Skip to main content

Showing 1–48 of 48 results for author: Eliassi-Rad, T

.
  1. arXiv:2406.07642  [pdf, other

    cs.LG cs.SI

    Generating Human Understandable Explanations for Node Embeddings

    Authors: Zohair Shafi, Ayan Chatterjee, Tina Eliassi-Rad

    Abstract: Node embedding algorithms produce low-dimensional latent representations of nodes in a graph. These embeddings are often used for downstream tasks, such as node classification and link prediction. In this paper, we investigate the following two questions: (Q1) Can we explain each embedding dimension with human-understandable graph features (e.g. degree, clustering coefficient and PageRank). (Q2) H… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2405.00172  [pdf, other

    cs.LG cs.SI stat.ML

    Re-visiting Skip-Gram Negative Sampling: Dimension Regularization for More Efficient Dissimilarity Preservation in Graph Embeddings

    Authors: David Liu, Arjun Seshadri, Tina Eliassi-Rad, Johan Ugander

    Abstract: A wide range of graph embedding objectives decompose into two components: one that attracts the embeddings of nodes that are perceived as similar, and another that repels embeddings of nodes that are perceived as dissimilar. Because real-world graphs are sparse and the number of dissimilar pairs grows quadratically with the number of nodes, Skip-Gram Negative Sampling (SGNS) has emerged as a popul… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

  3. arXiv:2403.04063  [pdf, other

    cs.SI math.SP physics.soc-ph

    Assigning Entities to Teams as a Hypergraph Discovery Problem

    Authors: Guilherme Ferraz de Arruda, Wan He, Nasimeh Heydaribeni, Tara Javidi, Yamir Moreno, Tina Eliassi-Rad

    Abstract: We propose a team assignment algorithm based on a hypergraph approach focusing on resilience and diffusion optimization. Specifically, our method is based on optimizing the algebraic connectivity of the Laplacian matrix of an edge-dependent vertex-weighted hypergraph. We used constrained simulated annealing, where we constrained the effort agents can exert to perform a task and the minimum effort… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: 18 pages, 12 Figures

  4. arXiv:2401.08878  [pdf, other

    cs.SI cs.DB physics.soc-ph

    A Survey on Hypergraph Mining: Patterns, Tools, and Generators

    Authors: Geon Lee, Fanchen Bu, Tina Eliassi-Rad, Kijung Shin

    Abstract: Hypergraphs are a natural and powerful choice for modeling group interactions in the real world, which are often referred to as higher-order networks. For example, when modeling collaboration networks, where collaborations can involve not just two but three or more people, employing hypergraphs allows us to explore beyond pairwise (dyadic) patterns and capture groupwise (polyadic) patterns. The ma… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

  5. arXiv:2311.09375  [pdf, other

    math.OC cs.DC

    Distributed Constrained Combinatorial Optimization leveraging Hypergraph Neural Networks

    Authors: Nasimeh Heydaribeni, Xinrui Zhan, Ruisi Zhang, Tina Eliassi-Rad, Farinaz Koushanfar

    Abstract: Scalable addressing of high dimensional constrained combinatorial optimization problems is a challenge that arises in several science and engineering disciplines. Recent work introduced novel application of graph neural networks for solving quadratic-cost combinatorial optimization problems. However, effective utilization of models such as graph neural networks to address general problems with hig… ▽ More

    Submitted 16 May, 2024; v1 submitted 15 November, 2023; originally announced November 2023.

  6. arXiv:2310.09687  [pdf, other

    cs.LG cs.CY

    When Collaborative Filtering is not Collaborative: Unfairness of PCA for Recommendations

    Authors: David Liu, Jackie Baek, Tina Eliassi-Rad

    Abstract: We study the fairness of dimensionality reduction methods for recommendations. We focus on the established method of principal component analysis (PCA), which identifies latent components and produces a low-rank approximation via the leading components while discarding the trailing components. Prior works have defined notions of "fair PCA"; however, these definitions do not answer the following qu… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

  7. arXiv:2310.07980  [pdf, other

    cs.LG

    GRASP: Accelerating Shortest Path Attacks via Graph Attention

    Authors: Zohair Shafi, Benjamin A. Miller, Ayan Chatterjee, Tina Eliassi-Rad, Rajmonda S. Caceres

    Abstract: Recent advances in machine learning (ML) have shown promise in aiding and accelerating classical combinatorial optimization algorithms. ML-based speed ups that aim to learn in an end to end manner (i.e., directly output the solution) tend to trade off run time with solution quality. Therefore, solutions that are able to accelerate existing solvers while maintaining their performance guarantees, ar… ▽ More

    Submitted 23 October, 2023; v1 submitted 11 October, 2023; originally announced October 2023.

