Assessment of Multi-Hop Interpersonal Trust in Social Networks by 3VSL
|
|
- Lionel Pearson
- 5 years ago
- Views:
Transcription
1 Assessment of Multi-Hop Interpersonal Trust in Social Networks by 3VSL Guangchi Liu, Qing Yang, Honggang Wang, Xiaodong Lin and Mike P. Wittie Presented by Guangchi Liu Department of Computer Science Montana State University Bozeman, MT, USA IEEE INFOCOM 2014, Toronto, CA
2 Motivation 2
3 Motivation Ask Yourself: How to trust someone you have never known before? Trustor? Trustee Alice David 3
4 Motivation Probably, If Trustor Trustee Alice Bob David Transitivity of Trust [1] [1] Falcone, Rino, and Cristiano Castelfranchi. "Transitivity in trust a discussed property." (2010). 4
5 Motivation Then, How Should Alice Trust David? Trustor Trustee Alice Bob? David 5
6 Motivation Complex Topology: Harder Cases?? Parallel Topology? Bridge Topology Arbitrary Topology 6
7 Motivation Finally, we could expect. Small World Network Six degrees of separation 7
8 Applications 8
9 Applications Consumer-to-Consumer Recommendation Systems Untrustworthy User Trustworthy User Seller Buyer 9
10 Applications Active Friending in OSNs [2] Weak Relation Strong Relation Trustworthy User Target User Finder [2] Yang, De-Nian, et al. "Maximizing acceptance probability for active friending in online social networks." Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM,
11 Applications Sybil Identification Untrustworthy User Trustworthy User Unknown user User? 11
12 Contributions 12
13 Contributions Methodology Three-Valued Subjective Logic (3VSL) Multi-hop trustworthiness assessment Advantage Applicable to Complex Topology Be able to handle any large scale social network Validation Real World Experiment 100+ participants in online survey 13
14 Related Works 14
15 Related Works 3VSL Bayesian Network Hidden Markov Model Subjective Logic Artificial Intelligence Methods Random Walk Community Analysis Graph Partitioning Graph Theory Methods 15
16 Three-Valued Subjective Logic (3VSL) 16
17 3VSL: Opinion Vector Interpersonal Trust: Is David telling the truth? Positive Uncertain Negative Impression Trustor Opinion Trustee Alice David 17
18 3VSL: Opinion Vector Mom Alice s Evidences: Posteriori Evidence? Interaction History Positive Uncertain Negative Impression 18
19 3VSL: Opinion Vector Stranger Alice s Evidences: Priori Evidence Cognition in Mind Positive Uncertain Negative Impression 19
20 3VSL: Opinion Vector Priori Evidence Posteriori Evidence Positive Uncertain Negative Impression 20
21 3VSL: Opinion Vector Dirichlet Distribution: + f ( p, p,, ) (1 p p ) p p B(,, ) Positive Uncertain Negative p 1 p 2 p 3 # # # : P 1 P P
22 3VSL: Opinion Vector 1 f ( p, p,, ) (1 p p ) p p B(,, ) Positive Uncertain Negative EP ( ) 1 EP ( 2) = EP ( ) 3 # # + # + # # # + # + # # # + # + # 22
23 3VSL: Opinion Vector Positive EP ( ) 1 Uncertain 2 Negative EP ( ) EP ( 3) Impression # # + # + # # # + # + # # # + # + # # + # + # Positive # + # + # # + # + # # + # + # Pos-uncertain Negative
24 3VSL: Opinion Vector Opinion Vector A b X Positive n A X Pos-uncertain A d X Negative A e X A a X Impression 1 A A A A A A X X X X X X [ b, d, n, e, a ] A Opinion 24 X
25 3VSL: Opinion Vector Expected Belief Positive Pos-uncertain Negative Impression 1 E( ) b a n e 3 A A A A A X X X X X A X 25
26 3VSL: Opinion Vector Is David telling the truth? Opinion of David s Mom E( ) Opinion of a Stranger E( )
27 Multi-hop Trust Computation in OSNs: w v i e v j G(V, E, W) v? u 27
28 3VSL: Discounting Operation Operation for Trust Propagation 28
29 3VSL: Discounting Operation A D Alice A B Bob B D David Positive Uncertain Negative Positive Uncertain Negative 29
30 3VSL: Discounting Operation A B B D? A D Positive? Uncertain Negative 30
31 3VSL: Discounting Operation B D A D Distortion Alice A B Bob B D David 31
32 3VSL: Discounting Operation Absorbing Process Hop # Alice A D David 2 Hops Bob B D David 1 Hop 32
33 3VSL: Discounting Operation A B Discounting Operation: (, ) B D A A B (, ) D B D A B B D Alice Bob David A [ b A, d A, n A, e A, a A ] B B B B B B A A B bd bb bd A A B dd bb dd (, ) n 1 b d e A B ed ed A A ad ad A B A A A B B D D D D D B [ b B, d B, n B, e B, a B ] D D D D D D 33
