Personalized Social Recommendations Accurate or Private

Size: px
Start display at page:

Download "Personalized Social Recommendations Accurate or Private"

Transcription

1 Personalized Social Recommendations Accurate or Private Presented by: Lurye Jenny Paper by: Ashwin Machanavajjhala, Aleksandra Korolova, Atish Das Sarma

2 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments

3 Personalized Recommendations Advertisement Products People content

4 Personalized Recommendations Advertisement Products People content

5 Personalized Recommendations Advertisement Products People content

6 Personalized Recommendations Advertisement Products People content

7 Recommendation Algorithms

8 Traditional Based on generic recommendation & history. Other users that bought this book also bought

9 Social aware Based on active friends. Your friend already bought this book!

10 G V, E Facebook's Open Graph API & Google s Social Graph API

11 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

12 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

13 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

14 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

15 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

16 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

17 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

18 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

19 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

20 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

21 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

22 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

23 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

24 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

25 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

26 Sensitive information Friends Location Professional info Hobbies Sexual Orientation Relationship Status Contact info Date of Birth Traveling info

27 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments

28 Motivation Increase user s degree of engagement Avoid privacy breach

29 G V, E Can a recommendation algorithm be accurate while not breaching one s privacy?

30 Tradeoff Sensitive information usage vs. better recommendation

31 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments

32 G V, E The Model The network graph V entities: people, products. E connections

33 G V, E The Utility function u Gr, i The utility of recommending node i to node r # of common neighbors # of weighted paths Page Rank

34 G V, E The Utility by # of common neighbors

35 G V, E The Social Recommendation Algorithm (R) R is a probability vector on all nodes: p Gr, i R The probability of R recommending node i to node r

36 G V, E The Social Recommendation Algorithm (R) R : p, p, p, p G, Blue Guy G, Blue Guy G, Blue Guy G, Blue Guy Dog Book Camera MacBook Shoe R1 : 0.5, 0.2, 0.2, 0. 1 R 2 : ,,,

37 G V, E Why do we need R to be probabilistic?

38 G V, E The Social Recommendation Algorithm (R) Example: R best p G, blue guy Macbook R best 0 p G, blue guy camera R best 0 p G, blue guy red shoes R best 0 p G, blue guy Dog book R best 1

39 G V, E OK, so why not recommend randomly?

40 G V, E R R

41 G V, E Maximizing the expected utility Max i G, r G, r i i u p R

42 G V, E Simplifying the notation G and r are constant: u p Gr, i Gr, i ui p i

43 G V, E R s Accuracy R is (1-δ) accurate if for any r: i i max i u p R u 1

44 G V, E Example R max 1 2 i u i u p i R :.1 : R

45 G V, E Privacy Definition Differential Privacy an algorithm preserves privacy of an entity if the algorithm's output is not sensitive to the presence or absence of the entity's information in the input data set.

46 G V, E Differential Privacy Definition 1: recommendation algorithm R satisfies Ɛ-differential privacy if for any pair of graphs G and G that differ in one edge (i.e., G = G + {e} or vice versa) and every set of possible recommendations S: Pr R G S e Pr R G' S

47 G V, E Differential Privacy Pr RGS e Pr RG ' S R : p, p, p, p Dog Book Camera MacBook shoe R R 1 2 : : 0.5, 0.2, 0.2, ,,, R R 1 2 : : 0.286, 0.286, 0.286, ,,, G 1 0 G'

48 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments

49 G V, E Problem Statement Given u, determine a recommendation algorithm that : (a) satisfies the Ɛ- differential privacy constraints. (b) maximizes the accuracy of recommendations

50 G V, E Generic Privacy Lower Bounds We focus on: Theoretically determine the bounds on maximum accuracy (1-δ) achievable by any algorithm that satisfies Ɛ- differential privacy.

51 G V, E Exchangeability Let G be a graph & let h be an isomorphism on the nodes giving graph, s.t.: for target node r, h(r) = r. Then: i u G h Gr, i G, r hi : u h

52 G V, E 0 Exchangeability 1 1 2

53 G V, E Monotonicity R is monotonic if: i, j ui u j pi p j

54 G V, E 0 Monotonicity R1 : R :

55 G V, E General Lower Bounds A monotonic recommendation algorithm that: achieves a constant accuracy (1-δ) is based on a utility function that satisfies exchangeability Has a lower bound on it s Ɛ parameter differential privacy Pr R G S e Pr R G ' S :

56 G V, E General Lower Bounds Split V into two groups by utility: c 0,1 V : u (1 c) u V : u (1 c) u high iv high max low i V low max k nodes n k nodes n nodes

57 G V, E General Lower Bounds How much probability should we give each group to achieve (1-δ) accuracy? high low p u p 1 c u u p 1 u max max max i high low p p c 1 1 i i accuracy p high c low, p c c 0 high p total probability of V high 1 low p total probability of V low 2 V : u (1 c) u 1 V : u (1 c) u high iv high max low i V low max

58 G V, E General Lower Bounds How much probability should we give each group to achieve (1-δ) accuracy? example: 1c p p high low c c c high p total probability of V high 1 low p total probability of V low 2 V : u (1 c) u 1 V : u (1 c) u high iv high max low i V low max

