EWR NLSSWT EAIELINKS NEGATIVE WITH ANALYSIS NETWORK optrSine–Dco fPhilosophy of Doctor – Science Computer nprilfllmn fterequirements the of fulfillment partial in ihgnSaeUniversity State Michigan DISSERTATION A o h ereof degree the for ye ct Derr Scott Tyler umte to Submitted 2020 By

i eerhn h tlt n o ohressca hoista aebe salse naholistic a in established been have that theories social harness to how by links and negative utility with analysis the network researching improving towards and links positive to compared as have links. negative of inclusion the theories with apply social not the might furthermore networks unsigned and in links, used positive been have as of that same principles the and necessarily properties not the are as links challenges, negative novel raises this for However, need positive these relations. a both negative harness is that and networks there signed specifically, apply and More mine, model, measure, links. can that negative methods consideration analysis into network taking typical both the also to perform when led to tasks has methods advanced this for online, demand polarization and the increased attention to increased and due an media addition, social In today’s of explored. popularity under in significantly been rise have they links, positive to addition in can also users. unfriend but and trust, block or they foes, those their towards and distrust, followers, they those friends, to as links negative such establish media, links social positive online have in example, only For not networks. users signed a or negative, in and nodes positive between both relations be systems, can real-world graph many positive in However, only through having networks. data networks unsigned of on or focused structure links, has natural analysis be the network can harness Traditionally, data to big analysis. today’s taken network of being much is that emphasis fact graphs, the as to due represented Thus, actionable take society. ultimately our and can improving future, We towards the steps about predictions patterns. make created past, insightful the has extract understand produced effectively to is seek to then data methods which novel at for rate demand the unprecedented age, an information the into continue rapidly we As h he betv fti israini ofis nlz h itntpoete eaielinks negative properties distinct the analyze first to is dissertation this of objective chief The links negative represent to ability their to due ubiquitous are networks signed although Thus, EWR NLSSWT EAIELINKS NEGATIVE WITH ANALYSIS NETWORK y e ct Derr Scott Tyler ABSTRACT By

ii neato oaiylvl noln oilmdaadcntutn navne comprehensive networks. advanced signed an harnessing around constructing built framework and prediction media vote congressional social online in levels polarity interaction mining (i.e., network and embedding network performance transformation-based of prediction idea novel the state-of-the-art introduce achieve furthermore then can that representations node learns bipartite which signed to theory balance extend/analyze (i.e., networks and model network signed generative (i.e., first the and relevance signed in node methods measuring advanced develop for we networks particular, In domain. analysis network the of negative frontier of the advancing existence for opportunities the unprecedented provide although also they that challenges, numerous and introduces links sufficient not extending simply typically that is discover analysis We network links. unsigned negative and positive both containing networks of view indntokmodeling network signed ,and ), pl indnetworks signed apply ,cntuttefis indgahcnouinlnetwork convolutional graph signed first the construct ), ycetn rmwr htcnifrbt ikand link both infer can that framework a creating by indntokmeasuring network signed ,present ), signed

iii om ie aet,sbig,adetr aiyfrterlv n support. and love their for family entire and siblings, parents, wife, my To iv

iv israin e r ati opytruhteTahr nSca ei rjc tMU have I MSU. at Project Media Social in Teachers the the through Torphy of this Kaitlin beyond some Dr. research met my for I continue motivation to dissertation. mind the in strengthen ideas new to numerous have able now also and methods was presented I Tan studies. Dr. Ph.D. with my throughout discussions myself textbook Through found Mining have Data I to course, mining Introduction data his Tan’s I referencing Pang-Ning continuously Although Dr. taking research. of on pleasure perspectives the my had broaden not to have helping based also tips while numerous experiences providing many by his interviews market on helped job greatly faculty had my Jain for Anil preparation my Dr. during especially problems. me researcher, science interdisciplinary social to an techniques as science equipped data perspective better applying science for being social for He me computational prepared a course. has from network this analysis social and network Frank’s social Dr. to in eyes Tang analysis my Dr. network opened when signed time has on first the lecture for guest Frank a Kenneth gave Dr. I met and had much I for guidance networks. and signed insights in invaluable research provided my has of he then since Conference and International 2017 SIAM in the at Mining time Data helpful first on the and for comments Aggarwal Charu insightful Dr. their met for Torphy, had I Kaitlin suggestions. Dr. and Tan, Pang-Ning Dr. Jain, Anil Tang, Dr. life. and dear work a my enough. both also you in thank is experience cannot He and I knowledge his advice. with and me suggestions guided has his and appreciate to friend always honored feel will mentor, and better student, a his having imagine been my not have to could led I has researcher. what independent are an which to as experiences, tirelessly growth worked learning has and He opportunities countless students. with mentoring me and provide lab research to presentations, a designing managing and efficiently papers, of writing ways problems, research good find to years these how during from him from ranging much so learned have encourage- I guidance, Ph.D. my his through for Tang, support and Jiliang inspiration, Dr. ment, advisor, my thank to like would I foremost, and First ol iet hn ycmitemmesD.CauAgra,D.KnehFak Dr. Frank, Kenneth Dr. Aggarwal, Charu Dr. members committee my thank to like would I ACKNOWLEDGEMENTS v

v edie.Drn ytm nteDELbIhv ere omc rmyual okforward look are I you first-hand all. know you I achievements; from great much future your so all learned seeing have and I collaboration Lab continued to DSE the the in of time moment my last the During until papers deadlines. our revise meticulously to awake staying remember Xiangyu will and I Wang, Zhao, Zhiwei Wang, Yiqi Wang, Wentao Wang, Chenxing Ma, Yao Haochen Liu, Karimi, Xiaorui Hamid Liu, Johnson, Cassidy Brookhouse, Jin, Aaron Wei Huang, collaborators Jiangtao DSE Dr. Fan, my Wenqi Dacon, to Jamell thanks for paper; Wang first-author Suhang first Dr. my and Wang on Chenxing collaboration to thanks Wang paper; Zhiwei co-author to first thanks my particular, on In collaboration for Zhao. Xiangyu and Zhao, Hansheng Xu, Han Wang, Wang, Zhiwei Yiqi Wang, Xin Wang, Xiaoyang Wang, Wentao Wang, Hannah Chenxing Varghaei, Shah, Pegah Namratha Ofori-Dankwa, Striebel, K. Daniel Madan, Mitansh Liu, Ma, Yao Haochen Liu, Li, Yaxin Xiaorui Li, Liu, Juanhui Hua Karimi, Hamid Hendryx, Johnson, Ibrahim Cassidy Bryan Jin, Fan, Wei Lab: Dr. Wenqi Huang, DSE Wu, Jiangtao Dacon, the Lingfei Dr. Jamell from Brookhouse, colleagues Dr. my Aaron Wang, of Almutairy, all Jianping Meznah to thankful Dr. Dr. am Ahmed, Torphy, I Kaitlin Yin. Dawei Dr. Dr. Liu, and Zitao Xu, Qing Jiejun Dr. Dr. Javari, Liu, Amin Hui Kevin Frank, Kenneth Dr. Dr. Aggarwal, Dr. Li, Charu Esmalian, Pouya Dr. Chang, Yi Lab: DSE Dr. the Chang, outside Chen-Chuan from I collaborators colleagues. my and all friends to encouraging I thankful and study, supportive am Ph.D. having my of During fortune and lab. pleasure the the establishing had was have he when student Ph.D. first Tang’s Jiliang Dr. HRL. at time Dr. my thank during to comments like insightful also would his for I Lu everything. Tsai-Ching for both you Thank trajectory. has research that that knowledge my both domain shape you valuable helped to and techniques, thanks problems, was new It into Xu. insights Jiejun valuable gained Dr. I and Ni Kang-Yu Dr. mentors: amazing the having of all them with on collaboration dissertation. me my continued of mentored a completion to has the forward she after look and I research mining. education data of educational domain in the topics some in Torphy Dr. from lot a learned ondteDt cec n niern DE a tteedo h al21 eetras semester 2016 Fall the of end the at Lab (DSE) Engineering and Science Data the joined I privilege the had I that here was It Laboratories. HRL at intern an been have to fortunate was I vi

vi n upr.Ti israini eiae othem. to dedicated is dissertation This support. and friend. and mentor, advisor, an as Tang Jiliang Dr. having hands good in all ial,Iwudaanlk otakm ie aet,sbig,adetr aiyfrterlove their for family entire and siblings, parents, wife, my thank to like again would I Finally, vii

vii HPE ESRN EWRSWT EAIELINKS NEGATIVE WITH NETWORKS MEASURING 3 CHAPTER PRELIMINARIES AND FOUNDATIONS 2 CHAPTER INTRODUCTION 1 CHAPTER ALGORITHMS OF LIST FIGURES OF LIST TABLES OF LIST . oeCnrlt esrmn nSge ewrs...... 38 ...... Networks Signed in Measurement Centrality Node 3.2 20 ...... 9 . Networks Signed . in Measurements Relevance . 5 Node . 6 . 3.1 4 . . . . 6 ...... 2 ...... Theories . . and . . . Properties, . . Datasets, . . . Network . . Signed ...... 2.3 ...... Theories . . and . . Properties . Network . . Unsigned . . . . Definitions . and . . Notations 2.2 . Basic ...... 2.1 ...... Organization . . . 1.3 Contributions . Challenges 1.2 Research 1.1 .. xeiet 33 . . . . . 41 ...... 25 ...... 39 ...... 22 ...... Function . . . Objective Measurement Measurement . . . Centrality (DeSCent) Signed Centrality . . . Signed Deep . . . of Overview . 3.2.2 . . An ...... 3.2.1 ...... Experiments . . . . . 3.1.3 . . . 15 ...... 10 . . Methods . Global 9 ...... 3.1.2 ...... 8 . 11 ...... Methods . . . . Local ...... 8 . . 3.1.1 ...... 7 ...... Theories . Network . . . . Signed Properties . Networks . . . . Signed . on . . . . Analysis 2.3.3 Data ...... Datasets Network . . . . 2.3.2 Signed ...... 2.3.1 ...... . . Network . . Coefficient . Clustering . . and 2.2.4 Transitivity . . . Reciprocity 2.2.3 Network Density Network and Distribution 2.2.2 Degree 2.2.1 ... inPeito 33 41 35 ...... 25 ...... 29 ...... Theory . . . Status . on . . . 23 Based . Centrality . . . Signed ...... 24 . . . . . 3.2.2.1 ...... 23 ...... Prediction . . . Strength . . Tie . . . 28 ...... Prediction . . . . Sign 3.1.3.2 ...... 3.1.3.1 ...... Restart . . . with Walk . . . . Random Networks Weighted . . for . . Measure . . . . Similarity Asymmetric . 3.1.2.3 ...... Katz . 3.1.2.2 . . 17 . . . . 3.1.2.1 ...... 15 Attachment . . Preferential ...... Index . Jaccard 3.1.1.3 . . . . . Neighbors . Common 3.1.1.2 . . . . . 3.1.1.1 ...... Networks Signed . in Theory . Status Networks Signed in Theory Balance 2.3.3.2 2.3.3.1 ...... AL FCONTENTS OF TABLE ...... viii ...... xvi xiv xii 19 1 6

viii HPE IIGNTOK IHNGTV LINKS NEGATIVE WITH NETWORKS MINING 5 CHAPTER LINKS NEGATIVE WITH NETWORKS MODELING 4 CHAPTER . indGahCnouinlNtok 102 ...... Networks Convolutional Graph Signed 5.1 79 ...... Networks Bipartite Signed in Balance 4.2 58 ...... Networks Signed of Modeling Generative 4.1 .. xeiet 114 ...... 104 ...... 95 ...... 104 Experiments ...... 5.1.3 ...... Framework . Network . Convolutional . Graph . Signed . Proposed . The . . . Statement 5.1.2 Problem . . 5.1.1 . . 87 ...... 73 . . . Experiments . . . . . 4.2.3 . . . 80 ...... 72 . Networks . Bipartite . Signed . for . . Prediction . Sign ...... 4.2.2 ...... 65 ...... 59 . . . 62 . Networks . . Bipartite . . Signed . . . in . . Theory . . . . . Balance ...... 4.2.1 ...... Experiments 47 . . . BSCL . of . . Complexity . 4.1.6 . Time . . 59 ...... 4.1.5 ...... BSCL . . for . . Learning . . Parameter . . . BSCL . Model for (BSCL) Generation . . 4.1.4 Network Chung-Lu Signed . . Balanced of . . Overview 4.1.3 An . . 46 . Statement . 4.1.2 Problem . . . . . 4.1.1 ...... Experiments Framework Network Deep DeSCent 3.2.4 Overall 3.2.3 ... efrac oprsn...... 115 ...... 109 ...... 105 . . . . . 107 . . . 99 ...... 96 . Comparison . . . Performance ...... 5.1.3.1 . . . . . Network . Convolutional . . Graph . Links Signed Negative . . and . Positive . . with . Paths . Aggregation . 5.1.2.3 . . Networks . Convolutional . Graph . Unsigned 89 5.1.2.2 . . . . . 92 . 5.1.2.1 ...... 88 ...... 84 ...... Analysis . . . . Parameter 86 ...... Results Comparison 4.2.3.2 . . . . . 83 ...... 4.2.3.1 . Prediction . . . . Sign . 81 Based . . Walk . . . Random ...... Prediction . . . Sign . Low-Rank . 4.2.2.3 . 82 . . Classifier . . Based . . Caterpillars . . . Signed . 4.2.2.2 . . . . 77 ...... 4.2.2.1 . . . Networks . . Bipartite . . . in 73 . . Caterpillars . . . Signed ...... Analysis . . . Butterfly . Signed 4.2.1.5 . . . . Classes . Isomorphism . . Butterfly Networks . . Signed 4.2.1.4 Bipartite . Signed . . in . Butterflies . . Signed 4.2.1.3 . . Datasets Network . . Bipartite Signed 4.2.1.2 ...... 4.2.1.1 ...... Experiment Learning . Parameter . Experiment Generation Network 4.1.6.2 4.1.6.1 54 . . Learning . . Learning 4.1.4.3 . . 50 . 52 Learning 4.1.4.2 . . . . . 4.1.4.1 ...... 45 . . . Analysis . . Parameter . . . Datasets . Across . Generalization 3.2.4.3 . . . Comparison Performance 3.2.4.2 . 42 . . . 3.2.4.1 . . . . . Constraints . Measurement DeSCent Structures Additional Higher-order and Theory Balance Harnessing 3.2.2.3 3.2.2.2 U d V 70 . 66 . . . . 65 ...... ix ...... 101 56

