Skip to main content

Showing 1–11 of 11 results for author: Weinsberg, U

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.09882  [pdf, other

    cs.IR cs.CY cs.LG

    Harm Mitigation in Recommender Systems under User Preference Dynamics

    Authors: Jerry Chee, Shankar Kalyanaraman, Sindhu Kiranmai Ernala, Udi Weinsberg, Sarah Dean, Stratis Ioannidis

    Abstract: We consider a recommender system that takes into account the interplay between recommendations, the evolution of user interests, and harmful content. We model the impact of recommendations on user behavior, particularly the tendency to consume harmful content. We seek recommendation policies that establish a tradeoff between maximizing click-through rate (CTR) and mitigating harm. We establish con… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: Recommender Systems; Harm Mitigation; Amplification; User Preference Modeling

  2. arXiv:2401.15116  [pdf, other

    cs.HC cs.LG

    Efficient Online Crowdsourcing with Complex Annotations

    Authors: Reshef Meir, Viet-An Nguyen, Xu Chen, Jagdish Ramakrishnan, Udi Weinsberg

    Abstract: Crowdsourcing platforms use various truth discovery algorithms to aggregate annotations from multiple labelers. In an online setting, however, the main challenge is to decide whether to ask for more annotations for each item to efficiently trade off cost (i.e., the number of annotations) for quality of the aggregated annotations. In this paper, we propose a novel approach for general complex annot… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: full version of a paper accepted to AAAI'24

  3. arXiv:2004.04834  [pdf, other

    cs.SI cs.CR cs.LG

    Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks

    Authors: Adam Breuer, Roee Eilat, Udi Weinsberg

    Abstract: In this paper, we study the problem of early detection of fake user accounts on social networks based solely on their network connectivity with other users. Removing such accounts is a core task for maintaining the integrity of social networks, and early detection helps to reduce the harm that such accounts inflict. However, new fake accounts are notoriously difficult to detect via graph-based alg… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

  4. arXiv:1611.02388  [pdf, other

    cs.SI

    PNP: Fast Path Ensemble Method for Movie Design

    Authors: Danai Koutra, Abhilash Dighe, Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis, Christos Faloutsos, Jean Bolot

    Abstract: How can we design a product or movie that will attract, for example, the interest of Pennsylvania adolescents or liberal newspaper critics? What should be the genre of that movie and who should be in the cast? In this work, we seek to identify how we can design new movies with features tailored to a specific user population. We formulate the movie design as an optimization problem over the inferen… ▽ More

    Submitted 7 November, 2016; originally announced November 2016.

    Comments: 9 pages, 12 figures

  5. arXiv:1409.5200  [pdf, ps, other

    cs.GT

    The Shapley Value in Knapsack Budgeted Games

    Authors: Smriti Bhagat, Anthony Kim, S. Muthukrishnan, Udi Weinsberg

    Abstract: We propose the study of computing the Shapley value for a new class of cooperative games that we call budgeted games, and investigate in particular knapsack budgeted games, a version modeled after the classical knapsack problem. In these games, the "value" of a set $S$ of agents is determined only by a critical subset $T\subseteq S$ of the agents and not the entirety of $S$ due to a budget constra… ▽ More

    Submitted 18 September, 2014; originally announced September 2014.

    Comments: A short version to appear in the 10th Conference on Web and Internet Economics (WINE 2014)

  6. arXiv:1403.8084  [pdf, other

    cs.CR cs.LG

    Privacy Tradeoffs in Predictive Analytics

    Authors: Stratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz, Nina Taft

    Abstract: Online services routinely mine user data to predict user preferences, make recommendations, and place targeted ads. Recent research has demonstrated that several private user attributes (such as political affiliation, sexual orientation, and gender) can be inferred from such data. Can a privacy-conscious user benefit from personalization while simultaneously protecting her private attributes? We s… ▽ More

    Submitted 31 March, 2014; originally announced March 2014.

    Comments: Extended version of the paper appearing in SIGMETRICS 2014

  7. arXiv:1311.6802  [pdf, other

    cs.LG cs.CY

    Recommending with an Agenda: Active Learning of Private Attributes using Matrix Factorization

    Authors: Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis, Nina Taft

    Abstract: Recommender systems leverage user demographic information, such as age, gender, etc., to personalize recommendations and better place their targeted ads. Oftentimes, users do not volunteer this information due to privacy concerns, or due to a lack of initiative in filling out their online profiles. We illustrate a new threat in which a recommender learns private attributes of users who do not volu… ▽ More

    Submitted 30 July, 2014; v1 submitted 26 November, 2013; originally announced November 2013.

    Comments: This is the extended version of a paper that appeared in ACM RecSys 2014

  8. arXiv:1206.1815  [pdf, other

    cs.NI

    CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks

    Authors: Udi Weinsberg, Athula Balachandran, Nina Taft, Gianluca Iannaccone, Vyas Sekar, Srinivasan Seshan

    Abstract: During a disaster scenario, situational awareness information, such as location, physical status and images of the surrounding area, is essential for minimizing loss of life, injury, and property damage. Today's handhelds make it easy for people to gather data from within the disaster area in many formats, including text, images and video. Studies show that the extreme anxiety induced by disasters… ▽ More

    Submitted 8 June, 2012; originally announced June 2012.

  9. arXiv:1201.0834  [pdf, ps, other

    cs.NI

    Topological Trends of Internet Content Providers

    Authors: Yuval Shavitt, Udi Weinsberg

    Abstract: The Internet is constantly changing, and its hierarchy was recently shown to become flatter. Recent studies of inter-domain traffic showed that large content providers drive this change by bypassing tier-1 networks and reaching closer to their users, enabling them to save transit costs and reduce reliance of transit networks as new services are being deployed, and traffic sha** is becoming incre… ▽ More

    Submitted 4 January, 2012; originally announced January 2012.

  10. arXiv:1011.2324  [pdf, ps, other

    cs.NI

    On the Dynamics of IP Address Allocation and Availability of End-Hosts

    Authors: Oded Argon, Anat Bremler-Barr, Osnat Mokryn, Dvir Schirman, Yuval Shavitt, Udi Weinsberg

    Abstract: The availability of end-hosts and their assigned routable IP addresses has impact on the ability to fight spammers and attackers, and on peer-to-peer application performance. Previous works study the availability of hosts mostly by using either active **ing or by studying access to a mail service, both approaches suffer from inherent inaccuracies. We take a different approach by measuring the IP… ▽ More

    Submitted 10 November, 2010; originally announced November 2010.

  11. arXiv:0711.4562  [pdf, ps, other

    cs.NI

    Near-Deterministic Inference of AS Relationships

    Authors: Yuval Shavitt, Eran Shir, Udi Weinsberg

    Abstract: The discovery of Autonomous Systems (ASes) interconnections and the inference of their commercial Type-of-Relationships (ToR) has been extensively studied during the last few years. The main motivation is to accurately calculate AS-level paths and to provide better topological view of the Internet. An inherent problem in current algorithms is their extensive use of heuristics. Such heuristics in… ▽ More

    Submitted 28 November, 2007; originally announced November 2007.