We gratefully acknowledge support from
the Simons Foundation and member institutions.

Social and Information Networks

New submissions

[ total of 16 entries: 1-16 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Tue, 7 Feb 23

[1]  arXiv:2302.02128 [pdf, other]
Title: Interaction Order Prediction for Temporal Graphs
Subjects: Social and Information Networks (cs.SI); Computation and Language (cs.CL); Machine Learning (cs.LG)

Link prediction in graphs is a task that has been widely investigated. It has been applied in various domains such as knowledge graph completion, content/item recommendation, social network recommendations and so on. The initial focus of most research was on link prediction in static graphs. However, there has recently been abundant work on modeling temporal graphs, and consequently one of the tasks that has been researched is link prediction in temporal graphs. However, most of the existing work does not focus on the order of link formation, and only predicts the existence of links. In this study, we aim to predict the order of node interactions.

[2]  arXiv:2302.02176 [pdf]
Title: An analysis of the technology acceptance model in understanding university students behavioral intention to use metaverse technologies
Comments: 4 pages, 3 figures, conference article
Subjects: Social and Information Networks (cs.SI); Multimedia (cs.MM)

Metaverse can be applied in several aspects of life such as the Economy, finance, social life, working environment, healthcare, real estate, and education. In the last 2 and a half years, during the COVID-19 pandemic, universities made immediate use of learning technologies, providing students with access to online learning content and platforms. Previous considerations on how to better integrate technology into universities or how the institutions can be better prepared in terms of infrastructure vanished almost immediately due to the necessity of immediate actions towards the need for social distance and global health. The present study proposes a framework for university students metaverse technologies in education acceptance and intention to use. The present study develops a structural model of MetaEducation acceptance. This model will be useful to university managers, policymakers, and professors to better incorporate the upcoming metaverse technology. The present study tests (if supported) the correlations among the aforementioned constructs. Preliminary results show hesitance to use MetaEducation technologies from university students. Self-efficacy and Subjective Norms affect Attitude and Perceived Usefulness positively, but on the other side, there is no strong correlation between Perceived Ease of Use and Attitude or Perceived Usefulness and Attitude. Authors believe that the weak ties among the study constructs have to do with the lack of knowledge of what really MetaEducation really is, and which are its advantages of use.

[3]  arXiv:2302.02479 [pdf, other]
Title: Hatemongers ride on echo chambers to escalate hate speech diffusion
Comments: Accepted in PNAS Nexus
Subjects: Social and Information Networks (cs.SI); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY)

Recent years have witnessed a swelling rise of hateful and abusive content over online social networks. While detection and moderation of hate speech have been the early go-to countermeasures, the solution requires a deeper exploration of the dynamics of hate generation and propagation. We analyze more than 32 million posts from over 6.8 million users across three popular online social networks to investigate the interrelations between hateful behavior, information dissemination, and polarised organization mediated by echo chambers. We find that hatemongers play a more crucial role in governing the spread of information compared to singled-out hateful content. This observation holds for both the growth of information cascades as well as the conglomeration of hateful actors. Dissection of the core-wise distribution of these networks points towards the fact that hateful users acquire a more well-connected position in the social network and often flock together to build up information cascades. We observe that this cohesion is far from mere organized behavior; instead, in these networks, hatemongers dominate the echo chambers -- groups of users actively align themselves to specific ideological positions. The observed dominance of hateful users to inflate information cascades is primarily via user interactions amplified within these echo chambers. We conclude our study with a cautionary note that popularity-based recommendation of content is susceptible to be exploited by hatemongers given their potential to escalate content popularity via echo-chambered interactions.

[4]  arXiv:2302.02533 [pdf, other]
Title: Linking Datasets on Organizations Using Half A Billion Open Collaborated Records: Perils and Opportunities
Subjects: Social and Information Networks (cs.SI)

Scholars studying organizations often work with multiple datasets lacking shared unique identifiers or covariates. In such situations, researchers may turn to approximate string matching methods to combine datasets. String matching, although useful, faces fundamental challenges. String distance metrics are not optimized for string matching -- they do not explicitly maximize linkage performance. Moreover, many entities have multiple names that are dissimilar (e.g., "Fannie Mae" and "Federal National Mortgage Association"). This paper introduces data from a prominent employment-related networking site (LinkedIn) as a tool to help to address this problem. We propose interconnected approaches to leveraging the massive amount of information from LinkedIn regarding organizational name-to-name links. The first approach builds a machine learning model for predicting matches from character strings, treating the trillion user-contributed organizational name pairs as a training corpus: this approach constructs a matching metric that explicitly maximizes match probabilities. A second approach extracts plausible name matches using graph theoretic information contained in the LinkedIn data. A third approach combines the machine learning and network methods. We document substantial improvements over fuzzy matching in organization name matching exercises while discussing limitations and ways future methodologists may further make use of this unique data source. We make our methods accessible in an open-source R package available at github.com/cjerzak/LinkOrgs-software.

