Combating Friend Spam Using Social Rejections
|
|
- Rudolph Goodman
- 5 years ago
- Views:
Transcription
1 Combating Friend Spam Using Social Rejections Qiang Cao Duke University Michael Sirivianos Xiaowei Yang Kamesh Munagala Cyprus Univ. of Technology Duke University Duke University
2 Friend Spam in online social networks (OSNs) 2
3 Friend Spam in online social networks (OSNs) Friend spam: unwanted friend requests Fake account 3
4 Friend Spam in online social networks (OSNs) Friend spam: unwanted friend requests Ø Degrade user experience (e.g., annoying) Ø Introduce false OSN links Fake account 4
5 False OSN links are harmful Pollute the underlying social graph Ø Detrimental to social search and online ad targeting Ø Jeopardize online privacy and safety 5
6 False OSN links undermine the effectiveness of Sybil defense The defense relies on genuine social links Ø SybilLimit [S&P 08], SybilRank [NSDI 12] Ø # undetected Sybils (fake accounts) is bounded to O(log V ) per link between Sybils and legitimate users OSN links Non-Sybil region Sybil region 6
7 Existing counter- measures Privacy sexings for OSN users Ø Restrict requests only from friends of friends Ø Subtract from the openness of the OSN 7
8 Existing counter- measures Privacy sexings for OSN users Ø Restrict requests only from friends of friends Ø Subtract from the openness of the OSN Spam request filtering using machine learning (ML) Ø Facebook Immune System (SNS 11) Ø Individual user features are manipublable 8
9 Rejecto: Combating friend spam using social rejections 9
10 Observation: the cost of connecting to real users False OSN links come with social rejections Legitimate users Friend spammers 10
11 Observation: the cost of connecting to real users False OSN links come with social rejections Legitimate users Friend spammers 11
12 Observation: the cost of connecting to real users False OSN links come with social rejections Ø Social rejections: rejected, ignored, and reported requests Ø Spam requests are less likely to be accepted Legitimate users Friend spammers 12
13 Observation: the cost of connecting to real users False OSN links come with social rejections Ø Social rejections: rejected, ignored, and reported requests Ø Spam requests are less likely to be accepted Many rejections Legitimate users Friend spammers 13
14 Live fake accounts in the wild Each has a significant number of pending requests Ø Fake Facebook accounts from underground market Ø More measurement results in the paper Number of requests Pending requests Friends Anonymized fake account ID 14
15 How reliable is social rejection? AXackers inevitably trigger rejections Ø Disproportionally large number of accounts and requests Ø Requests inevitably hit cautious users Rejection towards innocent users is non- manipulable Ø A rejection is guarded by a feedback loop between the request sender and the receiver Ø Legitimate users rarely receive rejections Ø Fundamentally different from negative ratings on online services (e.g., YouTube) 15
16 Challenges to use social rejection AXack strategies Ø Collusion: fake accounts collude to accept requests Ø Arbitrarily boost the request acceptance rate of an individual account Ø Self- rejection: mimic legitimate users rejecting others Ø Whitewash the part of rejecting fake accounts System challenge Ø Gigantic user base with enormous requests and rejections 16
17 Rejecto in a nutshell A strategy- proof formulation Ø Graph cut on a rejection- augmented social graph Ø Low aggregate acceptance rate of the requests from spammers to legitimate users An effective and near- linear algorithm Ø Based on the Kernighan- Lin (KL) algorithm [The Bell System Technical Journal, 1970] A scalable implementation Ø Layered on top of Apache Spark [Zaharia et al. NSDI 12] 17
18 Outline Key insight System design Evaluation 18
19 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups 19
20 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups F ( H, S) Aggregate acceptance rate (AAR) F ( H, S) +!" R ( H, S) H S 20
21 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups F ( H, S) Aggregate acceptance rate (AAR) F ( H, S) +!" R ( H, S) H S 21
22 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups F ( H, S) Aggregate acceptance rate (AAR) F ( H, S) +!" R ( H, S) Fake accounts cannot arbitrarily improve AAR H S 22
23 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups F ( H, S) Aggregate acceptance rate (AAR) F ( H, S) +!" R ( H, S) Fake accounts cannot arbitrarily improve AAR H S 23
24 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted 24
25 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted 25
26 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted 26
27 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted 27
28 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted A small AAR ratio cut 28
