pants with less than 50 BEER Tweets per day are
excluded, to show more meaningful results. We re-
fer to this group as avg50. In average, more than
half of the BEER Tweets per day come from Brazil
and England together. Results show no direct cor-
relation to the statistics Harmful use of alcohol1 of
the WHO. The reasons for this can only be pos-
sibly found out by a longterm analysis going fur-
ther than pure statistics. In that list Brazil with 7.8
litres of pure alcohol per capita is actually ranked
further to the end. Instead countries such as Ger-
many (13.4), France (12.6), England (11.4) and
Australia (10.6) would be ranked to the top.
Figure 1: Average number of alcohol related (BEER)
Tweets per day outside the tournament
In order to draw a fair comparison to pure alco-
hol per capita the number of active Twitter users
must be taken into account. It turns out that di-
viding the avg. BEER Tweets by the number of
active Twitter users does not change much. Ar-
gentina switches place with England, Saudi Ara-
bia moves to the very end and Japan drops just in
front of it. Columbia moves slightly up.
Next mean is calculated for all BEER Tweets
from avg50 for each day of the week. The re-
sulting graph is presented in Figure 2 and visu-
alises, similarly to Abbar et al. (2015), particular
periodicities. Firstly single days can be recognised
as small peaks. Moreover, towards the end of the
week, peaks are slightly increased compared to the
beginning of the week. Using this data it is for in-
1http://apps.who.int/gho/data/node.
sdg.3-5-viz, accessed 19.07.2018
Japan.
Figure 2: Mean of all alcohol related (BEER) Tweets
before/after the tournament from avg50
stance possible to deduct, that people tweet sig-
nificantly more about alcohol on the evening
(from 4pm until 1am) (p<0.001). Moreover, the
data also shows, that people tweet significantly
more about alcohol at the weekend (Friday 4pm
- Monday 6am) (p<0.001). in comparison to the
rest of the week.
3.2 The Tournament
In this subsection alcohol related Tweets during
the tournament are examined. The first question
to address is whether supporters of their national
team tweet more during the match in comparison
to other periods. Reference periods are the days
after each match during the same time slots.
The analysis shows that people from 19 coun-
tries use BEER significantly more when their
team is playing (p<0.05, 10 of
them with
p<0.001). Among the 13 other countries, only
Japan and Saudi Arabia are from avg50. Interest-
ingly Croatia, which reached the final, does not
show any significant increase, but the general us-
age of BEER is generally very low here. Consid-
ering WINE Tweets, only Brazil, Poland and Bel-
gium and for SAKE only Mexico show a signifi-
cant increase in Tweets during the matches of their
team (p<0.05). However the number of Tweets are
low in comparison to BEER.
Figure 3 presents an overview on how the tour-
nament influences the average usage of BEER per
day of avg50, while the team is in the tournament.
France shows the largest increase of BEER Tweets
per day in average of more than 107%, followed
by Japan with 35%. The increase from Japan is
surprising as Japanese people do not tweet sig-
nificantly more during the matches of their team.
Possible explanations might be that matches are
broadcasted often late in the evening due to the
time difference to Russia. For this reason people
might meet up earlier, thus start drinking earlier.
Another explanation can be just the fact that there
is a high interest for the tournament in general in
Figure 3: Increase of beer related Tweets per day during
World Cup, until leaving the tournament
Brazil instead shows 'only' an increase of 18%.
Even with this small increase (in comparison to
others) Brazil remains the country with the largest
number of avg. BEER Tweets per day. Consid-
ering all countries Morocco has the strongest in-
crease (407.5%) and also the strongest decrease
after leaving the tournament (-68.97%). On the
other hand, outside the tournament Morocco has a
very low number of BEER Tweets per day (0.48),
so the increase might be not too serious. Interest-
ingly only Peru shows a decrease during the tour-
nament (-16.4%). Considering the avg50, Colom-
bia and Brazil showed the strongest decrease when
their team left the tournament with -18.81% and -
10.59% respectively.
Generally the results show, that from almost
all countries more alcohol related Tweets can be
found during the tournament. Moreover, in most
cases the avg. number of BEER Tweets decreases
when the team leaves the tournament. However,
in some cases an increase in Tweets can be de-
tected. Senegal for instance increases the number
of BEER Tweets up to 54%, followed by Uruguay
(28%) and Australia (10%).
3.3 Top-5 Matches
This subsection analyses the different matches of
the tournament for popularity in terms of BEER
and BALL. In order to have a fair comparison data
is normalized first. The average number of Tweets
of each country outside the tournament is sub-
tracted from the number of Tweets during the tour-
nament at a given time and day.
Table 2 presents the Top-5 matches involving
BEER and BALL. The table shows that more peo-
ple use the football emoji than the beer emoji. In
terms of BALL, the Top-5 list contains the final
(France-Croatia), the opening (Russia-Saudi Ara-
bia) and some other games involving recent Euro-
pean and World Champions.
Mexico-Sweden
German-S. Korea
Brazil-Belgium
Serbia-Brazil
Switzerland-C. Rica
Nigeria-Iceland
Brazil-Costa Rica
#
1313
Portugal-Spain
1305
1250
France-Croatia
Russia-S. Arabia
1104 Germany-Mexico
1092
France-Argentina
#
5100
4637
4253
3798
3616
Table 2: Top-5 matches of the tournament in terms of
beer and football emoji (normalized)
From BEER perspective we find on the first
and third palce matches which took place in par-
allel. Considering that, the most popular single
match was Brazil-Belgium in the Quarter Final.
Ranked 4th is Nigeria-Iceland, which is surpris-
ing, as both countries are not tweeting much about
beer. Analysing the results in more detail reveals,
that all 7 matches took place on a day Brazil
played. Even though Tweets were normalized, the
influence of Brazilian BEER Tweets before and af-
ter a match of their team is enormous, so that even
the Nigeria-Iceland match achieved a high rank.
4 Results
This work presented a short analysis of alcohol
related emojis in context of the FIFA football
World Cup 2018. With the start of the tourna-
ment we showed, that most countries strongly in-
crease the number of Tweets containing beer emo-
jis. As many people tweet less after their national
team left the tournament, we draw the conclusion
that leaving the tournament early, as Germany did,
is the healthiest solution - unless you are Peru.
We also showed that people of many participating
teams of the tournament tweet significantly more
about alcohol during a match of their team. Fur-
thermore we presented the increase of alcohol re-
lated Tweets during the tournament and the most
popular games in terms of beer and football emo-
jis. Finally we showed, that Brazil tweets by far
the most about beer. Cheers!
Acknowledgements
This research was supported by the German Fed-
eral Ministry of Economics and Energy (BMWi)
through the project MACSS (01MD16011F).
References
Sofiane Abbar, Yelena Mejova, and Ingmar Weber.
2015. You tweet what you eat: Studying food con-
In Proceedings of the
sumption through twitter.
33rd Annual ACM Conference on Human Factors
in Computing Systems, CHI '15, pages 3197 -- 3206,
New York, NY, USA. ACM.
Peter Anderson, Avalon de Bruijn, Kathryn Angus,
Ross Gordon, and Gerard Hastings. 2009.
Impact
of alcohol advertising and media exposure on ado-
lescent alcohol use: A systematic review of longitu-
dinal studies. Alcohol and Alcoholism, 44(3):229 --
243.
Aron Culotta. 2013. Lightweight methods to estimate
influenza rates and alcohol sales volume from twit-
ter messages. Language resources and evaluation,
47(1):217 -- 238.
Brenda Curtis, Salvatore Giorgi, Anneke E. K. Buf-
fone, Lyle H. Ungar, Robert D. Ashford, Jessie
Hemmons, Dan Summers, Casey Hamilton, and
H. Andrew Schwartz. 2018. Can twitter be used to
predict county excessive alcohol consumption rates?
PLOS ONE, 13(4):1 -- 16.
Nabil Hossain, Tianran Hu, Roghayeh Feizi,
Ann Marie White, Jiebo Luo, and Henry A.
Kautz. 2016. Precise localization of homes and
activities: Detecting drinking-while-tweeting pat-
terns in communities. In Proceedings of the Tenth
International Conference on Web and Social Me-
dia, Cologne, Germany, May 17-20, 2016., pages
587 -- 590.
Tom Huang, Anas Elghafari, Kunal Relia, and Rumi
Chunara. 2017. High-resolution temporal represen-
tations of alcohol and tobacco behaviors from so-
cial media data. Proceedings of the ACM on human-
computer interaction, 1(CSCW).
Daniel Kershaw, Matthew Rowe, and Patrick Stacey.
2014. Towards tracking and analysing regional alco-
hol consumption patterns in the uk through the use
of social media. In Proceedings of the 2014 ACM
conference on Web science, pages 220 -- 228. ACM.
Megan A. Moreno, Leslie R. Briner, Amanda Williams,
Libby Brockman, Leslie Walker, and Dimitri A.
Christakis. 2010. A content analysis of displayed
alcohol references on a social networking web site.
Journal of Adolescent Health, 47(2):168 -- 175.
Michael Roerecke and Jurgen Rehm. 2012. Alco-
hol intake revisited: Risks and benefits. Current
Atherosclerosis Reports, 14(6):556 -- 562.
Philippe Thomas and Leonhard Hennig. 2018. Twit-
ter Geolocation Prediction Using Neural Networks.
In Language Technologies for the Challenges of the
Digital Age, pages 248 -- 255, Cham. Springer Inter-
national Publishing.
|
1610.03901 | 1 | 1610 | 2016-10-12T23:41:01 | The Role of Reciprocity and Directionality of Friendship Ties in Promoting Behavioral Change | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | Friendship is a fundamental characteristic of human beings and usually assumed to be reciprocal in nature. Despite this common expectation, in reality, not all friendships by default are reciprocal nor created equal. Here, we show that reciprocated friendships are more intimate and they are substantially different from those that are not. We examine the role of reciprocal ties in inducing more effective peer pressure in a cooperative arrangements setting and find that the directionality of friendship ties can significantly limit the ability to persuade others to act. Specifically, we observe a higher behavioral change and more effective peer-influence when subjects shared reciprocal ties with their peers compared to sharing unilateral ones. Moreover, through spreading process simulation, we find that although unilateral ties diffuse behaviors across communities, reciprocal ties play more important role at the early stages of the diffusion process. | cs.SI | cs | The Role of Reciprocity and Directionality of
Friendship Ties in Promoting Behavioral Change
Abdullah Almaatouq(cid:63), Laura Radaelli, Alex Pentland, and Erez Shmueli
Massachusetts Institute of Technology,
77 Massachusetts Ave, Cambridge, MA 02139, USA
[email protected]
Abstract. Friendship is a fundamental characteristic of human beings
and usually assumed to be reciprocal in nature. Despite this common
expectation, in reality, not all friendships by default are reciprocal nor
created equal. Here, we show that reciprocated friendships are more in-
timate and they are substantially different from those that are not. We
examine the role of reciprocal ties in inducing more effective peer pressure
in a cooperative arrangements setting and find that the directionality of
friendship ties can significantly limit the ability to persuade others to
act. Specifically, we observe a higher behavioral change and more effec-
tive peer-influence when subjects shared reciprocal ties with their peers
compared to sharing unilateral ones. Moreover, through spreading pro-
cess simulation, we find that although unilateral ties diffuse behaviors
across communities, reciprocal ties play more important role at the early
stages of the diffusion process.
Keywords: Social Networks; Contagion; Adoption; Reciprocity
1
Introduction
Friendship is a fundamental characteristic of human relationships and individuals
generally presume it to be reciprocal in nature. Despite this common expecta-
tion [13], in reality not all friendships are reciprocal [16,14]. The implications of
friendships on an individual's behavior depend as much on the identity of his
friends as on the quality of friendships [15]. Among qualities of a relationship,
reciprocity can substantially differentiate a friendship from many others. It is
reasonable to think that relationships that are reciprocated are substantially
different from those that are not [15].
Moreover, in recent years, peer-support programs are emerging as highly
effective and empowering ways to leverage peer influence to support behavioral
change [10]. One specific type of peer-support programs is the "buddy system,"
in which individuals are paired with another person (i.e., a buddy) who has the
responsibility to support their attempt to change their behavior. Such a system
has been used to shape people's behavior in various domains including smoking
cessation [20], weight loss [23], diabetes management or alcohol misuse [22].
(cid:63) corresponding authors
6
1
0
2
t
c
O
2
1
]
I
S
.
s
c
[
1
v
1
0
9
3
0
.
0
1
6
1
:
v
i
X
r
a
2
Almaatouq et. al.
Consequently, the need to understand the factors that impact the level of in-
fluence individuals exert on one another is of great practical importance. Recent
studies have investigated how the effectiveness of peer influence is affected by
different social and structural network properties, such as clustering of ties [5],
similarity between social contacts [6], and the strength of ties [4]. However, how
the effectiveness of social influence is affected by the reciprocity and direction-
ality of friendship ties is still poorly understood.
When analyzing self-reported relationship surveys from several experiments,
we find that only about half of the friendships are reciprocal. These findings
suggest a profound inability of people to perceive friendship reciprocity, perhaps
because the possibility of non-reciprocal friendship challenges one's self-image.
We further show that the asymmetry in friendship relationships has a large
effect on the ability of an individual to persuade others to change their behavior.
Moreover, we show that the effect of directionality is larger than the effect of
the self-reported strength of a friendship tie [4] and thus of the implied 'social
capital' of a relationship. Our experimental evidence comes through analysis
of a fitness and physical activity intervention, in which subjects were exposed
to different peer pressure mechanisms, and physical activity information was
collected passively by smartphones. In this experiment, we find that effective
behavioral change occurs when subjects share reciprocal ties, or when a unilateral
friendship tie exists from the person applying the peer pressure to the subject
receiving the pressure, but not when the friendship tie is from the subject to the
person applying peer pressure.
Our findings suggest that misperception of friendships' character for the ma-
jority of people may result in misallocation of efforts when trying to promote a
behavioral change.
2 Results
2.1 Reciprocity and Intimacy
Despite the unique characteristics and importance of reciprocal friendships, reci-
procity is implicitly assumed in very many scientific studies of friendship net-
works: in their analysis they either mark two individuals as friends of each other,
or as not being friends. However, not all friendships are reciprocal, as we proceed
to demonstrate.
We analyze surveys that were used to determine the closeness of relationships
(i.e., friendships) among participants in the Friends and Family study. Each
participant in the study scored other participants on a 0− 7 scale, where a score
of 0 meant that the participant was not familiar with the other, and 7 that the
participant was very close to the other.
The self-reported closeness scores were then used to build the friendship
network. Similar to [1], we considered only explicit friendship ties (closeness >
2). In this network, we consider a friendship tie to be "reciprocal" when both
participants identify each other as friends. Alternatively, the tie is "unilateral"
Directionality of Friendship Ties and Behavioral Change
3
when only one of the participants identifies the other as a friend. Figure 1 depicts
the resulting network which consists of 122 nodes and 698 edges (i.e., explicit
friendships), of which 315 are reciprocal (i.e., 45%) and 383 are unilateral (i.e.,
55%). Surprisingly, more than half of the participants' friendship ties are not
reciprocated, which indicates the non-intuitive observation that people are very
vulnerable to misjudging their friendship relationships and implies that people
are unable to perceive reciprocity [2].
We find this result to be consistent across many self-reported friendship net-
works that we have analyzed: only 45% (315 out of 698) of friendships are re-
ciprocal in the Friends and Family dataset [1], 34% (28 out of 82) in the Reality
Mining dataset [9], 35% (555 out of 1596) in the Social Evolution dataset [17],
and 49% (102 out of 208) in the Strongest Ties dataset [21]. The first three
surveys were collected at an American university, and the fourth at a European
university.
Similarly, a previous study [24] in which adolescents were asked to nominate
at most 10 of their best school friends (5 male and 5 female) found that only
64% of the reported friendships were indeed reciprocal. Our findings reinforce
this finding by investigating multiple datasets from two continents, and by using
complete nomination networks (in which each participant is asked about every
other participant), resulting in an even more prominent lack of reciprocity.
Finally, analyzing the closeness scores associated with the two types of ties in
the Friends and Family friendship network reveals that participants that share a
reciprocal friendship tend to score each other higher (on average) when compared
to participants that share unilateral friendship. More specifically, the average
closeness score of reciprocal ties (4.7) is almost one point higher than the average
score of unilateral ties (3.9) and the difference is statistically significant (two-
sample T-test p < 0.0001).
2.2 Induced peer pressure
Social scientists have long suspected that reciprocal friendships are more inti-
mate, provide higher emotional support, and form a superior resource of social
capital when compared to those that are not reciprocated. This holds whether or
not any party of the dyad is aware of the status of reciprocity embedded in their
relationships [24]. However, we hypothesize that 'reciprocity' and 'directionality'
of friendships may be critical factors in promoting peer influence, beyond the
mere effect of the total tie 'strength' bound up in the relationship.
To support our hypothesis, we investigate the FunFit experiment -- a fitness
and physical activity experimental intervention -- conducted within the Friends
and Family study population during October to December of 2010. The exper-
iment was presented to participants as a wellness game to help them increase
their daily activity levels. Subjects received an 'activity app' for their mobile
phone which passively collected their physical activity data and showed the par-
ticipants how their activity level had changed relative to their previous activity
level, and the amount of money they had earned by being more active. 108 out of
the 123 active Friends and Family subjects at that time elected to participate and
4
Almaatouq et. al.
Fig. 1. Subfigure A depicts the undirected friendship nomination graph in the Friends
and Family study, where nodes represent participants and edges represent friendship
ties. Subfigure B shows the distribution of closeness scores for reciprocal and unilat-
eral ties. ECDF and KDE of closeness scores are computed separately for unilateral
ties (dashed line) and reciprocal ties (solid line).
were allocated into three experimental conditions, allowing us to isolate different
incentive mechanisms varying monetary reward, the value of social information,
and social pressure/influence:
-- Control: subjects were shown their own progress and were given a monetary
reward based on their own progress in increasing physical activity relative
to the previous week.
-- Peer See: subjects were shown their own progress and the progress of two
"buddies" in the same experimental group, and were given a monetary re-
ward based on their own progress in increasing physical activity relative to
the previous week.
-- Peer Reward: subjects were shown their own progress and the progress
of two "buddies" in the same experimental group, but their rewards de-
pended only on the progress of the two "buddies". This condition realizes
a social mechanism based on inducing peer-to-peer interactions and peer
pressure [19].
However, for the purpose of our analysis in this section, we combine the samples
from the two peer pressure treatments, as we are interested in peer pressure
regardless of the incentive structure, and omit the control group.
During the initial 23 days of the experiment (Oct 5 - Oct 27), denoted as P1,
the baseline activity levels of the subjects were collected. The actual intervention
period is denoted as P2. During the intervention period, the subjects were given
feedback on their performance in the form of a monetary reward. The monetary
p < 0.0001Cumulative Distribution FunctionCloseness ScoreKDE4020Participant Degree3357Friendship ScoreFriendship TypeReciprocalUnilateralABDirectionality of Friendship Ties and Behavioral Change
5
reward was calculated as a function of the subject's activity data relative to the
previous week and was divided according to the subject's experimental condition
(i.e., Peer See and Peer Reward). Note that the physical activity was measured
passively by logging the smartphone accelerometer (as opposed to self-reported
surveys) and the game was not designed as a competition, every subject had
the potential to earn the maximal reward. A previously non-active participant
could gain the same reward as a highly active one, while the highly active person
would need to work harder.
The results in [1] show that the two social conditions (i.e. Peer See and Peer
Reward) do significantly better than the control group. Furthermore, the results
suggest that there is a complex contagion effect [7], due to the reinforcement
of the behavior from multiple social contacts [5,7], related to pre-existing social
ties between participants. Our analysis here focuses on the role of reciprocity
and directionality of friendship ties in this contagion process.
In order to investigate the role of reciprocity and directionality of friend-
ship ties in the contagion process, we performed a regression analysis in which
the dependent variable was the change in physical activity between the post-
intervention phase and the pre-intervention phase (i.e., the average daily physical
activity in P2 divided by the average daily physical activity in P1).
For our study, we refer to a participant whose behavior is being analyzed
as "ego", and participants connected to the ego (i.e., experimental "buddies")
are referred to as "alters". Because friendship nominations are directional, we
studied the three possible types of friendships (from the prospective of the ego)
as independent variables: an "ego perceived friend", in which an alter identifies
an ego as a friend (i.e., incoming tie); an "alter perceived friend" in which an
ego identifies an alter as a friend (i.e., outgoing tie); and a "reciprocal friend,"
in which the identification is bidirectional (i.e., reciprocal tie). Finally, we also
included the tie strength (i.e., the sum of the closeness scores between an ego and
his or her alters) as a control variable, which has been previously investigated
as a moderator of the effect of social influence [4].
Figure 2 reports the effects found in our regression analysis (recall that the
dependent variable in our model is the change in activity for the egos). We
find that the reciprocity and directionality of a friendship have an effect on the
amount of induced peer pressure, and these effects are much larger than the total
tie strength.
The strongest effect for both treatment groups (N = 76) in this study was
found for the reciprocal factor (p < 0.01) even when controlling over the strength
of the tie (the tie strength is weakly significant p = 0.07). That is, alters in
reciprocal friendships have more of an effect on the ego than alters in other
types of friendships.
Interestingly, when the ego was perceived as a friend by the alters (i.e., in-
coming edges from the alters to the ego), the effect was also found to be positive
and significant (p < 0.05). On the other hand, no statistically significant effect
was found when the alters were perceived as friends by the ego (i.e., outgoing
edges from the ego to the alters). Therefore, the amount of influence exerted by
6
Almaatouq et. al.
Fig. 2. Change in physical activity under experiment conditions shows that the type of
friendship is relevant to the effectiveness of the induced peer pressure. The plot shows
the mean effect size of the covariates (solid circles) and the 95% confidence intervals
(bars).
individuals on their peers in unilateral friendship ties seems to be dependent on
the direction of the friendship.
Unlike previous works on social contagion effects [8,11], which were conducted
without peer-to-peer incentives, we find that influence does not flow from nomi-
nated alter to nominating ego. Surprisingly, alter's perception of ego as a friend
would increase alter's ability to influence ego's behavior when ego does not re-
ciprocate the friendship. We attribute this difference to the fact that there is a
peer-to-peer incentive mechanism, and therefore there are likely to be differences
in communication when the alters believe the ego to be their friend versus when
they do not.
2.3 Reciprocity and Global Adoption
In order to understand the effect of reciprocal ties on global behavior adop-
tion, we experimented with a variation of the classic epidemic spreading model,
Susceptive-Infected (SI) model. We refer to this variant as the Bi-Directional
Susceptive-Infected (BDSI) model. Unlike the classic SI in which behavior is
transmitted along edges with a constant probability, the proposed BDSI model
considers the direction in which behaviors can be transmitted with different
probabilities based on the direction and type of edges -- i.e. prec for reciprocal
edges and p+/p− for the two possible directions of unilateral edges.
In order to observe the effects of reciprocal edges on diffusion, we employ
an edge percolation process in which we measure the coverage (i.e., number of
infected nodes), denoted by Z, and time to infect, denoted by T , when removing
reciprocal and unilateral edges successively (i.e., perturbation F ). That is, F
ReciprocalfriendAlter perceived friendEgo perceived friendTie strengthDirectionality of Friendship Ties and Behavioral Change
7
Fig. 3. Subfigure A demonstrates the effect of perturbation on the coverage and
speed of adoption. Subfigure B illustrates how the coverage and speed decay faster
when removing reciprocal edges in comparison with unilateral edges.
is the percentage of edges removed in perturbation. We find the nature of the
simulation results are qualitatively independent of the choice of prec, p+ and p−
given that prec ≥ p+ ≥ p−.
Figure 3 shows the behavior adoption coverage when simulating the BDSI
model on the self-reported friendship network from the Friends and Family
dataset. As can be seen in the figure, the coverage Z decays much faster when re-
moving reciprocal edges (left figure) compared with removing the same amount
of unilateral edges (right figure). Moreover, the difference in coverage ∆Z is af-
fected remarkably by the removal of reciprocal edges most notably in the early
stages of the diffusion process (e.g., T ∈ [5, 10]). This can be attributed to the
rapid diffusion within a single community through reciprocal edges, correspond-
ing to fast increases in the number of infected users in early stages of the diffusion
process, followed by plateaus, corresponding to time intervals during which no
24681012141618200.000.050.100.150.200.250.300.350.400.4524681012141618200.00.20.40.60.81.0ReciprocalUnilateralA051015202500.10.20.30.40.5−0.15−0.1−0.0500.05 −0.12−0.1−0.08−0.06−0.04−0.020BTime, TPerturbation, FCoverage, ZTime, TPerturbation, F∆Coverage, ∆Z8
Almaatouq et. al.
new nodes are infected the behavior escapes the community (i.e., through the
strength of weak tie [12]) to the rest of the network through unilateral edges.
3 Future Work & Discussion
In this paper we have demonstrated the important role that reciprocity and
directionality of friendship ties play in inducing effective social persuasion. We
have also shown that the majority of individuals have difficulty in judging the
reciprocity and directionality of their friendship ties (i.e., how others perceive
them), and that this can be a major limiting factor for the success of cooperative
arrangements such as peer-support programs. Finally, through spreading process
simulation, the experimental results highlight the important role that reciprocal
ties play in the spreading of behaviors at the early stages of the process.
Previous studies have found that people tend to adopt the behaviors of peers
that they are passively exposed to, with the explicit self-reported friends and
intimate social acquaintances playing a peripheral role (e.g., [18,5]). Other stud-
ies have shown that passive exposures to peer behavior can increase the chances
of becoming obese [8,18], registering for a health forum Web site [5], signing up
for an Internet-based diet diary [6], or adopting computer applications [3]. How-
ever, our results suggest a fundamental difference between how social learning
(i.e., passive exposure) and social persuasion (i.e., active engagement) spread
behaviors from one person to another.
The findings of this paper have significant consequences for designing inter-
ventions that seek to harness social influence for collective action. This paper also
has significant implications for research into peer pressure, social influence, and
information diffusion as these studies have typically assumed undirected (recip-
rocal) friendship networks, and may have missed the role that the directionality
of friendship ties plays in social influence.
References
1. Aharony, N., Pan, W., Ip, C., Khayal, I., Pentland, A.: Social fmri: Investigating
and shaping social mechanisms in the real world. Pervasive and Mobile Computing
7(6), 643 -- 659 (2011)
2. Almaatouq, A., Radaelli, L., Pentland, A., Shmueli, E.: Are you your friends?
friend' poor perception of friendship ties limits the ability to promote behav-
ioral change. PLoS ONE 11(3), 1 -- 13 (03 2016), http://dx.doi.org/10.1371%
2Fjournal.pone.0151588
3. Aral, S., Walker, D.: Identifying influential and susceptible members of social net-
works. Science 337(6092), 337 -- 341 (2012)
4. Aral, S., Walker, D.: Tie strength, embeddedness and social influence: A large scale
networked experiment. Management Science (2014)
5. Centola, D.: The spread of behavior in an online social network experiment. science
329(5996), 1194 -- 1197 (2010)
6. Centola, D.: An experimental study of homophily in the adoption of health behav-
ior. Science 334(6060), 1269 -- 1272 (2011)
Directionality of Friendship Ties and Behavioral Change
9
7. Centola, D., Macy, M.: Complex contagions and the weakness of long ties1. Amer-
ican Journal of Sociology 113(3), 702 -- 734 (2007)
8. Christakis, N.A., Fowler, J.H.: The spread of obesity in a large social network over
32 years. New England journal of medicine 357(4), 370 -- 379 (2007)
9. Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Personal
and ubiquitous computing 10(4), 255 -- 268 (2006)
10. Ford, P., Clifford, A., Gussy, K., Gartner, C.: A systematic review of peer-support
programs for smoking cessation in disadvantaged groups. International journal of
environmental research and public health 10(11), 5507 -- 5522 (2013)
11. Fowler, J.H., Christakis, N.A.: Dynamic spread of happiness in a large social net-
work: longitudinal analysis of the framingham heart study social network. BMJ:
British medical journal pp. 23 -- 27 (2009)
12. Granovetter, M.S.: The strength of weak ties. American journal of sociology pp.
1360 -- 1380 (1973)
13. Hartup, W.W.: Adolescents and their friends. New Directions for Child and
Adolescent Development 1993(60), 3 -- 22 (1993), http://dx.doi.org/10.1002/cd.
23219936003
14. Hartup, W.W.: Adolescents and their friends. New Directions for Child and Ado-
lescent Development 1993(60), 3 -- 22 (1993)
15. Hartup, W.W.: The company they keep: Friendships and their developmental sig-
nificance. Child development 67(1), 1 -- 13 (1996)
16. Laursen, B.: Close friendships in adolescence. New Directions for Child and Ado-
lescent Development 1993(60), 3 -- 32 (1993)
17. Madan, A., Cebrian, M., Moturu, S., Farrahi, K., Pentland, A.: Sensing the" health
state" of a community. IEEE Pervasive Computing 11(4), 36 -- 45 (2012)
18. Madan, A., Moturu, S.T., Lazer, D., Pentland, A.S.: Social sensing: obesity, un-
healthy eating and exercise in face-to-face networks. In: Wireless Health 2010. pp.
104 -- 110. ACM (2010)
19. Mani, A., Rahwan, I., Pentland, A.: Inducing peer pressure to promote cooperation.
Scientific reports 3 (2013)
20. May, S., West, R.: Do social support interventions (buddy systems) aid smoking
cessation? a review. Tobacco Control 9(4), 415 -- 422 (2000)
21. de Montjoye, Y.A., Stopczynski, A., Shmueli, E., Pentland, A., Lehmann, S.: The
strength of the strongest ties in collaborative problem solving. Scientific reports 4
(2014)
22. Rotheram-Borus, M.J., Tomlinson, M., Gwegwe, M., Comulada, W.S., Kaufman,
N., Keim, M.: Diabetes buddies peer support through a mobile phone buddy sys-
tem. The Diabetes Educator 38(3), 357 -- 365 (2012)
23. Stock, S., Miranda, C., Evans, S., Plessis, S., Ridley, J., Yeh, S., Chanoine, J.P.:
Healthy buddies: a novel, peer-led health promotion program for the prevention
of obesity and eating disorders in children in elementary school. Pediatrics 120(4),
e1059 -- e1068 (2007)
24. Vaquera, E., Kao, G.: Do you like me as much as i like you? friendship reciprocity
and its effects on school outcomes among adolescents. Social Science Research
37(1), 55 -- 72 (2008)
|
1907.11620 | 1 | 1907 | 2019-06-12T09:24:04 | Exploiting weak ties in trust-based recommender systems using regular equivalence | [
"cs.SI",
"cs.IR"
] | User-based Collaborative Filtering (CF) is one of the most popular approaches to create recommender systems. CF, however, suffers from data sparsity and the cold-start problem since users often rate only a small fraction of available items. One solution is to incorporate additional information into the recommendation process such as explicit trust scores that are assigned by users to others or implicit trust relationships that result from social connections between users. Such relationships typically form a very sparse trust network, which can be utilized to generate recommendations for users based on people they trust. In our work, we explore the use of regular equivalence applied to a trust network to generate a similarity matrix that is used for selecting k-nearest neighbors used for item recommendation. Two vertices in a network are regularly equivalent if their neighbors are themselves equivalent and by using the iterative approach of calculating regular equivalence, we can study the impact of strong and weak ties on item recommendation. We evaluate our approach on cold-start users on a dataset crawled from Epinions and find that by using weak ties in addition to strong ties, we can improve the performance of a trust-based recommender in terms of recommendation accuracy. | cs.SI | cs |
Exploiting weak ties in trust-based recommender systems using
regular equivalence
Tomislav Duricic
Graz University of Technology
Graz, Austria
[email protected]
Dominik Kowald
Know-Center GmbH
Graz, Austria
[email protected]
Emanuel Lacic
Know-Center GmbH
Graz, Austria
[email protected]
Elisabeth Lex
Graz University of Technology
Graz, Austria
[email protected]
ABSTRACT
User-based Collaborative Filtering (CF) is one of the most popular
approaches to create recommender systems. CF, however, suffers
from data sparsity and the cold-start problem since users often rate
only a small fraction of available items. One solution is to incor-
porate additional information into the recommendation process
such as explicit trust scores that are assigned by users to others
or implicit trust relationships that result from social connections
between users. Such relationships typically form a very sparse trust
network, which can be utilized to generate recommendations for
users based on people they trust. In our work, we explore the use
of regular equivalence applied to a trust network to generate a
similarity matrix that is used for selecting k-nearest neighbors used
for item recommendation. Two vertices in a network are regularly
equivalent if their neighbors are themselves equivalent and by us-
ing the iterative approach of calculating regular equivalence, we
can study the impact of strong and weak ties on item recommen-
dation. We evaluate our approach on cold-start users on a dataset
crawled from Epinions and find that by using weak ties in addition
to strong ties, we can improve the performance of a trust-based
recommender in terms of recommendation accuracy.
