Skip to main content

Showing 1–19 of 19 results for author: Alvari, H

.
  1. arXiv:2312.12241  [pdf, other

    cs.CV cs.CL

    GeomVerse: A Systematic Evaluation of Large Models for Geometric Reasoning

    Authors: Mehran Kazemi, Hamidreza Alvari, Ankit Anand, Jialin Wu, Xi Chen, Radu Soricut

    Abstract: Large language models have shown impressive results for multi-hop mathematical reasoning when the input question is only textual. Many mathematical reasoning problems, however, contain both text and image. With the ever-increasing adoption of vision language models (VLMs), understanding their reasoning abilities for such problems is crucial. In this paper, we evaluate the reasoning capabilities of… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

  2. arXiv:2006.12995  [pdf, other

    econ.EM cs.LG stat.ML

    Mitigating Bias in Online Microfinance Platforms: A Case Study on Kiva.org

    Authors: Soumajyoti Sarkar, Hamidreza Alvari

    Abstract: Over the last couple of decades in the lending industry, financial disintermediation has occurred on a global scale. Traditionally, even for small supply of funds, banks would act as the conduit between the funds and the borrowers. It has now been possible to overcome some of the obstacles associated with such supply of funds with the advent of online platforms like Kiva, Prosper, LendingClub. Kiv… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

  3. arXiv:2001.04624  [pdf, other

    cs.SI

    A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts

    Authors: Hamidreza Alvari, Ghazaleh Beigi, Soumajyoti Sarkar, Scott W. Ruston, Steven R. Corman, Hasan Davulcu, Paulo Shakarian

    Abstract: Over the past few years, we have observed different media outlets' attempts to shift public opinion by framing information to support a narrative that facilitate their goals. Malicious users referred to as "pathogenic social media" (PSM) accounts are more likely to amplify this phenomena by spreading misinformation to viral proportions. Understanding the spread of misinformation from account-level… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  4. arXiv:1911.09872  [pdf, other

    cs.SI cs.CR cs.IR

    Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning

    Authors: Ghazaleh Beigi, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou, Huan Liu

    Abstract: Recommendation is one of the critical applications that helps users find information relevant to their interests. However, a malicious attacker can infer users' private information via recommendations. Prior work obfuscates user-item data before sharing it with recommendation system. This approach does not explicitly address the quality of recommendation while performing data obfuscation. Moreover… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: The Thirteenth ACM International Conference on Web Search and Data Mining (WSDM 2020)

  5. arXiv:1905.01553  [pdf, other

    cs.SI cs.IR cs.LG

    An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter

    Authors: Elham Shaabani, Ashkan Sadeghi-Mobarakeh, Hamidreza Alvari, Paulo Shakarian

    Abstract: Pathogenic Social Media (PSM) accounts such as terrorist supporter accounts and fake news writers have the capability of spreading disinformation to viral proportions. Early detection of PSM accounts is crucial as they are likely to be key users to make malicious information "viral". In this paper, we adopt the causal inference framework along with graph-based metrics in order to distinguish PSMs… ▽ More

    Submitted 4 May, 2019; originally announced May 2019.

    Comments: 9 pages, 8 figures, International Conference on Data Intelligence and Security. arXiv admin note: text overlap with arXiv:1905.01556

  6. arXiv:1904.05161  [pdf, other

    cs.SI physics.soc-ph

    Understanding Information Flow in Cascades Using Network Motifs

    Authors: Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian

    Abstract: A growing set of applications consider the process of network formation by using subgraphs as a tool for generating the network topology. One of the pressing research challenges is thus to be able to use these subgraphs to understand the network topology of information cascades which ultimately paves the way to theorize about how information spreads over time. In this paper, we make the first atte… ▽ More

    Submitted 8 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: text overlap with arXiv:1903.00862

  7. arXiv:1903.01693  [pdf, other

    cs.SI

    Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media

    Authors: Hamidreza Alvari, Elham Shaabani, Soumajyoti Sarkar, Ghazaleh Beigi, Paulo Shakarian

    Abstract: Recent years have witnessed a surge of manipulation of public opinion and political events by malicious social media actors. These users are referred to as "Pathogenic Social Media (PSM)" accounts. PSMs are key users in spreading misinformation in social media to viral proportions. These accounts can be either controlled by real users or automated bots. Identification of PSMs is thus of utmost imp… ▽ More

    Submitted 5 March, 2019; originally announced March 2019.