ix HPE INDNTOKAPPLICATIONS NETWORK SIGNED 6 CHAPTER . ogesoa oePeito 155 ...... Prediction Vote Congressional 6.2 134 ...... Prediction Polarity Interaction and Link 6.1 119 ...... Embedding Network Signed Role-based 5.2 .. xeiet 164 ...... 163 ...... 160 ...... 158 . 156 ...... 145 ...... Experiments . . . . . MFCVP . of . . . Details . 6.2.6 Classification ...... 6.2.5 ...... 157 ...... MFCVP . of . Factors . . Social . . . MFCVP . . of . Factors . (MFCVP) . 6.2.4 Ideology Prediction Vote . . Congressional Multi-factor . . of 6.2.3 Overview . . . Statement . 6.2.2 Problem . . 6.2.1 . . . . . 134 ...... Experiments . . 135 . 6.1.4 . 139 . . . 128 ...... Framework . . (LIP) . Prediction . . Polarity . Interaction . . and . Link . . Joint . The ...... 6.1.3 ...... Analysis . Data . Opinion . User . Network . Signed . . 121 . Statement 6.1.2 . Problem . . . . 6.1.1 . 123 ...... Experiments . . . . . 5.2.3 ...... Embedding Network . Signed Role-based . . . 5.2.2 . . . Statement Problem 5.2.1 ... oiia atrAayi 170 ...... 165 ...... 164 . . . 168 ...... 167 160 ...... 161 ...... Analysis . Factor . . . Political . . . Predictions . . . . . Outcome Vote . . Roll-call . . . Overall 6.2.6.5 . . . . Predictions . Vote . . . Representative Individual . 6.2.6.4 ...... Settings . . . Experimental 6.2.6.3 153 . . Collection Data . . . and Dataset . 6.2.6.2 ...... 6.2.6.1 152 ...... 149 . . . . . Features . Network . 147 . . Bipartite . Signed ...... Features . Party . . 6.2.4.2 ...... 6.2.4.1 ...... 143 ...... 142 ...... 141 . . . . Analysis . . Parameter ...... Discussions . . . Experiment . 6.1.4.4 ...... Experiments . . . Cold-Start 6.1.4.3 ...... 136 . Experiments Sparsity 6.1.4.2 ...... 139 . . . 6.1.4.1 . LIP . . for . . 137 Method . . Optimization . . . An . . . . Framework . Joint . . 136 . Proposed . The . 6.1.3.4 . . . Correlations . . Opinion Models . User . . Prediction Modeling 6.1.3.3 Polarity . . . Interaction and . . . Link Basic . 6.1.3.2 . . . . . Perspective . . 6.1.3.1 Local A 129 . . Opinions: . . User Perspective 127 Correlated . Global . A . . . Opinions: . User . . Correlated 6.1.2.3 . . . . Dataset . Epinions . Extended 6.1.2.2 . 131 ...... 6.1.2.1 . 124 . . . . 126 ...... 122 ...... Role-nodes: . . . . of . Encodings . . . . the . 121 of . . . . . Interpretation . 118 ...... Comparison Performance . 5.2.3.2 ...... 5.2.3.1 ...... Justification . . . Model . . . . Network . Original . . . the . Embedding . 5.2.2.3 ...... Transformation . . Network 5.2.2.2 ...... 5.2.2.1 . . . . Embedding Network . Signed . . . . Embedding Network Unsigned . 5.2.1.2 . . 5.2.1.1 . . . . Analysis Parameter 5.1.3.2 x ...... 133

x BIBLIOGRAPHY DIRECTIONS FUTURE AND CONCLUSION 7 CHAPTER . umr 173 . 176 ...... Directions . Future . 7.2 Summary 7.1 ...... xi ...... 173 178

xi al .0 ttsiso indbprientok...... 81 . 85 ...... 80 ...... networks. . . bipartite signed . . on statistics . . butterfly Signed . . 4.11: Table . . . . networks. . bipartite 76 signed . on Statistics . . 4.10: Table . . networks. . bipartite signed regarding . Notations . 4.9: networks . Table 76 signed . real the . . to networks . . generated 75 the . . from . difference . Absolute 76 . . dataset. . Epinions 4.8: . the . Table . in . types . . triangle . . signed . 75 of . . Distribution . dataset. . . . Bitcoin-OTC 4.7: the Table . . . in types . . . triangle signed . . . of Distribution . . dataset. . Bitcoin-Alpha . 4.6: the Table . in . types 52 . triangle . signed . of . . Distribution . 73 . . networks. 4.5: . signed Table . . generated . 60 in . . balanced . triangles . . of . . Proportion ...... 4.4: . . Table ...... distribution. . sign . . link Positive/negative . . modeling. . 4.3: generative . Table for . networks . social . signed . three . of . Statistics . . . 4.2: Table . . modeling. generative . network signed . regarding Notations . 37 4.1: Table AUC. . with results . prediction link Signed setting. directed the 3.6: Table under 37 35 prediction strength tie of . . comparison Performance . setting. undirected 21 . the 3.5: Table under . prediction . strength . tie 34 . of . comparison Performance . . setting. . directed 3.4: . Table the . under . prediction . 10 link . of . comparison . Performance . . setting. . . 14 undirected 3.3: Table the . . under prediction . . . link 13 of . . . comparison Performance ...... 3.2: . Table networks. . . signed . in . . relevance . node . regarding . Notations networks. . social . signed . 3.1: in . Table links . negative . and . positive . of . strengths . Tie . networks. social 2.3: . Table signed in . reciprocal being . links of . Probability . 2.2: . Table networks. social signed four of Statistics 2.1: Table vrgdoe h he aaesfrec epciepoet...... 78 ...... property. respective each for datasets three the over averaged ITO TABLES OF LIST xii

xii al .:U ogesdtstsaitc...... 164 ...... 151 ...... 157 ...... 135 . . . 151 ...... statistics. . dataset . . . Congress . US ...... 6.5: . Table . . . prediction. . . vote . congressional . . regarding . Notations . . . . . 6.4: . Table . . results. . . cold-start 117 prediction . . Link . . . . 6.3: Table . . results. . . cold-start prediction . . polarity Interaction . . 117 . 129 . . 6.2: Table ...... statistics. . dataset . . epinions . Extended Wiki- . . the . . on . 6.1: Table . methods . . baseline . the . . and . (ROSE) . . model . . . proposed . the . . of . AUC . . ROSE. . . 5.6: for Table variants . . dataset network . 117 . signed three . . . of Statistics ...... 5.5: Table . . F1. with 97 . . results prediction . . 103 sign Link ...... 5.4: Table . . . AUC. with . . . results prediction . . . sign Link . . . SGCN. . 5.3: . for Table variants . . dataset network . . signed two . of . Statistics . . . 5.2: networks. Table convolutional . graph signed . to regards . in Notations . 5.1: Table (AUC,F1). of terms in results prediction sign Link 4.12: Table lcin lsdtadEiin aaes 130 ...... datasets. Epinions and Slashdot Election, xiii

xiii iue54 rnfraino indntokwt w oe oa nindbipartite unsigned an to nodes two with network signed a of Transformation 5.4: Figure parameter the varying when sensitivity Parameter signed a 5.3: in Figure information neighbor aggregates SGCN how of illustration An 5.2: Figure unbalanced and balanced to according paths aggregation the of illustration An 5.1: Figure on sensitivity Parameter 4.6: Figure on sensitivity Parameter 4.5: Figure iue42 SLprmtrlann nlss 79 . 83 ...... construct . we how . . of overview . . High-level . . 4.4: . Figure classes. . isomorphism . butterfly signed 74 Undirected . . 4.3: . Figure . . analysis. . learning parameter 55 . BSCL coefficients. clustering 4.2: . local Figure and . distributions degree . the of . Visualization Bitcoin-Alpha. 4.1: on Figure constraints 53 additional 32 centrality signed the . Analyzing training. cross . versus 3.5: within Figure . of comparison . performance prediction . link Signed . . 3.4: matrices 40 16 Figure the 12 . calculate we . how . of . . scores. illustration . centrality An . . signed . learning . . for 3.3: . network Figure . . neural . deep . . our . of . . illustration . An . . . . 3.2: Figure . 1 . walk. random . . signed during . . encountered Triplets . . . triangles. . signed . 3.1: of Figure . form . 4 the . in . theory . balance . Visualizing . . . . . 2.2: . Figure . networks. . social . signed . in . distributions Degree . dissertation. this 2.1: . in Figure presented . contributions research . the of overview . An network. 1.2: signed Figure and unsigned an of visualization A 1.1: Figure ewr frl-oe...... 120 . . . . . 110 ...... 107 ...... role-nodes. of . . network ...... network...... paths. U X ITO FIGURES OF LIST ? and and V X nMwTo h ..Snt aae.....98 . . . . dataset. Senate U.S. the on MFwBT in = xiv nSR nteUS os aae.....99 . . . . dataset. House U.S. the on SBRW in A from T B _  , + nteBtonApadataset.118 Bitcoin-Alpha the on P , ( T * and + , T P   − 93 ...... and , T * − 43 . . . .

xiv iue69 etr nlssuigtefaueiprac ausfo FV_F 171 . . . . . 162 MFCVP_RF. . from values . importance feature . the using analysis . Feature 169 . outcome. vote 6.9: roll-call . Figure overall the . predicting MFCVP . of 167 evaluation . Performance . . 6.8: votes. . Figure representative individual . predicting MFCVP . of evaluation . Performance . 6.7: features. Figure 149 network . bipartite signed . the of . Illustrations . 158 6.6: framework. Figure . (MFCVP) Prediction Vote . Congressional Multi-Factor . proposed The . . 6.5: w.r.t. Figure experiment . sparsity . data 90% . the on . LIP of . variations . Performance . 6.4: Figure settings. sparsity varied with results Experimental correlations.138 opinion 6.3: on Figure perspective local the from behaviors receiving and Giving 6.2: cor- Figure opinion on perspective global the from behaviors receiving and Giving 6.1: Figure a of role-nodes the of vectors encoding the of distance 124 pairwise average role-node. The of network the 5.6: to Figure network signed input the of process Transformation 5.5: Figure eain...... 137 ...... 131 ...... and ...... relations. . . . . link. a of absence and link, negative pair node W 154 ...... ( ,E D, ) o ieetitrcintpsbtente:pstv link, positive them: between interaction-types different for xv [

xv loih .:Blne indCugL BC)mdl 62 . . 47 ...... BSCL_Network_Generation( . . . . 4.2: Algorithm model. . (BSCL) Chung-Lu . Signed Balanced . . 4.1: . Algorithm DeSCent. for procedure Optimization 3.1: Algorithm loih .:Tpclusge C rmwr...... 107 . 145 ...... framework. . LIP proposed . 113 the for . method . optimization . The . . . 6.1: generation. Algorithm embedding . (SGCN) Network . Convolutional Graph . Signed . . 5.2: Algorithm framework. GCN unsigned Typical 5.1: Algorithm ITO ALGORITHMS OF LIST ," ,d ,V U, d, c, ", [, xvi ...... 63 ...... ).

xvi oee,ngtv ik nsge ewrsmk hmapial oabodrrneo applications [7]. of tasks range broader and a to networks; applicable them signed make for networks 6]. tasks signed 5, analysis in links 4, similar negative however, have [3, can tasks we analytical networks, various unsigned in to links analogous positive Second, over value added significant been have have links to links negative negative proven First, of analysis. existence network for the opportunities hand, unprecedented about other by brings the also out On carried be analysis. cannot network analysis network unsigned signed extending Hence, simply 1]. [2, networks different unsigned substantially of are those networks from signed [1]. of links theories positive and from principles properties fundamental distinct the have Meanwhile, recent networks from signed evident in is links negative It that analysis. researches network unsigned traditional for challenges also but tremendous representation, the poses of complexity introduction the The increases only (b). not networks 1.1 signed Figure in in links negative shown of as networks) signed (or links with and negative networks blocked and as positive represented Epinions), both be can (e.g., relations These distrust Twitter). Slashdot), and Facebook (e.g., (e.g., users foes unfriended as such also but links Epinions), negative as (e.g., establish such trust links can and Twitter), positive (e.g., have followers only Slashdot), not and users Facebook media (e.g., friends social be can instance, relations For systems, negative. real-world many and in positive However, both only 1.1(a). with Figure networks in (or shown networks as unsigned links) on positive focused solely has analysis network existing Most iue11 iulzto fa nindadsge network. signed and unsigned an of visualization A 1.1: Figure a nindnetwork Unsigned (a) INTRODUCTION HPE 1 CHAPTER 1 b indnetwork Signed (b)

1 htms eovercome: be must that Challenges Research 1.1 applying and mining, modeling, novel networks. measuring, propose signed I with particular, associated challenges In the directions. tackle primary to four frameworks the of each on focusing analysis) network hl nlzn n aigpeitosi indntok,w r ae ihsvrlchallenges several with faced are we networks, signed in predictions making and analyzing While signed (i.e., links negative with analysis network investigate I dissertation, this in Therefore, • • esn rmte“aos sr h r oua o oiiereasons. positive for popular are who negative users for “famous” important the are from who reasons specific users “infamous” the the from pose differ relations now others. of to on needing polarities of opinions the challenge differing centrality, node no signed having a but defining common, for in Similarly, two friend of single situation the a and only them), distrusts having other users the while users parties other third many the on trusts disagreeing user one also situations (e.g., while between friends balancing common requires many having also users This two way. as negative such or positive also but a (i.e., relationship, in network their is of signed it strength whether a the consider in only are not must nodes we relevance) two node related signed how More define introduced. to being seeking polarity when of specifically, challenge the have we networks, signed measuring For signed to accordance theories. in specific built network methods analysis network efforts signed dedicated constructing needing of to ways leads new this for Thus, networks. signed has to work apply recent not but of might theories, they many shown network classical Furthermore, with built networks. are signed methods network of unsigned set the show representative empirically a which on links, differences negative many and their analyze positive to both investigation for initial an properties perform network we multiple 2 Chapter from deviate In networks signed networks. of unsigned theories traditional and properties the that is challenge major first The 2