Problem & objective. Ever since their introduction, user-based
Collaborative Filtering (CF) approaches have been one of the most
widely adopted and studied algorithms in the recommender systems
literature [9]. CF is based on the intuition that those users, who
have shown similar item rating behavior in the past, will likely
give similar ratings to items in the future. The basis of CF is to
retrieve the k-nearest neighbors of a target user for whom the
recommendations are generated and to recommend items from
these k neighbors, which were rated highly by them but have not
yet been rated by the target user. An issue of CF is the cold-start
user problem, i.e., novel users, who have rated zero or only a small
number of items [10] and whose ratings cannot thus be exploited
to find similar users.
As a remedy, trust-based CF methods exploit trust statements
expressed by users on platforms such as Epinions [7]. Such trust
statements can be explicit, i.e., users assign trust scores to others
or implicit, i.e., users engage in social connections with others
ESCSS 2019, September 02-04, 2019, Zurich, Switzerland
2019. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00
https://doi.org/xx.xxx/xxxxxx.xxxxxx
they trust. Based on explicit and implicit trust statements, we can
generate trust networks and recommend items for users based
on people they trust [6]. Since trust networks are often sparse, a
particular property of trust, namely transitivity, can be exploited to
propagate trust in the network by forming weak ties between users.
In this way, new connections are established between users, who do
not share a direct link, but are weakly connected via intermediary
users [2, 7].
In our work, we focus on the first step of CF, i.e., finding the k-
nearest neighbors. We explore the power of weak ties to find similar
neighbors by utilizing a similarity measure from network science
referred to as "Katz similarity" (KS) [8]. Although Katz himself never
discussed it, KS captures regular equivalence of nodes in a network
and can be applied in many different settings [4, 5].
Approach & method. Firstly, we utilize the trust connections to
create an adjacency matrix where each entry represents a directed
trust link between two users. Secondly, we apply the KS measure
on the created trust adjacency matrix. More specifically, we calcu-
late the pairwise similarities between users by using the iterative
approach for calculating KS:
lmax
(lmax +1) =
σ
(αA)l
(1)
l =0
The iterative approach provides the possibility to set the maxi-
mum used path length (lmax ). This approach effectively gives us
the ability to define the maximum path length used for forming
weak ties between users who are not directly connected. We use
the resulting similarity matrix and apply various row normaliza-
tion (L1, L2, max) and degree normalization techniques (in-degree,
out-degree, and combined degree normalization) to get a better
distribution of similarity values and better evaluation results con-
cerning recommendation accuracy in return. Lastly, we apply an
additional method to increase the similarity values derived from
weak ties [1]:
σboost = A + σnorm
(2)
where σnorm is calculated by setting the values of strong tie simi-
larities in σ to 0, normalizing the resulting matrix and then setting
them to 1. With this approach, we achieve that each entry in σboost
has a similarity value of 1 between pairs of nodes for which there
exists an explicit trust connection in A while also increasing the
importance of similarity values derived from weak ties. We evalu-
ate these approaches on the Epinions dataset presented in [7] and
compare results for lmax = 1 (using only strong ties) and lmax = 2
(using strong ties in combination with weak ties derived from paths
of length 2).
Results & discussion. In our study, we evaluate 33 approaches
for various combinations of lmax values and normalization tech-
niques. We compare these approaches with three different baselines:
MP (recommending most popular items), Trustexp (CF using trust
connections for finding top k similar neighbors) and Trustjac (CF
using Jaccard coefficient on explicit trust values for finding top k
similar neighbors). However, in Table 1, we only report the results
for a subset of these approaches that provide the most insightful
findings. All of the evaluation results are reported for n = 10, i.e.,
for 10 recommended items.
Approach
lmax
Degree
norm.
Row
norm.
Boost
nDCG
R
P
Trustexp
Trustjac
MP
Combined Max
Combined Max
Combined
L1
No degree
L2
Combined Max
N/A
In degree
No degree
N/A
2
2
2
2
1
1
2
Yes
No
Yes
Yes
No
No
No
.0224
.0176
.0134
.0303
.0295
.0273
.0257
.0213
.0161
.0036
.0296
.0219
.0202
.0425
.0422
.0358
.0340
.0289
.0243
.0057
.0110
.0087
.0070
.0117
.0113
.0106
.0106
.0106
.0087
.0020
KSPCMB
KSPCM N
KSPCL1B
KSP N L2B
KSN CM N
KSN I N N
KSP N N N
Table 1: Evaluation results for a subset of the 33 evaluated
KS-based CF approaches
The Trustexp baseline uses only strong ties (explicit trust con-
nections) for making recommendations and one of our main finding
from the results of the conducted experiments is that by incorporat-
ing weak ties using paths of maximum length 2 from the target node
(i.e. similar to adding friends of friends into the neighborhood), we
can improve the quality of the recommendations in terms of recom-
mendation accuracy with the best approach being the KSPCMB. In
the best performing approach, we set lmax to 2, apply combined de-
gree (sum of in and out degrees) normalization, remove the strong
ties, then perform max row normalization and then add the strong
ties with the similarity value of 1. We also find that if we don't
employ weak ties, i.e., lmax is set to 1, we achieve better results
when we do not apply degree and row normalization (i.e., basi-
cally the Trustexp baseline). However, if lmax is set to 2, we can
observe improvements in almost all of the cases except when no
row normalization is applied, e.g., in the case of KSP N N N .
Finally, in Figure 1, we show the performance of all approaches
listed in Table 1 in form of Recall-Precision plots for different num-
ber of recommended items (i.e., n = 1 − 10). The results clearly
show that the best performing algorithm (i.e., KSPCMB) again out-
performs all of the other approaches also for a smaller number of
recommended items (i.e., for n < 10).
Figure 1: Recall-Precision plots of the described approaches
for n = 1 − 10 recommended items.
Conclusion & future work. In this paper, we explored the use of
Katz similarity (KS), a similarity measure of regular equivalence
in networks, for selecting k-nearest neighbors in a Collaborative
Filtering (CF) algorithm for cold-start users. We used an iterative
approach to compute KS since it provides the ability to restrict
the length of paths in the network used for similarity calculation.
Consequently, we can investigate weak ties of arbitrary length. We
found that KS can be a useful measure for neighbor selection if used
with degree normalization and row normalization. In summary,
with our work, we aimed to shed light on how to exploit weak
ties in social networks to increase the performance of trust-based
recommender systems. For future work, we plan to run additional
experiments using different values for lmax and to explore the use
of recently popularized node embeddings (e.g., Node2Vec [3]) to
identify weak ties between users.
Keywords. Weak ties; Katz similarity; Trust-based recommenders
REFERENCES
[1] Tomislav Duricic, Emanuel Lacic, Dominik Kowald, and Elisabeth Lex. 2018.
Trust-based collaborative filtering: tackling the cold start problem using regular
equivalence. In Proceedings of the 12th ACM Conference on Recommender Systems.
ACM, 446 -- 450.
[2] Jennifer Ann Golbeck. 2005. Computing and applying trust in web-based social
[9] J Ben Schafer, Dan Frankowski, Jon Herlocker, and Shilad Sen. 2007. Collaborative
filtering recommender systems. In The adaptive web. Springer, 291 -- 324.
[10] Andrew I Schein, Alexandrin Popescul, Lyle H Ungar, and David M Pennock.
2002. Methods and metrics for cold-start recommendations. In Proceedings of the
25th annual international ACM SIGIR conference on Research and development in
information retrieval. ACM, 253 -- 260.
networks. Ph.D. Dissertation.
[3] Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for
networks. In Proceedings of the 22nd ACM SIGKDD international conference on
Knowledge discovery and data mining. ACM, 855 -- 864.
[4] Ilire Hasani-Mavriqi, Dominik Kowald, Denis Helic, and Elisabeth Lex. 2018.
Consensus dynamics in online collaboration systems. Computational social
networks 5, 1 (2018), 2.
[5] Denis Helic. 2014. Regular equivalence in informed network search. In Informa-
tion and Communication Technology, Electronics and Microelectronics (MIPRO),
2014 37th International Convention on. IEEE, 1088 -- 1093.
[6] Neal Lathia, Stephen Hailes, and Licia Capra. 2008. Trust-based collaborative
filtering. In IFIP international conference on trust management. Springer, 119 -- 134.
[7] Paolo Massa and Paolo Avesani. 2007. Trust-aware recommender systems. In
Proceedings of the 2007 ACM conference on Recommender systems. ACM, 17 -- 24.
[8] Mark Newman. 2010. Networks: An Introduction. Oxford University Press, Inc.,
New York, NY, USA. 217 -- 220 pages.
0.0050.0100.0150.0200.025Precision0.000.010.020.030.04RecallTrustexpTrustjacMPKSPCMBKSPCMNKSPCL1BKSPNL2BKSNCMNKSNINNKSPNNN |
1905.04260 | 1 | 1905 | 2019-05-10T17:00:40 | Check-It: A Plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web | [
"cs.SI",
"cs.CL",
"cs.CY"
] | Over the past few years, we have been witnessing the rise of misinformation on the Web. People fall victims of fake news during their daily lives and assist their further propagation knowingly and inadvertently. There have been many initiatives that are trying to mitigate the damage caused by fake news, focusing on signals from either domain flag-lists, online social networks or artificial intelligence. In this work, we present Check-It, a system that combines, in an intelligent way, a variety of signals into a pipeline for fake news identification. Check-It is developed as a web browser plugin with the objective of efficient and timely fake news detection, respecting the user's privacy. Experimental results show that Check-It is able to outperform the state-of-the-art methods. On a dataset, consisting of 9 millions of articles labeled as fake and real, Check-It obtains classification accuracies that exceed 99%. | cs.SI | cs | Check-It: A plugin for Detecting and Reducing the Spread of
Fake News and Misinformation on the Web
Demetris Paschalides, Chrysovalantis
Christodoulou, Rafael Andreou, George Pallis,
Marios D. Dikaiakos
{dpasch01,cchris47,randre07,gpallis,mdd}@cs.ucy.ac.cy
Computer Science Department, University of Cyprus
Nicosia, Cyprus
Alexandros Kornilakis, Evangelos Markatos
{kornilak,markatos}@ics.forth.gr
Department of Computer Science, University of Crete
Heraklion, Crete, Greece
9
1
0
2
y
a
M
0
1
]
I
S
.
s
c
[
1
v
0
6
2
4
0
.
5
0
9
1
:
v
i
X
r
a
ABSTRACT
Over the past few years, we have been witnessing the rise of mis-
information on the Web. People fall victims of fake news during
their daily lives and assist their further propagation knowingly and
inadvertently. There have been many initiatives that are trying to
mitigate the damage caused by fake news, focusing on signals from
either domain flag-lists, online social networks or artificial intelli-
gence. In this work, we present Check-It, a system that combines, in
an intelligent way, a variety of signals into a pipeline for fake news
identification. Check-It is developed as a web browser plugin with
the objective of efficient and timely fake news detection, respecting
the user's privacy. Experimental results show that Check-It is able
to outperform the state-of-the-art methods. On a dataset, consisting
of 9 millions of articles labeled as fake and real, Check-It obtains
classification accuracies that exceed 99%.
CCS CONCEPTS
• Networks → Online social networks; • Computing method-
ologies → Lexical semantics; Feature selection; Information ex-
traction.
KEYWORDS
Web of Trust, Fake News Detection, News Content
1 INTRODUCTION
Motivation and Problem: Misinformation is not a recent issue. As
early as 1925, when news offices started to connect to each other via
wire, the authenticity of information became a concern. Editors did
not really know whether the news coming in through the wire was
true or not. They could try to infer authenticity based on the source
of the news, but still the concern remained: is this piece of news that
just came over the wire true or not? Although the concern was there,
the editors usually managed to find ways to mitigate it and reduce
the intentional misinformation to the minimum possible: after all,
the amount of news that came over the wire and could potentially
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
WI '19, October 14-17, 2019, Thessaloniki, Greece
© 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM.
ACM ISBN 978-1-4503-9999-9/18/06...$15.00
https://doi.org/10.1145/1122445.1122456
be misinformation was not that large. Unfortunately, the "tsunami"
of social media engagement that has swept our lives over the past
decade practically exploded the proliferation of misinformation
including the associated distribution of fake news [2].
State of the Art and its Limitations: Despite the increasing
interest in analyzing fake news in the Web and the development
of tools to deal with fake news that had been previously identified,
there has been very little work in automatic fake news detection
tools. Currently people do not have the tools they need in order
to filter out information they are not interested in. For example, if
their friends share fake news from time to time, they do not have
any way to tell the social media platform "I do not want the fake
news my friends (probably) inadvertently propagate. Can you filter
the fake news (not my friends!) out of my social feed? Or better
yet, can you label the fake news as such? I will then do the filtering
out." The main problem stems from the fact that it is difficult to
develop classification algorithms to capture fake news. Researchers
in [12] studied the feasibility of using a crowdsourcing platform to
identify rumours and fake news in social media. According to their
research outcomes, the annotators achieve high inter-annotator
agreement. In [28], authors found that fake news posts in social
media are usually provoking posts (i.e., tweets) from users who raise
questions about these posts. In this direction, another approach
that has been proposed is the development of browser plugins, such
as the B.S. Detector1 and the FakerFact2, which flag content from
fake news sources using a constantly-updated list of known fake
news sites as a reference point.
Approach and Contribution: The focus of our work is the de-
tection of news content that is fabricated and can be verified to be
false. In this paper, we present a plugin that fights disinformation
using an automated approach. Our approach is inspired by the way
we fight SPAM email messages. Indeed, to fight SPAM, computer
scientists have developed SPAM filters: automated programs that
scan all email messages of each user, categorize them as SPAM
(trash email) or HAM (regular email) and filter the SPAM out of the
users mailboxes. In this paper, we follow the exact same approach:
we process all information (e.g. tweets, posts, web documents, etc.)
that users see online and characterize them as misinformation or
not. If we find misinformation we clearly label it so that the user will
be warned that he should be careful before believing this current
piece of news. For experimental studies, we have developed our
system as a plug in for the popular web browsers, namely Google's
Chrome and Mozilla's Firefox. However, our method is general and
1 http://bsdetecor.tech
2 https://www.fakerfact.org/
WI '19, October 14-17, 2019, Thessaloniki, Greece
Paschalides et al.
applicable to any browser. A key difficulty in our approach is to
combine in an intelligent way a variety of signals in order to decide
whether a piece of news is misinformation. Such signals include:
the reputation of the person (account) posting the news, the repu-
tation of the web site where the news is hosted, natural language
processing features that characterize a fake news article etc. Using
a deep learning approach, we combine all these features towards
providing a rating that is timely and accurate. Another key aspect
of our system is that it protects the privacy of user (GDPR compli-
ant) since the plugin works locally on the user's browser without
the need of external communication. We empirically evaluate our
proposed method via extensive experiments on real-world datasets
from Twitter and news articles, demonstrating that our approach
significantly improves the performance on detecting and reducing
the spread of fake news and misinformation on the Web. Specifi-
cally, we showcase that our linguistic model, with the appropriate
threshold, is able to achieve classification accuracies that exceed
99%. To evaluate our approach, we have trained our model with the
Fake News Corpus which includes 9 million articles labeled as fake
and real. To the best of our knowledge, this is the biggest corpus in
the research community.
Roadmap. The rest of this work is organized as follows. In
Section 2 we describe related work from the literature. In Section 3
we describe our approach. In Section 4 we describe our experimental
setup and detail the performance of our approach. In Section 5 we
conclude this article.
2 RELATED WORK
The task of fake news detection is similar to various other interest-
ing challenges ranging from SPAM detection to rumor detection
[12]. In recent years, researchers are seeking to better define and
characterize misinformation and its place in the larger information
ecosystem [19]. An important aspect of characterizing misinfor-
mation is to understand how people perceive the credibility of
information. People usually tend to believe news that confirm what
they already know, or what they already believe to be true [24].
News that go contrary to their beliefs (no matter how true the news
are), may be met with high degrees of resistance. Thus, presenting
people with the facts does not necessarily change their minds -
several people keep on believing the fake news. To make matters
worse, repeating the fake news, even in the context of refuting
them, just makes them stronger. Thus, it seems that we need to
explore non-obvious approaches to fight misinformation [10].
Facebook is already partnering with fact-checking organizations.
Facebook users are able to flag articles they suspect contain false
information. These articles are then handed over to an independent
evaluation centre. When a false story is identified, rather than being
removed, it is tagged with a warning that it contains fake news
and appears lower down in users feeds. Recently, Facebook will
provide to social scientists unprecedented access to its data so that
they can investigate how the spread of fake news on social media
influences elections3. Another initiative aiming to help citizens
make informed choices ahead of the 2017 French election is the
First Draft News project CrossCheck, a collaborative verification
programme involving technology firms including Facebook and
3https://www.nature.com/articles/d41586-019-01447-5
Google. The project sees journalists from across France working
together to find and verify online content, including photos, videos,
memes, comment threads and news sites. Similarly, Washington
Post asked its readers to use the term "Fake News" so as to report
the fake news. However, this term was used maliciously and it
ended up being not so successful. Besides, some effort has also been
done to detect fake news, including approaches that apply text-
based methods[1] and fact-checking through knowledge graphs4.
However, the current fact-checkers and crowdsourcing initiatives
have limitations since they cannot cope with the high volume of
misinformation generated online, and are usually disconnected
from the Web browser, which is the medium used from users to
read and share misinformation.
A few early studies tried to detect fake news based on linguis-
tic features extracted from the text of news stories [20],[21],[27].
Recent studies have also shown that social networking features
play a very important role in detecting fake news [24]. Deep neural
networks have been successfully applied to fake news detection
[19],[20],[21]. Technical details regarding these approaches are
presented in the evaluation section. However, all the existing ap-
proaches are trying to solve the problem using only one signal of
information (i.e., fact-checking web sites, linguistic features, social
networking features). Most current studies on misinformation ei-
ther focus on analysing the influence of the topology of the social
network on the consumption and sharing of misinformation, or
taking into account the linguistic characteristics. Also, most sys-
tems tend to focus on the technical and not on the human aspects
of the problem (i.e., the motivations of the users when generating
and spreading misinformation). Our model is inspired from the
SPAM detection research. Our system will assemble all sources of
signal, and will combine them into one signal score. The score will
reflect how confident we are that the story is fake (or not), and ex-
plore relationships among news commentsfi topicality, temporality,
sentiment, virality and quality.
3 CHECK-IT SYSTEM
Check-It satisfies a series of user-centric functional requirements
revolving around the user's data privacy, as listed below:
• Preserve User Privacy: Check-It plugin should work lo-
cally, on the user's web browser, without the need of external
communication (i.e. a RESTful API).
• Highly Confident Identification: Check-It labels a piece
• Low Response Time: All the required resources, such as
the flag-list and linguistic model, are efficiently loaded in the
user's web browser. Also, the interconnected components of
the plugin have been developed so as to have low response
time.
• Lightweight Computation: Asynchronous processing and
parallelization is taken place so as to minimize the load of
the plugin.
of news as fake if it is highly confident about it.
Thus, our main objective is: to provide a Web browser plugin that
detects efficiently and timely the fake news articles respecting the
user's privacy.
4http://www.breitbart.com/big-government/2017/08/23/
delingpole-all-of-recent-u-s-warming-has-been-faked-by-noaa
Check-It: A plugin for Detecting Fake News and Misinformation on the Web
WI '19, October 14-17, 2019, Thessaloniki, Greece
Figure 1: Architectural diagram for the Check-It System.
As depicted in Figure 1, Check-It system consists of four main
components that function as a pipeline for fake news identification
on the web. The Flag-list Matcher component matches domains of
news articles to Known Fake News Domains and Fact Checks; the
Fact Check Similarity component compares a piece of news against
Known Fact Checked Articles labelled as fake from Fact Checking
organizations, such as Politifact5 and Snopes6; the Online Social
Network User Analysis component is responsible for analyzing user
behavior in social networks and producing a User-Blacklist of fake
news propagators; and lastly, the Linguistic Model component, an
artificial intelligence model, has been trained on linguistic features,
of the Fake News Corpus, for the detection of fake news articles.
Check-It preserves the user's privacy, whilst providing the ap-
propriate functionality and performance, by loading the required re-
sources locally, on the user's device. These resources are combined
in a Resource Package, which includes the Fake News Flag-lists, the
Known Fact Checked Articles, the User-Blacklist and the binary-
produced Linguistic Model. The Resource Package is available by
the Check-It Server. The only communication between the Check-It
Server and the user, is during the installation of the plugin, where
the required resources are downloaded and installed on the user's
end (user-blacklist, fake news flag-list, known fact checked articles,
and linguistic model), and any critical updates on those resources.
At the Check-It Plugin User Installment, the resources are loaded
within the plugin, and assigned to their respective components. In
addition to the Fact Check Similarity, Flag-list Matcher and User-
Blacklist Checker, the Linguistic Model requires the features from
the article's to be extracted. To this end, the JavaScript Feature
Extraction Library was developed, responsible to capture the re-
quired features from within the article, and use them as input to
the Linguistic Model Binary.
3.1 Flag-list Matcher
Some domain names are well known for spreading misinformation.
Whether they do it on purpose, or for fun (such as satire), the infor-
mation they provide is frequently not accurate and they should not
be used as trusted sources of news. Currently there are several lists
(which we call them flag-lists) with contain domain names that host
sites known for spreading misinformation. These lists are typically
established and maintained by researchers or volunteers whose
aim is to warn Internet users by "flagging" information sources of
dubious credibility. The "flagging" provides some explanation with
respect to why a domain name is included in the flag-list. For exam-
ple, the flag may be "fake news," which means that the site spreads
misinformation, or "biased," which means that the site is known to
promote a biased point of view. A non-exhaustive list of the flag-
lists we have used includes Kaggle7, OpenSources8, Greek-Hoaxes9,
and several others.
Our system has been designed in order to be easily configurable
with respect to the flag lists it takes into account. URL flag-lists
and domain name checking is the simplest way for an initial, fast
assessment of the trustworthiness of a news article. Unfortunately,
flag-lists do not test the truthfulness of the article itself: they just
comment on the reputation of the website publishing the article. In
that respect, flag-lists can be very helpful as long as they identify
sites that consistently engage in disinformation campaigns or in
propaganda spreading, in which case they can easily flag articles
hosted in dubious sites. Nevertheless, one might want to be able to
reason about the credibility of articles hosted in dubious web sites.
To further assess the validity of such articles we use (i) fact-checking
web sites (section 3.2) and (ii) machine learning approaches (sections
3.3 and 3.4), as we describe below.
5https://www.politifact.com/
6https://www.snopes.com/
7https://www.kaggle.com/mrisdal/fake-news
8https://raw.githubusercontent.com/BigMcLargeHuge/opensources/master/sources/
sources.csv
9https://raw.githubusercontent.com/Ellinika-Hoaxes/Greek-Hoaxes-Detector/
master/data/data.json
Online SocialNetwork User AnalysisLinguistic Model Training Fact CheckingSources KnownFactCheckedArticles UserBlacklistFake News Flag-listFakeNewsCorpusLinguisticModelBinaryOnline SocialNetworks Known Fake NewsDomainsResourcePackageJavaScript FeatureExtraction Library LinguisticModelBinaryFlag-list Matcher Fact CheckSimilarityUser-BlacklistChecker Fake News Flag-listKnownFactCheckedArticles UserBlacklistURL Entity User IDSuspiciousArticleOnline SocialNetworks Article's Domain Article's Content Article's Content Check-It ServerResource Package BuildCheck-It Plugin User InstallmentWI '19, October 14-17, 2019, Thessaloniki, Greece
Paschalides et al.
3.2 Fact Check Similarity
A number of Web sites currently in operation are dedicated to
combating propaganda, misinformation, and hoaxes circulating on
the Internet. These sites typically employ professional journalists
(or even volunteers) who invest the time to research and comment
on the truthfulness of articles shared on the web and on online social
media, focusing primarily on evaluating the accuracy of articles
or stories that become viral and receive increased user attention
[22]. Once the truthfulness or falsehood of an article is established,
these web sites publicize their findings and associated information
(URL etc). Check-It capitalizes on fact-checking web sites, by cross
checking every article processed by its plugin against a list of fact-
checking web sites, generating an informative warning when an
article happens to be found listed on these web sites.
3.3 Online Social Network User Analysis
Since OSNs play an important role in the propagation of fake
news [10], we have incorporated another signal in the Check-It
toolkit. The idea behind the OSN signal is to provide a dynamic
user-blacklist, matching user IDs with a falsity score, indicating the
likelihood of a user to post fake news articles. The user-blacklist is
dynamically generated by continuously processing OSN data and
applying a DeGroot-based user probabilistic model [5] for the user
falsity score calculation. DeGroot model is used since it introduces
a simple mechanism of opinion propagation: every individual forms
her opinion by averaging her own opinion with those of her friends.
The process is repeated until all opinions converge. Although the
mechanism is simple, it models sufficiently opinion diffusion and
incorporates elaborate characteristics of the process [5]. Figure 2
presents the overall pipeline of the module and its components,
which we describe in the next paragraphs.
Figure 2: Architectural diagram for the social network sig-
nal.
The system design of Check-It facilitates integration with mul-
tiple OSN platforms. Currently, we only support Twitter due its
massive popularity and the ease-of-access to its data stream via
the Twitter Streaming API10. In particular, our system consumes
tweets from two sources: a) tweets from the general public and b)
tweets containing URLs of known fake news domains. The output
of the system is a User-Blacklist of fake news propagators.
The Flag-list Matcher component is responsible to mark tweets
that contain a URL entity and positively answer the following
question: Does the URL originate from a suspicious domain? The
tweets that have not been marked by the Flag-list Matcher are
ordered in a timely manner and processed by the session-based
model in groups of 1-hour sessions (Sessionizer task). A similar
approach has been used in [24]. Then, each session is assigned to
the Retweet Graph Generator, which is responsible for the creation
of the retweet graph of the session. A retweet graph G = (V , E)
consists of nodes u, v ∈ V depicting users and edges (u, v) ∈ E
10https://developer.twitter.com/en/docs/tweets/filter-realtime/overview
(0)
i
representing the retweet action between users u and v. After the
generation of the retweet graph, the User Probabilistic Model is
applied in order to calculate the falsity score per user and produce
the User-Blacklist. Initially, each user ui is assigned with a falsity
score of p
= 0. Next, we briefly present the user probabilistic
model that is based on the DeGroot's Learning Model.
Let A be the adjacency matrix of the retweet graph G. We have
that A(u,v)=1 if u retweeted v. We create a transition matrix T by
inverting the edges in A (as the influence flows from the retweeted
user to the user who retweeted him or her), adding a self-loop to
each of the nodes and then normalizing each row in A so it sums to
1 (meaning that each user is equally influenced by every user he or
she retweets). Matrix T includes the weight a node adds on another
based on the sharing of fake news articles. We then associate a
= 1 to every user who posted a suspicious tweet
falsity score p
= 0 to all who did not. Lastly, we create new scores p(t)
and p
using the updating rule p(t) = T · p(t − 1). In summary, the falsity
score of a user increases if that user posts or retweets a suspicious
tweet (a tweet that contains a URL from the flag-list).
(0)
i
(0)
i
3.4 Linguistic Model
The linguistic component analyzes the actual content of the news
article. Check-It extracts from an article's headline and body spe-
cific linguistic features, which have been widely used to detect fake
news [7, 17, 25]. These features are used as input to a Deep Neural
Network (DNN), which has been trained to predict the article's
veracity. Rather than traditional machine learning, the deep learn-
ing approach was used due to the performance amplification it can
achieve in the detection of fake news [19, 26] as well as in other
problems addressed with artificial intelligence techniques. Next, we
present an overview of the article dataset, the different linguistic
features, and the DNN model.
3.4.1 Dataset Overview. Online news articles can be collected from
different sources, such as news agency homepages, search engines,
and social media websites. However, the manual determination
of the veracity of news is a challenging task, usually requiring
annotators with domain expertise. Check-It makes use of Fake
News Corpus11, an open source dataset composed of 9 million
news articles. These articles originate from a curated list of 1001
domains collected from opensources.co. The entries are divided
into 12 groups: fake news, satire, extreme bias, conspiracy theory,
rumor mill, state news, junk science, hate news, clickbait, political,
and credible. In the scope of Check-It, we focus solely on the fake
news and credible categories of the dataset, consisting of 1 million
and 2 million articles respectively. As the dataset describes, fake
news is considered when originating from "sources that entirely
fabricate information, disseminate deceptive content, or grossly distort
actual news reports", whereas credible are "sources that circulate news
and information in a manner consistent with traditional and ethical
practices in journalism".
Linguistic Features. Fake news detection on traditional news
3.4.2
media mainly relies on news content, such as the headline and the
body of an article. We compute different linguistic features that can
11https://github.com/several27/FakeNewsCorpus
Flag-list FilteredTweetsGeneralTweetsTweetsFake News MatcherSessionizer Retweet GraphGeneratorUserProbabilisticModelUser-BlacklistCheck-It: A plugin for Detecting Fake News and Misinformation on the Web
WI '19, October 14-17, 2019, Thessaloniki, Greece
be found in the headline and body of articles, in order to extract
discriminative characteristics for the detection of fake news. These
features are extracted and fed to the DNN model via the JavaScript
Feature Extraction Library at Check-It plugin User Installment
(Figure 1. We group these features into 3 broad categories: stylistic,
complexity and psychological.
Stylistic Features: These are based on natural language pro-
cessing to understand the syntax and text style of each article body
and headline. Text style features include the frequency of stop-
words, punctuation, quotes, negations and words that appear in all
capital letters, whereas syntactical features include the frequency
of Part-of-Speech tags in the text.
Complexity Features: These are based on deeper natural lan-
guage processing computations aiming at capturing the overall
intricacy of an article or headline. This intricacy can be computed
based on several word-level metrics that include readability indexes
and vocabulary richness. Specifically, we compute the Gunning Fog,
SMOG Grade, and Flesh-Kincaid grade level readability indexes.
Each measure computes a grade level reading score based on the
number of complex words (e.g. over 3 syllables). A higher index
means a document takes a higher education level to read. Moreover,
we compute the Type-Token Ratio, which can be defined as the
number of unique words divided by the total number of words
in the article. In order to capture the vocabulary richness of the
content, we also compute the number of hapax legomenon and dis
legomenon, which correspond to phrase that occurs only once and
twice within a context.
Psychological Features: The psychological features are based
on the count of words found in expert dictionaries that are asso-
ciated with different psychological processes. These dictionaries
include the negative and positive opinion lexicon [11], and the
moral foundation dictionary [4]. The sentiment score is computed
via the AFINN sentiment lexicon [13], a list of English terms man-
ually rated for valence. The AFINN sentiment score is defined as
an integer number between -5 and +5, indicating the negative and
positive score respectively.
Feature Selection. The stylistic, complexity and psychologi-
3.4.3
cal features are extracted from both the headline and body of the
articles in the dataset, summing in 534 features. Such a large num-
ber of features results in an extensive model and deem the local
execution as inadequate. In addition, unnecessary features can have
side-effects during the model's training, decreasing training speed,
model's interpretability, and generalization performance. In order
to mitigate these issues, we proceed with a feature selection process
to capture the 20 most descriptive features that facilitate the classi-
fication of news articles into fake or reliable. Below, we describe
the feature selection process that is applied:
(1) Missing Values: Remove features with a high percentage
of missing values e.g. 60%. Such features are not useful for
the classification tasks as they do not carry any information,
and can also affect the performance of the model.