[5]  arXiv:2302.02687 [pdf, other]
Title: On Manipulating Weight Predictions in Signed Weighted Networks
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)

Adversarial social network analysis studies how graphs can be rewired or otherwise manipulated to evade social network analysis tools. While there is ample literature on manipulating simple networks, more sophisticated network types are much less understood in this respect. In this paper, we focus on the problem of evading FGA -- an edge weight prediction method for signed weighted networks by Kumar et al.. Among others, this method can be used for trust prediction in reputation systems. We study the theoretical underpinnings of FGA and its computational properties in terms of manipulability. Our positive finding is that, unlike many other tools, this measure is not only difficult to manipulate optimally, but also it can be difficult to manipulate in practice.

[6]  arXiv:2302.02787 [pdf, other]
Title: Generative models for two-ground-truth partitions in networks
Subjects: Social and Information Networks (cs.SI); Statistical Mechanics (cond-mat.stat-mech); Machine Learning (cs.LG); Data Analysis, Statistics and Probability (physics.data-an); Physics and Society (physics.soc-ph)

A myriad of approaches have been proposed to characterise the mesoscale structure of networks - most often as a partition based on patterns variously called communities, blocks, or clusters. Clearly, distinct methods designed to detect different types of patterns may provide a variety of answers to the network's mesoscale structure. Yet, even multiple runs of a given method can sometimes yield diverse and conflicting results, yielding entire landscapes of partitions which potentially include multiple (locally optimal) mesoscale explanations of the network. Such ambiguity motivates a closer look at the ability of these methods to find multiple qualitatively different 'ground truth' partitions in a network. Here, we propose a generative model which allows for two distinct partitions to be built into the mesoscale structure of a single benchmark network. We demonstrate a use case of the benchmark model by exploring the power of stochastic block models (SBMs) to detect coexisting bi-community and core-periphery structures of different strengths. We find that the ability to detect the two partitions individually varies considerably by SBM variant and that coexistence of both partitions is recovered only in a very limited number of cases. Our findings suggest that in most instances only one - in some way dominating - structure can be detected, even in the presence of other partitions in the generated network. They underline the need for considering entire landscapes of partitions when different competing explanations exist and motivate future research to advance partition coexistence detection methods. Our model also contributes to the field of benchmark networks more generally by enabling further exploration of the ability of new and existing methods to detect ambiguity in mesoscale structure of networks.

[7]  arXiv:2302.02813 [pdf, other]
Title: Migration Reframed? A multilingual analysis on the stance shift in Europe during the Ukrainian crisis
Comments: To be published in The Web Conference 2023
Subjects: Social and Information Networks (cs.SI); Computation and Language (cs.CL); Machine Learning (cs.LG)

The war in Ukraine seems to have positively changed the attitude toward the critical societal topic of migration in Europe -- at least towards refugees from Ukraine. We investigate whether this impression is substantiated by how the topic is reflected in online news and social media, thus linking the representation of the issue on the Web to its perception in society. For this purpose, we combine and adapt leading-edge automatic text processing for a novel multilingual stance detection approach. Starting from 5.5M Twitter posts published by 565 European news outlets in one year, beginning September 2021, plus replies, we perform a multilingual analysis of migration-related media coverage and associated social media interaction for Europe and selected European countries.
The results of our analysis show that there is actually a reframing of the discussion illustrated by the terminology change, e.g., from "migrant" to "refugee", often even accentuated with phrases such as "real refugees". However, concerning a stance shift in public perception, the picture is more diverse than expected. All analyzed cases show a noticeable temporal stance shift around the start of the war in Ukraine. Still, there are apparent national differences in the size and stability of this shift.

Cross-lists for Tue, 7 Feb 23

[8]  arXiv:2302.02079 (cross-list from eess.SY) [pdf, other]
Title: Sparse Resource Allocation for Spreading Processes on Temporal-Switching Networks
Comments: Conference submission, 8 pages. arXiv admin note: text overlap with arXiv:2110.07755
Subjects: Systems and Control (eess.SY); Social and Information Networks (cs.SI); Dynamical Systems (math.DS); Optimization and Control (math.OC)

Spreading processes, e.g. epidemics, wildfires and rumors, are often modeled on static networks. However, their underlying network structures, e.g. changing contacts in social networks, different weather forecasts for wildfires, are due to ever-changing circumstances inherently time-varying in nature. In this paper, we therefore, propose an optimization framework for sparse resource allocation for control of spreading processes over temporal networks with known connectivity patterns. We use convex optimization, in particular exponential cone programming, and dynamic programming techniques to bound and minimize the risk of an undetected outbreak by allocating budgeted resources each time step. We demonstrate with misinformation, epidemic and wildfire examples how the method can provide targeted allocation of resources.