  8. arXiv:2310.07979  [pdf, other

    cs.LG cs.DM

    Graph-SCP: Accelerating Set Cover Problems with Graph Neural Networks

    Authors: Zohair Shafi, Benjamin A. Miller, Tina Eliassi-Rad, Rajmonda S. Caceres

    Abstract: Machine learning (ML) approaches are increasingly being used to accelerate combinatorial optimization (CO) problems. We look specifically at the Set Cover Problem (SCP) and propose Graph-SCP, a graph neural network method that can augment existing optimization solvers by learning to identify a much smaller sub-problem that contains the solution space. We evaluate the performance of Graph-SCP on sy… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

  9. arXiv:2308.05498  [pdf, other

    cs.SI

    Complex Network Effects on the Robustness of Graph Convolutional Networks

    Authors: Benjamin A. Miller, Kevin Chan, Tina Eliassi-Rad

    Abstract: Vertex classification -- the problem of identifying the class labels of nodes in a graph -- has applicability in a wide variety of domains. Examples include classifying subject areas of papers in citation networks or roles of machines in a computer network. Vertex classification using graph convolutional networks is susceptible to targeted poisoning attacks, in which both graph structure and node… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

    Comments: 39 pages, 8 figures. arXiv admin note: text overlap with arXiv:2003.05822

  10. arXiv:2308.03081  [pdf, other

    cs.SI

    Using Overlap** Methods to Counter Adversaries in Community Detection

    Authors: Benjamin A. Miller, Kevin Chan, Tina Eliassi-Rad

    Abstract: When dealing with large graphs, community detection is a useful data triage tool that can identify subsets of the network that a data analyst should investigate. In an adversarial scenario, the graph may be manipulated to avoid scrutiny of certain nodes by the analyst. Robustness to such behavior is an important consideration for data analysts in high-stakes scenarios such as cyber defense and cou… ▽ More

    Submitted 6 August, 2023; originally announced August 2023.

    Comments: 28 pages, 10 figures

  11. arXiv:2307.08877  [pdf, other

    cs.LG cs.SI

    Disentangling Node Attributes from Graph Topology for Improved Generalizability in Link Prediction

    Authors: Ayan Chatterjee, Robin Walters, Giulia Menichetti, Tina Eliassi-Rad

    Abstract: Link prediction is a crucial task in graph machine learning with diverse applications. We explore the interplay between node attributes and graph topology and demonstrate that incorporating pre-trained node attributes improves the generalization power of link prediction models. Our proposed method, UPNA (Unsupervised Pre-training of Node Attributes), solves the inductive link prediction problem by… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: 17 pages, 6 figures

  12. arXiv:2306.13723  [pdf, other

    cs.AI

    Human-AI Coevolution

    Authors: Dino Pedreschi, Luca Pappalardo, Emanuele Ferragina, Ricardo Baeza-Yates, Albert-Laszlo Barabasi, Frank Dignum, Virginia Dignum, Tina Eliassi-Rad, Fosca Giannotti, Janos Kertesz, Alistair Knott, Yannis Ioannidis, Paul Lukowicz, Andrea Passarella, Alex Sandy Pentland, John Shawe-Taylor, Alessandro Vespignani

    Abstract: Human-AI coevolution, defined as a process in which humans and AI algorithms continuously influence each other, increasingly characterises our society, but is understudied in artificial intelligence and complexity science literature. Recommender systems and assistants play a prominent role in human-AI coevolution, as they permeate many facets of daily life and influence human choices on online pla… ▽ More

    Submitted 3 May, 2024; v1 submitted 23 June, 2023; originally announced June 2023.

