Combating Friend Spam Using Social Rejections

Size: px
Start display at page:

Download "Combating Friend Spam Using Social Rejections"

Transcription

1 Combating Friend Spam Using Social Rejections Qiang Cao Duke University Michael Sirivianos Xiaowei Yang Kamesh Munagala Cyprus Univ. of Technology Duke University Duke University

2 Friend Spam in online social networks (OSNs) 2

3 Friend Spam in online social networks (OSNs) Friend spam: unwanted friend requests Fake account 3

4 Friend Spam in online social networks (OSNs) Friend spam: unwanted friend requests Ø Degrade user experience (e.g., annoying) Ø Introduce false OSN links Fake account 4

5 False OSN links are harmful Pollute the underlying social graph Ø Detrimental to social search and online ad targeting Ø Jeopardize online privacy and safety 5

6 False OSN links undermine the effectiveness of Sybil defense The defense relies on genuine social links Ø SybilLimit [S&P 08], SybilRank [NSDI 12] Ø # undetected Sybils (fake accounts) is bounded to O(log V ) per link between Sybils and legitimate users OSN links Non-Sybil region Sybil region 6

7 Existing counter- measures Privacy sexings for OSN users Ø Restrict requests only from friends of friends Ø Subtract from the openness of the OSN 7

8 Existing counter- measures Privacy sexings for OSN users Ø Restrict requests only from friends of friends Ø Subtract from the openness of the OSN Spam request filtering using machine learning (ML) Ø Facebook Immune System (SNS 11) Ø Individual user features are manipublable 8

9 Rejecto: Combating friend spam using social rejections 9

10 Observation: the cost of connecting to real users False OSN links come with social rejections Legitimate users Friend spammers 10

11 Observation: the cost of connecting to real users False OSN links come with social rejections Legitimate users Friend spammers 11

12 Observation: the cost of connecting to real users False OSN links come with social rejections Ø Social rejections: rejected, ignored, and reported requests Ø Spam requests are less likely to be accepted Legitimate users Friend spammers 12

13 Observation: the cost of connecting to real users False OSN links come with social rejections Ø Social rejections: rejected, ignored, and reported requests Ø Spam requests are less likely to be accepted Many rejections Legitimate users Friend spammers 13

14 Live fake accounts in the wild Each has a significant number of pending requests Ø Fake Facebook accounts from underground market Ø More measurement results in the paper Number of requests Pending requests Friends Anonymized fake account ID 14

15 How reliable is social rejection? AXackers inevitably trigger rejections Ø Disproportionally large number of accounts and requests Ø Requests inevitably hit cautious users Rejection towards innocent users is non- manipulable Ø A rejection is guarded by a feedback loop between the request sender and the receiver Ø Legitimate users rarely receive rejections Ø Fundamentally different from negative ratings on online services (e.g., YouTube) 15

16 Challenges to use social rejection AXack strategies Ø Collusion: fake accounts collude to accept requests Ø Arbitrarily boost the request acceptance rate of an individual account Ø Self- rejection: mimic legitimate users rejecting others Ø Whitewash the part of rejecting fake accounts System challenge Ø Gigantic user base with enormous requests and rejections 16

17 Rejecto in a nutshell A strategy- proof formulation Ø Graph cut on a rejection- augmented social graph Ø Low aggregate acceptance rate of the requests from spammers to legitimate users An effective and near- linear algorithm Ø Based on the Kernighan- Lin (KL) algorithm [The Bell System Technical Journal, 1970] A scalable implementation Ø Layered on top of Apache Spark [Zaharia et al. NSDI 12] 17

18 Outline Key insight System design Evaluation 18

19 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups 19

20 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups F ( H, S) Aggregate acceptance rate (AAR) F ( H, S) +!" R ( H, S) H S 20

21 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups F ( H, S) Aggregate acceptance rate (AAR) F ( H, S) +!" R ( H, S) H S 21

22 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups F ( H, S) Aggregate acceptance rate (AAR) F ( H, S) +!" R ( H, S) Fake accounts cannot arbitrarily improve AAR H S 22

23 Rejecto s formulation of spammer detection Main idea: put spamming accounts into groups F ( H, S) Aggregate acceptance rate (AAR) F ( H, S) +!" R ( H, S) Fake accounts cannot arbitrarily improve AAR H S 23

24 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted 24

25 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted 25

26 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted 26

27 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted 27

28 Spam requests lead to a low aggregate acceptance rate Lower than the requests from a set of legitimate users Ø Spam requests are less likely to be accepted A small AAR ratio cut 28

29 A graph cut model Augments a social graph with rejections Ø Directed rejection edges Finds the cut with the minimum aggregate acceptance rate (MAAR) Ø Graph partitioning based on requests and rejections Iteratively cuts off groups of suspicious accounts Ø Prunes their links and rejections from the social graph 29

30 A graph cut model Augments a social graph with rejections Immune to collusion and self-rejection strategies Ø Directed rejection edges Finds the cut with the minimum aggregate acceptance rate (MAAR) Ø Graph partitioning based on requests and rejections Iteratively cuts off groups of suspicious accounts Ø Prunes their links and rejections from the social graph 30

