Personalized Social Recommendations Accurate or Private
|
|
- Earl White
- 5 years ago
- Views:
Transcription
1 Personalized Social Recommendations Accurate or Private Presented by: Lurye Jenny Paper by: Ashwin Machanavajjhala, Aleksandra Korolova, Atish Das Sarma
2 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments
3 Personalized Recommendations Advertisement Products People content
4 Personalized Recommendations Advertisement Products People content
5 Personalized Recommendations Advertisement Products People content
6 Personalized Recommendations Advertisement Products People content
7 Recommendation Algorithms
8 Traditional Based on generic recommendation & history. Other users that bought this book also bought
9 Social aware Based on active friends. Your friend already bought this book!
10 G V, E Facebook's Open Graph API & Google s Social Graph API
11 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
12 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
13 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
14 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
15 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
16 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
17 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
18 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
19 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
20 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
21 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
22 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
23 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
24 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
25 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
26 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info
27 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments
28 Motivation Increase user s degree of engagement Avoid privacy breach
29 G V, E Can a recommendation algorithm be accurate while not breaching one s privacy?
30 Tradeoff Sensitive information usage vs. better recommendation
31 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments
32 G V, E The Model The network graph V entities: people, products. E connections
33 G V, E The Utility function u Gr, i The utility of recommending node i to node r # of common neighbors # of weighted paths Page Rank
34 G V, E The Utility by # of common neighbors
35 G V, E The Social Recommendation Algorithm (R) R is a probability vector on all nodes: p Gr, i R The probability of R recommending node i to node r
36 G V, E The Social Recommendation Algorithm (R) R : p, p, p, p G, Blue Guy G, Blue Guy G, Blue Guy G, Blue Guy Dog Book Camera MacBook Shoe R1 : 0.5, 0.2, 0.2, 0. 1 R 2 : ,,,
37 G V, E Why do we need R to be probabilistic?
38 G V, E The Social Recommendation Algorithm (R) Example: R best p G, blue guy Macbook R best 0 p G, blue guy camera R best 0 p G, blue guy red shoes R best 0 p G, blue guy Dog book R best 1
39 G V, E OK, so why not recommend randomly?
40 G V, E R R
41 G V, E Maximizing the expected utility Max i G, r G, r i i u p R
42 G V, E Simplifying the notation G and r are constant: u p Gr, i Gr, i ui p i
43 G V, E R s Accuracy R is (1-δ) accurate if for any r: i i max i u p R u 1
44 G V, E Example R max 1 2 i u i u p i R :.1 : R
45 G V, E Privacy Definition Differential Privacy an algorithm preserves privacy of an entity if the algorithm's output is not sensitive to the presence or absence of the entity's information in the input data set.
46 G V, E Differential Privacy Definition 1: recommendation algorithm R satisfies Ɛ-differential privacy if for any pair of graphs G and G that differ in one edge (i.e., G = G + {e} or vice versa) and every set of possible recommendations S: Pr R G S e Pr R G' S
47 G V, E Differential Privacy Pr RGS e Pr RG ' S R : p, p, p, p Dog Book Camera MacBook shoe R R 1 2 : : 0.5, 0.2, 0.2, ,,, R R 1 2 : : 0.286, 0.286, 0.286, ,,, G 1 0 G'
48 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments
49 G V, E Problem Statement Given u, determine a recommendation algorithm that : (a) satisfies the Ɛ- differential privacy constraints. (b) maximizes the accuracy of recommendations
50 G V, E Generic Privacy Lower Bounds We focus on: Theoretically determine the bounds on maximum accuracy (1-δ) achievable by any algorithm that satisfies Ɛ- differential privacy.