59 G V, E General Lower Bounds t the number of edges that needs to be added to turn a node with the smallest probability of being recommended from the low utility group Vlow into the node of maximum utility in the modified graph. G' 0 1 t 3 2 1

60 x G 0 G' x G V high G V low G ' V high G' V low 1 k nodes n k nodes k 1 nodes n k nodes p high c low, p c c G x V : p low G x c n x k ck1 p G' c

61 G V, E General Lower Bounds From differential privacy: G1 p e p x p e p G x p e p G x G x 2 1 G' G 2 x x e p x 2 G e p x 3 G p p G ' x G x e t 0 G' 1 2 1

62 General Lower Bounds Let s put it all together!, G V E G' t x G x p e p G p x c n k ' 1 G x c p c k 1 t c n k e k 1 ln ln 1 c n k t k Lower Bound!

63 G V, E General Lower Bounds Important result: cn k 1 1 t n k k 1 e upper bound on accuracy!

64 G V, E General Lower Bounds Example: A social network with 400 million nodes: n Lets assume that for c 0.99, we have k 100 and consider t 150 (which is about the average degree in some social networks). Suppose we want to guarantee 0.1-differential privacy, then we compute the bound on the accuracy : e 410 This suggests that for a differential privacy guarantee of 0.1, no algorithm can guarantee an accuracy better than

65 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments

66 G V, E Privacy preserving algorithms An algorithm that satisfies differential privacy must recommend every node, even the ones that have zero utility, with a non-zero probability.

67 G V, E Privacy preserving algorithms Let s add some noise! Exponential smoothing mechanism Laplace noise addition mechanism

68 G V, E Exponential smoothing mechanism Creates a smooth probability distribution from the utility vector and samples from it. Given the utilities vector: u,..., 1 un, algorithm AE recommends node i with probability p i n e j1 u f e i u f j u i 0 p i n j1 1 e u f j f is the sensitivity of the utility function (the maximum utility difference caused by adding / removing one edge).

69 G V, E Laplace noise addition mechanism Unlike the Exponential mechanism, the Laplace mechanism more closely mimics the optimal mechanism Rbest. Given nodes with utilities u,..., 1 un algorithm AL first computes a modified utility vector u' 1,..., u' n as follows: u u r ' i i where r is a random variable chosen from the Laplace distribution independently at random for each i. Then, recommends u A max ' i L

70 G V, E Laplace noise addition mechanism Laplace Distribution: 1 f x e 2b x b Laplace Density function b f, 0

71 Outline Introduction Motivation The model General Lower Bounds Privacy preserving algorithms Experiments

72 G V, E Experiments Our Goal: Comparing the theoretical upper bound on accuracy to the de-facto accuracy.

73 G V, E Experiments Settings: real network graphs: Wikipedia vote network G WV Twitter connections network G T utility functions: Common neighbors Number of paths privacy tools: Exponential smoothing mechanism Laplace noise addition mechanism

74 G V, E Wikipedia vote network Some Wikipedia users are administrators, who have access to additional technical features. Users are elected to be administrators via a public vote of other users and administrators. G WV : V users E votes 7, , 762 nodes edges

75 G V, E Twitter connections network Users follow other users. G T : V users E follows 96, 403 nodes 489, 986 edges

76 G V, E Experiments STEPS: Select target node r uniformly at random. Compute utility according to both functions. Fix Ɛ of differential privacy. Compute expected accuracy: Exponential smoothing : directly. Laplace noise addition : average utility of 1000 independent trials Compute theoretical upper bound using: 1 c n k 1 1 t n k k e

77 G V, E Results Experiments show that the Laplace mechanism achieves nearly identical accuracy as the Exponential mechanism. But, Exponential mechanism s accuracy can be computed more efficiently, so we will compare our theoretical bound on accuracy only to it s actual accuracy.

78 G V, E Results # of common neighbors: Wikipedia vote network Twitter connections network X-axis is the accuracy (1-δ). y-axis is the % of nodes receiving recommendations with accuracy < (1-δ)

79 G V, E Results # of weighted paths: Wikipedia vote network Twitter connections network X-axis is the accuracy (1-δ). y-axis is the % of nodes receiving recommendations with accuracy < (1-δ)

80 G V, E Results The low degree nodes are also the most vulnerable to receiving low accuracy recommendations X-axis is the target s node degree. y-axis is the accuracy (1-δ)

81

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,

More information

CMPUT651: Differential Privacy

CMPUT651: Differential Privacy CMPUT65: Differential Privacy Homework assignment # 2 Due date: Apr. 3rd, 208 Discussion and the exchange of ideas are essential to doing academic work. For assignments in this course, you are encouraged

More information

The Optimal Mechanism in Differential Privacy

The Optimal Mechanism in Differential Privacy The Optimal Mechanism in Differential Privacy Quan Geng Advisor: Prof. Pramod Viswanath 11/07/2013 PhD Final Exam of Quan Geng, ECE, UIUC 1 Outline Background on Differential Privacy ε-differential Privacy:

More information

Interact with Strangers

Interact with Strangers Interact with Strangers RATE: Recommendation-aware Trust Evaluation in Online Social Networks Wenjun Jiang 1, 2, Jie Wu 2, and Guojun Wang 1 1. School of Information Science and Engineering, Central South

More information

The Optimal Mechanism in Differential Privacy

The Optimal Mechanism in Differential Privacy The Optimal Mechanism in Differential Privacy Quan Geng Advisor: Prof. Pramod Viswanath 3/29/2013 PhD Prelimary Exam of Quan Geng, ECE, UIUC 1 Outline Background on differential privacy Problem formulation

More information

Modeling Data Correlations in Private Data Mining with Markov Model and Markov Networks. Yang Cao Emory University

Modeling Data Correlations in Private Data Mining with Markov Model and Markov Networks. Yang Cao Emory University Modeling Data Correlations in Private Data Mining with Markov Model and Markov Networks Yang Cao Emory University 207..5 Outline Data Mining with Differential Privacy (DP) Scenario: Spatiotemporal Data

More information

Differential Privacy and its Application in Aggregation

Differential Privacy and its Application in Aggregation Differential Privacy and its Application in Aggregation Part 1 Differential Privacy presenter: Le Chen Nanyang Technological University lechen0213@gmail.com October 5, 2013 Introduction Outline Introduction

More information

Cost and Preference in Recommender Systems Junhua Chen LESS IS MORE

Cost and Preference in Recommender Systems Junhua Chen LESS IS MORE Cost and Preference in Recommender Systems Junhua Chen, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming Abstract In many recommender systems (RS), user

More information

Lecture 11- Differential Privacy

Lecture 11- Differential Privacy 6.889 New Developments in Cryptography May 3, 2011 Lecture 11- Differential Privacy Lecturer: Salil Vadhan Scribes: Alan Deckelbaum and Emily Shen 1 Introduction In class today (and the next two lectures)

More information

Effective Social Network Quarantine with Minimal Isolation Costs

Effective Social Network Quarantine with Minimal Isolation Costs Effective Social Network Quarantine with Minimal Huanyang Zheng and Jie Wu Department of Computer and Information Sciences, Temple University, USA Email: {huanyang.zheng, jiewu}@temple.edu Abstract Nowadays,

More information

1 Maximizing a Submodular Function

1 Maximizing a Submodular Function 6.883 Learning with Combinatorial Structure Notes for Lecture 16 Author: Arpit Agarwal 1 Maximizing a Submodular Function In the last lecture we looked at maximization of a monotone submodular function,

More information

Maryam Shoaran Alex Thomo Jens Weber. University of Victoria, Canada

Maryam Shoaran Alex Thomo Jens Weber. University of Victoria, Canada Maryam Shoaran Alex Thomo Jens Weber University of Victoria, Canada Introduction Challenge: Evidence of Participation Sample Aggregates Zero-Knowledge Privacy Analysis of Utility of ZKP Conclusions 12/17/2015

More information

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24 CSCI 3210: Computational Game Theory Cascading Behavior in Networks Ref: [AGT] Ch 24 Mohammad T. Irfan Email: mirfan@bowdoin.edu Web: www.bowdoin.edu/~mirfan Course Website: www.bowdoin.edu/~mirfan/csci-3210.html

More information

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks Osman Yağan Department of ECE Carnegie Mellon University Joint work with Y. Zhuang and V. Gligor (CMU) Alex

More information

Web Structure Mining Nodes, Links and Influence

Web Structure Mining Nodes, Links and Influence Web Structure Mining Nodes, Links and Influence 1 Outline 1. Importance of nodes 1. Centrality 2. Prestige 3. Page Rank 4. Hubs and Authority 5. Metrics comparison 2. Link analysis 3. Influence model 1.

More information

RAPPOR: Randomized Aggregatable Privacy- Preserving Ordinal Response

RAPPOR: Randomized Aggregatable Privacy- Preserving Ordinal Response RAPPOR: Randomized Aggregatable Privacy- Preserving Ordinal Response Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova Google & USC Presented By: Pat Pannuto RAPPOR, What is is good for? (Absolutely something!)

More information

Finding central nodes in large networks

Finding central nodes in large networks Finding central nodes in large networks Nelly Litvak University of Twente Eindhoven University of Technology, The Netherlands Woudschoten Conference 2017 Complex networks Networks: Internet, WWW, social

More information

On Node-differentially Private Algorithms for Graph Statistics

On Node-differentially Private Algorithms for Graph Statistics On Node-differentially Private Algorithms for Graph Statistics Om Dipakbhai Thakkar August 26, 2015 Abstract In this report, we start by surveying three papers on node differential privacy. First, we look

More information

Ateneo de Manila, Philippines

Ateneo de Manila, Philippines Ideal Flow Based on Random Walk on Directed Graph Ateneo de Manila, Philippines Background Problem: how the traffic flow in a network should ideally be distributed? Current technique: use Wardrop s Principle:

More information

Kristina Lerman USC Information Sciences Institute

Kristina Lerman USC Information Sciences Institute Rethinking Network Structure Kristina Lerman USC Information Sciences Institute Università della Svizzera Italiana, December 16, 2011 Measuring network structure Central nodes Community structure Strength