2 ik scmae opstv ik n oad mrvn ewr nlsswt eaielnsby links negative with analysis network improving towards and links positive to compared as links h he betv fti israini ofis nlz h itntpoete fnegative of properties distinct the analyze first to is dissertation this of objective chief The • • npstv ik) utemr,testainbcmsee oecmlxtefrhrthe further node. the focal complex the more from even is distance becomes aggregation situation does the it (as Furthermore, links negative links). on positive apply on not positive also a may both homophily from while context perspective, the negative differentiate and to sufficient not is walker since random networks, traditional signed for a suffice nodes not will surrounding this However, from homophily. features the of aggregating assumption in the of local under nodes use the make sampled of also randomly many context to addition, a In relation up network. in build to loss walks contrastive random utilizes on and based neighborhood are challenge methods first The many labels. that missing is those for here type node the classifying or missing network predicting the such in tasks, links analysis provide network to of range shown wide have a networks in improvements neural significant graph and methods embedding network Recently beyond triangles. structures signed subgraph network useful bipartite other in investigating triangles require no thus inherently which are there networks, but triangles, of primarily form works the prior in to theory new balance due networks using is This bipartite theory. for networks. social bipartite theory signed network balance for introduced signed social are the same challenges the to harness adhere to to seeking form when certain Then, a with of conflict signed be these will to to this due requiring links triangles triangles unbalanced negative to to balanced positive of distribution of correct ratio the if maintaining correct network signed the synthetic maintain a to generating seek while we specifically, More finesse. require networks of signed level clustering, local similar of level the and distribution degree correct a as such properties network modeling maintaining generative networks of unsigned generation the as allow just to strategies Hence, elegant requires knowledge. our of best the to before been explored never has domain this that is challenge major the modeling network generative signed For 3

3 . Contributions 1.2 summarized is research dissertation my 1.2. of Figure overview in An domain. analysis network the the advancing of for frontier opportunities unprecedented provide also they challenges, links numerous negative of introduces existence the extending although that simply and that sufficient discover not typically We holistic is analysis a network links. unsigned in negative established and been positive have both that containing networks theories of social view harness to how and utility the researching h otiuin fti israincnb umrzda follows: as summarized be can dissertation this of contributions The • • • • pligsge networks signed Applying (i.e., tasks link-oriented representative two on of performance prediction node idea state-of-the-art learn achieve novel can to that able representations the are both introduce which embedding, and network signed network based convolutional transformation network graph signed first the Construct in theory (i.e., balance networks extend/analyze bipartite and signed model network signed generative first the Presenting (i.e., centrality and relevance node measuring for networks signed in methods advanced develop We iue12 noeve ftersac otiuin rsne nti dissertation. this in presented contributions research the of overview An 1.2: Figure indntokmeasuring network signed indntokmining network signed ycetn rmwr htcnifrbt ikadinteraction and link both infer can that framework a creating by indntokmodeling network signed ); 4 ); );

4 ltom.Fnly hpe ocue h israinadpeet rmsn uueresearch future promising presents and dissertation directions. the concludes online 7 in users Chapter between Finally, links indirect and platforms. direct of polarity alleviate the predicting help of to problem method cold-start a the developing also while interdisciplinary votes, important congressional future to predicting techniques in analysis research network 6 signed Chapter applying on embeddings. convolutional work based graph our transformation network presents signed of first idea the novel developing the by introducing performed and is network This unknown the links. and existing links of signed solve missing polarity to predicting as used such be tasks, can mining that network representations signed level traditional node mining of on development work the our presents through 5 networks Chapter signed substructures. through butterfly balance signed structural defined novel harnessing our by graphs bipartite signed in predictions models making introduce for furthermore and networks signed introduce for we model 4, network generative Chapter in proposed Then, first the theories. social signed to measure accordance in centrality developed signed are a all which and of measures relevance node network Chapter signed In multiple introduce analysis. we network in 3, used theories social and definitions, basic including preliminaries, Organization 1.3 h eane fti israini raie sflos nCatr2 eitouethe introduce we 2, Chapter In follows. as organized is dissertation this of remainder The inlvt rdcinfaeokbitaon ansigsge networks. signed harnessing around built framework prediction congres- vote comprehensive sional advanced an constructing and media, social online in levels polarity 5

5 rniiiy n lseigcecet hc edfiehr.Adtoal,w nrdc h social the introduce we reciprocity, Additionally, distribution, here. degree define we the which as coefficient, clustering such and studied, transitivity, universally quite are that properties known Theories and Properties Network Unsigned 2.2 that note furthermore We matrix. adjacency symmetric a have will network then link undirected signed when their links, with signed directed associated the directions unlike no Therefore, are links. there that such network signed undirected an define from link negative a from link positive a represent matrices adjacency the in represent links, can negative we only with which other the and links positive only containing one networks, two into network to link negative a matrix, adjacency an in oiielinks positive network signed A Definitions and Notations Basic 2.1 later the in networks signed chapters. applying and mining, networks modeling, and measuring, our introducing for links, later methodologies for novel negative groundwork the provides only This networks), links. networks negative unsigned and for positive both theories (i.e., containing social links and positive definitions only network of basic consisting introduce briefly we section, this In nntok ossigo nypstv ik ie,usge networks, unsigned (i.e., links positive only of consisting networks In E + n e fngtv links negative of set a and G D 9 and , A scmoe fastof set a of composed is D 8 9 8 A to = ONAIN N PRELIMINARIES AND FOUNDATIONS ∈ 0 D A 9 R when D 9 8 with # 8 × to = # D 1 where , D A 9 8 (or 9 8 − with a oln to link no has = A HPE 2 CHAPTER 9 8 1 A A E 9 8 + and = 9 8 # − = erpeetdrce indlnsbtenusers between links signed directed represent We . A = oe ie,users) (i.e., nodes 6 1 9 8 A 1 A and 9 8 − + if = D ∈ = D − 9 A D 8 utemr,w a eaaeasigned a separate can we Furthermore, . R 1 0 8 a oiieln to link positive a has 9 8 + .I te od,a nietdsigned undirected an words, other In ). # and tews.Nt htw a similarly can we that Note otherwise. × = # 0 D and tews.Smlry erepresent we Similarly, otherwise. 9 aeapstv o eaielink) negative (or positive a have U A − = ∈ { D R A 1 # + D , A hr r e well few a are there ) × 2 # = D D , . . . , epciey We respectively. , 9 A , − + 1 − if # A } D − e of set a , 8 . creates

6 edfie sfollows: as defined be etn.Tu,tedniyof density the Thus, setting. hr eassume we where node a connecting edges (i.e., has loops it self itself) to no assuming and edges network of fully-connected number a maximum as the having denoted network is unsigned an for that note We network. that in edges links their by defined is (which network unsigned given [11]. networks “scale-free” degree power-law called with commonly networks are the and distributions nodes degrees, large and have most nodes in- few – a distributions both while power-law degrees for small follow a that networks have unsigned is in observed links have positive many of what out-degrees Essentially [10] networks). in real-world specifically citation many (more studied that power-law a observing they follow [10], that as distributions such by degree works, friend have later a networks as to (unsigned) selected led been This had that students. children few other a many were very there students, friend other a the friendship as of selected a few were studied children a many They only while by that [9]. the noticed in and of school done One a was in network children insight. among a network great of provide distribution degree can the degrees of node analyses of first distribution the observing network, a In Density Network and Distribution Degree 2.2.1 [8]. homophily of theory network density. (i.e., ncmaio,tentokdniyi h rpryta oprsteseiccnetvt fa of connectivity specific the compares that property the is density network the comparison, In A d + D ssmercli h nietdstig o h epciedfiiin fusge network unsigned of definitions respective the for setting) undirected the in symmetrical is = |E # 2 +  | # 2 =  E = # + 2 1 ( 2 and # # |E ( − + # A | 1 + − d ) D r prpitl osrce nteudrce n ietdsettings directed and undirected the in constructed appropriately are 1 = ) and de nteudrce etn and setting undirected the in edges # || ( A d # 3 + − || nteudrce n ietdusge ewr etn can setting network unsigned directed and undirected the in + 1 ) 7 d 3 = 2 |E E+ # 2 + oatemxmmnme fpossible of number maximum the a to )  | = # ( |E # # + − ( | # 1 ) − = 1 ) # de ntedirected the in edges || ( A # + − || + 1 ) (2.1)

7 D n[8)i hntefato fwde htaecoe notinls oefral,w en the define we formally, More triangles. into closed are that wedges of fraction the then is [18]) in have of wedges the observe first We follows. as transitivity users partial the network. of entire level the the for measure true be can to we Thus, going connected. Thus, not fully is friend”. are this components networks a networks unsigned is real-world the most of friend in each However, friend’s if “a transitivity perfect as has explained only be network the can transitivity network unsigned an In Coefficient Clustering and Transitivity 2.2.3 between where follows: as reciprocated are that links positive of reciprocity define formally [16]. more appeared can reciprocity of We measurement first the believed is it where [15] in was it networks, social media social the on back. someone you follow follow you also they if and be Twitter would site link reciprocal a of example An self-loops). and from formation the in users role of pair important a specifically, given an More networks. play directed on and defined uniquely ties is Reciprocity social [13]. networks stable of evolution create usually to are basis networks and unsigned the (two-way) in as reciprocal nodes treated among into links categorized Reciprocal generally [12]. be links (one-way) can parasocial networks social directed in Links Reciprocity Network 2.2.2 8 red with friends hl ok uha 1]hv xmndrltosisbteni-ere n u-ere of out-degrees and in-degrees between relationships examined have [14] as such works While D D 8 Tr 9 red with friends akto back D (·) D 8 8 and , stetaeo arx oethat Note matrix. a of trace the is D : D and , D D : 9 8 and , and oeta hsi h hretlo nasml ietdntok(suigno (assuming network directed simple a in loop shortest the is this that Note . D ( D D 9 8 9 D ie,frsatinl) h lseigcecet(hc a rtmeasured first was (which coefficient clustering The triangle). a forms (i.e., D , hc r ah flnt w,sc stewdecnitn fteedges the of consisting wedge the as such two, length of paths are which , A : 9 8 + 9 A red with friends ) A edfiea edge an define we , = + 98 |E = 1 + 0 | otherwise. Õ 8 = # 1 D 9 Õ = 9 A # ete osdrti pcfi eg lsdi ealso we if closed wedge specific this consider then We . 8 + 1]fra ietdusge ewr stepercentage the as network unsigned directed an for [17] 1 A 9 8 + D A 8 8 A 9 8 + to + 98 A D + = 98 9 = en eirctdi hr loeit link a exists also there if reciprocated being |E 1 1 + | fadol fteei eircllink reciprocal a is there if only and if Tr  ( A + ) 2  (2.2)

8 oiltere hthl xli h icvrddffrne,hl oiaetene o dedicated for need the motivate network help signed differences, discovered introduce the and explain links help negative that on theories properties unsigned of set same the for containing networks for developed links. negative been and have positive that both theories Furthermore, social major setting. two network the signed introduce the will in we further them discuss and investigate will here works, Theories and Properties, Datasets, Network Signed 2.3 case the links. necessarily negative not for apply is will it However, same themselves. the neighborhood represent that structural better to local friends) their of from set user’s features a node/user (e.g., aggregate latter the can specifically, they More fact data. this structured graph utilizes to networks neural deep the of explaining which generalization [22], as a networks are such neural graph areas, developed network recently the social in numerous and [21] in networks of used evolution/growth with been friends has become to theory likely This more are other. similar each are who users and that networks phenomenon social to the applied explain been to has featherused it a [20], sociology of in “birds roots proverb from the Coming with [8]. together” summarized flock be can homophily network social unsigned an In Homophily Network 2.2.4 higher networks. a social having in and important transitivity and that common evidence both shown is have coefficient [19]) clustering a in Furthermore, starting (first graphs. work random prior of to lot compared as networks coefficients unsigned real-world clustering many that higher Note relatively matrix. observe a of elements all of summation the denote to where coefficient clustering is eitoueafwrpeettv indntokdtst.Te,w rsn nanalysis an present we Then, datasets. network signed representative few a introduce we First net- unsigned governing theory social and properties network basic the defined having Now, ◦ eoe h aaadpout(.. lmn-iepout ftomtie n euse we and matrices two of product) element-wise (i.e., product Hadamard the denotes 2 2 = na nindntokas: network unsigned an in ttlnme fcoe wedges) closed of number (total ttlnme fwedges) of number (total 9 = || A ||( + ( ◦ A + A ) 2 + || ) + 2 || + ||·|| (2.3) +

9 oiie(rngtv)tesrnt.Nt htngtv ik nbt estsaevsbet h public. the to visible are websites the both in indicate links to negative signed [-10,-1]) that the Note (or to [1,10] strength. tie range addition negative) the (or In positive in scores good). of specify can monetary end websites other their both some deliver in of users never networks, delivery but the bitcoins, usually them is send which user deal, Bitcoin another the users’ have users to behind fake (e.g., attempting anonymity scammers just the against prevent are to to who networks Due trust form websites things. these sell of market and users open account, buy are sites to Bitcoin users two allow The that [23]. in websites collected been previously had data this of versions websites respective their from data available publicly about details more describe we datasets. Below these 4.2. Table in collected, demonstrated have are datasets we network datasets signed four network signed four study we Bitcoin-Alpha namely dissertation this of majority the For Datasets Network Signed 2.3.1 chapters. later presented the methodologies novel in our building towards guidance and efforts, analysis network signed 5 4 3 2 1 h lsdtdtstwsotie rm[4.Saho oue npoiigtcnlg news technology providing on focuses Slashdot [24]. from obtained was dataset Slashdot The from collected we that networks signed are networks Bitcoin-OTC and Bitcoin-Alpha The h ici-lh n ici-T aawsehutvl rwe nDcme 18 December on crawled exhaustively was data Bitcoin-OTC and Bitcoin-Alpha The http://www.epinions.com http://www.slashdot.org https://www.bitcoin-otc.com http://www.btcalpha.com Bitcoin-Alpha Bitcoin-OTC Epinions Network Slashdot 1 al .:Saitc ffu indsca networks. social signed four of Statistics 2.1: Table Bitcoin-OTC , sr ( Users # 131,828 79,116 5,901 3,784 # ) 2 Slashdot , oiieEgs( Edges Positive # 717,667 392,179 10 32,271 22,651 3 n Epinions and 5 ent htsalradls comprehensive less and smaller that note We . |E + | ) 4 eaieEgs( Edges Negative # oebscsaitc fthese of statistics basic Some . 123,705 123,218 3,438 1,556 |E − th | ) f2016. of