51 G V, E Exchangeability Let G be a graph & let h be an isomorphism on the nodes giving graph, s.t.: for target node r, h(r) = r. Then: i u G h Gr, i G, r hi : u h
52 G V, E 0 Exchangeability 1 1 2
53 G V, E Monotonicity R is monotonic if: i, j ui u j pi p j
54 G V, E 0 Monotonicity R1 : R :
55 G V, E General Lower Bounds A monotonic recommendation algorithm that: achieves a constant accuracy (1-δ) is based on a utility function that satisfies exchangeability Has a lower bound on it s Ɛ parameter differential privacy Pr R G S e Pr R G ' S :
56 G V, E General Lower Bounds Split V into two groups by utility: c 0,1 V : u (1 c) u V : u (1 c) u high iv high max low i V low max k nodes n k nodes n nodes
57 G V, E General Lower Bounds How much probability should we give each group to achieve (1-δ) accuracy? high low p u p 1 c u u p 1 u max max max i high low p p c 1 1 i i accuracy p high c low, p c c 0 high p total probability of V high 1 low p total probability of V low 2 V : u (1 c) u 1 V : u (1 c) u high iv high max low i V low max
58 G V, E General Lower Bounds How much probability should we give each group to achieve (1-δ) accuracy? example: 1c p p high low c c c high p total probability of V high 1 low p total probability of V low 2 V : u (1 c) u 1 V : u (1 c) u high iv high max low i V low max
59 G V, E General Lower Bounds t the number of edges that needs to be added to turn a node with the smallest probability of being recommended from the low utility group Vlow into the node of maximum utility in the modified graph. G' 0 1 t 3 2 1
60 x G 0 G' x G V high G V low G ' V high G' V low 1 k nodes n k nodes k 1 nodes n k nodes p high c low, p c c G x V : p low G x c n x k ck1 p G' c
61 G V, E General Lower Bounds From differential privacy: G1 p e p x p e p G x p e p G x G x 2 1 G' G 2 x x e p x 2 G e p x 3 G p p G ' x G x e t 0 G' 1 2 1
62 General Lower Bounds Let s put it all together!, G V E G' t x G x p e p G p x c n k ' 1 G x c p c k 1 t c n k e k 1 ln ln 1 c n k t k Lower Bound!
63 G V, E General Lower Bounds Important result: cn k 1 1 t n k k 1 e upper bound on accuracy!
64 G V, E General Lower Bounds Example: A social network with 400 million nodes: n Lets assume that for c 0.99, we have k 100 and consider t 150 (which is about the average degree in some social networks). Suppose we want to guarantee 0.1-differential privacy, then we compute the bound on the accuracy : e 410 This suggests that for a differential privacy guarantee of 0.1, no algorithm can guarantee an accuracy better than
65 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments
66 G V, E Privacy preserving algorithms An algorithm that satisfies differential privacy must recommend every node, even the ones that have zero utility, with a non-zero probability.
67 G V, E Privacy preserving algorithms Let s add some noise! Exponential smoothing mechanism Laplace noise addition mechanism
68 G V, E Exponential smoothing mechanism Creates a smooth probability distribution from the utility vector and samples from it. Given the utilities vector: u,..., 1 un, algorithm AE recommends node i with probability p i n e j1 u f e i u f j u i 0 p i n j1 1 e u f j f is the sensitivity of the utility function (the maximum utility difference caused by adding / removing one edge).
69 G V, E Laplace noise addition mechanism Unlike the Exponential mechanism, the Laplace mechanism more closely mimics the optimal mechanism Rbest. Given nodes with utilities u,..., 1 un algorithm AL first computes a modified utility vector u' 1,..., u' n as follows: u u r ' i i where r is a random variable chosen from the Laplace distribution independently at random for each i. Then, recommends u A max ' i L
70 G V, E Laplace noise addition mechanism Laplace Distribution: 1 f x e 2b x b Laplace Density function b f, 0
71 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments
72 G V, E Experiments Our Goal: Comparing the theoretical upper bound on accuracy to the de-facto accuracy.
73 G V, E Experiments Settings: real network graphs: Wikipedia vote network G WV Twitter connections network G T utility functions: Common neighbors Number of paths privacy tools: Exponential smoothing mechanism Laplace noise addition mechanism
74 G V, E Wikipedia vote network Some Wikipedia users are administrators, who have access to additional technical features. Users are elected to be administrators via a public vote of other users and administrators. G WV : V users E votes 7, , 762 nodes edges
75 G V, E Twitter connections network Users follow other users. G T : V users E follows 96, 403 nodes 489, 986 edges
76 G V, E Experiments STEPS: Select target node r uniformly at random. Compute utility according to both functions. Fix Ɛ of differential privacy. Compute expected accuracy: Exponential smoothing : directly. Laplace noise addition : average utility of 1000 independent trials Compute theoretical upper bound using: 1 c n k 1 1 t n k k e
77 G V, E Results Experiments show that the Laplace mechanism achieves nearly identical accuracy as the Exponential mechanism. But, Exponential mechanism s accuracy can be computed more efficiently, so we will compare our theoretical bound on accuracy only to it s actual accuracy.
