We gratefully acknowledge support from
the Simons Foundation and member institutions.

Social and Information Networks

New submissions

[ total of 5 entries: 1-5 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Fri, 30 Jul 21

[1]  arXiv:2107.13962 [pdf, other]
Title: The Robustness of Graph k-shell Structure under Adversarial Attacks
Subjects: Social and Information Networks (cs.SI)

The k-shell decomposition plays an important role in unveiling the structural properties of a network, i.e., it is widely adopted to find the densest part of a network across a broad range of scientific fields, including Internet, biological networks, social networks, etc. However, there arises concern about the robustness of the k-shell structure when networks suffer from adversarial attacks. Here, we introduce and formalize the problem of the k-shell attack and develop an efficient strategy to attack the k-shell structure by rewiring a small number of links. To the best of our knowledge, it is the first time to study the robustness of graph k-shell structure under adversarial attacks. In particular, we propose a Simulated Annealing (SA) based k-shell attack method and testify it on four real-world social networks. The extensive experiments validate that the k-shell structure of a network is robust under random perturbation, but it is quite vulnerable under adversarial attack, e.g., in Dolphin and Throne networks, more than 40% nodes change their k-shell values when only 10% links are changed based on our SA-based k-shell attack. Such results suggest that a single structural feature could also be significantly disturbed when only a small fraction of links are changed purposefully in a network. Therefore, it could be an interesting topic to improve the robustness of various network properties against adversarial attack in the future.

[2]  arXiv:2107.14120 [pdf, other]
Title: A Method to Analyze Multiple Social Identities in Twitter Bios
Comments: Conditionally Accepted CSCW'21
Subjects: Social and Information Networks (cs.SI)

Twitter users signal social identity in their profile descriptions, or bios, in a number of important but complex ways that \hl{are not well-captured by} existing characterizations of how identity is expressed in language. Better ways of defining and measuring these expressions may therefore be useful both in understanding how social identity is expressed in text, and how the self is presented on Twitter. To this end, the present work makes three contributions. First, using qualitative methods, we \hl{identify and} define the concept of a personal identifier, which is more \hl{representative} of the ways in which identity is signaled in Twitter bios. Second, we propose a method to extract all personal identifiers expressed in a given bio. Finally, we present a series of validation analyses that explore the strengths and limitations of our proposed method. Our work opens up exciting new opportunities at the intersection between the social psychological study of social identity and the study of how we compose the self through markers of identity on Twitter and in social media more generally.

[3]  arXiv:2107.14155 [pdf, other]
Title: Brexit and bots: characterizing the behaviour of automated accounts on Twitter during the UK election
Comments: 18 pages, 13 figures
Subjects: Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)

Online Social Networks represent a novel opportunity for political campaigns, revolutionising the paradigm of political communication. Nevertheless, many studies uncovered the presence of d/misinformation campaigns or of malicious activities by genuine or automated users, putting at severe risk the credibility of online platforms. This phenomenon is particularly evident during crucial political events, as political elections. In the present paper, we provide a comprehensive description of the structure of the networks of interactions among users and bots during the UK elections of 2019. In particular, we focus on the polarised discussion about Brexit on Twitter analysing a data set made of more than 10 million tweets posted for over a month. We found that the presence of automated accounts fostered the debate particularly in the days before the UK national elections, in which we find a steep increase of bots in the discussion; in the days after the election day, their incidence returned to values similar to the ones observed few weeks before the elections. On the other hand, we found that the number of suspended users (i.e. accounts that were removed by the platform for some violation of the Twitter policy) remained constant until the election day, after which it reached significantly higher values. Remarkably, after the TV debate between Boris Johnson and Jeremy Corbyn, we observed the injection of a large number of novel bots whose behaviour is markedly different from that of pre-existing ones. Finally, we explored the bots' stance, finding that their activity is spread across the whole political spectrum, although in different proportions, and we studied the different usage of hashtags by automated accounts and suspended users, thus targeting the formation of common narratives in different sides of the debate.

Cross-lists for Fri, 30 Jul 21

[4]  arXiv:2107.13709 (cross-list from q-bio.PE) [pdf, ps, other]
Title: Controlling epidemics through optimal allocation of test kits and vaccine doses across networks
Comments: 13 pages, 8 figures
Subjects: Populations and Evolution (q-bio.PE); Social and Information Networks (cs.SI); Optimization and Control (math.OC)

Efficient testing and vaccination protocols are critical aspects of epidemic management. To study the optimal allocation of limited testing and vaccination resources in a heterogeneous contact network of interacting susceptible, recovered, and infected individuals, we present a degree-based testing and vaccination model for which we use control-theoretic methods to derive optimal testing and vaccination policies using control-theoretic methods. Within our framework, we find that optimal intervention policies first target high-degree nodes before shifting to lower-degree nodes in a time-dependent manner. Using such optimal policies, it is possible to delay outbreaks and reduce incidence rates to a greater extent than uniform and reinforcement-learning-based interventions, particularly on certain scale-free networks.

Replacements for Fri, 30 Jul 21

[5]  arXiv:2105.14397 (replaced) [pdf, ps, other]
Title: The Sample Fréchet Mean (or Median) Graph of Sparse Graphs is Sparse
Comments: 21 pages
Subjects: Combinatorics (math.CO); Social and Information Networks (cs.SI); Data Analysis, Statistics and Probability (physics.data-an); Applications (stat.AP); Machine Learning (stat.ML)
[ total of 5 entries: 1-5 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2107, contact, help  (Access key information)