34 3VSL: Combining Operation Operation for Trust Fusion 34
35 3VSL: Combining Operation A 1 D A D Alice David A 2 D A 1 D A 2 D Positive Positive Uncertain Uncertain Negative Negative 35
36 3VSL: Combining Operation Posteriori Evidences Priori Evidences A 1 D A 1 D Positive + Positive Pos-uncertain Negative + + Pos-uncertain Negative Independent Evidences Dependent Evidences Positive Pos-uncertain Negative A D Positive Pos-uncertain Normalize Negative 36
37 3VSL: Combining Operation A1 A2 Combining Operation: (, ) Alice A1 A2 (, ) A D D D A 1 D A 2 D David [ b, d, n, e, a ] A D D D D D D A A A A A A D D D D D D [ b, d, n, e, a ] D D b d 1 2 (, ) n A1 A2 A2 A1 A D D D D D A A A A ed ed ed ed A1 A2 A2 A1 A D D D D D A A A A ed ed ed ed A1 A2 A2 A1 A A A D D D D D D D A A A A ed ed ed ed e a A2 A1 A D D D A A A A ed ed ed ed A D a b e A D b e d e d e n e e e n e
38 3VSL: Property Method 1: A B1 A B2 ( (, ), (, )) B C B C Method 2: A B1 B2 (, (, ) B C C Step.1 Step.1 Step.2 Equivalent Step.2 Step.3 38
39 3VSL: Topologies Bridge Topology Arbitrary Topology Large Social Networks 39
40 Evaluation 40
41 Evaluation: Real World Validation Goal Accuracy of 3VSL in Real Social Network Topology Method : Online Questionnaire [3,4] (100+ samples) 1. Error = ( ) ( ) 2. Error = ( ) ( ) [3]. Xiaoming Li and Guangchi Liu. Online Trust Survey [4]. C. Johnson-George and W. C. Swap, Measurement of specific interpersonal trust: Construction and validation of a scale to assess trust in a specific other. Journal of Personality and Social Psychology, vol. 43, no. 6, pp ,
42 Evaluation: Real World Validation 42
43 Evaluation: Numerical Analysis Goal 3VSL Vs. Common Sense Topology Method E( )? 43
44 Evaluation: Numerical Analysis E( )? 44
45 Evaluation: Numerical Analysis E( )?
46 Evaluation: Numerical Analysis E( )? 46
47 Conclusion 47
48 Conclusion Three-Valued Subjective Logic 48
49 Thank You! Q & A Guangchi Liu (Luke) 刘光迟 ( 劉光遲 ) Networking Lab, Dept. of Computer Science Montana State University, MT, United States LinkedIn: guangchi.liu@msu.montana.edu IEEE INFOCOM 2014, Toronto, CA
50 Backup I Trust Trust (Cognitive) Trust (Probabilistic) 50
51 Backup II Single hop trust assessment Wang, Yao, and Julita Vassileva. "Trust and reputation model in peer-to-peer networks." Multi Hop Trust Computation Jøsang, Audun. "A logic for uncertain probabilities." Bayesian Network Trust Assessment (AI Methods) Subjective Logic (SL) HMM Model Dynamic of Trust ElSalamouny, Ehab, Vladimiro Sassone, and Mogens Nielsen. "HMM-based trust model." 51
52 Backup III Subjective Logic 3VSL (, ) 1 2 (, ) 1 2 Collapse Constant Large Social Networks Large Social Networks 52
Computational Trust. Perspectives in Concurrency Theory Chennai December Mogens Nielsen University of Aarhus DK
Computational Trust Perspectives in Concurrency Theory Chennai December 2008 Mogens Nielsen University of Aarhus DK 1 Plan of talk 1. Computational Trust and Ubiquitous Computing - a brief survey 2. Computational
More informationA Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks
A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks Joydeep Chandra 1, Ingo Scholtes 2, Niloy Ganguly 1, Frank Schweitzer 2 1 - Dept. of Computer Science and Engineering,
More informationInteract with Strangers
Interact with Strangers RATE: Recommendation-aware Trust Evaluation in Online Social Networks Wenjun Jiang 1, 2, Jie Wu 2, and Guojun Wang 1 1. School of Information Science and Engineering, Central South
More informationMULTINOMIAL AGENT S TRUST MODELING USING ENTROPY OF THE DIRICHLET DISTRIBUTION
MULTINOMIAL AGENT S TRUST MODELING USING ENTROPY OF THE DIRICHLET DISTRIBUTION Mohammad Anisi 1 and Morteza Analoui 2 1 School of Computer Engineering, Iran University of Science and Technology, Narmak,
More informationSocial Interaction Based Video Recommendation: Recommending YouTube Videos to Facebook Users
Social Interaction Based Video Recommendation: Recommending YouTube Videos to Facebook Users Bin Nie 1 Honggang Zhang 1 Yong Liu 2 1 Fordham University, Bronx, NY. Email: {bnie, hzhang44}@fordham.edu 2