78 G V, E Results # of common neighbors: Wikipedia vote network Twitter connections network X-axis is the accuracy (1-δ). y-axis is the % of nodes receiving recommendations with accuracy < (1-δ)
79 G V, E Results # of weighted paths: Wikipedia vote network Twitter connections network X-axis is the accuracy (1-δ). y-axis is the % of nodes receiving recommendations with accuracy < (1-δ)
80 G V, E Results The low degree nodes are also the most vulnerable to receiving low accuracy recommendations X-axis is the target s node degree. y-axis is the accuracy (1-δ)
81
MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL
MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,
More informationCMPUT651: Differential Privacy
CMPUT65: Differential Privacy Homework assignment # 2 Due date: Apr. 3rd, 208 Discussion and the exchange of ideas are essential to doing academic work. For assignments in this course, you are encouraged
More informationThe Optimal Mechanism in Differential Privacy
The Optimal Mechanism in Differential Privacy Quan Geng Advisor: Prof. Pramod Viswanath 11/07/2013 PhD Final Exam of Quan Geng, ECE, UIUC 1 Outline Background on Differential Privacy ε-differential Privacy:
More informationInteract with Strangers
Interact with Strangers RATE: Recommendation-aware Trust Evaluation in Online Social Networks Wenjun Jiang 1, 2, Jie Wu 2, and Guojun Wang 1 1. School of Information Science and Engineering, Central South
More informationThe Optimal Mechanism in Differential Privacy
The Optimal Mechanism in Differential Privacy Quan Geng Advisor: Prof. Pramod Viswanath 3/29/2013 PhD Prelimary Exam of Quan Geng, ECE, UIUC 1 Outline Background on differential privacy Problem formulation
More informationModeling Data Correlations in Private Data Mining with Markov Model and Markov Networks. Yang Cao Emory University
Modeling Data Correlations in Private Data Mining with Markov Model and Markov Networks Yang Cao Emory University 207..5 Outline Data Mining with Differential Privacy (DP) Scenario: Spatiotemporal Data
More informationDifferential Privacy and its Application in Aggregation
Differential Privacy and its Application in Aggregation Part 1 Differential Privacy presenter: Le Chen Nanyang Technological University lechen0213@gmail.com October 5, 2013 Introduction Outline Introduction
More informationCost and Preference in Recommender Systems Junhua Chen LESS IS MORE
Cost and Preference in Recommender Systems Junhua Chen, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming Abstract In many recommender systems (RS), user
More informationLecture 11- Differential Privacy
6.889 New Developments in Cryptography May 3, 2011 Lecture 11- Differential Privacy Lecturer: Salil Vadhan Scribes: Alan Deckelbaum and Emily Shen 1 Introduction In class today (and the next two lectures)
More informationEffective Social Network Quarantine with Minimal Isolation Costs
Effective Social Network Quarantine with Minimal Huanyang Zheng and Jie Wu Department of Computer and Information Sciences, Temple University, USA Email: {huanyang.zheng, jiewu}@temple.edu Abstract Nowadays,
More information1 Maximizing a Submodular Function
6.883 Learning with Combinatorial Structure Notes for Lecture 16 Author: Arpit Agarwal 1 Maximizing a Submodular Function In the last lecture we looked at maximization of a monotone submodular function,
More informationMaryam Shoaran Alex Thomo Jens Weber. University of Victoria, Canada
Maryam Shoaran Alex Thomo Jens Weber University of Victoria, Canada Introduction Challenge: Evidence of Participation Sample Aggregates Zero-Knowledge Privacy Analysis of Utility of ZKP Conclusions 12/17/2015
More informationCSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24
CSCI 3210: Computational Game Theory Cascading Behavior in Networks Ref: [AGT] Ch 24 Mohammad T. Irfan Email: mirfan@bowdoin.edu Web: www.bowdoin.edu/~mirfan Course Website: www.bowdoin.edu/~mirfan/csci-3210.html
More informationModeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan
Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks Osman Yağan Department of ECE Carnegie Mellon University Joint work with Y. Zhuang and V. Gligor (CMU) Alex
More informationWeb Structure Mining Nodes, Links and Influence
Web Structure Mining Nodes, Links and Influence 1 Outline 1. Importance of nodes 1. Centrality 2. Prestige 3. Page Rank 4. Hubs and Authority 5. Metrics comparison 2. Link analysis 3. Influence model 1.
More informationRAPPOR: Randomized Aggregatable Privacy- Preserving Ordinal Response
RAPPOR: Randomized Aggregatable Privacy- Preserving Ordinal Response Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova Google & USC Presented By: Pat Pannuto RAPPOR, What is is good for? (Absolutely something!)