[9]  arXiv:2302.02317 (cross-list from cs.IR) [pdf, other]
Title: Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Comments: Accepted and to appear at DASFAA2023
Subjects: Information Retrieval (cs.IR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)

Recently, Graph Neural Networks (GNNs) achieve remarkable success in Recommendation. To reduce the influence of data sparsity, Graph Contrastive Learning (GCL) is adopted in GNN-based CF methods for enhancing performance. Most GCL methods consist of data augmentation and contrastive loss (e.g., InfoNCE). GCL methods construct the contrastive pairs by hand-crafted graph augmentations and maximize the agreement between different views of the same node compared to that of other nodes, which is known as the InfoMax principle. However, improper data augmentation will hinder the performance of GCL. InfoMin principle, that the good set of views shares minimal information and gives guidelines to design better data augmentation. In this paper, we first propose a new data augmentation (i.e., edge-operating including edge-adding and edge-dropping). Then, guided by InfoMin principle, we propose a novel theoretical guiding contrastive learning framework, named Learnable Data Augmentation for Graph Contrastive Learning (LDA-GCL). Our methods include data augmentation learning and graph contrastive learning, which follow the InfoMin and InfoMax principles, respectively. In implementation, our methods optimize the adversarial loss function to learn data augmentation and effective representations of users and items. Extensive experiments on four public benchmark datasets demonstrate the effectiveness of LDA-GCL.

[10]  arXiv:2302.02591 (cross-list from cs.LG) [pdf, other]
Title: Generative Diffusion Models on Graphs: Methods and Applications
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Social and Information Networks (cs.SI)

Diffusion models, as a novel generative paradigm, have achieved remarkable success in various image generation tasks such as image inpainting, image-to-text translation, and video generation. Graph generation is a crucial computational task on graphs with numerous real-world applications. It aims to learn the distribution of given graphs and then generate new graphs. Given the great success of diffusion models in image generation, increasing efforts have been made to leverage these techniques to advance graph generation in recent years. In this paper, we first provide a comprehensive overview of generative diffusion models on graphs, In particular, we review representative algorithms for three variants of graph diffusion models, i.e., Score Matching with Langevin Dynamics (SMLD), Denoising Diffusion Probabilistic Model (DDPM), and Score-based Generative Model (SGM). Then, we summarize the major applications of generative diffusion models on graphs with a specific focus on molecule and protein modeling. Finally, we discuss promising directions in generative diffusion models on graph-structured data.

[11]  arXiv:2302.02914 (cross-list from cs.LG) [pdf, other]
Title: Energy-based Out-of-Distribution Detection for Graph Neural Networks
Comments: Accepted by International Conference on Learning Representations (ICLR 2023)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Social and Information Networks (cs.SI)

Learning on graphs, where instance nodes are inter-connected, has become one of the central problems for deep learning, as relational structures are pervasive and induce data inter-dependence which hinders trivial adaptation of existing approaches that assume inputs to be i.i.d.~sampled. However, current models mostly focus on improving testing performance of in-distribution data and largely ignore the potential risk w.r.t. out-of-distribution (OOD) testing samples that may cause negative outcome if the prediction is overconfident on them. In this paper, we investigate the under-explored problem, OOD detection on graph-structured data, and identify a provably effective OOD discriminator based on an energy function directly extracted from graph neural networks trained with standard classification loss. This paves a way for a simple, powerful and efficient OOD detection model for GNN-based learning on graphs, which we call GNNSafe. It also has nice theoretical properties that guarantee an overall distinguishable margin between the detection scores for in-distribution and OOD samples, which, more critically, can be further strengthened by a learning-free energy belief propagation scheme. For comprehensive evaluation, we introduce new benchmark settings that evaluate the model for detecting OOD data from both synthetic and real distribution shifts (cross-domain graph shifts and temporal graph shifts). The results show that GNNSafe achieves up to $17.0\%$ AUROC improvement over state-of-the-arts and it could serve as simple yet strong baselines in such an under-developed area.

Replacements for Tue, 7 Feb 23

[12]  arXiv:2201.01134 (replaced) [pdf, other]
Title: Network Collaborator: Knowledge Transfer Between Network Reconstruction and Community Detection
Comments: This work has been submitted to the IEEE TAI for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Social and Information Networks (cs.SI); Neural and Evolutionary Computing (cs.NE)
[13]  arXiv:2207.03408 (replaced) [pdf, other]
Title: Representation Learning in Continuous-Time Dynamic Signed Networks
Subjects: Social and Information Networks (cs.SI); Machine Learning (cs.LG)
[14]  arXiv:2212.07861 (replaced) [pdf, other]
Title: The Russian invasion of Ukraine selectively depolarized the Finnish NATO discussion
Subjects: Social and Information Networks (cs.SI)
[15]  arXiv:2302.01397 (replaced) [pdf, other]
Title: Waiting for Q: An Exploration of QAnon Users' Online Migration to Poal in the Wake of Voat's Demise
Subjects: Social and Information Networks (cs.SI)
[16]  arXiv:2301.03029 (replaced) [pdf, other]
Title: Topic Modelling of Swedish Newspaper Articles about Coronavirus: a Case Study using Latent Dirichlet Allocation Method
Comments: 14 pages, 13 figures
Subjects: Computation and Language (cs.CL); Social and Information Networks (cs.SI)
[ total of 16 entries: 1-16 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2302, contact, help  (Access key information)