[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2661829.2661973acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Automatic Social Circle Detection Using Multi-View Clustering

Published: 03 November 2014 Publication History

Abstract

With the development of information technology, online social networks grow dramatically. They now play a significant role in people's social life, especially for the younger generation. While huge amount of information is available in online social networks, privacy concerns arise. Among various privacy protection proposals, the notions of privacy as control and information boundary have been introduced. Commercial social networking sites have adopted the concept to implement mechanisms such as Google circles and Facebook custom lists. However, the functions are not widely accepted by the users, partly because it is tedious and labor-intensive to manually assign friends into circles.
In this paper, we introduce a social circle discovery approach using multi-view clustering. First, we present our observations on the key features of social circles: friendship links, content similarity and social interactions. We propose a one-side co-trained spectral clustering algorithm, which is tailored for the sparse nature of social network data. We also propose two evaluation measurements. One is based on quantitative similarity measures, while the other employs human evaluators to examine pairs of users selected by the max-risk evaluation approach. We evaluate our approach on ego networks of twitter users, and compare the proposed technique with single-view clustering and original co-trained spectral clustering techniques. Results show that multi-view clustering is more accurate for social circle detection; and our proposed approach gains significantly higher similarity ratio than the original multi-view clustering approach.

References

[1]
L. A. Adamic and E. Adar. Friends and neighbors on the web. Social Networks, 25:211--230, 2003.
[2]
K. Alsabti, S. Ranka, and V. Singh. An efficient k-means clustering algorithm. 1997.
[3]
S. B. Barnes. A privacy paradox: Social networking in the united states. First Monday {Online}, 11(9), 2006.
[4]
P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman. Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. IEEE T-PAMI, 19(7), 1997.
[5]
S. Bickel and T. Scheffer. Multi-view clustering. In ICDM, volume 4, pages 19--26, 2004.
[6]
A. Blum and T. Mitchell. Combining labeled and unlabeled data with co-training. In Proceedings of the eleventh annual conference on Computational learning theory, pages 92--100. ACM, 1998.
[7]
A. B. Brush, J. Krumm, and J. Scott. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Ubicomp, 2010.
[8]
H.-W. Chang, D. Lee, M. Eltaher, and J. Lee. @phillies tweeting from philly? predicting twitter user locations with spatial word usage. In ASONAM, 2012.
[9]
J. Chang, J. Boyd-Graber, and D. M. Blei. Connections between the lines: augmenting social networks with text. KDD'09, pages 169--178, 2009.
[10]
Z. Cheng, J. Caverlee, and K. Lee. You are where you tweet: a content-based approach to geo-locating twitter users. pages 759--768, 2010.
[11]
M. Culnan and J. Bies. Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 2003.
[12]
P. Ferragina and U. Scaiella. Fast and accurate annotation of short texts with wikipedia pages. Software, IEEE, 29(1):70--75, 2012.
[13]
S. Fortunato. Community detection in graphs. Physics Reports, 486:75--174, 2010.
[14]
E. Gilbert and K. Karahalios. Predicting tie strength with social media. CHI'09, pages 211--220, 2009.
[15]
M. Girvan and M. E. J. Newman. Community structure in social and biological networks. Proc. of the National Academy of Sciences, 99:7821--7826, 2002.
[16]
R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 71--80. ACM, 2005.
[17]
J. M. Hoffman and C. H. Wiggins. A bayesian approach to network modularity. Phys. Rev. Lett., 100:258701, 2008.
[18]
S. Jones and E. O'Neill. Feasibility of structural network clustering for group-based privacy control in social networks. SUPS, July 2010.
[19]
B. W. Kernighan and S. Lin. An efficient heuristic procedure for partitioing graphs. The Bell System Tehnical Journal, 49:291--307, 1970.
[20]
J. Krumm. A survey of computational location privacy. Personal Ubiquitous Comput., 13(6), 2009.
[21]
A. Kumar and H. D. Iii. A co-training approach for multi-view spectral clustering. In ICML-11, 2011.
[22]
A. Kumar, P. Rai, and H. D. Iii. Co-regularized multi-view spectral clustering. In NIPS, pages 1413--1421, 2011.
[23]
S. Lederer, J. I. Hong, A. K. Dey, and J. A. Landay. Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing, 8(6):440--454, 2004.
[24]
K. Lewis, J. Kaufman, and N. Christakis. The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14(1), 2008.
[25]
W. Li, P. Serdyukov, A. P. de Vries, C. Eickhoff, and M. Larson. The where in the tweet. In CIKM, 2011.
[26]
W. Lin, X. Kong, P. S. Yu, Q. Wu, Y. Jia, and C. Li. Community detection in incomplete information networks. WWW'12, April 2012.
[27]
Y. Liu, A. N. Mizil, and W. Gryc. Topic-link lda: Joint models of topic and author community. ICML'09, 382:665--672, 2009.
[28]
B. Luo and D. Lee. On protecting private information in social networks: a proposal. In IEEE ICDE Workshop on Modeling, Managing, and Mining of Evolving Social Networks (M3SN). IEEE, 2009.
[29]
J. McAuley and J. Leskovec. Discovering social circles in ego networks. TKDD'13, 2012.
[30]
C. McCarty. Structure in personal networks. Journal of Social Structure, 3, 2002.
[31]
M. E. J. Newman and E. A. Leicht. Mixture models and exploratory analysis in networks. Proc Natl Acad Sci USA, 104:9564--9569, June 2007.
[32]
M. E. J. Newman and M. Girvan. Finding and evaluating community structure in networks. Rhys. Reve. E, 69:026113, Feb 2004.
[33]
I. Psorakis, S. Roberts, M. Ebden, and B. Sheldon. Overlapping community detection using bayesian non-negative matrix factorization. Physical Review E, 83:066114, June 2011.
[34]
H. Qian and C. R. Scott. Anonymity and self-disclosure on weblogs. Journal of Computer-Mediated Communication, 12(4), 2007.
[35]
Y. Ruan, D. Fuhry, and S. Parthasarathy. Efficient community detection in large networks using content and links. WWW'13, pages 1089--1098, May 2013.
[36]
M. Sachan, D. Contractor, T. A. Faruquie, and L. V. Subramaniam. Using content and interactions for discovering communities in social networks. WWW'12, pages 331--340, April 2012.
[37]
J. Shi and J. Malik. Normalized cuts and image segmentation. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 22(8), 2000.
[38]
P. Shi, H. Xu, and Y. Chen. Using contextual integrity to examine interpersonal information boundary on social network sites. In CHI.
[39]
M. M. Skeels and J. Grudin. When social networks cross boundaries:a case study of workplace use of facebook and linkedin. GROUP'09, May 2009.
[40]
A. Squicciarini, S. Karumanchi, D. Lin, and N. DeSisto. Identifying hidden social circles for advanced privacy configuration. Computers & Security, 2013.
[41]
A. Squicciarini, D. Lin, S. Karumanchi, and N. DeSisto. Automatic social group organization and privacy management. In CollaborateCom, 2012.
[42]
H. Tavani. Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 2007.
[43]
H. Wang, F. Nie, and H. Huang. Multi-view clustering and feature learning via structured sparsity. 2013.
[44]
X. Wang, H. Liu, and W. Fan. Connectiong users with similar interests via tag network inference. CIKM'11, pages 1019--1024, October 2011.
[45]
X. Xu, N. Yuruk, Z. Feng, and T. A. Schweiger. Scan: a structural clustering algorithm for networks. In ACM SIGKDD. ACM, 2007.
[46]
T. Yang, R. Jin, Y. Chi, and S. Zhu. Combining link and content for community detection: a discriminative approach. KDD'09, pages 927--936, 2009.
[47]
Y. Yang, J. Lutes, F. Li, B. Luo, and P. Liu. Stalking online: on user privacy in social networks. In ACM conference on Data and Application Security and Privacy (CODASPY), 2012.
[48]
Y. Zhang and D.-Y. Yeung. Overlapping community detection via bounded nonnegative matrix tri-factorization. KDD, August 2012.
[49]
D. Zhou, E. Manavoglu, J. Li, C. L. Giles, and H. Zha. Probabilistic models for discovering e-communities. WWW'06, pages 173--182, 2006.
[50]
W. Zhou, H. Jin, and Y. Liu. Community discovery and profiling with social messages. KDD'12, pages 388--396, August 2012.
[51]
Y. Zhou and L. Liu. Social influence based clustering of heterogeneous. KDD'13, August 2013.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '14: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management
November 2014
2152 pages
ISBN:9781450325981
DOI:10.1145/2661829
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. multi-view clustering
  2. privacy
  3. social circles
  4. social network