(2) Single Unique Values: Remove features with a single unique
value, which have zero variance and have no contribution
to the training of the model.
(3) Collinear Features: Remove highly correlated features, which
may lead to decreased generalization performance on the
test set due to high variance and less model interpretability.
These features are selected based on a specified correlation
coefficient value (i.e., Pearson correlation coefficient).
(4) Zero Importance: Calculate the importance of the remain-
ing features according to a gradient boosting decision tree
model, and remove features with zero importance.
(5) Low Importance: This step builds on the feature impor-
tance calculated in step (4), and its task is to remove features
with low importance as they do not contribute to the to-
tal predefined importance. Principal Components Analysis
(PCA) is used, keeping only the required principal compo-
nents so as to retain a certain percentage of the variance (i.e,
95%).
The above feature selection process resulted in removing 134 fea-
tures. From the remainder, the 20 most important were selected
based on their importance scores, as extracted from step (4) (Table 1).
These include the average number of stop-words in a sentence, the
ratio of uppercase letters in the headline and the AFINN sentiment
score.
No. Feature
1
2
Total number of lines
Avg. number of stop-words per sen-
tence
Ratio of uppercase letters
Ratio of uppercase letters
Avg. number of uppercase words per
sentence
Avg. number of characters per word
Ratio of alphabetic letters
Number of proper nouns (NP)
Avg. number of sentences beginning
with lowercase letter
Avg. AFINN sentiment score
Total number of characters
Ratio of digits
Avg. number of sentences beginning
with uppercase letter
Ratio of alphabetic letters
Number of genitive markers (POS)
Number of colon or ellipsis
Total number of words beginning
with uppercase letter
Number of colon or ellipsis
Avg. number of characters per word
Avg. number of stop-words per sen-
tence
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Score
0.0693
0.0185
Type
Body
Body
0.0177 Headline
0.0152
0.0142 Headline
Body
Body
0.0141
0.0139 Headline
0.0128
0.0126
Body
Body
Body
0.0123
0.0122 Headline
0.0122
0.0122
Body
Body
Body
Body
0.0119
0.0116
0.0116 Headline
0.0113
Body
Body
0.0102
0.0096 Headline
0.0094 Headline
Table 1: Table with the 20 most important features as re-
sulted from the feature selection process.
3.4.4 Deep Neural Network Model. Similar to the linguistic feature
selection, the proposed DNN model is compliant to the functional
requirements set at the beginning of the project. It is a prerequisite
WI '19, October 14-17, 2019, Thessaloniki, Greece
Paschalides et al.
that the model is compatible with conventional user devices and
modern web browsers, as it is available as a traditional web browser
plugin. Additional requirements are the low response time, light-
weight computations and high confidence for the output. In order to
address these challenges, the proposed DNN model adopts the cone-
like structure, referred to as the bottleneck principle, and is known
to perform well with numerical features [6, 23]. The structure of
the model is depicted in Figure 3.
Before feeding the data into the DNN model, any categorical
data are transformed into numerical, either via discretization or
one-hot encoding, depending on the particulars of the input. As
a result, each data entry is represented as a vector of numerical
features. After the pre-processing, the data is used as input to the
DNN model via the model's input layer.
The next layer is a Batch Normalization Layer [8] which is re-
sponsible for the normalization of the activations of the previous
layer (input layer) at each batch. Neural networks work better when
the input data have zero mean and unit variance, as this enables
faster learning and higher overall accuracy. A Batch Normaliza-
tion Layer can achieve this by transforming and maintaining the
mean and variance of its input close to zero. Next, the normalized
output enters a set of fully connected layers (dense layers) that
form the bottleneck. Such a bottleneck has been shown to result
in automatic construction of high-level features. In our implemen-
tation, we experimented with multiple architectures, settling in a
sequence of 5 layers that consist of 512, 256, 128, 64 and 32 neurons
respectively. The final sequence is the one that provided the best
results in our task. The units of the network are activated using the
hyperbolic tangent activation function (tanh) since it is a better fit
when working with standardized numerical data.
Finally, in the DNN model's classification layer, one neuron
per class is used with the softmax activation function to produce
the probability pair of Pr eal and Pf ake, which correspond to the
probability of the article being real or fake respectively.
Figure 3: Architectural diagram for the deep neural network
model used in the linguistic component.
4 EVALUATION
For the evaluation of the Check-It plugin, we focus on the linguis-
tic model and the user-blacklist generated by the Online Social
Network User Analysis component. The Fake News Flag-lists and
Known Fact Checked Articles are left out of the system evaluation
since they provide us with 100% accurate results. The task of these
components is to transfer facts from the knowledge experts, such
as the news site reviewers, from which the curated list of fake news
domains was collected, and fact checking organizations consisting
of journalists, reporters and experts from related fields.
4.1 Linguistic Model Evaluation
For the implementation of the linguistic model presented in Section
3.4, Python Keras12 has been used with Tensorflow13 as back-end.
The training epochs for the model have been fixed at 100 with
mini-batches of 128. During training, categorical cross-entropy [3]
has been used as loss function and Adam [9] as the optimization
function. Îďo prevent the model from over-fitting, an early stop-
ping mechanism has been used. Early stopping is responsible for
interrupting the training if the validation loss does not drop for 10
consecutive epochs. All the experiments were run in a stratified
3-fold cross validation, and executed on a Virtual Machine with
Ubuntu 16.4, 16 VCPUs and 32GB of RAM. For the different param-
eters and the sake of training time, we also used Google's Colab14,
a 12 hour free subscription to a Google Cloud VM with 13 GB of
RAM and a Tesla K80 GPU. Finally, in order to be compatible with
the user's internet browser, the model was exported with Tensor-
flow JS15. Tensorflow JS is a library for developing, training and
exporting deep learning models in JavaScript, and deploying in the
web browser.
We compared our system against 3 state-of-the-art works [15,
20, 21]. Note that for a fair comparison we chose baselines that
only consider news contents, similar to our approach.The selected
datasets include Buzzfeed News (BF) and Politifact (PF), which are
publicly available in the authors Github16 repository. For evaluation
metrics, we use accuracy, precision, recall and F1 score.
Shu et al. 2018 [21] utilize the BF and PF datasets in their work.
The authors extracted news content features based on a combi-
nation of the vector space model and rhetorical structure theory
(RST) [18] and the Linquistic Inquiry and Word Count (LIWC) lex-
icon [14], a widely used bundle of lexicons, that are able extract
psycholignuistic features to capture deception within the articles.
These features were used to train two separate SVM classifiers,
namely SV MRST and SV MLIW C. Furthermore, Shu et al. 2018b
[20], utilize the GC and PF datasets to train several models, in-
cluding an SVM, Logistic Regression (LR), Naive Bayes (NB) and
a Convolutional Neural Network (CNN), focusing on one-hot vec-
tor representation of the data. Potthast et al. [15] train 4 different
Random Forest (RF) classifiers that consider the style and topic
of the articles, 2 of them being generic, namely GRFST Y LE and
GRFT OP IC, and 2 of them considering the political orientation of
the articles, namely ORFST Y LE and ORFT OP IC. The authors utilize
the BF dataset, having information regarding the article's political
orientation.
Next, we present the overall results of the state-of-the-art and
compare them with the performance of our model. Table 2 presents
the results of the BF dataset and Table 3 presents the results of
the PF dataset. As displayed in Tables 2 and 3, Check-It linguistic
model outperforms the state-of-the-art works. Our DNN, based
on the deep learning paradigm, does not depend on handcrafted
features, it rather generates abstract features, able to better capture
the writing style of fake news [16].
12https://keras.io/
13https://www.tensorflow.org/
14https://colab.research.google.com/
15https://www.tensorflow.org/js
16https://github.com/KaiDMML/FakeNewsNet/tree/master/dataset
Input LayerBatch Normalization LayerDense Layer512 NeuronsDense Layer256 NeuronsDense Layer128 NeuronsDense Layer 64 NeuronsDense Layer32 NeuronsClassification LayerPrealPfakeCheck-It: A plugin for Detecting Fake News and Misinformation on the Web
WI '19, October 14-17, 2019, Thessaloniki, Greece
Model
Reference
Acc.
Shu et al. 2018 [21] SV MLIW C 0.610
0.655
SV MRST
GRFST Y LE 0.550
GRFT OP IC 0.520
ORFST Y LE 0.550
ORFT OP IC 0.580
F1
0.555
0.623
0.520
0.510
0.535
0.560
Check-It Model DN N
0.703 0.713 0.703 0.700
Table 2: Overall results on the comparison with the state-of-
the-art for the Buzzfeed News (BF) dataset.
R
0.561
0.628
0.525
0.515
0.540
0.555
P
0.602
0.683
0.520
0.515
0.535
0.555
Potthast et al. [15]
Reference
Shu et al. 2018 [21]
F1
Acc.
Model
0.544
0.571
SV MRST
0.615
SV MLIW C 0.637
0.659
0.580
SV M
0.633
0.642
LR
0.651
0.617
N B
0.629
0.583
CN N
Check-It Model
0.722 0.725 0.725 0.722
DN N
Table 3: Overall results on the comparison with the state-of-
the-art for the Politifact (PF) dataset.
R
P
0.533
0.595
0.667
0.621
0.611
0.717
0.757 0.543
0.630
0.674
0.807
0.456
Shu et al. 2018b [20]
million tweets contained URLs from known fake news domains. In
terms of user accounts, we processed a total of 8.1 million unique
users. The users are categorized, based on their calculated falsity
score, into users with low score [0-0.25), medium score [0.25-0.50),
high score [0.50-0.75) and ultra high score [0.75-1.0). As we move
from a low score to an ultra high score, the probability of a user, to
disseminate a fake article, is increased.
Taking into account the daily tweeting frequencies of the users
in each group, we compared them with the frequencies of tweets
containing URLs of known fake news domains (fake URLs). Figure
6 depicts the frequencies of all the tweets and the tweets containing
fake URLs. We see that users falling into the low falsity group have
a large overall tweeting frequency with low frequency of tweets
with fake URLs. Medium and high falsity groups present a rise on
the frequency of tweets containing fake URLs. Users with ultra
high falsity score seem to have lower overall frequency, but rather
high frequency of tweets with fake URLs. Thus, the User-Blacklist
consists of the users from the ultra high falsity group.
The datasets used for this experiment was to merely compare
our model to the existing state-of-the-art models. Training our
model with datasets of a few hundred records like the above, does
not meet the expectations of deep learning [3]. Thus, as described
in Section 3.4.1, we trained on Fake News Corpus, a dataset with
millions of articles from domains, labelled as fake and real. Our
model is able to achieve an accuracy of 0.930, as well as 0.940
Precision, 0.937 Recall, and 0.937 F1 score.
4.1.1 Optimization. Despite the promising results, an error margin
of 0.07 still exists. In order to reduce the error margin, we examined
the number of false positives (FP) and true negatives (TN). Figure
5 depicts the number of FP and TN as a function of the threshold,
starting from 0.50 to 0.99 with step of 0.01. To achieve the maximum
confidence, we chose the threshold to be 0.99, which resulted to 0
FP (Figure 4). To test the generalization of our model and the per-
formance with the adjusted threshold, an additional evaluation was
made on several authoritative articles from news sources including
"The Guardian", "New York Times", CNN and BBC. Specifically, 1158
articles were used as input to the DNN model with the adjusted
threshold, from which only a single article was miss-classified as
fake.
4.2 Online Social Network User Analysis
Evaluation
The task of Online Social Network User Analysis component is to
build the User-Blacklist that includes the users that disseminate
misinformation through social media. Our evaluation took place
the time period from October 31st 2018 to December 2nd 2018,
where we processed a total of 150 million tweets, from which 30
Figure 4: Confusion matrix of default classifications and
classifications with threshold.
Figure 5: Number of False Positives and True Negatives as
Function of Threshold
FakeReliableFakeFakeTReliableReliableTTruePredictedConfusion Matrix of Fake and Reliable ClassificationsDefault Classifications vs. Classifications with Threshold465017383493262367046325000 0 1000 2000 3000 4000 5000 6000 7000 0 1000 2000 3000 4000 5000 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1Number of ArticlesThreshold ValueNumber of False Positives and True Negatives as Function of ThresholdFalse PositivesTrue NegativesWI '19, October 14-17, 2019, Thessaloniki, Greece
Paschalides et al.
[10] David M. J. Lazer, Matthew A. Baum, Yochai Benkler, Adam J. Berinsky, Kelly M.
Greenhill, Filippo Menczer, Miriam J. Metzger, Brendan Nyhan, Gordon Penny-
cook, David Rothschild, Michael Schudson, Steven A. Sloman, Cass R. Sunstein,
Emily A. Thorson, Duncan J. Watts, and Jonathan L. Zittrain. 2018. The science of
fake news. Science 359, 6380 (2018), 1094 -- 1096. https://doi.org/10.1126/science.
aao2998 arXiv:https://science.sciencemag.org/content/359/6380/1094.full.pdf
[11] Bing Liu, Minqing Hu, and Junsheng Cheng. 2005. Opinion Observer: Analyzing
and Comparing Opinions on the Web. In Proceedings of the 14th International
Conference on World Wide Web (WWW '05). ACM, New York, NY, USA, 342 -- 351.
https://doi.org/10.1145/1060745.1060797
[12] Richard McCreadie, Craig Macdonald, and Iadh Ounis. 2015. Crowdsourced Ru-
mour Identification During Emergencies. In Proceedings of the 24th International
Conference on World Wide Web (WWW '15 Companion). ACM, New York, NY,
USA, 965 -- 970. https://doi.org/10.1145/2740908.2742573
[13] Finn Årup Nielsen. 2011. A new Evaluation of a word list for sentiment analysis
in microblogs. CoRR abs/1103.2903 (2011). arXiv:1103.2903 http://arxiv.org/abs/
1103.2903
[14] James W Pennebaker, Ryan L Boyd, Kayla Jordan, and Kate Blackburn. 2015. The
development and psychometric properties of LIWC2015. Technical Report.
[15] Martin Potthast, Johannes Kiesel, Kevin Reinartz, Janek Bevendorff, and Benno
Stein. 2017. A Stylometric Inquiry into Hyperpartisan and Fake News. CoRR
abs/1702.05638 (2017). arXiv:1702.05638 http://arxiv.org/abs/1702.05638
[16] Hannah Rashkin, Eunsol Choi, Jin Yea Jang, Svitlana Volkova, and Yejin Choi. 2017.
Truth of Varying Shades: Analyzing Language in Fake News and Political Fact-
Checking. In Proceedings of the 2017 Conference on Empirical Methods in Natural
Language Processing. Association for Computational Linguistics, Copenhagen,
Denmark, 2931 -- 2937. https://doi.org/10.18653/v1/D17-1317
[17] Victoria Rubin, Niall Conroy, Yimin Chen, and Sarah Cornwell. 2016. Fake
News or Truth? Using Satirical Cues to Detect Potentially Misleading News. In
Proceedings of the Second Workshop on Computational Approaches to Deception
Detection. Association for Computational Linguistics, San Diego, California, 7 -- 17.
https://doi.org/10.18653/v1/W16-0802
[18] Victoria L. Rubin and Tatiana Lukoianova. [n. d.]. Truth and deception at
the rhetorical structure level. Journal of the Association for Information Sci-
ence and Technology 66, 5 ([n. d.]), 905 -- 917. https://doi.org/10.1002/asi.23216
arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/asi.23216
[19] Natali Ruchansky, Sungyong Seo, and Yan Liu. 2017. CSI: A Hybrid Deep Model for
Fake News Detection. In Proceedings of the 2017 ACM on Conference on Information
and Knowledge Management (CIKM '17). ACM, New York, NY, USA, 797 -- 806.
https://doi.org/10.1145/3132847.3132877
[20] Kai Shu, Deepak Mahudeswaran, Suhang Wang, Dongwon Lee, and Huan Liu.
2018. FakeNewsNet: A Data Repository with News Content, Social Context
and Dynamic Information for Studying Fake News on Social Media. CoRR
abs/1809.01286 (2018). arXiv:1809.01286 http://arxiv.org/abs/1809.01286
[21] Kai Shu, Suhang Wang, and Huan Liu. 2017. Exploiting Tri-Relationship for Fake
News Detection. CoRR abs/1712.07709 (2017).
[22] James Thorne and Andreas Vlachos. 2018. Automated Fact Checking: Task
Formulations, Methods and Future Directions. In Proceedings of the 27th Interna-
tional Conference on Computational Linguistics. Association for Computational
Linguistics, Santa Fe, New Mexico, USA, 3346 -- 3359.
[23] Naftali Tishby and Noga Zaslavsky. 2015. Deep Learning and the Information
Bottleneck Principle. CoRR abs/1503.02406 (2015). arXiv:1503.02406 http://arxiv.
org/abs/1503.02406
[24] Soroush Vosoughi, Deb Roy, and Sinan Aral. 2018. The spread of true and false
news online. Science 359, 6380 (2018), 1146 -- 1151. https://doi.org/10.1126/science.
aap9559 arXiv:https://science.sciencemag.org/content/359/6380/1146.full.pdf
[25] Yafang Wang, Gerard de Melo, and Gerhard Weikum. 2018. Five Shades of
Untruth: Finer-Grained Classification of Fake News. 2018 IEEE/ACM International
Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2018),
593 -- 594.
[26] Yaqing Wang, Fenglong Ma, Zhiwei Jin, Ye Yuan, Guangxu Xun, Kishlay Jha, Lu
Su, and Jing Gao. 2018. EANN: Event Adversarial Neural Networks for Multi-
Modal Fake News Detection. In Proceedings of the 24th ACM SIGKDD International
Conference on Knowledge Discovery & Data Mining (KDD '18). ACM, New
York, NY, USA, 849 -- 857. https://doi.org/10.1145/3219819.3219903
[27] Amy X. Zhang, Aditya Ranganathan, Sarah Emlen Metz, Scott Appling, Con-
nie Moon Sehat, Norman Gilmore, Nick B. Adams, Emmanuel Vincent, Jen-
nifer Lee, Martin Robbins, Ed Bice, Sandro Hawke, David Karger, and An Xiao
Mina. 2018. A Structured Response to Misinformation: Defining and Annotat-
ing Credibility Indicators in News Articles. In Companion Proceedings of the
The Web Conference 2018 (WWW '18). International World Wide Web Confer-
ences Steering Committee, Republic and Canton of Geneva, Switzerland, 603 -- 612.
https://doi.org/10.1145/3184558.3188731
[28] Zhe Zhao, Paul Resnick, and Qiaozhu Mei. 2015. Enquiring Minds: Early Detec-
tion of Rumors in Social Media from Enquiry Posts. In Proceedings of the 24th
International Conference on World Wide Web (WWW '15). International World
Wide Web Conference, Republic and Canton of Geneva, Switzerland, 1395 -- 1405.
Figure 6: Tweeting frequencies of users that Check-It as-
signed "Low", "Medium", "High" and "Ultra High" falsity
scores.
5 CONCLUSION
In this paper, we presented Check-It, a fake news detection system,
developed as a web browser plugin. Check-it aims to take a bold
step towards detecting and reducing the spread of misinformation
on the Web. To do so, it empowers its users with the tools they need
to identify fake news. The major challenge of fake news detection
stems from newly emerged news on which existing approaches
only showed unsatisfactory performance. In order to address this
issue, we propose a pipeline based on a variety of signals, ranging
from domain name flag-lists to deep learning approaches. Extensive
experiments showcase that Check-It is effective and can outperform
the state-of-the-art models.
ACKNOWLEDGMENTS
This work is supported by the Google DNI grant (Check-it).
REFERENCES
[1] Niall J. Conroy, Victoria L. Rubin, and Yimin Chen. 2015. Automatic Deception
Detection: Methods for Finding Fake News. In Proceedings of the 78th ASIS&T
Annual Meeting: Information Science with Impact: Research in and for the Commu-
nity (ASIST '15). American Society for Information Science, Silver Springs, MD,
USA, Article 82, 4 pages. http://dl.acm.org/citation.cfm?id=2857070.2857152
[2] Miriam Fernandez and Harith Alani. 2018. Online Misinformation: Challenges
and Future Directions. In Companion Proceedings of the The Web Conference 2018
(WWW '18). International World Wide Web Conferences Steering Committee,
Republic and Canton of Geneva, Switzerland, 595 -- 602. https://doi.org/10.1145/
3184558.3188730
[3] Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT
Press. http://www.deeplearningbook.org.
[4] Jesse Graham, Jonathan Haidt, and Brian Nosek. 2009. Liberals and Conservatives
Rely on Different Sets of Moral Foundations. Journal of personality and social
psychology 96 (06 2009), 1029 -- 46. https://doi.org/10.1037/a0015141
[5] Morris H. DeGroot. 1974. Reaching a Consensus. J. Amer. Statist. Assoc. 69 (03
1974), 118 -- 121. https://doi.org/10.2307/2285509
[6] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep Residual
Learning for Image Recognition. CoRR abs/1512.03385 (2015). arXiv:1512.03385
http://arxiv.org/abs/1512.03385
[7] Benjamin D. Horne and Sibel Adali. 2017. This Just In: Fake News Packs a
Lot in Title, Uses Simpler, Repetitive Content in Text Body, More Similar to
Satire than Real News. CoRR abs/1703.09398 (2017). arXiv:1703.09398 http:
//arxiv.org/abs/1703.09398
[8] Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep
Network Training by Reducing Internal Covariate Shift. CoRR abs/1502.03167
(2015). arXiv:1502.03167 http://arxiv.org/abs/1502.03167
[9] Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimiza-
tion. CoRR abs/1412.6980 (2014). arXiv:1412.6980 http://arxiv.org/abs/1412.6980
Daily Tweet Frequencies of Users - Overall Frequencies vs. Fake URLs 1 10 100 1000 0 5 10 15 20 25Tweet FrequenciesNumber of Users Users with Low Falsity ScoreOverallFake URLs 1 10 100 0 5 10 15 20 25 Users with High Falsity ScoreOverallFake URLs 1 10 100 0 5 10 15 20 25 Users with Medium Falsity ScoreOverallFake URLs 1 10 100 0 5 10 15 20 25 Users with Ultra High Falsity ScoreOverallFake URLs |
1102.5046 | 3 | 1102 | 2013-01-02T23:59:15 | An In-Depth Analysis of Stochastic Kronecker Graphs | [
"cs.SI",
"cs.DM",
"physics.soc-ph"
] | Graph analysis is playing an increasingly important role in science and industry. Due to numerous limitations in sharing real-world graphs, models for generating massive graphs are critical for developing better algorithms. In this paper, we analyze the stochastic Kronecker graph model (SKG), which is the foundation of the Graph500 supercomputer benchmark due to its favorable properties and easy parallelization. Our goal is to provide a deeper understanding of the parameters and properties of this model so that its functionality as a benchmark is increased. We develop a rigorous mathematical analysis that shows this model cannot generate a power-law distribution or even a lognormal distribution. However, we formalize an enhanced version of the SKG model that uses random noise for smoothing. We prove both in theory and in practice that this enhancement leads to a lognormal distribution. Additionally, we provide a precise analysis of isolated vertices, showing that the graphs that are produced by SKG might be quite different than intended. For example, between 50% and 75% of the vertices in the Graph500 benchmarks will be isolated. Finally, we show that this model tends to produce extremely small core numbers (compared to most social networks and other real graphs) for common parameter choices. | cs.SI | cs | An In-Depth Analysis of Stochastic Kronecker Graphs
C. SESHADHRI, Sandia National Laboratories
ALI PINAR, Sandia National Laboratories
TAMARA G. KOLDA, Sandia National Laboratories
Graph analysis is playing an increasingly important role in science and industry. Due to numerous limita-
tions in sharing real-world graphs, models for generating massive graphs are critical for developing better
algorithms. In this paper, we analyze the stochastic Kronecker graph model (SKG), which is the founda-
tion of the Graph500 supercomputer benchmark due to its favorable properties and easy parallelization.
Our goal is to provide a deeper understanding of the parameters and properties of this model so that its
functionality as a benchmark is increased. We develop a rigorous mathematical analysis that shows this
model cannot generate a power-law distribution or even a lognormal distribution. However, we formalize
an enhanced version of the SKG model that uses random noise for smoothing. We prove both in theory
and in practice that this enhancement leads to a lognormal distribution. Additionally, we provide a precise
analysis of isolated vertices, showing that the graphs that are produced by SKG might be quite different
than intended. For example, between 50% and 75% of the vertices in the Graph500 benchmarks will be
isolated. Finally, we show that this model tends to produce extremely small core numbers (compared to
most social networks and other real graphs) for common parameter choices.
Categories and Subject Descriptors: D.2.8 [Software Engineering]: Metrics -- complexity measures, per-
formance measures; E.1 [Data]: Data Structures -- Graphs and Networks
General Terms: Algorithms, Theory
Additional Key Words and Phrases: graph models, R-MAT, Stochastic Kronecker Graphs (SKG), Graph500
1. INTRODUCTION
The role of graph analysis is becoming increasingly important in science and industry be-
cause of the prevalence of graphs in diverse scenarios such as social networks, the Web,
power grid networks, and even scientific collaboration studies. Massive graphs occur in a
variety of situations, and we need to design better and faster algorithms in order to study
them. However, it can be difficult to access to informative large graphs in order to test our
algorithms. Companies like Netflix, AOL, and Facebook have vast arrays of data but cannot
share it due to legal or copyright issues1. Moreover, graphs with billions of vertices cannot
be communicated easily due to their sheer size.
As was noted in [Chakrabarti and Faloutsos 2006], good graph models are extremely
important for the study and algorithmics of real networks. Such a model should be fairly
easy to implement and have few parameters, while exhibiting the common properties of real
networks. Furthermore, models are needed to test algorithms and architectures designed for
large graphs. But the theoretical and research benefits are also obvious: gaining insight into
the properties and processes that create real networks.
The stochastic Kronecker graph (SKG) [Leskovec and Faloutsos 2007; Leskovec et al.
2010], a generalization of the recursive matrix (R-MAT) model [Chakrabarti et al. 2004],
1For example, Netflix opted not to pursue the Netflix Prize sequel due to concerns about lawsuits; see
http://blog.netflix.com/2010/03/this-is-neil-hunt-chief-product-officer.html
This work was funded by the applied mathematics program at the United States Department of Energy and
performed at Sandia National Laboratories, a multiprogram laboratory operated by Sandia Corporation, a
wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's
National Nuclear Security Administration under contract DE-AC04-94AL85000.
Author's addresses: C. Seshadhri, A. Pinar, T. Kolda, Sandia National Laboratories, Livermore, CA 94551.
3
1
0
2
n
a
J
2
]
I
S
.
s
c
[
3
v
6
4
0
5
.
2
0
1
1
:
v
i
X
r
a
A:2
C. Seshadhri, A. Pinar, T. G. Kolda
has been proposed for these purposes. It has very few parameters and can generate large
graphs quickly. Indeed, it is one of the few models that can generate graphs fully in parallel.
It has been empirically observed to have interesting real-network-like properties. We stress
that this is not just of theoretical or academic interest -- this model has been chosen to
create graphs for the Graph500 supercomputer benchmark [Graph500 Steering Committee
2012].
It is important to know how the parameters of this model affect various properties of the
graphs. We stress that a mathematical analysis is important for understanding the inner
working of a model. We quote Mitzenmacher [Mitzenmacher 2006]: "I would argue, however,
that without validating a model it is not clear that one understands the underlying behavior
and therefore how the behavior might change over time. It is not enough to plot data and
demonstrate a power law, allowing one to say things about current behavior; one wants
to ensure that one can accurately predict future behavior appropriately, and that requires
understanding the correct underlying model."
1.1. Notation and Background
We explain the SKG model and notation. Our goal is to generate a directed graph G = (V, E)
with n = V nodes and m = E edges. The general form of the SKG model allows for an
arbitrary square generator matrix and assumes that n is a power of its size. Here, we focus
on the 2 × 2 case (which is equivalent to R-MAT), defining the generating matrix as
(cid:20)t1 t2
(cid:21)
where ⊗ denotes the Kronecker product operation. In practice, the matrix P is never formed
explicitly. Instead, each edge is inserted as follows. Divide the adjacency matrix into four
quadrants, and choose one of them with the corresponding probability t1, t2, t3, or t4. Once
a quadrant is chosen, repeat this recursively in that quadrant. Each time we iterate, we end
up in a square submatrix whose dimensions are exactly halved. After (cid:96) iterations, we reach
a single cell of the adjacency matrix, and an edge is inserted. It should be noted that here
we take a slight liberty in requiring the entries of T to sum to 1. In fact, the SKG model as
defined in [Leskovec et al. 2010] works with the matrix mP , which is considered the matrix
of probabilities for the existence of each individual edge (though it might be more accurate
to think of it as an expected value).
Note that all edges can be inserted in parallel. This is one of the major advantages of the
SKG model and why it is appropriate for generating large supercomputer benchmarks.
For convenience, we also define some derivative parameters that will be useful in subse-
quent discussions. We let ∆ = m/n denote the average degree and let σ = t1 + t2 − 0.5
denote the skew. The parameters of the SKG model are summarized in Table I.
1.2. Our Contributions
Our overall contribution is to provide a thorough study of the properties of SKG and show
how the parameters affect these properties. We focus on the degree distribution, the number
of (non-isolated nodes), the core sizes, and the trade-offs in these various goals. We give
rigorous mathematical theorems and proofs explaining the degree distribution of SKG, a
noisy version of SKG, and the number of isolated vertices.
T =
t3 t4
with t1 + t2 + t3 + t4 = 1 and min
i
ti > 0.
We assume that n = 2(cid:96) for some integer (cid:96) > 0. For the sake of cleaner formulae, we assume
that (cid:96) is even in our analyses. Each edge is inserted according to the probabilities defined
by
P = T ⊗ T ⊗ ··· ⊗ T
,
(cid:124)
(cid:123)(cid:122)
(cid:96) times
(cid:125)
Improving Stochastic Kronecker Graphs
A:3
Table I: Parameters for SKG models
Primary Parameters
(cid:20)t1 t2
(cid:21)
t3 t4
-- T =
= generating matrix with t1 + t2 + t3 + t4 = 1
-- (cid:96) = number of levels (assumed even for analysis)
-- m = number of edges
Derivative Parameters
-- n = 2(cid:96) = number of nodes
-- ∆ = m/n = average degree
-- σ = t1 + t2 − 0.5 = skew
(1) Degree distribution: We provide a rigorous mathematical analysis of the degree
distribution of SKG. The degree distribution has often been claimed to be power-law, or
sometimes lognormal [Chakrabarti et al. 2004; Leskovec et al. 2010; Kim and Leskovec 2010].
Kim and Leskovec [Kim and Leskovec 2010] prove that the degree distribution has some
lognormal characteristics. Groer et al. [Groer et al. 2011] give exact series expansions for
the degree distribution, and express it as a mixture of normal distributions. This provides
a qualitative explanation for the oscillatory behavior of the degree distribution (refer to
Figure 1). Since the distribution is quite far from being truly lognormal, there has been no
simple closed form expression that closely approximates it. We fill this gap by providing a
complete mathematical description. We prove that SKG cannot generate a power law distri-
bution, or even a lognormal distribution. It is most accurately characterized as fluctuating
between a lognormal distribution and an exponential tail. We provide a simple formula that
approximates the degree distribution.
(2) Noisy SKG: It has been mentioned in passing [Chakrabarti et al. 2004] that adding
noise to SKG at each level smoothens the degree distribution, but this has never been formal-
ized or studied. We define a specific noisy version of SKG (NSKG). We prove theoretically
and empirically that NSKG leads to a lognormal distribution. (We give some experimen-
tal results showing a naive addition of noise does not work.) The lognormal distribution
is important since it has been observed in real data [Bi et al. 2001; Pennock et al. 2002;
Mitzenmacher 2003; Clauset et al. 2009]. One of the major benefits of our enhancement
is that only (cid:96) additional random numbers are needed in total. Using Graph500 parame-
ters, Figure 1 plots the degree distribution of a (standard) SKG and NSKG for two levels
of (maximum) noise. We can clearly see that noise dampens the oscillations, leading to a
lognormal distribution. We note that though the modification of NSKG is straightforward,
the reason why it works is not. It involves an intricate mathematical analysis, which may
be of theoretical interest in itself.