More informationComputational Trust. SFM 11 Bertinoro June Mogens Nielsen University of Aarhus DK. Aarhus Graduate School of Science Mogens Nielsen
Computational Trust SFM 11 Bertinoro June 2011 Mogens Nielsen University of Aarhus DK 1 Plan of talk 1) The grand challenge of Ubiquitous Computing 2) The role of Computational Trust in Ubiquitous Computing
More informationFormal Trust Model for Multiagent Systems
Formal Trust Model for Multiagent Systems Yonghong Wang and Munindar P. Singh Department of Computer Science orth Carolina State University Raleigh, C 7695-86, USA Abstract Trust should be substantially
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More informationFission of Opinions in Subjective Logic
Fission of Opinions in Subjective Logic udun Jøsang University of Oslo - UNIK Graduate Center josang @ matnat.uio.no bstract Opinion fusion in subjective logic consists of combining separate observers
More informationExploring the Patterns of Human Mobility Using Heterogeneous Traffic Trajectory Data
Exploring the Patterns of Human Mobility Using Heterogeneous Traffic Trajectory Data Jinzhong Wang April 13, 2016 The UBD Group Mobile and Social Computing Laboratory School of Software, Dalian University
More informationMultiplication of Multinomial Subjective Opinions
Multiplication of Multinomial Subjective Opinions Audun Jøsang 1 and Stephen O Hara 2 1 UNIK Graduate Center University of Oslo, Norway josang@unik.no 2 21st Century Systems Inc. USA sohara@21csi.com Abstract.
More informationBelieve it Today or Tomorrow? Detecting Untrustworthy Information from Dynamic Multi-Source Data
SDM 15 Vancouver, CAN Believe it Today or Tomorrow? Detecting Untrustworthy Information from Dynamic Multi-Source Data Houping Xiao 1, Yaliang Li 1, Jing Gao 1, Fei Wang 2, Liang Ge 3, Wei Fan 4, Long
More informationB-trust: Bayesian Trust Framework for Pervasive Computing
B-trust: Bayesian Trust Framework for Pervasive Computing Daniele Quercia, Stephen Hailes, Licia Capra Department of Computer Science, University College London, London, WC1E 6BT, UK {D.Quercia, S.Hailes,
More informationModeling the Dynamic Trust of Online Service Providers using HMM
Modeling the Dynamic Trust of Online Service Providers using HMM Xiaoming Zheng Department of Computing Macquarie University Sydney, NSW 2109, Australia xiaoming.zheng@mq.edu.au Yan Wang Department of
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More informationMining Newsgroups Using Networks Arising From Social Behavior by Rakesh Agrawal et al. Presented by Will Lee
Mining Newsgroups Using Networks Arising From Social Behavior by Rakesh Agrawal et al. Presented by Will Lee wwlee1@uiuc.edu September 28, 2004 Motivation IR on newsgroups is challenging due to lack of
More informationPublished in: Tenth Tbilisi Symposium on Language, Logic and Computation: Gudauri, Georgia, September 2013
UvA-DARE (Digital Academic Repository) Estimating the Impact of Variables in Bayesian Belief Networks van Gosliga, S.P.; Groen, F.C.A. Published in: Tenth Tbilisi Symposium on Language, Logic and Computation:
More informationAutomatic Differentiation Equipped Variable Elimination for Sensitivity Analysis on Probabilistic Inference Queries
Automatic Differentiation Equipped Variable Elimination for Sensitivity Analysis on Probabilistic Inference Queries Anonymous Author(s) Affiliation Address email Abstract 1 2 3 4 5 6 7 8 9 10 11 12 Probabilistic
More informationOn Beta Models with Trust Chains
On Beta Models with Trust Chains Tim Muller and Patrick Schweitzer {tim.muller, patrick.schweitzer}@uni.lu University of Luxembourg Abstract. In a type of interactions over the Internet, a user (the subject)
More informationAn analysis of the exponential decay principle in probabilistic trust models
An analysis of the exponential decay principle in probabilistic trust models Ehab ElSalamouny 1, Karl Tikjøb Krukow 2, and Vladimiro Sassone 1 1 ECS, University of Southampton, UK 2 Trifork, Aarhus, Denmark
More informationContinuous Ratings in Discrete Bayesian Reputation Systems
