ICML 2020, 12-18 July 2020, 2020

Total Page:16

File Type:pdf, Size:1020Kb

ICML 2020, 12-18 July 2020, 2020 Integrated Defense for Resilient Graph Matching Jiaxiang Ren 1 Zijie Zhang 1 Jiayin Jin 1 Xin Zhao 1 Sixing Wu 2 Yang Zhou 1 Yelong Shen 3 Tianshi Che 1 Ruoming Jin 4 Dejing Dou 5 6 Abstract Zhang & Tong, 2016; Mu et al., 2016; Heimann et al., 2018; Li et al., 2019a; Fey et al., 2020; Qin et al., 2020; Feng A recent study has shown that graph matching et al., 2019; Ren et al., 2020). It has been widely applied models are vulnerable to adversarial manipulation to many real-world applications, including protein network of their input which is intended to cause a mis- alignment in bioinformatics (Liu et al., 2017; Vijayan et al., matching. Nevertheless, there is still a lack of 2020), user account linking in multiple social networks(Shu a comprehensive solution for further enhancing et al., 2016; Mu et al., 2016; Feng et al., 2019), object the robustness of graph matching against adver- matching in computer vision (Fey et al., 2020; Wang et al., sarial attacks. In this paper, we identify and study 2020b;e; Yang et al., 2020), knowledge translation in multi- two types of unique topology attacks in graph lingual knowledge bases (Sun et al., 2020; Wu et al., 2020c). matching: inter-graph dispersion and intra-graph assembly attacks. We propose an integrated de- Recently, there has been much interest in developing re- fense model, IDRGM, for resilient graph match- silient graph learning techniques to improve the model ro- ing with two novel defense techniques to de- bustness against adversarial attacks, including node classifi- fend against the above two attacks simultaneously. cation (Zhu et al., 2019; Xu et al., 2019b; Tang et al., 2020; A detection technique of inscribed simplexes in Entezari et al., 2020; Zheng et al., 2020; Zhou & Vorobey- the hyperspheres consisting of multiple matched chik, 2020; Jin et al., 2020b; Feng et al., 2020; Elinas et al., nodes is proposed to tackle inter-graph dispersion 2020; Zhang & Zitnik, 2020), graph classification (Jin et al., attacks, in which the distances among the matched 2020a), community detection (Jia et al., 2020), network nodes in multiple graphs are maximized to form embedding (Dai et al., 2019), link prediction (Zhou et al., regular simplexes. A node separation method 2019a), malware detection (Hou et al., 2019), spammer de- based on phase-type distribution and maximum tection (Dou et al., 2020), fraud detection (Breuer et al., likelihood estimation is developed to estimate the 2020; Zhang et al., 2020a), and influence maximization (Lo- distribution of perturbed graphs and separate the gins et al., 2020). The majority of existing techniques focus nodes within the same graphs over a wide space, on the defenses on single graph learning tasks. Improving for defending intra-graph assembly attacks, such the robustness of graph matching against adversarial attacks that the interference from the similar neighbors of has not been inadequately investigated yet. Existing tech- the perturbed nodes is significantly reduced. We niques for defending single graph learning tasks cannot be evaluate the robustness of our IDRGM model on directly utilized to improve the robustness of graph match- real datasets against state-of-the-art algorithms. ing, as the graph matching has to analyze interactions within and across graphs. To our best knowledge, RGM is the only robust graph matching model (Yu et al., 2021). It enhances the robustness of image matching against visual noise in 1. Introduction computer vision, including image deformations, rotations, Graph matching (i.e., network alignment), which aims to and outliers, but it fails to defend adversarial attacks on identify the same entities (i.e., nodes) across multiple graphs, graph topology. has been a heated topic in recent years (Chu et al., 2019; In the context of graph matching, there are two types of Xu et al., 2019a; Wang et al., 2020d; Chen et al., 2020a;b; topology attacks within and across graphs: (1) Inter-graph 1Auburn University, USA 2Peking University, China 3Microsoft dispersion attacks. Most of existing graph matching algo- Dynamics 365 AI, USA 4Kent State University, USA 5University rithms often aim to minimize the distance or maximize the of Oregon, USA 6Baidu Research, China. Correspondence to: similarity among the matched nodes in K different graphs Yang Zhou <[email protected]>. in training data by mapping these nodes with different fea- tures into common space through either matrix transforma- Proceedings of the 38 th International Conference on Machine Learning, PMLR 139, 2021. Copyright 2021 by the author(s). tion (Zhang & Tong, 2016; Zhang et al., 2019) or network Integrated Defense for Resilient Graph Matching embedding (Heimann et al., 