More informationFinding central nodes in large networks
Finding central nodes in large networks Nelly Litvak University of Twente Eindhoven University of Technology, The Netherlands Woudschoten Conference 2017 Complex networks Networks: Internet, WWW, social
More informationOn Node-differentially Private Algorithms for Graph Statistics
On Node-differentially Private Algorithms for Graph Statistics Om Dipakbhai Thakkar August 26, 2015 Abstract In this report, we start by surveying three papers on node differential privacy. First, we look
More informationAteneo de Manila, Philippines
Ideal Flow Based on Random Walk on Directed Graph Ateneo de Manila, Philippines Background Problem: how the traffic flow in a network should ideally be distributed? Current technique: use Wardrop s Principle:
More informationKristina Lerman USC Information Sciences Institute
Rethinking Network Structure Kristina Lerman USC Information Sciences Institute Università della Svizzera Italiana, December 16, 2011 Measuring network structure Central nodes Community structure Strength
More informationPower Laws & Rich Get Richer
Power Laws & Rich Get Richer CMSC 498J: Social Media Computing Department of Computer Science University of Maryland Spring 2015 Hadi Amiri hadi@umd.edu Lecture Topics Popularity as a Network Phenomenon
More information6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search
6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search Daron Acemoglu and Asu Ozdaglar MIT September 30, 2009 1 Networks: Lecture 7 Outline Navigation (or decentralized search)
More informationPrivacy of Numeric Queries Via Simple Value Perturbation. The Laplace Mechanism
Privacy of Numeric Queries Via Simple Value Perturbation The Laplace Mechanism Differential Privacy A Basic Model Let X represent an abstract data universe and D be a multi-set of elements from X. i.e.
More informationA Few Thoughts on the Computational Perspective. James Caverlee Assistant Professor Computer Science and Engineering Texas A&M University
A Few Thoughts on the Computational Perspective James Caverlee Assistant Professor Computer Science and Engineering Texas A&M University December 13, 2010 Democratization of Publishing Every two days now
More informationSOCIAL MEDIA IN THE COMMUNICATIONS CENTRE
SOCIAL MEDIA IN THE COMMUNICATIONS CENTRE Karen Gordon Gordon Strategy www.gordonstrategy.ca v 1 WHAT WE ARE GOING TO TALK ABOUT TODAY T h e s o c i a l m e d i a i n c i d e n t W h a t c a n h a p p
More informationDifferentially Private Real-time Data Release over Infinite Trajectory Streams
Differentially Private Real-time Data Release over Infinite Trajectory Streams Kyoto University, Japan Department of Social Informatics Yang Cao, Masatoshi Yoshikawa 1 Outline Motivation: opportunity &
More informationCollaborative Nowcasting for Contextual Recommendation
Collaborative for Contextual Recommendation Yu Sun 1, Nicholas Jing Yuan 2, Xing Xie 3, Kieran McDonald 4, Rui Zhang 5 University of Melbourne { 1 sun.y, 5 rui.zhang}@unimelb.edu.au Microsoft Research
More informationAn Efficient reconciliation algorithm for social networks
An Efficient reconciliation algorithm for social networks Silvio Lattanzi (Google Research NY) Joint work with: Nitish Korula (Google Research NY) ICERM Stochastic Graph Models Outline Graph reconciliation
More informationBuilding Cognitive Applications
Building Cognitive Applications * *creating visualizations using cognitive APIs Jonathan Kaufman @kauffecup jkaufman.io June 15, 2016 1. What is cognitive? 2. Demo some apps + look at code 3. Build our
More informationDATA MINING LECTURE 13. Link Analysis Ranking PageRank -- Random walks HITS
DATA MINING LECTURE 3 Link Analysis Ranking PageRank -- Random walks HITS How to organize the web First try: Manually curated Web Directories How to organize the web Second try: Web Search Information
More informationFacebook Friends! and Matrix Functions
Facebook Friends! and Matrix Functions! Graduate Research Day Joint with David F. Gleich, (Purdue), supported by" NSF CAREER 1149756-CCF Kyle Kloster! Purdue University! Network Analysis Use linear algebra
More informationELEC6910Q Analytics and Systems for Social Media and Big Data Applications Lecture 3 Centrality, Similarity, and Strength Ties
ELEC6910Q Analytics and Systems for Social Media and Big Data Applications Lecture 3 Centrality, Similarity, and Strength Ties Prof. James She james.she@ust.hk 1 Last lecture 2 Selected works from Tutorial
More informationLearning a Degree-Augmented Distance Metric from a Network. Bert Huang, U of Maryland Blake Shaw, Foursquare Tony Jebara, Columbia U
Learning a Degree-Augmented Distance Metric from a Network Bert Huang, U of Maryland Blake Shaw, Foursquare Tony Jebara, Columbia U Beyond Mahalanobis: Supervised Large-Scale Learning of Similarity NIPS
More informationSupplementary Information Activity driven modeling of time varying networks
Supplementary Information Activity driven modeling of time varying networks. Perra, B. Gonçalves, R. Pastor-Satorras, A. Vespignani May 11, 2012 Contents 1 The Model 1 1.1 Integrated network......................................