(3) Isolated vertices: An isolated vertex is one that has no edges incident to it (and
hence is not really part of the output graph). We provide a formula that accurately estimates
the fraction of isolated vertices. We discover the surprising result that in the Graph500
benchmark graphs, 50-75% vertices are isolated; see Table II. This is a major concern for
the benchmark, since the massive graph generated has a much reduced size. Furthermore,
the average degree is now much higher than expected.
(4) Core numbers: The study of k-cores is an important tool used to study the structure
of social networks because it is a mark of the connectivity and special processes that generate
these graphs [Chakrabarti and Faloutsos 2006; Kumar et al. 2010; Alvarez-Hamelin et al.
2008; Gkantsidis et al. 2003; Goltsev et al. 2006; Carmi et al. 2007; Andersen and Chellapilla
2009]. We empirically show how the core numbers have unexpected correlations with SKG
parameters. We observed that for most of the current SKG parameters used for modeling
A:4
C. Seshadhri, A. Pinar, T. G. Kolda
Fig. 1: Comparison of degree distributions (averaged over 25 instances) for SKG and two
noisy variations, using the T from the Graph500 Benchmark parameters with (cid:96) = 16.
Table II: Expected percentage of isolated vertices and repeat edges, along with average
degree of non-isolated nodes for the Graph500 benchmark. Excluding the isolated vertices
results in a much higher average degree than the value of 16 that is specified by the bench-
mark.
(cid:96) % Isolated Nodes % Repeat Edges Avg. Degree
26
29
32
36
39
42
1.2
0.7
0.4
0.2
0.1
0.1
51
57
62
67
71
74
32
37
41
49
55
62
real graphs, max core numbers are extremely small (much smaller than most corresponding
real graphs). We show how modifying the matrix T affects core numbers. Most strikingly,
we observe that changing T to increase the max core number actually leads to an increase
in the fraction of isolated vertices.
1.3. Influence on Graph500 benchmark
Our results have been communicated to the Graph500 steering committee, who have found
them useful in understanding the Graph500 benchmark. The oscillations in the degree
distribution of SKG was a major concern for the committee. Our proposed NSKG model
has been implemented in the current Graph500 code2.
Our analysis also solves the mystery of isolated vertices and how they are related to the
SKG parameters. Members of the steering committee had observed that the number of
isolated vertices varied greatly with the matrix T , but did not have an explanation for this.
2The file generator/graph-generator.c in the most recent version as of July 2012 (2.1.4) has the implementa-
tion, with a variable SPK NOISE LEVEL controlling the NSKG noise. Available at http://www.graph500.
org/sites/default/files/files/graph500-2.1.4.tar.bz2
Improving Stochastic Kronecker Graphs
A:5
1.4. Parameters for empirical study
Throughout the paper, we discuss a few sets of SKG parameters. The first is the Graph500
benchmark [Graph500 Steering Committee 2012]. The other two are parameters used in
[Leskovec et al. 2010] to model a co-authorship network (CAHepPh) and a web graph
(WEBNotreDame). We list these parameters here for later reference.
-- Graph500: T = [0.57, 0.19; 0.19, 0.05], (cid:96) ∈ {26, 29, 32, 36, 39, 42}, and m = 16 · 2(cid:96).
-- CAHepPh: T = [0.42, 0.19; 0.19, 0.20], (cid:96) = 14, and m = 237, 010.
-- WEBNotreDame3: T = [0.48, 0.20; 0.21, 0.11], (cid:96) = 18, and m = 1, 497, 134.
2. PREVIOUS WORK
The R-MAT model was defined by Chakrabarti et al. [Chakrabarti et al. 2004]. The general
and more powerful SKG model was introduced by Leskovec et al. [Leskovec et al. 2005]
and fitting algorithms were proposed by Leskovec and Faloutsos [Leskovec and Faloutsos
2007] (combined in [Leskovec et al. 2010]). This model has generated significant interest and
notably was chosen for the Graph500 benchmark [Graph500 Steering Committee 2012]. Kim
and Leskovec [Kim and Leskovec 2010] defined the Multiplicative Attribute Graph (MAG)
model, a generalization of SKG where each level may have a different matrix T . They suggest
that certain configurations of these matrices could lead to power-law distributions.
Since the appearance of the SKG model, there have been analyses of its properties. The
original paper [Leskovec et al. 2010] provides some basic theorems and empirically show
a variety of properties. Mahdian and Xu [Mahdian and Xu 2011] specifically study how
the model parameters affect the graph properties. They show phase transition behavior
(asymptotically) for occurrence of a large connected component and shrinking diameter.
They also initiate a study of isolated vertices. When the SKG parameters satisfy a certain
condition, the number of isolated vertices approaches n; however, their theorems do not
help predict the number of isolated vertices for a given setting of SKG. In the analysis of
the MAG model [Kim and Leskovec 2010], it is shown that the SKG degree distribution has
some lognormal characteristics. (Lognormal distributions have been observed in real data
[Bi et al. 2001; Pennock et al. 2002; Clauset et al. 2009]. Mitzenmacher [Mitzenmacher 2003]
gives a survey of lognormal distributions.)
Sala et al. [Sala et al. 2010] perform an extensive empirical study of properties of graph
models, including SKG. Miller et al. [Miller et al. 2010] show that they can detect anomalies
embedded in an SKG. Moreno et al. [Moreno et al. 2010] study the distributional properties
of families of SKG.
As noted in [Chakrabarti et al. 2004], the SKG generation procedure may give repeated
edges. Hence, the number of edges in the graph differs slightly from the number of insertions
(though, in practice, this is barely 1% for Graph500). Groer et al. [Groer et al. 2011] prove
that the number of vertices of a given degree is asymptotically normally distributed, and
provide algorithms to compute the expected number of edges in the graph (as a function of
the number of insertions) and the expected degree distribution.
3. DEGREE DISTRIBUTION
In this section, we analyze the degree distribution of SKG, which are known to follow a
multinomial distribution. While an exact expression for this distribution can be written,
this is unfortunately a complicated sum of binomial coefficients. Studying the log-log plots
of the degree distribution, one sees a general heavy-tail like behavior, but there are large
oscillations. The degree distribution is not monotonically decreasing. Refer to Figure 2 for
some examples of SKG degree distributions (plotted in log-log scale). Groer et al. [Groer
et al. 2011] show that the degree distribution behaves like the sum of Gaussians, giving some
3In [Leskovec et al. 2010], (cid:96) was 19. We make it even because, for the sake of presentation, we perform
experiments and derive formulae for even (cid:96).
A:6
C. Seshadhri, A. Pinar, T. G. Kolda
intuition for the oscillations. Recent work of Kim and Leskovec [Kim and Leskovec 2010]
provide some mathematical analysis explaining connections to a lognormal distribution. But
many questions remain. What does the distribution oscillate between? Is the distribution
bounded below by a power law? Can we approximate the distribution with a simple closed
form function? None of these questions have satisfactory answers.
Our analysis gives a precise explanation for the SKG degree distribution. We prove that
the SKG degree distribution oscillates between a lognormal and exponential tail. We provide
plots and experimental results to support more intuition for our theorems.
The oscillations are a disappointing feature of SKG. Real degree distributions do not
have large oscillations (to the contrary, they are monotonically decreasing), and more im-
portantly, do not have any exponential tail behavior. This is a major issue both for modeling
and benchmarking purposes since degree distribution is one of the primary characteristics
that distinguishes real networks.
In order to rectify the oscillations, we apply a certain model of noise and provide both
mathematical and empirical evidence that this "straightens out" the degree distribution.
This is discussed in §4. Indeed, small amounts of noise lead to a degree distribution that is
predominantly lognormal. This also shows an appealing aspect of our degree distribution
analysis. We can naturally explain how noise affects the degree distribution and give explicit
bounds on these affects.
We make a caveat here. Technically, the SKG model creates multigraphs, since there can
be repeated edges. Our theorems and expressions will deal with degree distributions of this
multigraph. Conventionally, this is reduced to a simple graph by removing repeated edges.
Groer et al. [Groer et al. 2011] give details expressions and explanations relating the degree
distributions on the multigraph and the induced simple graph. Our empirical results show
that for a variety of parameters (including the Graph 500 setting), our theorems match the
degree distribution of the underlying simple graph. Simple graphs are used in all empirical
studies.
3.1. Notation
The (cid:96)-bit binary representation of the vertices, numbered 0 to n− 1, provides a straightfor-
ward way to partition the vertices. Specifically, each vertex has a binary representation and
therefore corresponds to an element of the boolean hypercube {0, 1}(cid:96). We can partition the
vertices into slices, where each slice consists of vertices whose representations have the same
number of zeros4. Recall that we assume (cid:96) is even. For r ∈ [−(cid:96)/2, (cid:96)/2], we say that slice
r, denoted Sr, consists of all vertices whose binary representations have exactly ((cid:96)/2 + r)
zeros.
These binary representations and slices are intimately connected with edge insertions in
the SKG model. For each insertion, we are trying to randomly choose a source-sink pair.
First, let us simply choose the first bit (of the representations) of the source and the sink.
Note that there are 4 possibilities (first bit for source, second for sink): 00, 01, 10, and 11.
We choose one of the combinations with probabilities t1, t2, t3, and t4 respectively. This fixes
the first bit of the source and sink. We perform this procedure again to choose the second
bit of the source and sink. Repeating (cid:96) times, we finally decide the source and sink of the
edge. Note that as r becomes smaller, a vertex in an r-slice tends to have a higher degree.
For a real number x, we use (cid:98)x(cid:101) to denote the closest integer to x. There are certain
quantities that will be important in our analysis. These are summarized in Table III.
Our results are fundamentally asymptotic in nature, so we explain the assumptions on
T and the implicit assumptions of our results. We assume T to be a fixed matrix with the
following conditions. All entries are positive and strictly less than 1. The number t1 is the
4There are usually referred to as the levels of the boolean hypercube. In the SKG literature, levels is used
to refer to (cid:96), and hence we use a different term.
Improving Stochastic Kronecker Graphs
A:7
Table III: Parameters for Analysis of SKG models
General Quantities
-- τ = (1 + 2σ)/(1 − 2σ)
-- λ = ∆(1 − 4σ2)(cid:96)/2
-- r ∈ {−(cid:96)/2, . . . , (cid:96)/2} denotes a slice index
-- d denotes a degree (typically assumed <
-- deg(v) = outdegree of node v
-- Sr = set of nodes whose binary representation have exactly (cid:96)/2 + r zeros
Quantities Associated with Degree d
√
n)
-- Xd = random variable for the number of vertices of outdegree d
-- θd = ln(d/λ)/ ln τ
-- Γd = (cid:98)θd(cid:101) (nearest integer to θd)
-- γd = θd − Γd ∈ [0, 0.5]
-- rd = (cid:98)θd(cid:99) (only interesting for rd < (cid:96)/2)
-- δd = θd − rd
largest entry, and min(t1 + t2, t1 + t3) > 1/2. This ensures that σ ∈ (0, 1/2), τ is positive
and finite, and λ is non-zero. We want to note that these conditions are satisfied by all
SKG parameters that have been used to generate realistic graph instances, to the best of
our knowledge. Indeed, when σ = 1/2, the degree distribution is Poisson.
We fix the matrix T and average degree ∆ > 1, and think of (cid:96) as increasing. The asymp-
totics hold for an increasing (cid:96). Note that since n = 2(cid:96), this means that n and m are also
increasing. We use o(1) as a shorthand for a quantity that is negligible as (cid:96) → ∞. Typically,
this converges to zero rapidly as (cid:96) increases. Given two quantities or expressions A and B,
A = (1 ± o(1))B will be shorthand for A ∈ [(1 − o(1))B, (1 + o(1))B].
As we mentioned earlier, all our results are for the SKG multigraph. For convenience, we
will just refer to this a graph.
3.2. Explicit formula for degree distribution
We begin by stating and explaining the main result of this section. To provide clean ex-
pressions, we make certain approximations which are slightly off for certain regions of d
and (cid:96) (essentially, when d is either too small or too large). Our main technical result is
Lemma 3.2, which gives a tight expression for the degree distribution. A more interpretable
version is given first as Theorem 3.1, which is stated as an upper bound. The remainder of
the section gives a proof for this, which can be skipped if the reader is only interested in
the results. This theorem expresses the oscillations between the lognormal and exponential
tail. The lower order error terms in all the following are extremely small.
We focus on outdegrees, but these theorems hold for indegrees as well. To make de-
pendences clear, we remind the reader that the "free" variables are T, ∆, (cid:96). The first two
are fixed to constants, and (cid:96) is increasing. Hence, the asymptotics are over (cid:96). All other
parameters are functions of these quantities.
We begin by giving a more digestible form of our main result, stated in Theorem 3.1. The
more precise version is given in Lemma 3.2. A reader interested in the general message can
skip Lemma 3.2.
Theorem 3.1. Assume d ∈ [(e ln 2)(cid:96),
n ]. If Γd ≥ (cid:96)/2, then E[Xd] is negligible, i.e.,
o(1); otherwise, if Γd < (cid:96)/2, then (up to an additive exponential tail)
√
(cid:18)−dγ2
(cid:19)(cid:18)
E[Xd] ≤ 1√
d
exp
d ln2 τ
2
(cid:96)
(cid:96)/2 + Γd
(cid:19)
.
A:8
C. Seshadhri, A. Pinar, T. G. Kolda
(a) CAHepPh
(b) WEBNotreDame (with (cid:96) = 18)
(c) Graph500 (with (cid:96) = 16)
Fig. 2: We plot the degree distribution of graphs generated using our three different SKG pa-
rameter sets. We then plot the respective bounds predicted by Theorem 3.1 and Lemma 3.2.
Observe how Theorem 3.1 correctly guesses the peaks and troughs of the degree distribu-
tion. Lemma 3.2 is practically an exact match (except when the degree is below 2(cid:96) or, in
Graph500, slight inaccuracies when the degree is too large).
(cid:96)
(cid:96)/2+Θ(ln d)
(cid:96)
(cid:96)/2+x
(cid:96)
(cid:96)/2+Γd
by a function that oscillates between a lognormal and an exponential tail.
Remark: This means that the expected outdegree distribution of a SKG is bounded above
Note that Γd = (cid:98)ln(d/λ)/ ln τ(cid:101) = Θ(ln d). Hence (cid:0)
(cid:0)
and therefore(cid:0)
(cid:1) can be thought of as
(cid:1) represents an asymptotically normal distribution of x,
(cid:1) is a lognormal distribution of d. This lognormal term is multiplied by
(cid:1). The function (cid:0)
d ln2 τ /2). By definition, γd ∈ [0, 1/2]. When γd is close to 0, then the exponential
exp(−dγ2
term is almost 1. Hence the product represents a lognormal tail. On the other hand, when
(cid:96)
(cid:96)/2+Γd
Improving Stochastic Kronecker Graphs
A:9
γd is a constant (say > 0.2), then the product becomes an exponential tail. Observe that γd
oscillates between 0 and 1/2, leading to the characteristic behavior of SKG. As θd becomes
closer to an integer, there are more vertices of degree d. As it starts to have a larger frac-
tional part, the number of vertices of degree d is bounded above by an exponential tail. Note
that there are many values of d (a constant fraction) where γd > 0.2. Hence, for all these d,
the degrees are bounded above by an exponential tail. As a result, the degree distribution
cannot be a power law or a lognormal.
The estimates provided by Theorem 3.1 for our three different SKG parameter sets are
shown in Figure 2. Note how this simple estimate matches the oscillations of the actual
degree distribution accurately.
We provide a more complex expression in Lemma 3.2 that almost completely explains the
degree distribution. Theorem 3.1 is a direct corollary of this lemma. In the following, the
expectation is over the random choice of the graph.
√
Lemma 3.2. For SKG, assume d ∈ [(e ln 2)(cid:96),
n ]. If rd ≥ (cid:96)/2, E[Xd] is negligible;
otherwise, we have
1 ± o(1)
√
2πd
E[Xd] =
(cid:26)
exp
(cid:18)−dδ2
d ln2 τ
2
(cid:19)(cid:18)
(cid:19)
(cid:18)−d(1 − δd)2 ln2 τ
(cid:96)
(cid:96)/2 + rd
+ exp
(cid:19)(cid:18)
(cid:96)
(cid:19)(cid:27)
.
2
(cid:96)/2 + rd + 1
We plot the bound given by this lemma in Figure 2. Note how it completely captures
the behavior of the degree distribution (barring a slight inaccuracy for larger degrees of
the Graph500 graph because we start exceeding the upper bound for d in Lemma 3.2).
Theorem 3.1 can be derived from this lemma, as we show below.
Proof. (of Theorem 3.1) Since δd = θd − (cid:98)θd(cid:99) = θd − rd, only one of δd and (1 − δd) is
at most 1/2. In the former case, Γd = rd and in the latter case, Γd = rd + 1. Suppose that
Γd = rd. Then,
(cid:19)
(cid:18)−d ln2 τ
(cid:19)(cid:18)
(cid:96)
(cid:19)
(cid:18)−d(1 − δd)2 ln2 τ
(cid:19)(cid:18)
exp
(cid:96)
≤ exp
2
(cid:96)/2 + rd + 1
8
(cid:96)/2 + rd + 1
√
Note that this is a small (additive) exponential term in Lemma 3.2. So we just neglect it (and
drop the leading constant of 1/
2π) to get a simple approximation. A similar argument
works when Γd = rd + 1.
In the next section, we prove some preliminary claims which are building blocks in the
proof of Lemma 3.2. Then, we give a long intuitive explanation of how we prove Lemma 3.2.
Finally, in §3.5, we give a complete proof of Lemma 3.2.
3.3. Preliminaries
We will state and prove some simple and known results in our own notation. This will give
the reader some understanding about the various slices of vertices, and how the degree
distribution is related to these slices. Our first claim computes the probability that a single
edge insertion creates an outedge for node v. The probability depends only on the slice that
v is in.
Claim 3.3. For vertex v ∈ Sr, the probability that a single edge insertion in SKG
produces an out-edge at node v is
(1 − 4σ2)(cid:96)/2τ r
n
.
pr =
A:10
C. Seshadhri, A. Pinar, T. G. Kolda
Proof. We consider a single edge insertion. What is the probability that this leads to an
outedge of v? At every level of the insertion, the edge must go into the half corresponding
to the binary representation of v. If the first bit of v is 0, then the edge should drop in the
top half at the first level, and this happens with probability (1/2 + σ). On the other hand, if
this bit is 1, then the edge should drop in the bottom half, which happens with probability
(1/2 − σ). By performing this argument for every level, we get that
(cid:18) 1
2
(cid:19)(cid:96)/2+r(cid:18) 1
(cid:19)(cid:96)/2−r
− σ
2
pr =
+ σ
(1 − 4σ2)(cid:96)/2
2(cid:96)
·
=
(cid:19)r
(cid:18) 1/2 + σ
1/2 − σ
(1 − 4σ2)(cid:96)/2τ r
n
.
=
Our next lemma bounds the probability that a vertex v at slice r has degree d. Before
√
that, we separately deal with slices where pr is very large. Essentially, we show that slices
where pr ≥ 1/
m can be ignored. This allows for simpler calculations later on.
√
Claim 3.4. Let R be the set {rpr ≥ 1/
any vertex in U has degree less than
m} and U = (cid:83)
√
√
m/2 is at most e−Ω(
m).
r∈R Sr. The probability that
of v is X =(cid:80)m
Proof. Consider a fixed v ∈ U . Let Xi be the indicator random variable for the ith
√
edge insertion being incident to v. The Xis are i.i.d. with E[Xi] ≥ 1/
m. The out-degree
of [Motwani and Raghavan 1995]), the probability that X ≤ √
m. By a multiplicative Chernoff bound (Theorem 4.2
m/8.
The proof is completed by taking a union bound over all vertices in U and noting that
ne−√
i=1 Xi and E[X] ≥ √
m/2 is at most e−√
√
m/8 = e−Ω(
n). Our formula becomes slightly inaccurate when d becomes large,
but as our figures show, it is not a major issue in practice. The previous claim implies that
√
the expected number of vertices in U (as defined above) with degree d is vanishingly small.
Therefore, we only need to focus on slices where pr ≤ 1/
m.
Lemma 3.5. Let v be a vertex in slice r. Assume that pr ≤ 1/
√
√
m and d = o(
n). Then
m).
√
We will set d = o(
for SKG,
λd
d!
(τ r)d
.
exp(λτ r)
Pr[deg(v) = d] = (1 + o(1))
approximation, (1 − x)m(cid:48)
(cid:1) = (1 ± o(1))md/d!. For x ≤ 1/
Proof. The probability that v has outdegree d is(cid:0)m
(cid:1)pd
we have(cid:0)m
r(1 − pr)m−d. Since d = o(
(cid:18) (1 − 4σ2)(cid:96)/2τ r
(cid:18)
(cid:19)d
(cid:18)m
(cid:19)
(cid:0)∆(1 − 4σ2)(cid:96)/2(cid:1)d
n),
m and m(cid:48) ≤ m, we can use the Taylor series
. Using Claim 3.3, we get
− (1 − 4σ2)(cid:96)/2τ r(m − d)
r(1 − pr)m−d = (1 ± o(1))
pd
= (1 ± o(1))e−xm(cid:48)
md
d!
(cid:19)
exp
τ rd
√
√
n
n
d
d
d
exp(−∆(1 − 4σ2)(cid:96)/2τ r) exp(
d(1 − 4σ2)(cid:96)/2τ r
)
n
= (1 ± o(1))
= (1 ± o(1))
√
λd
d!
d!
(τ r)d
exp(λτ r)
exp(dpr).
m and d = o(
√
Since pr ≤ 1/
3.4. Understanding the degree distribution
The following is a verbal explanation of our proof strategy and captures the essence of the
math.
n), dpr = o(1), completing the proof.
It will be convenient to think of the parameters having some fixed values. Let λ = 1 and
τ = e. (This can be achieved with a reasonable choice of T, (cid:96), ∆.) We begin by looking at the
Improving Stochastic Kronecker Graphs
A:11
different slices of vertices. Vertices in a fixed r-slice have an identical behavior with respect
to the degree distribution. Lemma 3.5 uses elementary probability arguments to argue that
the probability that a vertex in slice r has outdegree d is roughly
Pr[deg(v) = d] =
exp(dr − er)
d!
.
(1)
When r = Ω(ln d), the numerator will be less than 1, and the overall probability is O(1/d!).
Therefore, those slices will not have many (or any) vertices of degree d. If r = O(ln d), the
numerator is o(d!) and the probability is still (approximately) at most 1/d!. Observe that
when r is negative, then this probability is extremely small, even for fairly small values of
d. This shows that half of the vertices (in slices where the number of 1's is more than 0's)
have extremely small degrees.
It appears that the "sweet spot" is around r ≈ ln d. Applying Taylor approximations to
appropriate ranges of r, it can be shown that a suitable approximation of the probability of a
slice r vertex having degree d is roughly exp(−d(r− ln d)2). We can now show that the SKG
degree distribution is bounded above by a lognormal tail. Only the vertices in slice r ≈ ln d
have a good chance of having degree d. This means that the expected number of vertices
(cid:1). Since the latter is asymptotically normally distributed as
of degree d is at most(cid:0)
(cid:96)
(cid:96)/2+ln d
a function of ln d, it (approximately) represents a lognormal tail. A similar conclusion was
drawn in [Kim and Leskovec 2010], though their approach and presentation is very different
from ours.
This is where we significantly diverge. The crucial observation is that r is a discrete
variable, not a continuous one. When r − ln d ≥ 1/3 (say), the probability of having
degree d is at most exp(−d/9). That is an exponential tail, so we can safely assume that
vertices in those slices have no vertices of degree d. Refer to Figure 3. Since ln d is not
necessarily integral, it could be that for all values of r, r − ln d ≥ 1/3. In that case, there
are (essentially) no vertices of degree d. For concreteness, suppose ln d = 100/3. Then,
regardless of the value of r, r − ln d ≥ 1/3. And we can immediately bound the fraction
of vertices that have this degree by the exponential tail, exp(−d/9). When ln d is close
to being integral, then for r = (cid:98)ln d(cid:101), the r-slice (and only this slice) will contain many
vertices of degree d. The quantity ln d − (cid:98)ln d(cid:101) fluctuates between 0 and 1/2, leading to
the oscillations in the degree distribution.
Let Γd = (cid:98)ln d(cid:101) and γd = Γd − ln d. Putting the arguments above together, we can
get a very good estimate of the number of vertices of degree d. This quantity is essentially
exp(−γ2
in Lemma 3.2.
(cid:1), as stated in Theorem 3.1. A more nuanced argument leads to the bound
dd)(cid:0)
(cid:96)/2+Γd
(cid:96)
3.5. Proof of Lemma 3.2
We break up the main argument into various claims. The first claim gives an expression
for the expected number of vertices of degree d. This sum will appear to be a somewhat
complicated sum of binomial coefficients. But, as we later show, we can deduce that most
terms in this sum are actually negligible.
Claim 3.6. Define g(r) = r ln τ − ln(d/λ). Then, for SKG,
E[Xd] =
1 ± o(1)
√
2πd
(cid:104)
(cid:96)/2(cid:88)
r=−(cid:96)/2
d(1 + g(r) − eg(r))
exp
(cid:105)(cid:18) (cid:96)
(cid:96)/2 + r
(cid:19)
.
A:12
C. Seshadhri, A. Pinar, T. G. Kolda
Fig. 3: Probability of nodes of degree d for various slices. The probability that a vertex of
slice r has degree d is Gaussian distribution with a peak at ln d. The standard deviation is
extremely small. Hence, if ln d is far from integral, no slice will have vertices of degree d.
We then apply Stirling's approximation and the fact that Sr =(cid:0) (cid:96)
Proof. Using Lemma 3.5 and linearity of expectation, we can derive a formula for E[Xd].
(cid:1).
(cid:96)/2+r
E[Xd] = (1 ± o(1))
λd
d!
r=−(cid:96)/2
(cid:96)/2(cid:88)
(cid:96)/2(cid:88)
(cid:19)d
λd
d!
(cid:18) eλ
r=−(cid:96)/2
(cid:96)/2(cid:88)
(τ r)d
exp(λτ r)
(τ r)d
exp(λτ r)
Sr
(cid:19)
(cid:18) (cid:96)
(cid:18) (cid:96)
(cid:96)/2 + r
(τ r)d
d
r=−(cid:96)/2
exp(λτ r)
(cid:96)/2 + r
(cid:19)
.
= (1 ± o(1))
1 ± o(1)
√
2πd
=
Let us now focus on the quantity
(cid:18) eλ
(cid:19)d
(τ r)d
= exp(d + d ln λ + rd ln τ − d ln d − λτ r).
d
exp(λτ r)
The term inside the exponent can be written as d + d(r ln τ − ln d + ln λ)− d(d/λ)−1τ r. This
is d(1 + g(r) − eg(r)). Hence
E[Xd] =
1 ± o(1)
√
2πd
(cid:96)/2(cid:88)
r=−(cid:96)/2
(cid:18) (cid:96)
(cid:96)/2 + r
(cid:19)
.
ed(1+g(r)−eg(r))
The key observation is that among the (cid:96) terms in the summation of Claim 3.6, few of
them are the main contributors. All other terms sum up to a negligible quantity. We deal
with this part in the following claim. We crucially use the assumption that d > (e ln 2)(cid:96).
This ensures that the large slices (when r is small) do not contribute vertices of degree d.
Improving Stochastic Kronecker Graphs
A:13
Claim 3.7. Let R be the set of r such that g(r) ≥ 1. Then, for SKG,
exp[d(1 + g(r) − eg(r))]
(cid:18) (cid:96)
(cid:19)
(cid:96)/2 + r
≤ 1.
(cid:88)
r∈R
Proof. For convenience, define h(r) = 1 + g(r)− eg(r). We will show (shortly) that when
g(r) ≥ 1, h(r) ≤ −1/e. We assume d > (e ln 2)(cid:96), thus exp(d· h(r)) ≤ 2−(cid:96). Let R be the set
of all r such that g(r) ≥ 1. We can easily bound the contribution of the indices in R to
our total sum as (cid:88)
(cid:18) (cid:96)
(cid:19)
≤ 2−(cid:96)(cid:88)
(cid:18) (cid:96)
(cid:19)
r∈R
(cid:96)/2 + r
≤ 1.
edh(r)
r∈R
(cid:96)/2 + r
It remains to prove the bound on h(r). Set h(x) = 1 + x − ex, so h(r) = h(g(r)). We have
two cases.
-- g(r) ≥ 1: Since h(x) is decreasing when x ≥ 1, h(r) ≤ h(1) = −(e − 2) ≤ −1/e.
-- g(r) ≤ −1: Since h(x) is increasing for x ≤ −1, h(r) ≤ h(−1) = −1/e.
Now for the main technical part. The following claim with the previous ones complete
the proof of Lemma 3.2.
Claim 3.8. Define R as in Claim 3.7. Then, for SKG,
(cid:88)
r /∈R
(cid:104)
(cid:26)
d(1 + g(r) − eg(r))
exp
(cid:18)−dδ2
d ln2 τ
2
(1± o(1))·
exp
(cid:105)(cid:18) (cid:96)
(cid:19)(cid:18)
(cid:96)
(cid:19)
(cid:19)
(cid:96)/2 + r
=
(cid:96)/2 + rd
+ exp
(cid:18)−d(1 − δd)2 ln2 τ
(cid:19)(cid:18)
(cid:96)
2
(cid:96)/2 + rd + 1
(cid:19)(cid:27)
.
Proof. Since g(r) < 1, we can perform an important approximation. Using the expan-
sion ex = 1 + x + x2/2 + Θ(x3) for x ∈ (0, 1), we bound
h(r) = 1 + g(r) − e−g(r) = −g(r)2/2 + Θ(g(r)3)
We request the reader to pause and consider the ramifications of this approximation. The
coefficient multiplying the binomial coefficients in the sum is exp(−d(g(r))2), which is a
Gaussian function of g(r). This is what creates the Gaussian-like behavior of the probability
of vertices of degree d among the various slices. We now need to understand when g(r) is
close to 0, since the corresponding terms will provide the main contribution to our sum.
So for any d, some slices are "picked out" to have expected degree d, whereas others are
not. This depends on what the value of g(r) is. Now on, it only requires (many) tedious
calculations to get the final result.
What are the different possible values of g(r)? We remind the reader that g(r) = r ln τ −
ln(d/λ). Observe that rd = (cid:98)ln(d/λ)/ ln τ(cid:99) minimizes g(r) subject to g(r) < 0 and rd + 1
(which is the corresponding ceiling) minimizes g(r) subject to g(r) ≥ 0. For convenience,
denote rd by rf (for floor) and rd + 1 by rc (for ceiling).
Consider some r such that g(r) < 1. It is either of the form r = rc + s or rf − s, for
integer s ≥ 0. We will sum up all the terms corresponding to the each set separately. For
convenience, denote the former set of values of s's such that g(rc + s) < 1 by S1, and define
S2 with respect to rf − s. This allows us to split the main sum into two parts, which we
deal with separately.
(cid:19)
(cid:19)
Case 1 (the sum over S1):
d(1 + g(r) − eg(r))
exp
(cid:104)
(cid:88)
s∈S1
(cid:105)(cid:18)
(cid:18)
(cid:96)/2 + rc + s
(cid:96)
(cid:19)
= (1±o(1)) exp(
−d(g(rc)2)
2
)
(cid:96)
(cid:96)/2 + rc
+(1±o(1))
s∈S1,s(cid:54)=0
s∈S1,s(cid:54)=0
(cid:88)
exp(−d(g(rc + s)2)/2)
(cid:18)
≤ (cid:88)
(cid:18)
For the last inequality, observe that (cid:0)
(cid:88)
(cid:105)(cid:18)
d(1 + g(r) − eg(r))
= o
exp
(cid:96)
s∈S2
(cid:104)
(cid:88)
(cid:104)
(cid:96)
(cid:19)
(cid:19)
(cid:96)/2 + rf + s
(cid:105)(cid:18) (cid:96)
(cid:18)
(cid:96)/2 + r
We substitute g(rc+s) = g(rc)+s ln τ into the second part, and show that we can bound this
whole summation as an error term. Note that both s and ln τ are positive by construction.
