On the network you keep: analyzing persons of interest using Cliqster

被引:0
|
作者
Fadaee, Saber Shokat [1 ]
Farajtabar, Mehrdad [2 ]
Sundaram, Ravi [1 ]
Aslam, Javed A. [1 ]
Passas, Nikos [3 ]
机构
[1] Northeastern Univ, Coll Comp & Informat Sci, Boston, MA 02115 USA
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
[3] Northeastern Univ, Sch Criminol & Criminal Justice, Boston, MA 02115 USA
关键词
Social network analysis; Persons of interest; Community structure;
D O I
10.1007/s13278-015-0302-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our goal is to determine the structural differences between different categories of networks and to use these differences to predict the network category. Existing work on this topic has looked at social networks such as Facebook, Twitter, co-author networks, etc. We, instead, focus on a novel dataset that we have assembled from a variety of sources, including law enforcement agencies, financial institutions, commercial database providers and other similar organizations. The dataset comprises networks of persons of interest with each network belonging to different categories such as suspected terrorists, convicted individuals, etc. We demonstrate that such "antisocial'' networks are qualitatively different from the usual social networks and that new techniques are required to identify and learn features of such networks for the purposes of prediction and classification. We propose Cliqster, a new generative Bernoulli process-based model for unweighted networks. The generating probabilities are the result of a decomposition which reflects a network's community structure. Using a maximum likelihood solution for the network inference leads to a least squares problem. By solving this problem, we are able to present an efficient algorithm for transforming the network to a new space which is both concise and discriminative. This new space preserves the identity of the network as much as possible. Our algorithm is interpretable and intuitive. Finally, by comparing our research against the baseline method (SVD) and against a state-of-the-art Graphlet algorithm, we show the strength of our algorithm in discriminating between different categories of networks.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [41] Analyzing and predicting software integration bugs using network analysis on requirements dependency network
    Wang, Junjie
    Wang, Qing
    REQUIREMENTS ENGINEERING, 2016, 21 (02) : 161 - 184
  • [42] Analyzing and predicting software integration bugs using network analysis on requirements dependency network
    Junjie Wang
    Qing Wang
    Requirements Engineering, 2016, 21 : 161 - 184
  • [43] How to keep members using the information in a computer-supported social network
    Jin, Xiao-Ling
    Cheung, Christy M. K.
    Lee, Matthew K. O.
    Chen, Hua-Ping
    COMPUTERS IN HUMAN BEHAVIOR, 2009, 25 (05) : 1172 - 1181
  • [44] Do You Know the Way to SNA?: Process Model for Analyzing and Visualizing Social Media Network Data
    Hansen, Derek L.
    Rotman, Dana
    Bonsignore, Elizabeth
    Milic-Frayling, Natasa
    Rodrigues, Eduarda Mendes
    Smith, Marc
    Shneiderman, Ben
    PROCEEDINGS OF THE 2012 ASE INTERNATIONAL CONFERENCE ON SOCIAL INFORMATICS (SOCIALINFORMATICS 2012), 2012, : 304 - 313
  • [45] Bipartite Network of Interest (BNOI): Extending Co-Word Network with Interest of Researchers Using Sensor Data and Corresponding Applications as an Example
    Dai, Zongming
    Hu, Kai
    Xie, Jie
    Shen, Shengyu
    Zheng, Jie
    Wu, Huayi
    Guo, Ya
    SENSORS, 2021, 21 (05) : 1 - 23
  • [46] I Know What You Want: Using Gaze Metrics to Predict Personal Interest
    Karolus, Jakob
    Dabbert, Patrick
    Wozniak, Pawel W.
    ADJUNCT PUBLICATION OF THE 31ST ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY (UIST'18 ADJUNCT), 2018, : 105 - 107
  • [47] Analyzing and forecasting the Chinese term structure of interest rates using functional principal component analysis
    Feng, Pan
    Qian, Junhui
    CHINA FINANCE REVIEW INTERNATIONAL, 2018, 8 (03) : 275 - 296
  • [48] Analyzing threat flow over network using ensemble-based dense network model
    Harita, U.
    Mohammed, Moulana
    SOFT COMPUTING, 2024, 28 (05) : 4171 - 4184
  • [49] Analyzing threat flow over network using ensemble-based dense network model
    U. Harita
    Moulana Mohammed
    Soft Computing, 2024, 28 : 4171 - 4184
  • [50] Analyzing network-wide patterns of rail transit delays using Bayesian network learning
    Ulak, Mehmet Baran
    Yazici, Anil
    Zhang, Yun
    TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2020, 119