More informationK-Nearest Neighbor Temporal Aggregate Queries
Experiments and Conclusion K-Nearest Neighbor Temporal Aggregate Queries Yu Sun Jianzhong Qi Yu Zheng Rui Zhang Department of Computing and Information Systems University of Melbourne Microsoft Research,
More informationWiki Definition. Reputation Systems I. Outline. Introduction to Reputations. Yury Lifshits. HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte
Reputation Systems I HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte Yury Lifshits Wiki Definition Reputation is the opinion (more technically, a social evaluation) of the public toward a person, a
More informationK-Lists. Anindya Sen and Corrie Scalisi. June 11, University of California, Santa Cruz. Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25
K-Lists Anindya Sen and Corrie Scalisi University of California, Santa Cruz June 11, 2007 Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25 Outline 1 Introduction 2 Experts 3 Noise-Free Case Deterministic
More informationEfficient Respondents Selection for Biased Survey using Online Social Networks
Efficient Respondents Selection for Biased Survey using Online Social Networks Donghyun Kim 1, Jiaofei Zhong 2, Minhyuk Lee 1, Deying Li 3, Alade O. Tokuta 1 1 North Carolina Central University, Durham,
More informationLecture 5: The Principle of Deferred Decisions. Chernoff Bounds
Randomized Algorithms Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds Sotiris Nikoletseas Associate Professor CEID - ETY Course 2013-2014 Sotiris Nikoletseas, Associate Professor Randomized
More informationThree right directions and three wrong directions for tensor research
Three right directions and three wrong directions for tensor research Michael W. Mahoney Stanford University ( For more info, see: http:// cs.stanford.edu/people/mmahoney/ or Google on Michael Mahoney
More information[Title removed for anonymity]
[Title removed for anonymity] Graham Cormode graham@research.att.com Magda Procopiuc(AT&T) Divesh Srivastava(AT&T) Thanh Tran (UMass Amherst) 1 Introduction Privacy is a common theme in public discourse
More informationSpectral Bandits for Smooth Graph Functions with Applications in Recommender Systems
Spectral Bandits for Smooth Graph Functions with Applications in Recommender Systems Tomáš Kocák SequeL team INRIA Lille France Michal Valko SequeL team INRIA Lille France Rémi Munos SequeL team, INRIA
More informationGenerative Models for Discrete Data
Generative Models for Discrete Data ddebarr@uw.edu 2016-04-21 Agenda Bayesian Concept Learning Beta-Binomial Model Dirichlet-Multinomial Model Naïve Bayes Classifiers Bayesian Concept Learning Numbers
More informationUnderstanding Generalization Error: Bounds and Decompositions
CIS 520: Machine Learning Spring 2018: Lecture 11 Understanding Generalization Error: Bounds and Decompositions Lecturer: Shivani Agarwal Disclaimer: These notes are designed to be a supplement to the
More informationModeling Controversy Within Populations
Modeling Controversy Within Populations Myungha Jang, Shiri Dori-Hacohen and James Allan Center for Intelligent Information Retrieval (CIIR) University of Massachusetts Amherst {mhjang, shiri, allan}@cs.umass.edu
More informationLab 8: Measuring Graph Centrality - PageRank. Monday, November 5 CompSci 531, Fall 2018
Lab 8: Measuring Graph Centrality - PageRank Monday, November 5 CompSci 531, Fall 2018 Outline Measuring Graph Centrality: Motivation Random Walks, Markov Chains, and Stationarity Distributions Google
More informationTypical information required from the data collection can be grouped into four categories, enumerated as below.