2018; Chu et al., 2019; Xu et al., 2018), most of existing adversarial attack techniques on 2019a; Fey et al., 2020). The nodes with the smallest dis- graph data focus on how to generate imperceptible pertur- tances in K graphs in test data are selected as the matching bations within a lp norm neighborhood but ignore the dis- 1 2 results. As shown in Figure1, three matched nodes vi1 , vi2 , tribution change from clean graphs to perturbed ones (Bo- 3 1 2 3 and vi3 in three graphs G , G , and G are projected into jchevski & Gunnemann¨ , 2019; Wang & Gong, 2019; Liu 1 2 the same space, such that their embeddings ui1 , ui2 , and et al., 2019; Chang et al., 2020; Li et al., 2020; Zang et al., 3 1 2 3 ui3 are identical, i.e., ui1 = ui2 = ui3 . An inter-graph 2020). Thus, the perturbed graphs can follow any distribu- dispersion attack tries to push the matched nodes in multi- tions. The phase-type distribution can be used to approxi- ple graphs far away from each other for maximizing their mate any positive-valued distribution (O’Cinneide, 1990). distances under an attack budget . In this case, the attack By exploring the phase-type distribution and maximum like- problem is equivalent to a geometry optimization problem lihood estimation (Chakravarthy & Alfa, 1996; Asmussen of how to arrange the matched nodes in a hypersphere with et al., 1996), we develop a node separation algorithm to radius such that the distances among them are maximized. handle the intra-graph assembly attacks. We estimate the Namely, an inscribed regular (K − 1)-simplex in a hyper- distribution of perturbed graphs and maximize the distances sphere with radius is generated by adding/deleting edges among the perturbed nodes within the same graphs, for to/from the matched nodes, e.g., an inscribed equilateral separating the nodes in a narrow space into a wide space, triangle (i.e., regular 2-simplex) in a circle (1-hypersphere) such that the interference from the similar neighbors of the with radius in Figure1. In addition, there is little possibil- perturbed nodes is significantly reduced. In Figure2, the ity for the non-matched clean nodes in K graphs to form a nodes in two graphs G1 and G2 are separated respectively 1 2 1 2 regular or near-regular simplex, especially when K is large. by maximizing the distances 1=dy and 1=dy in G and G . Thus, regular or near-regular simplexes within the range Empirical evaluation over real graph datasets demonstrates of can be safely treated as the matched nodes under the that the remarkable robustness of IDRGM against state-of- inter-graph dispersion attacks; and (2) Intra-graph assem- the-art graph matching methods and representative resilient bly attacks. A recent attack solution for graph matching Lipschitz-bound neural architectures. In addition, more aims to move a node to be attacked to dense region in its experiments, implementation details, and hyperparameter graph, such that the distances between its similar neighbors selection and setting are presented in Appendices A.2-A.4. in the same graph and its counterparts in other graphs be- come smaller than the ones between this perturbed node To our best knowledge, this work is the first to study in- and its counterparts, and thus to generate a wrong matching tegrated defense for resilient graph matching against both result (Zhang et al., 2020b). As shown in Figure2, two inter-graph dispersion and intra-graph assembly attacks. 1 2 matched nodes ui1 and ui2 are pushed to dense regions in 1 2 1 two graphs G and G respectively, such that ui1 is closer 2. Problem Definition to the neighbors of u2 in G2, rather than u2 itself. A i2 i2 Given a set of K graphs G1; ··· ;GK to be matched, each wrong matching between u1 and an neighbor of u2 will be i1 i2 graph is denoted as Gk = (V k;Ek) (1 ≤ k ≤ K), where generated. In addition, since there are many similar neigh- V k = fvk; ··· ; vk g is the set of N k nodes and Ek = bors around the perturbed nodes in the dense region, this 1 N k f(vk; vk) : 1 ≤ i; j ≤ N kg is the set of edges. Each dramatically increases the possibility of deriving the wrong i j Gk has an N k × N k binary adjacency matrix Ak, where matching results. k k k k each entry Aij = 1 if there exists an edge (vi ; vj ) 2 E ; Motivated by the above analysis, we propose an effective k k th k otherwise Aij = 0. Ai: specifies the i row vector of A . simplex detection technique to tackle the inter-graph disper- In this paper, if there are no specific descriptions, we use sion attacks. The defense model tries to determine whether k k k vi to denote a node vi itself and its representation Ai:, i.e., the nodes in multiple graphs form inscribed regular sim- k k k th vi = Ai: and we utilize vij to specify the j dimension plexes in the hyperspheres with radius and how regular of vk, i.e., vk = Ak .