29 A graph cut model Augments a social graph with rejections Ø Directed rejection edges Finds the cut with the minimum aggregate acceptance rate (MAAR) Ø Graph partitioning based on requests and rejections Iteratively cuts off groups of suspicious accounts Ø Prunes their links and rejections from the social graph 29
30 A graph cut model Augments a social graph with rejections Immune to collusion and self-rejection strategies Ø Directed rejection edges Finds the cut with the minimum aggregate acceptance rate (MAAR) Ø Graph partitioning based on requests and rejections Iteratively cuts off groups of suspicious accounts Ø Prunes their links and rejections from the social graph 30
31 Outline Key insight System design Evaluation 31
32 Finding the MAAR cut MAAR cut is NP- hard is challenging Ø Reduced from MIN- RATIO- CUT problem [Leighton & Rao, JACM 79] Ø Detailed reduction in the paper Existing work on cut- based problems in undirected graphs Ø State of the art: O(log V ) approximation algorithms with complexity of O( V 2 ) [Madry, FOCS 10] 32
33 Finding the MAAR cut MAAR cut is NP- hard is challenging Ø Reduced from MIN- RATIO- CUT problem [Leighton & Rao, Ø The JACM 79] approximation factor O(log V ) is too loose Ø Detailed Ø O( V reduction 2 ) complexity in the is paper prohibitive Ø Do not support parallel graph processing Existing work on cut- based problems in undirected graphs Ø State of the art: O(log V ) approximation algorithms with complexity of O( V 2 ) [Madry, FOCS 10] 33
34 Our approach: an effective and efficient search algorithm Finds a MAAR cut by interchanging misplaced nodes Ø Based on the Kernighan- Lin (KL) algorithm Ø O( V ) complexity Ø Can scale up to multimillion- node social graphs 34
35 Our approach: an effective and efficient search algorithm Finds a MAAR cut by interchanging misplaced nodes Ø Based on the Kernighan- Lin (KL) algorithm Ø O( V ) complexity Ø Can scale up to multimillion- node social graphs 35
36 A primer on the Kernighan- Lin (KL) algorithm Searches a balanced cut in undirected graphs Ø Minimizes #cross- partition edges Ø Reduces cross- partition edges by swapping nodes Ø Fudiccia et al. improved to O( V ) [DAC 82] Ø Widely used in VLSI layout design U V-U 36
37 A primer on the Kernighan- Lin (KL) algorithm Searches a balanced cut in undirected graphs Ø Minimizes #cross- partition edges Ø Reduces cross- partition edges by swapping nodes Ø Fudiccia et al. improved to O( V ) [DAC 82] How to use KL to find the MAAR cut? Ø Widely used in VLSI layout design Ø Additional directed rejection edges Ø Non- linear MAAR objective function U V-U 37
38 Transforming the MAAR cut problem Convert to a set of bipartition problems Ø Each with a parameterized linear objective function Ø Rejection and social links can be unified F ( V S, S) ( ) +!" R ( V S, S) F V S, S F ( V S, S) k!" R ( V S, S) Solvable by KL after unifying the rejections and OSN links according to the parameter k 38
39 Why can we do the transformation? The MAAR cut is an optimal solution to one of the converted family of bipartition problems Ø The converted problem is determined by the MAAR cut ratio k* Theorem: In a rejection- augmented social graph, if the cut C * = U *,U * is the minimum aggregate acceptance rate (MAAR) cut, and F ( U *,U * ) = k * (k* > 0),!" * R U,U * C* is the optimal solution to the bipartition problem that minimizes. ( ) k * R!" U,U F U,U 39
40 Optimization and implementation Support seed pre- placement to reduce false positives Ø Seeds of both legitimate users and spamming accounts Prototype on Apache Spark Ø Distribute the large social graph to workers Ø Keep only a tractable set of algorithm states on the master 40
41 Outline Key insight System design Evaluation 41
42 Evaluation Extensive simulations on real social networks Ø Sensitivity analysis Ø Resilience to axack strategies Ø Compared to VoteTrust Simulations under Sybil axack Ø In- depth defense with social- graph- based Sybil defense A Rejecto prototype on an Amazon EC2 cluster Ø Performance analysis on large graph processing 42
43 Rejecto is insensitive to spam request volume Request flooding axacks on a Facebook sample graph Ø Fake accounts connect with each other as normal users do Precision/recall Rejecto VoteTrust Number of requests per fake account All fake accounts send out spam requests Precision/recall Rejecto VoteTrust Number of requests per fake account Only half of the fake accounts send out spam requests 43
44 Precision/recall Rejecto is insensitive to spam request volume Request flooding axacks on a Facebook sample graph Ø Fake accounts connect with each other as normal users do Rejecto uncovers fakes behind 1 1 the actively spamming ones Rejecto Rejecto VoteTrust VoteTrust Number of requests per fake account Number of requests per fake account All fake accounts send out spam requests Precision/recall Only half of the fake accounts send out spam requests 44
45 Rejecto is resilient to a]ack strategies Our MAAR cut model is immune to manipulation Precision/recall Collusion strategy to form dense connections among fake accounts 0.6 Rejecto 0.4 VoteTrust # of non-attack edges per fake account Precision/recall Self-rejection strategy to let half of the fakes reject the rest as legitimate users do Rejecto VoteTrust Self-rejection rate among fake accounts 45