  13. arXiv:2306.03009  [pdf, other

    stat.ML cs.LG stat.AP

    Using Sequences of Life-events to Predict Human Lives

    Authors: Germans Savcisens, Tina Eliassi-Rad, Lars Kai Hansen, Laust Mortensen, Lau Lilleholt, Anna Rogers, Ingo Zettler, Sune Lehmann

    Abstract: Over the past decade, machine learning has revolutionized computers' ability to analyze text through flexible computational models. Due to their structural similarity to written language, transformer-based architectures have also shown promise as tools to make sense of a range of multi-variate sequences from protein-structures, music, electronic health records to weather-forecasts. We can also rep… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

  14. arXiv:2305.19083  [pdf, other

    cs.SI

    Defense Against Shortest Path Attacks

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is an important task in applications involving routing of resources. Recent work has shown that a malicious actor can manipulate a graph to make traffic between two nodes of interest follow their target path. In this paper, we develop a defense against such attacks by modifying the weights of the graph that users observe. The defender must bala… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  15. arXiv:2305.06160  [pdf

    q-bio.NC

    Neuroscience needs Network Science

    Authors: Dániel L Barabási, Ginestra Bianconi, Ed Bullmore, Mark Burgess, SueYeon Chung, Tina Eliassi-Rad, Dileep George, István A. Kovács, Hernán Makse, Christos Papadimitriou, Thomas E. Nichols, Olaf Sporns, Kim Stachenfeld, Zoltán Toroczkai, Emma K. Towlson, Anthony M Zador, Hongkui Zeng, Albert-László Barabási, Amy Bernard, György Buzsáki

    Abstract: The brain is a complex system comprising a myriad of interacting elements, posing significant challenges in understanding its structure, function, and dynamics. Network science has emerged as a powerful tool for studying such intricate systems, offering a framework for integrating multiscale data and complexity. Here, we discuss the application of network science in the study of the brain, address… ▽ More

    Submitted 11 May, 2023; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: 19 pages, 1 figure, 1 box

  16. arXiv:2303.09086  [pdf, other

    cs.SI cs.DS math.OC

    Optimal Intervention on Weighted Networks via Edge Centrality

    Authors: Dongyue Li, Tina Eliassi-Rad, Hongyang R. Zhang

    Abstract: Suppose there is a spreading process such as an infectious disease propagating on a graph. How would we reduce the number of affected nodes in the spreading process? This question appears in recent studies about implementing mobility interventions on mobility networks (Chang et al. (2021)). A practical algorithm to reduce infections on unweighted graphs is to remove edges with the highest edge cen… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Comments: 15 pages, 4 figures, 3 tables. SIAM International Conference on Data Mining, 2023 (Extended version)

  17. arXiv:2212.08873  [pdf, other

    physics.soc-ph physics.data-an stat.AP

    Characterizing collective physical distancing in the U.S. during the first nine months of the COVID-19 pandemic

    Authors: Brennan Klein, Timothy LaRock, Stefan McCabe, Leo Torres, Lisa Friedland, Maciej Kos, Filippo Privitera, Brennan Lake, Moritz U. G. Kraemer, John S. Brownstein, Richard Gonzalez, David Lazer, Tina Eliassi-Rad, Samuel V. Scarpino, Alessandro Vespignani, Matteo Chinazzi

    Abstract: The COVID-19 pandemic offers an unprecedented natural experiment providing insights into the emergence of collective behavioral changes of both exogenous (government mandated) and endogenous (spontaneous reaction to infection risks) origin. Here, we characterize collective physical distancing -- mobility reductions, minimization of contacts, shortening of contact duration -- in response to the COV… ▽ More

    Submitted 17 December, 2022; originally announced December 2022.

  18. arXiv:2211.11141  [pdf, other

    cs.SI

    Attacking Shortest Paths by Cutting Edges

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is a common graph analysis problem that is important for many applications involving routing of resources. An adversary that can manipulate the graph structure could alter traffic patterns to gain some benefit (e.g., make more money by directing traffic to a toll road). This paper presents the Force Path Cut problem, in which an adversary remov… ▽ More

    Submitted 20 November, 2022; originally announced November 2022.