10 hnmn nsge ewrs[]adsau hoyi nte nunilsca hoyi signed in theory social influential another is theory status and [4] social networks explain to signed helpful in is theory phenomena balance that suggested studies previous as addition, In 4.2). Table links negative only of consisting networks the both (i.e., we on specifically, properties More these of setting. study network initial signed an the perform in further them discuss networks, and unsigned investigate governing we theory here social and properties network basic the defined having Now, Properties Networks Signed on Analysis Data 2.3.2 research available. publicly for are staff ratings Epinions helpfulness from the However, obtained dataset. were this but in links public, negative purposes the that to note We invisible totally [2]. are from Epinions only version we in network signed otherwise basic but used [27]), commonly from more in (obtained the Later ratings use helpfulness users. these between review utilize made will links the 27], we distrust found 26, 6.1 and user 2, Section trust [25, the created explicitly dataset denoting the this score use of only versions higher primarily multiple a we numerous (with been have 6 there to While 1 helpful). of more scale “helpfulness” a the rate on then reviews can those users of Furthermore, reviews categories. write pre-defined can certain users from addition, In items for links. negative) (i.e., distrust and positive) (i.e., trust establish site). available, the publicly to member not a are as relations up negative to signing (i.e., require visible system but only the are into Slashdot logged in currently links are negative who that (i.e., users foes Note or feature). links) “Zoo” positive (i.e., their friends (i.e., their links) as negative has users website other the mark where explicitly 2002 to in (e.g., users established allowed sentiment was since feature only unique positive this traditional detail, more more In the feature). flag to friends to addition users in allowing sentiment to component novel negative addition a In with added others stories. it published connections, these social on allowing comment website to an allowed being are by submitted users or other editors then either and by users written the are stories technology the specifically, More 1997. since nadto,w aecletdadtstfo h rdc eiwst pnosweeuescan users where Epinions site review product the from dataset a collected have we addition, In A − n lopstv ik (i.e., links positive also and ) A + rmfu elwrdsge ewrs(ssonin shown (as networks signed real-world four from ) 11

11 n iia rprys a nrgrst aigapwrlwdge distribution. degree power-law least a at having have to regards empirically in indeed a far links so having negative property and when similar positive one plots that distribution see can the we in Hence, relationship scale. linear log-log a observing conclusion by this approximated that Note be large links. can negative a few give give only nodes nodes many few all while a links; in negative instance, links of For number negative and distributions. power-law positive follow of also distributions networks degree From signed the four 2.1. that Figure observed in clearly demonstrated is are it networks figure, signed degrees the four undirected our the in of links negative distributions and The positive for links. negative and positive both for out-degrees and (i.e., network social signed these of both from insights some theories. discuss and define also we [2], networks ereDistributions: Degree E + n eaie(i.e., negative and a Bitcoin-Alpha (a) iue21 eredsrbtosi indsca networks. social signed in distributions Degree 2.1: Figure c Epinions (c) E ee eaayeteudrce eredsrbtosfrtepositive the for distributions degree undirected the analyze we Here, − ik.Frec sr ecluaeadcmietenmeso in- of numbers the combine and calculate we user, each For links. ) 12 b Bitcoin-BTC (b) d Slashdot (d)

12 D nBtonApaadOCecag iciswt tes hl sr hr recnet(esor (news content free share users while others; with Users bitcoins exchange Epinions. OTC and and Slashdot Alpha in Bitcoin that in than higher much positive is reciprocal Bitcoin-OTC of and percent Bitcoin-Alpha the in public, the links to that visible always notice are we links Next, positive networks. websites, four social all signed four in all in links negative reciprocal of that than higher 2.2. to Table link) negative a (or link positive a has also is (2.1)) Eq. with in (2.1) defined Eq. of redefining (i.e., (i.e., links links negative positive the the of of that than density larger the significantly words, other In links. positive than indntok n on htaogfu ye frcpoa ik,teeaefew are there and links, reciprocal of types four among that found and networks signed from behaviors global different having are links links. negative positive that notice variant). to link negative start its already and can (2.1 we Eq. in Thus, denominator same the (i.e., users of number same the have ( ( D D 8 8 8 − E rmtetbe efis aeteosrainta h ecn frcpoa oiielnsi much is links positive reciprocal of percent the that observation the make first we table, the From Density: Network eirclLinks: Reciprocal − + ( + D D D D 9 and 8 eoe htteei oiieln o eaieln)from link) negative a (or link positive a is there that denotes ) 9 9 − D , D , D A 9 9 9 al .:Poaiiyo ik en eircli indsca networks. social signed in reciprocal being links of Probability 2.2: Table D , + + − ,wihi biu rmtefc htbt h oiieadngtv ikdnetworks linked negative and positive the both that fact the from obvious is which ), D D 9 8 8 + ) ) , ecluaeif calculate We . D ( 8 D ) 8 hrfr,oraayi nrcpoa ik oue on focuses links reciprocal on analysis our Therefore, . + rmTbe42w a aiyosreta h eaielnsaesparser are links negative the that observe easily can we 4.2 Table From Bitcoin-Alpha D o aro users of pair a For Bitcoin-OTC 9 D , Epinions Slashdot Datasets 9 − D 8 D ) , 8 ( a oiieln o eaieln)to link) negative a (or link positive a has D 8 oiieLinks Positive − D 34.8% 30.7% 83.8% 85.4% D 9 ( D , 8 D h eut nfu indntok r hw in shown are networks signed four on results The . 13 8 D , 9 − 9 ) D hr r ortpso eircllns– links reciprocal of types four are there , 8 ) and eaieLinks Negative ( D 17.8% 18.0% 3.8% 7.4% 8 − D D 9 D , 8 to 9 D + 9 D ecekdorfour our checked We . ( 8 D ) where , 8 E D + − ( 9 D D o likely how , and 8 9 D , + D D A 9 9 8 + − D , + D instead D 9 8 ) − 9 and D (or D 8 ) 9

13 ik,(i eircllnswt h aesg,ad(i)rcpoa ik ihopsn in.For signs. opposing with links reciprocal (iii) and sign, same non-reciprocal the (i) with between: links magnitude reciprocal strength (ii) tie of links, ranking the negative notice a having also when can users We other successful of experience. done judgement have their they in aggressive others very of are judgement but their with, in transactions of conservative are magnitude interpretation users the One that that datasets. be both could is in this links observation of positive first of that The than higher significantly 2.3. is Table negative links negative and in positive reported average the are calculated which first strengths, we specifically, link More comes it ties. when the negative of strength and the positive to between differences/similarities any are there if investigate [28]. relations negative reciprocal negative more consequently while that to revenges lead links; cause could may negative links see negative Exposing can Epinions. Slashdot in the totally private totally to are are login links links who negative users OTC, only have and public; websites Alpha the Four Bitcoin to In visible Epinions. links. in of negative that percent to than controls the higher access where much different Slashdot, links is negative in Slashdot reciprocal that in links of than negative higher percent reciprocal much the is that Epinions Bitcoin-OTC note and and we Slashdot Bitcoin-Alpha Finally, in in users content. than free worlds online much online need consume the users in to OTC trading and bitcoin Alpha for Bitcoin ties Thus, social stronger Epinions. and Slashdot in others with reviews) eaieReciprocal Negative oiieReciprocal Positive utemr,sneteBtonApaadBtonOCaewihe indntok,w also we networks, signed weighted are Bitcoin-OTC and Bitcoin-Alpha the since Furthermore, Non-reciprocal i Strengths Tie vrl Link Overall i Strengths Tie i Strengths Tie Strengths Tie al .:Tesrntso oiieadngtv ik nsge oilnetworks. social signed in links negative and positive of strengths Tie 2.3: Table ( ( u u ( ( u u i i i i − − Negative Negative Positive Positive u u u u j j j j D , D , D , D , 9 9 9 9 − + − + D D D D 8 8 ) ) 8 8 ) ) v.Strength Avg. 14 -6.291 -7.079 -6.120 -6.319 2.611 1.955 2.225 1.998 Bitcoin-Alpha Links # 19,350 22,651 1,029 3,054 1,556 247 280 247 v.Strength Avg. -6.875 -7.920 -7.540 -7.538 2.571 1.915 2.215 1.968 Bitcoin-OTC Links # 27,044 32,271 2,467 4,868 3,438 359 612 359

14 hypromdacutrn ftesge ewr n hnaaye h ubro otv links postive of number the analyzed where then [34] and in network the as signed such calculate the developed, to of then used clustering were a were methods performed cycles Later they unbalanced network. to signed balanced a of of balance ratio of the level that [33] and [32] in was be balanced. should completely subsets are two that networks the signed of real-world have each to in rare endpoint is an within it However, having links negative. all links that the such while subsets positive, exclusive are mutually and subsets two if into balanced the is partitioned network be signed can a nodes that an the [31] contain if in network proved only the been in had cycles It the links. all negative if of only A number and even if perspective. network balanced being a as with level defined later group is Then, network the friend". signed at my introduced is was enemy my theory of balance enemy structural “the [30] and in friend" notion my general is the friend with my level of individual friend the “the at developed that first was theory balance that [29] in was It Networks Signed in Theory Balance signed 2.3.3.1 dedicated for need the discussed. previously motivate properties help network in theories, then differences network will the beyond signed This efforts influential analysis network most status. two and the balance of introduce that and namely define will we section, this In Theories Network Signed 2.3.3 networks. signed it in when strengths links tie negative the and to positive comes for commonalities than unintuitive. differences somehow more is are which there link, is summary, negative In magnitude a by largest reciprocated the are links, that links positive positive for from However, coming link negative reciprocal a each towards creating sentiment negative by a expressed other have strongest both the users two that the interested where is those It are (iii). links negative by followed (i) In have we have Bitcoin-OTC we (ii). and Bitcoin-Alpha for and (i) then by (i) followed but largest, (iii) by the followed is (iii), (ii) datasets is both in magnitude links largest negative for the comparison, have we datasets both in links positive hr aebe utpemtost esr h ee fblnei indntok It network. signed a in balance of level the measure to methods multiple been have There 15

15 olwn h icsin n[] oeseicly norseicmpigfo ietdt undi- to directed a from mapping specific our in specifically, More networks [4]. signed in directed discussions to the it following applying when directions link the ignore to preprocessing basic some 2.2. Figure in combinations triangle signed four these visualize We balanced. (a) combinations: users three of triad a [4], 3-cycles) (or triads between adopt first link we negative) users networks two signed between our sign in link balance the of level denote the analyzing to regards In matrix). taking efficient computationally less is enemy. of an friend to a compared that as consideration friend into a takes be only should thus friend and of enemy, a enemy my the or a whether friend is my concern friend” either not my is does enemy is balance my enemy structral my weak words, of other enemy which In “the came, that relation. balance balanced structural assumption weak It the of ignores notion taken. clustering the was the where approach on [34] theory based in spectral was it signed that a noted [37] be defined in also similarly addition, should methods In other to 36]. led [35, This clusterings using clusters. within links negative and clusters between B 8: oeta aac hoyi nyapial oudrce indntok n hsw perform we thus and network, signed undirected to applicable only is theory balance that Note it though (even triangles of ratio the on based definition the use to common still is it However, = 1 or ; B 9 8 iue22 iulzn aac hoyi h omo indtriangles. signed of form the in theory balance Visualizing 2.2: Figure = 1 (+ and , + B , D : 9 +) 8 and (b) ; = − 1 D (+ then , 9 speiul ehd,adgvnta yial efcson focus we typically that given and methods, previously As . , − , −) B $ 8: (c) ; D ( 8 = # and − 3 (+ ) ( 1 D hrfr,fratid hr r orpsil sign possible four are there triad, a for Therefore, . hnuiiigmti prtoso h adjacency the on operations matrix utilizing when , D 16 8 + D , 9 , where −) 9 D , n (d) and ; : ) sblne if balanced is B 9 8 = (− 1 , (or − , −) B 9 8 hl ny()ad()are (b) and (a) only while , B 8: = − = 1 1 ftepstv (or positive the if ) and B : 9 = 1 then , B 9 8 to

16 D tahrst ttster.Freape fw aetecci indtinl ossigo the of consisting triangle signed cyclic the have we if links then example, positive acyclic, three For is triangle theory. the status if 2) to and adheres direction; it their reverse and positive to links negative flip first acyclic. take are 8 can and triangles cyclic signed are directed 4 that where note forms, We different 12 relations. directed the consistency of of concept deductions the logical on the based is in theory status perspective, triangle a from Thus, network. the signed directed in perhaps perspective from that considers link separate positive a a assuming takes than theory Rather status networks. links), disliking negative or Unlike liking or users [2]. positive on based in network (i.e., developed signed later undirected was an in theory defined status is [3] which theory, in balance found observations the of some on Based Networks Signed in Theory Status 2.3.3.2 [28]. time over increases triangles unbalance to balance of ratio the and networks that signed shown in been balance also of has level it the measuring works prior with line in is This respectively. that find and combinations sign four the 94 of each count we network signed rected hm(i.e., them that that imply respectively h hr ikwith link third the osau hoyqiesmlrt aac hoy[] tcnb acltdta hnconverting when that between calculated agree be 6 only can that triangles It network signed undirected [2]. to triangles theory network balance signed directed to similar quite adhering triangles theory all) status almost (and to majority the have networks signed real-world many that shown 8 . to 5% eemnn fatinl deet ttster a edn ytefloigtreses 1) steps: three following the by done be can theory status to adhere triangle a if Determining D D 9 9 and a ihrsau hnte (i.e., them than status higher a has ih o ml that imply not might D 92 8 > . 4% D 9 .Hwvr ete rmtefis w ik ehv that have we links two first the from then we However, ). D ftid nBtonApa ici-T,Saho n pnosaebalanced, are Epinions and Slashdot Bitcoin-OTC, Bitcoin-Alpha, in triads of D 9 8 hnigthat thinking −→ + D D 8 8 nta hnsthat thinks instead D eivsthat believes : , D D 8 : dislikes −→ + D D 8 9 D > and , D D : 9 u perhaps but , D 9 a ihrsau hnte (i.e., them then status higher a has 9 rae otaito.W oeta ro ok have works prior that note We contradiction. a creates D D > 9 9 D −→ a ihrsau.Smlry eaieln from link negative a Similarly, status. higher a has 17 + : ,and ), D 8 hnbsdo ttster hs he links three these theory status on based then , D D 8 D 8 to utblee that believes just 9 eivsthat believes D 9 mle that implies D 8 D a ihrsau than status higher a has D D 9 8 D so oe ttsin status lower a of is 9 8 D < safin of friend a is < D : 92 : D < ), . 0% D 9 : u then but , , believes 91 D . 5% 8 it , ,

17 lgswt rage()fo iue22adtu dee oblnetheory. but balance theory, to adheres status thus to and adhere 2.2 not Figure prior from does our (a) links example, triangle positive For with three aligns of disagreement. in triangle are signed cyclic 6 the other of the example while status and balance of theories the 18