(cid:96)
(cid:96)/2 + rc + s
exp[−d(g(rc)2 + s2(ln τ )2)/2]
≤ exp(−d(g(rc)2)/2)
exp(−ds2(ln τ )2/2)
exp(−d(g(rc)2)/2)
(cid:18)
(cid:19)
(cid:96)
(cid:96)/2 + rc + s
(cid:18)
(cid:19)
(cid:88)
(cid:18)
(cid:1) ≤ (cid:96)s(cid:0)
s>0
(cid:96)
(cid:96)/2 + rc
(cid:96)
(cid:96)/2+rc
(cid:96)
.
(cid:96)/2 + rc + s
(cid:19)(cid:19)
(cid:1). Since d ≥ (cid:96), the exponential
(cid:19)
(cid:18)
(cid:96)
= (1 ± o(1)) exp(−d(g(rf )2)/2)
(cid:96)/2 + rf
decay of exp(Θ(−ds2)) completely kills this summation.
have g(r) = g(rf ) − s ln τ . Applying the same calculations as above,
Case 2 (the sum over S2): Now, we apply an identical argument for r = rf − s. We
(cid:96)/2+rc+s
A:14
C. Seshadhri, A. Pinar, T. G. Kolda
−d(g(rc + s)2)
2
)
exp(
(cid:18)
(cid:19)
(cid:96)
(cid:96)/2 + rc + s
(cid:88)
s∈S1
s(cid:54)=0
Adding the bounds from both the cases, we conclude
d(1 + g(r) − eg(r))
exp
(cid:26)
r /∈R
= (1 ± o(1)) ·
exp(−dg(rf )2/2)
(cid:96)
(cid:96)/2 + rf
(cid:19)
+ exp(−dg(rc)2/2)
(cid:18)
(cid:96)
(cid:19)(cid:27)
(cid:96)/2 + rc
(2)
We showed earlier that rf = rd and rc = rd + 1. We remind the reader that θd =
ln(d/λ)/ ln τ , rd = (cid:98)θd(cid:99), and δd = θd − rd. Hence g(rf ) = g(θd) − δd ln τ = −δd ln τ .
Since rc = rf + 1, g(rc) = ln τ + g(rf ) = (1 − δd) ln τ . We substitute in (2) to complete the
proof.
4. ENHANCING SKG WITH NOISE: NSKG
Let us now focus on a noisy version of SKG that removes the fluctuations in the degree
distribution. We will refer to our proposed noisy SKG model as NSKG. The idea is quite
simple. For each level i ≤ (cid:96), define a new matrix Ti in such a way that the expectation of
Ti is just T . At level i in the edge insertion, we use the matrix Ti to choose the appropriate
quadrant.
Here is a formal description. For convenience, we will assume that T is symmetric. It is
fairly easy to generalize to general T . Let b be our noise parameter such that b ≤ min((t1 +
Improving Stochastic Kronecker Graphs
A:15
Table IV: Parameters for NSKG
-- b = noise parameter ≤ min((t1 + t4)/2, t2)
-- µi = noise at level i = 1, . . . , (cid:96)
(cid:34)
-- Ti =
t1 − 2µit1
t1+t4
t3 + µi
t2 + µi
t4 − 2µit4
t1+t4
= noisy generating matrix at level i = 1, . . . , (cid:96)
(cid:35)
(cid:34)
t4)/2, t2). For level i, choose µi to be a uniform random number in the range [−b, +b]. Set
Ti to be
(cid:35)
Ti =
t1 − 2µit1
t1+t4
t3 + µi
t2 + µi
t4 − 2µit4
t1+t4
Note that Ti is symmetric, its entries sum to 1, and all entries are positive. This is by no
means the only model of noise, but it is certainly convenient for analysis. Each level involves
only one random number µi, which changes all the entries of T in a linear fashion. Hence,
we only need (cid:96) random numbers in total. For convenience, we list out the noise parameters
of NSKG in Table IV.
In Figures 1, 4a, and 4b, we show the effects of noise. Observe how even a noise parameter
as small as 0.05 (which is extremely small compared to the matrix values) significantly
reduces the magnitude of oscillations. A noise of 0.1 almost removes the oscillations. (Even
this noise is very small, since the standard deviation of this noise parameter is at most 0.06.)
Our proposed method of adding noise dampens the undesirable exponential tail behavior
of SKG, leading to a monotonic degree distribution.
(a) CAHepPh
(b) WEBNotreDame
Fig. 4: The figures show the degree distribution of standard SKG and NSKG as the averages
of 25 instances. Notice how effectively a noise of 0.1 straightens the degree distribution.
A:16
C. Seshadhri, A. Pinar, T. G. Kolda
4.1. Why does noise help?
Before we state our formal theorem, let us set some asymptotic notation that will allow for
a more readable theorem. We will use the O(·) notation to suppress constant factors, where
(for notational convenience) these constants may depend on the constants in the matrix T .
As before, o(1) is a quantity that goes to zero as (cid:96) grows.
Our formal theorem says that when the noise is "large enough," we can show that the
degree distribution has at least a lognormal tail on average. This is a significant change
from SKG, where many degrees are below an exponential tail.
√
Theorem 4.1. Let noise b be set to c/
√
(cid:96) for positive c, such that c/
(cid:96) < min((t1 +
t4)/2, t2). Then the expected degree distribution for NSKG is bounded below by a lognormal.
Formally, when Γd ≤ (cid:96)/2 and d ≤ √
n,
(cid:18)
(cid:19)
.
E[Xd] ≥ ν(c)
d
(cid:96)
(cid:96)/2 + Γd
Here ν(c) is some positive function of c. (This is independent of (cid:96), so for constant c, ν(c)
is a positive constant.)
This bound tells us that as (cid:96) increases, we need less noise to get a lognormal tail. From a
Graph 500 perspective, if we determine (through experimentation) that for some small (cid:96) a
certain amount of noise suffices, the same amount of noise is certainly enough for larger (cid:96).
We now provide a verbal description of the main ideas. Let us assume that λ = 1 and
τ = e, as before. We focus our attention on a vertex v of slice r, and wish to compute the
probability that it has degree d. Note the two sources of randomness: one coming from the
choice of the noisy SKG matrices, and the second from the actual graph generation. We
associate a bias parameter ρv with every vertex v. This can be thought of as some measure
of how far the degree behavior of v deviates from its noiseless version. Actually, it is the
random variable ln ρv that we are interested in. Intuitively, this can just be thought of as a
Gaussian random variable with mean zero. The distribution of ρv is identical for all vertices
in slice r. (Though it does not matter for our purposes, for a given instantiation of the noisy
SKG matrices, vertices in the same slice can have different biases.)
We approximate the probability that v has degree d by (refer to Claim 4.11)
Pr[deg(v) = d] = exp(dr + d ln ρv − ρver)/d!.
After some simplifications, this is roughly equal to exp(−d(r−ln d−ln ρv)2). The additional
ln ρv will act as a smoothing term. Observe that even if ln d has a large fractional part, we
could still get vertices of degree d. Suppose ln d = 10.5, but ln ρv happened to be close
to 0.5. Then vertices in slice (cid:98)ln d(cid:101) would have degree d with some nontrivial probability.
Contrast this with regular SKG, where there is almost no chance that degree d vertices
exist.
Think of the probability as exp(d(r − ln d − X)2), where X is a random variable. The
expected probability will be an average over the distribution of X. Intuitively, instead of
the probability just being exp(d(r − ln d)2) (in the case of SKG), it is now the average
value over some interval. If the standard deviation of X is sufficiently large, even though
exp(d(r−ln d)2) is small, the average of exp(d(r−ln d−X)2) can be large. Refer to Figure 5.
We know that X is a Gaussian random variable (with some standard deviation σ). So we
can formally express the (expected) probability that v has degree d as an integral,
P (deg(v) = d τ = e, λ = 1) =
exp(d(r − ln d − X)2) · e−X 2/2σ2
dX.
This definite integral can be evaluated exactly (since it is just a Gaussian). Intuitively, this is
roughly the average value of exp(d(r− ln d− X)2), where X ranges from −σ to +σ. Suppose
(cid:90) +∞
−∞
Improving Stochastic Kronecker Graphs
A:17
Fig. 5: The effect of noise. The underlying Gaussian curve is the same as one in Figure 3.
Adding noise can be thought of as an average over the Gaussian. So the probability that a
vertex from slice r has degree is the area of the shaded region.
σ > 1. Since r ranges over the integers, there is always some r such that r − ln d < 1. For
this value of r, the average of exp(d(r − ln d− X)2) over the range X ∈ [−1, +1] will have a
reasonably large value. This ensures that (in expectation) many vertices in this slice r have
degree d. This can be shown for all degrees d, and we can prove that the degree distribution
is at least lognormal.
This is an intuitive sketch of the proof. The random variable ln ρv is not exactly Gaussian,
and hence we have to account for errors in such an approximation. We do not finally get a
definite integral that can be evaluated exactly, but we can give good bounds for its value.
4.2. Preliminaries for analysis
There are many new parameters we need to introduce for our NSKG analysis. Each of these
quantities is a random variable that depends on the choice of the matrices Ti. We list them
below.
-- σi = t1 − 2µit1
-- αi = (1/2 + σi)/(1/2 + σ). It will be convenient to express this in terms of µi, replacing
+ t2 + µi − 0.5 = σ + µi(1 − 2t1
t1+t4
).
t1+t4
the dependence on σi.
αi = (1/2 + σi)/(t1 + t2) = 1 − µi
(t1 − t4)
(t1 + t2)(t1 + t4)
-- βi = (1/2 − σi)/(1/2 − σ). Performing a calculation similar to the one above,
βi = (1/2 − σi)/(t3 + t4) = 1 + µi
(t1 − t4)
(t3 + t4)(t1 + t4)
-- bα, bβ: We set
Similarly,
bα =
bβ =
b(t1 − t4)
(t1 + t2)(t1 + t4)
b(t1 − t4)
(t3 + t4)(t1 + t4)
=
=
4bσ
(1 + 2σ)(t1 + t4)
4bσ
(1 − 2σ)(t1 + t4)
A:18
C. Seshadhri, A. Pinar, T. G. Kolda
Hence, αi is distributed uniformly at random in [1 − bα, 1 + bα], and βi is uniformly
√
random in [1 − bβ, 1 + bβ]. Note that bα, bβ = Θ(c/
(cid:96)).
-- ρv: Let v be represented as a bit vector (z1, . . . , zk). The bias for v is ρv =
(cid:81)
(cid:81)
We need to bound the behavior of ln ρv, which is (cid:80)
i:zi=1 βi. We set λv = λρv.
4.3. The behavior of ln ρv
i:zi=0 αi
i:zi=0 ln αi +(cid:80)
i:zi=1 ln βi. Observe
that this is a sum of independent random variables. By the Central Limit Theorem, we
expect ln ρv to be distributed as a Gaussian, but we still need to investigate the variance of
this distribution. Approximately (since bα and bβ are small), ln αi is uniformly random in
[−bα, bα], so the variance of ln αi is Θ(b2
α) = Θ(1/(cid:96)). A similar statement holds for ln βi, and
we bound the variance of ln ρv by Θ(1). So the probability density function (pdf) of ln ρv is
roughly concentrated in a constant-sized interval of size 1 (around 0). This is what we will
formally show in this section. We will need a pointwise convergence guarantee for the pdf
of ln ρv. Throughout this section, we will use various functions of the form ν1(c), ν2(c), . . ..
These are strictly positive constant functions of c (for c > 0), and are a convenient way
of tracking dependences on c. The reader should interpret νa(c) to be some constant that
depends on c (and T and ∆, which are fixed), but is independent of (cid:96). The main lemma of
this section is the following.
Lemma 4.2. Set (cid:98)τ = max(ln τ, 2). Let fv(x) be the pdf of ln ρv. For x ≤ (cid:98)τ , fv(x) ≥
ν1(c).
We will first prove Lemma 4.2 as a direct result of two claims stated below. Then we will
prove these claims in the subsequent subsections. The first claim, the more technical of the
two, shows that ln ρv has a sufficiently large probability of attaining a constant value.
Claim 4.3. There exists a constant C > (cid:98)τ , such that the probability that ln ρv lies in
[(cid:98)τ , C] is at least ν2(c) and that of lying in [−C,−(cid:98)τ ] is also at least ν2(c).
The next claim will be a consequence of the unimodularity of fv(x).
Claim 4.4. For any x ∈ [x1, x2], fv(x) ≥ min(fv(x1), fv(x2)).
Now for the proof of Lemma 4.2.
4.3.1. Proving Claim 4.3. We begin with notational setup. We fix some vertex v. For conve-
x ∈ [x1, x2]. By Claim 4.4, for any such x, fv(x) = Ω(ν2(c)). Therefore, we can bound
fv(x) ≥ ν1(c), for some positive function ν1.
Proof. (of Lemma 4.2) By Claim 4.3, the probability that ln ρv lies in I := [−C,−(cid:98)τ ] is
at least ν2(c). Therefore, (C −(cid:98)τ ) maxx∈I fv(x) ≥ ν2(c). Suppose the maximum is achieved
at x1. This means that there exists x1 ∈ [−C,−(cid:98)τ ], fv(x1) = Ω(ν2(c)). Similarly, there exists
some x2 ∈ [(cid:98)τ , C] such that fv(x2) = Ω(ν2(c)). Observe that for any x such that x ≤ (cid:98)τ ,
nience, define the variables (cid:98)αi (for all i ≤ (cid:96)). If zi = 0, set (cid:98)αi = αi and (cid:98)αi = βi otherwise.
We can write ln ρv =(cid:80)
i ln(cid:98)αi. The random variable (cid:98)αi is uniform in [1 − bi, 1 + bi], where
bi is either bα or bβ appropriately. Set the zero mean random variable Xi = ln(cid:98)αi − E[ln(cid:98)αi].
-- The pdf of ln(cid:98)αi, denoted by hi(x), is given as follows. For x ∈ [ln(1 − bi), ln(1 + bi)],
-- E[ln(cid:98)αi] = O(c2/(cid:96)), E[X 2
Proof. The pdf of (cid:98)αi is hα(x) = 1/2bα for x ∈ [1 − bα, 1 + bα] and zero otherwise. For
any monotone function F (x), the pdf of F ((cid:98)αi) is given by dF −1(x)/dxh(x). Setting F as
√
i ] = Θ(c2/(cid:96)), and E[Xi3] = O(cE[X 2
i ]/
hi(x) = ex/2bi, and zero otherwise.
We have the following series of facts.
Claim 4.5.
(cid:96)).
Improving Stochastic Kronecker Graphs
A:19
the function ln, the pdf of ln αi, hi(x), is given by ex/2bα for x ∈ [ln(1− bα), ln(1 + bα)] and
zero otherwise.
E[ln(cid:98)αi] =
(cid:90) ln(1+bi)
(cid:12)(cid:12)(cid:12)ln(1+bi)
ln(1−bi)
ln(1−bi)
(cid:90) ln(1+bi)
ln(1−bi)
−
Using integration by parts,
(cid:90) ln(1+bi)
ln(1−bi)
xexdx = [xex]
exdx
xhi(x)dx = (2bi)−1
xexdx
(cid:90) ln(1+bi)
ln(1−bi)
= [(1 + bi) ln(1 + bi) − (1 − bi) ln(1 − bi)] − [(1 + bi) − (1 − bi)]
= bi ln(1 − b2
i ) + ln(1 + bi) − ln(1 − bi) − 2bi
Taking absolute values,
(cid:12)(cid:12)(cid:12)(cid:90) ln(1+bi)
ln(1−bi)
(cid:12)(cid:12)(cid:12) ≤ bi ln(1 − b2
xexdx
i ) + ln(1 + bi) − ln(1 − bi) − 2bi
The first term is at most 2b3
i . For the second term, we need a finer Taylor approximation.
ln(1 + bi) − ln(1 − bi) − 2bi ≤ (bi − b2
ln(1 + bi) − ln(1 − bi) − 2bi ≥ (bi − b2
i ) − (−bi − b2
i /2 − b3
i /2) − 2bi ≤ b3
i ) − 2bi ≥ −b3
i
i
All in all, E[ln(cid:98)αi] ≤ O(b2
i ) = O(c2/(cid:96)).
i /2 + b3
i /2) − (−bi − b2
i ] = E[(ln(cid:98)αi)2] − (E[ln(cid:98)αi])2
(cid:90) ln(1+bi)
E[X 2
E[(ln(cid:98)αi)2] = (2bi)−1
x2exdx
ln(1−bi)
To get an upper bound for this term, we use the following inequalities: ln(1 + bα) ≤ 2bα,
i ). For a
ln(1 − bα) ≥ −2bα, ex ≤ e. That gives E[(ln(cid:98)αi)2] ≤ e(2bi)−1(cid:82) 2bi−2bi
lower bound, we use: ln(1 + bα) ≥ bα/2, ln(1 − bα) ≤ −bα/2, ex ≥ 1/e. Hence, E[(ln(cid:98)αi)2] ≥
(2ebi)−1(cid:82) bi/2
i for
i ] ≤
i , which is much small than b2
For the final bound, we use a trivial estimate. We have E[Xi3] ≤ max(Xi)E[X 2
i ). Note that (E[ln(cid:98)αi])2 ≤ b4
sufficiently small bi. We conclude that E[X 2
−bi/2 x2dx = Ω(b2
i ) = Θ(c2/(cid:96)).
x2dx = O(b2
i ] = Θ(b2
2biE[X 2
i ].
We now state the Berry-Esseen Theorem [Berry 1941; Esseen 1942], a crucial ingredient
of our proof. This theorem bounds the convergence rate of a sum of independent random
variables to a Gaussian.
Theorem 4.6.
[Berry-Esseen] Let X1, X2, . . . , X(cid:96) be independent random variables with
E[Xi] = 0, E[X 2
i . Let F (x)
denote the cumulative distribution function (cdf ) of S and Φ(x) be the cdf of the standard
normal (the pdf is (2π)−1/2e−x2/2). Then, for an absolute constant C1 > 0,
i ] = ξ2
i ξ2
i Xi/(cid:112)(cid:80)
i , and E[Xi3] = ιi < ∞. Let S be the sum(cid:80)
(cid:17)−3/2(cid:88)
i Xi = (ln ρv−E[ln ρv])/(cid:112)(cid:80)
i E[ln(cid:98)αi] = O(c2) and (cid:80)
F (x) − Φ(x) ≤ C1
(cid:16)(cid:88)
i E[X 2
ξ2
i
ιi.
i
i
sup
Proof. (of Claim 4.3) We set X =(cid:80)
E[ln ρv] = (cid:80)
i E[ln(cid:98)αi] ≤(cid:80)
x
i E[X 2
i ]. By Claim 4.5,
i ] = Θ(c2). Note that X is
A:20
just an increasing linear function of ln ρv. Set function r(x) = (x − E[ln ρv])/(cid:112)(cid:80)
r((cid:98)τ ) is some constant function of c, we can find a constant C such the r(C) is strictly
larger than r((cid:98)τ ). Setting y1 = r((cid:98)τ ), y2 = r(C) and using the notation from Theorem 4.6,
i E[X 2
i ],
so X = r(ln ρv). For any interval I = [x1, x2], Pr[ln ρv ∈ I] = Pr[X ∈ [r(x1), r(x2)]]. Since
C. Seshadhri, A. Pinar, T. G. Kolda
Pr[X ∈ [y1, y2]] = F (y2) − F (y1) = Φ(y2) − Φ(y1) + (F (y2) − Φ(y2)) + (Φ(y1) − F (y1))
≥ Φ(y2) − Φ(y1) − F (y2) − Φ(y2) − F (y1) − Φ(y1).
√
√
By Claim 4.5 ιi = O(cξ2
i /
i )−1/2 = O(1/
Since y1 < y2 and are constant functions of c, Φ(y2) − Φ(y1) ≥ ν3(c). By the Berry-
i ιi.
i = Θ(c2). So the Berry-Esseen bound is at most
(cid:96)). By setting C to be a large enough constant, we can ensure
We deduce that Pr[X ∈ [x1, x2]] ≥ ν2(c), for some positive function ν2. A similar proof
Esseen theorem (Theorem 4.6), F (x2) − Φ(x2) + F (x1) − Φ(x1) ≤ 2C1((cid:80)
2C1c((cid:80)
that Φ(y2) − Φ(y1) > 2C1c((cid:80)
holds for [−C,−(cid:98)τ ].
(cid:96)) and (cid:80)
i )−3/2(cid:80)
i ξ2
i ξ2
i )−1/2.
i (cid:96)ξ2
i (cid:96)ξ2
4.3.2. Proving Claim 4.4. We state some technical definitions and results about convolutions
of unimodal functions.
decreasing on (−∞, a) and non-increasing on (a,∞).
if there exists an a ∈ R such that f is non-
Definition 4.7. A pdf f (x) is unimodal
A pdf f (x) is log-concave if Q := {x : f (x) > 0} is an interval and ln f (x) is a concave
function (on the interval Q).
A theorem of Ibragimov [Ibragimov 1956] gives some convolution properties of unimodal
log-concave functions.
Theorem 4.8.
modal pdf. The convolution f ∗ g is also unimodal.
[Ibragimov] Let f (x) be a unimodal log-concave pdf and g(x) be a uni-
Claim 4.9. The pdf fv(x) is unimodal.
Proof. We have ln ρv = (cid:80)
i ln(cid:98)αi. By Claim 4.5, the pdf of ln(cid:98)αi is hi(x) = ex/2bi.
Note that hi(x) is unimodal. Furthermore, ln hi(x) = x − ln 2bi, which is concave. Since
ln ρv is the sum of independent random variables, the pdf fv(x) is the convolution of the
individual pdfs. Repeated applications of Ibragimov's theorem (Theorem 4.8) tells us that
fv(x) is unimodal.
Proof. (of Claim 4.4) By the unimodality of fv, fv is either non-decreasing, non-
increasing, or non-decreasing and then non-increasing in the interval [x1, x2]. Regardless
of which case, for any y ∈ [x1, x2], f (y) ≥ min(f (x1), f (x2)).
4.4. Basic claims for NSKG
We now reprove some of the basic claims for NSKG. Note that when we look at E[Xd], the
expectation is over both the randomness in T and the edge insertions. We use T to denote
the set of matrices T1, T2, . . . , T(cid:96). Conditioning on T simply means conditioning on a fixed
choice of the noise.
Claim 4.10. Let vertex v ∈ Sr. Choose the noise for NSKG at random, and let pv be
the probability (conditioned on T) that a single edge insertion produces an out-edge at v.
(Note that pv is itself a random variable, where the dependence on T is given by ρv.)
(1 − 4σ2)(cid:96)/2τ rρv
n
.
pv =
Improving Stochastic Kronecker Graphs
A:21
Proof. This is identical to the proof of Claim 3.3. Consider a single edge insertion. For
an edge insertion to be incident to v, the edge must go into the half corresponding to the
binary representation of v. If the ith bit of v is 0, then the edge should drop in the top half
at this level, and this happens with probability (1/2 + σi). On the other hand, if this bit is
1, then the edge should drop in the bottom half, which happens with probability (1/2− σi).
Let the bit representation of v be (z1, z2, . . . , z(cid:96)). Then,
pv =
(cid:18) 1
(cid:89)
(cid:18) 1
2
i:zi=0
(cid:19) (cid:89)
(cid:19)(cid:96)/2+r(cid:18) 1
i:zi=1
+ σi
= ρv
+ σ
2
2
(cid:19)
(cid:19)(cid:96)/2−r
− σi
(cid:18) 1
2
− σ
=
=
(cid:89)
(cid:18) 1
2
αi
+ σ
i:zi=0
ρv(1 − 4σ2)(cid:96)/2
(cid:19)
− σ
(cid:19) (cid:89)
(cid:18) 1
(cid:18) 1/2 + σ
(cid:19)r
i:zi=1
βi
2
·
(1 − 4σ2)(cid:96)/2τ rρv
n
.
=
2(cid:96)
√
1/2 − σ
√
m) and d = o(
√
As before, we will assume that pv = o(1/
n). Even though pv is a
random variable, the probability that it is larger than 1/
m can be neglected. (This was
discussed in more detail before Lemma 3.5). We stress that in the following, the probability
that v has outdegree d is itself a random variable.
√
Claim 4.11. Let v be a vertex in slice r, d = o(
n), and pv = o(1/
m). Then for
√
NSKG, we have
(λv)d
Pr[deg(v) = dT] = (1 ± o(1))
Proof. We follow the proof of Lemma 3.5. We approximate(cid:0)m
(cid:18)m
(cid:19)
√
by e−xm, for x = o(1/
n). This approximation is performed in the first step
below. We remind the reader that λv = λρv. By Claim 4.10 and the above approximations,
(cid:1) by md/d! and (1−x)m−d
√
m) and d = o(
(cid:19)m−d
exp(λvτ r)
d!
·
d
(τ r)d
1 − (1 − 4σ2)(cid:96)/2τ rρv
v(1 − pv)m−d =
pd
d
(cid:19)d
n
d
(cid:19)d(cid:18)
(cid:18) (1 − 4σ2)(cid:96)/2τ rρv
(cid:18)m
(cid:19)(cid:18) (1 − 4σ2)(cid:96)/2τ rρv
(cid:18)
− (1 − 4σ2)(cid:96)/2τ rρvm
md
d!
(cid:19)
n
n
·
· exp
= (1 ± o(1))
n
[∆(1 − 4σ2)(cid:96)/2ρv]dτ rd
= (1 ± o(1))
= (1 ± o(1))
(λρv)d
d!
·
d!
(τ r)d
exp(λρvτ r)
.
exp(−∆(1 − 4σ2)(cid:96)/2ρvτ r)
4.5. Bounds for degree distribution
We complete the proof of Theorem 4.1. We break it down into some smaller claims. By and
large, the flow of the proof is similar to that for the standard SKG. The main difference
comes because the probabilities discussed in Claim 4.11 are random variables depending
on the noise. The following claim is fairly straightforward, given the previous analysis of
standard SKG. This is where we apply the Taylor approximations to show the Gaussian
behavior depicted in Figure 3.
A:22
C. Seshadhri, A. Pinar, T. G. Kolda
Claim 4.12. Consider some setting of the NSKG noise. Define gv(r) = r ln τ−ln(d/λv).
The expected number of vertices of degree d conditioned on T is
E[XdT] =
1 ± o(1)
√
2πd
(cid:96)/2(cid:88)
(cid:88)
exp(cid:2)−dgv(r)2/2(cid:3)
r=−(cid:96)/2
v∈Sr
Proof. By fixing some T, the λvs are fixed. We use Claim 4.11, linearity of expectation,
and Stirling's approximation in the following.
EG[Xd] =
(cid:88)
(cid:96)/2(cid:88)
v∈Sr
(cid:96)/2(cid:88)
r=−(cid:96)/2
1 ± o(1)
√
2πd
(1 ± o(1))
(cid:88)
exp(λvτ r)
(τ r)d
λd
v
d!
(cid:18) eλv
(cid:19)d
(τ r)d
r=−(cid:96)/2
v∈Sr
d
exp(λvτ r)
= exp(d + d ln λv + rd ln τ − d ln d − λvτ r).
Choose a v ∈ Sr.(cid:18) eλv
(cid:19)d
d
=
(τ r)d
exp(λvτ r)
Define fv(r) = rd ln τ − λvτ r − d ln d + d ln λv + d, where r is an integer. We have r =
(ln d − ln λv + gv(r))/ ln τ .
fv(r) = d ln d − d ln λv + dgv(r) − egv(r)d − d ln d + d ln λv + d
= d(1 + gv(r) − egv(r)).
If gv(r) < 1, then we can approximate fv(r) = −d[gv(r)2/2 + Θ(gv(r)3)], and get
exp(fv(r)) = (1 ± o(1)) exp(−dgv(r)2/2). This is analogous to the beginning of the proof of
Claim 3.8. Suppose gv(r) ≥ 1. Then, arguing as in the proof of Claim 3.7, we deduce that
exp(fv(r)) ≤ 2−(cid:96). The sum of all these terms over v is just a lower order term. So, we can
substitute this by exp(−dgv(r)2/2). Hence, we can bound
E[XdT] =
1 ± o(1)
√
2πd
(cid:96)/2(cid:88)
(cid:88)
exp(cid:2)−dgv(r)2/2(cid:3)
r=−(cid:96)/2
v∈Sr
We now reach the main challenge of this proof. The quantity E[exp(−dgv(r)2/2)] is eval-
uated by averaging over all noise. Note that the actual graph has no effect on this quantity.
Lemma 4.13. Consider r = Γd = (cid:98)θd(cid:101).
E[exp(−dgv(r)2/2)] ≥ ν4(c)√
d
Proof. Define ξr,d = (r − θd) ln τ . Since θd = ln(d/λ)/ ln τ ,
gv(r) = r ln τ − ln(d/λv) = r ln τ − ln(d/λ) + ln ρv = ξr,d + ln ρv
Hence,
E[exp(−dgv(r)2/2)] = E[exp[−d(ln ρv + ξr,d)2/2]]
Since we set r = (cid:98)θd(cid:101), ξr,d ≤ (ln τ )/2. Let us now evaluate the expectation. The pdf of
ln ρv is denoted by fv. The expectation is given by an integral. To distinguish the d referring
to degree, and the d referring to the infinitesimal, we shall use (d) in parenthesis for the
We have ξr,d ≤ (ln τ )/2 and(cid:98)τ = max(2, ln τ ). Hence,(cid:98)τ + ξr,d ≥ 1 and −(cid:98)τ + ξr,d ≤ −1.
−∞
E[exp(−dgv(r)2/2)] ≥ ν1(c)
exp[−dx2/2](dx) −
(cid:105)
(cid:105)
(dx)
e−x2/2dx − 2
(cid:104)(cid:90) +∞
(cid:90) −1
−
−∞
−∞
exp[−dx2/2]
√
(cid:104)(cid:90) +∞
d)
−∞
= (ν1(c)/
√
(cid:90) +∞
1
(cid:90) +∞
√
d
exp[−dx2/2](dx)
(cid:105)
e−x2/2dx
Improving Stochastic Kronecker Graphs
A:23
infinitesimal. We hope this slight abuse of notation will not create a problem, since our
integrals are not too confusing. By Lemma 4.2, fv(x) ≥ ν1(c) for x ≤(cid:98)τ .
E[exp(−dgv(r)2/2)] =
exp[−d(x + ξr,d)2/2]fv(x)(dx)
−∞
≥ ν1(c)
= ν1(c)
(cid:90) +∞
(cid:90) (cid:98)τ
(cid:90) (cid:98)τ +ξr,d
−(cid:98)τ
(cid:104)(cid:90) +∞
−(cid:98)τ +ξr,d
(cid:90) −(cid:98)τ +ξr,d
−∞
−
= ν1(c)
exp[−d(x + ξr,d)2/2](dx)
exp[−dx2/2](dx)
exp[−dx2/2](dx) −
(cid:90) +∞
(cid:98)τ +ξr,d
exp[−dx2/2](dx)
exp[−dx2/2]
(dx)
bounded by (cid:82) +∞
The first integral is just
√
term is at most 2e−d2/2/
ν4(c) such that E[exp(−dgv(r)2/2)] ≥ ν4(c)/
√
y
√
d.
