论文标题

关于在线社交网络中的侵略扩散建模和最小化

On the Aggression Diffusion Modeling and Minimization in Online Social Networks

论文作者

Poiitis, Marinos, Vakali, Athena, Kourtellis, Nicolas

论文摘要

在线社交网络中的侵略性主要是从机器学习的角度研究,该机器学习在静态环境中检测到这种行为。但是,由于嵌入建模挑战时,网络中侵略性扩散的方式很少受到关注。实际上,建模攻击性如何从一个用户到另一个用户是一个重要的研究主题,因为它可以启用有效的攻击监视,尤其是在媒体平台上,直到现在现在应用简单的用户阻止技术。在本文中,我们解决了Twitter上的侵略性传播建模和最小化,因为它是一个流行的微博平台,侵略性在该平台上具有多种侵害。我们建议在两个众所周知的扩散模型(IC)和线性阈值(LT)上构建各种方法,以研究社交网络中的攻击性演变。我们通过实验研究如何使用真实的Twitter数据来对攻击性进行建模,同时改变参数,例如种子用户选择,图形边缘加权,用户的激活时机等。发现最佳性能策略是选择基于学位的种子用户,基于他们的社交圈的重叠率和基于其积极性的基于程度的用户边缘的种子用户,并根据其积极的攻击水平进行了权衡。我们进一步采用最佳性能模型来预测将来哪些普通的真实用户可能会变得侵略性(反之亦然),并在此预测任务中达到了AUC = 0.89。最后,我们通过启动竞争性级联来“告知”和“治愈”侵略者来调查侵略性最小化。我们表明,IC和LT模型可用于侵略性最小化,提供了流行在线社交网络平台当前使用的阻止技术的侵入性替代方案。

Aggression in online social networks has been studied mostly from the perspective of machine learning which detects such behavior in a static context. However, the way aggression diffuses in the network has received little attention as it embeds modeling challenges. In fact, modeling how aggression propagates from one user to another, is an important research topic since it can enable effective aggression monitoring, especially in media platforms which up to now apply simplistic user blocking techniques. In this paper, we address aggression propagation modeling and minimization on Twitter, since it is a popular microblogging platform at which aggression had several onsets. We propose various methods building on two well-known diffusion models, Independent Cascade (IC) and Linear Threshold (LT), to study the aggression evolution in the social network. We experimentally investigate how well each method can model aggression propagation using real Twitter data, while varying parameters, such as seed users selection, graph edge weighting, users' activation timing, etc. It is found that the best performing strategies are the ones to select seed users with a degree-based approach, weigh user edges based on their social circles' overlaps, and activate users according to their aggression levels. We further employ the best performing models to predict which ordinary real users could become aggressive (and vice versa) in the future, and achieve up to AUC=0.89 in this prediction task. Finally, we investigate aggression minimization by launching competitive cascades to "inform" and "heal" aggressors. We show that IC and LT models can be used in aggression minimization, providing less intrusive alternatives to the blocking techniques currently employed by popular online social network platforms.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源