Recommended publications
  • A Brief Taxonomy of Hybrid Intelligence
    forecasting Perspective A Brief Taxonomy of Hybrid Intelligence Niccolo Pescetelli Department of Humanities and Social Sciences, New Jersey Institute of Technology, Newark, NJ 07102, USA; [email protected] Abstract: As artificial intelligence becomes ubiquitous in our lives, so do the opportunities to combine machine and human intelligence to obtain more accurate and more resilient prediction models across a wide range of domains. Hybrid intelligence can be designed in many ways, depending on the role of the human and the algorithm in the hybrid system. This paper offers a brief taxonomy of hybrid intelligence, which describes possible relationships between human and machine intelligence for robust forecasting. In this taxonomy, biological intelligence represents one axis of variation, going from individual intelligence (one individual in isolation) to collective intelligence (several connected individuals). The second axis of variation represents increasingly sophisticated algorithms that can take into account more aspects of the forecasting system, from information to task to human problem- solvers. The novelty of the paper lies in the interpretation of recent studies in hybrid intelligence as precursors of a set of algorithms that are expected to be more prominent in the future. These algorithms promise to increase hybrid system’s resilience across a wide range of human errors and biases thanks to greater human-machine understanding. This work ends with a short overview for future research in this field. Keywords: hybrid intelligence; collective intelligence; AI; forecasting Citation: Pescetelli, N. A Brief 1. Introduction Taxonomy of Hybrid Intelligence. The last decade has seen major advances in computation power and its increased Forecasting 2021, 3, 633–643.
    [Show full text]
  • Edinburgh Research Explorer
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Edinburgh Research Explorer Edinburgh Research Explorer Can Common Crawl Reliably Track Persistent Identifier (PID) Use Over Time Citation for published version: Thompson, H & Tong, J 2018, Can Common Crawl Reliably Track Persistent Identifier (PID) Use Over Time. in Companion Proceedings of the The Web Conference 2018. WWW '18, International World Wide Web Conferences Steering Committee, Lyon, France, pp. 1749-1755, The Web Conference 2018, Lyon, France, 23-27 April. DOI: 10.1145/3184558.3191636 Digital Object Identifier (DOI): 10.1145/3184558.3191636 Link: Link to publication record in Edinburgh Research Explorer Document Version: Publisher's PDF, also known as Version of record Published In: Companion Proceedings of the The Web Conference 2018 General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edinburgh Research Explorer content complies with UK legislation. If you believe that the public display of this file breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 05. Jun. 2018 Track: 8th Temporal Web Analytics Workshop WWW 2018, April 23-27, 2018, Lyon, France Can Common Crawl Reliably Track Persistent Identifier (PID) Use Over Time? Henry S.
    [Show full text]
  • CV 1 September 2016 University of Pittsburgh, PITTSBURGH, PA Present Research Assistant, Research Supervisor : Dr
    Ang LI PhD candidate, expected graduation : Fall 2021 University of Pittsburgh | School of Computing and Information http://www.pitt.edu/~anl125/ github.com/LittleRabbitHole 520-247-8820 [email protected] I am interested in social computing and data science. Specifically, I am interested in utilizing mixed-method approach to unders- tand the human factors for social computing systems and to design better systems to support their users in achieving their goals. EDUCATION 2016 - 2021 University of Pittsburgh, Pittsburgh, PA PhD in Information Science; 3.9/4.0 GPA 2013 - 2016 DePaul University, Chicago, IL Master of Science in Predictive Analytics, 3.9/4.0 GPA EXPERIENCE June 2020 Google, MOUNTAIN VIEW, CA August 2020 UX Research Internship, Host : Dr. Tao Dong, Co-host : Dr. JaYoung Lee Conducted user experience research to support Flutter open source software (OSS) community. ∠ Utilized a mixed-method approach, the project aims to improve the current pull request (PR) tria- ging and reviewing process while maintainers interacting with the PR contributors. ∠ Utilized qualitative research method, we interviewed project managers and evaluated the project documents to understand the ideal attributes of good PRs maintainers would like to see and draw hypotheses on what maintainers are expected to do during PR reviewing and accepting process. ∠ Utilized statistical methods based on the large-scale log data, we investigated the maintainers’ current practices in triaging and reviewing PRs. ∠ The results identify different gaps existed in the current system, and also provide recommendations on how the system can be better designed to support project maintainers. June 2019 Spotify, NEW YORK CITY, NY August 2019 Research Scientist Internship, Supervised by Dr.