Qualifiers

  • Research-article

Funding Sources

Conference

CIKM '14
Sponsor:

Acceptance Rates

CIKM '14 Paper Acceptance Rate 175 of 838 submissions, 21%;
Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)1
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Non-convex tensorial multi-view clustering by integrating ℓ 1-based sliced-Laplacian regularization and ℓ 2 , p-sparsityPattern Recognition10.1016/j.patcog.2024.110605154:COnline publication date: 24-Jul-2024
  • (2024)Multi-view and Multi-order Graph Clustering via Constrained l 1 , 2-normInformation Fusion10.1016/j.inffus.2024.102483111:COnline publication date: 25-Sep-2024
  • (2021)Tensor-based restricted kernel machines for multi-view classificationInformation Fusion10.1016/j.inffus.2020.10.02268(54-66)Online publication date: Apr-2021
  • (2020)On the Unreported-Profile-is-Negative Assumption for Predictive CheminformaticsIEEE/ACM Transactions on Computational Biology and Bioinformatics10.1109/TCBB.2019.291385517:4(1352-1363)Online publication date: 6-Aug-2020
  • (2019)Characterising and evaluating dynamic online communities from live microblogging user interactionsSocial Network Analysis and Mining10.1007/s13278-019-0576-89:1Online publication date: 3-Jul-2019
  • (2019)Consistent and Specific Multi-view Relative-Transform ClassificationHuman Brain and Artificial Intelligence10.1007/978-981-15-1398-5_20(272-285)Online publication date: 10-Nov-2019
  • (2018)Characterising and Evaluating Online Communities from Live Microblogging User Interactions2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)10.1109/ASONAM.2018.8508392(21-24)Online publication date: Aug-2018
  • (2018)Inducing Personalities and Values from Language Use in Social Network CommunitiesInformation Systems Frontiers10.1007/s10796-017-9793-820:6(1219-1240)Online publication date: 1-Dec-2018
  • (2017)Unifying Virtual and Physical WorldsACM Transactions on Information Systems10.1145/305277436:1(1-26)Online publication date: 6-Apr-2017
  • (2017)Leveraging Behavioral Factorization and Prior Knowledge for Community Discovery and ProfilingProceedings of the Tenth ACM International Conference on Web Search and Data Mining10.1145/3018661.3018693(71-79)Online publication date: 2-Feb-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media