Continuous Ratings in Discrete Bayesian Reputation Systems Audun Jøsang, Xixi Luo and Xiaowu Chen Abstract Reputation systems take as input ratings from members in a community, and can produce measures
More informationMobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL
MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,
More informationINVERTING CONDITIONAL OPINIONS IN SUBJECTIVE LOGIC
INVERTING CONDITIONAL OPINIONS IN SUBJECTIVE LOGIC Audun Jøsang a and Francesco Sambo b (a) University of Oslo, Norway, josang@mn.uio.no (b) University of Padova, Italy, francesco.sambo@dei.unipd.it Abstract:
More informationA Reputation-Based Approach for Securing Vivaldi Embedding
A Reputation-Based Approach for Securing Vivaldi Embedding System Damien Saucez Benoit Donnet Olivier Bonaventure Université Catholique de Louvain Eunice 2007 Twente http://inl.info.ucl.ac.be July 19th,
More informationDistributed ML for DOSNs: giving power back to users
Distributed ML for DOSNs: giving power back to users Amira Soliman KTH isocial Marie Curie Initial Training Networks Part1 Agenda DOSNs and Machine Learning DIVa: Decentralized Identity Validation for
More informationLogic and Artificial Intelligence Lecture 13
Logic and Artificial Intelligence Lecture 13 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit
More informationA Bayesian model for event-based trust
A Bayesian model for event-based trust Elements of a foundation for computational trust Vladimiro Sassone ECS, University of Southampton joint work K. Krukow and M. Nielsen Oxford, 9 March 2007 V. Sassone
More informationMachine Learning Summer School
Machine Learning Summer School Lecture 3: Learning parameters and structure Zoubin Ghahramani zoubin@eng.cam.ac.uk http://learning.eng.cam.ac.uk/zoubin/ Department of Engineering University of Cambridge,
More informationSemantic Constraints for Trust Transitivity
Semantic Constraints for Trust Transitivity Audun Jøsang Simon Pope Distributed Systems Technology Centre University of Queensland, Brisbane, Australia Email: {ajosang, simon.pope}@dstc.edu.au Abstract
More informationTo Trust or Not to Trust? Predicting Online Trusts using Trust Antecedent Framework
To Trust or Not to Trust? Predicting Online Trusts using Trust Antecedent Framework Viet-An Nguyen, Ee-Peng Lim, Jing Jiang School of Information Systems Singapore Management University, Singapore {vanguyen,eplim,jingjiang}@smu.edu.sg
More informationOptimal Social Trust Path Selection in Complex Social Networks
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10) Optimal Social Trust Path Selection in Complex Social Networks Guanfeng Liu, Yan Wang and Mehmet A. Orgun Department
More informationCS 4649/7649 Robot Intelligence: Planning
CS 4649/7649 Robot Intelligence: Planning Probability Primer Sungmoon Joo School of Interactive Computing College of Computing Georgia Institute of Technology S. Joo (sungmoon.joo@cc.gatech.edu) 1 *Slides
More informationGeneralising Bayes Theorem in Subjective Logic
Generalising Bayes Theorem in Subjective Logic Audun Jøsang 1 Abstract Bayes theorem provides a method of inverting conditional probabilities in probability calculus and statistics. Subjective logic generalises
More informationMihai Boicu, Gheorghe Tecuci, Dorin Marcu Learning Agent Center, George Mason University
Mihai Boicu, Gheorghe Tecuci, Dorin Marcu Learning Agent Center, George Mason University The Seventh International Conference on Semantic Technologies for Intelligence, Defense, and Security STIDS Fairfax,
More informationCSE 473: Artificial Intelligence
CSE 473: Artificial Intelligence Hidden Markov Models Dieter Fox --- University of Washington [Most slides were created by Dan Klein and Pieter Abbeel for CS188 Intro to AI at UC Berkeley. All CS188 materials
More informationChapter 4 Dynamic Bayesian Networks Fall Jin Gu, Michael Zhang
Chapter 4 Dynamic Bayesian Networks 2016 Fall Jin Gu, Michael Zhang Reviews: BN Representation Basic steps for BN representations Define variables Define the preliminary relations between variables Check
