We gratefully acknowledge support from
the Simons Foundation and member institutions.

Social and Information Networks

New submissions

[ total of 14 entries: 1-14 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Thu, 9 Jul 20

[1]  arXiv:2007.03824 [pdf, other]
Title: The impact of political party/candidate on the election results from a sentiment analysis perspective using #AnambraDecides2017 tweets
Comments: This is a pre-print of an article published in Social Network Analysis and Mining (2020) 10:55. The final authenticated version is available online at: this https URL This article comprises of 17 pages, 15 figures an 34 references
Journal-ref: Soc. Netw. Anal. Min. 10, 55 (2020)
Subjects: Social and Information Networks (cs.SI); Information Retrieval (cs.IR)

This work investigates empirically the impact of political party control over its candidates or vice versa on winning an election using a natural language processing technique called sentiment analysis (SA). To do this, a set of 7430 tweets bearing or related to #AnambraDecides2017 was streamed during the November 18, 2017, Anambra State gubernatorial election. These are Twitter discussions on the top five political parties and their candidates termed political actors in this paper. We conduct polarity and subjectivity sentiment analyses on all the tweets considering time as a useful dimension of SA. Furthermore, we use the word frequency to find words most associated with the political actors in a given time. We find most talked about topics using a topic modeling algorithm and how the computed sentiments and most frequent words are related to the topics per political actor. Among other things, we deduced from the experimental results that even though a political party serves as a platform that sales the personality of a candidate, the acceptance of the candidate/party adds to the winning of an election. For example, we found the winner of the election Willie Obiano benefiting from the values his party share among the people of the State. Associating his name with his party, All Progressive Grand Alliance (APGA) displays more positive sentiments and the subjective sentiment analysis indicates that Twitter users mentioning APGA are less emotionally subjective in their tweets than the other parties.

[2]  arXiv:2007.03892 [pdf, other]
Title: Graph Neural Networks-based Clustering for Social Internet of Things
Authors: Abdullah Khanfor (1), Amal Nammouchi (1), Hakim Ghazzai (1), Ye Yang (1), Mohammad R. Haider (2), Yehia Massoud (1) ((1) School of Systems & Enterprises, Stevens Institute of Technology, Hoboken, NJ, USA, (2) University of Alabama at Birmingham, AL, USA)
Comments: 5 pages, 3 figures, 1 table, conference
Subjects: Social and Information Networks (cs.SI); Networking and Internet Architecture (cs.NI)

In this paper, we propose a machine learning process for clustering large-scale social Internet-of-things (SIoT) devices into several groups of related devices sharing strong relations. To this end, we generate undirected weighted graphs based on the historical dataset of IoT devices and their social relations. Using the adjacency matrices of these graphs and the IoT devices' features, we embed the graphs' nodes using a Graph Neural Network (GNN) to obtain numerical vector representations of the IoT devices. The vector representation does not only reflect the characteristics of the device but also its relations with its peers. The obtained node embeddings are then fed to a conventional unsupervised learning algorithm to determine the clusters accordingly. We showcase the obtained IoT groups using two well-known clustering algorithms, specifically the K-means and the density-based algorithm for discovering clusters (DBSCAN). Finally, we compare the performances of the proposed GNN-based clustering approach in terms of coverage and modularity to those of the deterministic Louvain community detection algorithm applied solely on the graphs created from the different relations. It is shown that the framework achieves promising preliminary results in clustering large-scale IoT systems.

[3]  arXiv:2007.03904 [pdf, other]
Title: Computational Resource Allocation for Edge Computing in Social Internet-of-Things
Authors: Abdullah Khanfor (1), Raby Hamadi (1), Hakim Ghazzai (1), Ye Yang (1), Mohammad R. Haider (2), Yehia Massoud (1) ((1) School of Systems & Enterprises, Stevens Institute of Technology, Hoboken, NJ, USA, (2) University of Alabama at Birmingham, AL, USA)
Comments: 5 pages, 3 figures, 2 tables, conference
Subjects: Social and Information Networks (cs.SI)

The heterogeneity of the Internet-of-things (IoT) network can be exploited as a dynamic computational resource environment for many devices lacking computational capabilities. A smart mechanism for allocating edge and mobile computers to match the need of devices requesting external computational resources is developed. In this paper, we employ the concept of Social IoT and machine learning to downgrade the complexity of allocating appropriate edge computers. We propose a framework that detects different communities of devices in SIoT enclosing trustworthy peers having strong social relations. Afterwards, we train a machine learning algorithm, considering multiple computational and non-computational features of the requester as well as the edge computers, to predict the total time needed to process the required task by the potential candidates belonging to the same community of the requester. By applying it to a real-world data set, we observe that the proposed framework provides encouraging results for mobile computer allocation.

[4]  arXiv:2007.04100 [pdf]
Title: A Survey of Real-Time Social-Based Traffic Detection
Subjects: Social and Information Networks (cs.SI); Machine Learning (cs.LG)

Online traffic news web sites do not always announce traffic events in areas in real-time. There is a capability to employ text mining and machine learning techniques on the twitter stream to perform event detection, in order to develop a real-time traffic detection system. In this present survey paper, we will deliberate the current state-of-art techniques in detecting traffic events in real-time focusing on five papers [1, 2, 3, 4, 5]. Lastly, applying text mining techniques and SVM classifiers in paper [2] gave the best results (i.e. 95.75% accuracy and 95.8% F1-score).