Chapter 6 Data Collection 6.1 Overview The four-stage modeling, an important tool for forecasting future demand and performance of a transportation system, was developed for evaluating large-scale infrastructure
More informationBayesian Contextual Multi-armed Bandits
Bayesian Contextual Multi-armed Bandits Xiaoting Zhao Joint Work with Peter I. Frazier School of Operations Research and Information Engineering Cornell University October 22, 2012 1 / 33 Outline 1 Motivating
More informationLocally Differentially Private Protocols for Frequency Estimation. Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha
Locally Differentially Private Protocols for Frequency Estimation Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha Differential Privacy Differential Privacy Classical setting Differential Privacy
More information5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes
5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.
More informationMath 115 First Midterm October 11, 2011
Math 5 First Midterm October, 0 Name: EXAM SOLUTIONS Instructor: Section:. Do not open this exam until you are told to do so.. This exam has pages including this cover. There are 0 problems. Note that
More informationDifferential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies
Differential Privacy with ounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies ASTRACT Florian Tramèr Zhicong Huang Jean-Pierre Hubaux School of IC, EPFL firstname.lastname@epfl.ch
More informationPublishing Search Logs A Comparative Study of Privacy Guarantees
Publishing Search Logs A Comparative Study of Privacy Guarantees Michaela Götz Ashwin Machanavajjhala Guozhang Wang Xiaokui Xiao Johannes Gehrke Abstract Search engine companies collect the database of
More informationGreedy Maximization Framework for Graph-based Influence Functions
Greedy Maximization Framework for Graph-based Influence Functions Edith Cohen Google Research Tel Aviv University HotWeb '16 1 Large Graphs Model relations/interactions (edges) between entities (nodes)
More informationThe first bound is the strongest, the other two bounds are often easier to state and compute. Proof: Applying Markov's inequality, for any >0 we have
The first bound is the strongest, the other two bounds are often easier to state and compute Proof: Applying Markov's inequality, for any >0 we have Pr (1 + ) = Pr For any >0, we can set = ln 1+ (4.4.1):
More informationSaturation of Information Exchange in Locally Connected Pulse-Coupled Oscillators
Saturation of Information Exchange in Locally Connected Pulse-Coupled Oscillators Will Wagstaff School of Computer Science, Georgia Institute of Technology, Atlanta, Georgia 30332, USA (Dated: 13 December
More informationCircle-based Recommendation in Online Social Networks
Circle-based Recommendation in Online Social Networks Xiwang Yang, Harald Steck*, and Yong Liu Polytechnic Institute of NYU * Bell Labs/Netflix 1 Outline q Background & Motivation q Circle-based RS Trust
More informationORIE 4741: Learning with Big Messy Data. Spectral Graph Theory
ORIE 4741: Learning with Big Messy Data Spectral Graph Theory Mika Sumida Operations Research and Information Engineering Cornell September 15, 2017 1 / 32 Outline Graph Theory Spectral Graph Theory Laplacian
More informationDynamic Poisson Factorization
Dynamic Poisson Factorization Laurent Charlin Joint work with: Rajesh Ranganath, James McInerney, David M. Blei McGill & Columbia University Presented at RecSys 2015 2 Click Data for a paper 3.5 Item 4663:
More informationFilter Bubbles in Opinion Dynamics
Filter Bubbles in Opinion Dynamics F.L.H. Klein Schaarsberg June 24, 216 Abstract This paper proposes and analyzes a model of opinion dynamics which produces the behavior of filter bubbles. Filter bubbles
More informationOn the Complexity of the Minimum Independent Set Partition Problem
On the Complexity of the Minimum Independent Set Partition Problem T-H. Hubert Chan 1, Charalampos Papamanthou 2, and Zhichao Zhao 1 1 Department of Computer Science the University of Hong Kong {hubert,zczhao}@cs.hku.hk
More informationCS 277: Data Mining. Mining Web Link Structure. CS 277: Data Mining Lectures Analyzing Web Link Structure Padhraic Smyth, UC Irvine
CS 277: Data Mining Mining Web Link Structure Class Presentations In-class, Tuesday and Thursday next week 2-person teams: 6 minutes, up to 6 slides, 3 minutes/slides each person 1-person teams 4 minutes,
More information8.1 Concentration inequality for Gaussian random matrix (cont d)
MGMT 69: Topics in High-dimensional Data Analysis Falll 26 Lecture 8: Spectral clustering and Laplacian matrices Lecturer: Jiaming Xu Scribe: Hyun-Ju Oh and Taotao He, October 4, 26 Outline Concentration
More information11 : Gaussian Graphic Models and Ising Models
10-708: Probabilistic Graphical Models 10-708, Spring 2017 11 : Gaussian Graphic Models and Ising Models Lecturer: Bryon Aragam Scribes: Chao-Ming Yen 1 Introduction Different from previous maximum likelihood
More informationData Collection. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1
Data Collection Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents 1 Overview 1 2 Survey design 2 2.1 Information needed................................. 2 2.2 Study area.....................................