More informationWiki Definition. Reputation Systems I. Outline. Introduction to Reputations. Yury Lifshits. HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte
Reputation Systems I HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte Yury Lifshits Wiki Definition Reputation is the opinion (more technically, a social evaluation) of the public toward a person, a
More informationPlanning Under Uncertainty II
Planning Under Uncertainty II Intelligent Robotics 2014/15 Bruno Lacerda Announcement No class next Monday - 17/11/2014 2 Previous Lecture Approach to cope with uncertainty on outcome of actions Markov
More informationProbability. CS 3793/5233 Artificial Intelligence Probability 1
CS 3793/5233 Artificial Intelligence 1 Motivation Motivation Random Variables Semantics Dice Example Joint Dist. Ex. Axioms Agents don t have complete knowledge about the world. Agents need to make decisions
More informationCS 188: Artificial Intelligence Fall 2011
CS 188: Artificial Intelligence Fall 2011 Lecture 20: HMMs / Speech / ML 11/8/2011 Dan Klein UC Berkeley Today HMMs Demo bonanza! Most likely explanation queries Speech recognition A massive HMM! Details
More informationSTAR: Semiring Trust Inference for Trust-Aware Social Recommenders
STAR: Semiring Trust Inference for Trust-Aware Social Recommenders Peixin Gao Institute for Systems Research University of Maryland gaopei@umd.edu Hui Miao Dept. of Computer Science University of Maryland
More informationIs It Harmful When Advisors Only Pretend to Be Honest?
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16) Is It Harmful When Advisors Only Pretend to Be Honest? Dongxia Wang and Tim Muller and Jie Zhang and Yang liu School of
More informationIntroduction to Artificial Intelligence (AI)
Introduction to Artificial Intelligence (AI) Computer Science cpsc502, Lecture 10 Oct, 13, 2011 CPSC 502, Lecture 10 Slide 1 Today Oct 13 Inference in HMMs More on Robot Localization CPSC 502, Lecture
More informationOn the Complexity of the Minimum Independent Set Partition Problem
On the Complexity of the Minimum Independent Set Partition Problem T-H. Hubert Chan 1, Charalampos Papamanthou 2, and Zhichao Zhao 1 1 Department of Computer Science the University of Hong Kong {hubert,zczhao}@cs.hku.hk
More informationLecture 6: Graphical Models: Learning
Lecture 6: Graphical Models: Learning 4F13: Machine Learning Zoubin Ghahramani and Carl Edward Rasmussen Department of Engineering, University of Cambridge February 3rd, 2010 Ghahramani & Rasmussen (CUED)
More informationDensity Propagation for Continuous Temporal Chains Generative and Discriminative Models
$ Technical Report, University of Toronto, CSRG-501, October 2004 Density Propagation for Continuous Temporal Chains Generative and Discriminative Models Cristian Sminchisescu and Allan Jepson Department
More informationDS504/CS586: Big Data Analytics Graph Mining II
Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6:00pm 8:50pm Mon. and Wed. Location: SL105 Spring 2016 Reading assignments We will increase the bar a little bit Please
More informationRaRE: Social Rank Regulated Large-scale Network Embedding
RaRE: Social Rank Regulated Large-scale Network Embedding Authors: Yupeng Gu 1, Yizhou Sun 1, Yanen Li 2, Yang Yang 3 04/26/2018 The Web Conference, 2018 1 University of California, Los Angeles 2 Snapchat
More informationA Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks
21 IEEE International Conference on Services Computing A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks Guanfeng Liu, Yan Wang and Mehmet A. Orgun Department
More informationOverview and comparison of random walk based techniques for estimating network averages
Overview and comparison of random walk based techniques for estimating network averages Konstantin Avrachenkov (Inria, France) Ribno COSTNET Conference, 21 Sept. 2016 Motivation Analysing (online) social
More informationFlowTrust: Trust Inference with Network Flows
FlowTrust: Trust Inference with Network Flows Guojun Wang and Jie Wu Abstract Web-based social networking is increasingly gaining popularity due to the rapid development of computer networking technologies.