46 Rejecto and social- graph- based Sybil detection form a defense in depth Rejecto makes fakes hard to get additional links Ø Defense in depth with SybilRank Area under the ROC curve Facebook ca-astroph Number of accounts removed by Rejecto Improvement 46
47 Rejecto can handle multimillion- user social graphs Performance on an EC2 cluster Ø Spark Ø 5 c3.8xlarge VMs Ø A larger cluster yields bexer performance # Users 0.5M 1M 2M 5M 10M # Edges ~8M ~16M ~32M ~80M ~160M Execu5on 5me 288 sec 669 sec 1767 sec 8049 sec 7.7 hours 47
48 Rejecto can handle multimillion- user social graphs Performance on an EC2 cluster Ø Spark Execution time grows gracefully with the graph size Ø 5 c3.8xlarge VMs Ø A larger cluster yields bexer performance # Users 0.5M 1M 2M 5M 10M # Edges ~8M ~16M ~32M ~80M ~160M Execu5on 5me 288 sec 669 sec 1767 sec 8049 sec 7.7 hours 48
49 Conclusion Rejecto: uncovers friend spammers using social rejections Ø Immune to axack strategies Ø Efficient Ø Scalable 49
Computational challenges in analyzing and moderating online social discussions
Computational challenges in analyzing and moderating online social discussions Aristides Gionis Department of Computer Science Aalto University Machine learning coffee seminar Oct 23, 2017 social media
More informationThe Australian Society for Operations Research
The Australian Society for Operations Research www.asor.org.au ASOR Bulletin Volume 34, Issue, (06) Pages -4 A minimum spanning tree with node index Elias Munapo School of Economics and Decision Sciences,
More informationMeasurement and Analysis of an Online Content Voting Network: A Case Study of Digg
Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg Yingwu Zhu Department of CSSE, Seattle University Seattle, WA 9822, USA zhuy@seattleu.edu ABSTRACT In online content voting
More informationSubreddit Recommendations within Reddit Communities
Subreddit Recommendations within Reddit Communities Vishnu Sundaresan, Irving Hsu, Daryl Chang Stanford University, Department of Computer Science ABSTRACT: We describe the creation of a recommendation
More informationVOTING DYNAMICS IN INNOVATION SYSTEMS
VOTING DYNAMICS IN INNOVATION SYSTEMS Voting in social and collaborative systems is a key way to elicit crowd reaction and preference. It enables the diverse perspectives of the crowd to be expressed and
More informationLearning Systems. Research at the Intersection of Machine Learning & Data Systems. Joseph E. Gonzalez
Learning Systems Research at the Intersection of Machine Learning & Data Systems Joseph E. Gonzalez Asst. Professor, UC Berkeley jegonzal@cs.berkeley.edu How can machine learning techniques be used to
More informationConstraint satisfaction problems. Lirong Xia
Constraint satisfaction problems Lirong Xia Spring, 2017 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions
More informationMichael Laver and Ernest Sergenti: Party Competition. An Agent-Based Model
RMM Vol. 3, 2012, 66 70 http://www.rmm-journal.de/ Book Review Michael Laver and Ernest Sergenti: Party Competition. An Agent-Based Model Princeton NJ 2012: Princeton University Press. ISBN: 9780691139043
More informationA Framework for the Quantitative Evaluation of Voting Rules
A Framework for the Quantitative Evaluation of Voting Rules Michael Munie Computer Science Department Stanford University, CA munie@stanford.edu Yoav Shoham Computer Science Department Stanford University,
More informationTengyu Ma Facebook AI Research. Based on joint work with Yuanzhi Li (Princeton) and Hongyang Zhang (Stanford)
Tengyu Ma Facebook AI Research Based on joint work with Yuanzhi Li (Princeton) and Hongyang Zhang (Stanford) Ø Over-parameterization: # parameters # examples Ø a set of parameters that can Ø fit to training
More informationPolitical Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries
Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries Sebastian Goderbauer 1 Electoral Districts in Elections to
More informationTengyu Ma Facebook AI Research. Based on joint work with Rong Ge (Duke) and Jason D. Lee (USC)
Tengyu Ma Facebook AI Research Based on joint work with Rong Ge (Duke) and Jason D. Lee (USC) Users Optimization Researchers function f Solution gradient descent local search Convex relaxation + Rounding
More informationJunk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans
Junk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans COMPROP DATA MEMO 2017.9 / 09 OCTOBER 2017 John D. Gallacher Oxford
More informationVoting and Complexity
Voting and Complexity legrand@cse.wustl.edu Voting and Complexity: Introduction Outline Introduction Hardness of finding the winner(s) Polynomial systems NP-hard systems The minimax procedure [Brams et
More informationOctober Next Generation Smart Border Security Ability. Quality. Delivery.