    Comments: 37 pages, 11 figures; Extended version of arXiv:2104.03761

  19. arXiv:2210.06417  [pdf, other

    cs.HC cs.CY cs.GR cs.SI

    BiaScope: Visual Unfairness Diagnosis for Graph Embeddings

    Authors: Agapi Rissaki, Bruno Scarone, David Liu, Aditeya Pandey, Brennan Klein, Tina Eliassi-Rad, Michelle A. Borkin

    Abstract: The issue of bias (i.e., systematic unfairness) in machine learning models has recently attracted the attention of both researchers and practitioners. For the graph mining community in particular, an important goal toward algorithmic fairness is to detect and mitigate bias incorporated into graph embeddings since they are commonly used in human-centered applications, e.g., social-media recommendat… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

    Comments: Accepted to VDS at IEEE VIS 2022

  20. arXiv:2208.03276  [pdf, other

    cs.CR math.DS stat.AP

    Modeling Self-Propagating Malware with Epidemiological Models

    Authors: Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Nicola Perra, Tina Eliassi-Rad, Alina Oprea

    Abstract: Self-propagating malware (SPM) has recently resulted in large financial losses and high social impact, with well-known campaigns such as WannaCry and Colonial Pipeline being able to propagate rapidly on the Internet and cause service disruptions. To date, the propagation behavior of SPM is still not well understood, resulting in the difficulty of defending against these cyber threats. To address t… ▽ More

    Submitted 3 August, 2023; v1 submitted 5 August, 2022; originally announced August 2022.

  21. arXiv:2206.13594  [pdf, other

    cs.CR math.DS math.SP stat.AP

    Cyber Network Resilience against Self-Propagating Malware Attacks

    Authors: Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Priyanka Angadi, John Loughner, Matthew Wilden, Nicola Perra, Tina Eliassi-Rad, Alina Oprea

    Abstract: Self-propagating malware (SPM) has led to huge financial losses, major data breaches, and widespread service disruptions in recent years. In this paper, we explore the problem of develo** cyber resilient systems capable of mitigating the spread of SPM attacks. We begin with an in-depth study of a well-known self-propagating malware, WannaCry, and present a compartmental model called SIIDR that a… ▽ More

    Submitted 8 October, 2022; v1 submitted 27 June, 2022; originally announced June 2022.

    Comments: 20 pages

  22. arXiv:2205.11459  [pdf, other

    cs.CR cs.LG

    CELEST: Federated Learning for Globally Coordinated Threat Detection

    Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Jack Davidson

    Abstract: The cyber-threat landscape has evolved tremendously in recent years, with new threat variants emerging daily, and large-scale coordinated campaigns becoming more prevalent. In this study, we propose CELEST (CollaborativE LEarning for Scalable Threat detection, a federated machine learning framework for global threat detection over HTTP, which is one of the most commonly used protocols for malware… ▽ More

    Submitted 16 March, 2023; v1 submitted 23 May, 2022; originally announced May 2022.

  23. arXiv:2205.10647  [pdf, other

    cs.SI

    Identifying and Mitigating Instability in Embeddings of the Degenerate Core

    Authors: David Liu, Tina Eliassi-Rad

    Abstract: Are the embeddings of a graph's degenerate core stable? What happens to the embeddings of nodes in the degenerate core as we systematically remove periphery nodes (by repeated peeling off $k$-cores)? We discover three patterns w.r.t. instability in degenerate-core embeddings across a variety of popular graph embedding algorithms and datasets. We use regression to quantify the change point in graph… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

  24. arXiv:2112.13798  [pdf, other

    cs.CR

    PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection

    Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan

    Abstract: Recent self-propagating malware (SPM) campaigns compromised hundred of thousands of victim machines on the Internet. It is challenging to detect these attacks in their early stages, as adversaries utilize common network services, use novel techniques, and can evade existing detection mechanisms. We propose PORTFILER (PORT-Level Network Traffic ProFILER), a new machine learning system applied to ne… ▽ More

    Submitted 24 May, 2022; v1 submitted 27 December, 2021; originally announced December 2021.