More informationProbabilistic Logic under Uncertainty
Probabilistic Logic under Uncertainty Audun Jøsang School of Software Engineering and Data Communications QUT, Brisbane, Australia Email: a.josang@qut.edu.au Abstract Probabilistic logic combines the capability
More informationWinter 2019 Math 106 Topics in Applied Mathematics. Lecture 1: Introduction
Winter 2019 Math 106 Topics in Applied Mathematics Data-driven Uncertainty Quantification Yoonsang Lee (yoonsang.lee@dartmouth.edu) Lecture 1: Introduction 19 Winter M106 Class: MWF 12:50-1:55 pm @ 200
More informationAn Interoperable Context Sensitive Model of Trust
An Interoperable Context Sensitive Model of Trust Indrakshi Ray Indrajit Ray Sudip Chakraborty Department of Computer Science Colorado State University Fort Collins CO 80523-1873 iray,indrajit,sudip @cs.colostate.edu
More informationUsing first-order logic, formalize the following knowledge:
Probabilistic Artificial Intelligence Final Exam Feb 2, 2016 Time limit: 120 minutes Number of pages: 19 Total points: 100 You can use the back of the pages if you run out of space. Collaboration on the
More informationCircle-based Recommendation in Online Social Networks
Circle-based Recommendation in Online Social Networks Xiwang Yang, Harald Steck*, and Yong Liu Polytechnic Institute of NYU * Bell Labs/Netflix 1 Outline q Background & Motivation q Circle-based RS Trust
More informationProbabilistic Graphical Models Homework 2: Due February 24, 2014 at 4 pm
Probabilistic Graphical Models 10-708 Homework 2: Due February 24, 2014 at 4 pm Directions. This homework assignment covers the material presented in Lectures 4-8. You must complete all four problems to
More informationCooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game
IEEE ICC 202 - Wireless Networks Symposium Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game Yang Gao, Yan Chen and K. J. Ray Liu Department of Electrical and Computer
More informationMeasurement of Burst Topic in Microblog
, pp.16-20 http://dx.doi.org/10.14257/astl.2014.78.04 Measurement of Burst Topic in Microblog Guozhong Dong 1, Xin Zou 2*, Wei Wang 1, Yaxue Hu 1, Guowei Shen 1, Korawit Orkphol 1,Wu Yang 1 1 Information
More informationIntroduction to Probabilistic Programming Languages (PPL)
Introduction to Probabilistic Programming Languages (PPL) Anton Andreev Ingénieur d'études CNRS andreev.anton@.grenoble-inp.fr Something simple int function add(int a, int b) return a + b add(3, 2) 5 Deterministic
More informationDS504/CS586: Big Data Analytics Graph Mining II
Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6-8:50PM Thursday Location: AK233 Spring 2018 v Course Project I has been graded. Grading was based on v 1. Project report
More informationTPS DR: A Universal Dimension Reducing Algorithm for Optimal Trust Path Selection in Complex Sensor Network
Appl Math Inf Sci 7, No 1L, 161-167 (2013) 161 Applied Mathematics & Information Sciences An International Journal TPS DR: A Universal Dimension Reducing Algorithm for Optimal Trust Path Selection in Complex
More informationTruth Discovery for Spatio-Temporal Events from Crowdsourced Data
Truth Discovery for Spatio-Temporal Events from Crowdsourced Data Daniel A. Garcia-Ulloa Math & CS Department Emory University dgarci8@emory.edu Li Xiong Math & CS Department Emory University lxiong@emory.edu
More informationIntroduction to Bayesian Learning
Course Information Introduction Introduction to Bayesian Learning Davide Bacciu Dipartimento di Informatica Università di Pisa bacciu@di.unipi.it Apprendimento Automatico: Fondamenti - A.A. 2016/2017 Outline
More informationOutline. CSE 573: Artificial Intelligence Autumn Agent. Partial Observability. Markov Decision Process (MDP) 10/31/2012
CSE 573: Artificial Intelligence Autumn 2012 Reasoning about Uncertainty & Hidden Markov Models Daniel Weld Many slides adapted from Dan Klein, Stuart Russell, Andrew Moore & Luke Zettlemoyer 1 Outline
More informationAutomating variational inference for statistics and data mining
Automating variational inference for statistics and data mining Tom Minka Machine Learning and Perception Group Microsoft Research Cambridge A common situation You have a dataset Some models in mind Want
More informationInterpretation and Fusion of Hyper Opinions in Subjective Logic
Interpretation and Fusion of Hyper Opinions in Subjective Logic Audun Jøsang University of Oslo Norway Email: josang@mn.uio.no Robin Hankin University of Auckland New Zealand Email: hankin.robin@gmail.com
More informationABSTRACT. WANG, YONGHONG. Evidence-Based Trust in Distributed Agent Systems. (Under the direction of Professor Munindar P. Singh).
