-
Understanding team collapse via probabilistic graphical models
Authors:
Iasonas Nikolaou,
Konstantinos Pelechrinis,
Evimaria Terzi
Abstract:
In this work, we develop a graphical model to capture team dynamics. We analyze the model and show how to learn its parameters from data. Using our model we study the phenomenon of team collapse from a computational perspective. We use simulations and real-world experiments to find the main causes of team collapse. We also provide the principles of building resilient teams, i.e., teams that avoid…
▽ More
In this work, we develop a graphical model to capture team dynamics. We analyze the model and show how to learn its parameters from data. Using our model we study the phenomenon of team collapse from a computational perspective. We use simulations and real-world experiments to find the main causes of team collapse. We also provide the principles of building resilient teams, i.e., teams that avoid collapsing. Finally, we use our model to analyze the structure of NBA teams and dive deeper into games of interest.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Spotting Anomalous Trades in NFT Markets: The Case of NBA Topshot
Authors:
Konstantinos Pelechrinis,
Xin Liu,
Prashant Krishnamurthy,
Amy Babay
Abstract:
Non-Fungible Token (NFT) markets are one of the fastest growing digital markets today, with the sales during the third quarter of 2021 exceeding $10 billions! Nevertheless, these emerging markets - similar to traditional emerging marketplaces - can be seen as a great opportunity for illegal activities (e.g., money laundering, sale of illegal goods etc.). In this study we focus on a specific market…
▽ More
Non-Fungible Token (NFT) markets are one of the fastest growing digital markets today, with the sales during the third quarter of 2021 exceeding $10 billions! Nevertheless, these emerging markets - similar to traditional emerging marketplaces - can be seen as a great opportunity for illegal activities (e.g., money laundering, sale of illegal goods etc.). In this study we focus on a specific marketplace, namely NBA TopShot, that facilitates the purchase and (peer-to-peer) trading of sports collectibles. Our objective is to build a framework that is able to label peer-to-peer transactions on the platform as anomalous or not. To achieve our objective we begin by building a model for the profit to be made by selling a specific collectible on the platform. We then use RFCDE - a random forest model for the conditional density of the dependent variable - to model the errors from the profit models. This step allows us to estimate the probability of a transaction being anomalous. We finally label as anomalous any transaction whose aforementioned probability is less than 1%. Given the absence of ground truth for evaluating the model in terms of its classification of transactions, we analyze the trade networks formed from these anomalous transactions and compare it with the full trade network of the platform. Our results indicate that these two networks are statistically different when it comes to network metrics such as, edge density, closure, node centrality and node degree distribution. This network analysis provides additional evidence that these transactions do not follow the same patterns that the rest of the trades on the platform follow. However, we would like to emphasize here that this does not mean that these transactions are also illegal. These transactions will need to be further audited from the appropriate entities to verify whether or not they are illicit.
△ Less
Submitted 8 February, 2022;
originally announced February 2022.
-
Effectiveness and Compliance to Social Distancing During COVID-19
Authors:
Kristi Bushman,
Konstantinos Pelechrinis,
Alexandros Labrinidis
Abstract:
In the absence of pharmaceutical interventions to curb the spread of COVID-19, countries relied on a number of nonpharmaceutical interventions to fight the first wave of the pandemic. The most prevalent one has been stay-at-home orders, whose the goal is to limit the physical contact between people, which consequently will reduce the number of secondary infections generated. In this work, we use a…
▽ More
In the absence of pharmaceutical interventions to curb the spread of COVID-19, countries relied on a number of nonpharmaceutical interventions to fight the first wave of the pandemic. The most prevalent one has been stay-at-home orders, whose the goal is to limit the physical contact between people, which consequently will reduce the number of secondary infections generated. In this work, we use a detailed set of mobility data to evaluate the impact that these interventions had on alleviating the spread of the virus in the US as measured through the COVID-19-related deaths. To establish this impact, we use the notion of Granger causality between two time-series. We show that there is a unidirectional Granger causality, from the median percentage of time spent daily at home to the daily number of COVID-19-related deaths with a lag of 2 weeks. We further analyze the mobility patterns at the census block level to identify which parts of the population might encounter difficulties in adhering and complying with social distancing measures. This information is important, since it can consequently drive interventions that aim at hel** these parts of the population.
△ Less
Submitted 19 July, 2020; v1 submitted 22 June, 2020;
originally announced June 2020.