More information

Power Laws & Rich Get Richer

Power Laws & Rich Get Richer Power Laws & Rich Get Richer CMSC 498J: Social Media Computing Department of Computer Science University of Maryland Spring 2015 Hadi Amiri hadi@umd.edu Lecture Topics Popularity as a Network Phenomenon

More information

6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search

6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search 6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search Daron Acemoglu and Asu Ozdaglar MIT September 30, 2009 1 Networks: Lecture 7 Outline Navigation (or decentralized search)

More information

Privacy of Numeric Queries Via Simple Value Perturbation. The Laplace Mechanism

Privacy of Numeric Queries Via Simple Value Perturbation. The Laplace Mechanism Privacy of Numeric Queries Via Simple Value Perturbation The Laplace Mechanism Differential Privacy A Basic Model Let X represent an abstract data universe and D be a multi-set of elements from X. i.e.

More information

A Few Thoughts on the Computational Perspective. James Caverlee Assistant Professor Computer Science and Engineering Texas A&M University

A Few Thoughts on the Computational Perspective. James Caverlee Assistant Professor Computer Science and Engineering Texas A&M University A Few Thoughts on the Computational Perspective James Caverlee Assistant Professor Computer Science and Engineering Texas A&M University December 13, 2010 Democratization of Publishing Every two days now

More information

SOCIAL MEDIA IN THE COMMUNICATIONS CENTRE

SOCIAL MEDIA IN THE COMMUNICATIONS CENTRE SOCIAL MEDIA IN THE COMMUNICATIONS CENTRE Karen Gordon Gordon Strategy www.gordonstrategy.ca v 1 WHAT WE ARE GOING TO TALK ABOUT TODAY T h e s o c i a l m e d i a i n c i d e n t W h a t c a n h a p p

More information

Differentially Private Real-time Data Release over Infinite Trajectory Streams

Differentially Private Real-time Data Release over Infinite Trajectory Streams Differentially Private Real-time Data Release over Infinite Trajectory Streams Kyoto University, Japan Department of Social Informatics Yang Cao, Masatoshi Yoshikawa 1 Outline Motivation: opportunity &

More information

Collaborative Nowcasting for Contextual Recommendation

Collaborative Nowcasting for Contextual Recommendation Collaborative for Contextual Recommendation Yu Sun 1, Nicholas Jing Yuan 2, Xing Xie 3, Kieran McDonald 4, Rui Zhang 5 University of Melbourne { 1 sun.y, 5 rui.zhang}@unimelb.edu.au Microsoft Research

More information

An Efficient reconciliation algorithm for social networks

An Efficient reconciliation algorithm for social networks An Efficient reconciliation algorithm for social networks Silvio Lattanzi (Google Research NY) Joint work with: Nitish Korula (Google Research NY) ICERM Stochastic Graph Models Outline Graph reconciliation

More information

Building Cognitive Applications

Building Cognitive Applications Building Cognitive Applications * *creating visualizations using cognitive APIs Jonathan Kaufman @kauffecup jkaufman.io June 15, 2016 1. What is cognitive? 2. Demo some apps + look at code 3. Build our

More information

DATA MINING LECTURE 13. Link Analysis Ranking PageRank -- Random walks HITS

DATA MINING LECTURE 13. Link Analysis Ranking PageRank -- Random walks HITS DATA MINING LECTURE 3 Link Analysis Ranking PageRank -- Random walks HITS How to organize the web First try: Manually curated Web Directories How to organize the web Second try: Web Search Information

More information

Facebook Friends! and Matrix Functions

Facebook Friends! and Matrix Functions Facebook Friends! and Matrix Functions! Graduate Research Day Joint with David F. Gleich, (Purdue), supported by" NSF CAREER 1149756-CCF Kyle Kloster! Purdue University! Network Analysis Use linear algebra

More information

ELEC6910Q Analytics and Systems for Social Media and Big Data Applications Lecture 3 Centrality, Similarity, and Strength Ties

ELEC6910Q Analytics and Systems for Social Media and Big Data Applications Lecture 3 Centrality, Similarity, and Strength Ties ELEC6910Q Analytics and Systems for Social Media and Big Data Applications Lecture 3 Centrality, Similarity, and Strength Ties Prof. James She james.she@ust.hk 1 Last lecture 2 Selected works from Tutorial

More information

Learning a Degree-Augmented Distance Metric from a Network. Bert Huang, U of Maryland Blake Shaw, Foursquare Tony Jebara, Columbia U

Learning a Degree-Augmented Distance Metric from a Network. Bert Huang, U of Maryland Blake Shaw, Foursquare Tony Jebara, Columbia U Learning a Degree-Augmented Distance Metric from a Network Bert Huang, U of Maryland Blake Shaw, Foursquare Tony Jebara, Columbia U Beyond Mahalanobis: Supervised Large-Scale Learning of Similarity NIPS

More information

Supplementary Information Activity driven modeling of time varying networks

Supplementary Information Activity driven modeling of time varying networks Supplementary Information Activity driven modeling of time varying networks. Perra, B. Gonçalves, R. Pastor-Satorras, A. Vespignani May 11, 2012 Contents 1 The Model 1 1.1 Integrated network......................................