18 ewr.Ms ftepeiu okhsbe o nindntok.Det h nlso of inclusion the to Due networks. signed to networks. applicable directly unsigned the not are for in measures are been centrality unsigned they has existing “important” links, work negative or previous “central” the how on of based Most nodes of network. general, ranking In a [49]. construct applications to of urban is plethora and task a [46], the has biology later the [45], which economics sociology, as to such 48] domains, [47, many infrastructure across 49] 48, 47, 46, [45, tions theory. balance to relationship their discuss and proposed networks our signed present we for 3.1, measures Section relevance in node Thus, [44]. Restart with Walk of Random information as such structural network whole the the utilize measurements global information while neighborhood neighbors; local common use as only such measurements local – used measurements information global the and local to into according divided positive be can only measurements these with that networks note We social 43]. relevance (or [11, links) node networks existing unsigned of for majority designed vast been have The measurements [42]. recommendations and search community [40], [41], classification detection node 39], [38, prediction network link social as diverse such in applications usage and their tasks by analysis shown been has This analysis. network social of keystones to networks. entire used or be communities), (i.e., can subgroups that users, of network formula pairs define mathematical users, can rank we and/or and/or that compare algorithms metrics of these via use then the is It through measurements form. numerical in output be in to contained information network of a expression the allows that expression mathematical a is metric network chapter this In nieSge oilNtok. D 4hItrainlWrso nMnn n erigwith Learning and Mining 2018. on Workshop (MLG), International Graphs 14th KDD Networks.” Social Signed Online 1 oecnrlt safnaetlntokmaueetta a ies e fapplica- of set diverse a has that measurement network fundamental a is centrality Node the of one is network, social a in are nodes two relevant how measures which relevance, Node ye er hnigWn,Shn ag n iin ag RlvneMaueet in Measurements “Relevance Tang. Jiliang and Wang, Suhang Wang, Chenxing Derr, Tyler 1 eivsiaentokmaueet o ewrshvn eaielns A links. negative having networks for measurements network investigate we , ESRN EWRSWT EAIELINKS NEGATIVE WITH NETWORKS MEASURING HPE 3 CHAPTER 19

19 aac hoy[0,ta ol ehlfli ulignd eeac esrmnsi indsocial signed in measurements relevance networks. node building in helpful i.e., be networks, could that social [30], signed theory to balance related the theories stimulates social fundamental This most the [54]. of networks one for social investigation unsigned for measurements relevance node building in prediction. strength mining tie network signed signed and two prediction on sign measurements of these tasks of effects the are what relevance (b) signed to and in links measurements; aim negative and we positive both networks, of use unsigned make to in how (a) research in following: relevance relevance the investigate node node to measuring Analogous of problem networks. the social on signed study comprehensive and initial the perform Hence, we explored. relevance been not signed previously had on analysis network investigation signed systematic on effects and their and general measurements a However, 53]. [52, prediction similarities node link designing for in works recent relevance very few novel a develop are us There help networks. to signed for potential measurements the recommender offer improve could similarly links negative can Thereby, and 6]. 4], [5, [3, systems prediction link positive of performance significantly the can boost links negative of number small a even example, For tasks. analytical various in links Networks Signed in Measurements Relevance Node 3.1 balance and status the theories. namely links, negative and positive both having social networks triadic on prominent defined both theories upon built measurement centrality signed a develop we Thus, 3.2, Section networks. in signed in information network they higher-order exploiting 51], of 50, use into the [24, explored take measurements not have that centrality unsigned proposed existing measurements extending some a by links in been negative users have account “infamous” there and recently “famous” Though the between network. differentiate links negative signed to of need introduction now the we with because associated also complexities and added the to due partially is This aaAayi Discussions: Analysis Data positive over value added significant have links negative that research recent from evident is It oiltere uha oohl 8 lya motn role important an play [8] homophily as such theories Social 20

20 oteue nomto,w a ogl iiete olcladgoa esrmns Local measurements. global and local to them divide roughly can we information, used the to of neighbors of set where the 3.1 and Table degree in notations above the summarize We symmetrical. necessarily R unsigned to analogous section, this networks. In signed for measurements theory. relevance node balance develop we and networks, properties unique networks as signed such makes aspects links negative many of in availability the analysis, data preliminary our to novel building guide to this use can measurements. we relevance theory, signed balance satisfy networks social signed in of triads most the as Furthermore, measurements. relevance signed investigate dedi- systematically needs networks. to still efforts social it cated studied, unsigned extensively been from have distinct measurements relevance be node networks though Therefore, social signed makes which links, positive 9 8 aynd eeac esrmnshv enpooe o nindntok.According networks. unsigned for proposed been have measurements relevance node Many Definitions: and Notations According networks. unsigned in studied extensively been have measurements relevance Node from different are links negative of properties 2.3, Chapter in performed analysis the on Based ersnstend eeac rmuser from relevance node the represents al .:Nttosrgrignd eeac nsge networks. signed in relevance node regarding Notations 3.1: Table X R A A Notations 3 3 3 3 # # # | A 8 8 8 8 8= 8= 8= 9 8 8 8 8 + 8= + | − + ( ( ( ( A 3 # ( ( # 3 8 3 >DC − 8 − 8 8 >DC >DC 8 >DC ) ) ) ) + − ) ) h ij nr ftematrix the of entry (i,j) node the for neighbors (negative) positive of node Set for neighbors (outgoing) incoming of Set node for neighbors of node Set of links negative of (Outdegree) node Indegree of links positive of (Outdegree) Indegree node of (Outdegree) Indegree node of Degree matrix relevance Node matrix adjacency Absolute links positive(negative) only of matrix Adjacency matrix Adjacency Descriptions euse We D 8 na nindnetwork. unsigned an in R ∈ D 8 R ouser to 21 D # 8 × # odnt h eeac cr arx where matrix, score relevance the denote to D 9 oeta oerlvnevle r not are values relevance node that Note . D 8 X D 8 D 8 D D D 8 8 8 3 8 and # 8 denote

21 o odsg h indoeadfial ics t oncinwt indntokpoete and properties network signed with connection theory. its balance discuss finally detail and then one it, signed introduce the briefly design Preferential first to how will and we measurement, Index, unsigned each Jaccard For neighbors, 17]. local [56, common Attachment representative including on networks based measurements unsigned relevance for signed methods local build we subsection, this In Methods Local 3.1.1 measurements. relevance node unsigned representative to to strategy theory third the balance we apply subsections, and to following how links the detail will In negative ones. of unsigned advantage on take based measurements to relevance signed is develop strategy third Our networks signed applicable. for theory not balance makes also but links; positive and negative be between can differences into network a network Such signed matrix network. the the unsigned by in an represented links into network negative signed convert the to making be thus links, would positive strategy second positive of The impact the of [55]. over-estimation in links result could that links negative the ignores use completely only to is first The ones. signed global and local as measurements relevance signed group will methods. we work, this has In edge each where directions. an networks both for directed network simply directed are a networks requires undirected that since method network, any undirected use could we that undirected Note to networks. corresponding directed directed, and and undirected be Mean- can measurements Restart. relevance with node Walk Random while, as such information structural global whole while the neighbors; utilize common measurements as such information neighborhood local use only measurements ihnd eeac esrmnsfrusge ewrs hr r he taeist design to strategies three are there networks, unsigned for measurements relevance node With A ˜ where A A ˜ 9 8 + ntecluaino oerlvnesoe.Ti strategy This scores. relevance node of calculation the in = | A 9 8 22 | goigsgso ik o nyoelosthe overlooks only not links of signs Ignoring .

22 D ecnitrrtSNa ubro omnnihosof ( sign neighbors the common of of polarity number as SCN interpret can We follows: as SCN define we Therefore, links. where as: defined formally between is score which relevance neighbors, the common defines of UCN number intuition, this on Based relevant. be to (UCN) neighbors Common Unsigned Neighbors Common 3.1.1.1 egbr,i.e., neighbors, ( sign the on disagree they illa omr aacdtid.Ohrie hyhv oedsgemnso h in,i.e., signs, the on disagreements more have they Otherwise, triads. balanced more to lead will nindJcadIdx(UJI) Index Jaccard Unsigned Index Jaccard 3.1.1.2 with triads more force to aims SCN Therefore, triads. balanced more in eaie h C crsb h ubro nqenihostoueshv as: have users two neighbors UJI unique effect, of such number mitigate the To by scores scores. UCN relevance the high penalizes neighbors of numbers large with users give to (| 9 # u tinrstenme fuiu egbr hs w sr ae hrfr,UNi likely is UCN Therefore, have. users two these neighbors unique of number the ignores it but , 8 indCmo egbr (SCN) neighbors Common Signed C + neto oBlneTer:If Theory: Balance to onnection ∩ | G # | − 9 eoe h ieo h set the of size the denotes | + | # (| 8 − # R ∩ 8 + 9 8 # ∩ | # = + 9 # 8 + |) (| + 9 ∩ | > | + | # # # 8 + 8 (| + + 9 ∩ # # ∩ | + | C nycniestenme fcmo egbr of neighbors common of number the considers only UCN : 8 − 8 + # # ∩ ∩ + 9 − 9 # | + | G | + | # # 8 − . + − 9 9 ftondssaealto omnfins hyaelikely are they friends, common of lot a share nodes two If : ∩ # | + | |) # D R C antb ietyetne oicuenegative include to extended directly be cannot UCN : R 8 # − 8 8 − > 9 8 9 8 − and # 9 ∩ ∩ (| = | = 8 − n hnsbrcigtenme fnihosthat neighbors of number the subtracting then and ) # # # ∩ | | | 23 − 9 D # # # 8 + + 9 )−(| − |) # 9 | 8 8 8 ∩ ). ∪ ∩ ∩ − 9 ge ihtemjrt ftesgso their of signs the of majority the with agree # |) # # # − 9 then , # 9 9 9 | + | | | | 8 + ∩ # R # 8 − D 9 8 − 8 9 ∩ sngtv,wihwl loresult also will which negative, is | + | and # + 9 # |) D 8 − then , 9 D ∩ hr hyareo the on agree they where 8 and # + 9 R |) 9 8 D 9 spstv which positive is D ob balanced. be to 8 and D 9 D sthe as 8 (3.2) (3.1) and

23 *% ewrsflo oe-a itiuin.Terlvnesoefor score relevance The distributions. power-law follow both in networks degrees since separately, networks, negative and positive the from scores the relevance split calculate first We SPA. define to way a from us network paves which links, negative getting and rich positive “the both observe for we words, richer” other In distributions. power-law the follow links negative and [11]. users two the the Therefore, of degrees future. the multiply the to in is friends UPA new of create score relevance users to analysis, node likely network more social are of friends terms In many have richer. already gets that rich the that is realm, finance the from taken (UPA) Attachment Preferential Unsigned Attachment Preferential 3.1.1.3 as: neighbors unique of number total the eeac score relevance where indPeeeta tahet(SPA) Attachment Preferential Signed C hnw en P between SPA define we Then (SJI) Index Jaccard Signed 9 8 + neto oBlneTer:Smlrt C,SItrest oc oetid balanced. triads more force to targets SJI SCN, to Similar Theory: Balance to onnection B86= n iial ednt h eeac as relevance the denote we similarly and ( G ) A = *% oapstv network positive a to ,0 r- if -1 or 0, 1, 9 8 + slre hntengtv one negative the than larger is R 9 8 *% = B86= G iia ofo C oUI J sdfie sSNdvddby divided SCN as defined is SJI UJI, to UCN from to Similar : D R 9 8 + 8 slre,eulo mle than smaller or equal larger, is 9 8 ( and = *% D = 8 3 A 8 and + D | + # 9 8 9 + R × n omnyue nepeainbhn hsmethod, this behind interpretation used commonly One : n eaienetwork negative a and 8 + as: nteScin232 edmntaeta ohpositive both that demonstrate we 2.3.2, Section the In : 9 8 − 3 D ∪ + 9 9 = *% *% , # *% 24 have: 3 (# 8 − 8 × ∪ 9 8 − 9 8 − 3 ) # 9 8 5 *% 9 from + 9 9 8 − ( *% ∪ = # 9 8 − 3 A − 9 8 − h overall the , 9 8 + − | . × *% , *% 3 8 A − 9 0 and − nutvl,i h positive the if Intuitively, . 9 8 − 9 8 + hnw a s P to UPA use can we Then . ) and 9 R from 9 8 *% hudb positive; be should A 9 8 − + r computed are sdntdas denoted is (3.4) (3.3) (3.5)

24 *% xoeta ea ntewih soitdwt h on fptsa h eghicess[57]: increases length the as paths of count the with associated weight the on decay exponential (UK) Katz Unsigned Katz 3.1.2.1 theory. balance to them connect then and relevance ones signed unsigned global representative design on to based how measurements detail for we subsection, methods this In global relevance. the high of with users neighbors Most two that network. assume whole networks the unsigned through pass to information propagation the relevance for allow also of but neighborhoods, local the only not of use make methods global The Methods Global 3.1.2 higher have to degrees higher with users allow others. will with scores which relevance SPA, design we links, negative and find empirically we Actually richer". getting rich that the “ with contradicts which other, each cancel and set to is way strength relevance The otherwise, ogrptswl easge eswih hnsotrpts hscnb omltdrcrieyas recursively formulated be can This paths. shorter than weight less assigned be will paths longer where C D 5 9 8 − neto otesge ewr rpry codn otepwrlwdsrbtoso positive of distributions power-law the to According property: network signed the to onnection 9 ( | *% | paths aebt agrpstv n eaiedges oiieadngtv eeac crswill scores relevance negative and positive degrees, negative and positive larger both have . R 9 8 + ,9 8, ; 9 8 5 *% , ( | hudb eaie hrfr h inof sign the Therefore negative. be should *% stecuto ah flength of paths of count the is 9 8 − 9 8 + ) *% , hsmto usoe h olcino l ah from paths all of collection the over sums method This : | R = 9 8 max | st aggregate to is 9 8 − ) ( *% R = 9 8 | *% = 9 8 + Õ ; *% , ∞ = 1 9 8 + V − ; *% D | · *% 9 8 − 8 ; paths ) from 25 and ok etrthan better works 9 8 + 9 8 − and ,9 8, ; | D tmyntwr el o xml,when example, For well. work not may It . 8 9 | to *% = hudhv ihrlvnei hyhave they if relevance high have should R 9 Õ ; oeta esol have should we that Note . 9 8 ∞ = 1 9 8 − sdcddby decided is V ; i function a via A ; 5 ( *% 9 8 + B86= *% , 5 straightforward A . ( *% 8 9 8 − to ) 9 8 + < V 9 = n a an has and − | *% *% 1 othat so (3.6) 9 8 + 9 8 − D − ) 8 .