2π. The second is a tail probability of the standard Gaussian,
e−x2/2dx < e−y2/2/y (Lemma 2, pg. 175 of [Feller 1968]). The second
π (for sufficiently large d). Therefore, we can set function
d <
2πd)(cid:80)
Proof of Theorem 4.1. This is a direct consequence of the previous claims. Set
r = Γd. By Claim 4.12 and linearity of expectation, E[Xd] = E[E[XdT]] ≥ ((1 −
√
E[exp(−dgv(r)2/2)]. Lemma 4.13 tells us that E[exp(−dgv(r)2/2)] ≥
√
o(1))/
ν4(c)/
d. Hence, E[Xd] ≥ ν(c)
(cid:1).
v∈Sr
(cid:0)
(cid:96)
d
(cid:96)/2+Γd
4.6. Subtleties in adding noise
One might ask why we add noise in this particular fashion, and whether other ways of
adding noise are equally effective. Since we only need (cid:96) random numbers, it seems intuitive
that adding "more noise" could only help. For example, we might add noise on a per edge
basis, i.e., at each level i of every edge insertion, we choose a new random perturbation
Ti of T . Interestingly, this version of noise does not smooth out the degree distribution, as
shown in Figure 6. In this figure, the red curve corresponds to the degree distribution of the
graph generated by NSKG with Graph500 parameters, (cid:96) = 26, and b = 0.1. The blue curve
corresponds to generation by adding noise per edge. As seen in this figure, adding noise
per edge has hardly any effect on the oscillations, while NSKG provides a smooth degree
distribution curve. (These results are fairly consistent over different parameter choices.) It
is crucial that we use the same noisy T1, . . . , T(cid:96) for every edge insertion.
A:24
C. Seshadhri, A. Pinar, T. G. Kolda
Fig. 6: Comparison of degree distribution of graphs generated by NSKG and by adding
noise per edge for Graph500 parameters and (cid:96) = 26.
5. EXPECTED NUMBER OF ISOLATED VERTICES
In this section, we give a simple formula for the number of isolated vertices in SKG. We
focus on the symmetric case, where t2 = t3 in the matrix T . We assume that (cid:96) is even
in the following, but the formula can be extended for (cid:96) being odd. The real contribution
here is a clearer understanding of how many vertices SKG leaves isolated and how the SKG
parameters affects this number.
Theorem 5.1. Consider SKG with T symmetric and let I denote the number of isolated
vertices. With probability 1 − o(1),
I = (1 ± o(1))
exp(−2λτ r).
(3)
r=(cid:96)/2(cid:88)
(cid:18) (cid:96)
(cid:19)
r=−(cid:96)/2
(cid:96)/2 + r
Claim 5.2. Let qr be the probability that a single edge insertion produces an in-edge or
out-edge incident to v ∈ Sr. Then, for SKG with T symmetric,
qr = (1 ± o(1))
2(1 − 4σ2)(cid:96)/2τ r
.
n
Proof. Let Eo (resp. Ei) be the event that a single edge insertion is an in-edge (resp.
out-edge) of v. We have qr = Pr(Eo) + Pr(Ei)− Pr(Eo ∪Ei). By Claim 3.3 and the symmetry
to T , the first two probabilities are (1−4σ2)(cid:96)/2τ r
. The last is the probability that the edge
insertion leads to a self-loop at v. This is at most σ(cid:96) Pr(Eo). Since σ < 1, this is o(Pr(Eo)).
n
√
As before, we can assume that qr ≤ 1/
√
m. By Claim 3.4, if qr ≥ pr ≥ 1/
m, then
with probability tending to 1, vertices in slice r are not isolated. Hence, we can ignore such
vertices when computing estimates for I.
√
Claim 5.3. Let v ∈ Sr and assume qr ≤ 1/
m. Then, for SKG with T symmetric,
Proof. Using Claim 5.2 and (1 − x)m = (1 ± o(1))e−xm, for x ≤ 1/
√
m,
Pr[v is isolated] = (1 ± o(1)) exp(−2λτ r).
(1− qr)m = (1± o(1)) exp(−2(1± o(1))∆(1− 4σ2)(cid:96)/2τ r) = (1± o(1)) exp(−2(1± o(1))λτ r).
For large (cid:96), this converges to exp(−2λτ r).
Improving Stochastic Kronecker Graphs
A:25
Proof of Theorem 5.1. By Claim 5.3 and linearity of expectation, the expected num-
ber of isolated vertices is
(1 ± o(1))
r=(cid:96)/2(cid:88)
(cid:18) (cid:96)
(cid:19)
r=−(cid:96)/2
(cid:96)/2 + r
exp(−2λτ r).
To bound that actual number of isolated vertices, we use concentration inequalities for
functions of independent random variables. Let Y denote the number of isolated vertices,
and X1, X2, . . . , Xm be the labels of the m edge insertions. Note that all the Xi's are
independent, and Y is some fixed function of X1, X2, . . . , Xm. Suppose we fix all the edge
insertions and just modify one insertion. Then, the number of isolated vertices can change
by at most c = 2. Hence, the function defining Y satisfies a Lipschitz condition. This means
that changing a single argument of Y (some Xi) modifies the value of Y by at most a
constant (c). By McDiarmid's inequality [McDiarmid 1989],
(cid:18)
− 22
c2m
(cid:19)
.
Pr[Y − E[Y ] > ] < 2 exp
√
m log m is o(1). The expected number of vertices is at least (cid:0) (cid:96)
m log m, we get the probability that Y deviates from its expectation by more
(cid:1) exp(−2λ), and
(cid:96)/2
√
Setting =
√
than
m log m is a lower order term with respect to this quantity. This completes the proof.
The fraction of isolated vertices in a slice r is essentially exp(−λτ r). Note that τ is larger
than 1. Hence, this is a decreasing function of r. This is quite natural, since if a vertex v has
many zeros in its representation (higher slice), then it is likely to have a larger degree (and
less likely to be isolated). This function is doubly exponential in r, and therefore decreases
quickly with r. The fraction of isolates rapidly goes to 0 (resp. 1) as r is positive (resp.
negative).
5.1. Effect of noise on isolated vertices
The introduction of noise was quite successful in correcting the degree distribution but has
little effect on the number of isolated vertices. This is not surprising, considering the noise
affects fat tail behavior of the degree distribution. The number of isolated vertices is a
different aspect of the degree distribution. The data presented in Table V clearly shows that
the number of isolated vertices is quite resistant to noise. While there is some decrease in
the number of isolated vertices, this quantity is very small compared to the total number
of isolated vertices. We have observed similar results on the other parameter settings.
Table V: Percentage of isolated vertices with different noise levels for the GRAPH500
parameters and (cid:96) = 26
Max. noise level (b) % isolated vertices
0
0.05
0.06
0.07
0.08
0.09
0.1
51.12
49.26
49.12
49.06
49.07
49.16
49.34
A:26
C. Seshadhri, A. Pinar, T. G. Kolda
In addition to this empirical study, we can also give some mathematical intuition behind
these observations. The equivalent statement of Claim 5.3 for NSKG is
Pr[v is isolated] ≥ (1 − o(1)) exp(−2λτ r) = (1 − o(1))[exp(−2λτ r)]ρv
The noiseless version of this probability is [exp(−2λτr)]. Note that the probability now is a
random variable that depends on T , since ρv depends on the noise. Lemma 4.13 tells us that
ln ρv lies mostly in the range [1 − c(cid:48)/
(cid:96)] (for constant c(cid:48)), and is concentrated
close to 1.
√
(cid:96), 1 + c(cid:48)/
√
We are mainly interested in the case when the probability that v is isolated is not van-
ishingly small (is at least, say 0.01). As (cid:96) grows, ρv is close to being 1, and deviations are
quite small. So, when we take the noiseless probability to the ρvth power, we get almost
the same value.
5.2. Relation of SKG parameters to the number of isolated vertices:
When λ decreases, the number of isolated vertices increases. Suppose we fix the SKG matrix
and average degree ∆, and start increasing (cid:96). Note that this is done in the Graph500
benchmark, to construct larger and larger graphs. The value of λ decreases exponentially in
(cid:96), so the number of isolated vertices will increase. Our formula suggests ways of counteracting
this problem. The value of ∆ could be increased, or the value σ could be decreased. But, in
general, this will be a problem for generating large sparse graphs using a fixed SKG matrix.
When σ increases, then λ decreases and τ increases. Nonetheless, the effect of λ is much
stronger than that of τ . Hence, the number of isolated vertices will increase as σ increases. In
Table II, we compute the estimated number of isolated vertices in graphs for the Graph500
parameters. Observe how the fraction of isolated vertices consistently increases as (cid:96) is in-
creased. For the largest setting of k = 42, only one fourth of the vertices are not isolated.
6. K-CORES IN SKG
Structures of k-cores are an important part of social network analysis [Carmi et al. 2007;
Alvarez-Hamelin et al. 2008; Kumar et al. 2010], as they are a manifestation of the com-
munity structure and high connectivity of these graphs.
Definition 6.1. Given an undirected graph G = (V, E), the subgraph induced by set
S ⊆ V , is denoted by GS := (S, E(cid:48)), where E(cid:48) contains every edge of E that is completely
contained in S. For an undirected graph, the k-core of G the largest induced subgraph
of minimum degree k. The max core number of G is the largest k such that G contains a
(non-empty) k-core. (These can be extended to directed versions: a k-out-core is a subgraph
with min out-degree k.)
A bipartite core is an induced subgraph with every vertex has either a high in-degree or
out-degree. The former are called authorities and the latter are hubs. Large bipartite cores
are present in web graphs and are an important structural component [Gibson et al. 1998;
Kleinberg 1999]. Note that if we make the directed graph undirected (by simply removing
the directions), then a bipartite core becomes a normal core. Hence, it is useful to compute
cores in a directed graph by making it undirected.
We begin by comparing the sizes of k-cores in real graphs, and their models using SKG
[Leskovec et al. 2010]. Refer to Figure 7. We plot the size of the maximum k-core with k. The
k at which the curve ends is the max core number. (For CAHepPh, we look at undirected
cores, since this is an undirected graph. For WEBNotreDame, a directed graph, we look
at out-cores. But the empirical observations we make holds for all other core versions.)
For both our examples, we see how drastically different the curves are. By far the most
important difference is that the curve for the SKG versions are extremely short. This means
that the max core number is much smaller for SKG modeled graphs compared to their
real counterparts. For the web graph WEBNotreDame, we see the presence of large cores,
Improving Stochastic Kronecker Graphs
A:27
Fig. 7: Core decompositions of real graphs and their SKG model. Observe that the max
core of SKG is an order of magnitude smaller.
probably an indication of some community structure. The maximum core number of the
SKG version is an order of magnitude smaller. Minor modifications (like increasing degree,
or slight variation of parameters) to these graphs do not increase the core sizes or max cores
numbers much. This is a problem, since this is strongly suggesting that SKG do not exhibit
localized density like real web graphs or social networks.
If we wish to use SKG to model real networks, then it is imperative to understand the be-
havior of max core numbers for SKG. Indeed, in Table VI, we see that our observation is not
just an artifact of our examples. SKG consistently have very low max core number. Only for
the peer-to-peer Gnutella graphs does SKG match the real data, and this is specifically for
the case where the max core number is extremely small. For the undirected graph (the first
three co-authorship networks), we have computed the undirected cores. The corresponding
SKG is generated by copying the upper triangular part in the lower half to get a symmetric
matrix (an undirected graph). The remaining graphs are directed, and we simply remove
the direction on the edges and compute the total core. Our observations hold for in and out
cores as well, and for a wide range of data. This is an indication that SKG is not generating
sufficiently dense subgraphs.
Table VI: Core sizes in real graphs and SKG version
Graph
CAGrQc
CAHepPh
CAHepTh
CITHepPh
CITHepTh
P2PGnutella25
P2PGnutella30
SOCEpinions
WEBNotreDame
Real max core
SKG max core
43
238
31
30
37
5
7
67
155
4
16
5
19
19
5
6
43
31
A:28
C. Seshadhri, A. Pinar, T. G. Kolda
We focus our attention on the max core number of SKG. How does this number change
with the various parameters? The following summarizes our observations.
Empirical Observation 6.2. For SKG with symmetric T , we have the following ob-
servations.
(1 ) The max core number increases with σ. By and large, if σ < 0.1, max core numbers
are extremely tiny.
(2 ) Max core numbers grow with (cid:96) only when the values of σ are sufficiently large. Even
then, the growth is much slower than the size of the graph. For smaller σ, max core numbers
exhibit essentially negligible growth.
(3 ) Max core numbers increase essentially linearly with ∆.
Large max core numbers require larger values of σ. As mentioned in §5, increasing σ
increases the number of isolated vertices. Hence, there is an inherent tension between in-
creasing the max core number and decreasing the number of isolated vertices.
For the sake of consistency, we performed the following experiments on the max core
after taking a symmetric version of the SKG graph. Our results look the same for in and
out cores as well. In Figure 8a, we show how increasing σ increases the max core number.
We fix the values of (cid:96) = 16 and m = 6 × 216. (There is nothing special about these values.
Indeed the results are basically identical, regardless of this choice.) Then, we fix t1 (or t2)
to some value, and slowly increase σ by increasing t2 (resp. t1). We see that regardless of
the fixed values of t1 (or t2), the max core consistently increases. But as long as σ < 0.1,
max core numbers remain almost the same.
In Figure 8b, we fix matrix T and average degree ∆, and only vary (cid:96). For WEB-
NotreDame5, we have σ = 0.18 and for CA-HEP-Ph, we have σ = 0.11. For both cases,
increasing (cid:96) barely increases the max core number. Despite increasing the graph size by 8
orders of magnitude, the max core number only doubles. Contrast this with the Graph500
setting, where σ = 0.26, and we see a steady increase with larger (cid:96). This is a predictable
pattern we notice for many different parameter settings: larger σ leads to larger max core
numbers as (cid:96) goes up. Finally, in Figure 8c, we see that the max core number is basically
linear in ∆.
6.1. Effect of noise on cores
Our general intuition is that NSKG mainly redistributes edges of SKG to get a smooth
degree distribution, but does not have major effects on the overall structure of the graph.
This is somewhat validated by our studies on isolated vertices and reinforced by looking at
k-cores. In Figure 9, we plot the core decompositions of SKG and two versions on NSKG
(b = 0.05 and b = 0.1). We observe that there are little changes in these decompositions,
although there is a smoothening of the curve for Graph500 parameters. The problem of tiny
cores of SKG is not mitigated by the addition of noise.
7. CONCLUSIONS
For a true understanding of a model, a careful theoretical and empirical study of its prop-
erties in relation to its parameters is imperative. This not only provides insight into why
certain properties arise, but also suggests ways for enhancement. One strength of the SKG
model is its amenability to rigorous analysis, which we exploit in this paper.
We prove strong theorems about the degree distribution, and more significantly show
how adding noise can give a true lognormal distribution by eliminating the oscillations in
degree distributions. Our proposed method of adding noise requires only (cid:96) random numbers
5Even though the matrix T is not symmetric, we can still define σ. Also, the off diagonal values are 0.20
and 0.21, so they are almost equal.
Improving Stochastic Kronecker Graphs
A:29
(a) Varying σ
(b) Varying (cid:96)
(c) Varying ∆
Fig. 8: We plot the max core number against various parameters. In the first picture, we
plot the max core number of an (symmetric) SKG graph with increasing σ. Next, we show
how the max core number increases with (cid:96), the number of levels. Observe the major role
that the matrix σ plays. For Graph500, σ is much larger than the other parameter sets.
Finally, we show that regardless of the parameters, the max core number increases linearly
with ∆.
all together, and is hence cost effective. We want to stress that our major contribution is
in providing both the theory and matching empirical evidence. The formula for expected
number of isolated vertices provides an efficient alternative to methods for computing the
full degree distribution. Besides requiring fewer operations to compute and being less prone
to numerical errors, the formula transparently relates the expected number of isolated ver-
tices to the SKG parameters. Our studies on core numbers establish a connection between
the model parameters and the cores of the resulting graphs. In particular, we show that
A:30
C. Seshadhri, A. Pinar, T. G. Kolda
(a) GRAPH500
(b) WebNotreDame
Fig. 9: We plot the core decomposition of SKG and NSKG (with 2 settings of noise) for the
different parameters. Observe that there is only a minor change in core sizes with noise.
(c) CAHepPH
commonly used SKG parameters generate tiny cores, and the model's ability to generate
large cores is limited.
ACKNOWLEDGMENT
We are grateful to David Gleich for the MATLAB BGL library as well as many helpful discussions. We
thank Todd Plantenga for creating large SKG and NSKG instances, and for generating Figure 1. We also
thank Jon Berry for checking our Graph500 predictions against real data, and also David Bader and Richard
Murphy for discussions about the Graph500 benchmark. We acknowledge the inspiration of Jennifer Neville
and Blair Sullivan, who inspired us with their different work on SKG during recent visits to Sandia.
Improving Stochastic Kronecker Graphs
A:31
REFERENCES
Alvarez-Hamelin, J. I., Dall'Asta, L., Barrat, A., and Vespignani, A. 2008. K-core decomposition
of internet graphs: hierarchies, self-similarity and measurement biases. Networks and Heterogenous
Media 3, 2, 371 -- 393.
Andersen, R. and Chellapilla, K. 2009. Finding dense subgraphs with size bounds. In Algorithms and
Models for the Web-Graph. Springer, 25 -- 37.
Berry, A. 1941. The accuracy of the gaussian approximation to the sum of independent variates. Trans-
actions of the American Mathematical Society 49, 1, 122 -- 136.
Bi, Z., Faloutsos, C., and Korn, F. 2001. The "DGX" distribution for mining massive, skewed data. In
KDD '01. ACM, 17 -- 26.
Carmi, S., Havlin, S., Kirkpatrick, S., Shavitt, Y., and Shir, E. 2007. A model of internet topology
using k-shell decomposition. PNAS 104, 27, 11150 -- 11154.
Chakrabarti, D. and Faloutsos, C. 2006. Graph mining: Laws, generators, and algorithms. ACM Com-
puting Surveys 38, 1.
Chakrabarti, D., Zhan, Y., and Faloutsos, C. 2004. R-MAT: A recursive model for graph mining. In
SDM '04. 442 -- 446.
Clauset, A., Shalizi, C. R., and Newman, M. E. J. 2009. Power-law distributions in empirical data.
SIAM Review 51, 4, 661 -- 703.
Esseen, C.-G. 1942. A moment inequality with an application to the central limit theorem. Skand. Aktua-
rietidskr 39, 160 -- 170.
Feller, W. 1968. An Introduction to probability theory and applications: Vol I 3rd Ed. John Wiley and
Sons.
Gibson, D., Kleinberg, J., and Raghavan, P. 1998. Inferring web communities from link topology. In
HYPERTEXT '98. ACM, 225 -- 234.
Gkantsidis, C., Mihail, M., and Zegura, E. W. 2003. Spectral analysis of internet topologies. In INFO-
COM 2003. IEEE, 364 -- 374.
Goltsev, A. V., Dorogovtsev, S. N., and Mendes, J. F. F. 2006. k-core (bootstrap) percolation on
complex networks: Critical phenomena and nonlocal effects. Phys. Rev. E 73, 5, 056101.
Graph500 Steering Committee. 2012. Graph 500 benchmark. Available at http://www.graph500.org/
specifications.
Groer, C., Sullivan, B. D., and Poole, S. 2011. A mathematical analysis of the R-MAT random graph
generator. Networks 58, 3, 159 -- 170.
Ibragimov, I. A. 1956. On the composition of unimodal distributions. Theory of Probability and its Appli-
cations / Volume 1 / Issue 2 1, 2, 255 -- 260.
Kim, M. and Leskovec, J. 2010. Multiplicative attribute graph model of real-world networks.
arXiv:1009.3499v2.
Kleinberg, J. M. 1999. Authoritative sources in a hyperlinked environment. J. ACM 46, 5, 604 -- 632.
Kumar, R., Novak, J., and Tomkins, A. 2010. Structure and evolution of online social networks. In Link
Mining: Models, Algorithms, and Applications. Springer, 337 -- 357.
Leskovec, J., Chakrabarti, D., Kleinberg, J., and Faloutsos, C. 2005. Realistic, mathematically
tractable graph generation and evolution, using Kronecker multiplication. In PKDD 2005. Springer,
133 -- 145.
Leskovec, J., Chakrabarti, D., Kleinberg, J., Faloutsos, C., and Ghahramani, Z. 2010. Kronecker
graphs: An approach to modeling networks. J. Machine Learning Research 11, 985 -- 1042.
Leskovec, J. and Faloutsos, C. 2007. Scalable modeling of real graphs using kronecker multiplication. In
ICML '07. ACM, 497 -- 504.
Mahdian, M. and Xu, Y. 2007. Stochastic kronecker graphs. In Algorithms and Models for the Web-Graph.
Springer, 179 -- 186.
Mahdian, M. and Xu, Y. 2011. Stochastic Kronecker graphs. Random Structures & Algorithms 38, 4,
453 -- 466. Conference version appeared as [Mahdian and Xu 2007].
McDiarmid, C. 1989. On the method of bounded differences. Surveys in Combinatorics 141, 148 -- 188.
Miller, B., Bliss, N., and Wolfe, P. 2010. Subgraph detection using eigenvector L1 norms. In NIPS
2010. 1633 -- 1641.
Mitzenmacher, M. 2003. A brief history of generative models for power law and lognormal distributions.
Internet Mathematics 1, 2, 226 -- 251.
Mitzenmacher, M. 2006. The future of power law research. Internet Mathematics 2, 4, 525 -- 534.
A:32
C. Seshadhri, A. Pinar, T. G. Kolda
Moreno, S., Kirshner, S., Neville, J., and Vishwanathan, S. V. N. 2010. Tied Kronecker product
graph models to capture variance in network populations. In Proc. 48th Annual Allerton Conf. on
Communication, Control, and Computing. 1137 -- 1144.
Motwani, R. and Raghavan, P. 1995. Randomized Algorithms. Cambridge University Press.
Pennock, D., Flake, G., Lawrence, S., Glover, E., and Giles, C. L. 2002. Winners don't take all:
Characterizing the competition for links on the web. PNAS 99, 8, 5207 -- 5211.
Sala, A., Cao, L., Wilson, C., Zablit, R., Zheng, H., and Zhao, B. Y. 2010. Measurement-calibrated
graph models for social network experiments. In WWW '10. ACM, 861 -- 870.
|
1801.06498 | 1 | 1801 | 2018-01-19T17:27:50 | Optimal Active Social Network De-anonymization Using Information Thresholds | [
"cs.SI"
] | In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker's website, and the attacker uses the victim's browser history to query her social media activity for the purpose of de-anonymization using the minimum number of queries. A stochastic model of the problem is considered where the attacker has partial prior knowledge of the group membership graph and receives noisy responses to its real-time queries. The victim's identity is assumed to be chosen randomly based on a given distribution which models the users' risk of visiting the malicious website. A de-anonymization algorithm is proposed which operates based on information thresholds and its performance both in the finite and asymptotically large social network regimes is analyzed. Furthermore, a converse result is provided which proves the optimality of the proposed attack strategy. | cs.SI | cs | Optimal Active Social Network De-anonymization
Using Information Thresholds
Farhad Shirani
Department of Electrical
and Computer Engineering
New York University
New York, New York, 11201
Email: [email protected]
Siddharth Garg
Department of Electrical
and Computer Engineering
New York University
New York, New York, 11201
Email: [email protected]
Elza Erkip
Department of Electrical
and Computer Engineering
New York University
New York, New York, 11201
Email: [email protected]
8
1
0
2
n
a
J
9
1
]
I
S
.
s
c
[
1
v
8
9
4
6
0
.
1
0
8
1
:
v
i
X
r
a
Abstract-In this paper, de-anonymizing internet users by
actively querying their group memberships in social networks
is considered. In this problem, an anonymous victim visits the
attacker's website, and the attacker uses the victim's browser
history to query her social media activity for the purpose of
de-anonymization using the minimum number of queries. A
stochastic model of the problem is considered where the attacker
has partial prior knowledge of the group membership graph and
receives noisy responses to its real-time queries. The victim's
identity is assumed to be chosen randomly based on a given
distribution which models the users' risk of visiting the mali-
cious website. A de-anonymization algorithm is proposed which
operates based on information thresholds and its performance
both in the finite and asymptotically large social network regimes
is analyzed. Furthermore, a converse result is provided which
proves the optimality of the proposed attack strategy.
I. Introduction
Preserving user privacy is a key obstacle to the continued
digitalization of the society. Consumers increasingly view the
ability to connect, communicate and collaborate over the inter-
net without risking their personal information as an absolute
necessity. Unfortunately, this is far from the case in practice.
For instance, websites track users to serve them with targeted
digital advertisements. More disturbingly, web tracking can
be used by state actors to stifle individuals' free speech rights,
or target vulnerable minority groups. As a result, there is an
urgent need to understand and quantify web users' privacy
risk, that is, what is the likelihood that users on the internet
can be uniquely identified using their online fingerprints?
A user's fingerprint is the set of attributes that reflect the
user's web activities: websites the user has visited and social
network groups that a user is a member of
[1], [2], char-
acteristics of the user's web browser (font size, for example)
[3], and physical device features [4]. Fingerprinting based de-
anonymization attacks build on the empirical observation that,
for a large enough set of attributes, a user's fingerprints are
unique. The challenge, from an attacker's standpoint, is that
an unknown user's fingerprints may not be accurately or easily
available; i.e., fingerprints may be noisy and the attacker may
have to actively query user devices, one attribute at a time, to
measure their fingerprint. However, an attacker may only be
able to issue a limited number of queries to the user's device.
Fig. 1: (Left) An example of a group membership bipartite
graph. (Right) A user is to be de-anonymized based on partial
fingerprints.
Recently, Wondracek et al. [5] proposed a practical finger-
printing attack strategy which uses the user's social media
group memberships for the purposes of de-anonymization.
In this strategy, the attacker runs a malicious website and
seeks to de-anonymize users who visit the website. To this
end, the attacker first uses a web gather to scrape the group
memberships of users in the social network. This serves as
the attacker's prior knowledge of the network which can be
represented as a bipartite graph. This is shown in the left
illustration in Figure 1. Note that the attacker's scanned version
of the group membership graph might be different from the
actual network graph because of users' privacy settings that
act as a source of noise.
When an unknown user visits the attacker's website, the
attacker queries social network group memberships to find the
user's identity. This is done by using browser history sniffing to
ask questions of the form "is the webpage of social network
group v in the user's browser history?" If yes, the attacker
assumes that the user is a member of the social network group
v, and if no then the attacker assumes the user is not a member
of v. Of course, a user might be a member of a group they have
not visited, or conversely, might not be a member of a group
they have visited; consequently, the attacker's measurement is
noisy. In this way, the attacker obtains the unknown user's
partial fingerprint. This is shown in the right illustration in
Figure 1. By matching the partial fingerprint in the two graphs,
the unknown user is de-anonymized.
Although effective, Wondracek et al.'s attack does not
answer fundamental questions about the optimal number and
type of group memberships to query, and the order in which
to issue queries. Other fingerprinting attacks proposed in
literature [5]–[10] have also adopted similar ad-hoc approaches
without theoretical guarantees or analyses.
In [11], we proposed a mathematical formulation for Won-
dracek et al.'s browser history sniffing attack [5], introduced
a new strategy by making analogies to channel coding, and
quantified the amount of information the attacker obtains from
each query. This formulation is summarized in Section II. We
showed that under the assumption that users are equally likely
to visit the attacker's website, the total number of queries
required for de-anonymization grows logarithmically in the
number of users. Furthermore, the coefficient of the logarithm
is inversely proportional to the mutual information between
the random variables corresponding to the edges in the two
graphs in Figure 1.
In [11], we assumed that the victim's index is distributed
uniformly over the set of all user indices. However, internet
users typically vary in terms of their activity levels on the
web. More active users would be more likely to visit an
attacker's website, resulting in a non-uniform distribution on
the user index J. In this work, we propose an information-
threshold-based de-anonymization strategy which builds upon
the joint source-channel coding methods studied in
[12]–
[14] to devise fingerprinting attacks when the user distribution
is not uniform. Roughly speaking, in the new strategy, the
attacker would query the selected anonymous user's attributes
sequentially and calculate the amount of information obtained,
i.e.
the amount of uncertainty regarding each user index
based on previous query responses. The attack ends when
the uncertainty is lower than a given threshold for one of the
user indices. In this strategy, the user distribution only affects
the initial information values. Furthermore, we provide a tight
converse which proves that the strategy is optimal in terms of
expected number of queries required for de-anonymization.
The rest of the paper is organized as follows: In Section
II, we provide the problem formulation. In Section III, we
introduce and analyze the new attack strategy. Section IV in-
cludes the converse result for active de-anonymization attacks.
Section V concludes the paper.
II. Problem Formulation
In this section, we provide a rigorous formulation of the
active fingerprinting problem. This is a generalization of the
formulation provided in [11]. We model the group member-
ships in the social network by a bipartite graph. The bigraph
is defined below:
Definition 1. An (n, m)-bigraph is a structure gn,m = (U,R,E),
where (U(cid:83)R,E) is a graph such that U = n and V = m.
The set V = U(cid:83)R is called the vertex set and is partitioned
into two subsets: 1) the user set U = {u1, u2,··· , um}, and
2) the group set R = {r1, r2,··· , rn}. The set E ⊆ {(i, j)i ∈
[1, m], j ∈ [1, n]} is called the edge set.
Definition 2. Let gn,m be an (n, m)-bigraph characterized by
the triple (U,R,E), then,
• For a group r j, j ∈ [1, n], the set E j = {i(i, j) ∈ E}, j ∈
[1, n] is called the set of members of r j.
• For a user ui, i ∈ [1, m], the set Fi = { j(i, j) ∈ E}, i ∈
[1, m] is called the set of groups associated with ui.
• The group signature of user ui
is the vector Fi
(Fi,1, Fi,2,··· , Fi,n), where
=
1
0
if ui ∈ Ek,
otherwise.
Fi,k =
= (Fi,n1 , Fi,n1+1,··· , Fi,n2) is called a
• The vector Fn2
partial group signature of ui, where 1 ≤ n1 ≤ n2 ≤ n.
i,n1
Definition 3. An (n, m, p)-random bigraph is a structure
gn,m,p = (U,R,EEE), such that i) gn,m = (U,R,EEE) is an (n, m)-
bigraph, and ii) The edge set EEE is generated randomly based
on the distribution:
P(EEE = E) = pE(1 − p)(nm−E),
= (g0
n,m,PE0 ,E1
n,m,p0 , g1
n,m,p1), where i) gi
where E ⊆ {(i, j)i ∈ [1, m], j ∈ [1, n]}.
Definition 4. A correlated pair of random bigraphs (CPRB)
n,m,pi , i ∈ {0, 1}
is a pair g
is an (n, m, pi)-random bigraph with P(Ei = 1) = pi, i ∈ {0, 1},
and ii) The edge sets EEEi, i ∈ {0, 1} are generated based on the
(cid:16)
joint probability distribution:
if e0 = e1
P
PE0(α)PE1(β), Otherwise
where α, β ∈ {0, 1}2, e1, e2 ∈ {(i, j)i ∈ [1, m], j ∈ [1, n]}, and
1(·) is the indicator function.
PE0,E1(α, β),
1(e0 ∈ EEE0) = α, 1(e1 ∈ E1E1E1) = β)
(cid:17)
=
The following defines an active de-anonymization problem:
Definition 5. An active de-anonymization problem is charac-
terized by the quadruple (g
YZ ), where
n,m,p1) is a CPRB, the random variable
g
J[m] is defined on the alphabet J[m] = [1, m], and the variables
n,m,PE0 ,E1
Y and Z are binary random variables.
, PJ[m] , PUID
YZ , PGM
n,m,p0 , g1
n,m,PE0 ,E1
= (g0
In the above definition, g0
n,m,p0 represents the group mem-
bership graph and g1
n,m,p1 represents the attacker's scanned
graph. The random variable J[m]
is the index of the user
uJ[m] which is to be de-anonymized. For brevity, we write
J instead of J[m] when there is no ambiguity. We assume a
memoryless and time-invariant stochastic noise model for the
responses to the attacker's queries. The variable Z represents
the correct response to the attacker's query, where Z = 1
indicates a 'yes' response, and the variable Y represents the
noisy response received by the attacker after making the query.
As explained in [11], the set of possible queries is divided
into two categories: i) User identity (UID): a UID query asks
if the unknown victim uJ is user u j in the network, and ii)
group Membership Queries (GM): a GM asks if the unknown
YZ and PGM
victim uJ is a member of the group ri. Hence, the conditional
distributions PUID
YZ are the distribution of the response
received by the attacker given the correct response to the
attacker's UID and GM queries, respectively. Due to practical
considerations explained in [11], we assume that the responses
to the UID queries are received noiselessly (i.e. PUID
= I2,
YZ
where I2 is the unitary matrix). Loosely speaking, UID queries
provide information regarding a single user index whereas GM
queries provide information regarding all of the user indices
in the corresponding group. As a result, it is often desirable
to send GM queries when there is uncertainty among a large
subset of user indices and UID queries when it is verified that
the anonymous user is in a small subset of users. At time
t ∈ N, the attacker uses the vector of prior responses Yt−1
and
the scanned graph g1
n,m,p1 to choose the next query xt. An attack
strategy provides the sequence of functions xt(Yt−1
n,m,p1). If
the attacker sends the UID query corresponding to the user u j,
we write xt = u j, and if it sends the GM query corresponding
to the group ri, we write xt = ri.
Definition 6. An attack strategy χ for the active de-
YZ ) is defined
anonymization problem (g
n,m,PE0 ,E1
×{0, 1}(t−1) → R∪U, t ∈
as a sequence of functions xt : g1
N. The random process Zt, t ∈ N is defined as the sequence of
correct responses:
YZ , PGM
, PJ, PUID
n,m,p1
, g1
1
1
if xt = ri & J ∈ E0
ri or xt = uJ,
Zt =
0 Otherwise.
The random process Yt, t ∈ N is the sequence of received
responses. The Markov chains Yt ↔ Zt ↔ xt, Yt−1, Zt−1, t ∈ N
hold. Furthermore,
PUID
YZ
PGM
YZ
PYtZt
=
if xt ∈ U
if xt ∈ R .
1
1
Finally, the random process Ut, t ∈ N is the sequence of
expected responses based on the scanned graph g1
n,m,p1:
if xt = ri & J ∈ E1
ri or xt = uJ,
Ut =
0 Otherwise.
The performance of an attack strategy is measured based
on the average number of queries required for successful de-
anonymization.
Definition 7. For a given attack strategy characterized by χ =
(xt(yt−1
))t∈N, the number of queries required for successful de-
anonymization is defined as Q (cid:44) min{t(xt, yt) = (uJ, 1)}.
Definition 8. For the active de-anonymization problem
YZ ), the minimum expected number of
(g
queries is defined as:
YZ , PGM
, PJ, PUID
n,m,PE0 ,E1
1
¯Q (cid:44)
min
xt:{0,1}(t−1)→R∪U,t∈N
E(Q),
, J and Yt, Zt, t ∈ N.
where the expectations is over g
n,m,PE0 ,E1
III. The Information Threshold Strategy
In
[11], we considered the de-anonymization problem
under the assumption that the victim's index J, is distributed
uniformly over the index set [1, m]. Here, we relax this
assumption and consider the problem when the victim's index
is distributed according to an arbitrary probability distribution
PJ which is known a-priori to the attacker. This models the
varying levels of risk averseness and risk tolerance for users
over the network. More risk tolerant users are more likely to
visit an attacker's website. Hence the corresponding user index
is more likely to be de-anonymized.
is
The
information threshold strategy (ITS)
a de-
anonymization strategy which operates by comparing the
'information value' of each user index with an information
threshold. The information values represent the amount of
uncertainty in each user index given the received query re-
sponses. We provide bounds on the performance of the ITS
for arbitrary PGM
YX and PJ, and show that the expected number
of queries is proportional to the user index entropy H(J) and
is inversely proportional to the mutual information I(U; Y)
between the random variables corresponding to the received
and expected responses. When the index J is uniformly
distributed, the first order performance (i.e. the coefficient
of the logarithmic term for the expected number of queries)
of the ITS is the same as that of the typical set strategy
(TSS) in [11]. However, the ITS outperforms the TSS in the
second order sense in the expected number of queries (i.e. the
coefficient of the terms which are asymptotically smaller than
the logarithmic term is improved.). We proceed to describe the
strategy.
Definition 9. For the pair of random variables (X, Y) defined
on the probability space (X × Y, 2X×Y, PX,Y), where X and Y
are finite sets, the information density is defined as:
∀(x, y) ∈ X × Y.
iX;Y(x; y) = log
PYX(yx)
PY(y) ,
Let Ut, Yt and Zt be binary random processes defined in
Definition 6. Fix > 0 and l ∈ N. Also, define the joint
distribution:
PU,Y,Z(u, y, z) (cid:44) PZ(z)PE1E0(uz)PGM
YZ (yz).
(1)
At the initial stage, the attacker forms an m-length vector
of 'information values' corresponding to the vector of users
(ui)i∈[1,m]. The initial information value for user j ∈ [1, m] is
defined as:
I0( j) (cid:44) log
1
PJ( j) .
Once the vector of information values is formed, the attack
progresses in l steps. In each step, the attacker sends group
membership queries sequentially starting with the query cor-
responding to the first group r1, and proceeding by increasing
the group index. Hence, it makes queries regarding the values
= (FJ,1, FJ,2,··· , FJ,τ∗) defined in Definition 2, where
of Zτ∗
τ∗ is defined later. The attacker receives the noisy sequence
of responses (Y1, Y2,··· , Yτ∗). The information value query
number n(cid:48) is defined below:
, Yn(cid:48)
) − I0( j), j ∈ [1, m], n(cid:48) ∈ [1, τ
∗],
In(cid:48)( j) = iUn(cid:48)
;Yn(cid:48) (Un(cid:48)
GM queries are concluded if there exists at least one index j
for which the information value Iτ∗( j) is larger than the infor-
mation threshold log 1
. More precisely, the attacker defines
}, j ∈ [1, m],
and the stopping time τ∗ = min j∈[1,m] τ j. The attacker then
finds the user with the maximum information value:
1
τ j = min{n(cid:48) ≥ 0 : In(cid:48)( j) ≥ log
(cid:98)J = argmax j∈[1,m]Iτ∗( j).
Next, the attacker sends a UID query to verify that the user
index is equal to (cid:98)J. In other words, it transmits xτ∗+1 = u(cid:98)J.
The algorithms ends if the output yτ∗+1 = 1 is received. If the
attacker fails to recover J in this step, it proceeds to the next
step. In summary, the attack strategy in the first step is given
below:
rt
ui(cid:98)J
xt =
if t ≤ τ∗,
if t = τ∗ + 1.
If the UID returns a negative response, in the next step, the
attacker resets the information values to their initial values.
It repeats the previous step for the next set of group indices.
If the attack strategy reaches the lth step, all of the possible
UID's are sent for all remaining users until the user is de-
anonymized. The number of steps 'l(cid:48) is chosen such that the
probability of reaching the lth step is small enough.
We denote the number of queries in this attack strategy by
QITS . The following theorem provides bounds on the expected
number of queries:
Theorem 1. For the ITS strategy:
E(QITS ) ≤
1
(1 − )
+ imax
+ 1
m
2 l,
(2)
where imax (cid:44) maxu,y iU;Y(u; y), and PU,Y is defined in equation
(1), provided that the number of groups 'n' satisfies
I(U; Y)
H(J) + log 1
H(J) + log 1
I(U; Y)
log m , and l (cid:44)
+
< n.
1
(1 − )l
Particularly, if = log log m
inequality
+ imax
+ 1
(3)
log m
log log m−log log log m , then the
IV. Converse Theorems for Active De-anonymization
In this section, we prove that the bound provided in The-
orem 1 is tight in the first order sense (i.e. the coefficient
of H(J) in Equation (4) cannot be improved.). To this end,
we build upon the converse of Burnashev's reliability function
for point-to-point communication over channels with noiseless
feedback
[12], [13], [15]. More specifically, for a given
active de-anonymization strategy, we introduce a dual code
for communication over a channel with feedback, and use the
converse results in [12], [13], [15] to provide bounds on the
optimal performance. In our analogy, the victim's index in the
fingerprinting problem is analogous to the message which is
to be sent over the channel with feedback and the queries are
analogous to the channel inputs. The following provides the
standard definition for a variable length code for a discrete
memoryless channel with feedback.
Definition 10. A (T, )-variable length code for the channel
with feedback (U,Y, PYU) transmitting message J (with al-
phabet J) is defined by: i) the common information V ∈ V
shared between the encoder and decoder prior to the start
functions (cid:98)Jn : V × Yn (cid:55)→ J, and iv) a non-negative integer-
of the communication, ii) a sequence of encoding functions
Un : V × J × Yn−1 (cid:55)→ U, n ∈ N, iii) a sequence of decoding
by (cid:98)J = (cid:98)Jτ(V, Y τ). The average transmission time for a given
code is = P((cid:98)J (cid:44) J).
code is defined as T = E(τ). The probability of error for the
The reconstruction of the message at the decoder is given
valued random variable τ.
We use the following result:
Lemma 1.
[12] The average transmission time for a family
of (Tn, n)-variable length block codes for the channel with
noiseless feedback (U,Y, PYU) is lower-bounded by:
Tn ≥ H(J)
I(U; Y)
+ O(n),
where n → 0 as n → ∞.
The following provides a converse for the performance of
, PJ[mt] , PUID
active de-anonymization strategies:
YZ ), t ∈ N be a
Theorem 2. Let (g
sequence of active de-anonymization problems where mt → ∞
as t → ∞ and nt
is an arbitrary sequence. Consider the
sequence of attack strategies χt, t ∈ N. Define ¯Qχt as the
expected number of queries for successful de-anonymization
for the strategy χt. Then,
YZ , PGM
nt,mt,PE0 ,E1
¯Qχt ≥ H(J[mt])
I(U; Y)
+ O(log mt).
E(QITS ) ≤ H(J[m])
I(U; Y)
+ O(log log m)
holds, provided that
H(J[m])
I(U; Y)
log log m < n.
(4)
(5)
Proof. Please refer to the appendix.
Remark 1. In Theorem 1, we have assumed that the number
of groups n satisfies:
(cid:3)
H(J) + log 1
I(U; Y)
1
(1 − )
+
+ imax
+ 1
m
2 l < n.
Proof. Please refer to the Appendix.
(cid:3)
V. Conclusion
We have studied the active de-anonymization problem for
general non-equiprobable user indices. We have introduced
the ITS de-anonymization strategy which operates based on
information thresholds. The new strategy measures the amount
of uncertainty in the user indices given the received query
responses. We have characterized the performance of the ITS
both for social networks with a fixed, finite number of users
as well as for asymptotically large social networks. Finally,
we have provided a converse which shows the first-order
optimality of the proposed approach.
Appendix
A. Proof of Theorem 1
index J in the ith step. We have the following:
E (QITS ) =
P (E1) E (QITSE1) + P
The proof builds upon the method in [12]. Fix > 0 and
l ∈ N. Let τ j, τ∗, and (cid:98)J be defined as in Section III. Let
Ei, i ∈ [1, l − 1] be the event that (cid:98)J is equal to the victim's
(cid:92)
(cid:17)
· m
l(cid:92)
+ P
l−2(cid:92)
· m
l−2(cid:92)
l(cid:92)
l−1(cid:88)
(cid:92)
(cid:16)
(cid:17) E(cid:16)
QITS l−2(cid:92)
E
(cid:92)
QITSEc
(cid:92)
(cid:16)
(cid:17)
((l − 1) E(τ
E2
∗) + l − 1) + P
El−1
∗) + 2) + ···
El−1
∗) + 1) + P
(cid:92)
(cid:92)
= P (E1) (E(τ
+ ···
(2E(τ
El−1
+ P
+ P
Ec
1
Ec
1
Ec
i
Ec
i
Ec
i
Ec
i
E2
1
i=1
Ec
i
E2
i=1
i=1
i=1
2
i=1
2
(a)=
i (1 − ) i−1 (E (τ
i=1
1
(1 − )
=
(E (τ
∗) + 1) +
∗) + 1) +
2 l−1,
m
m
2 l−1
(6)
where (a) follows from the fact that the events Ei are mutually
independent and equiprobable with P(Ei) = 1− , i ∈ [1, l− 1].
Next, we derive an upper-bound for E(τ∗).
Proposition 1. The following bound on the expectation of τ∗
holds:
E(τ
∗) ≤ H(J) + log 1
I(U; Y)
+ imax
.
Proof. First, note that E(τ∗) ≤ E(τJ) by definition of τ∗. So, it
is enough to prove the upper bound on E(τJ). Fix j ∈ N. Let
t = min{τJ, j}. Note that:
E (It (J)) = E(cid:16)
t(cid:88)
(a)= E
iUt;Yt
Ut; Yt(cid:17)(cid:17) − Io( j)
(cid:16)
(cid:17) − H (J)
(cid:16)
iU;Y
U j; Y j
(b)= I(U; Y)E(t) − H(J),
j=1
where in (a) we have used the memoryless property of the
network and (b) follows from the smoothing property of
expectation and the fact that iU;Y (U; Y) is constant in j. Also,
note that It(J) is an increasing function of t and at each step
the increment is less than or equal to imax. It follows that:
E (It (J)) ≤ E (It−1 (J)) + imax ≤ log
1
+ imax,
where we have used the fact that iU;Y(u, y) ≤ imax,∀u, y ∈
U×Y and that by the definition of τJ, we have It−1(J) ≤ log 1
since t − 1 < τJ. So, far we have shown that I(U; Y)E(t) −
+ imax,∀ j ∈ N. By the monotone convergence
H(J) ≤ log 1
theorem it follows that I(U; Y)E(τJ) − H(J) ≤ log 1
+ imax.
(cid:3)
This completes the proof of the proposition.
Applying the above proposition to Equation (6) gives:
m
2 l−1.
E (QITS ) ≤
1
(1 − )
H (J) + log 1
I (U; Y)
+ 1
+ imax
+
+ O(cid:0)log log m(cid:1) .
log m , and l =
E (QITS ) ≤ H (J)
I (U; Y)
Take = log log m
log m
log log m−log log log m, then
The bounds in (3) and (5) follow from the fact that from the
) ≤ l. This completes the proof
Markov inequality, P(τ∗ >
of Theorem 1.
E(τ∗)
l
B. Proof of Theorem 2
We provide an outline of the proof. For the given attack
strategy χn = (Xt)t∈N, we define the dual code for communica-
tion over the channel with feedback (U,Y, PYU) which trans-
mits the message J[m] as follows. At time t, assume that the
sequence Yt−1 is noiselessly available at the transmitter through
feedback. The encoder first calculates the query Xt(Yt−1) given
the the attack strategy χn when the attacker is to de-anonymize
the user index J[m]. If Xt is a GM query corresponding to
the group rt, then Ut = 1(uJ[m] ∈ rt) is transmitted as the
channel input. If Xt is a UID query corresponding to the user
u(cid:98)J[m]
next. If J[m] = (cid:98)J[m], the all-ones sequence of length trep is
, then the transmitter uses a repetition code as described
transmitted, and if J[m] (cid:44) (cid:98)J[m],
the all-zeros sequence of
length trep is transmitted, where trep will be determined later.
The decoder uses a majority logic decoder for the repetition
code to determine whether the response to the UID query is
positive or not. By construction, the probability of error of
this sequence of codes m is proportional to the probability of
error of the repetition code since if the response to the UID
query is positive and correctly decoded, then the transmission
is succsessful. Hence, the probability of error approaches 0
as m → ∞ if trep = ω(log ( 1
)). Let Tm be the expected
transmission time for this code. The statement of theorem
follows from Lemma 1 by taking m = ω( 1
m
m):
¯Qχn ≥ Tm + Θ(trep) ≥ H(J)
I(U; Y)
+ O(log m).
References
[1] S. Kinsella, V. Murdock, and N. O'Hare. "i'm eating a sandwich in
In Proceedings of the 3rd
glasgow": Modeling locations with tweets.
International Workshop on Search and Mining User-generated Contents,
SMUC '11, pages 61–68, New York, NY, USA, 2011. ACM.
[2] Z. Cheng, J. Caverlee, and K. Lee. You are where you tweet: A
content-based approach to geo-locating twitter users. In Proceedings of
the 19th ACM International Conference on Information and Knowledge
Management, CIKM '10, pages 759–768, New York, NY, USA, 2010.
ACM.
[3] D. Gruss, D. Bidner, and S. Mangard. Practical memory deduplication
attacks in sandboxed javascript. In European Symposium on Research
in Computer Security, pages 108–122. Springer, 2015.
[4] H. Kim, S. Lee, and J. Kim. Inferring browser activity and status through
remote monitoring of storage usage. In Proceedings of the 32Nd Annual
Conference on Computer Security Applications, ACSAC '16, pages 410–
421, New York, NY, USA, 2016. ACM.
[5] G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A practical attack
In 2010 IEEE Symposium on
to de-anonymize social network users.
Security and Privacy, pages 223–238, May 2010.
[6] D. Irani, S. Webb, K. Li, and C. Pu. Large online social footprints–an
In 2009 International Conference on Computational
emerging threat.
Science and Engineering, volume 3, pages 271–276, Aug 2009.
[7] M. Jakobsson and S. Stamm. Invasive browser sniffing and countermea-
In Proceedings of the 15th International Conference on World
sures.
Wide Web, WWW '06, pages 523–532, New York, NY, USA, 2006.
ACM.
[8] M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, C. Kruegel,
and S. Antipolis. Abusing social networks for automated user profiling.
In In RAID, 2010.
[9] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are
belong to us: automated identity theft attacks on social networks.
In
Proceedings of the 18th international conference on World wide web,
pages 551–560. ACM, 2009.
[10] M. Srivatsa and M. Hicks. Deanonymizing mobility traces: Using social
network as a side-channel. In in Proceedings of the ACM Conference
on Computer and Communications Security (CCS, 2012.
[11] F. Shirani, S. Garg, and E. Erkip. An information theoretic framework
for active de-anonymization in social networks based on group mem-
berships. In 2017 55rd Annual Allerton Conference on Communication,
Control, and Computing (Allerton), Sept 2017.
[12] V. Kostina, Y. Polyanskiy, and S. Verdu. Joint source-channel coding
with feedback. IEEE Transactions on Information Theory, 63(6):3502–
3515, 2017.
[13] M. V. Burnashev. Data transmission over a discrete channel with
feedback. random transmission time. IProblems Inform. Transmission,
12(4):250–265, 1976.
[14] C. E. Shannon. Coding theorems for a discrete source with a fidelity
criterion. In IRE Nat. Conv. Rec., Pt. 4, pages 142–163. 1959.
[15] P. Berlin, B. Nakiboglu, B. Rimoldi, and E. Telatar. A simple converse
of burnashev's reliability function. IEEE Transactions on Information
Theory, 55(7):3074–3080, 2009.
[16] F. Shirani, S. Garg, and E. Erkip. Optimal Active Social Network De-
anonymization Using Information Thresholds . arXiv preprint arXiv.org,
2018.
|
1804.09196 | 1 | 1804 | 2018-04-24T18:18:23 | The quantitative measure and statistical distribution of fame | [
"cs.SI",
"physics.soc-ph"
] | Fame and celebrity play an ever-increasing role in our culture. However, despite the cultural and economic importance of fame and its gradations, there exists no consensus method for quantifying the fame of an individual, or of comparing that of two individuals. We argue that, even if fame is difficult to measure with precision, one may develop useful metrics for fame that correlate well with intuition and that remain reasonably stable over time. Using datasets of recently deceased individuals who were highly renowned, we have evaluated several internet-based methods for quantifying fame. We find that some widely-used internet-derived metrics, such as search engine results, correlate poorly with human subject judgments of fame. However other metrics exist that agree well with human judgments and appear to offer workable, easily accessible measures of fame. Using such a metric we perform a preliminary investigation of the statistical distribution of fame, which has some of the power law character seen in other natural and social phenomena such as landslides and market crashes. In order to demonstrate how such findings can generate quantitative insight into celebrity culture, we assess some folk ideas regarding the frequency distribution and apparent clustering of celebrity deaths. | cs.SI | cs | Preprint - Ramirez and Hagen
8
1
0
2
r
p
A
4
2
]
I
S
.
s
c
[
1
v
6
9
1
9
0
.
4
0
8
1
:
v
i
X
r
a
The quantitative measure and statistical distribution of fame
Edward D. Ramirez and Stephen J. Hagen*
Physics Department, University of Florida, Gainesville Florida 32611-8440 USA
* [email protected]
Abstract
Fame and celebrity play an ever-increasing role in our culture. However, despite the
cultural and economic importance of fame and its gradations, there exists no consensus
method for quantifying the fame of an individual, or of comparing that of two
individuals. We argue that, even if fame is difficult to measure with precision, one may
develop useful metrics for fame that correlate well with intuition and that remain
reasonably stable over time. Using datasets of recently deceased individuals who were
highly renowned, we have evaluated several internet-based methods for quantifying
fame. We find that some widely-used internet-derived metrics, such as search engine
results, correlate poorly with human subject judgments of fame. However other metrics
exist that agree well with human judgments and appear to offer workable, easily
accessible measures of fame. Using such a metric we perform a preliminary investigation
of the statistical distribution of fame, which has some of the power law character seen in
other natural and social phenomena such as landslides and market crashes. In order to
demonstrate how such findings can generate quantitative insight into celebrity culture,
we assess some folk ideas regarding the frequency distribution and apparent clustering
of celebrity deaths.
Introduction
The phenomena of fame and celebrity are increasingly important in our culture. With
the rapid expansion of electronic media, fame plays a growing role in commerce, media,
and public affairs, as well as in legal and academic spheres [1]. Social media have
boosted the visibility of celebrities of all kinds, allowing individuals to acquire or lose
fame overnight [2]. Celebrity endorsements offer value to businesses, political campaigns
and cultural organizations. Fame affects the economic value of names and
trademarks [3], and it aids professional advancement in a variety of fields.
Researchers have explored some aspects of fame, such as the psychological motives of
the would-be famous [4] and sex bias in assessments of fame [5]. Several studies have
also attempted to correlate the fame of well known individuals with measures of their
professional achievement [6] [7] [8] [9] [10] [11], which is measured by different tools in
different fields. Remarkably however, although fame clearly exists in degrees there is no
consensus on its quantitative measure: researchers who have attempted to quantify
fame have relied on a variety of ad hoc measures that have not themselves been
evaluated or calibrated.
One common such measure has been search engine results. Following Schulman's
proposal [12] that an individual's fame is revealed by the number of web pages returned
from an internet search for his/her name, many researchers have used Google hits to
quantify fame. Google hits (denoted GH, the number of web pages returned in a Google
1/17
Preprint - Ramirez and Hagen
search for an individual's name) has been used to quantify the fame of WWI flying
aces [6] and chess masters [9] as well as physicists [10]. Similarly, some researchers have
used Wikipedia data, including page views and other measures of Wikipedia presence,
to quantify the fame of athletes [8] and historical figures [11] and to predict movie box
office success [13]. Other social media tools have also been employed to measure
attributes related to fame; one study used the number of Twitter followers [7] to gauge
the social media visibility of a sampling of scientists.
There are alternatives to using internet tools or social media to measure fame.
Psychological researchers have studied how panels of human subjects judge the fame of
well-known individuals [5] [14]. A recent "culturomics" study tracked the rise and fall of
individuals' fame on historical time scales by measuring the frequency of their mention
in a large database of digitized texts [2]. Some journalists regard the length of an
individual's obituary, as well as its advance preparation, as indices of fame [15].
Nevertheless internet tools such as GH are convenient to use. Unfortunately,
researchers have generally not attempted to validate these tools by testing whether they
give results consistent with other measures or intuitive indicators of fame. It is
remarkable that no metric has been tested for measuring a phenomenon that is
unequally distributed and yet has demonstrable utility and economic value across fields.
Furthermore, studies of fame have often failed to define it separately from related
concepts such as celebrity, professional accomplishment, and media profile. This lack of
precision hinders the quantitative study of fame and its accurate valuation. It also
prevents serious assessment of common claims about celebrity and fame: The
often-made assertions that an unusual number of famous individuals died within a given
year [16], or that famous deaths occur in clusters [17], or that famous musicians die
young [18], cannot be assessed unless fame can be quantified. This article aims to
demonstrate that, starting from a clear definition of fame, internet-derived metrics of
fame can be found that correlate with quantitative human judgments of fame, and that
using these metrics one may gain insight into some of the statistical properties of fame.
For clarity we begin by defining an individual's fame as his/her degree of renown, or
state of being well known, to a population. We do not assume that the fame of an
individual correlates with accomplishment as judged by that population, or that the
metrics of accomplishment favored by that population are also metrics of fame.
In contrast we define celebrity as the close media attention that is provided to the
most famous individuals; thus a celebrity is one whose ordinary activities receive media
attention. Fame and celebrity correlate, but they are not the same. These definitions
accord with those of Drake and Miah [1], who described a celebrity as a mediated public
persona.
By our definition the fame of an individual can be measured as a snapshot taken
from the perspective of a given population at a particular time. Metrics that gauge
renown among different populations at different times may not agree completely. We do
not attempt to measure the fame that individuals may have enjoyed in the past, or the
peak fame that they achieved. Rather our approach is to study a diverse group of
renowned individuals at one common time point in their career – the year following
their death – and to quantify their fame at that time point. We do this by measuring
their renown among a group of survey subjects. The survey data provides a baseline,
quantitative fame score that we then compare against some plausible internet or social
media metrics of fame.
employed on a larger scale to evaluate the renown of many individuals. We then use one
such metric to investigate some statistical properties of fame and demonstrate how
these statistics can provide insight into some folk ideas regarding the frequency of
famous deaths.
In this way we identify metrics of fame that can be easily
2/17
Preprint - Ramirez and Hagen
Methods
Data sources
We investigated the fame of deceased individuals only. This is in part because we
intended to use the findings to test folk claims regarding the frequency of celebrity
deaths. However we also sought to minimize concerns related to name ownership and
consent among the individuals whose fame we were evaluating. We also limited our
study to those who had died within the year or so prior to this investigation, so as to
avoid having to devise corrections for possible changes in the fame of individuals after
their death.
We generated three lists (denoted NBC, Wiki, and NYT) of renowned individuals
who died in 2016 or 2017. No individual appeared in more than one list. The NBC list
consisted of 126 highly renowned individuals whose deaths occurred during the full year
2016 and received mention in NBC Online [19]. The Wiki list consisted of 78 names
drawn at random from 642 individuals who (as of March 2017) were named on
Wikipedia.org as having died during the month of January 2017 [20]. The NYT list
consisted of two parts, totaling 147 individuals who were named in the New York Times
online obituaries [21] as having died during two months in 2017; One part (NYT 1) is 75
individuals who died in February 2017, while the other part (NYT 2) is 72 individuals
who died in June 2017.
Survey metric (p ratings)
In order to generate an intuitive and quantitative scale for fame, against which we could
compare various other possible metrics for fame, we first used a survey, based on
pairwise comparisons, to rank a list of twenty famous individuals according to their
renown. The individuals named on the survey are listed in Table 1. They were selected
on the basis of (1) having died during 2016, with their obituaries widely reported in
news media, and therefore being plausibly described as famous; (2) spanning a sufficient
range in renown that statistically significant differences in their rankings could emerge
from the data analysis; (3) being known in fields for which the survey subjects likely
possessed relevant general knowledge. Fifty undergraduate students at the University of
Florida were recruited as subjects to complete the survey. Therefore the list in Table 1
is a sampling of major political and historical figures, top American athletes, stars of
popular films and music, authors of books often read by students, and similar figures.
The list excludes individuals associated with more specialized interests, such as cabinet
secretaries, academics, playwrights, foreign athletes, classical musicians, and so forth.
Each survey subject was presented with a list of fifty different pairs of names, drawn
from the twenty names in Table 1. Each pair of names could be presented in either
order (A : B or B : A). The survey subject was asked to indicate a preference within
each pair by identifying the name about which he/she had greater knowledge. The
subject could also select a "no preference" option if he/she felt equally knowledgeable
about both names. The fifty pairings on each survey form were computer-selected at
random from the 380 possible pairs that can be generated from twenty names. Each
subject received a unique, randomized version of the survey. The list of names was
limited to twenty so that each of the possible name pairs could be presented to multiple
survey subjects, without requiring a survey of excessive length. Thus, with twenty
names and fifty subjects, each being offered fifty comparisons, the survey offered each
pair of names to approximately 13 subjects. If instead 40 names had been tested, then
1560 name pairings would be possible and either the number of subjects or the length of
the survey would have had to increase fourfold to achieve the same coverage.
Of the fifty name pairs offered to each subject, subjects responded with an average
3/17
Preprint - Ramirez and Hagen
V
W
d
t
d
E
W
d
t
d
V
W
H
G
N
G
E
W
3
3
8
,
0
5
2
0
0
0
,
0
0
3
,
9
6
0
0
0
,
0
8
2
9
0
9
,
0
1
3
7
5
,
0
1
1
0
0
0
,
0
0
8
,
9
3
0
0
0
,
9
4
1
5
7
9
,
3
1
7
0
1
,
9
9
1
0
0
0
,
0
0
0
,
8
6
7
0
0
0
,
0
2
5
,
2
2
0
1
,
0
1
6
1
5
,
6
3
5
8
6
,
3
1
5
6
5
,
7
4
4
0
9
,
5
1
6
9
,
3
0
1
5
,
9
1
4
8
3
,
5
2
5
6
,
3
8
8
0
,
3
4
3
9
,
3
8
5
4
,
0
1
6
3
2
,
1
1
0
8
5
,
2
7
0
3
,
8
0
0
7
,
2
5
7
3
,
3
1
7
7
,
3
1
4
5
,
1
9
7
5
,
2
5
8
5
,
1
1
6
6
7
6
5
9
1
1
1
0
2
4
2
9
3
3
2
2
1
4
1
2
4
0
1
9
2
1
3
9
7
9
4
4
6
2
6
,
2
4
0
0
0
,
0
0
2
,
3
1
0
0
2
,
3
2
5
5
4
,
4
4
0
0
0
,
0
0
3
,
6
3
0
0
0
,
2
1
1
0
9
6
,
7
1
1
0
0
0
,
5
8
5
6
6
5
,
2
3
0
0
0
,
0
0
6
,
9
5
0
0
0
,
2
6
0
0
1
,
5
1
3
1
8
,
5
1
1
0
0
0
,
0
0
0
,
3
0
4
0
0
0
,
2
3
4
5
1
6
,
2
7
0
0
0
,
0
0
0
,
5
2
1
0
9
9
,
8
1
1
0
0
0
,
0
0
3
,
7
2
3
8
0
,
5
8
0
0
0
,
0
0
6
,
0
1
7
9
2
,
6
0
2
0
0
0
,
1
3
6
0
0
0
,
4
8
0
0
9
,
5
9
0
0
4
,
0
2
0
0
5
,
1
2
4
4
1
,
6
6
1
0
0
0
,
0
0
5
,
0
3
0
0
0
,
0
2
2
,
1
0
5
9
,
9
0
1
0
0
0
,
0
4
5
7
3
5
,
3
3
0
0
0
,
0
6
5
,
6
4
9
5
,
1
1
0
0
0
,
0
0
6
,
8
7
3
3
2
,
7
1
6
1
8
,
3
1
3
8
7
,
6
1
2
5
8
,
8
2
1
0
0
0
,
0
7
9
,
8
0
0
0
,
0
7
3
,
4
0
0
0
,
9
5
4
0
0
0
,
5
5
3
0
0
0
,
3
1
0
6
9
,
8
0
0
5
,
1
4
0
8
4
,
1
0
7
1
,
7
0
0
7
,
6
0
2
2
,
3
4
6
6
,
3
3
3
9
,
1
6
6
6
,
3
3
9
1
,
4
5
2
0
,
7
0
2
9
,
3
7
3
0
,
2
3
0
3
,
2
1
7
0
,
3
0
3
5
,
1
3
1
2
,
4
7
3
6
,
5
9
9
3
,
1
0
4
0
,
1
0
2
0
0
.
0
1
8
0
0
.
0
6
1
0
2
/
5
1
/
2
9
5
9
1
/
4
/
1
y
t
i
n
a
V
9
2
6
,
1
3
1
0
0
.
0
1
4
0
0
.
0
6
1
0
2
/
1
1
/
3
4
4
9
1
/
2
/
1
1
n
o
s
r
e
m
E
h
t
i
e
K
5
2
5
6
3
7
2
1
0
0
.
0
8
3
0
0
.
0
6
1
0
2
/
2
2
/
3
0
7
9
1
/
0
2
/
1
1
g
w
a
D
e
f
i
h
P
0
1
0
0
.
0
9
2
0
0
.
0
6
1
0
2
/
2
/
5
7
4
9
1
/
0
1
/
1
r
u
k
a
h
S
i
n
e
f
A
3
0
.
0
3
0
.
0
3
0
.
0
p
δ
2
1
0
.
0
1
1
0
.
0
0
1
0
.
0
7
0
0
.
0
7
0
0
.
0
7
0
0
.
0
6
0
0
.
0
6
0
0
.
0
4
0
0
.
0
4
0
0
.
0
3
0
0
.
0
3
0
0
.
0
3
0
0
.
0
8
1
.
0
6
1
0
2
/
3
/
6
2
4
9
1
/
7
1
/
1
i
l
A
d
a
m
m
a
h
u
M
7
1
.
0
6
1
0
2
/
5
2
/
1
1
6
2
9
1
/
3
1
/
8
o
r
t
s
a
C
l
e
d
i
F
7
1
.
0
6
1
0
2
/
1
2
/
4
8
5
9
1
/
7
/
6
e
c
n
i
r
P
9
7
0
.
0
2
6
0
.
0
7
5
0
.
0
2
4
0
.
0
6
1
0
2
/
6
/
3
1
2
9
1
/
6
/
7
n
a
g
a
e
R
y
c
n
a
N
6
1
0
2
/
5
2
/
9
9
2
9
1
/
0
1
/
9
r
e
m
l
a
P
d
l
o
n
r
A
6
1
0
2
/
5
1
/
1
6
4
9
1
/
1
2
/
2
n
a
m
k
c
i
R
n
a
l
A
6
1
0
2
/
9
1
/
2
6
2
9
1
/
8
2
/
4
e
e
L
r
e
p
r
a
H
0
4
0
.
0
6
1
0
2
/
5
2
/
2
1
3
6
9
1
/
5
2
/
6
l
e
a
h
c
i
M
e
g
r
o
e
G
7
3
0
.
0
6
1
0
2
/
8
/
2
1
1
2
9
1
/
8
1
/
7
n
n
e
l
G
n
h
o
J
6
3
0
.
0
6
1
0
2
/
8
2
/
2
1
2
3
9
1
/
1
/
4
s
d
l
o
n
y
e
R
e
i
b
b
e
D
2
3
0
.
0
8
1
0
.
0
8
1
0
.
0
6
1
0
.
0
5
1
0
.
0
2
1
0
.
0
6
1
0
2
/
9
2
/
8
3
3
9
1
/
1
1
/
6
r
e
d
l
i
W
e
n
e
G
6
1
0
2
/
0
1
/
6
4
9
9
1
/
2
1
/
3
e
i
m
m
i
r
G
a
n
i
t
s
i
r
h
C
7
1
0
2
/
5
2
/
2
5
5
9
1
/
7
1
/
5
6
1
0
2
/
6
/
6
4
7
9
1
/
8
/
2
6
1
0
2
/
2
/
7
8
2
9
1
/
0
3
/
9
n
o
t
x
a
P
l
l
i
B
e
c
i
l
S
o
b
m
K
i
l
e
s
e
i
W
e
i
l
E
6
1
0
2
/
8
2
/
8
0
5
9
1
/
7
/
1
l
e
i
r
b
a
G
n
a
u
J
p
D
O
D
B
O
D
s
e
m
a
N
D
I
s
l
a
u
d
i
v
i
d
n
i
d
e
n
w
o
n
e
r
y
t
n
e
w
t
r
o
f
s
c
i
r
t
e
m
e
m
a
F
.
1
e
l
b
a
T
1
0
2
0
3
0
4
0
5
0
6
0
7
0
8
0
9
0
0
1
1
1
2
1
3
1
4
1
5
1
6
1
7
1
8
1
9
1
0
2
4/17
Preprint - Ramirez and Hagen
(and median) of 34 preferences and 16 "no preference" responses. 86% of subjects
indicated a preference in at least half of the fifty pairs they were offered. Consequently,
of the 2500 name pairs (50 subjects × 50 name pairs) offered to all subjects, 1679
elicited preferences and 821 elicited a "no preference" response from the subject. The
preference data are provided in S1 Spreadsheet.
The "no preference" response could indicate that the subject was equally familiar
with both names (two very famous names), or that the subject was equally unfamiliar
with both names (two less famous names). Regardless of its cause, a "no preference"
response does not facilitate the ranking of those two particular names by renown. As
the purpose of the survey was to differentiate the individuals by renown, the "no
preference" responses were omitted from the subsequent data analysis. The effect of
survey sample size, including these omitted "no preference" responses, on the robustness
of the obtained ranking was tested through (1) a bootstrap error analysis, discussed
below, and (2) a log likelihood test, discussed in Survey Results.
We used a Bradley-Terry model [22] to convert the preference data to a quantitative
measure of fame, assigning a rating pi to each individual i (i = 1 . . . 20) in Table 1. In
the Bradley-Terry model, the strength scores or ratings pi and pj determine the
probability that individual i defeats individual j in a single pairwise comparison:
with
P r(i defeats j) =
pi
pi + pj
20(cid:88)
i=1
pi = 1.
(1)
(2)
A maximum likelihood estimate for the twenty pi was extracted from the survey data by
an iterative procedure [23] that rapidly converges to produce the optimal pi; that is, it
find the pi for which the dataset is most probable. In addition, to test how robustly our
particular dataset determined those pi, we performed ∼ 2000 bootstrap random
samplings of the maximum likelihood estimation. The bootstrap method yields an
estimate for confidence levels in model parameters, reflective of the size and the internal
self-consistency of the dataset. The uncertainties δp in the reported pi are the 1 σ
deviations obtained from the bootstrap test.
Internet-based metrics of fame
We then sought to test how other plausible metrics for fame correlate with the rankings
obtained from the survey. Some possible metrics for fame are problematic as they are
not universally applicable or cannot readily be measured or estimated for non-celebrities
or for living individuals, or they are weighted toward people in certain professions, or
they are controlled by gatekeepers. These include an individual's wealth, the length of
his/her obituary or Who's Who entry, numbers of Twitter followers, etc. Instead we
sought to evaluate metrics that were (1) available for a wide range of individuals of
diverse profession and varying fame, (2) reflective of the opinion of a large population or
audience, rather than the judgment of curators or gatekeepers, (3) regularly updated,
and (4) readily accessible through the internet. Based on these criteria, we selected the
following plausible, internet-derived metrics of fame (S2 Spreadsheet) and evaluated
them for the individuals on the NYT, NBC and Wiki lists:
• GH - the total current Google hits returned for the individual;
• GN - the total current Google news items citing that individual;
5/17
Preprint - Ramirez and Hagen
• WE - the total edits to date of the individual's Wikipedia page;
• WV - the total Wikipedia page views to date.
Most of the internet metrics for the names on the NYT, NBC and Wiki lists were
assessed on March 8, 2017. The data for the NYT 2 list was assessed on July 12, 2017,
and the Wikipedia page views (WV ) were recorded on June 29, 2017.
Total current Google hits (GH ) was obtained by searching an individual's name in
Google and counting the number of links returned. Total current Google news items
(GN ) was obtained by searching an individual by name and profession in Google News
and counting the number of links returned. For GN searches where the individual could
be identified with more than one profession, the search that returned the most links was
used. Total current Wikipedia page edits (WE ) were obtained from an individual's
Wikipedia page through the "History" feature.
To evaluate the temporal stability of these metrics we also retrieved time series data:
W Et is the month-to-month time series of Wikipedia page edits, obtained from the
Revision History Statistics of the Wikipedia page; GSt is the history of monthly Google
searches, obtained from Google Trends; W Vt is the daily history of Wikipedia page
views, using Wikipedia PageViews Analysis.
Power law analysis
We used a maximum likelihood method to assess whether metric WE exhibits a power
law distribution in the three lists studied [24]. If x is a discrete random variable whose
probability distribution p(x) for x ≥ xmin is a power law (Eq. 4) then the value of α for
a dataset xi (i = 1 . . . n) is estimated by maximizing the logarithmic likelihood of the
data
(cid:88)
xi≥xmin
L = n log(C) − α
log(xi)
(3)
As the data xi will not obey the power law below xmin, an estimate for xmin is also
needed. For each name list we generated these estimates by minimizing the
Kolmogorov-Smirnov distance between the cumulative distribution function (CDF) of
the WE data and that of a perfect power law [24].
Data sharing
Datasets are provided as supplemental information in S1 Spreadsheet and S2
Spreadsheet.
Use of human subjects
Undergraduate students completed the fame pi survey under protocol IRB201700835,
which was approved as exempt by the University of Florida Institutional Review Board
(Behavior/Nonmedical, IRB-02). Volunteer subjects were recruited in mid-June 2017,
from public areas of the University of Florida campus. Each subject read an informed
consent document and provided oral consent for participation. The written consent
requirement was waived owing to the minimal risk and the fact that no sensitive or
identifying information was collected from the subjects.
6/17
Preprint - Ramirez and Hagen
Results and Discussion
Survey results
We used a Bradley-Terry model [22] to extract from the survey data a quantitative score
of renown or fame for each of the individuals in Table 1. These scores are the p values
that are shown in Table 1 and Fig. 1. The p of each individual is a measure of his/her
degree of renown, as derived from the set of pairwise comparisons or preferences
reported by all the survey subjects. The maximum likelihood method described in
Methods identifies the unique, self-consistent set of p values for which the entire survey
dataset of 1679 subject preferences is most probable, based on Eq. 1. The obtained p
range over almost two orders of magnitude, from a maximum of 0.18 ± 0.03 to a
minimum of 0.0029 ± 0.0009, indicating that the fame of the different individuals spans
almost two decades, at least from the perspective of the subject population.
To assess whether (a) the number of survey subjects and (b) the number of
preferences reported by those subjects were both sufficiently large, we examined the
robustness of the p values in Table 1 using two different statistical tests. First, as
described in Methods, we applied a bootstrap random sampling to evaluate the
confidence intervals in the p values, given our dataset. The bootstrap method is a
model-free approach that takes account of the size of the dataset as well as any lack of
knowledge of the true or theoretical distribution of the model parameters. As shown in
Fig 1, the uncertainties δp determined from the bootstrap correspond to relative
uncertainties δp/p of 10-30%. As the less famous names in Table 1 more frequently
drew a "no preference" response from survey subjects, such names occur less often in
the dataset; accordingly the bootstrap analysis finds a larger relative uncertainty δp/p
for these names. The relative uncertainty increases about two-fold from the best known
(δp/p (cid:39) 16% for p (cid:39) 0.2) to the least known (δp/p (cid:39) 30% for p (cid:39) 3 × 10−3) individuals.
Nevertheless these relative uncertainties are still substantially smaller than most of the
name-to-name differences in p values. This analysis shows that the survey dataset
contains sufficient, self-consistent preference data to establish a robust ranking.
As a second statistical test of our survey sample and the model obtained from it, we
also compared the relative likelihood of our findings (Fig 1) to that of a null model for
the same dataset. If for example the survey subjects are too few or are incompetent to
rank the names usefully, then the relevant null model is one where the survey dataset
contains too little information to support a significant ranking. In this null model all
the names in Table 1 have equal p values, and either subject preference is equally likely
for any name pair [22]. Comparing the likelihood Lmodel of our dataset under our model
to its likelihood Lnull under the null model we find a very high log likelihood ratio
log(Lmodel/Lnull) = 372. That is, our p values provide a 10161-fold better explanation of
our dataset than does the null model. This is illustrated by Fig. 1, where roughly 78% of
the 1679 preferences obtained from the survey have likelihood greater than 0.5, meaning
that they are more likely than not, given our p values and Eq. 1. The high likelihood of
the dataset, given the p values, demonstrates that the survey generated statistically
significant, self-consistent information about the relative fame of the 20 individuals.
Table 1 shows the fame measures p and δp, WE, GN, and GH for the twenty
individuals who died in 2016, identified by name and dates of birth (DOB) and death
(DOD). It also shows dW E/dt, the average WE added per month from the creation of
the page through June 2017, and dW V /dt, the average WV per day from July 1 2015
to June 29 2017.
7/17
Preprint - Ramirez and Hagen
Fig 1. Human subject ratings of fame. (A) Ratings p of the fame of the
individuals in Table 1. Ratings were obtained by applying a Bradley-Terry ranking
model (Eq. 1) to data from a survey in which subjects made pairwise comparisons of
individuals listed in the table (Methods). White squares show uncertainty estimates δp
(±1 σ) estimated from bootstrap analysis of survey data. (B) Histogram of likelihoods
of the 1679 pairwise comparisons made by survey subjects, based on the p values of (A)
and Eq. 1. Given the p, 78% of the comparisons have likelihood > 0.5. (C) Scatterplot
showing relative uncertainties δp/p versus p for the individuals in (A).
Testing correlation of fame metrics with p
Therefore, using the individuals in Table 1 as a test population, we evaluated several
plausible internet-derived metrics of fame by testing their correlation with the p values.
Like the p values, the metrics GN, GH, WE and WV all range over several orders of
magnitude. Fig. 2 compares them against pi in order of decreasing Pearson correlation
coefficient R of a double logarithmic plot. WE and GN both show strong correlations,
R = 0.83 and 0.70 respectively, with p. WE also has a nearly linear relationship with p,
consistent with p ∝ WE1.2±0.2.
Our data indicate that Google hits GH and Wikipedia page views WV are less
reliable metrics of fame. WV has a moderate correlation with p, giving R = 0.52. GH
has a weak correlation with p (R (cid:39) 0.6), leading to a log-log slope 0.33 ± 0.33 that is
8/17
Preprint - Ramirez and Hagen
consistent with zero. Although GH has been regarded as an obvious metric of fame, the
expansion of the internet may have made it less useful for distinguishing non-celebrities:
A very high GH (∼ 106 − 107) does correlate with celebrity status, but many common
names have GH ∼ 105 − 106 or higher, and therefore do not distinguish greater and
lesser fame. Other flaws in GH have also been noted [25].
Overall we find that WE and to a lesser extent GN correlate sufficiently well with p
values and with each other that they may serve as useful quantitative measures of fame.
However, we regard GN and WE only as metrics of the current fame of individuals,
measured at a particular instant. Although it is likely that some individuals were more
famous in the past than at their death, we do not attempt to construct a model to
estimate their fame at its peak or to correct for any decline. In addition these
internet-based metrics are probably not useful for comparing the fame of individuals
who died at different times in the past. Clearly an individual who died prior to the
Wikipedia launch in 2001 is less likely to acquire WE than is a living person of otherwise
comparable renown. Therefore in what follows we make no attempt to compare the
fame of the recently deceased to that of individuals who died in earlier years.
Fig 2. Correlations between quantitative measures of fame. Correlations
between different quantitative measures of fame for the 20 individuals in Table 1. The
survey metric p is compared with internet metrics WE (A), GN (B), GH (C), and WV
(E). GN and WE are compared in (D). In each double logarithmic plot the slope of the
best (least squares) fit line is indicated. Panels are presented in order of decreasing
Pearson correlation R on the double log plot. Error bars for p are obtained from
bootstrap analysis.
Time dependence
As an alternative to cumulative quantities such as total Wikipedia page edits we also
evaluated some continuously varying indicators of fame, such as the monthly Wikipedia
page edits W Et. Fig. 3 shows several years of data for W Et, W Vt and GSt (denoting
time series for WE, WV and Google searches/Google Trends, respectively) for four
individuals in Table 1. Although W Et is noisy its behavior is generally stable and
similar for all four individuals, with a dynamic range of about 10-100. By contrast W Vt
is subject to abrupt spikes associated with news events. For some individuals, especially
9/17
Preprint - Ramirez and Hagen
ID 15 and ID 02 in Table 1, GSt and W Vt show strong weekly or annual periodicity,
presumably due to regular cycles of student academic assignments. The instability of
GSt and W Vt argues against the use of short-term snapshots of GS or WV as
quantitative metrics of fame.
Fig 3. Temporal fluctuation and cumulative values of internet metrics of
fame. For four individuals in Table 1, the figures at left show (A) the variation in daily
Wikipedia page views (W Vt) over a two year interval, (B) monthly Wikipedia page edits
(W Et) over 13 years, (C) monthly Google searches, (GSt), over 13 years. GSt data for
each individual are normalized to a maximum value of 100. For all 20 individuals in
Table 1, the figures at right show (D) cumulative WV and (E) cumulative WE. The
legends identify the individuals by their ID in Table 1.
Fig. 3 also shows the accumulation of total WE and WV over a 1.5 y interval, for
the individuals in Table 1. While an individual's WV may jump discontinuously when
the individual's death is reported, WE generally changes more slowly and its relative
ordering is largely stable over time. These data suggest that while both WV and WE
inevitably increase over time, a rank ordering of individuals by WE changes slowly, as
required for a useful quantitative measure of fame.
As WE and GN both correlate reasonably well with p, we expect them to correlate
with each other. The scatterplot of Fig. 4 shows that GN and WE correlate similarly in
all three datasets (279 individuals). The data fall roughly along a curve that is more
nearly quadratic (GN ∝ W E2) than linear, so that while GN spans more than six
decades, WE spans about 3-4 decades. One possible interpretation of the nonlinear
relationship is that WE, which is subject to the practical aspects of web editing, is
unlikely to be smaller than about 10, and therefore has a floor value even though GN
does not. Another possibility is that GN is more sensitive to celebrity (as defined
herein) whereas WE is a better measure of fame, so that GN emphasizes more famous
individuals at the expense of the less famous.
Fig. 4C illustrates the relation between GN and W E for individuals of different
professions. This and other analysis we conducted show no evidence that the correlation
between WE and GN depends significantly on profession.
The probability distribution for fame
The survey-generated pi provide an intuitive and quantitative metric of fame. However
the printed survey is impractical for evaluating the fame of larger numbers of
individuals. Therefore we use WE, which appears to be a satisfactory alternative metric
10/17
Preprint - Ramirez and Hagen
Fig 4. The correlation between GN and WE. The correlation between GN and
WE, as measures of fame for the individuals in the three datasets (NBC, Wiki and NYT
1), is shown in three double-logarithmic plots. (A) The logarithms of GN and WE are
reasonably well correlated, with a Pearson R = 0.71. (B) WE and GN show similar
correlation in the three datasets, which sample different ranges of GN ; (C) WE and GN
are shown with a color code that indicates the profession of the individuals.
of fame, to investigate the statistical distribution of fame. Fig. 5A shows histograms of
WE for individuals in the NYT, NBC and Wiki datasets. In each case the WE
distribution is broad, spanning at least two decades, with a tail extending to very large
WE. The tails raise the question of whether fame, like many other quantities in the
social and natural sciences, obeys a power law distribution. Phenomena such as forest
11/17
Preprint - Ramirez and Hagen
fires, earthquakes, and the sizes of cities, which lack an intrinsic size scale [26], often
obey a power law: The probability that an event has magnitude x is given by
p(x) =
C
xα
∞(cid:88)
p(x) = 1
(4)
(5)
x=xmin
for x > xmin. Here xmin is a cutoff, C is a normalization constant, and we have taken x
as a discrete variable (like WE ).
We tested our data for power law behavior by finding the power law model that best
fit the cumulative distribution function (CDF) of each dataset. (The CDF is the
function F (x) that gives the probability that any one measurement X exceeds x.) For
each dataset we assumed that the WE data obey Eq 4 above a cutoff value of WE
(Methods). As shown in Table 2, all three datasets give comparable values, α (cid:39) 1.9− 2.6,
although with very different cutoff (xmin) values, indicative of the different selectivity
of the three data sources. Fig. 5 illustrates the agreement by showing the cumulative
distribution function (CDF) for WE and that of the corresponding,
maximum-likelihood power law. Many apparent power laws are only approximate and
do not withstand close statistical scrutiny [24]. Although the size of NYT and NBC
datasets is insufficient to establish whether the power law is superior to other models for
the distribution, these particular datasets do appear to show good agreement with the
power law model. We note that our α values are consistent with the α = 1.9 − 2.1 that
was estimated by a different method in a study of the fame of WWI flying aces [6].
Table 2. Results of fitting Eq. 4 and Eq. 6 to WE data
Wiki
NBC
NYT
xmin
α
ν
a
b
700-900
2.1 ± 0.1
1.5 ± 0.1
20-70
1.9 ± 0.1
1.7 ± .2
(cid:39) 0.00013 y (cid:39) 0.0079 y (cid:39) 0.0011 y
(cid:39) 4 × 106
(cid:39) 8 × 106
220-240
2.6 ± 0.2
1.7 ± 0.1
(cid:39) 3 × 106
While the CDF gives the probability that any particular event exceeds a certain
magnitude, it is often more useful to know the absolute frequency of events of a certain
magnitude. For example in the case of earthquakes it is helpful to know how many
events exceeding a given threshold occur each year. A cumulative frequency plot shows
the frequency f (x) of events that have magnitude greater than or equal to x. For many
natural power law phenomena the cumulative frequency plot obeys the empirical
Gutenberg Richter law [26]
f (x) =
1
a + xν/b
(6)
Here a and b set the overall scale of the frequency and define a threshold sensitivity in
the dataset (similar to xmin above), while ν reflects the power law distribution of the
underlying events. Fig. 6 shows the cumulative frequency plots for all three datasets,
using WE as a fame measure and scaling the event numbers in the data up to
equivalent annual rates. The parameters a and b, shown in Table 2, are highly variable
12/17
Preprint - Ramirez and Hagen
Fig 5. Probability distributions for fame. Probability distributions for fame, as
measured by WE, for individuals in the NBC, Wiki, and NYT (1 & 2) datasets. (A)
Histogram showing, for each dataset, the distribution of reported deaths with respect to
WE. (B) Cumulative distribution functions (CDF) with respect to WE are shown as the
solid curves. CDF are evaluated using cutoff WE values of 35 (Wiki), 220 (NYT) and
800 (NBC). For each dataset, the optimal value of the power law exponent and cutoff
(α and xmin respectively in Eq. 4 ) were evaluated as described in Methods [24], with
results shown in Table 2. The dashed lines show the CDF for true power law
distributions that have the same α and xmin as the data.
as the different media sources apply different selectivity criteria in reporting obituaries.
However as WE increases, all three datasets tend toward Gutenberg-Richter behavior
with ν (cid:39) 1.5 − 1.7 (by least squares fit).
It is interesting that all three curves indicate that ∼ 30 − 100 individuals with fame
W E ≥ 103 die each year. Such information can yield quantitative insight into questions
that arise perennially about the frequency of famous deaths [16] [17] [18]. For example,
the so-called celebrity rule of three is a folk belief that deaths of celebrities occur in
clusters, especially groups of three, spread over a few days [17]. A frequently mentioned
example is the three days in June 23-25, 2009 during which the television personality
13/17
Preprint - Ramirez and Hagen
Fig 6. Cumulative frequency of deaths versus fame. (A) Cumulative frequency
(Gutenberg-Richter) plot of reported deaths versus fame. For each degree of fame (as
measured by WE ), the plot shows the annualized rate at which deaths of equal or
greater fame occur. Green, red, and blue symbols indicate the NBC, NYT (1 & 2) and
Wiki datasets respectively. Dashed curves show least squares fit to Gutenberg-Richter
expression, Eq. 6, giving ν = 1.5 − 1.7 (Table 2). (B) Date overlap (birthday-problem)
probability versus death rate. Each curve gives the probability P that, if the indicated
number of deaths occur at random during one year, there will be at least one instance
where two (P2) or three (P3) of those deaths are separated by only ∆n days.
Ed McMahon, the musician Michael Jackson and the actress Farrah Fawcett all died.
Another striking example is the deaths of C.S. Lewis, Aldous Huxley, and John F.
Kennedy, on November 22, 1963.
The probability of such coincidences can be estimated from the data in Fig. 6 by
defining a threshold for fame, referring to the Gutenberg-Richter plot, and then
applying the familiar birthday problem in statistics: If the deaths of N individuals are
randomly distributed throughout the year, then if N ≥ 23 the probability exceeds 50%
that at least two deaths will occur on the same day. If the threshold for fame is
W E ≥ 1000, the expected 30-100 deaths per year ensures that two famous deaths will
occasionally coincide.
The common statement of the celebrity rule of three does not require the deaths to
occur on precisely the same day. If they may be separated by ∆n days, then as shown
in Fig. 6 a 50% probability of two occurring in coincidence requires only N ≥ 14 (for
∆n = 1) or N ≥ 11 (∆n = 2) deaths per year. Among individuals of rather high fame,
WE ≥ 2000 − 3000, at least one such coincidence appears likely each year. A
three-person coincidence has 50% probability when N ≥ 88 (∆n = 0) or N ≥ 35
(∆n = 2): If ∆n ≤ 2 is considered a coincidence, then at least one cluster of three
deaths with W E >∼ 1000 seems likely to occur in most years. Therefore, although
Fig. 6 summarizes only one year of deaths, the data are sufficient to demonstrate that
the apparent clustering of famous deaths is not an entirely false perception; rather the
clustering is a statistical consequence of the rather large number of famous deaths that
occur each year.
Conclusion
The application of statistical ideas has led productively to greater understanding of
many aspects of human social dynamics, such as the evolution of opinion, cultural and
linguistic behaviors [27]. Our results demonstrate that quantitative measures can
plausibly be applied to fame, providing insight into this important cultural phenomenon
and allowing detailed statistical investigation. We note however that, as fame has
14/17
Preprint - Ramirez and Hagen
economic value, it would be preferable to measure fame using tools that (unlike WE )
are difficult to manipulate. For example, instead of using paper surveys to score fame,
one could implement a larger scale, social-media based, electronic version of the pairwise
comparison method. This would greatly expand the survey base, allowing more accurate
evaluation of the fame of greater numbers of individuals, and especially less renowned
individuals. Future investigators may wish to explore such approaches.
Supporting information
S1 Spreadsheet. Survey Responses The spreadsheet contains all individual
responses to the fame survey. The first page contains the list of twenty deceased
individuals of high renown, each identified by a number ID. Each of the 50 survey
subjects was presented with 50 pairs of names from this list and asked to select the
more familiar name in each pair.
The second page contains the response data. The first column gives the subject
number. The second and third columns indicate the ID of the winner (more familiar)
and loser (less familiar) in each pairwise comparison of names.
Because "No preference" responses have been removed, fewer than fifty responses are
recorded for some subjects.
S2 Spreadsheet. Fame metrics for individuals in the datasets The
spreadsheet contains fame metrics for (1) the 20 individuals in Table 1; (2) the 126
individuals in the NBC dataset; (3) the 78 individuals in the Wiki dataset; (4) the 75
individuals in the NYT 1 dataset; (5) the 72 individuals in the NYT 2 dataset. It also
contains (6) the occupation codes used in the data tables (2)-(4) above.
References
1. Drake P, Miah A. The Cultural Politics of Celebrity. Cultural Politics.
2010;6(1):49–64. doi:10.2752/175174310X12549254318746.
2. Michel JB, Shen YK, Aiden AP, Veres A, Gray MK, , et al. Quantitative Analysis
of Culture Using Millions of Digitized Books. Science. 2011;331(6014):176.
3. Jacoby J. Considering the Who, What, When, Where and How of Measuring
Dilution. Santa Clara High Tech LJ. 2012;24:601–639.
4. Maltby J. An interest in fame: Confirming the measurement and empirical
conceptualization of fame interest. British Journal of Psychology.
2010;101(3):411–432. doi:10.1348/000712609X466568.
5. Banaji MR, Greenwald AG. Implicit gender stereotyping in judgments of fame.
Journal of personality and social psychology. 1995;68(2):181–198.
doi:10.1037/0022-3514.68.2.181.
6. Simkin MV, Roychowdhury VP. A Mathematical Theory of Fame. Journal of
Statistical Physics. 2013;151(1):319–328. doi:10.1007/s10955-012-0677-5.
7. Hall N. The Kardashian index: a measure of discrepant social media profile for
scientists. Genome biology. 2014;15(7):424. doi:10.1186/s13059-014-0424-0.
8. Yucesoy B, Barabasi AL. Untangling performance from success. EPJ Data
Science. 2016;5(1):17. doi:10.1140/epjds/s13688-016-0079-z.
15/17
Preprint - Ramirez and Hagen
9. Simkin MV, Roychowdhury VP. Chess players' fame versus their merit. Applied
Economics Letters. 2015;22(18):1499–1504. doi:10.1080/13504851.2015.1042135.
10. Bagrow JP, Rozenfeld HD, Bollt EM, ben Avraham D. How famous is a scientist?
Famous to those who know us. EPL (Europhysics Letters). 2004;67(4):511.
11. Yu AZ, Ronen S, Hu K, Lu T, Hidalgo C. Pantheon 1.0, a manually verified
dataset of globally famous biographies. Scientific Data. 2016;3:150075.
doi:doi:10.1038/sdata.2015.75.
12. Schulman E. Can Fame Be Measured Quantitatively? Annals of Improbable
Research. 1999;5:16.
13. Mestyan M, Yasseri T, Kertesz J. Early Prediction of Movie Box Office Success
Based on Wikipedia Activity Big Data. PLOS ONE. 2013;8(8):e71226.
14. Jacoby LL, Kelley C, Brown J, Jasechko J. Becoming Famous Overnight: Limits
on the Ability to Avoid Unconscious Influences of the Past. Journal of personality
and social psychology. 1989;56:326–338. doi:10.1037/0022-3514.56.3.326.
15. The Art of the Obituary. NPR. 2006; p. 1.
doi:http://www.npr.org/templates/story/story.php?storyId=5353784;.
16. Crowther L. 2016's Celebrity Death Boom: The Surprising Final Analysis.
Legacy. 2017; p. 1. doi:http://www.legacy.com/news/celebrity-deaths/year-in-
review/article/2016s-celebrity-death-boom-the-surprising-final;.
17. Flippen A. No, Celebrity Deaths Do Not Come in Threes. The New York Times.
2014; p. 1. doi:https://www.nytimes.com/2014/08/15/upshot/no-celebrity-deaths-
do-not-come-in-threes.html?mcubz=0;.
18. Wolkewitz M, Allignol A, Graves N, Barnett AG. Is 27 really a dangerous age for
famous musicians? Retrospective cohort study. BMJ. 2011;343.
19. Celebrity Deaths in 2016: Some of the Many Famous Figures We Lost This Year.
NBC News and The Associated Press. 2017; p. 1.
doi:https://www.nbcnews.com/storyline/2016-year-in-review/look-back-all-
famous-figures-who-died-2016-n698791;.
20. Deaths in January 2017. Wikipedia. 2017;doi:www.Wikipedia.org.
21. Obituaries Online. The New York Times.
2017;doi:https://www.nytimes.com/section/obituaries.
22. Bradley RA, Terry ME. Rank Analysis of Incomplete Block Designs: I. The
Method of Paired Comparisons. Biometrika. 1952;39(3):324–345.
doi:10.2307/2334029.
23. Hunter DR. MM algorithms for generalized Bradley-Terry models. AnnStatist.
2004;32(1):384–406. doi:10.1214/aos/1079120141.
24. Clauset A, Shalizi C, Newman M. Power-Law Distributions in Empirical Data.
SIAM Review. 2009;51(4):661–703. doi:10.1137/070710111.
25. Matsuo Y, Tomobe H, Nishimura T. Robust Estimation of Google Counts for
Social Network Extraction. In: Proceedings of the 22Nd National Conference on
Artificial Intelligence - Volume 2. AAAI'07. AAAI Press; 2007. p. 1395–1401.
Available from: http://dl.acm.org/citation.cfm?id=1619797.1619869.
16/17
Preprint - Ramirez and Hagen
26. Turcotte DL. Self-organized criticality. Reports on Progress in Physics.
1999;62(10):1377.
27. Castellano C, Fortunato S, Loreto V. Statistical physics of social dynamics.
Reviews of Modern Physics. 2009;81(2):591–646.
17/17
|
Subsets and Splits