-
hood2vec: Identifying Similar Urban Areas Using Mobility Networks
Authors:
Xin Liu,
Konstantinos Pelechrinis,
Alexandros Labrinidis
Abstract:
Which area in NYC is the most similar to Lower East Side? What about the NoHo Arts District in Los Angeles? Traditionally this task utilizes information about the type of places located within the areas and some popularity/quality metric. We take a different approach. In particular, urban dwellers' time-variant mobility is a reflection of how they interact with their city over time. Hence, in this…
▽ More
Which area in NYC is the most similar to Lower East Side? What about the NoHo Arts District in Los Angeles? Traditionally this task utilizes information about the type of places located within the areas and some popularity/quality metric. We take a different approach. In particular, urban dwellers' time-variant mobility is a reflection of how they interact with their city over time. Hence, in this paper, we introduce an approach, namely hood2vec, to identify the similarity between urban areas through learning a node embedding of the mobility network captured through Foursquare check-ins. We compare the pairwise similarities obtained from hood2vec with the ones obtained from comparing the types of venues in the different areas. The low correlation between the two indicates that the mobility dynamics and the venue types potentially capture different aspects of similarity between urban areas.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
Mining actionable information from security forums: the case of malicious IP addresses
Authors:
Joobin Gharibshah,
Tai Ching Li,
Andre Castro,
Konstantinos Pelechrinis,
Evangelos E. Papalexakis,
Michalis Faloutsos
Abstract:
The goal of this work is to systematically extract information from hacker forums, whose information would be in general described as unstructured: the text of a post is not necessarily following any writing rules. By contrast, many security initiatives and commercial entities are harnessing the readily public information, but they seem to focus on structured sources of information. Here, we focus…
▽ More
The goal of this work is to systematically extract information from hacker forums, whose information would be in general described as unstructured: the text of a post is not necessarily following any writing rules. By contrast, many security initiatives and commercial entities are harnessing the readily public information, but they seem to focus on structured sources of information. Here, we focus on the problem of identifying malicious IP addresses, among the IP addresses which are reported in the forums. We develop a method to automate the identification of malicious IP addresses with the design goal of being independent of external sources. A key novelty is that we use a matrix decomposition method to extract latent features of the behavioral information of the users, which we combine with textual information from the related posts. A key design feature of our technique is that it can be readily applied to different language forums, since it does not require a sophisticated Natural Language Processing approach. In particular, our solution only needs a small number of keywords in the new language plus the users behavior captured by specific features. We also develop a tool to automate the data collection from security forums. Using our tool, we collect approximately 600K posts from 3 different forums. Our method exhibits high classification accuracy, while the precision of identifying malicious IP in post is greater than 88% in all three forums. We argue that our method can provide significantly more information: we find up to 3 times more potentially malicious IP address compared to the reference blacklist VirusTotal. As the cyber-wars are becoming more intense, having early accesses to useful information becomes more imperative to remove the hackers first-move advantage, and our work is a solid step towards this direction.
△ Less
Submitted 13 April, 2018;
originally announced April 2018.
-
tHoops: A Multi-Aspect Analytical Framework Spatio-Temporal Basketball Data
Authors:
Evangelos Papalexakis,
Konstantinos Pelechrinis
Abstract:
During the past few years advancements in sports information systems and technology has allowed us to collect a number of detailed spatio-temporal data capturing various aspects of basketball. For example, shot charts, that is, maps capturing locations of (made or missed) shots, and spatio-temporal trajectories for all the players on the court can capture information about the offensive and defens…
▽ More
During the past few years advancements in sports information systems and technology has allowed us to collect a number of detailed spatio-temporal data capturing various aspects of basketball. For example, shot charts, that is, maps capturing locations of (made or missed) shots, and spatio-temporal trajectories for all the players on the court can capture information about the offensive and defensive tendencies and schemes of a team. Characterization of these processes is important for player and team comparisons, pre-game scouting, game preparation etc. Playing tendencies among teams have traditionally been compared in a heuristic manner. Recently automated ways for similar comparisons have appeared in the sports analytics literature. However, these approaches are almost exclusively focused on the spatial distribution of the underlying actions (usually shots taken), ignoring a multitude of other parameters that can affect the action studied. In this work, we propose a framework based on tensor decomposition for obtaining a set of prototype spatio-temporal patterns based on the core spatiotemporal information and contextual meta-data. The core of our framework is a 3D tensor X, whose dimensions represent the entity under consideration (team, player, possession etc.), the location on the court and time. We make use of the PARAFAC decomposition and we decompose the tensor into several interpretable patterns, that can be thought of as prototype patterns of the process examined (e.g., shot selection, offensive schemes etc.). We also introduce an approach for choosing the number of components to be considered. Using the tensor components, we can then express every entity as a weighted combination of these components. The framework introduced in this paper can have further applications in the work-flow of the basketball operations of a franchise, which we also briefly discuss.