October 2013 Next Generation Smart Border Security Ability. Quality. Delivery. Table of contents Introduction 4 Context 5 Risk strategy 6 Risk management 7 Information management 8 Data protection and
More informationCollective Decisions, Error and Trust in Wireless Networks
Collective Decisions, Error and Trust in Wireless Networks Arnold B. Urken Professor of Political Science Wireless Network Security Center Stevens Institute of Technology aurken@stevens.edu This research
More informationMinimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout
Objec&ves Minimum Spanning Tree Union-Find Data Structure Feb, 0 CSCI - Sprenkle Started teasing out some algorithms. Laying Cable Focus on commonality: what should our final solution look like? Comcast
More informationAnalysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow
Analysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow Dana Movshovitz-Attias Yair Movshovitz-Attias Peter Steenkiste Christos Faloutsos August 27, 2013
More informationPredicting Information Diffusion Initiated from Multiple Sources in Online Social Networks
Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Chuan Peng School of Computer science, Wuhan University Email: chuan.peng@asu.edu Kuai Xu, Feng Wang, Haiyan Wang
More informationECE250: Algorithms and Data Structures Trees
ECE250: Algorithms and Data Structures Trees Ladan Tahvildari, PEng, SMIEEE Professor Software Technologies Applied Research (STAR) Group Dept. of Elect. & Comp. Eng. University of Waterloo Materials from
More informationAn Integrated Tag Recommendation Algorithm Towards Weibo User Profiling
An Integrated Tag Recommendation Algorithm Towards Weibo User Profiling Deqing Yang, Yanghua Xiao, Hanghang Tong, Junjun Zhang and Wei Wang School of Computer Science Shanghai Key Laboratory of Data Science
More informationSearch Trees. Chapter 10. CSE 2011 Prof. J. Elder Last Updated: :51 PM
Search Trees Chapter 1 < 6 2 > 1 4 = 8 9-1 - Outline Ø Binary Search Trees Ø AVL Trees Ø Splay Trees - 2 - Binary Search Trees Ø A binary search tree is a binary tree storing key-value entries at its internal
More informationCoalitional Game Theory for Communication Networks: A Tutorial
Coalitional Game Theory for Communication Networks: A Tutorial Walid Saad 1, Zhu Han 2, Mérouane Debbah 3, Are Hjørungnes 1 and Tamer Başar 4 1 UNIK - University Graduate Center, University of Oslo, Kjeller,
More informationFall Detection for Older Adults with Wearables. Chenyang Lu
Fall Detection for Older Adults with Wearables Chenyang Lu Internet of Medical Things Ø Wearables: wristbands, smart watches q Continuous monitoring q Sensing: activity, heart rate, sleep, (pulse-ox, glucose
More informationTitle: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3)
B.Y. Choueiry 1 Instructor s notes #5 Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) Introduction to Artificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/~choueiry/f17-476-876
More informationA Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset
A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset Sisi Xiong*, Feiyi Wang + and Qing Cao* *University of Tennessee Knoxville, Knoxville, TN, USA + Oak Ridge National Laboratory,
More informationPolice patrol districting method and simulation evaluation using agent-based model & GIS
Zhang and Brown Security Informatics 2013, 2:7 RESEARCH Open Access Police patrol districting method and simulation evaluation using agent-based model & GIS Yue Zhang * and Donald E Brown Abstract Police
More informationOptimizing space-based microlensing exoplanet surveys
Optimizing space-based microlensing exoplanet surveys Eamonn Kerins Univ. Manchester Euclid Exoplanet Working Group WFIRST Exoplanet Task Group VVV Science Team Microlensing and exoplanets Kepler transit
More informationDesigning police patrol districts on street network
Designing police patrol districts on street network Huanfa Chen* 1 and Tao Cheng 1 1 SpaceTimeLab for Big Data Analytics, Department of Civil, Environmental, and Geomatic Engineering, University College
More informationGame Theory. Jiang, Bo ( 江波 )