More information

K-Nearest Neighbor Temporal Aggregate Queries

K-Nearest Neighbor Temporal Aggregate Queries Experiments and Conclusion K-Nearest Neighbor Temporal Aggregate Queries Yu Sun Jianzhong Qi Yu Zheng Rui Zhang Department of Computing and Information Systems University of Melbourne Microsoft Research,

More information

Wiki Definition. Reputation Systems I. Outline. Introduction to Reputations. Yury Lifshits. HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte

Wiki Definition. Reputation Systems I. Outline. Introduction to Reputations. Yury Lifshits. HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte Reputation Systems I HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte Yury Lifshits Wiki Definition Reputation is the opinion (more technically, a social evaluation) of the public toward a person, a

More information

K-Lists. Anindya Sen and Corrie Scalisi. June 11, University of California, Santa Cruz. Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25

K-Lists. Anindya Sen and Corrie Scalisi. June 11, University of California, Santa Cruz. Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25 K-Lists Anindya Sen and Corrie Scalisi University of California, Santa Cruz June 11, 2007 Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25 Outline 1 Introduction 2 Experts 3 Noise-Free Case Deterministic

More information

Efficient Respondents Selection for Biased Survey using Online Social Networks

Efficient Respondents Selection for Biased Survey using Online Social Networks Efficient Respondents Selection for Biased Survey using Online Social Networks Donghyun Kim 1, Jiaofei Zhong 2, Minhyuk Lee 1, Deying Li 3, Alade O. Tokuta 1 1 North Carolina Central University, Durham,

More information

Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds

Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds Randomized Algorithms Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds Sotiris Nikoletseas Associate Professor CEID - ETY Course 2013-2014 Sotiris Nikoletseas, Associate Professor Randomized

More information

Three right directions and three wrong directions for tensor research

Three right directions and three wrong directions for tensor research Three right directions and three wrong directions for tensor research Michael W. Mahoney Stanford University ( For more info, see: http:// cs.stanford.edu/people/mmahoney/ or Google on Michael Mahoney

More information

[Title removed for anonymity]

[Title removed for anonymity] [Title removed for anonymity] Graham Cormode graham@research.att.com Magda Procopiuc(AT&T) Divesh Srivastava(AT&T) Thanh Tran (UMass Amherst) 1 Introduction Privacy is a common theme in public discourse

More information

Spectral Bandits for Smooth Graph Functions with Applications in Recommender Systems

Spectral Bandits for Smooth Graph Functions with Applications in Recommender Systems Spectral Bandits for Smooth Graph Functions with Applications in Recommender Systems Tomáš Kocák SequeL team INRIA Lille France Michal Valko SequeL team INRIA Lille France Rémi Munos SequeL team, INRIA

More information

Generative Models for Discrete Data

Generative Models for Discrete Data Generative Models for Discrete Data ddebarr@uw.edu 2016-04-21 Agenda Bayesian Concept Learning Beta-Binomial Model Dirichlet-Multinomial Model Naïve Bayes Classifiers Bayesian Concept Learning Numbers

More information

Understanding Generalization Error: Bounds and Decompositions

Understanding Generalization Error: Bounds and Decompositions CIS 520: Machine Learning Spring 2018: Lecture 11 Understanding Generalization Error: Bounds and Decompositions Lecturer: Shivani Agarwal Disclaimer: These notes are designed to be a supplement to the

More information

Modeling Controversy Within Populations

Modeling Controversy Within Populations Modeling Controversy Within Populations Myungha Jang, Shiri Dori-Hacohen and James Allan Center for Intelligent Information Retrieval (CIIR) University of Massachusetts Amherst {mhjang, shiri, allan}@cs.umass.edu

More information

Lab 8: Measuring Graph Centrality - PageRank. Monday, November 5 CompSci 531, Fall 2018

Lab 8: Measuring Graph Centrality - PageRank. Monday, November 5 CompSci 531, Fall 2018 Lab 8: Measuring Graph Centrality - PageRank Monday, November 5 CompSci 531, Fall 2018 Outline Measuring Graph Centrality: Motivation Random Walks, Markov Chains, and Stationarity Distributions Google

More information

Typical information required from the data collection can be grouped into four categories, enumerated as below.

Typical information required from the data collection can be grouped into four categories, enumerated as below. Chapter 6 Data Collection 6.1 Overview The four-stage modeling, an important tool for forecasting future demand and performance of a transportation system, was developed for evaluating large-scale infrastructure

More information

Bayesian Contextual Multi-armed Bandits

Bayesian Contextual Multi-armed Bandits Bayesian Contextual Multi-armed Bandits Xiaoting Zhao Joint Work with Peter I. Frazier School of Operations Research and Information Engineering Cornell University October 22, 2012 1 / 33 Outline 1 Motivating

More information

Locally Differentially Private Protocols for Frequency Estimation. Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha

Locally Differentially Private Protocols for Frequency Estimation. Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha Locally Differentially Private Protocols for Frequency Estimation Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha Differential Privacy Differential Privacy Classical setting Differential Privacy

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Math 115 First Midterm October 11, 2011