[5]  arXiv:2007.04113 [pdf, other]
Title: Social media self-branding and success: Quantitative evidence from a model competition
Subjects: Social and Information Networks (cs.SI)

Thanks to the availability of large online data sets, it has become possible to quantify success in different fields of human endeavour. The study presented here contributes to this literature in evaluating the effect of social media activity, as a means of 'self-branding', to increase the chances of models being elected for the Playboy Magazine's Playmate of the Year award. We hypothesise that candidates who actively manage their Instagram accounts can increase their likelihood to win the award: they use social media to gain more followers, who then might vote for them in the award polls. The findings indicate that social media activity actually has predictive capacity to estimate the outcome of the award. We find evidence that candidates who manage their social media accounts more actively than other candidates have a higher probability to become Playmate of the Year. The findings underline the benefits of social media

Cross-lists for Thu, 9 Jul 20

[6]  arXiv:2007.03812 (cross-list from cs.LG) [pdf, other]
Title: Robust Multi-Agent Multi-Armed Bandits
Subjects: Machine Learning (cs.LG); Distributed, Parallel, and Cluster Computing (cs.DC); Social and Information Networks (cs.SI); Machine Learning (stat.ML)

There has been recent interest in collaborative multi-agent bandits, where groups of agents share recommendations to decrease per-agent regret. However, these works assume that each agent always recommends their individual best-arm estimates to other agents, which is unrealistic in envisioned applications (machine faults in distributed computing or spam in social recommendation systems). Hence, we generalize the setting to include honest and malicious agents who recommend best-arm estimates and arbitrary arms, respectively. We show that even with a single malicious agent, existing collaboration-based algorithms fail to improve regret guarantees over a single-agent baseline. We propose a scheme where honest agents learn who is malicious and dynamically reduce communication with them, i.e., "blacklist" them. We show that collaboration indeed decreases regret for this algorithm, when the number of malicious agents is small compared to the number of arms, and crucially without assumptions on the malicious agents' behavior. Thus, our algorithm is robust against any malicious recommendation strategy.

[7]  arXiv:2007.04210 (cross-list from physics.soc-ph) [pdf, other]
Title: Pandemic Risks and Equilibrium Social Distancing in Heterogeneous Networks
Comments: 45 pages, 7 figures
Subjects: Physics and Society (physics.soc-ph); Social and Information Networks (cs.SI); Populations and Evolution (q-bio.PE)

We study a SIRD epidemic process among a heterogeneous population that interacts through a network. We give general upper bounds for the size of the epidemic starting from a (small) set of initially infected individuals. Moreover, we characterize the epidemic reproduction numbers in terms of the spectral properties of a relevant matrix based on the network adjacency matrix and the infection rates. We suggest that this can be used to identify sub-networks that have high reproduction numbers before the epidemic reaches and picks up in them. When we base social contact on a random graph with given vertex degrees, we give limit theorems on the fraction of infected individuals. For a given social distancing individual strategies, we establish the epidemic reproduction number $\mathfrak{R}_0$ which can be used to identify network vulnerability and inform vaccination policies. In the second part of the paper we study the equilibrium of the social distancing game and we show that voluntary social distancing will always be socially sub-optimal. Our numerical study using Covid-19 data serves to quantify the absolute and relative utility gaps across age cohorts.

Replacements for Thu, 9 Jul 20

[8]  arXiv:1907.04359 (replaced) [pdf, other]
Title: Democratic summary of public opinions in free-response surveys
Comments: 7 + 17 pages, 3 + 9 figures, 3 tables, the accepted version
Journal-ref: Nature Machine Intelligence, 1, 322-327 (2019)
Subjects: Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[9]  arXiv:2005.08817 (replaced) [pdf]
Title: Public discourse and sentiment during the COVID-19 pandemic: using Latent Dirichlet Allocation for topic modeling on Twitter
Subjects: Social and Information Networks (cs.SI); Computation and Language (cs.CL); Computers and Society (cs.CY)
[10]  arXiv:2006.15977 (replaced) [pdf, other]
Title: A privacy-preserving tests optimization algorithm for epidemics containment
Comments: added figures fixed typos added table of notation
Subjects: Social and Information Networks (cs.SI); Optimization and Control (math.OC); Physics and Society (physics.soc-ph)
[11]  arXiv:1907.05823 (replaced) [pdf, ps, other]
Title: Asynchronous Majority Dynamics in Preferential Attachment Trees
Comments: ICALP 2020
Subjects: Computer Science and Game Theory (cs.GT); Social and Information Networks (cs.SI)
[12]  arXiv:2003.10750 (replaced) [pdf, other]
Title: Open Source Software Development Challenges: A Systematic Literature Review on GitHub
Comments: 15 pages, 2 figures, This study submitted to Computer Science Review
Subjects: Software Engineering (cs.SE); Social and Information Networks (cs.SI)
[13]  arXiv:2006.07521 (replaced) [pdf]
Title: A Blockchain-based Decentralized Data Sharing Infrastructure for Off-grid Networking
Comments: An abridged version of this work appeared in ICBC 2020, fixed minor typos and layout issues
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Social and Information Networks (cs.SI)
[14]  arXiv:2007.03604 (replaced) [pdf, other]
Title: A Decade of Social Bot Detection
Authors: Stefano Cresci
Comments: Forthcoming in Communications of the ACM
Subjects: Computers and Society (cs.CY); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[ total of 14 entries: 1-14 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2007, contact, help  (Access key information)