Game Theory Jiang, Bo ( 江波 ) Jiang.bo@mail.shufe.edu.cn Mechanism Design in Voting Majority voting Three candidates: x, y, z. Three voters: a, b, c. Voter a: x>y>z; voter b: y>z>x; voter c: z>x>y What
More informationCluster Analysis. (see also: Segmentation)
Cluster Analysis (see also: Segmentation) Cluster Analysis Ø Unsupervised: no target variable for training Ø Partition the data into groups (clusters) so that: Ø Observations within a cluster are similar
More informationHoboken Public Schools. Project Lead The Way Curriculum Grade 8
Hoboken Public Schools Project Lead The Way Curriculum Grade 8 Project Lead The Way HOBOKEN PUBLIC SCHOOLS Course Description PLTW Gateway s 9 units empower students to lead their own discovery. The hands-on
More informationCoalitional Game Theory
Coalitional Game Theory Game Theory Algorithmic Game Theory 1 TOC Coalitional Games Fair Division and Shapley Value Stable Division and the Core Concept ε-core, Least core & Nucleolus Reading: Chapter
More informationCHAPTER 2 LITERATURE REVIEW
19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et
More informationRandomized Pursuit-Evasion in Graphs
Randomized Pursuit-Evasion in Graphs Micah Adler, Harald Räcke ¾, Naveen Sivadasan, Christian Sohler ¾, and Berthold Vöcking ¾ Department of Computer Science University of Massachusetts, Amherst, micah@cs.umass.edu
More informationPolydisciplinary Faculty of Larache Abdelmalek Essaadi University, MOROCCO 3 Department of Mathematics and Informatics
International Journal of Pure and Applied Mathematics Volume 115 No. 4 2017, 801-812 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 10.12732/ijpam.v115i4.13
More informationGame theoretical techniques have recently
[ Walid Saad, Zhu Han, Mérouane Debbah, Are Hjørungnes, and Tamer Başar ] Coalitional Game Theory for Communication Networks [A tutorial] Game theoretical techniques have recently become prevalent in many
More informationNEW PERSPECTIVES ON THE LAW & ECONOMICS OF ELECTIONS
NEW PERSPECTIVES ON THE LAW & ECONOMICS OF ELECTIONS! ASSA EARLY CAREER RESEARCH AWARD: PANEL B Richard Holden School of Economics UNSW Business School BACKDROP Long history of political actors seeking
More informationUninformed search. Lirong Xia
Uninformed search Lirong Xia Spring, 2017 Today s schedule ØRational agents ØSearch problems State space graph: modeling the problem Search trees: scratch paper for solution ØUninformed search Depth first
More informationLast Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs
Last Time u Embedded networks Ø Characteristics Ø Requirements Ø Simple embedded LANs Bit banged SPI I2C LIN Ethernet Today u CAN Bus Ø Intro Ø Low-level stuff Ø Frame types Ø Arbitration Ø Filtering Ø
More informationTHE PRIMITIVES OF LEGAL PROTECTION AGAINST DATA TOTALITARIANISMS
THE PRIMITIVES OF LEGAL PROTECTION AGAINST DATA TOTALITARIANISMS Mireille Hildebrandt Research Professor at Vrije Universiteit Brussel (Law) Parttime Full Professor at Radboud University Nijmegen (CS)
More informationQuality of Service in Optical Telecommunication Networks
Quality of Service in Optical Telecommunication Networks Periodic Summary & Future Research Ideas Zhizhen Zhong 2015.08.28 @Networks Lab Group Meeting 1 Outline Ø Background Ø Preemptive Service Degradation
More informationPolarization, Partisanship and Junk News Consumption over Social Media in the US COMPROP DATA MEMO / FEBRUARY 6, 2018
Polarization, Partisanship and Junk News Consumption over Social Media in the US COMPROP DATA MEMO 2018.1 / FEBRUARY 6, 2018 Vidya Narayanan vidya.narayanan@oii.ox.ac.uk @vidunarayanan Bence Kollanyi bence.kollanyi@oii.ox.ac.uk
More informationIterated Prisoner s Dilemma on Alliance Networks
Iterated Prisoner s Dilemma on Alliance Networks Tomoki Furukawazono Graduate School of Media and Governance, Keio University, zono@sfc.keio.ac.jp Yusuke Takada Faculty of Policy Management, Keio University,
More informationJunk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans
Junk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans COMPROP DATA MEMO 2017.9 / 09 OCTOBER 2017 John D. Gallacher Oxford
More informationHow to Change a Group s Collective Decision?