25 motneo h ogrpts u omlto n t eurnerlto o h aclto of calculation the for relation recurrence length its of and paths formulation Our paths. longer the on importance and relevance of number odd an unbalanced users than involving k-cycles contains ones balanced it more expect if we SK, unbalanced from and scores relevance edges With negative edges. negative of number even an contains it if as defined user is each and from term scores diagonal a is It “self-similarity”). (i.e., that Note length: varying of paths the of counting the handle to follows with ic aigapstv dei rval aiga vnnme fngtv ik napt flength of path initializing a for in reasoned links negative similarly set of and we number 1, even nodes), an two having the trivially is connecting edge edge positive direct a having a since (i.e., 1 length of paths counting When length of paths in links negative links. where indKt (SK): Katz Signed 9 ie,alteptsbetween paths the all (i.e., B 5 ( ; B and X R ; 9 8 , 9 8 U sue oesr hteeynd ntentokhsahg eeac othemselves to relevance high a has network the in node every that ensure to used is ob ihrpstv rngtv,sc hti piie vraltecce involving cycles the all over optimizes it that such negative, or positive either be to U ; ) ; ; safnto ocmietecut fptswt vnadodnme fnegative of number odd and even with paths of counts the combine to function a is aiga vno d ubro eaieegsi enda follows: as defined is edges negative of number odd or even an having r h arcsta odtenme fptswt nee n d ubrof number odd and even an with paths of number the hold that matrices the are 8 and D 8 aac hoysae htakccei indsca ewr sbalanced is network social signed a in k-cycle a that states theory Balance ae ntedegree the on based 9 oaheeti,w ol hrfr edt hoetesg ftenode the of sign the choose to need therefore would we this, achieve To . 8 ; and epciey etw ildsusteinrwrigo SK. of working inner the discuss will we Next respectively. , R U B 9 8 9 ; ; R .A oei K eas a iial lo h ea of decay the allow similarly can also we UK, in done As ). B = = = = 1 A 3 B B V = − Õ G ; ; ; = W easm that assume We . − − A Õ : 3 1 1 1 # = 8 + A A V . 26 1 , ; − + A 5 + 8: + ( U B U R U ; 1 , ; 9 : ; − − U = 1 1 ; + A A A ) X − − + 9 8 B X ; = − 1 I tnraie h relevance the normalizes It . and U ; − 1 ersn h paths the represent B 1 as (3.7) (3.8) A + 8

26 ftersligvlei oiie h oerlvnebetween relevance node the positive, is value since resulting links, the between of if sign number of even choice an optimal having the paths us give of will number this the from links negative of number odd paths an of number the count we if of Therefore, number between relevance. odd negative an a have having to when want Similarly, we edges, them. negative between relevance node positive a have should between paths of in ( path link positive one Adding nodes. of length of aacdtid o -yls,wieS uhsmr o any for more pushes SK while 3-cycles), (or triads balanced U Let Step: Inductive for holds theorem the Suppose Hypothesis: Inductive Let Basis: as: induction adjacency Proof. network signed the on (3.6) Eq in as Katz defined unsigned matrix applying to equivalent is (3.8) Eq in of rule update the to leads oiieln to link positive U hoe 1. Theorem ; : A = C + neto oBlneTer:S sbitbsdo aac hoy C n J ocsmore forces SJI and SCN theory. balance on based built is SK Theory: Balance to onnection B ) ;  opoeteterm eol edt hwthat: show to need only we theorem, the prove To U − 8 = 1 ; ; and − A ; ( − 1 − B = ilrsl napt flength of path a in result will hnw choose we When 1 : + 9 1 D aiga vnadodnme fngtv de,rsetvl,btenalpairs all between respectively, edges, negative of number odd and even an having − iha vno d ubro eaieegs hnw a utattenme with number the subtract can we then edges, negative of number odd or even an with ae nordfiiinof definition our on based , U 9 , 8 U A ; − − and . : ; 1 1 )( A = if + A : D 9 . + 8 + aea vnnme fngtv ik,acrigt aac hoy we theory, balance to according links, negative of number even an have rae eaieln to link negative a creates − 1 B hnorlf ieis size left our Then . A ; − = 5 ) ( B B = ; ; − A , 1 U : A A ; ( + ) A + oapt in path a to ) = ) + ; B = ( U iha vnnme fngtv ik.Ti intuition This links. negative of number even an with 1 B A ; and − ; : 27 1 − + A 1 U ( U − hc opee h proof. the completes which , D B 8 ; iial,w a banteudt ueof rule update the obtain can we Similarly, . 1 9 and ) : and , ehave we , ; + and B = 1 ; − 9 − : 0 smnindaoe oespecifically, More above. mentioned as 1 nohrwords, other In . A U ; B 8 crlst eblne.I h majority the If balanced. be to -circles when radn eaieln ( link negative a adding or : and ; ∈ + − 1 ( R B ) U 9 # 1 = D ; spstv,ohrienegative. otherwise positive, is × − 8  # = a oln to link no has U ( where , B A 1 : ) ; A euemathematical use We . = + ( ( + B A A U : + 9 8 : − − A D A U = − 9 − : indKatz signed , ( − ) 1 ) ) if = = A D B A A − 8 : : oa to ) a a has = A . − A  ; + .

27 ihblneter.T aeoraayi ntefloigcs,let case, following the in analysis our ease To theory. balance with the as value undefined to an edges to incoming lead all would over this summation Therefore, negative. are half other the while positive, node a that Assume works. 0. to close them maps it small, are weights the when and large, are weights edge into weights incoming the into all coming weights of edge the of each normalize now they that is adjustment The of neighbors is ASCOS of formulation The networks. weighted following: handle the to [58] ASCOS the of enrichment an is Networks Weighted for Measure Similarity Asymmetric 3.1.2.2 de.Tefruaini hw below: shown is formulation The edges. ` nindAymti iiaiyMauefrWihe ewrs(UASCOS++) Networks Weighted for Measure Similarity Asymmetric Unsigned = nte su si edrcl pl SO+,tersligrlvnesoecudcontradict could score relevance resulting the ASCOS++, apply directly we if is issue Another (SASCOS++) ASCOS++ Signed incoming the from relevance normalized of summation the as relevance node the defines It Let ( 1 − P 9 8 4 − =  8: 8 A 3 ) to 8 8= 9 8 If . n ecnrwietefruainas: formulation the rewrite can we and 9 h oictosfrACS+wr efre ohnl egt nthe on weights handle to performed were ASCOS++ for modifications The . A 8: R = 9 8 1 and = 8              a nee ubro noigegs hr afteegsare edges the half where edges, incoming of number even an has 1 2 ^ 8 R h term The . : sngtv,hence negative, is 9 8 ∈ Í # = 8 8= SO+ a iclist ietyaatt indnet- signed to adapt directly to difficulties has ASCOS++ : R 8            @ @ = 1 ∈ ∈ | Í # Í # # 2 2 A 8 8= 8 8= 8 P 8= 8: | ( > A A 1 : R 28 8@ ∈ 8@ − Í # ( + ( 8 4 szero. is 8= 1 − _ 1 − R  sngtv and negative is − 8: 9 : 4 − ) 2  ) astewihst ecoet when 1 to close be to weights the maps I 8: 8 8 ≠ = ) R 9 9 9 : 8 8 ^ ` ≠ = = spstv.Tu,if Thus, positive. is 9 9 @ ∈ Í # 8 8= 8 A ytesummation the by 8@ , hsmethod This : _ = A ^ 8: R (3.9) 9 : and is

28 hsw antdrcl pl RRt indntok.Teeoe esuysge admwalk random signed study we Therefore, networks. signed to URWR apply directly cannot we thus W matrix at transition a on based to move to of probability (URWR) Restart with Walk Random Unsigned Restart with Walk Random 3.1.2.3 triads. balanced more push will it words, other In theory. balance with aligning measurements C we below: networks, shown signed is SASCOS++ in links negative and positive of this numbers leave the negative of a imbalance seeing when the times) to three Due about (by link. similarity the in push stronger a providing is it Thus, signed with ASCOS++ using when that networks, note We SASCOS++. build to us motivates which theory, ( triad resulting when Similarity, theory. balance follow not terms does three these of product the then positive, also neto oBlneTer:I ses ovrf htSSO+ sal ohv h relevance the have to able is SASCOS++ that verify to easy is It Theory: Balance to onnection 8 9 8 u otefc sn SO+ ihsge ewrs ol neetydsge ihbalance with disagree inherently could networks, signed with ASCOS++ using fact the to Due indRno akwt etr (SRWR) Restart with Walk Random Signed ileda node at end will = 0 tews ie,n ikbetween link no (i.e., otherwise ` ` seult prxmtl .3ad-.2when -1.72 and 0.63 approximately to equal is ema s u aeacag otenraiain(i.e., normalization the to change a make but is, as term ( + 1 , − − , 2 + ) 9 sas o balanced. not also is ) .W en hstasto arxas matrix transition this define We ). ortr to return to R 9 8 R = =              2 1 2 WR : 8 ∈ Í # n ihprobability with and 8 8= ( + @ 1 W 8 ∈ Í # and − A 8 8= (where 2 8: ) | A 9 I .Wt h nuto,UW sfruae s[44]: as formulated is URWR intuition, the With ). 29 8@ = h rniinmatrix transition The : | admwle trigo node on starting walker random A : R ( ( R 1 1 W 9 : 9 8 − − 9 8 sngtv,tepouti oiieadthe and positive is product the negative, is sngtv n h eutn ra ( triad resulting the and negative is 2 4 stepoaiiyta h akrstarting walker the that probability the is )( − 2  A I hoe egbro h urn node current the of neighbor a chooses 8: W − 8: ) 9 8 2 R spstv rngtv,respectively. negative, or positive is W 9 : = > 3 1 ) 8 − 8 8 if 1 = ≠ 8 W ^ 9 9 and .Tefruainfor formulation The ). a ob non-negative, be to has 9 r once and connected are 8 hthsa has that + , (3.10) (3.11) + , − )

29 D D crsof scores Firstly, similarly. of score links. semantic signed the of capture can meanings thus and scores relevance negative with other each affect can links negative of estimation the in where of neighbors of number the for account to is of score relevance of portion the Intuitively eas red’finsaefins ntecnrr,if contrary, the R On friends. are friends friends’ because R of score of relevance the theory, balance on Based restart. with R (e.g., (1) that indicates This friend". my is egto h ikfrom link the of weight way, Let SRWR. build to way 8 9 8: 8: 9 8 oec fisniho ssal Thus, small. is neighbor its of each to D n h eeac crsfrom scores relevance the and ihteaayi bv,w r ed odsustedtiso RR efcso h relevance the on focus We SRWR. of details the discuss to ready are we above, analysis the With codn oaoeetoe intuitions, aforementioned to According 9 < > > D ¯ D to 0 88 0 : B86= 0 eas red’eeisaeeeis hc sipidfo teeeyo yenemy my of enemy “the from implied is which enemies, are enemies friends’ because ) hthv ik to links have that ) D (or D steotdge of degree out the is D (or 8 9 fteesaln from link a there’s if 9 9 , ( D A to 8 D = 9 : and 8 D and 8 1 ) ,9 =, , . . . , sukon while unknown; is sue oecd h mato h ino h ik.Wt inintroduced sign With links. the of sign the of impact the encode to used is D R : 9 8 R D r ieyt efins,i a ugs that suggest may it friends), be to likely are : 9 , 9 8 D h eeac cr a ebt oiieadngtv.Toueswith users Two negative. and positive both be can score relevance the , r ieyt efins,i a niaethat indicate may it friends), be to likely are 8 D ¯ = to D eadaoa arxwt t ignlelement diagonal its with matrix diagonal a be ≠ 1 D 9 D ,9 =, , . . . , n 2 h siainas eed ntesgso ik from links of signs the on depends also estimation the (2) and ; 8 8 : osdrn ohpstv n eaielns hs h normalized the Thus, links. negative and positive both considering w.r.t sgvnas given is D D : R 8 to 9 8 to D R D 8 D ∝ 88 D 9 ic h eeac crswrtohrndscnb derived be can nodes other w.r.t scores relevance the since 9 srlvnesoeto score relevance ’s ≠ : o xml,if example, For . siiilzdto initialized is Õ R hs nutossgetdb aac hoypv sa us pave theory balance by suggested intuitions These . : 8 W 9 8 r ntaie o0 hc en htterelevance the that means which 0, to initialized are , ¯ D D B86= : 8: a eetmtdas: estimated be can : R otiue to contributes If . = 30 8: ( A | D A D a eue oestimate to used be can ¯ ¯ 9 : 88 8: 88 ) slre then large, is | W ¯ 1 A 9 : because A 9 : R 9 : D R D 8: < 8 9 8 : > a eidctdb hs fnodes of these by indicated be can 0 w.r.t D hudb egtdby weighted be should 0 8 (or D (or and W 8 ¯ hudb oiieyrelevant positively be should D D 9 8 D 8 D D : : a eueu oifrthat infer to useful be can 8 ssaladteeet of effects the and small is 9 and and and r red (or friends are D ¯ 88 R D D D = 9 8 9 9 9 Í r nme)but enemies) are r red) and friends), are r nme (or enemies are with : | A 8: A W ¯ R | 9 : nthis In . 9 8 9 8 (3.12) This . D ≠ > : 0 to 0 ) .