Math 115 First Midterm October 11, 2011 Math 5 First Midterm October, 0 Name: EXAM SOLUTIONS Instructor: Section:. Do not open this exam until you are told to do so.. This exam has pages including this cover. There are 0 problems. Note that

More information

Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies

Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies Differential Privacy with ounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies ASTRACT Florian Tramèr Zhicong Huang Jean-Pierre Hubaux School of IC, EPFL firstname.lastname@epfl.ch

More information

Publishing Search Logs A Comparative Study of Privacy Guarantees

Publishing Search Logs A Comparative Study of Privacy Guarantees Publishing Search Logs A Comparative Study of Privacy Guarantees Michaela Götz Ashwin Machanavajjhala Guozhang Wang Xiaokui Xiao Johannes Gehrke Abstract Search engine companies collect the database of

More information

Greedy Maximization Framework for Graph-based Influence Functions

Greedy Maximization Framework for Graph-based Influence Functions Greedy Maximization Framework for Graph-based Influence Functions Edith Cohen Google Research Tel Aviv University HotWeb '16 1 Large Graphs Model relations/interactions (edges) between entities (nodes)

More information

The first bound is the strongest, the other two bounds are often easier to state and compute. Proof: Applying Markov's inequality, for any >0 we have

The first bound is the strongest, the other two bounds are often easier to state and compute. Proof: Applying Markov's inequality, for any >0 we have The first bound is the strongest, the other two bounds are often easier to state and compute Proof: Applying Markov's inequality, for any >0 we have Pr (1 + ) = Pr For any >0, we can set = ln 1+ (4.4.1):

More information

Saturation of Information Exchange in Locally Connected Pulse-Coupled Oscillators

Saturation of Information Exchange in Locally Connected Pulse-Coupled Oscillators Saturation of Information Exchange in Locally Connected Pulse-Coupled Oscillators Will Wagstaff School of Computer Science, Georgia Institute of Technology, Atlanta, Georgia 30332, USA (Dated: 13 December

More information

Circle-based Recommendation in Online Social Networks

Circle-based Recommendation in Online Social Networks Circle-based Recommendation in Online Social Networks Xiwang Yang, Harald Steck*, and Yong Liu Polytechnic Institute of NYU * Bell Labs/Netflix 1 Outline q Background & Motivation q Circle-based RS Trust

More information

ORIE 4741: Learning with Big Messy Data. Spectral Graph Theory

ORIE 4741: Learning with Big Messy Data. Spectral Graph Theory ORIE 4741: Learning with Big Messy Data Spectral Graph Theory Mika Sumida Operations Research and Information Engineering Cornell September 15, 2017 1 / 32 Outline Graph Theory Spectral Graph Theory Laplacian

More information

Dynamic Poisson Factorization

Dynamic Poisson Factorization Dynamic Poisson Factorization Laurent Charlin Joint work with: Rajesh Ranganath, James McInerney, David M. Blei McGill & Columbia University Presented at RecSys 2015 2 Click Data for a paper 3.5 Item 4663:

More information

Filter Bubbles in Opinion Dynamics

Filter Bubbles in Opinion Dynamics Filter Bubbles in Opinion Dynamics F.L.H. Klein Schaarsberg June 24, 216 Abstract This paper proposes and analyzes a model of opinion dynamics which produces the behavior of filter bubbles. Filter bubbles

More information

On the Complexity of the Minimum Independent Set Partition Problem

On the Complexity of the Minimum Independent Set Partition Problem On the Complexity of the Minimum Independent Set Partition Problem T-H. Hubert Chan 1, Charalampos Papamanthou 2, and Zhichao Zhao 1 1 Department of Computer Science the University of Hong Kong {hubert,zczhao}@cs.hku.hk

More information

CS 277: Data Mining. Mining Web Link Structure. CS 277: Data Mining Lectures Analyzing Web Link Structure Padhraic Smyth, UC Irvine

CS 277: Data Mining. Mining Web Link Structure. CS 277: Data Mining Lectures Analyzing Web Link Structure Padhraic Smyth, UC Irvine CS 277: Data Mining Mining Web Link Structure Class Presentations In-class, Tuesday and Thursday next week 2-person teams: 6 minutes, up to 6 slides, 3 minutes/slides each person 1-person teams 4 minutes,

More information

8.1 Concentration inequality for Gaussian random matrix (cont d)

8.1 Concentration inequality for Gaussian random matrix (cont d) MGMT 69: Topics in High-dimensional Data Analysis Falll 26 Lecture 8: Spectral clustering and Laplacian matrices Lecturer: Jiaming Xu Scribe: Hyun-Ju Oh and Taotao He, October 4, 26 Outline Concentration

More information

11 : Gaussian Graphic Models and Ising Models

11 : Gaussian Graphic Models and Ising Models 10-708: Probabilistic Graphical Models 10-708, Spring 2017 11 : Gaussian Graphic Models and Ising Models Lecturer: Bryon Aragam Scribes: Chao-Ming Yen 1 Introduction Different from previous maximum likelihood

More information

Data Collection. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1

Data Collection. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1 Data Collection Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents 1 Overview 1 2 Survey design 2 2.1 Information needed................................. 2 2.2 Study area.....................................

More information

8 Basics of Hypothesis Testing

8 Basics of Hypothesis Testing 8 Basics of Hypothesis Testing 4 Problems Problem : The stochastic signal S is either 0 or E with equal probability, for a known value E > 0. Consider an observation X = x of the stochastic variable X

More information

DS504/CS586: Big Data Analytics Graph Mining II

DS504/CS586: Big Data Analytics Graph Mining II Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6:00pm 8:50pm Mon. and Wed. Location: SL105 Spring 2016 Reading assignments We will increase the bar a little bit Please

More information

Densest subgraph computation and applications in finding events on social media

Densest subgraph computation and applications in finding events on social media Densest subgraph computation and applications in finding events on social media Oana Denisa Balalau advised by Mauro Sozio Télécom ParisTech, Institut Mines Télécom December 4, 2015 1 / 28 Table of Contents

More information

Latent voter model on random regular graphs

Latent voter model on random regular graphs Latent voter model on random regular graphs Shirshendu Chatterjee Cornell University (visiting Duke U.) Work in progress with Rick Durrett April 25, 2011 Outline Definition of voter model and duality with

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University Announcements: Please fill HW Survey Weekend Office Hours starting this weekend (Hangout only) Proposal: Can use 1 late period CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu

More information

Online Social Networks and Media. Link Analysis and Web Search

Online Social Networks and Media. Link Analysis and Web Search Online Social Networks and Media Link Analysis and Web Search How to Organize the Web First try: Human curated Web directories Yahoo, DMOZ, LookSmart How to organize the web Second try: Web Search Information

More information

Release Connection Fingerprints in Social Networks Using Personalized Differential Privacy

Release Connection Fingerprints in Social Networks Using Personalized Differential Privacy Release Connection Fingerprints in Social Networks Using Personalized Differential Privacy Yongkai Li, Shubo Liu, Jun Wang, and Mengjun Liu School of Computer, Wuhan University, Wuhan, China Key Laboratory

More information

RaRE: Social Rank Regulated Large-scale Network Embedding

RaRE: Social Rank Regulated Large-scale Network Embedding RaRE: Social Rank Regulated Large-scale Network Embedding Authors: Yupeng Gu 1, Yizhou Sun 1, Yanen Li 2, Yang Yang 3 04/26/2018 The Web Conference, 2018 1 University of California, Los Angeles 2 Snapchat

More information

Data Obfuscation. Bimal Kumar Roy. December 17, 2015

Data Obfuscation. Bimal Kumar Roy. December 17, 2015 December 17, 2015 Problem description (informal) Owner with large database. Lends the database for public use user is allowed to run restriced set of queries on data items. Goal is to prevent the user

More information

Generating Private Synthetic Data: Presentation 2

Generating Private Synthetic Data: Presentation 2 Generating Private Synthetic Data: Presentation 2 Mentor: Dr. Anand Sarwate July 17, 2015 Overview 1 Project Overview (Revisited) 2 Sensitivity of Mutual Information 3 Simulation 4 Results with Real Data

More information

Algorithm-Independent Learning Issues

Algorithm-Independent Learning Issues Algorithm-Independent Learning Issues Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2007 c 2007, Selim Aksoy Introduction We have seen many learning

More information

DATA MINING LECTURE 8. Dimensionality Reduction PCA -- SVD

DATA MINING LECTURE 8. Dimensionality Reduction PCA -- SVD DATA MINING LECTURE 8 Dimensionality Reduction PCA -- SVD The curse of dimensionality Real data usually have thousands, or millions of dimensions E.g., web documents, where the dimensionality is the vocabulary

More information

DIFFERENCE EQUATIONS

DIFFERENCE EQUATIONS Chapter 3 DIFFERENCE EQUATIONS 3.1 Introduction Differential equations are applicable for continuous systems and cannot be used for discrete variables. Difference equations are the discrete equivalent

More information

SOCIAL networks provide a virtual stage for users to

SOCIAL networks provide a virtual stage for users to IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 1 Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks Zhipeng Cai, Senior Member, IEEE, Zaobo He,

More information

1 Complex Networks - A Brief Overview

1 Complex Networks - A Brief Overview Power-law Degree Distributions 1 Complex Networks - A Brief Overview Complex networks occur in many social, technological and scientific settings. Examples of complex networks include World Wide Web, Internet,

More information

Collaborative Filtering

Collaborative Filtering Collaborative Filtering Nicholas Ruozzi University of Texas at Dallas based on the slides of Alex Smola & Narges Razavian Collaborative Filtering Combining information among collaborating entities to make

More information

1 Hoeffding s Inequality

1 Hoeffding s Inequality Proailistic Method: Hoeffding s Inequality and Differential Privacy Lecturer: Huert Chan Date: 27 May 22 Hoeffding s Inequality. Approximate Counting y Random Sampling Suppose there is a ag containing

More information

The Growth of Functions. A Practical Introduction with as Little Theory as possible

The Growth of Functions. A Practical Introduction with as Little Theory as possible The Growth of Functions A Practical Introduction with as Little Theory as possible Complexity of Algorithms (1) Before we talk about the growth of functions and the concept of order, let s discuss why