How to Change a Group s Collective Decision? Noam Hazon 1 Raz Lin 1 1 Department of Computer Science Bar-Ilan University Ramat Gan Israel 52900 {hazonn,linraz,sarit}@cs.biu.ac.il Sarit Kraus 1,2 2 Institute
More informationarxiv: v5 [cs.gt] 21 Jun 2014
Schulze and Ranked-Pairs Voting Are Fixed-Parameter Tractable to Bribe, Manipulate, and Control arxiv:1210.6963v5 [cs.gt] 21 Jun 2014 Lane A. Hemaspaandra, Rahman Lavaee Department of Computer Science
More informationComparison Sorts. EECS 2011 Prof. J. Elder - 1 -
Comparison Sorts - 1 - Sorting Ø We have seen the advantage of sorted data representations for a number of applications q Sparse vectors q Maps q Dictionaries Ø Here we consider the problem of how to efficiently
More informationSupport Vector Machines
Support Vector Machines Linearly Separable Data SVM: Simple Linear Separator hyperplane Which Simple Linear Separator? Classifier Margin Objective #1: Maximize Margin MARGIN MARGIN How s this look? MARGIN
More informationRandom Forests. Gradient Boosting. and. Bagging and Boosting
Random Forests and Gradient Boosting Bagging and Boosting The Bootstrap Sample and Bagging Simple ideas to improve any model via ensemble Bootstrap Samples Ø Random samples of your data with replacement
More informationHPCG on Tianhe2. Yutong Lu 1,Chao Yang 2, Yunfei Du 1
HPCG on 2 Yutong Lu 1,Chao Yang 2, Yunfei Du 1 1, Changsha, Hunan, China 2 Institute of Software, CAS, Beijing, China Outline r HPCG result overview on -2 r Key Optimization works Ø Hybrid HPCG:CPU+MIC
More informationData manipulation in the Mexican Election? by Jorge A. López, Ph.D.
Data manipulation in the Mexican Election? by Jorge A. López, Ph.D. Many of us took advantage of the latest technology and followed last Sunday s elections in Mexico through a novel method: web postings
More informationPathbreakers? Women's Electoral Success and Future Political Participation
Pathbreakers? Women's Electoral Success and Future Political Participation Sonia Bhalotra, University of Essex Irma Clots-Figueras, Universidad Carlos III de Madrid Lakshmi Iyer, University of Notre Dame
More informationA Calculus for End-to-end Statistical Service Guarantees
A Calculus for End-to-end Statistical Service Guarantees Technical Report: University of Virginia, CS-2001-19 (2nd revised version) Almut Burchard Ý Jörg Liebeherr Stephen Patek Ý Department of Mathematics
More informationCSE 308, Section 2. Semester Project Discussion. Session Objectives
CSE 308, Section 2 Semester Project Discussion Session Objectives Understand issues and terminology used in US congressional redistricting Understand top-level functionality of project system components
More informationEvent Based Sequential Program Development: Application to Constructing a Pointer Program
Event Based Sequential Program Development: Application to Constructing a Pointer Program Jean-Raymond Abrial Consultant, Marseille, France jr@abrial.org Abstract. In this article, I present an event approach
More informationAdaptive QoS Control for Real-Time Systems
Adaptive QoS Control for Real-Time Systems Chenyang Lu CSE 520S Challenges Ø Classical real-time scheduling theory relies on accurate knowledge about workload and platform. New challenges under uncertainties
More informationRecommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012
Recommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012 Abstract In this paper we attempt to develop an algorithm to generate a set of post recommendations
More informationReal- Time Wireless Control Networks for Cyber- Physical Systems
Real- Time Wireless Control Networks for Cyber- Physical Systems Chenyang Lu Cyber- Physical Systems Laboratory Department of Computer Science and Engineering Wireless Control Networks Ø Real-time Ø Reliability
More informationFile Systems: Fundamentals
File Systems: Fundamentals 1 Files What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type, location, size, protection, creator,
More informationThe usage of electronic voting is spreading because of the potential benefits of anonymity,
How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic
More informationCloud Tutorial: AWS IoT. TA for class CSE 521S, Fall, Jan/18/2018 Haoran Li
Cloud Tutorial: AWS IoT TA for class CSE 521S, Fall, Jan/18/2018 Haoran Li Pointers Ø Amazon IoT q http://docs.aws.amazon.com/iot/latest/developerguide/what-isaws-iot.html Ø Amazon EC2 q http://docs.aws.amazon.com/awsec2/latest/userguide/
More informationAlgorithms, Games, and Networks February 7, Lecture 8
Algorithms, Games, and Networks February 7, 2013 Lecturer: Ariel Procaccia Lecture 8 Scribe: Dong Bae Jun 1 Overview In this lecture, we discuss the topic of social choice by exploring voting rules, axioms,
More informationECN MODEL LENIENCY PROGRAMME
ECN MODEL LENIENCY PROGRAMME I. INTRODUCTION 1. In a system of parallel competences between the Commission and National Competition Authorities, an application for leniency 1 to one authority is not to
More informationAdapting the Social Network to Affect Elections