    Comments: Companion Proceedings of the 2019 World Wide Web Conference

  8. arXiv:1902.10366  [pdf, other

    cs.SI physics.soc-ph

    Leveraging Motifs to Model the Temporal Dynamics of Diffusion Networks

    Authors: Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian

    Abstract: Information diffusion mechanisms based on social influence models are mainly studied using likelihood of adoption when active neighbors expose a user to a message. The problem arises primarily from the fact that for the most part, this explicit information of who-exposed-whom among a group of active neighbors in a social network, before a susceptible node is infected is not available. In this pape… ▽ More

    Submitted 22 March, 2020; v1 submitted 27 February, 2019; originally announced February 2019.

  9. arXiv:1902.01970  [pdf, other

    cs.SI

    Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts

    Authors: Hamidreza Alvari, Paulo Shakarian

    Abstract: Over the past years, political events and public opinion on the Web have been allegedly manipulated by accounts dedicated to spreading disinformation and performing malicious activities on social media. These accounts hereafter referred to as "Pathogenic Social Media (PSM)" accounts, are often controlled by terrorist supporters, water armies or fake news writers and hence can pose threats to socia… ▽ More

    Submitted 5 February, 2019; originally announced February 2019.

    Comments: IEEE Conference on Data Intelligence and Security (ICDIS) 2019

  10. arXiv:1902.01577  [pdf, other

    cs.SI

    Detection of Violent Extremists in Social Media

    Authors: Hamidreza Alvari, Soumajyoti Sarkar, Paulo Shakarian

    Abstract: The ease of use of the Internet has enabled violent extremists such as the Islamic State of Iraq and Syria (ISIS) to easily reach large audience, build personal relationships and increase recruitment. Social media are primarily based on the reports they receive from their own users to mitigate the problem. Despite efforts of social media in suspending many accounts, this solution is not guaranteed… ▽ More

    Submitted 5 February, 2019; originally announced February 2019.

    Comments: IEEE Conference on Data Intelligence and Security (ICDIS) 2019

  11. arXiv:1809.09331  [pdf, other

    cs.SI cs.AI cs.LG

    Early Identification of Pathogenic Social Media Accounts

    Authors: Hamidreza Alvari, Elham Shaabani, Paulo Shakarian

    Abstract: Pathogenic Social Media (PSM) accounts such as terrorist supporters exploit large communities of supporters for conducting attacks on social media. Early detection of these accounts is crucial as they are high likely to be key users in making a harmful message "viral". In this paper, we make the first attempt on utilizing causal inference to identify PSMs within a short time frame around their act… ▽ More

    Submitted 26 September, 2018; v1 submitted 25 September, 2018; originally announced September 2018.

    Comments: IEEE Intelligence and Security Informatics (ISI) 2018

  12. arXiv:1806.09787  [pdf, ps, other

    cs.SI cs.AI

    Causal Inference for Early Detection of Pathogenic Social Media Accounts

    Authors: Hamidreza Alvari, Paulo Shakarian

    Abstract: Pathogenic social media accounts such as terrorist supporters exploit communities of supporters for conducting attacks on social media. Early detection of PSM accounts is crucial as they are likely to be key users in making a harmful message "viral". This paper overviews my recent doctoral work on utilizing causal inference to identify PSM accounts within a short time frame around their activity.… ▽ More

    Submitted 3 August, 2018; v1 submitted 26 June, 2018; originally announced June 2018.

    Comments: Doctoral Consortium - 2018 International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation

  13. arXiv:1712.09133  [pdf, other

    cs.LG

    Strongly Hierarchical Factorization Machines and ANOVA Kernel Regression

    Authors: Ruocheng Guo, Hamidreza Alvari, Paulo Shakarian

    Abstract: High-order parametric models that include terms for feature interactions are applied to various data mining tasks, where ground truth depends on interactions of features. However, with sparse data, the high- dimensional parameters for feature interactions often face three issues: expensive computation, difficulty in parameter estimation and lack of structure. Previous work has proposed approaches… ▽ More

    Submitted 5 January, 2018; v1 submitted 25 December, 2017; originally announced December 2017.