More information8 Basics of Hypothesis Testing
8 Basics of Hypothesis Testing 4 Problems Problem : The stochastic signal S is either 0 or E with equal probability, for a known value E > 0. Consider an observation X = x of the stochastic variable X
More informationDS504/CS586: Big Data Analytics Graph Mining II
Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6:00pm 8:50pm Mon. and Wed. Location: SL105 Spring 2016 Reading assignments We will increase the bar a little bit Please
More informationDensest subgraph computation and applications in finding events on social media
Densest subgraph computation and applications in finding events on social media Oana Denisa Balalau advised by Mauro Sozio Télécom ParisTech, Institut Mines Télécom December 4, 2015 1 / 28 Table of Contents
More informationLatent voter model on random regular graphs
Latent voter model on random regular graphs Shirshendu Chatterjee Cornell University (visiting Duke U.) Work in progress with Rick Durrett April 25, 2011 Outline Definition of voter model and duality with
More informationCS224W: Analysis of Networks Jure Leskovec, Stanford University
Announcements: Please fill HW Survey Weekend Office Hours starting this weekend (Hangout only) Proposal: Can use 1 late period CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu
More informationOnline Social Networks and Media. Link Analysis and Web Search
Online Social Networks and Media Link Analysis and Web Search How to Organize the Web First try: Human curated Web directories Yahoo, DMOZ, LookSmart How to organize the web Second try: Web Search Information
More informationRelease Connection Fingerprints in Social Networks Using Personalized Differential Privacy
Release Connection Fingerprints in Social Networks Using Personalized Differential Privacy Yongkai Li, Shubo Liu, Jun Wang, and Mengjun Liu School of Computer, Wuhan University, Wuhan, China Key Laboratory
More informationRaRE: Social Rank Regulated Large-scale Network Embedding
RaRE: Social Rank Regulated Large-scale Network Embedding Authors: Yupeng Gu 1, Yizhou Sun 1, Yanen Li 2, Yang Yang 3 04/26/2018 The Web Conference, 2018 1 University of California, Los Angeles 2 Snapchat
More informationData Obfuscation. Bimal Kumar Roy. December 17, 2015
December 17, 2015 Problem description (informal) Owner with large database. Lends the database for public use user is allowed to run restriced set of queries on data items. Goal is to prevent the user
More informationGenerating Private Synthetic Data: Presentation 2
Generating Private Synthetic Data: Presentation 2 Mentor: Dr. Anand Sarwate July 17, 2015 Overview 1 Project Overview (Revisited) 2 Sensitivity of Mutual Information 3 Simulation 4 Results with Real Data
More informationAlgorithm-Independent Learning Issues
Algorithm-Independent Learning Issues Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2007 c 2007, Selim Aksoy Introduction We have seen many learning
More informationDATA MINING LECTURE 8. Dimensionality Reduction PCA -- SVD
DATA MINING LECTURE 8 Dimensionality Reduction PCA -- SVD The curse of dimensionality Real data usually have thousands, or millions of dimensions E.g., web documents, where the dimensionality is the vocabulary
More informationDIFFERENCE EQUATIONS
Chapter 3 DIFFERENCE EQUATIONS 3.1 Introduction Differential equations are applicable for continuous systems and cannot be used for discrete variables. Difference equations are the discrete equivalent
More informationSOCIAL networks provide a virtual stage for users to
IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 1 Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks Zhipeng Cai, Senior Member, IEEE, Zaobo He,
More information1 Complex Networks - A Brief Overview
Power-law Degree Distributions 1 Complex Networks - A Brief Overview Complex networks occur in many social, technological and scientific settings. Examples of complex networks include World Wide Web, Internet,
More informationCollaborative Filtering
Collaborative Filtering Nicholas Ruozzi University of Texas at Dallas based on the slides of Alex Smola & Narges Razavian Collaborative Filtering Combining information among collaborating entities to make
More information1 Hoeffding s Inequality
Proailistic Method: Hoeffding s Inequality and Differential Privacy Lecturer: Huert Chan Date: 27 May 22 Hoeffding s Inequality. Approximate Counting y Random Sampling Suppose there is a ag containing
More informationThe Growth of Functions. A Practical Introduction with as Little Theory as possible
The Growth of Functions A Practical Introduction with as Little Theory as possible Complexity of Algorithms (1) Before we talk about the growth of functions and the concept of order, let s discuss why