31 Outline Key insight System design Evaluation 31

32 Finding the MAAR cut MAAR cut is NP- hard is challenging Ø Reduced from MIN- RATIO- CUT problem [Leighton & Rao, JACM 79] Ø Detailed reduction in the paper Existing work on cut- based problems in undirected graphs Ø State of the art: O(log V ) approximation algorithms with complexity of O( V 2 ) [Madry, FOCS 10] 32

33 Finding the MAAR cut MAAR cut is NP- hard is challenging Ø Reduced from MIN- RATIO- CUT problem [Leighton & Rao, Ø The JACM 79] approximation factor O(log V ) is too loose Ø Detailed Ø O( V reduction 2 ) complexity in the is paper prohibitive Ø Do not support parallel graph processing Existing work on cut- based problems in undirected graphs Ø State of the art: O(log V ) approximation algorithms with complexity of O( V 2 ) [Madry, FOCS 10] 33

34 Our approach: an effective and efficient search algorithm Finds a MAAR cut by interchanging misplaced nodes Ø Based on the Kernighan- Lin (KL) algorithm Ø O( V ) complexity Ø Can scale up to multimillion- node social graphs 34

35 Our approach: an effective and efficient search algorithm Finds a MAAR cut by interchanging misplaced nodes Ø Based on the Kernighan- Lin (KL) algorithm Ø O( V ) complexity Ø Can scale up to multimillion- node social graphs 35

36 A primer on the Kernighan- Lin (KL) algorithm Searches a balanced cut in undirected graphs Ø Minimizes #cross- partition edges Ø Reduces cross- partition edges by swapping nodes Ø Fudiccia et al. improved to O( V ) [DAC 82] Ø Widely used in VLSI layout design U V-U 36

37 A primer on the Kernighan- Lin (KL) algorithm Searches a balanced cut in undirected graphs Ø Minimizes #cross- partition edges Ø Reduces cross- partition edges by swapping nodes Ø Fudiccia et al. improved to O( V ) [DAC 82] How to use KL to find the MAAR cut? Ø Widely used in VLSI layout design Ø Additional directed rejection edges Ø Non- linear MAAR objective function U V-U 37

38 Transforming the MAAR cut problem Convert to a set of bipartition problems Ø Each with a parameterized linear objective function Ø Rejection and social links can be unified F ( V S, S) ( ) +!" R ( V S, S) F V S, S F ( V S, S) k!" R ( V S, S) Solvable by KL after unifying the rejections and OSN links according to the parameter k 38

39 Why can we do the transformation? The MAAR cut is an optimal solution to one of the converted family of bipartition problems Ø The converted problem is determined by the MAAR cut ratio k* Theorem: In a rejection- augmented social graph, if the cut C * = U *,U * is the minimum aggregate acceptance rate (MAAR) cut, and F ( U *,U * ) = k * (k* > 0),!" * R U,U * C* is the optimal solution to the bipartition problem that minimizes. ( ) k * R!" U,U F U,U 39

40 Optimization and implementation Support seed pre- placement to reduce false positives Ø Seeds of both legitimate users and spamming accounts Prototype on Apache Spark Ø Distribute the large social graph to workers Ø Keep only a tractable set of algorithm states on the master 40

41 Outline Key insight System design Evaluation 41

42 Evaluation Extensive simulations on real social networks Ø Sensitivity analysis Ø Resilience to axack strategies Ø Compared to VoteTrust Simulations under Sybil axack Ø In- depth defense with social- graph- based Sybil defense A Rejecto prototype on an Amazon EC2 cluster Ø Performance analysis on large graph processing 42

43 Rejecto is insensitive to spam request volume Request flooding axacks on a Facebook sample graph Ø Fake accounts connect with each other as normal users do Precision/recall Rejecto VoteTrust Number of requests per fake account All fake accounts send out spam requests Precision/recall Rejecto VoteTrust Number of requests per fake account Only half of the fake accounts send out spam requests 43

44 Precision/recall Rejecto is insensitive to spam request volume Request flooding axacks on a Facebook sample graph Ø Fake accounts connect with each other as normal users do Rejecto uncovers fakes behind 1 1 the actively spamming ones Rejecto Rejecto VoteTrust VoteTrust Number of requests per fake account Number of requests per fake account All fake accounts send out spam requests Precision/recall Only half of the fake accounts send out spam requests 44

45 Rejecto is resilient to a]ack strategies Our MAAR cut model is immune to manipulation Precision/recall Collusion strategy to form dense connections among fake accounts 0.6 Rejecto 0.4 VoteTrust # of non-attack edges per fake account Precision/recall Self-rejection strategy to let half of the fakes reject the rest as legitimate users do Rejecto VoteTrust Self-rejection rate among fake accounts 45

46 Rejecto and social- graph- based Sybil detection form a defense in depth Rejecto makes fakes hard to get additional links Ø Defense in depth with SybilRank Area under the ROC curve Facebook ca-astroph Number of accounts removed by Rejecto Improvement 46

47 Rejecto can handle multimillion- user social graphs Performance on an EC2 cluster Ø Spark Ø 5 c3.8xlarge VMs Ø A larger cluster yields bexer performance # Users 0.5M 1M 2M 5M 10M # Edges ~8M ~16M ~32M ~80M ~160M Execu5on 5me 288 sec 669 sec 1767 sec 8049 sec 7.7 hours 47