△ Less
Submitted 23 August, 2018; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Analyzing and Modeling Special Offer Campaigns in Location-based Social Networks
Authors:
Ke Zhang,
Konstantinos Pelechrinis,
Theodoros Lappas
Abstract:
The proliferation of mobile handheld devices in combination with the technological advancements in mobile computing has led to a number of innovative services that make use of the location information available on such devices. Traditional yellow pages websites have now moved to mobile platforms, giving the opportunity to local businesses and potential, near-by, customers to connect. These platfor…
▽ More
The proliferation of mobile handheld devices in combination with the technological advancements in mobile computing has led to a number of innovative services that make use of the location information available on such devices. Traditional yellow pages websites have now moved to mobile platforms, giving the opportunity to local businesses and potential, near-by, customers to connect. These platforms can offer an affordable advertisement channel to local businesses. One of the mechanisms offered by location-based social networks (LBSNs) allows businesses to provide special offers to their customers that connect through the platform. We collect a large time-series dataset from approximately 14 million venues on Foursquare and analyze the performance of such campaigns using randomization techniques and (non-parametric) hypothesis testing with statistical bootstrap**. Our main finding indicates that this type of promotions are not as effective as anecdote success stories might suggest. Finally, we design classifiers by extracting three different types of features that are able to provide an educated decision on whether a special offer campaign for a local business will succeed or not both in short and long term.
△ Less
Submitted 9 April, 2015;
originally announced April 2015.
-
Gaming the Game: Honeypot Venues Against Cheaters in Location-based Social Networks
Authors:
Konstantinos Pelechrinis,
Prashant Krishnamurthy,
Ke Zhang
Abstract:
The proliferation of location-based social networks (LBSNs) has provided the community with an abundant source of information that can be exploited and used in many different ways. LBSNs offer a number of conveniences to its participants, such as - but not limited to - a list of places in the vicinity of a user, recommendations for an area never explored before provided by other peers, tracking of…
▽ More
The proliferation of location-based social networks (LBSNs) has provided the community with an abundant source of information that can be exploited and used in many different ways. LBSNs offer a number of conveniences to its participants, such as - but not limited to - a list of places in the vicinity of a user, recommendations for an area never explored before provided by other peers, tracking of friends, monetary rewards in the form of special deals from the venues visited as well as a cheap way of advertisement for the latter. However, service convenience and security have followed disjoint paths in LBSNs and users can misuse the offered features. The major threat for the service providers is that of fake check-ins. Users can easily manipulate the localization module of the underlying application and declare their presence in a counterfeit location. The incentives for these behaviors can be both earning monetary as well as virtual rewards. Therefore, while fake check-ins driven from the former motive can cause monetary losses, those aiming in virtual rewards are also harmful. In particular, they can significantly degrade the services offered from the LBSN providers (such as recommendations) or third parties using these data (e.g., urban planners). In this paper, we propose and analyze a honeypot venue-based solution, enhanced with a challenge-response scheme, that flags users who are generating fake spatial information. We believe that our work will stimulate further research on this important topic and will provide new directions with regards to possible solutions.
△ Less
Submitted 16 October, 2012;
originally announced October 2012.
-
Cognitive Radio Networks: Realistic or Not?