    Comments: An earlier version is accepted to be published in IEEE Conference on Communications and Network Security (CNS) 2021

  25. arXiv:2112.13168  [pdf, other

    q-bio.QM cs.LG

    AI-Bind: Improving Binding Predictions for Novel Protein Targets and Ligands

    Authors: Ayan Chatterjee, Robin Walters, Zohair Shafi, Omair Shafi Ahmed, Michael Sebek, Deisy Gysi, Rose Yu, Tina Eliassi-Rad, Albert-László Barabási, Giulia Menichetti

    Abstract: Identifying novel drug-target interactions (DTI) is a critical and rate limiting step in drug discovery. While deep learning models have been proposed to accelerate the identification process, we show that state-of-the-art models fail to generalize to novel (i.e., never-before-seen) structures. We first unveil the mechanisms responsible for this shortcoming, demonstrating how models rely on shortc… ▽ More

    Submitted 9 November, 2022; v1 submitted 24 December, 2021; originally announced December 2021.

    Comments: 83 pages, 26 figures, all references moved to a single section, new results added on AI interpretability, added comparison with MolTrans, added validation using gold standard experimental data

  26. arXiv:2112.05642  [pdf, other

    physics.soc-ph cs.SI

    Sequential Motifs in Observed Walks

    Authors: Timothy LaRock, Ingo Scholtes, Tina Eliassi-Rad

    Abstract: The structure of complex networks can be characterized by counting and analyzing network motifs. Motifs are small subgraphs that occur repeatedly in a network, such as triangles or chains. Recent work has generalized motifs to temporal and dynamic network data. However, existing techniques do not generalize to sequential or trajectory data, which represents entities moving through the nodes of a n… ▽ More

    Submitted 3 January, 2022; v1 submitted 10 December, 2021; originally announced December 2021.

  27. arXiv:2110.11925  [pdf, other

    physics.soc-ph cs.SI

    A Path-based Approach to Analyzing the Global Liner Ship** Network

    Authors: Timothy LaRock, Mengqiao Xu, Tina Eliassi-Rad

    Abstract: The maritime ship** network is the backbone of global trade. Data about the movement of cargo through this network comes in various forms, from ship-level Automatic Identification System (AIS) data, to aggregated bilateral trade volume statistics. Multiple network representations of the ship** system can be derived from any one data source, each of which has advantages and disadvantages. In th… ▽ More

    Submitted 22 October, 2021; originally announced October 2021.

    Comments: 32 pages, 11 figures

  28. arXiv:2107.03347  [pdf, other

    cs.SI

    Optimal Edge Weight Perturbations to Attack Shortest Paths

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Finding shortest paths in a given network (e.g., a computer network or a road network) is a well-studied task with many applications. We consider this task under the presence of an adversary, who can manipulate the network by perturbing its edge weights to gain an advantage over others. Specifically, we introduce the Force Path Problem as follows. Given a network, the adversary's goal is to make a… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

  29. arXiv:2107.02263  [pdf, other

    cs.SI

    Information Access Equality on Network Generative Models

    Authors: Xindi Wang, Onur Varol, Tina Eliassi-Rad

    Abstract: It is well known that networks generated by common mechanisms such as preferential attachment and homophily can disadvantage the minority group by limiting their ability to establish links with the majority group. This has the effect of limiting minority nodes' access to information. We present the results of an empirical study on the equality of information access in network models with different… ▽ More

    Submitted 19 December, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

  30. arXiv:2104.11636  [pdf, other

    cs.CR

    Collaborative Information Sharing for ML-Based Threat Detection

    Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson

    Abstract: Recently, coordinated attack campaigns started to become more widespread on the Internet. In May 2017, WannaCry infected more than 300,000 machines in 150 countries in a few days and had a large impact on critical infrastructure. Existing threat sharing platforms cannot easily adapt to emerging attack patterns. At the same time, enterprises started to adopt machine learning-based threat detection… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 6 pages, 5 figures. To be published in AI4CS-SDM2021

  31. arXiv:2104.03909  [pdf, other

    cs.CY cs.AI cs.LG

    RAWLSNET: Altering Bayesian Networks to Encode Rawlsian Fair Equality of Opportunity

    Authors: David Liu, Zohair Shafi, William Fleisher, Tina Eliassi-Rad, Scott Alfeld

    Abstract: We present RAWLSNET, a system for altering Bayesian Network (BN) models to satisfy the Rawlsian principle of fair equality of opportunity (FEO). RAWLSNET's BN models generate aspirational data distributions: data generated to reflect an ideally fair, FEO-satisfying society. FEO states that everyone with the same talent and willingness to use it should have the same chance of achieving advantageous… ▽ More

    Submitted 15 March, 2021; originally announced April 2021.