More informationAn Overview of Homomorphic Encryption
An Overview of Homomorphic Encryption Alexander Lange Department of Computer Science Rochester Institute of Technology Rochester, NY 14623 May 9, 2011 Alexander Lange (RIT) Homomorphic Encryption May 9,
More informationPoint-of-Interest Recommendations: Learning Potential Check-ins from Friends
Point-of-Interest Recommendations: Learning Potential Check-ins from Friends Huayu Li, Yong Ge +, Richang Hong, Hengshu Zhu University of North Carolina at Charlotte + University of Arizona Hefei University
More informationNetwork Science & Telecommunications
Network Science & Telecommunications Piet Van Mieghem 1 ITC30 Networking Science Vision Day 5 September 2018, Vienna Outline Networks Birth of Network Science Function and graph Outlook 1 Network: service(s)
More informationFast Adaptive Algorithm for Robust Evaluation of Quality of Experience
Fast Adaptive Algorithm for Robust Evaluation of Quality of Experience Qianqian Xu, Ming Yan, Yuan Yao October 2014 1 Motivation Mean Opinion Score vs. Paired Comparisons Crowdsourcing Ranking on Internet
More informationRecommendation Systems
Recommendation Systems Pawan Goyal CSE, IITKGP October 21, 2014 Pawan Goyal (IIT Kharagpur) Recommendation Systems October 21, 2014 1 / 52 Recommendation System? Pawan Goyal (IIT Kharagpur) Recommendation
More informationSpatial Extension of the Reality Mining Dataset
R&D Centre for Mobile Applications Czech Technical University in Prague Spatial Extension of the Reality Mining Dataset Michal Ficek, Lukas Kencl sponsored by Mobility-Related Applications Wanted! Urban
More informationSampling. Everything Data CompSci Spring 2014
Sampling Everything Data CompSci 290.01 Spring 2014 2 Announcements (Thu. Mar 26) Homework #11 will be posted by noon tomorrow. 3 Outline Simple Random Sampling Means & Proportions Importance Sampling
More informationCompetition Between Networks: A Study in the Market for Yellow Pages Mark Rysman
Competition Between Networks: A Study in the Market for Yellow Pages Mark Rysman 1 Network effects between consumers and advertisers. Consumers: Choose how much to use the yellow page directory j, given
More information4.3 How derivatives affect the shape of a graph. The first derivative test and the second derivative test.
Chapter 4: Applications of Differentiation In this chapter we will cover: 41 Maximum and minimum values The critical points method for finding extrema 43 How derivatives affect the shape of a graph The
More informationCollaborative Filtering. Radek Pelánek
Collaborative Filtering Radek Pelánek 2017 Notes on Lecture the most technical lecture of the course includes some scary looking math, but typically with intuitive interpretation use of standard machine
More informationUsing Geospatial Methods with Other Health and Environmental Data to Identify Populations
Using Geospatial Methods with Other Health and Environmental Data to Identify Populations Ellen K. Cromley, PhD Consultant, Health Geographer ellen.cromley@gmail.com Purpose and Outline To illustrate the
More informationFrom Social User Activities to People Affiliation
2013 IEEE 13th International Conference on Data Mining From Social User Activities to People Affiliation Guangxiang Zeng 1, Ping uo 2, Enhong Chen 1 and Min Wang 3 1 University of Science and Technology
More information2.6 Logarithmic Functions. Inverse Functions. Question: What is the relationship between f(x) = x 2 and g(x) = x?
Inverse Functions Question: What is the relationship between f(x) = x 3 and g(x) = 3 x? Question: What is the relationship between f(x) = x 2 and g(x) = x? Definition (One-to-One Function) A function f
More informationLecture 13: Spectral Graph Theory
CSE 521: Design and Analysis of Algorithms I Winter 2017 Lecture 13: Spectral Graph Theory Lecturer: Shayan Oveis Gharan 11/14/18 Disclaimer: These notes have not been subjected to the usual scrutiny reserved
More informationCORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO
CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected
More informationDS504/CS586: Big Data Analytics Graph Mining II
Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6-8:50PM Thursday Location: AK233 Spring 2018 v Course Project I has been graded. Grading was based on v 1. Project report
More informationDegree (k)
0 1 Pr(X k) 0 0 1 Degree (k) Figure A1: Log-log plot of the complementary cumulative distribution function (CCDF) of the degree distribution for a sample month (January 0) network is shown (blue), along
More information