30 D hoe 5] h eyDslnustermi ttda follows as stated is theorem Levy-Desplanques The [59]. theorem qaini ie as given is equation with form matrix in that noticing By from estimated score relevance the that sure is make Eq.(3.13) to is of term side second the right-hand and the neighborhood, of term first the where at arrives node a at arrives walker the time Each links. outgoing negative and from positive starting through walker neighborhood random a that considering Now itself. to akrkesmvn until moving keeps walker at arrives walker between scalar where together, Eq.(3.13) and Eq.(3.12) Combining ( I 9 twl update will it , − C 2 retes eew hwta RRi orc,i.e., correct, is SRWR that show we Here orrectness: S I ( ) ,9 8, − D 1 8 ) then , a epofduigtefloiglma hc skona Levy-Desplanques as known is which lemma, following the using proofed be can sabnr niao ucinwith function indicator binary a is 0 D B86= and R R 9 9 8 9 , 88 R ( 1 sudtdas updated is yterlvnesoe fndsta aelnsto links have that nodes of scores relevance the by A ≠ = hc sue ocnrltecnrbto ftetoprs fterandom the If parts. two the of contribution the control to used is which , 9 : 8 R 2 R , RS ) 9 8 R R R 9 8 W ¯ 88 9 8 ← os’ hne hc gives which change, doesn’t = ( + 9 : ← sudtdas updated is 2 2 R 1 = Õ 2 Õ 9 8 : − : Õ D A ¯ : ← 2 B86= R :: 9 : B86= ) B86= I = edefine we , 2 where ( Õ ( ( A : 1 A ( 9 : A − 9 : R B86= :8 ) 9 8 2 31 ) I W )( W ) I ¯ ¯ W ( sudtdas updated is steiett arx h ouint h above the to solution The matrix. identity the is ( ¯ ,9 8, I 9 : 9 : A − :8 S R 9 : R ) R 2 = 8: 8: = S ) 8: R W ) D ( + ¯ ¯ ( + 1 − 88 ( + − 9 : 1 if 1 1 > 1 A R 1 ( 8 − I − 0 8: D − = n hnE.31)cnb written be can Eq.(3.15) then and i.e., , − 2 8 2 tcnieaieytasi oits to transmit iteratively can It . 2 ) ) 9 I 2 ∗ ) I ( S and ( ,9 8, ,9 8, ) D 1 − 8 1 ) ) 0 srlvn oitself. to relevant is D xss h xsec of existence The exists. tews.Terandom The otherwise. 9 fterno walker random the If . (3.16) (3.15) (3.13) (3.14) 2 sa is

31 Proof. 2. Theorem have we lemma, above the on Based nonsingular. 1. Lemma crsta nraetesrcua aac fagvnsge network. relevance signed learn given to a of tends balance actually structural SRWR the Thus, increase that triads. scores other for observations similar give can we until reduced to added be will score relevance positive the increases which (3.14), Eq. during 3.1(a), Figure structures in unbalanced example, reducing For show while we process. Next structures updating the balanced unbalanced. the keep are to three likely remaining is the SRWR while that balanced are 3.1(e) and 3.1(d) 3.1(a), to leads which h paepoes h oi iewt / en oiiengtv ik.Tedse iewt +/- with line dashed The links. positive/negative means means +/- with line solid The process. update the Thus, C neto oblneter:Fgr . ie ersnaietilt htwl apnduring happen will that triplets representative gives 3.1 Figure theory: balance to onnection I R Let + − a +++ (a) 9 8

2 + S > P Let

snnsnua and non-singular is I 0 = R / − + Í 9 8 I R P

2 R − 9 9 8 eoe eaie(rtetidbcmsblne) olwn iia process, similar a Following balanced). becomes triad the (or negative becomes S ≠ iue31 rpesecutrddrn indrno walk. random signed during encountered Triplets 3.1: Figure ∈ 9 8 , 8 2 < S 0 | R P htrdcstepstv eeac score relevance positive the reduces that Since . = 0 + < 2 < 9 8 b + - + (b) ×

codn otesca aac hoy[9,tersligtid nFigures in triads resulting the [49], theory balance social the to According . | = Õ 9 = ≠ - easur matrix.If square a be

8 2 | 1 S S Í + snon-singular. is , 9 8

88 9 | ≠ ( = I = 8 0 − | Õ S ehave we , 9 8 9 + 2 c +- ++ (c)

S | | ) S = − + 9 8 1

2 | hnw have we Then . exists. - =

P Õ 32 88 9 | P = 88 | A D 1 R + ¯ | d - - + (d) Also, .

9 8 88 8: > R | S - 9 8 Í

= 9 : oee,i iue3.1(b), Figure in However, . 9 Í - ≠ | >

Í P 8 9 D | 88 ¯ 0 P | 9 R A 88 ≠ | 9 8 ilb de to added be will 9 8 8 > 9 8 | | S - | Í > o all for

e -+ - (e) 9 8 = 9 | 0 ≠ - 1 sgvnas given is .

8 . | R P + 8 9 8 9 8

= | ilb consistently be will o all for 1 = , . . . , R -

9 8 f - - - (f) 8 codn to according R -

= then , 8: 1 - S = , . . . ,

9 : (3.17) P < is  0 .

32 h rdcino ik 6] hrfr,tesg rdcinpromnecnrflc h ult of quality the reflect can performance prediction sign measurements. for relevance the good Therefore, are [60]. generally links measurements of relevance prediction study node the previous is good A links that network. suggested unlabeled signed networks the an unsigned in whether signs in predict link other to of is knowledge given networks negative signed or positive in prediction sign of problem The Prediction Sign 3.1.3.1 directed and undirected both with experiments conduct settings. we Therefore, undirected links. one directed considering two before by as ones mentioned link undirected As to applied networks. naturally be directed can for measurements are directed RWR and for ASCOS designed while are networks; measurements (PA)based undirected Attachment Preferential and neighbor common (JI), section, Index last Jaccard the in (CN), discussed measurements Among tasks. the of each for tuning different in perform they how built – have is We tasks. question second measurements. The better measurements. to global leads and strategy local which numerous – is answer to want we The of question separately. signs, first strategies ignoring the and links denote negative removing “UCN-I” by networks and signed to “UCN-R" “UCN” adapting example, For respectively. signs, links ignoring negative removing and by networks signed to to “X-I" applicable and “X-R" measurements use corresponding we the “X”, denote measurement Note unsigned (3) an theory. given and balance subsections, following and the signs; properties in network ignoring that signed (2) on based links; unsigned versions negative adapt signed removing to advanced strategies building (1) three – have networks can following we signed the section, for answer last measurements to the aim in We mentioned As prediction. strength questions. tie two and prediction sign network signed i.e., two on tasks, measurements analysis relevance signed of impact the investigate we section, this In Experiments 3.1.3 o aho h aaeeie esrmns epromdcosvldto o h parameter the for validation cross performed we measurements, parameterized the of each For 33

33 nteln rdcineprmn.Udrteudrce etn,w goetedrcin flinks of directions the ignore used [4]. we in be setting, practice can undirected common all following the they Under thus experiment. available prediction is link information of the network performance in datasets, the four assess all to For metric real-world the as prediction. in (AUC) link imbalanced Curve the usually Under are Area links use link negative we negative networks, a and signed predict positive from we Since threshold, threshold than optimal less otherwise. an is positive search score “X-I", relevance and we and the data, “X-R" if training For then and the data, links. From training of the sign “[0,1]". the in indicate is to score score relevance relevance the from the score of relevance sign of a the pair obtain use each can for directly measurements scores specific relevance signed the get The to set users. training the on measurements relevance perform inPeito Performance: Prediction Sign choose randomly we dataset, each For al .:Promnecmaio fln rdcinudrteudrce setting. undirected the under prediction link of comparison Performance 3.2: Table UASCOS++-R UASCOS++-I SASCOS++ URWR-R URWR-I UCN-R Metrics UPA-R UCN-I SRWR UPA-I UJI-R UK-R UJI-I UK-I SCN SPA SK SJI h inpeito oprsnrslsaesoni al 3.2 Table in shown are results comparison prediction sign The Bitcoin- Alpha 0.765 0.496 0.530 0.751 0.500 0.531 0.730 0.488 0.517 0.559 0.481 0.497 0.669 0.497 0.499 0.671 0.501 0.500 80% 34 Bitcoin- 0.481 0.628 0.766 0.482 0.587 0.628 0.475 0.587 0.725 0.489 0.524 0.716 0.497 0.523 0.774 0.484 0.603 0.775 OTC stann,adtermiiga etn.We testing. as remaining the and training, as Slashdot 0.494 0.569 0.693 0.498 0.542 0.641 0.484 0.571 0.550 0.503 0.513 0.549 0.508 0.520 0.663 0.497 0.554 0.677 Epinions 0.530 0.566 0.702 0.538 0.560 0.634 0.498 0.634 0.630 0.512 0.522 0.629 0.508 0.520 0.705 0.537 0.573 0.703 [− 1 , 1 ] ec we hence ;

34 ag -,]t nuees apnsfo u rsne oerlvnemaueet otetie the to measurements the relevance in node strength presented their our have from to mappings datasets each easy two with ensure the associated to normalized strength [-1,1] have truth range we ground that Note a have network. that the datasets in four edge the of two only an the are is they algorithm prediction strength connection tie the network. a weighted indicate a of is to input output the link the and words, network a binary) other to (or unweighted In weight a 64]. assign 63, to [62, aims strengthen measurements which relevance prediction, of strength application tie possible is another Therefore, indicate can strengthen. also but connection links of the signs the indicate can only not networks signed for score relevance The Prediction Strength Tie 3.1.3.2 performance. best the obtains SRWR) (i.e., RWR Under signed the while links. signs; of ignore negative (2) remove signs (1) and the that links variants predict ASCOS++ helping the outperforms in also information SASCOS++ setting, rich directed contain the circles long – with consistent [61] is observation in This that triads. consider methods only methods global local that while note circles; We long consider measurements. signed local than obtain performance consistently relevance prediction measurements sign node better signed building global in Meanwhile, links negative networks. of signed (2) for importance and measurements the links suggest negative specific results remove signed These (1) that that signs. note these ignore We than better respectively. much settings, perform directed measurements relevance and undirected for 3.3 Table and ehv nyue h w ici aaes(ici-lh n ici-T)frti akas task this for Bitcoin-OTC) and (Bitcoin-Alpha datasets Bitcoin two the used only have We al .:Promnecmaio fln rdcinudrtedrce setting. directed the under prediction link of comparison Performance 3.3: Table UASCOS++-R UASCOS++-I SASCOS++ URWR-R URWR-I Metrics SRWR Bitcoin- Alpha 0.791 0.556 0.606 0.644 0.562 0.588 35 Bitcoin- 0.809 0.590 0.644 0.705 0.639 0.630 OTC Slashdot 0.627 0.500 0.541 0.578 0.519 0.524 Epinions 0.687 0.563 0.565 0.580 0.493 0.516

35 etn,w a e htaanSW stebs efrigmeasurement. performing best the is directed SRWR the again For that see 62]. can [63, we information setting, local use Thus, strength only tie networks existing correctly. unsigned most relevance for fact, algorithms the In prediction of strength. relevance strength predicting the at predict good be to could need information local also in we prediction, links, strength of tie for signs However, prediction to accurately. sign addition sign better the achieve To predict to prediction. need sign only of we predic- that performance, strength from different tie is in observation measurements This signed global tion. than performance obtain better measurements even signed or local of comparable Meanwhile, importance the measurements. supports relevance further signed This in links measurement. negative specific measure- signed best a overall was The dataset prediction. each strength in tie ment for signs ignore (2) that or these relevance links outperform the negative measurements remove specific of (1) signed results time, the the of discuss most that further note we We given performance, Now, measurements. baseline performance. random worst the the in of results context [-1,1] the range the in uniformly values picking of tion be can It respectively. settings, setting: directed undirected the and for 3.4 undirected Table for the from 3.5 observed Table and 3.4 Table in strated error root-mean-square prediction. use strength tie we of Therefore, performance the evaluate [-1,1]. to the metric to from the scores as threshold (RMSE) relevance optimal the an search map we to – data prediction training strength tie similar for the use prediction we sign “X-I", and as “X-R” strategy for signed While of scores strength. relevance tie the predicted use the directly as we measurements that specific Note network. the of edge each with associated edges. datasets these with associated strengths h rtosrainTbe34frteudrce etn sta h admtesrnt predic- strength tie random the that is setting undirected the for 3.4 Table observation first The Performance: Prediction Strength Tie strength tie the predict to attempt then and input as network binary entire the provide We h i teghpeito efrac sdemon- is performance prediction strength tie The 36

36 al .:Promnecmaio ftesrnt rdcinudrteudrce setting. undirected the under prediction strength tie of comparison Performance 3.4: Table al .:Promnecmaio ftesrnt rdcinudrtedrce setting. directed the under prediction strength tie of comparison Performance 3.5: Table UASCOS++-R UASCOS++-R UASCOS++-I UASCOS++-I SASCOS++ SASCOS++ URWR-R URWR-R URWR-F URWR-I Random UCN-R Metrics Metrics UPA-R UCN-I SRWR SRWR UPA-I UJI-R UK-R UJI-I UK-I SCN SPA SK SJI Bitcoin-Alpha Bitcoin-Alpha 0.302 0.298 0.298 0.277 0.291 0.286 0.277 0.291 0.286 0.301 0.319 0.318 0.320 0.319 0.321 0.648 0.299 0.302 0.292 0.291 0.296 0.294 0.284 0.295 0.290 37 Bitcoin-OTC Bitcoin-OTC 0.335 0.333 0.333 0.308 0.332 0.324 0.308 0.332 0.324 0.338 0.363 0.361 0.364 0.364 0.362 0.664 0.334 0.345 0.328 0.328 0.331 0.329 0.320 0.333 0.326

37 utpesca hoisadhge-re tutrlifrain hl lohvn h inductive the having also while information, structural including higher-order measurement and centrality theories signed allow social a would multiple defining network in neural perspectives deep multiple a of of incorporation use the the Furthermore, have them deep understand [86]. to seen improvements efforts have continued and we 85] seen 84, addition, [83, In applications other of generative [82]. plethora a classification 77], in node utility 76, learning’s and 75, 81] [74, 80, networks tasks 79, of mining [78, modeling Given representations and network analytical learning 73]. various as [72, advance such functions networks to approximate complex used to in been able has being learning also deep but advantages, 71] these 70, 69, [68, data in patterns handle desired. to still insufficient are also measures are centrality group signed new second Hence, the the networks. in not signed methods are so they and and [67] links links positive positive from of also negation properties is different It very them. have is between links links interactions negative negative the that capture and evident to positive fail the they as of information separation the vital the losing or Apparently, inherently links positive [66]. weak links either positive as of links negation negative treating by positive handling simultaneously 2) centrality links and negative unsigned [65]; results and existing isolated the applying combining finally then and network, networks, each to independent measures two positive the into separating links 1) negative categories: two following and the into grouped roughly be can they and links media. social online in especially have networks), can signed that (or networks links many negative are and the there positive of today most However, but networks, network?”. unsigned a on in focused answer users only central has to or literature seeking important efforts most these the are driven “Who primarily – has they question analysis important) the network (i.e., central Social network, how a on network. based of the nodes nodes to the are the of on ranking a function provide real-valued can a values define these where to seek measures These networks. for Networks Signed in Measurement Centrality Node 3.2 eplann a enpoe ontol epwru nlann n xrcigcomplex extracting and learning in powerful be only not to proven been has learning Deep negative of inclusion the considering when centrality define to attempts recent been have There measures centrality of development the on focused has research of volume large a years, the Over 38

38 ohpstv n eaielns )i loalw st osrc u ento fsge etaiyto centrality signed of definition our construct to us allows also it 3) links, of negative interactions and the positive from both coming capture input better feature the can in network found network deep signed the networks the 2) in larger) network, patterns complex other much the the for (perhaps model other new signed a in train one calculation to in needing centrality without learned signed parameters for network utilzed deep be the for to allows network that benefit significant the has 1) value centrality signed framework learning mapping deep centrality signed a a use other learn to to to propose relations therefore We form links. can negative users and positive that both fact with the users to due complex very inherently are networks signed negative or positive a either in users). important infamous or be famous can (e.g., user way a to note due we users links, “important” negative and of “normal” introduction between the differentiating to definitions. addition respective their in on networks, based signed centrality higher In a have to targeted being These are users which values. to lower interpretations as physical have intuitive have typically users also and “normal” structure network typical the on other based are while measures value, more a higher that such a network has a in user users of “central” status the measure to is networks unsigned in centrality Measurement Node (DeSCent) Centrality Signed Deep of Overview An 3.2.1 theories. score balance centrality and signed status by a guided learning user for each framework for deep a propose We networks. signed for specific networks. signed in centrality node advanced an for the have complexities even models the and deep capture benefits, to networks stated potential previously unsigned the in another with along inherent in links, negative nodes already by the complexities introduced more of the to the due calculating Therefore, for it network). on utilizing model then deep the and training network (i.e., signed networks one across calculated be can centrality that such properties ec,w edaddctdwyt elz h indcnrlt au o ahue.However user. each for value centrality signed the realize to way dedicated a need we Hence, measurement centrality dedicated a developing of problem the investigate to aim we Therefore, c 8 h eet ftede erlntokfrsge etaiyaetrefold: three are centrality signed for network neural deep the of benefits The . 5 : D 8 → c 8 htpoet user a projects that 39 D 8 oterlearned/corresponding their to