    Comments: 12 pages

  32. arXiv:2104.03761  [pdf, other

    cs.SI

    PATHATTACK: Attacking Shortest Paths in Complex Networks

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Shortest paths in complex networks play key roles in many applications. Examples include routing packets in a computer network, routing traffic on a transportation network, and inferring semantic distances between concepts on the World Wide Web. An adversary with the capability to perturb the graph might make the shortest path between two nodes route traffic through advantageous portions of the gr… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

  33. arXiv:2008.05589  [pdf, other

    cs.SI physics.soc-ph

    Optimizing Graph Structure for Targeted Diffusion

    Authors: Sixie Yu, Leonardo Torres, Scott Alfeld, Tina Eliassi-Rad, Yevgeniy Vorobeychik

    Abstract: The problem of diffusion control on networks has been extensively studied, with applications ranging from marketing to controlling infectious disease. However, in many applications, such as cybersecurity, an attacker may want to attack a targeted subgraph of a network, while limiting the impact on the rest of the network in order to remain undetected. We present a model POTION in which the princip… ▽ More

    Submitted 17 February, 2021; v1 submitted 12 August, 2020; originally announced August 2020.

    Comments: Corrected a few citation errors in the appendix

  34. arXiv:2006.02870  [pdf, other

    cs.SI cs.DM q-bio.QM

    The why, how, and when of representations for complex systems

    Authors: Leo Torres, Ann S. Blevins, Danielle S. Bassett, Tina Eliassi-Rad

    Abstract: Complex systems thinking is applied to a wide variety of domains, from neuroscience to computer science and economics. The wide variety of implementations has resulted in two key challenges: the progenation of many domain-specific strategies that are seldom revisited or questioned, and the siloing of ideas within a domain due to inconsistency of complex systems language. In this work we offer basi… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

    Comments: 50 pages, 18 figures

    MSC Class: 68R10

  35. arXiv:2003.05822  [pdf, other

    cs.LG stat.ML

    Topological Effects on Attacks Against Vertex Classification

    Authors: Benjamin A. Miller, Mustafa Çamurcu, Alexander J. Gomez, Kevin Chan, Tina Eliassi-Rad

    Abstract: Vertex classification is vulnerable to perturbations of both graph topology and vertex attributes, as shown in recent research. As in other machine learning domains, concerns about robustness to adversarial manipulation can prevent potential users from adopting proposed methods when the consequence of action is very high. This paper considers two topological characteristics of graphs and explores… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

    Comments: 17 pages, 11 figures

  36. arXiv:2002.12309  [pdf, other

    cs.SI

    Node Immunization with Non-backtracking Eigenvalues

    Authors: Leo Torres, Kevin S. Chan, Hanghang Tong, Tina Eliassi-Rad

    Abstract: The non-backtracking matrix and its eigenvalues have many applications in network science and graph mining, such as node and edge centrality, community detection, length spectrum theory, graph distance, and epidemic and percolation thresholds. Moreover, in network epidemiology, the reciprocal of the largest eigenvalue of the non-backtracking matrix is a good approximation for the epidemic threshol… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

  37. arXiv:2001.07607  [pdf, other

    cs.LG stat.ML

    Understanding the Limitations of Network Online Learning

    Authors: Timothy LaRock, Timothy Sakharov, Sahely Bhadra, Tina Eliassi-Rad

    Abstract: Studies of networked phenomena, such as interactions in online social media, often rely on incomplete data, either because these phenomena are partially observed, or because the data is too large or expensive to acquire all at once. Analysis of incomplete data leads to skewed or misleading results. In this paper, we investigate limitations of learning to complete partially observed networks via no… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

  38. arXiv:1909.07294  [pdf, other

    cs.LG stat.ML

    Selective Network Discovery via Deep Reinforcement Learning on Embedded Spaces

    Authors: Peter Morales, Rajmonda Sulo Caceres, Tina Eliassi-Rad

    Abstract: Complex networks are often either too large for full exploration, partially accessible, or partially observed. Downstream learning tasks on these incomplete networks can produce low quality results. In addition, reducing the incompleteness of the network can be costly and nontrivial. As a result, network discovery algorithms optimized for specific downstream learning tasks given resource collectio… ▽ More

    Submitted 21 October, 2020; v1 submitted 16 September, 2019; originally announced September 2019.