    [Show full text]
  • Human Computer Interaction and Emerging Technologies: Adjunct Proceedings from the INTERACT 2019 Workshops
    Navigating through real and fake news by using provenance information Bianca Rodrigues Teixeira and Simone D. J. Barbosa Department of Informatics, PUC-Rio R. Marques de Sao Vicente, 225, Rio de Janeiro, RJ 22451-900, Brazil [email protected], [email protected] Abstract With the large number of internet users today, fake news and misinformation become more and more visible online, especially through social media plat- forms. Users’ belief in online information and news is related to trust in the information sources. To prevent the dissemination of fake news and misinfor- mation online, trust can be supported by provenance information in online publications. We use the OurPrivacy conceptual framework to illustrate a way in which provenance can be used to help users define their trust in artifacts posted online. We also discuss the possibility to filter artifacts by only viewing trusted sources of information. Keywords Provenance · Trust · Fake News · Privacy · Conceptual Framework How to cite this book chapter: Rodrigues Teixeira, B. and Barbosa, S.D.J. 2020. Navigating through real and fake news by using provenance information. In: Loizides, F., Winckler, M., Chatterjee, U., Abdelnour-Nocera, J. and Parmaxi, A. (eds.) Human Computer Interaction and Emerging Technologies: Adjunct Proceedings from the INTERACT 2019 Workshops. Pp. 49–56. Cardiff: Cardiff University Press. DOI: https://doi.org/10.18573/book3.f. License: CC-BY 4.0. 50 Human Computer Interaction and Emerging Technologies 1 Introduction Internet users are everywhere. Around the globe, smartphone ownership rates are rising fast [12], especially in developing countries in which mobile phones used to be considered a luxury.
    [Show full text]
  • Valeria Cardellini
    Valeria Cardellini Dipartimento di Ingegneria Civile e Ingegneria Informatica phone: +39 06 72597388 Universit`adi Roma \Tor Vergata" fax: +39 06 72597460 via del Politecnico 1 email: [email protected] 00133 Roma, Italy URL: www.ce.uniroma2.it/∼valeria 1 Research Interests and Scientific Results My research interests are in the broad field of distributed computing systems, with a focus on Web-based and Cloud-based systems and services. From 1998 my research topics included high performance and quality-aware Web systems as well as distributed infrastructures for adapting Web applications. In the last 10 years, I have been working on: (i) QoS-driven runtime adaptation of service-oriented systems, (ii) resource provisioning and elasticity in Cloud and edge/fog systems, (iii) self-adaptive deployment of geo-distributed data stream applications, and (iv) optimization of kernel codes on GPUs. I have co-authored more than 110 papers published in peer-reviewed international journals, conference and workshop proceedings, and book chapters, starting with the first published paper in 1998. Among these publications, 3 have received paper awards at international conferences (SOSE 2011, ACM DEBS 2015, ACM DEBS 2016) and 1 at international workshops (DistInSys 2021). According to Google Scholar, in September 2021 there are more than 5400 citations of all the articles that I co-authored, with a h-index equal to 34. According to Scopus, in September 2021 the total number of citations exceeds 2700 (with 101 indexed articles) and my h-index is 26. I have been included in the ranking, published in 2020 on PLoS Biology (10.1371/journal.pbio.3000918, Table S7-singleyr-2019), of 2% top-scientists for the single year 2019.