ABSTRACT WANG, YONGHONG. Evidence-Based Trust in Distributed Agent Systems. (Under the direction of Professor Munindar P. Singh). Trust is a crucial basis for interactions among parties in large, open
More informationPropositions. c D. Poole and A. Mackworth 2010 Artificial Intelligence, Lecture 5.1, Page 1
Propositions An interpretation is an assignment of values to all variables. A model is an interpretation that satisfies the constraints. Often we don t want to just find a model, but want to know what
More information: Approximation and Online Algorithms with Applications Lecture Note 2: NP-Hardness
4810-1183: Approximation and Online Algorithms with Applications Lecture Note 2: NP-Hardness Introduction Suppose that you submitted a research manuscript to a journal. It is very unlikely that your paper
More informationUncertainty and knowledge. Uncertainty and knowledge. Reasoning with uncertainty. Notes
Approximate reasoning Uncertainty and knowledge Introduction All knowledge representation formalism and problem solving mechanisms that we have seen until now are based on the following assumptions: All
More informationThe Lady Tasting Tea. How to deal with multiple testing. Need to explore many models. More Predictive Modeling
The Lady Tasting Tea More Predictive Modeling R. A. Fisher & the Lady B. Muriel Bristol claimed she prefers tea added to milk rather than milk added to tea Fisher was skeptical that she could distinguish
More informationFriends or Foes: Detecting Dishonest Recommenders in Online Social Networks
Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks Yongkun Li, John C.S. Lui Department of Computer Science & Engineering, The Chinese University of Hong Kong Email: {ykli, cslui}@cse.cuhk.edu.hk
More information15-381: Artificial Intelligence. Hidden Markov Models (HMMs)
15-381: Artificial Intelligence Hidden Markov Models (HMMs) What s wrong with Bayesian networks Bayesian networks are very useful for modeling joint distributions But they have their limitations: - Cannot
More informationDigital Chart Cartography: Error and Quality control
Digital Chart Cartography: Error and Quality control Di WU (PHD student) Session7: Advances in Cartography Venue: TU 107 Yantai Institute of Coastal Zone Research, CAS, Yantai 264003, ChinaC Key State
More informationDisplay Advertising Optimization by Quantum Annealing Processor
Display Advertising Optimization by Quantum Annealing Processor Shinichi Takayanagi*, Kotaro Tanahashi*, Shu Tanaka *Recruit Communications Co., Ltd. Waseda University, JST PRESTO Overview 1. Introduction
More informationMining Triadic Closure Patterns in Social Networks
Mining Triadic Closure Patterns in Social Networks Hong Huang, University of Goettingen Jie Tang, Tsinghua University Sen Wu, Stanford University Lu Liu, Northwestern University Xiaoming Fu, University
More informationLogic and Artificial Intelligence Lecture 7
Logic and Artificial Intelligence Lecture 7 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit
More informationBayesian Networks BY: MOHAMAD ALSABBAGH
Bayesian Networks BY: MOHAMAD ALSABBAGH Outlines Introduction Bayes Rule Bayesian Networks (BN) Representation Size of a Bayesian Network Inference via BN BN Learning Dynamic BN Introduction Conditional
More informationAvailable online at ScienceDirect. Procedia Engineering 119 (2015 ) 13 18
Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 119 (2015 ) 13 18 13th Computer Control for Water Industry Conference, CCWI 2015 Real-time burst detection in water distribution
More informationLogics of Rational Agency Lecture 3
Logics of Rational Agency Lecture 3 Eric Pacuit Tilburg Institute for Logic and Philosophy of Science Tilburg Univeristy ai.stanford.edu/~epacuit July 29, 2009 Eric Pacuit: LORI, Lecture 3 1 Plan for the
More informationActivity Recognition with a Smart Walker
Activity Recognition with a Smart Walker Friday, October 1st, 2010 CS886: AI for Healthcare Applications Pascal Poupart Associate Professor Cheriton School of Computer Science University of Waterloo 1
More informationPreference Elicitation for Sequential Decision Problems
Preference Elicitation for Sequential Decision Problems Kevin Regan University of Toronto Introduction 2 Motivation Focus: Computational approaches to sequential decision making under uncertainty These
More informationUne approche multi-agent basée sur la confiance pour évaluer la performance des plateformes de crowdsourcing d idées
Laboratoire en Innovation, Technologie, Économie et Management Une approche multi-agent basée sur la confiance pour évaluer la performance des plateformes de crowdsourcing d idées Amine Louati Christine
More informationAnalysis of Multiview Legislative Networks with Structured Matrix Factorization: Does Twitter Influence Translate to the Real World?