    Comments: 9 pages, to appear in SDM'18

  14. arXiv:1705.10786  [pdf, other

    cs.LG cs.AI

    Semi-Supervised Learning for Detecting Human Trafficking

    Authors: Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder

    Abstract: Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude. In this study, we leverage textual data from the website "Backpage"- used for classified advertisement- to discern potential patterns of human trafficking activities which manifest online and identify advertisements of high interest to law enf… ▽ More

    Submitted 30 May, 2017; originally announced May 2017.

  15. arXiv:1705.10455  [pdf, other

    cs.SI

    Exploiting Consistency Theory for Modeling Twitter Hashtag Adoption

    Authors: Hamidreza Alvari

    Abstract: Twitter, a microblogging service, has evolved into a powerful communication platform with millions of active users who generate immense volume of microposts on a daily basis. To facilitate effective categorization and easy search, users adopt hashtags, keywords or phrases preceded by hash (#) character. Successful prediction of the spread and propagation of information in the form of trending topi… ▽ More

    Submitted 30 May, 2017; originally announced May 2017.

  16. arXiv:1705.10453  [pdf, other

    cs.SI cs.IR

    Twitter Hashtag Recommendation using Matrix Factorization

    Authors: Hamidreza Alvari

    Abstract: Twitter, one of the biggest and most popular microblogging Websites, has evolved into a powerful communication platform which allows millions of active users to generate huge volume of microposts and queries on a daily basis. To accommodate effective categorization and easy search, users are allowed to make use of hashtags, keywords or phrases prefixed by hash character, to categorize and summariz… ▽ More

    Submitted 30 May, 2017; originally announced May 2017.

  17. arXiv:1609.02622  [pdf, other

    cs.SI physics.soc-ph

    Identifying Community Structures in Dynamic Networks

    Authors: Hamidreza Alvari, Alireza Hajibagheri, Gita Sukthankar, Kiran Lakkaraju

    Abstract: Most real-world social networks are inherently dynamic, composed of communities that are constantly changing in membership. To track these evolving communities, we need dynamic community detection techniques. This article evaluates the performance of a set of game theoretic approaches for identifying communities in dynamic networks. Our method, D-GT (Dynamic Game Theoretic community detection), mo… ▽ More

    Submitted 11 September, 2016; v1 submitted 8 September, 2016; originally announced September 2016.

    Comments: Accepted in Journal of Social Network Analysis and Mining (SNAM) 2016

  18. arXiv:1607.08691  [pdf, other

    cs.LG stat.ML

    A Non-Parametric Learning Approach to Identify Online Human Trafficking

    Authors: Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder

    Abstract: Human trafficking is among the most challenging law enforcement problems which demands persistent fight against from all over the globe. In this study, we leverage readily available data from the website "Backpage"-- used for classified advertisement-- to discern potential patterns of human trafficking activities which manifest online and identify most likely trafficking related advertisements. Du… ▽ More

    Submitted 1 August, 2016; v1 submitted 29 July, 2016; originally announced July 2016.

    Comments: Accepted in IEEE Intelligence and Security Informatics 2016 Conference (ISI 2016)

  19. arXiv:1607.08580  [pdf

    cs.AI cs.CY

    MIST: Missing Person Intelligence Synthesis Toolkit

    Authors: Elham Shaabani, Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder

    Abstract: Each day, approximately 500 missing persons cases occur that go unsolved/unresolved in the United States. The non-profit organization known as the Find Me Group (FMG), led by former law enforcement professionals, is dedicated to solving or resolving these cases. This paper introduces the Missing Person Intelligence Synthesis Toolkit (MIST) which leverages a data-driven variant of geospatial abduct… ▽ More

    Submitted 29 August, 2016; v1 submitted 28 July, 2016; originally announced July 2016.

    Comments: 10 pages, 12 figures, Accepted in CIKM 2016

    ACM Class: I.2.1; J.4; G.1.6