Authors:
Konstantinos Pelechrinis,
Prashant Krishnamurthy,
Martin Weiss,
Taied Znati
Abstract:
A large volume of research has been conducted in the cognitive radio (CR) area the last decade. However, the deployment of a commercial CR network is yet to emerge. A large portion of the existing literature does not build on real world scenarios, hence, neglecting various important interactions of the research with commercial telecommunication networks. For instance, a lot of attention has been p…
▽ More
A large volume of research has been conducted in the cognitive radio (CR) area the last decade. However, the deployment of a commercial CR network is yet to emerge. A large portion of the existing literature does not build on real world scenarios, hence, neglecting various important interactions of the research with commercial telecommunication networks. For instance, a lot of attention has been paid to spectrum sensing as the front line functionality that needs to be completed in an efficient and accurate manner to enable an opportunistic CR network architecture. This is necessary to detect the existence of spectrum holes without which no other procedure can be fulfilled. However, simply sensing (cooperatively or not) the energy received from a primary transmitter cannot enable correct dynamic spectrum access. For example, the low strength of a primary transmitter's signal does not assure that there will be no interference to a nearby primary receiver. In addition, the presence of a primary transmitter's signal does not mean that CR network users cannot access the spectrum since there might not be any primary receiver in the vicinity. Despite the existing elegant and clever solutions to the DSA problem no robust, implementable scheme has emerged. In this paper, we challenge the basic premises of the proposed schemes. We further argue that addressing the technical challenges we face in deploying robust CR networks can only be achieved if we radically change the way we design their basic functionalities. In support of our argument, we present a set of real-world scenarios, inspired by realistic settings in commercial telecommunications networks, focusing on spectrum sensing as a basic and critical functionality in the deployment of CRs. We use these scenarios to show why existing DSA paradigms are not amenable to realistic deployment in complex wireless environments.
△ Less
Submitted 10 September, 2012;
originally announced September 2012.
-
A Simple Conceptual Generator for the Internet Graph
Authors:
Theodoros Lappas,
Konstantinos Pelechrinis,
Michalis Faloutsos
Abstract:
The evolution of the Internet during the last years, has lead to a dramatic increase of the size of its graph at the Autonomous System (AS) level. Soon - if not already - its size will make the latter impractical for use from the research community, e.g. for protocol testing. Reproducing a smaller size, snapshot of the AS graph is thus important. However, the first step towards this direction is…
▽ More
The evolution of the Internet during the last years, has lead to a dramatic increase of the size of its graph at the Autonomous System (AS) level. Soon - if not already - its size will make the latter impractical for use from the research community, e.g. for protocol testing. Reproducing a smaller size, snapshot of the AS graph is thus important. However, the first step towards this direction is to obtain the ability to faithfully reproduce the full AS topology. The objective of our work, is to create a generator able to accurately emulate and reproduce the distinctive properties of the Internet graph. Our approach is based on (a) the identification of the jellyfish-like structure [1] of the Internet and (b) the consideration of the peer-to-peer and customer-provider relations between ASs. We are the first to exploit the distinctive structure of the Internet graph together with utilizing the information provided by the AS relationships in order to create a tool with the aforementioned capabilities. Comparing our generator with the existing ones in the literature, the main difference is found on the fact that our tool does not try to satisfy specific metrics, but tries to remain faithful to the conceptual model of the Internet structure. In addition, our approach can lead to (i) the identification of important attributes and patterns in the Internet AS topology, as well as, (ii) the extraction of valuable information on the various relationships between ASs and their effect on the formulation of the Internet structure. We implement our graph generator and we evaluate it using the largest and most recent available dataset for the AS topology. Our evaluations, clearly show the ability of our tool to capture the structural properties of the Internet topology at the AS level with high accuracy.
△ Less
Submitted 2 November, 2009;
originally announced November 2009.
-
A measurement driven, 802.11 anti-jamming system
Authors:
Konstantinos Pelechrinis,
Ioannis Broustis,
Srikanth V. Krishnamurthy,
Christos Gkantsidis
Abstract:
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit intermittently at low power in order to conserve energy. In this paper, we first conduct extensive experiments on an indoor 802.11 network to assess the ability of two physical layer functions, rate adaptation and power co…
▽ More
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit intermittently at low power in order to conserve energy. In this paper, we first conduct extensive experiments on an indoor 802.11 network to assess the ability of two physical layer functions, rate adaptation and power control, in mitigating jamming. In the presence of a jammer we find that: (a) the use of popular rate adaptation algorithms can significantly degrade network performance and, (b) appropriate tuning of the carrier sensing threshold allows a transmitter to send packets even when being jammed and enables a receiver capture the desired signal. Based on our findings, we build ARES, an Anti-jamming REinforcement System, which tunes the parameters of rate adaptation and power control to improve the performance in the presence of jammers. ARES ensures that operations under benign conditions are unaffected. To demonstrate the effectiveness and generality of ARES, we evaluate it in three wireless testbeds: (a) an 802.11n WLAN with MIMO nodes, (b) an 802.11a/g mesh network with mobile jammers and (c) an 802.11a WLAN. We observe that ARES improves the network throughput across all testbeds by up to 150%.
△ Less
Submitted 16 June, 2009;
originally announced June 2009.