Adapting the Social Network to Affect Elections Sigal Sina Dept of Computer Science Bar Ilan University, Israel sinasi@macs.biu.ac.il Noam Hazon Dept of Computer Science and Mathematics Ariel University,
More informationSocially-Informed Timeline Generation for Complex Events
Socially-Informed Timeline Generation for Complex Events Lu Wang, Claire Cardie, and Galen Marchetti Department of Computer Science Cornell University Timelines [Joseph Priestley's A New Chart of History,
More informationCountering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary
Countering Adversary Attacks on Democracy Thought Leader Summary In 2016, Russia, in an unprecedented way, massively interfered with our elections in a way that was better organized, better coordinated
More informationExploring QR Factorization on GPU for Quantum Monte Carlo Simulation
Exploring QR Factorization on GPU for Quantum Monte Carlo Simulation Tyler McDaniel Ming Wong Mentors: Ed D Azevedo, Ying Wai Li, Kwai Wong Quantum Monte Carlo Simulation Slater Determinant for N-electrons
More informationInfluence in Social Networks
CSCI 3210: Computational Game Theory Influence Games Ref: Irfan & Ortiz, AI (2014) Reading: Sections 1 3(up to pg. 86), Sections 4.5, 5 (no proof), 6 bowdoin.edu/~mirfan/papers/irfan_ortiz_influence_games_ai2014.pdf
More informationAnalyzing and Representing Two-Mode Network Data Week 8: Reading Notes
Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes Wasserman and Faust Chapter 8: Affiliations and Overlapping Subgroups Affiliation Network (Hypernetwork/Membership Network): Two mode
More informationAutomated Classification of Congressional Legislation
Automated Classification of Congressional Legislation Stephen Purpura John F. Kennedy School of Government Harvard University +-67-34-2027 stephen_purpura@ksg07.harvard.edu Dustin Hillard Electrical Engineering
More informationANALYSIS OF SOCIAL INTERACTIONS IN A SOCIAL NEWS APPLICATION
Association for Information Systems AIS Electronic Library (AISeL) MCIS 2011 Proceedings Mediterranean Conference on Information Systems (MCIS) 2011 ANALYSIS OF SOCIAL INTERACTIONS IN A SOCIAL NEWS APPLICATION
More informationMidterm Review. EECS 2011 Prof. J. Elder - 1 -
Midterm Review - 1 - Topics on the Midterm Ø Data Structures & Object-Oriented Design Ø Run-Time Analysis Ø Linear Data Structures Ø The Java Collections Framework Ø Recursion Ø Trees Ø Priority Queues
More informationComplexity of Strategic Behavior in Multi-Winner Elections
Journal of Artificial Intelligence Research 33 (2008) 149 178 Submitted 03/08; published 09/08 Complexity of Strategic Behavior in Multi-Winner Elections Reshef Meir Ariel D. Procaccia Jeffrey S. Rosenschein
More informationIntegrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks
Proc. 2018 IEEE International Symposium on Technologies for Homeland Security (HST'18),Woburn, MA, Oct. 23-24, 2018 received the Best Paper Award in the Land/Maritime Borders and Critical Infrastructure
More informationControl Complexity of Schulze Voting
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Control Complexity of Schulze Voting Curtis Menton 1 and Preetjot Singh 2 1 Dept. of Comp. Sci., University of
More informationSTUDY GUIDE FOR TEST 2
STUDY GUIDE FOR TEST 2 MATH 303. SPRING 2006. INSTRUCTOR: PROFESSOR AITKEN The test will cover Chapters 4, 5, and 6. Chapter 4: The Mathematics of Voting Sample Exercises: 1, 3, 5, 7, 8, 10, 14, 15, 17,
More informationComparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams
CBT DESIGNS FOR CREDENTIALING 1 Running head: CBT DESIGNS FOR CREDENTIALING Comparison of the Psychometric Properties of Several Computer-Based Test Designs for Credentialing Exams Michael Jodoin, April
More informationPublic Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 22 4/10/2017. Instructor: Prof. Menzie Chinn UW Madison Spring 2017
Public Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 22 4/10/2017 Instructor: Prof. Menzie Chinn UW Madison Spring 2017 Outline Immigration FDI 2 Outline Topic: The movement
More informationThe NRA and Gun Control ADPR 5750 Spring 2016
The NRA and Gun Control ADPR 5750 Spring 2016 Tyler Badger, Dan Clifford, Aaron Klein, Katie Moseley Social Media Engagement & Evaluation Table of Contents Executive Summary - 3 Suggested Goals - 4 Research
More informationVoteCastr methodology
VoteCastr methodology Introduction Going into Election Day, we will have a fairly good idea of which candidate would win each state if everyone voted. However, not everyone votes. The levels of enthusiasm
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationPublic Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 23 4/18/2018. Instructor: Prof. Menzie Chinn UW Madison Spring 2018
Public Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 23 4/18/2018 Instructor: Prof. Menzie Chinn UW Madison Spring 2018 Outline Immigration FDI 2 Outline Topic: The movement
More informationGeneralized Scoring Rules: A Framework That Reconciles Borda and Condorcet
Generalized Scoring Rules: A Framework That Reconciles Borda and Condorcet Lirong Xia Harvard University Generalized scoring rules [Xia and Conitzer 08] are a relatively new class of social choice mechanisms.