    [Show full text]
  • Museums and the Web 2006
    10 th Museums and the Web 2007 Museums and the Web 2006 April 11-14, 2007 March 22-25, 2006 San Francisco, California, USA Albuquerque, New Mexico, USA Call For Participation Final Program www.archimuse.com /mw2007 / www.archimuse.com /mw2006 / Themes for 2007 include: Social Issues and Impact Applications Museum 2.0 Services • Building Communities • Wireless Inside/Outside • Podcasting, Blogging, RSS, Social • Public Content Creation • Visitor Support On-site + On-line Tagging, Folksonomy, Wikis, Cell • On-going Engagement • Schools + Educational Programs Phone Tours ... Organizational Strategies • E-commerce for Museums • Museum Mashups • Building + Managing Web Teams Technical and Design Issues Evaluation + User Studies • Multi-Institutional Ventures • Standards, Architectures + Protocols • Impact Studies • Facilitating Change • Interface + Design Paradigms • User Analysis + Audience • Sustainability • New Tools + Methods Development • Managing Content + Metadata • Site Promotion Session Formats Choose the right presentation format for your proposal. Even the best ideas can be Please co-ordinate your proposals with rejected if proposed for an inappropriate venue. your collaborators. Multiple proposals • Research? about the same project will not be Propose a Paper, to be given in a formal session with other papers and accepted. Proposals for sessions should discussion be submitted as individual papers with • Case Study? a covering note. Papers are reviewed Present a Paper or a Demonstration, depending on whether you wish to individually; full sessions are rarely emphasize generalizability, or your specific case accepted. • Methods and Techniques? Teach a Pre-conference Workshops (full or half-day) or Mini-workshop (1hr) Deadlines • Debate or Problem Statement? • September 30, 2006 for papers, Engage colleagues in a Professional Forum workshops, mini-workshops + • Product to Show? professional forums (written paper Propose an Exhibit (commercial) or Demonstration (non-commercial) required by Jan.
    [Show full text]
  • Cisco Meetingplace Express 1.1
    Data Sheet Cisco MeetingPlace Express 1.1 Cisco ® MeetingPlace ® Express is an integrated voice and Web conferencing solution that helps midsize organizations realize the cost savings and productivity benefits of deploying conferencing with Cisco CallManager. Part of the Cisco Systems ® IP Communications solution, Cisco MeetingPlace Express provides simple, powerful conferencing functions that are easy to deploy and manage (Figure 1). Figure 1. Cisco MeetingPlace Express Helps Users Make the Most of Their Meeting Time IMPROVED PRODUCTIVITY, ACCELERATED BUSINESS Cisco MeetingPlace Express promotes communication and collaboration by helping people meet from any place at any time with anyone. Organizations can expand their market reach, improve operational effectiveness, and speed decisions by integrating virtual meetings into everyday communications. With just a phone and a Web browser, users can collaborate with coworkers, demonstrate products and services to customers, and deliver compelling presentations. Cisco MeetingPlace Express also makes virtual meetings more productive by integrating meeting management and control capabilities directly into Web and Cisco IP Phone interfaces. COST SAVINGS AND SECURITY Deployed on an organization’s converged IP network, Cisco MeetingPlace Express can reduce costs by virtually eliminating conferencing telephony and service fees paid to service providers. And Cisco MeetingPlace Express helps secure meetings using Secure Sockets Layer (SSL) encryption, behind-the-firewall deployment, and multiple meeting security options. All contents are Copyright © 1992–2005 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 15 EASY DEPLOYMENT AND MANAGEMENT Cisco MeetingPlace Express is a software solution, installed on a single server that supports industry-standard protocols—H.323 and Session Initiation Protocol (SIP)—to ensure connectivity with a range of telephony systems, including Cisco CallManager and Cisco CallManager Express.