48 Rejecto can handle multimillion- user social graphs Performance on an EC2 cluster Ø Spark Execution time grows gracefully with the graph size Ø 5 c3.8xlarge VMs Ø A larger cluster yields bexer performance # Users 0.5M 1M 2M 5M 10M # Edges ~8M ~16M ~32M ~80M ~160M Execu5on 5me 288 sec 669 sec 1767 sec 8049 sec 7.7 hours 48

49 Conclusion Rejecto: uncovers friend spammers using social rejections Ø Immune to axack strategies Ø Efficient Ø Scalable 49

Computational challenges in analyzing and moderating online social discussions

Computational challenges in analyzing and moderating online social discussions Computational challenges in analyzing and moderating online social discussions Aristides Gionis Department of Computer Science Aalto University Machine learning coffee seminar Oct 23, 2017 social media

More information

The Australian Society for Operations Research

The Australian Society for Operations Research The Australian Society for Operations Research www.asor.org.au ASOR Bulletin Volume 34, Issue, (06) Pages -4 A minimum spanning tree with node index Elias Munapo School of Economics and Decision Sciences,

More information

Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg

Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg Yingwu Zhu Department of CSSE, Seattle University Seattle, WA 9822, USA zhuy@seattleu.edu ABSTRACT In online content voting

More information

Subreddit Recommendations within Reddit Communities

Subreddit Recommendations within Reddit Communities Subreddit Recommendations within Reddit Communities Vishnu Sundaresan, Irving Hsu, Daryl Chang Stanford University, Department of Computer Science ABSTRACT: We describe the creation of a recommendation

More information

VOTING DYNAMICS IN INNOVATION SYSTEMS

VOTING DYNAMICS IN INNOVATION SYSTEMS VOTING DYNAMICS IN INNOVATION SYSTEMS Voting in social and collaborative systems is a key way to elicit crowd reaction and preference. It enables the diverse perspectives of the crowd to be expressed and

More information

Learning Systems. Research at the Intersection of Machine Learning & Data Systems. Joseph E. Gonzalez

Learning Systems. Research at the Intersection of Machine Learning & Data Systems. Joseph E. Gonzalez Learning Systems Research at the Intersection of Machine Learning & Data Systems Joseph E. Gonzalez Asst. Professor, UC Berkeley jegonzal@cs.berkeley.edu How can machine learning techniques be used to

More information

Constraint satisfaction problems. Lirong Xia

Constraint satisfaction problems. Lirong Xia Constraint satisfaction problems Lirong Xia Spring, 2017 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions

More information

Michael Laver and Ernest Sergenti: Party Competition. An Agent-Based Model

Michael Laver and Ernest Sergenti: Party Competition. An Agent-Based Model RMM Vol. 3, 2012, 66 70 http://www.rmm-journal.de/ Book Review Michael Laver and Ernest Sergenti: Party Competition. An Agent-Based Model Princeton NJ 2012: Princeton University Press. ISBN: 9780691139043

More information

A Framework for the Quantitative Evaluation of Voting Rules

A Framework for the Quantitative Evaluation of Voting Rules A Framework for the Quantitative Evaluation of Voting Rules Michael Munie Computer Science Department Stanford University, CA munie@stanford.edu Yoav Shoham Computer Science Department Stanford University,

More information

Tengyu Ma Facebook AI Research. Based on joint work with Yuanzhi Li (Princeton) and Hongyang Zhang (Stanford)

Tengyu Ma Facebook AI Research. Based on joint work with Yuanzhi Li (Princeton) and Hongyang Zhang (Stanford) Tengyu Ma Facebook AI Research Based on joint work with Yuanzhi Li (Princeton) and Hongyang Zhang (Stanford) Ø Over-parameterization: # parameters # examples Ø a set of parameters that can Ø fit to training

More information

Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries

Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries Sebastian Goderbauer 1 Electoral Districts in Elections to

More information

Tengyu Ma Facebook AI Research. Based on joint work with Rong Ge (Duke) and Jason D. Lee (USC)

Tengyu Ma Facebook AI Research. Based on joint work with Rong Ge (Duke) and Jason D. Lee (USC) Tengyu Ma Facebook AI Research Based on joint work with Rong Ge (Duke) and Jason D. Lee (USC) Users Optimization Researchers function f Solution gradient descent local search Convex relaxation + Rounding

More information

Junk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans

Junk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans Junk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans COMPROP DATA MEMO 2017.9 / 09 OCTOBER 2017 John D. Gallacher Oxford

More information

Voting and Complexity

Voting and Complexity Voting and Complexity legrand@cse.wustl.edu Voting and Complexity: Introduction Outline Introduction Hardness of finding the winner(s) Polynomial systems NP-hard systems The minimax procedure [Brams et

More information

October Next Generation Smart Border Security Ability. Quality. Delivery.