Analysis of Multiview Legislative Networks with Structured Matrix Factorization: Does Twitter Influence Translate to the Real World? Shawn Mankad The University of Maryland Joint work with: George Michailidis
More informationCPS 173 Mechanism design. Vincent Conitzer
CPS 173 Mechanism design Vincent Conitzer conitzer@cs.duke.edu edu Mechanism design: setting The center has a set of outcomes O that she can choose from Allocations of tasks/resources, joint plans, Each
More informationOpinion Dynamics on Triad Scale Free Network
Opinion Dynamics on Triad Scale Free Network Li Qianqian 1 Liu Yijun 1,* Tian Ruya 1,2 Ma Ning 1,2 1 Institute of Policy and Management, Chinese Academy of Sciences, Beijing 100190, China lqqcindy@gmail.com,
More informationGibbs Sampling Methods for Multiple Sequence Alignment
Gibbs Sampling Methods for Multiple Sequence Alignment Scott C. Schmidler 1 Jun S. Liu 2 1 Section on Medical Informatics and 2 Department of Statistics Stanford University 11/17/99 1 Outline Statistical
More informationSystem Reliability Analysis. CS6323 Networks and Systems
System Reliability Analysis CS6323 Networks and Systems Topics Combinatorial Models for reliability Topology-based (structured) methods for Series Systems Parallel Systems Reliability analysis for arbitrary
More informationCombining Recommender and Reputation Systems to Produce Better Online Advice
Combining Recommender and Reputation Systems to Produce Better Online Advice Audun Jøsang 1, Guibing Guo 2, Maria Silvia Pini 3, Francesco Santini 4,and Yue Xu 5 1 University of Oslo, Norway (josang@ifi.uio.no)
More informationEffective Design of Trust Ontologies for Improvement in the Structure of Socio-Semantic Trust Networks
23 Effective Design of Trust Ontologies for Improvement in the Structure of Socio-Semantic Trust Networks Nima Dokoohaki 1, Mihhail Matskin 2 Abstract Social ecosystems are growing across the web and social
More informationUNDER UNCERTAINTY TRUST ESTIMATION IN MULTI-VALUED SETTINGS
UNDER UNCERTAINTY TRUST ESTIMATION IN MULTI-VALUED SETTINGS Sina Honari A thesis in The Department of Computer Science and Software Engineering Presented in Partial Fulfillment of the Requirements For
More informationData Quality in Hybrid Neuro-Fuzzy based Soft-Sensor Models: An Experimental Study
IAENG International Journal of Computer Science, 37:1, IJCS_37_1_8 Data Quality in Hybrid Neuro-Fuzzy based Soft-Sensor Models: An Experimental Study S. Jassar, Student Member, IEEE, Z. Liao, Member, ASHRAE,
More informationRandom Surfing on Multipartite Graphs
Random Surfing on Multipartite Graphs Athanasios N. Nikolakopoulos, Antonia Korba and John D. Garofalakis Department of Computer Engineering and Informatics, University of Patras December 07, 2016 IEEE
More informationInternational Journal "Information Theories & Applications" Vol.14 /
International Journal "Information Theories & Applications" Vol.4 / 2007 87 or 2) Nˆ t N. That criterion and parameters F, M, N assign method of constructing sample decision function. In order to estimate
More informationKazuyuki Tanaka s work on AND-OR trees and subsequent development
Kazuyuki Tanaka s work on AND-OR trees and subsequent development Toshio Suzuki Department of Math. and Information Sciences, Tokyo Metropolitan University, CTFM 2015, Tokyo Institute of Technology September
More informationA Generalized Decision Logic in Interval-set-valued Information Tables
A Generalized Decision Logic in Interval-set-valued Information Tables Y.Y. Yao 1 and Qing Liu 2 1 Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca
More informationUsing Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing
Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Mihir Laghate and Danijela Cabric Department of Electrical Engineering, University of California, Los Angeles Emails:
More informationBasic Probabilistic Reasoning SEG
Basic Probabilistic Reasoning SEG 7450 1 Introduction Reasoning under uncertainty using probability theory Dealing with uncertainty is one of the main advantages of an expert system over a simple decision
More informationModeling face-to-face social interaction networks
Modeling face-to-face social interaction networks Romualdo Pastor-Satorras Dept. Fisica i Enginyería Nuclear Universitat Politècnica de Catalunya Spain http://www.fen.upc.edu/~romu Work done in collaboration
More information