    [Show full text]
  • Xiangyu Zhao's CV
    Xiangyu Zhao Lau Ming Wai Academic Building Homepage: http://cse.msu.edu/~zhaoxi35/ City University of Hong Kong LinkedIn: https://linkedin.com/in/zhaoxiangyu/ CONTACT 83 Tat Chee Avenue GoogleScholar: https://scholar.google.com/citations?user=Nkm9r2IAAAAJ INFORMATION Kowloon Tong, Hong Kong Phone: +86 18630109812 (CHN) E­mail: [email protected] Phone: +1 929­362­8280 (USA) POSITIONS Assistant Professor (tenure­track), City University of Hong Kong Sep 2021 ­ Present School of Data Science EDUCATION Michigan State University Doctor of Philosophy (Ph.D.) in Computer Science and Engineering Jan 2017 ­ May 2021 • Advisor: Dr. Jiliang Tang • Thesis: Adaptive and Automated Deep Recommender System • Top 100 Chinese New Stars in Artificial Intelligence, Criteo Research Award, Bytedance Research Award, MSU Dissertation Completion Fellowship University of Science and Technology of China Master of Science (M.S.) in Computer Science and Technology Sep 2014 ­ Jun 2017 • Advisor: Prof. Enhong Chen • Thesis: Exploring the Choice under Conflict for Social Event Participation • Outstanding Master’s Thesis Award (Top 15 in Anhui Province) University of Electronic Science and Technology of China Bachelor of Engineering (B.Eng.) in Software Engineering Sep 2010 ­ Jun 2014 • Advisor: Prof. Tao Zhou and Prof. Ming Tang • Thesis: Identifying Effective Multiple Spreaders by Coloring Complex Networks • Outstanding Graduation Thesis Award of UESTC (1% in university, 1/205 in department) RESEARCH Applied Machine Learning Lab, City University of Hong Kong EXPERIENCE Director Jun 2021 ­ Present • Research Interests: Machine Learning, Data Science, AI and their applications in Information Retrieval, Urban Computing, Social Computing, Finance, Education, Ecosystem and Healthcare Data Science and Engineering Lab, Michigan State University Ph.D.
    [Show full text]
  • Curriculum Vitae Ly Dinh 501 E. Daniel St., Champaign, IL 61820 Phone: (425) 389-0307 | Email: [email protected]
    Curriculum Vitae Ly Dinh 501 E. Daniel St., Champaign, IL 61820 Phone: (425) 389-0307 | Email: [email protected] https://publish.illinois.edu/lydinh-uiuc/ RESEARCH INTERESTS Network Science Computational Social Science Organizational Communication Crisis Informatics EDUCATION University of Illinois Urbana-Champaign Ph.D. in Information Sciences, Fall, 2021 (expected) Dissertation title: Advances to network analysis theories and methods with applications in social, organizational, and crisis settings Advisor: Jana Diesner (Chair & Director of Research, School of Information Sciences, University of Illinois Urbana-Champaign) Committee: Scott Althaus (Communication & Political Science) Peter Darch (School of Information Sciences) Leysia Palen (Computer Science, Information Science, University of Colorado-Boulder) M.A in Communication, Spring, 2016 Emphasis: Organizations, Teams Science and Social Networks Advisor: Marshall Scott Poole (Department of Communication, University of Illinois Urbana-Champaign) University of Southern California B.A (Honors) in Communication, Spring, 2014 Emphasis: Social network analysis & social capital Honor’s Thesis Title: What’s Facebook Good For? An Exploratory Study on the Connection between Motives of Social Networking Sites Usage and Generation of Social Capital as moderated by Cultural Differences Advisor(s): Stacy L. Smith (Annenberg School for Communication), Margaret McLaughlin (Annenberg School for Communication). Minor(s): Cinematic Arts & Entrepreneurship SKILLS Computer: Proficient in programming, network analysis, and natural language processing using R (statnet, igraph, tm), Python (scikit-learn, spaCy), Java (Weka). Languages: English (Fluent), Vietnamese (Native) RESEARCH AND PUBLICATIONS Journal Articles J6: Dinh, L.*, Rezapour, R.*, Jiang, L., & Diesner, J. (2021). Assessing balance in signed digraphs using balance and transitivity (*Equal contribution). Scientific Reports (under review) J5: Aref, S.*, Dinh, L.*, Rezapour, R.*, & Diesner, J (*Equal Contribution).