October Next Generation Smart Border Security Ability. Quality. Delivery. October 2013 Next Generation Smart Border Security Ability. Quality. Delivery. Table of contents Introduction 4 Context 5 Risk strategy 6 Risk management 7 Information management 8 Data protection and

More information

Collective Decisions, Error and Trust in Wireless Networks

Collective Decisions, Error and Trust in Wireless Networks Collective Decisions, Error and Trust in Wireless Networks Arnold B. Urken Professor of Political Science Wireless Network Security Center Stevens Institute of Technology aurken@stevens.edu This research

More information

Minimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout

Minimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout Objec&ves Minimum Spanning Tree Union-Find Data Structure Feb, 0 CSCI - Sprenkle Started teasing out some algorithms. Laying Cable Focus on commonality: what should our final solution look like? Comcast

More information

Analysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow

Analysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow Analysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow Dana Movshovitz-Attias Yair Movshovitz-Attias Peter Steenkiste Christos Faloutsos August 27, 2013

More information

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Chuan Peng School of Computer science, Wuhan University Email: chuan.peng@asu.edu Kuai Xu, Feng Wang, Haiyan Wang

More information

ECE250: Algorithms and Data Structures Trees

ECE250: Algorithms and Data Structures Trees ECE250: Algorithms and Data Structures Trees Ladan Tahvildari, PEng, SMIEEE Professor Software Technologies Applied Research (STAR) Group Dept. of Elect. & Comp. Eng. University of Waterloo Materials from

More information

An Integrated Tag Recommendation Algorithm Towards Weibo User Profiling

An Integrated Tag Recommendation Algorithm Towards Weibo User Profiling An Integrated Tag Recommendation Algorithm Towards Weibo User Profiling Deqing Yang, Yanghua Xiao, Hanghang Tong, Junjun Zhang and Wei Wang School of Computer Science Shanghai Key Laboratory of Data Science

More information

Search Trees. Chapter 10. CSE 2011 Prof. J. Elder Last Updated: :51 PM

Search Trees. Chapter 10. CSE 2011 Prof. J. Elder Last Updated: :51 PM Search Trees Chapter 1 < 6 2 > 1 4 = 8 9-1 - Outline Ø Binary Search Trees Ø AVL Trees Ø Splay Trees - 2 - Binary Search Trees Ø A binary search tree is a binary tree storing key-value entries at its internal

More information

Coalitional Game Theory for Communication Networks: A Tutorial

Coalitional Game Theory for Communication Networks: A Tutorial Coalitional Game Theory for Communication Networks: A Tutorial Walid Saad 1, Zhu Han 2, Mérouane Debbah 3, Are Hjørungnes 1 and Tamer Başar 4 1 UNIK - University Graduate Center, University of Oslo, Kjeller,

More information

Fall Detection for Older Adults with Wearables. Chenyang Lu

Fall Detection for Older Adults with Wearables. Chenyang Lu Fall Detection for Older Adults with Wearables Chenyang Lu Internet of Medical Things Ø Wearables: wristbands, smart watches q Continuous monitoring q Sensing: activity, heart rate, sleep, (pulse-ox, glucose

More information

Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3)

Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) B.Y. Choueiry 1 Instructor s notes #5 Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) Introduction to Artificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/~choueiry/f17-476-876

More information

A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset

A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset Sisi Xiong*, Feiyi Wang + and Qing Cao* *University of Tennessee Knoxville, Knoxville, TN, USA + Oak Ridge National Laboratory,

More information

Police patrol districting method and simulation evaluation using agent-based model & GIS

Police patrol districting method and simulation evaluation using agent-based model & GIS Zhang and Brown Security Informatics 2013, 2:7 RESEARCH Open Access Police patrol districting method and simulation evaluation using agent-based model & GIS Yue Zhang * and Donald E Brown Abstract Police

More information

Optimizing space-based microlensing exoplanet surveys

Optimizing space-based microlensing exoplanet surveys Optimizing space-based microlensing exoplanet surveys Eamonn Kerins Univ. Manchester Euclid Exoplanet Working Group WFIRST Exoplanet Task Group VVV Science Team Microlensing and exoplanets Kepler transit

More information

Designing police patrol districts on street network

Designing police patrol districts on street network Designing police patrol districts on street network Huanfa Chen* 1 and Tao Cheng 1 1 SpaceTimeLab for Big Data Analytics, Department of Civil, Environmental, and Geomatic Engineering, University College

More information

Game Theory. Jiang, Bo ( 江波 )

Game Theory. Jiang, Bo ( 江波 ) Game Theory Jiang, Bo ( 江波 ) Jiang.bo@mail.shufe.edu.cn Mechanism Design in Voting Majority voting Three candidates: x, y, z. Three voters: a, b, c. Voter a: x>y>z; voter b: y>z>x; voter c: z>x>y What

More information

Cluster Analysis. (see also: Segmentation)

Cluster Analysis. (see also: Segmentation) Cluster Analysis (see also: Segmentation) Cluster Analysis Ø Unsupervised: no target variable for training Ø Partition the data into groups (clusters) so that: Ø Observations within a cluster are similar

More information

Hoboken Public Schools. Project Lead The Way Curriculum Grade 8

Hoboken Public Schools. Project Lead The Way Curriculum Grade 8 Hoboken Public Schools Project Lead The Way Curriculum Grade 8 Project Lead The Way HOBOKEN PUBLIC SCHOOLS Course Description PLTW Gateway s 9 units empower students to lead their own discovery. The hands-on

More information

Coalitional Game Theory

Coalitional Game Theory Coalitional Game Theory Game Theory Algorithmic Game Theory 1 TOC Coalitional Games Fair Division and Shapley Value Stable Division and the Core Concept ε-core, Least core & Nucleolus Reading: Chapter

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et

More information

Randomized Pursuit-Evasion in Graphs

Randomized Pursuit-Evasion in Graphs Randomized Pursuit-Evasion in Graphs Micah Adler, Harald Räcke ¾, Naveen Sivadasan, Christian Sohler ¾, and Berthold Vöcking ¾ Department of Computer Science University of Massachusetts, Amherst, micah@cs.umass.edu