More informationWind power integration and consumer behavior: a complementarity approach
1 Wind power integration and consumer behavior: a complementarity approach 8 th Annual Trans-Atlantic INFRADAY Conference on Energy November 7 th, 2014 Ali Daraeepour, Duke University Dr. Jalal Kazempour,
More informationHead, Financial Crime Control (FCC) Supported by: Operational Risk & Compliance Committee (ORCC)
Policy: Type: Policy Owner: Whistle blowing Governance & Assurance Head, Financial Crime Control (FCC) Supported by: Operational Risk & Compliance Committee (ORCC) Date: 18 July 2014 Supported by: Executive
More information2011 The Pursuant Group, Inc.
Using Facebook & Social Media to Power Up your Engagement Barbara Talisman Initiate the Relationship Initiate the Relationship by reaching out to the places where your target audience aggregates Motivate
More informationDU PhD in Home Science
DU PhD in Home Science Topic:- DU_J18_PHD_HS 1) Electronic journal usually have the following features: i. HTML/ PDF formats ii. Part of bibliographic databases iii. Can be accessed by payment only iv.
More informationLegislative Brief The Information Technology (Amendment) Bill, 2006
Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information
More informationFRIEND OR FAUX? Teaching students to separate fact from fiction in the age of Fake News.
FRIEND OR FAUX? Teaching students to separate fact from fiction in the age of Fake News. Prairie Public Education Services Our mission is to help kids succeed in school and in life. We promote school-readiness
More informationOn the Complexity of Voting Manipulation under Randomized Tie-Breaking
Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence On the Complexity of Voting Manipulation under Randomized Tie-Breaking Svetlana Obraztsova Edith Elkind School
More informationUnderstanding New Attacks on Section 230 Immunity
BROOKSPIERCE.COM Understanding New Attacks on Section 230 Immunity Eric M. David March 16, 2017 Subscribe to News and Insights Via RSS Via Email This article was originally published in Westlaw Journal,
More informationCase 3:13-cv REP-LO-AD Document Filed 10/07/15 Page 1 of 23 PageID# APPENDIX A: Richmond First Plan. Dem Lt. Dem Atty.
Case 3:13-cv-00678-REP-LO-AD Document 257-1 Filed 10/07/15 Page 1 of 23 PageID# 5828 APPENDIX A: Richmond First Plan District Gov 09 Lt Gov 09 Atty Gen 09 Pres 12 U.S. Sen 12 Pres 08 1 60.2 62.4 62.8 67.7
More informationWhy Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology
Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or
More informationWomen and Power: Unpopular, Unwilling, or Held Back? Comment
Women and Power: Unpopular, Unwilling, or Held Back? Comment Manuel Bagues, Pamela Campa May 22, 2017 Abstract Casas-Arce and Saiz (2015) study how gender quotas in candidate lists affect voting behavior
More informationA New Method of the Single Transferable Vote and its Axiomatic Justification
A New Method of the Single Transferable Vote and its Axiomatic Justification Fuad Aleskerov ab Alexander Karpov a a National Research University Higher School of Economics 20 Myasnitskaya str., 101000
More informationUpdate on Facebook s Civil Rights Audit
Update on Facebook s Civil Rights Audit I. A Note from Laura Murphy The call for a civil rights audit at Facebook reflects the deep concerns of U.S.-based advocacy groups who have rightly observed that,
More informationPriority Queues & Heaps
Priority Queues & Heaps - 1 - Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 2 - Outcomes Ø By understanding
More informationAn Investigation into a Circuit Based Supply Chain Analyzer for FPGAs
An Investigation into a Circuit Based Supply Chain Analyzer for FPGAs FPL-2016 9/1/2016 Jacob Couch 1 John Arkorian Staff Researchers 1 jacob.couch@jhuapl.edu What is the problem anyways? How can FPGAs
More informationHyo-Shin Kwon & Yi-Yi Chen
Hyo-Shin Kwon & Yi-Yi Chen Wasserman and Fraust (1994) Two important features of affiliation networks The focus on subsets (a subset of actors and of events) the duality of the relationship between actors
More information