    Comments: Submitted for review to the journal of applied network science (2020). This adds several new sections from the original complex networks submission which can be viewed under v1 or at https://link.springer.com/chapter/10.1007/978-3-030-36687-2_75

    MSC Class: 68T37

  39. arXiv:1908.04628  [pdf, other

    cs.LG cs.DS stat.ML

    L2P: Learning to Place for Estimating Heavy-Tailed Distributed Outcomes

    Authors: Xindi Wang, Onur Varol, Tina Eliassi-Rad

    Abstract: Many real-world prediction tasks have outcome variables that have characteristic heavy-tail distributions. Examples include copies of books sold, auction prices of art pieces, demand for commodities in warehouses, etc. By learning heavy-tailed distributions, "big and rare" instances (e.g., the best-sellers) will have accurate predictions. Most existing approaches are not dedicated to learning heav… ▽ More

    Submitted 12 October, 2023; v1 submitted 13 August, 2019; originally announced August 2019.

    Comments: 9 pages, 6 figures, 2 tables Nature of changes from previous version: 1. Added complexity analysis in Section 2.2 2. Datasets change 3. Added LambdaMART in the baseline methods, also a brief discussion on why LambdaMart failed in our problem. 4. Figure updates

  40. arXiv:1907.04846  [pdf, other

    cs.CR cs.LG stat.ML

    On Designing Machine Learning Models for Malicious Network Traffic Classification

    Authors: Talha Ongun, Timothy Sakharaov, Simona Boboila, Alina Oprea, Tina Eliassi-Rad

    Abstract: Machine learning (ML) started to become widely deployed in cyber security settings for shortening the detection cycle of cyber attacks. To date, most ML-based systems are either proprietary or make specific choices of feature representations and machine learning models. The success of these techniques is difficult to assess as public benchmark datasets are currently unavailable. In this paper, we… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

  41. arXiv:1905.10580  [pdf, other

    cs.SI physics.soc-ph

    HYPA: Efficient Detection of Path Anomalies in Time Series Data on Networks

    Authors: Timothy LaRock, Vahan Nanumyan, Ingo Scholtes, Giona Casiraghi, Tina Eliassi-Rad, Frank Schweitzer

    Abstract: The unsupervised detection of anomalies in time series data has important applications in user behavioral modeling, fraud detection, and cybersecurity. Anomaly detection has, in fact, been extensively studied in categorical sequences. However, we often have access to time series data that represent paths through networks. Examples include transaction sequences in financial networks, click streams… ▽ More

    Submitted 29 January, 2020; v1 submitted 25 May, 2019; originally announced May 2019.

    Comments: 11 pages with 8 figures and supplementary material. To appear at SIAM Data Mining (SDM 2020)

    Journal ref: Proceedings of the 2020 SIAM International Conference on Data Mining (SDM) (2020) 460 - 468

  42. GLEE: Geometric Laplacian Eigenmap Embedding

    Authors: Leo Torres, Kevin S Chan, Tina Eliassi-Rad

    Abstract: Graph embedding seeks to build a low-dimensional representation of a graph G. This low-dimensional representation is then used for various downstream tasks. One popular approach is Laplacian Eigenmaps, which constructs a graph embedding based on the spectral properties of the Laplacian matrix of G. The intuition behind it, and many other embedding techniques, is that the embedding of a graph must… ▽ More

    Submitted 20 January, 2020; v1 submitted 23 May, 2019; originally announced May 2019.

  43. arXiv:1807.09592  [pdf, other

    cs.SI physics.data-an physics.soc-ph

    Graph Distance from the Topological View of Non-backtracking Cycles

    Authors: Leo Torres, Pablo Suarez-Serrato, Tina Eliassi-Rad

    Abstract: Whether comparing networks to each other or to random expectation, measuring dissimilarity is essential to understanding the complex phenomena under study. However, determining the structural dissimilarity between networks is an ill-defined problem, as there is no canonical way to compare two networks. Indeed, many of the existing approaches for network comparison differ in their heuristics, effic… ▽ More

    Submitted 19 July, 2018; originally announced July 2018.

    Comments: 17 pages

    MSC Class: 05C30

  44. arXiv:1609.02646  [pdf, other

    cs.AI

    Some Advances in Role Discovery in Graphs

    Authors: Sean Gilpin, Chia-Tung Kuo, Tina Eliassi-Rad, Ian Davidson

    Abstract: Role discovery in graphs is an emerging area that allows analysis of complex graphs in an intuitive way. In contrast to other graph prob- lems such as community discovery, which finds groups of highly connected nodes, the role discovery problem finds groups of nodes that share similar graph topological structure. However, existing work so far has two severe limitations that prevent its use in some… ▽ More

    Submitted 8 September, 2016; originally announced September 2016.

  45. arXiv:1511.06463  [pdf, other

    cs.SI physics.soc-ph

    MaxOutProbe: An Algorithm for Increasing the Size of Partially Observed Networks

    Authors: Sucheta Soundarajan, Tina Eliassi-Rad, Brian Gallagher, Ali Pinar

    Abstract: Networked representations of real-world phenomena are often partially observed, which lead to incomplete networks. Analysis of such incomplete networks can lead to skewed results. We examine the following problem: given an incomplete network, which $b$ nodes should be probed to bring the largest number of new nodes into the observed network? Many graph-mining tasks require having observed a consid… ▽ More

    Submitted 19 November, 2015; originally announced November 2015.

    Comments: NIPS Workshop on Networks in the Social and Information Sciences

    Report number: LLNL-CONF-677677

  46. arXiv:1209.2684  [pdf, other

    cs.SI physics.soc-ph stat.AP

    NetSimile: A Scalable Approach to Size-Independent Network Similarity

    Authors: Michele Berlingerio, Danai Koutra, Tina Eliassi-Rad, Christos Faloutsos

    Abstract: Given a set of k networks, possibly with different sizes and no overlaps in nodes or edges, how can we quickly assess similarity between them, without solving the node-correspondence problem? Analogously, how can we extract a small number of descriptive, numerical features from each graph that effectively serve as the graph's "signature"? Having such features will enable a wealth of graph mining t… ▽ More

    Submitted 12 September, 2012; originally announced September 2012.

    Comments: 12 pages, 10 figures

  47. arXiv:1112.2774  [pdf, other

    cs.SI physics.soc-ph

    Measuring Tie Strength in Implicit Social Networks

    Authors: Mangesh Gupte, Tina Eliassi-Rad

    Abstract: Given a set of people and a set of events they attend, we address the problem of measuring connectedness or tie strength between each pair of persons given that attendance at mutual events gives an implicit social network between people. We take an axiomatic approach to this problem. Starting from a list of axioms that a measure of tie strength must satisfy, we characterize functions that satisfy… ▽ More

    Submitted 12 December, 2011; originally announced December 2011.

    Comments: 10 pages

  48. arXiv:cs/0504072  [pdf, ps, other

    cs.AI physics.soc-ph

    Knowledge Representation Issues in Semantic Graphs for Relationship Detection

    Authors: Marc Barthelemy, Edmond Chow, Tina Eliassi-Rad

    Abstract: An important task for Homeland Security is the prediction of threat vulnerabilities, such as through the detection of relationships between seemingly disjoint entities. A structure used for this task is a "semantic graph", also known as a "relational data graph" or an "attributed relational graph". These graphs encode relationships as "typed" links between a pair of "typed" nodes. Indeed, semant… ▽ More

    Submitted 14 April, 2005; originally announced April 2005.

    Comments: 9 pages, 2 tables, 7 figures

    Journal ref: Papers from the 2005 AAAI Spring Symposium, AAAI Press, 2005, pp. 91-98