More information

Polydisciplinary Faculty of Larache Abdelmalek Essaadi University, MOROCCO 3 Department of Mathematics and Informatics

Polydisciplinary Faculty of Larache Abdelmalek Essaadi University, MOROCCO 3 Department of Mathematics and Informatics International Journal of Pure and Applied Mathematics Volume 115 No. 4 2017, 801-812 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 10.12732/ijpam.v115i4.13

More information

Game theoretical techniques have recently

Game theoretical techniques have recently [ Walid Saad, Zhu Han, Mérouane Debbah, Are Hjørungnes, and Tamer Başar ] Coalitional Game Theory for Communication Networks [A tutorial] Game theoretical techniques have recently become prevalent in many

More information

NEW PERSPECTIVES ON THE LAW & ECONOMICS OF ELECTIONS

NEW PERSPECTIVES ON THE LAW & ECONOMICS OF ELECTIONS NEW PERSPECTIVES ON THE LAW & ECONOMICS OF ELECTIONS! ASSA EARLY CAREER RESEARCH AWARD: PANEL B Richard Holden School of Economics UNSW Business School BACKDROP Long history of political actors seeking

More information

Uninformed search. Lirong Xia

Uninformed search. Lirong Xia Uninformed search Lirong Xia Spring, 2017 Today s schedule ØRational agents ØSearch problems State space graph: modeling the problem Search trees: scratch paper for solution ØUninformed search Depth first

More information

Last Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs

Last Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs Last Time u Embedded networks Ø Characteristics Ø Requirements Ø Simple embedded LANs Bit banged SPI I2C LIN Ethernet Today u CAN Bus Ø Intro Ø Low-level stuff Ø Frame types Ø Arbitration Ø Filtering Ø

More information

THE PRIMITIVES OF LEGAL PROTECTION AGAINST DATA TOTALITARIANISMS

THE PRIMITIVES OF LEGAL PROTECTION AGAINST DATA TOTALITARIANISMS THE PRIMITIVES OF LEGAL PROTECTION AGAINST DATA TOTALITARIANISMS Mireille Hildebrandt Research Professor at Vrije Universiteit Brussel (Law) Parttime Full Professor at Radboud University Nijmegen (CS)

More information

Quality of Service in Optical Telecommunication Networks

Quality of Service in Optical Telecommunication Networks Quality of Service in Optical Telecommunication Networks Periodic Summary & Future Research Ideas Zhizhen Zhong 2015.08.28 @Networks Lab Group Meeting 1 Outline Ø Background Ø Preemptive Service Degradation

More information

Polarization, Partisanship and Junk News Consumption over Social Media in the US COMPROP DATA MEMO / FEBRUARY 6, 2018

Polarization, Partisanship and Junk News Consumption over Social Media in the US COMPROP DATA MEMO / FEBRUARY 6, 2018 Polarization, Partisanship and Junk News Consumption over Social Media in the US COMPROP DATA MEMO 2018.1 / FEBRUARY 6, 2018 Vidya Narayanan vidya.narayanan@oii.ox.ac.uk @vidunarayanan Bence Kollanyi bence.kollanyi@oii.ox.ac.uk

More information

Iterated Prisoner s Dilemma on Alliance Networks

Iterated Prisoner s Dilemma on Alliance Networks Iterated Prisoner s Dilemma on Alliance Networks Tomoki Furukawazono Graduate School of Media and Governance, Keio University, zono@sfc.keio.ac.jp Yusuke Takada Faculty of Policy Management, Keio University,

More information

Junk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans

Junk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans Junk News on Military Affairs and National Security: Social Media Disinformation Campaigns Against US Military Personnel and Veterans COMPROP DATA MEMO 2017.9 / 09 OCTOBER 2017 John D. Gallacher Oxford

More information

How to Change a Group s Collective Decision?

How to Change a Group s Collective Decision? How to Change a Group s Collective Decision? Noam Hazon 1 Raz Lin 1 1 Department of Computer Science Bar-Ilan University Ramat Gan Israel 52900 {hazonn,linraz,sarit}@cs.biu.ac.il Sarit Kraus 1,2 2 Institute

More information

arxiv: v5 [cs.gt] 21 Jun 2014

arxiv: v5 [cs.gt] 21 Jun 2014 Schulze and Ranked-Pairs Voting Are Fixed-Parameter Tractable to Bribe, Manipulate, and Control arxiv:1210.6963v5 [cs.gt] 21 Jun 2014 Lane A. Hemaspaandra, Rahman Lavaee Department of Computer Science

More information

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 -

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 - Comparison Sorts - 1 - Sorting Ø We have seen the advantage of sorted data representations for a number of applications q Sparse vectors q Maps q Dictionaries Ø Here we consider the problem of how to efficiently

More information

Support Vector Machines

Support Vector Machines Support Vector Machines Linearly Separable Data SVM: Simple Linear Separator hyperplane Which Simple Linear Separator? Classifier Margin Objective #1: Maximize Margin MARGIN MARGIN How s this look? MARGIN

More information

Random Forests. Gradient Boosting. and. Bagging and Boosting

Random Forests. Gradient Boosting. and. Bagging and Boosting Random Forests and Gradient Boosting Bagging and Boosting The Bootstrap Sample and Bagging Simple ideas to improve any model via ensemble Bootstrap Samples Ø Random samples of your data with replacement

More information

HPCG on Tianhe2. Yutong Lu 1,Chao Yang 2, Yunfei Du 1

HPCG on Tianhe2. Yutong Lu 1,Chao Yang 2, Yunfei Du 1 HPCG on 2 Yutong Lu 1,Chao Yang 2, Yunfei Du 1 1, Changsha, Hunan, China 2 Institute of Software, CAS, Beijing, China Outline r HPCG result overview on -2 r Key Optimization works Ø Hybrid HPCG:CPU+MIC

More information

Data manipulation in the Mexican Election? by Jorge A. López, Ph.D.