39 ewr n h piiainpoeueue otanit. neural train deep to the used of procedure details optimization some the discuss and network theories. then 29] DeSCent, for [30, function balance objective and our [2] develop status first namely We networks, signed on theories social two the using centrality. to related for objective an seek optimize we can Thus, that challenging. function mapping is the function discovering mapping the learning Hence, scores. centrality signed mapping by parameterized model, deep our let We user. each as discover to wish we mapping the redefine can we Thus, work. be future could one approaches as this other However, features. neighborhood construct local to and taken node of set a extract we user each represent theories. social multiple and structures higher-order including perspectives multiple include easily iue32 nilsrto forde erlntokfrlann indcnrlt scores. centrality signed learning for network neural deep our of illustration An 3.2: Figure ntermidro hsscin edvlporDe indCnrlt DSet measurement (DeSCent) Centrality Signed Deep our develop we section, this of remainder the In for score centrality signed the learning for framework learning deep the illustrates 3.2 Figure to choose we network, the in connections their to related is status users that fact the to Due 5 \ ( x 8 → ) x 8 D c uha indntokebdigtcnqe 8,8,8] u n eleave we and but 89], 88, [87, techniques embedding network signed as such , 8 8 oeta ti o uevsdts ic ed o aete“rudtruth” “ground the have not do we since task supervised a not is it that Note . ihafauevector feature a with x 8 xrcigfo hi oncin.Mr specifically, More connections. their from extracting 40 \ erpeetdby represented be , 5 \ uhta tdfie the defines it that such , 5 : x 8 → c 8 .

40 fsge centrality. signed of neighbors, of incoming centrality negative the and utilize positive we of number the counting than rather now, that see can We The from [2]. link theory negative) status (or of positive usage a the that discuss states to theory want first we centrality, signed user’s a defining For Theory Status on Based Centrality Signed 3.2.2.1 user. each for score centrality signed neural the deep learn our to that optimize function can objective idea network an into the them introducing formalize we After DeSCent, of objective. component measurement’s each for our to added are Finally, constraints information. signed additional global include two for to centrality objective signed our basic in theory balance the Thereafter harness to introduce information. propose local we we capture to centrality first, eigenvector and theory status parts: on based four centrality in organized is subsection This Function Objective Measurement Centrality Signed 3.2.2 ye hs ae nteieso ievco etaiy[0,w a oiyE.(.8 ob the be to (3.18) Eq. modify can we [90], centrality Eigenvector following: of ideas the on based Thus, the of type. status actual the to account links into their take giving not users does scores this However centrality setting, negative. our and in positive since both links negative be and can positive of ratio the use not do we that Note of ranking the describe to network the in users other user of than opinions rank) (i.e., status lower) (or higher a c 8 = D D 8 9 8 u nta ipycutn h ubro links of number the counting simply instead but , c ∈ snihost egtteelnsadcntutarcriedefinition recursive a construct and links these weight to neighbors ’s Õ 8 # = 8 8= + | # c 8 8= 9 + − | − | : ∈ Õ # # 8 8= 8 8= − − c 41 D | : 9 = hrfr,i ewn ouiietecollective the utilize to want we if Therefore, . = Õ D Õ 9 9 9 to A c + 98 9 D A 8 − + simplying is 98 Õ − : D Õ A 8 : ecndrv h following: the derive can we , − :8 c : A D − :8 9 soiinthat opinion ’s D 8 eevso each of receives D (3.19) (3.18) 8 sof is

41 D ik to links with triad unbalanced siaigsge desrnt,adcnb ute nesodtruhtefloigeape fa if example: following the user through understood further for way be principled can and a their provides strength, therefore edge This signed and weight. estimating another higher a one have of should status link) the signed directed judging (i.e., at opinion sense better a have they triangles, more in from link opinion the the trust a to define likely accurately more more are to we attempt that an is in intuition triangles One with centrality. also signed but node’s (3.19)), Eq. in far so shown (as signed our to information higher-order) measurement. (i.e., not centrality clustering do that local we those this and that adding balanced) while such (i.e., unbalanced) triangles theory (i.e., of social the types to both adhering parameterize those likely and between less differentiate differences are can they these are reason utilize the triangles can is We unbalanced this and such exist. triads) any to social that those in implies frustration theory higher The to even (due an unstable having links. as negative defined of is number triangle odd) unbalanced) (or (or balanced A ones. unbalanced to compared signed of types the differentiate further triangles. to 29] we [30, networks theoretical theory signed balance in social structural Similarly with a triangles. triangles local from local use of (both use the links is of [62]) empirically strength and the [91] standpoint determine to networks, unsigned heuristic In studied connection. heavily fact every in with one and associated networks implicitly social strength in of strength) spectrum equal a of (i.e., is same there the are links all not that it However, shown links. been signed has directed single from information includes only formulation our now Until Structures Higher-order and Theory Balance Harnessing 3.2.2.2 8 fte aea“togr oncin(..hv oecmo egbr) oeta whether that Note neighbors). common more have (i.e. connection “stronger” a have they if eteeoepooet tlz o nyterltosisbtenueso h igeln level link single the on users between relationships the only not utilize to propose therefore We as networks social in form to likely more are triangles balanced that us tells theory Balance D 8 spstvl once otreusers three to connected positively is D 8 r o qa rmaltrenihos oeseicly ewn oprmtrz the parameterize to want we specifically, More neighbors. three all from equal not are D 9 to D 8 D spstv rngtv easm htwe hs w sr r involved are users two these when that assume we negative or positive is H n otinlswith triangles no and , D G , D 42 D I H emgtwn oifrtesrnt ftegiven the of strength the infer to want might we , and , D I u hrsablne ra with triad balanced a shares but , D 9 ie to gives D G an ,

42 between where matrices the calculate and define separate similarly and respectively, triangles, matrix a pairs linked negatively for define can we Similarly follows: as common in have they triangles of number the on based users of neighbors. linked negatively for applies logic similar a neighbors, linked positively three over two) these for importance same that such triangles ersn h oiie(rngtv)lns eetn q 31)t banteblwformulation: below the obtain to (3.19) Eq. extend We links. negative) (or positive the represent negative of number separate odd we an specifically, having More (i.e., unbalanced or links). links) negative of number even an having et efrhrsprt h rage eainmtie ae nwehrte r aacd(i.e., balanced are they whether on based matrices relation triangles the separate further we Next, eew en h matrix the define we Here iue33 nilsrto fhww aclt h matrices the calculate we how of illustration An 3.3: Figure V + D and 9 T T and − c :8 + 98 8 [ + = = = D r o sdt oto h otiuino hrdblne n naacdtriads unbalanced and balanced shared of contribution the control to used now are Õ |{( 8 |{( epciey n iial for similarly and respectively, , D 9 8 ,9 : 9, 8, ,9 : 9, 8, eevsterrnigbsdmr on more based ranking their receives p c 9 9  A )|( )|( + 98 ,8 :, ,8 9, + T V E ∈ ) + E ∈ ) T + hc ilrpeetterltosbtenpstv ikdpairs linked positive between relations the represent will which T  +  98 D , + − + I T lhuhti xml sgvni h otx of context the in given is example this Although . + n where and n where and T * [ + + + , into T T * 98  T + − 43 −  T and , D D −  into 8 V 8 , , + − Õ D D : and 9 T 9 and and , and , T * p c  − : : − T [ D  hr ledul o e ige lines single) red (or double blue where T * − D D A G and − : : + − and :8 with oehrfr triangle a form together oehrfr triangle a form together o h aacdadunbalanced and balanced the for , sfollows: as + T T D * V D  H − − : + T hwvrntncsaiythe necessarily not (however iue33soshwwe how shows 3.3 Figure . , and  :8 T − * + + D , [ 8 T edefine We . −  T − * :8 and , −  }| }| . T D * 8 p − having I . (3.20) o a for

43 q 32)cnb ovre noteblwobjective: below the into converted be can (3.20) Eq. future one as it leave will we and information global work more work. our capture extend to can we circles Thus, longer length. consider any of 2-hop to circles include to to applied triangles be can on theory focus balance only information, we Although wanting not connections. but “weaker” network, existing the remove in edges to certain strengthen to we However, information triangle zero. the have include all would to matrices seek triangle four the in values corresponding the then edge, ac u eusv ento.Ti ed otefloigmnmzn problem: minimizing following the to leads This definition. recursive our match A be rankings. to shrink) measurement (or the boost allows to attempting also users and malicious users to susceptible other less centrality to absolute much high too very of influence user their a distributing prevent to from done is this specifically, More [92]. PageRank in vector normalizing the of utilization the that Note user hr h atterm last the where h bv nue u ewr orcl asteue etr etr ocnrlt crsthat scores centrality to vectors feature user the maps correctly network our ensures above The − hsi eas fteeeit otinl novn aro oe,btte aea existing an have they but nodes, of pair a involving triangle no exists there if because is This . ntrso u betv o eCn,i elet we if DeSCent, for objective our of terms In epitotta ecniu oicroaetesnl ietdeg nomto from information edge directed single the incorporate to continue we that out point We D I as: min p \ ∀ I '46 D = 8 L( − Õ U ∈ ( H Õ \ \ : ) )  = sarglrzto emo h epnua ewr parameters. network neural deep the on term regularization a is : A 5 \ 5 D + IH p \ ( Õ 8 x : ( ∈U x + : 8 ) ) A

A = − IH 5 \ − :8 − " ( + Õ x Õ + 9 8 : V − ) V +  −  T 5 T 5  \ IH \  p − :8 Õ ( p ( + 44 x  9 9 x : 9 + : + p ) ) 5 V \ [ sbsdo h aeie stenormalization the as idea same the on based is A p A − ( − x + 98 9 T − T :8 5 9 \ IH  − :8 ) + + ( * − V A x V  + + 8 +  − 98 ) T ! [ T replace 2 + + 98 + − :8  + T V  + + * '46 IH + T [ + + [ + 98 + −  ( T c \ T [ + + 8 98 ) * − − :8 o ie user given a for [ * T  +   * IH T  − + # 98 *   D A 8 then , (3.21) + and

44 eefreacntan aigtesmlwron nteaslt indcnrlt o l users all for centrality signed absolute the be on to lowerbound Therefore sum users. the all having for constraint zero is a network value enforce our centrality we prevent signed to the where want solution also trivial we a Furthermore, optimizing from nodes. all for probability zapping the assigns have to links value incoming centrality no signed having constant users small define some to is DeSCent) in included have we one the (and issue to then similar links) all incoming are neighbors incoming those user if another links, for incoming because network fact, the In throughout undefined). diffuses (or actually zero be problem would user this centrality a their If then links, function. outgoing objective only proposed but the links, in incoming problem critical a exists there that note We Constraints Measurement DeSCent Additional 3.2.2.3 h eto h ae,w ilrfrt hscntan sthe as constraint this minimize to to refer will we paper, the of rest the h orc insgetdb ttster.Ti a epromdb eurn h centrality the requiring by performed be can This maintain scores theory. of centrality status signed by the suggested comprehensive have sign more to correct our wish the utilize still to we want centrality, we signed although the that the for note on formulation We based is values. measurement centrality centrality the signed of our sign on place we constraint additional second The output network the substituting for after following the minimizing as represented be can which B86= D c 8 8 ( : c W ob h aesg ssgetdb ttster,wihcnb xrse omlyas: formally expressed be can which theory, status by suggested as sign same the be to 8 |U| ) = .. h 1nr of L1-norm the i.e., , B86= L( \ (| ) # ihrsetto respect with 8 8= D + G | − | ilas aeacnrlt fzr o nend 1] n ouint this to solution One [17]. undefined) (or zero of centrality a have also will # 8 8= − |) c ntrso iiiain(n iial substituting similarly (and minimization of terms In . hudb tleast at be should \ max codn oteblwconstraint: below the to according || c || 0 1 W , = U − |U| W D ecnseta hsi iia ohwPgRn [92] PageRank how to similar is this that see can We . Õ 8 ∈U 45 D | c Õ 8 8 W ∈U ≥ | ie h ubro sr ntentok In network. the in users of number the times | W 5 \ |U| ( u constraint sum x 8 )| D  8 i htte hmevshv no have themselves they that (in eteeoeas seek also therefore We . D G vnif even , 5 D \ 8 ( D a no has x (3.22) 5 8 G \ ) ( has x for 8 )

45 idnlyr ihngtv lp ..W efr ac rdetdsetuigAA 9]with 0.001. [94] to ADAM set using rate descent learning gradient initial batch an perform We the on 0.2. functions slope activation negative [93] with layers LeakyReLU using hidden and layer per neurons hidden 500 of consisting used. describe procedure we optimization next the and measurement, structure, centrality network signed deep the deep our for defined objective the having Now, Framework Network Deep DeSCent Overall 3.2.3 where following: the as constraint margin the add we where c hnvrtesg ftecnrlt osntmthtesg ugse ysau hoyad0 and theory status by suggested sign the match defined have not we does Formally centrality otherwise. the of sign the whenever 1 and sign, correct the | hr ecnseta if that see can we where # min 8 ,ti a erwitna h following: the as rewritten be can this ), \ 8 8= ootmz h betv ie nE.(.4 euea3lyrflycnetdntokthat network connected fully 3-layer a use we (3.24) Eq. in given objective the optimize To (3.23) and (3.22), (3.21), Eqs. using function objective full DeSCent’s construct now can We − L( |) _  \ 1 ) < and = . D + 0 8 Õ _ ∈U n therefore and _ 1 2

max

r nrdcdt euaietetotrsfo u diinlconstraints. additional our from terms two the regularize to introduced are 5 \ ( x 0 8 I − ) W , [ 8 ] U − |U| I 5  \ [ sa niao ucin h niao ucinsproei oequal to is purpose function’s indicator The function. indicator an is Z 8 Õ ( ] I 9 x [ = = 8 8 ) D ] 5 8 Õ \ 1          and ∈U p = ( 0 1 x oforce to 9 9 1 ) | (| 5 (and otherwise if \ A D I # ( