Skip to main content

Showing 1–8 of 8 results for author: Gallagher, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2111.03729  [pdf, other

    eess.IV cs.CV cs.LG

    Explaining neural network predictions of material strength

    Authors: Ian A. Palmer, T. Nathan Mundhenk, Brian Gallagher, Yong Han

    Abstract: We recently developed a deep learning method that can determine the critical peak stress of a material by looking at scanning electron microscope (SEM) images of the material's crystals. However, it has been somewhat unclear what kind of image features the network is keying off of when it makes its prediction. It is common in computer vision to employ an explainable AI saliency map to tell one wha… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

  2. arXiv:1610.00782  [pdf, other

    cs.SI cs.AI physics.soc-ph

    Network Structure Inference, A Survey: Motivations, Methods, and Applications

    Authors: Ivan Brugere, Brian Gallagher, Tanya Y. Berger-Wolf

    Abstract: Networks represent relationships between entities in many complex systems, spanning from online social interactions to biological cell development and brain connectivity. In many cases, relationships between entities are unambiguously known: are two users 'friends' in a social network? Do two researchers collaborate on a published paper? Do two road segments in a transportation system intersect? T… ▽ More

    Submitted 19 January, 2018; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: 37 pages, ACM Computing Surveys (in press)

  3. arXiv:1608.00712  [pdf, other

    cs.LG

    Size-Consistent Statistics for Anomaly Detection in Dynamic Networks

    Authors: Timothy La Fond, Jennifer Neville, Brian Gallagher

    Abstract: An important task in network analysis is the detection of anomalous events in a network time series. These events could merely be times of interest in the network timeline or they could be examples of malicious activity or network malfunction. Hypothesis testing using network statistics to summarize the behavior of the network provides a robust framework for the anomaly detection decision process.… ▽ More

    Submitted 2 August, 2016; originally announced August 2016.

  4. arXiv:1511.06463  [pdf, other

    cs.SI physics.soc-ph

    MaxOutProbe: An Algorithm for Increasing the Size of Partially Observed Networks

    Authors: Sucheta Soundarajan, Tina Eliassi-Rad, Brian Gallagher, Ali Pinar

    Abstract: Networked representations of real-world phenomena are often partially observed, which lead to incomplete networks. Analysis of such incomplete networks can lead to skewed results. We examine the following problem: given an incomplete network, which $b$ nodes should be probed to bring the largest number of new nodes into the observed network? Many graph-mining tasks require having observed a consid… ▽ More

    Submitted 19 November, 2015; originally announced November 2015.

    Comments: NIPS Workshop on Networks in the Social and Information Sciences

    Report number: LLNL-CONF-677677

  5. arXiv:1411.3749  [pdf, other

    cs.SI physics.soc-ph

    Anomaly Detection in Dynamic Networks of Varying Size

    Authors: Timothy La Fond, Jennifer Neville, Brian Gallagher

    Abstract: Dynamic networks, also called network streams, are an important data representation that applies to many real-world domains. Many sets of network data such as e-mail networks, social networks, or internet traffic networks are best represented by a dynamic network due to the temporal component of the data. One important application in the domain of dynamic network analysis is anomaly detection. Her… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

  6. arXiv:1410.3915  [pdf, other

    cs.LG cs.IR cs.SI

    Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective

    Authors: Neil Shah, Alex Beutel, Brian Gallagher, Christos Faloutsos

    Abstract: How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales. Web services and social networks which incentivize popularity thus suffer from a major problem of fake connections from link fraudsters looking to make a quick buck. Typical methods o… ▽ More

    Submitted 14 October, 2014; originally announced October 2014.

  7. arXiv:1205.2056  [pdf, other

    cs.SI cs.LG physics.soc-ph stat.ML

    Dynamic Behavioral Mixed-Membership Model for Large Evolving Networks

    Authors: Ryan Rossi, Brian Gallagher, Jennifer Neville, Keith Henderson

    Abstract: The majority of real-world networks are dynamic and extremely large (e.g., Internet Traffic, Twitter, Facebook, ...). To understand the structural behavior of nodes in these large dynamic networks, it may be necessary to model the dynamics of behavioral roles representing the main connectivity patterns over time. In this paper, we propose a dynamic behavioral mixed-membership model (DBMM) that cap… ▽ More

    Submitted 9 May, 2012; originally announced May 2012.

  8. arXiv:1203.2200  [pdf, other

    cs.SI cs.AI cs.LG stat.ML

    Role-Dynamics: Fast Mining of Large Dynamic Networks

    Authors: Ryan Rossi, Brian Gallagher, Jennifer Neville, Keith Henderson

    Abstract: To understand the structural dynamics of a large-scale social, biological or technological network, it may be useful to discover behavioral roles representing the main connectivity patterns present over time. In this paper, we propose a scalable non-parametric approach to automatically learn the structural dynamics of the network and individual nodes. Roles may represent structural or behavioral p… ▽ More

    Submitted 9 March, 2012; originally announced March 2012.

    ACM Class: H.2.8; G.2.2