Data manipulation in the Mexican Election? by Jorge A. López, Ph.D. Data manipulation in the Mexican Election? by Jorge A. López, Ph.D. Many of us took advantage of the latest technology and followed last Sunday s elections in Mexico through a novel method: web postings

More information

Pathbreakers? Women's Electoral Success and Future Political Participation

Pathbreakers? Women's Electoral Success and Future Political Participation Pathbreakers? Women's Electoral Success and Future Political Participation Sonia Bhalotra, University of Essex Irma Clots-Figueras, Universidad Carlos III de Madrid Lakshmi Iyer, University of Notre Dame

More information

A Calculus for End-to-end Statistical Service Guarantees

A Calculus for End-to-end Statistical Service Guarantees A Calculus for End-to-end Statistical Service Guarantees Technical Report: University of Virginia, CS-2001-19 (2nd revised version) Almut Burchard Ý Jörg Liebeherr Stephen Patek Ý Department of Mathematics

More information

CSE 308, Section 2. Semester Project Discussion. Session Objectives

CSE 308, Section 2. Semester Project Discussion. Session Objectives CSE 308, Section 2 Semester Project Discussion Session Objectives Understand issues and terminology used in US congressional redistricting Understand top-level functionality of project system components

More information

Event Based Sequential Program Development: Application to Constructing a Pointer Program

Event Based Sequential Program Development: Application to Constructing a Pointer Program Event Based Sequential Program Development: Application to Constructing a Pointer Program Jean-Raymond Abrial Consultant, Marseille, France jr@abrial.org Abstract. In this article, I present an event approach

More information

Adaptive QoS Control for Real-Time Systems

Adaptive QoS Control for Real-Time Systems Adaptive QoS Control for Real-Time Systems Chenyang Lu CSE 520S Challenges Ø Classical real-time scheduling theory relies on accurate knowledge about workload and platform. New challenges under uncertainties

More information

Recommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012

Recommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012 Recommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012 Abstract In this paper we attempt to develop an algorithm to generate a set of post recommendations

More information

Real- Time Wireless Control Networks for Cyber- Physical Systems

Real- Time Wireless Control Networks for Cyber- Physical Systems Real- Time Wireless Control Networks for Cyber- Physical Systems Chenyang Lu Cyber- Physical Systems Laboratory Department of Computer Science and Engineering Wireless Control Networks Ø Real-time Ø Reliability

More information

File Systems: Fundamentals

File Systems: Fundamentals File Systems: Fundamentals 1 Files What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type, location, size, protection, creator,

More information

The usage of electronic voting is spreading because of the potential benefits of anonymity,

The usage of electronic voting is spreading because of the potential benefits of anonymity, How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic

More information

Cloud Tutorial: AWS IoT. TA for class CSE 521S, Fall, Jan/18/2018 Haoran Li

Cloud Tutorial: AWS IoT. TA for class CSE 521S, Fall, Jan/18/2018 Haoran Li Cloud Tutorial: AWS IoT TA for class CSE 521S, Fall, Jan/18/2018 Haoran Li Pointers Ø Amazon IoT q http://docs.aws.amazon.com/iot/latest/developerguide/what-isaws-iot.html Ø Amazon EC2 q http://docs.aws.amazon.com/awsec2/latest/userguide/

More information

Algorithms, Games, and Networks February 7, Lecture 8

Algorithms, Games, and Networks February 7, Lecture 8 Algorithms, Games, and Networks February 7, 2013 Lecturer: Ariel Procaccia Lecture 8 Scribe: Dong Bae Jun 1 Overview In this lecture, we discuss the topic of social choice by exploring voting rules, axioms,

More information

ECN MODEL LENIENCY PROGRAMME

ECN MODEL LENIENCY PROGRAMME ECN MODEL LENIENCY PROGRAMME I. INTRODUCTION 1. In a system of parallel competences between the Commission and National Competition Authorities, an application for leniency 1 to one authority is not to

More information

Adapting the Social Network to Affect Elections

Adapting the Social Network to Affect Elections Adapting the Social Network to Affect Elections Sigal Sina Dept of Computer Science Bar Ilan University, Israel sinasi@macs.biu.ac.il Noam Hazon Dept of Computer Science and Mathematics Ariel University,

More information

Socially-Informed Timeline Generation for Complex Events

Socially-Informed Timeline Generation for Complex Events Socially-Informed Timeline Generation for Complex Events Lu Wang, Claire Cardie, and Galen Marchetti Department of Computer Science Cornell University Timelines [Joseph Priestley's A New Chart of History,

More information

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary Countering Adversary Attacks on Democracy Thought Leader Summary In 2016, Russia, in an unprecedented way, massively interfered with our elections in a way that was better organized, better coordinated

More information

Exploring QR Factorization on GPU for Quantum Monte Carlo Simulation

Exploring QR Factorization on GPU for Quantum Monte Carlo Simulation Exploring QR Factorization on GPU for Quantum Monte Carlo Simulation Tyler McDaniel Ming Wong Mentors: Ed D Azevedo, Ying Wai Li, Kwai Wong Quantum Monte Carlo Simulation Slater Determinant for N-electrons

More information

Influence in Social Networks

Influence in Social Networks CSCI 3210: Computational Game Theory Influence Games Ref: Irfan & Ortiz, AI (2014) Reading: Sections 1 3(up to pg. 86), Sections 4.5, 5 (no proof), 6 bowdoin.edu/~mirfan/papers/irfan_ortiz_influence_games_ai2014.pdf

More information

Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes

Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes Wasserman and Faust Chapter 8: Affiliations and Overlapping Subgroups Affiliation Network (Hypernetwork/Membership Network): Two mode

More information

Automated Classification of Congressional Legislation

Automated Classification of Congressional Legislation Automated Classification of Congressional Legislation Stephen Purpura John F. Kennedy School of Government Harvard University +-67-34-2027 stephen_purpura@ksg07.harvard.edu Dustin Hillard Electrical Engineering

More information

ANALYSIS OF SOCIAL INTERACTIONS IN A SOCIAL NEWS APPLICATION

ANALYSIS OF SOCIAL INTERACTIONS IN A SOCIAL NEWS APPLICATION Association for Information Systems AIS Electronic Library (AISeL) MCIS 2011 Proceedings Mediterranean Conference on Information Systems (MCIS) 2011 ANALYSIS OF SOCIAL INTERACTIONS IN A SOCIAL NEWS APPLICATION

More information

Midterm Review. EECS 2011 Prof. J. Elder - 1 -

Midterm Review. EECS 2011 Prof. J. Elder - 1 - Midterm Review - 1 - Topics on the Midterm Ø Data Structures & Object-Oriented Design Ø Run-Time Analysis Ø Linear Data Structures Ø The Java Collections Framework Ø Recursion Ø Trees Ø Priority Queues

More information

Complexity of Strategic Behavior in Multi-Winner Elections

Complexity of Strategic Behavior in Multi-Winner Elections Journal of Artificial Intelligence Research 33 (2008) 149 178 Submitted 03/08; published 09/08 Complexity of Strategic Behavior in Multi-Winner Elections Reshef Meir Ariel D. Procaccia Jeffrey S. Rosenschein

More information

Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks

Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks Proc. 2018 IEEE International Symposium on Technologies for Homeland Security (HST'18),Woburn, MA, Oct. 23-24, 2018 received the Best Paper Award in the Land/Maritime Borders and Critical Infrastructure

More information

Control Complexity of Schulze Voting

Control Complexity of Schulze Voting Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Control Complexity of Schulze Voting Curtis Menton 1 and Preetjot Singh 2 1 Dept. of Comp. Sci., University of

More information

STUDY GUIDE FOR TEST 2

STUDY GUIDE FOR TEST 2 STUDY GUIDE FOR TEST 2 MATH 303. SPRING 2006. INSTRUCTOR: PROFESSOR AITKEN The test will cover Chapters 4, 5, and 6. Chapter 4: The Mathematics of Voting Sample Exercises: 1, 3, 5, 7, 8, 10, 14, 15, 17,

More information

Comparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams

Comparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams CBT DESIGNS FOR CREDENTIALING 1 Running head: CBT DESIGNS FOR CREDENTIALING Comparison of the Psychometric Properties of Several Computer-Based Test Designs for Credentialing Exams Michael Jodoin, April

More information

Public Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 22 4/10/2017. Instructor: Prof. Menzie Chinn UW Madison Spring 2017

Public Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 22 4/10/2017. Instructor: Prof. Menzie Chinn UW Madison Spring 2017 Public Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 22 4/10/2017 Instructor: Prof. Menzie Chinn UW Madison Spring 2017 Outline Immigration FDI 2 Outline Topic: The movement

More information

The NRA and Gun Control ADPR 5750 Spring 2016

The NRA and Gun Control ADPR 5750 Spring 2016 The NRA and Gun Control ADPR 5750 Spring 2016 Tyler Badger, Dan Clifford, Aaron Klein, Katie Moseley Social Media Engagement & Evaluation Table of Contents Executive Summary - 3 Suggested Goals - 4 Research

More information

VoteCastr methodology

VoteCastr methodology VoteCastr methodology Introduction Going into Election Day, we will have a fairly good idea of which candidate would win each state if everyone voted. However, not everyone votes. The levels of enthusiasm

More information

Secure Electronic Voting

Secure Electronic Voting Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,

More information

Public Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 23 4/18/2018. Instructor: Prof. Menzie Chinn UW Madison Spring 2018

Public Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 23 4/18/2018. Instructor: Prof. Menzie Chinn UW Madison Spring 2018 Public Affairs 856 Trade, Competition, and Governance in a Global Economy Lecture 23 4/18/2018 Instructor: Prof. Menzie Chinn UW Madison Spring 2018 Outline Immigration FDI 2 Outline Topic: The movement

More information

Generalized Scoring Rules: A Framework That Reconciles Borda and Condorcet

Generalized Scoring Rules: A Framework That Reconciles Borda and Condorcet Generalized Scoring Rules: A Framework That Reconciles Borda and Condorcet Lirong Xia Harvard University Generalized scoring rules [Xia and Conitzer 08] are a relatively new class of social choice mechanisms.