    [Show full text]
  • Ana-Andreea Stoica
    ANA-ANDREEA STOICA 617 CEPSR, Columbia University, New York, NY 10027, USA [email protected] j www.columbia.edu/∼as5001 j (609)-937 9044 Research Interests | Machine Learning, Social Networks, Random Graph Theory. My work focuses on mathematical models, data analysis, and policy implications for algorithm design in social net- works. I am particularly interested in studying the effect of learning algorithms of biased network by employing graph theoretical and machine learning techniques. EDUCATION Columbia University, New York, NY, USA September, 2016{ Ph.D. Candidate, Computer Science Department Advisor: Associate Professor Augustin Chaintreau Columbia University, New York, NY, USA September, 2016{June, 2018 M.Sc., Computer Science Department GPA: 4.00/4.00 Advisor: Associate Professor Augustin Chaintreau Princeton University, Princeton, New Jersey, USA September, 2012{May, 2016 B.A., Mathematics Department GPA: 3.7/4.00 Graduated magna cum laude. Undergraduate Advisor: Professor Emmanuel Abbe Certificates: Applied & Computational Mathematics, Applications of Computing SELECTED FELLOWSHIPS, AWARDS, AND HONORS J.P. Morgan AI Research PhD Fellowship 2019{2020 Andrew P. Kosoresow Memorial Award for excellence in teaching, Columbia University 2018 International Zhautykov Mathematics Olympiad, Bronze Medal 2010 Romanian National Mathematics Olympiad, 1 Gold, 2 Silver, and 3 Bronze medals 2007{2012 Diploma of Excellence awarded by Prime Minister of Romania 2008 PREPRINTS Mihir Nanavati, Ana-Andreea Stoica, Lloyd Brown, Nathan Taylor, Siddhartha Sen.\HAIbrid data structures." Manuscript in preparation. CONFERENCE AND JOURNAL PUBLICATIONS Ana-Andreea Stoica, Abhijnan Chakraborty, Palash Dey, Krishna P. Gummadi. \Minimizing Margin of Victory for Fair Political and Educational Districting." Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems.
    [Show full text]
  • Report on the DATA:SEARCH'18 Workshop
    WORKSHOP REPORT Report on the DATA:SEARCH’18 workshop – Searching Data on the Web Laura Koesten Philipp Mayr The Open Data Institute/ GESIS – Leibniz Institute University of Southampton, UK for the Social Sciences, DE [email protected] [email protected] Paul Groth Elena Simperl Elsevier Labs, NL University of Southampton, UK [email protected] [email protected] Maarten de Rijke University of Amsterdam, NL [email protected] Abstract The increasing availability of structured data on the web makes searching for data an important and timely topic. This report presents the motivation, output, and research challenges of the second DATA:SEARCH workshop which was held in conjunction with SIGIR 2018, in Ann Arbor, Michigan. This workshop explored challenges in data search, with a particular focus on data on the web. The aim was to share and establish links between different perspectives on search and discovery for different kinds of structured data, which can potentially inform the design of a wide range of information retrieval technologies. The DATA:SEARCH workshop tries to bring together communities interested in making the web of data more discoverable, easier to search and more user friendly. 1 Motivation As an increasing amount of data becomes available on the web, searching for it becomes an increasingly important, timely topic (Gregory et al., 2018). The web hosts a whole range of new data species, published in structured and semi-structured formats - from web markup using schema.org and web tables to open government data portals, knowledge bases such as Wikidata and scientific data repositories (Cattaneo et al., 2015; Lehmberg et al., 2016).
    [Show full text]
  • The Web Conference 2020 I Taipei, Taiwan I 1 the WEB CONFERENCE 2020 Welcome Letter
    The Web Conference 2020 I Taipei, Taiwan I 1 THE WEB CONFERENCE 2020 Welcome Letter Since the invention of the World Wide Web in 1989, The Web Conference (formerly known as The WWW Conference) is a yearly international conference on the topic of the World Wide Web. This conference has been the premier venue addressing the evolution and current state of the Web through the lens of computer science, computational social science, economics, public policy, and Web-based applications. The Conference assembles scholars, researchers, policymakers, practitioners, and end-users with one unifying goal: to envision and create the future of the Web. Over the past three decades, The Web Conference has been the forum where some of the most fundamental web technologies have been introduced. These groundbreaking technologies have improved our daily lives. The Conference has also inspired new ideas for business, communication, and entertainment, such as e-commerce, online-shopping, Web/mobile payments, Web TV/phones, and Web banking. Nearly all online systems today employ Web technologies, connecting every corner of the world. We are happy to announce that The Web Conference will reconvene in Taipei, the Heart of Asia, in April 2020, at a time when more than 60% of the world's population will be connected. There we will reflect on the past 30 years of the Web, share the latest research findings, and plan for the future of Web-based technologies. The Conference will host three keynote speakers and highlight numerous research tracks, workshops and tutorials, a PhD consortium, as well as several theme-based tracks: The Intelligent Web, The Web Renovation, and The Asia Silicon Valley Plan.
    [Show full text]