-
Outlier Aware Network Embedding for Attributed Networks
Authors:
Sambaran Bandyopadhyay,
Lokesh N,
M. N. Murty
Abstract:
Attributed network embedding has received much interest from the research community as most of the networks come with some content in each node, which is also known as node attributes. Existing attributed network approaches work well when the network is consistent in structure and attributes, and nodes behave as expected. But real world networks often have anomalous nodes. Typically these outliers…
▽ More
Attributed network embedding has received much interest from the research community as most of the networks come with some content in each node, which is also known as node attributes. Existing attributed network approaches work well when the network is consistent in structure and attributes, and nodes behave as expected. But real world networks often have anomalous nodes. Typically these outliers, being relatively unexplainable, affect the embeddings of other nodes in the network. Thus all the downstream network mining tasks fail miserably in the presence of such outliers. Hence an integrated approach to detect anomalies and reduce their overall effect on the network embedding is required.
Towards this end, we propose an unsupervised outlier aware network embedding algorithm (ONE) for attributed networks, which minimizes the effect of the outlier nodes, and hence generates robust network embeddings. We align and jointly optimize the loss functions coming from structure and attributes of the network. To the best of our knowledge, this is the first generic network embedding approach which incorporates the effect of outliers for an attributed network without any supervision. We experimented on publicly available real networks and manually planted different types of outliers to check the performance of the proposed algorithm. Results demonstrate the superiority of our approach to detect the network outliers compared to the state-of-the-art approaches. We also consider different downstream machine learning applications on networks to show the efficiency of ONE as a generic network embedding technique. The source code is made available at https://github.com/sambaranban/ONE.
△ Less
Submitted 19 November, 2018;
originally announced November 2018.
-
Usages of Composition Search Tree in Web Service Composition
Authors:
Lakshmi H N,
Hrushikesha Mohanty
Abstract:
The increasing availability of web services within an organization and on the Web demands for efficient search and composition mechanisms to find services satisfying user requirements. Often consumers may be unaware of exact service names that is fixed by service providers. Rather consumers being well aware of their requirements would like to search a service based on their commitments (inputs) an…
▽ More
The increasing availability of web services within an organization and on the Web demands for efficient search and composition mechanisms to find services satisfying user requirements. Often consumers may be unaware of exact service names that is fixed by service providers. Rather consumers being well aware of their requirements would like to search a service based on their commitments (inputs) and expectations (outputs). Based on this concept we have explored the feasibility of I/O based web service search and composition in our previous work. The classical definition of service composition, i.e., one-to-one and onto map** between input and output sets of composing services, is extended to give rise to three types of service match: Exact, Super and Partial match. Based on matches of all three types, different kinds of compositions are defined: Exact, Super and Collaborative Composition. Process of composition, being a match between inputs and outputs of services, is hastened by making use of information on service dependency that is made available in repository as an one time preprocessed information obtained from services populating the registry. Adopting three schemes for matching for a desired service outputs, the possibility of having different kinds of compositions is demonstrated in form of a Composition Search Tree. As an extension to our previous work, in this paper, we propose the utility of Composition Search Tree for finding compositions of interest like leanest and the shortest depth compositions.
△ Less
Submitted 6 April, 2015;
originally announced April 2015.
-
Classified Ads Harvesting Agent and Notification System
Authors:
Razvi Doomun,
Lollmahamod N.,
Auleear Nadeem,
Mozafar Aukin
Abstract:
The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In t…
▽ More
The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In this paper, we develop a real-time automatic harvesting agent for adverts posted on Servihoo web portal and an SMS-based notification system. It uses the URL of the web portal and the object model, i.e., the fields of interests and a set of rules written using the HTML parsing functions to extract latest adverts information. The extraction engine executes the extraction rules and stores the information in a database to be processed for automatic notification. This intelligent system helps to tremendously save time. It also enables users or potential product buyers to react more quickly to changes and newly posted sales adverts, paving the way to real-time best buy deals.
△ Less
Submitted 13 March, 2010;
originally announced March 2010.
-
A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining
Authors:
Mohammad Ali Kadampur,
Somayajulu D. V. L. N
Abstract:
Data mining deals with automatic extraction of previously unknown patterns from large amounts of data. Organizations all over the world handle large amounts of data and are dependent on mining gigantic data sets for expansion of their enterprises. These data sets typically contain sensitive individual information, which consequently get exposed to the other parties. Though we cannot deny the ben…
▽ More
Data mining deals with automatic extraction of previously unknown patterns from large amounts of data. Organizations all over the world handle large amounts of data and are dependent on mining gigantic data sets for expansion of their enterprises. These data sets typically contain sensitive individual information, which consequently get exposed to the other parties. Though we cannot deny the benefits of knowledge discovery that comes through data mining, we should also ensure that data privacy is maintained in the event of data mining. Privacy preserving data mining is a specialized activity in which the data privacy is ensured during data mining. Data privacy is as important as the extracted knowledge and efforts that guarantee data privacy during data mining are encouraged. In this paper we propose a strategy that protects the data privacy during decision tree analysis of data mining process. We propose to add specific noise to the numeric attributes after exploring the decision tree of the original data. The obfuscated data then is presented to the second party for decision tree analysis. The decision tree obtained on the original data and the obfuscated data are similar but by using our method the data proper is not revealed to the second party during the mining process and hence the privacy will be preserved.
△ Less
Submitted 20 January, 2010;
originally announced January 2010.