More information

Wind power integration and consumer behavior: a complementarity approach

Wind power integration and consumer behavior: a complementarity approach 1 Wind power integration and consumer behavior: a complementarity approach 8 th Annual Trans-Atlantic INFRADAY Conference on Energy November 7 th, 2014 Ali Daraeepour, Duke University Dr. Jalal Kazempour,

More information

Head, Financial Crime Control (FCC) Supported by: Operational Risk & Compliance Committee (ORCC)

Head, Financial Crime Control (FCC) Supported by: Operational Risk & Compliance Committee (ORCC) Policy: Type: Policy Owner: Whistle blowing Governance & Assurance Head, Financial Crime Control (FCC) Supported by: Operational Risk & Compliance Committee (ORCC) Date: 18 July 2014 Supported by: Executive

More information

2011 The Pursuant Group, Inc.

2011 The Pursuant Group, Inc. Using Facebook & Social Media to Power Up your Engagement Barbara Talisman Initiate the Relationship Initiate the Relationship by reaching out to the places where your target audience aggregates Motivate

More information

DU PhD in Home Science

DU PhD in Home Science DU PhD in Home Science Topic:- DU_J18_PHD_HS 1) Electronic journal usually have the following features: i. HTML/ PDF formats ii. Part of bibliographic databases iii. Can be accessed by payment only iv.

More information

Legislative Brief The Information Technology (Amendment) Bill, 2006

Legislative Brief The Information Technology (Amendment) Bill, 2006 Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information

More information

FRIEND OR FAUX? Teaching students to separate fact from fiction in the age of Fake News.

FRIEND OR FAUX? Teaching students to separate fact from fiction in the age of Fake News. FRIEND OR FAUX? Teaching students to separate fact from fiction in the age of Fake News. Prairie Public Education Services Our mission is to help kids succeed in school and in life. We promote school-readiness

More information

On the Complexity of Voting Manipulation under Randomized Tie-Breaking

On the Complexity of Voting Manipulation under Randomized Tie-Breaking Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence On the Complexity of Voting Manipulation under Randomized Tie-Breaking Svetlana Obraztsova Edith Elkind School

More information

Understanding New Attacks on Section 230 Immunity

Understanding New Attacks on Section 230 Immunity BROOKSPIERCE.COM Understanding New Attacks on Section 230 Immunity Eric M. David March 16, 2017 Subscribe to News and Insights Via RSS Via Email This article was originally published in Westlaw Journal,

More information

Case 3:13-cv REP-LO-AD Document Filed 10/07/15 Page 1 of 23 PageID# APPENDIX A: Richmond First Plan. Dem Lt. Dem Atty.

Case 3:13-cv REP-LO-AD Document Filed 10/07/15 Page 1 of 23 PageID# APPENDIX A: Richmond First Plan. Dem Lt. Dem Atty. Case 3:13-cv-00678-REP-LO-AD Document 257-1 Filed 10/07/15 Page 1 of 23 PageID# 5828 APPENDIX A: Richmond First Plan District Gov 09 Lt Gov 09 Atty Gen 09 Pres 12 U.S. Sen 12 Pres 08 1 60.2 62.4 62.8 67.7

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

Women and Power: Unpopular, Unwilling, or Held Back? Comment

Women and Power: Unpopular, Unwilling, or Held Back? Comment Women and Power: Unpopular, Unwilling, or Held Back? Comment Manuel Bagues, Pamela Campa May 22, 2017 Abstract Casas-Arce and Saiz (2015) study how gender quotas in candidate lists affect voting behavior

More information

A New Method of the Single Transferable Vote and its Axiomatic Justification

A New Method of the Single Transferable Vote and its Axiomatic Justification A New Method of the Single Transferable Vote and its Axiomatic Justification Fuad Aleskerov ab Alexander Karpov a a National Research University Higher School of Economics 20 Myasnitskaya str., 101000

More information

Update on Facebook s Civil Rights Audit

Update on Facebook s Civil Rights Audit Update on Facebook s Civil Rights Audit I. A Note from Laura Murphy The call for a civil rights audit at Facebook reflects the deep concerns of U.S.-based advocacy groups who have rightly observed that,

More information

Priority Queues & Heaps

Priority Queues & Heaps Priority Queues & Heaps - 1 - Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 2 - Outcomes Ø By understanding

More information

An Investigation into a Circuit Based Supply Chain Analyzer for FPGAs

An Investigation into a Circuit Based Supply Chain Analyzer for FPGAs An Investigation into a Circuit Based Supply Chain Analyzer for FPGAs FPL-2016 9/1/2016 Jacob Couch 1 John Arkorian Staff Researchers 1 jacob.couch@jhuapl.edu What is the problem anyways? How can FPGAs

More information

Hyo-Shin Kwon & Yi-Yi Chen

Hyo-Shin Kwon & Yi-Yi Chen Hyo-Shin Kwon & Yi-Yi Chen Wasserman and Fraust (1994) Two important features of affiliation networks The focus on subsets (a subset of actors and of events) the duality of the relationship between actors

More information