The Network You Keep: Analyzing Persons of Interest using Cliqster

被引:0
|
作者
Fadaee, Saber Shokat [1 ]
Farajtabar, Mehrdad [2 ]
Sundaram, Ravi [1 ]
Aslam, Javed A. [1 ]
Passas, Nikos [3 ]
机构
[1] Northeastern Univ, Coll Comp & Informat Sci, Boston, MA 02115 USA
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
[3] Northeastern Univ, Sch Criminol & Criminal Justice, Boston, MA USA
关键词
Social network analysis; Persons of interest; Community structure;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of determining the structural differences between different types of social networks and using these differences for applications concerning prediction of their structures. Much research on this problem has been conducted in the context of social media such as Facebook and Twitter, within which one would like to characterize and classify different types of individuals such as leaders, followers, and influencers. However, we consider the problem in the context of information gathered from law-enforcement agencies, financial institutions, and similar organizations, within which one would like to characterize and classify different types of persons of interest. The members of these networks tend to form special communities and thus new techniques are required. We propose a new generative model called Cliqster, for unweighted networks, and we describe an interpretable, and efficient algorithm for representing networks within this model. Our representation preserves the important underlying characteristics of the network and is both concise and discriminative. We demonstrate the discriminative power of our method by comparing to a traditional SVD method as well as a state-of-the-art Graphlet algorithm. Our results are general in that they can be applied to "person of interest" networks as well as traditional social media networks.
引用
下载
收藏
页码:122 / 129
页数:8
相关论文
共 50 条
  • [31] CORIA - Analyzing Internet Connectivity Risks Using Network Graphs
    Fabian, Benjamin
    Baumann, Annika
    Ehlert, Mathias
    Ververis, Vasilis
    Ermakova, Tatiana
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [32] Analyzing of the von Karman Equations by Using Neural Network Approach
    Dadi, Zohreh
    2015 4TH IRANIAN JOINT CONGRESS ON FUZZY AND INTELLIGENT SYSTEMS (CFIS), 2015,
  • [33] Analyzing Multimode Wireless Sensor Networks Using the Network Calculus
    Jin, Xi
    Guan, Nan
    Wang, Jintao
    Zeng, Peng
    JOURNAL OF SENSORS, 2015, 2015
  • [34] Analyzing Welding Performance of Metal Using Artificial Neural Network
    Wu, Xiaojun
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [35] Analyzing the Security in the GSM Radio Network Using Attack Jungles
    Abdulla, Parosh Aziz
    Cederberg, Jonathan
    Kaati, Lisa
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION, AND VALIDATION, PT I, 2010, 6415 : 60 - +
  • [36] Analyzing the structure of a neural network using Principal Component Analysis
    Opitz, DW
    1997 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, 1997, : 254 - 259
  • [37] Analyzing Public Discussions About #SaudiWomenCanDrive Using Network Science
    Jastania, Zubaida
    Abbasi, Rabeeh Ayaz
    Aslam, Muhammad Ahtisham
    Khanzada, Tariq Jamil Saifullah
    Ghori, Khawaja Moyeezullah
    IEEE ACCESS, 2022, 10 : 4739 - 4749
  • [38] Interest point detection in images using complex network analysis
    Criado, Regino
    Romance, Miguel
    Sanchez, Angel
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2012, 236 (12) : 2975 - 2980
  • [39] Analyzing and predicting software integration bugs using network analysis on requirements dependency network
    Wang, Junjie
    Wang, Qing
    REQUIREMENTS ENGINEERING, 2016, 21 (02) : 161 - 184
  • [40] Analyzing and predicting software integration bugs using network analysis on requirements dependency network
    Junjie Wang
    Qing Wang
    Requirements Engineering, 2016, 21 : 161 - 184