More information

An Overview of Homomorphic Encryption

An Overview of Homomorphic Encryption An Overview of Homomorphic Encryption Alexander Lange Department of Computer Science Rochester Institute of Technology Rochester, NY 14623 May 9, 2011 Alexander Lange (RIT) Homomorphic Encryption May 9,

More information

Point-of-Interest Recommendations: Learning Potential Check-ins from Friends

Point-of-Interest Recommendations: Learning Potential Check-ins from Friends Point-of-Interest Recommendations: Learning Potential Check-ins from Friends Huayu Li, Yong Ge +, Richang Hong, Hengshu Zhu University of North Carolina at Charlotte + University of Arizona Hefei University

More information

Network Science & Telecommunications

Network Science & Telecommunications Network Science & Telecommunications Piet Van Mieghem 1 ITC30 Networking Science Vision Day 5 September 2018, Vienna Outline Networks Birth of Network Science Function and graph Outlook 1 Network: service(s)

More information

Fast Adaptive Algorithm for Robust Evaluation of Quality of Experience

Fast Adaptive Algorithm for Robust Evaluation of Quality of Experience Fast Adaptive Algorithm for Robust Evaluation of Quality of Experience Qianqian Xu, Ming Yan, Yuan Yao October 2014 1 Motivation Mean Opinion Score vs. Paired Comparisons Crowdsourcing Ranking on Internet

More information

Recommendation Systems

Recommendation Systems Recommendation Systems Pawan Goyal CSE, IITKGP October 21, 2014 Pawan Goyal (IIT Kharagpur) Recommendation Systems October 21, 2014 1 / 52 Recommendation System? Pawan Goyal (IIT Kharagpur) Recommendation

More information

Spatial Extension of the Reality Mining Dataset

Spatial Extension of the Reality Mining Dataset R&D Centre for Mobile Applications Czech Technical University in Prague Spatial Extension of the Reality Mining Dataset Michal Ficek, Lukas Kencl sponsored by Mobility-Related Applications Wanted! Urban

More information

Sampling. Everything Data CompSci Spring 2014

Sampling. Everything Data CompSci Spring 2014 Sampling Everything Data CompSci 290.01 Spring 2014 2 Announcements (Thu. Mar 26) Homework #11 will be posted by noon tomorrow. 3 Outline Simple Random Sampling Means & Proportions Importance Sampling

More information

Competition Between Networks: A Study in the Market for Yellow Pages Mark Rysman

Competition Between Networks: A Study in the Market for Yellow Pages Mark Rysman Competition Between Networks: A Study in the Market for Yellow Pages Mark Rysman 1 Network effects between consumers and advertisers. Consumers: Choose how much to use the yellow page directory j, given

More information

4.3 How derivatives affect the shape of a graph. The first derivative test and the second derivative test.

4.3 How derivatives affect the shape of a graph. The first derivative test and the second derivative test. Chapter 4: Applications of Differentiation In this chapter we will cover: 41 Maximum and minimum values The critical points method for finding extrema 43 How derivatives affect the shape of a graph The

More information

Collaborative Filtering. Radek Pelánek

Collaborative Filtering. Radek Pelánek Collaborative Filtering Radek Pelánek 2017 Notes on Lecture the most technical lecture of the course includes some scary looking math, but typically with intuitive interpretation use of standard machine

More information

Using Geospatial Methods with Other Health and Environmental Data to Identify Populations

Using Geospatial Methods with Other Health and Environmental Data to Identify Populations Using Geospatial Methods with Other Health and Environmental Data to Identify Populations Ellen K. Cromley, PhD Consultant, Health Geographer ellen.cromley@gmail.com Purpose and Outline To illustrate the

More information

From Social User Activities to People Affiliation

From Social User Activities to People Affiliation 2013 IEEE 13th International Conference on Data Mining From Social User Activities to People Affiliation Guangxiang Zeng 1, Ping uo 2, Enhong Chen 1 and Min Wang 3 1 University of Science and Technology

More information

2.6 Logarithmic Functions. Inverse Functions. Question: What is the relationship between f(x) = x 2 and g(x) = x?

2.6 Logarithmic Functions. Inverse Functions. Question: What is the relationship between f(x) = x 2 and g(x) = x? Inverse Functions Question: What is the relationship between f(x) = x 3 and g(x) = 3 x? Question: What is the relationship between f(x) = x 2 and g(x) = x? Definition (One-to-One Function) A function f

More information

Lecture 13: Spectral Graph Theory

Lecture 13: Spectral Graph Theory CSE 521: Design and Analysis of Algorithms I Winter 2017 Lecture 13: Spectral Graph Theory Lecturer: Shayan Oveis Gharan 11/14/18 Disclaimer: These notes have not been subjected to the usual scrutiny reserved

More information

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected

More information

DS504/CS586: Big Data Analytics Graph Mining II

DS504/CS586: Big Data Analytics Graph Mining II Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6-8:50PM Thursday Location: AK233 Spring 2018 v Course Project I has been graded. Grading was based on v 1. Project report

More information

Degree (k)

Degree (k) 0 1 Pr(X k) 0 0 1 Degree (k) Figure A1: Log-log plot of the complementary cumulative distribution function (CCDF) of the degree distribution for a sample month (January 0) network is shown (blue), along

More information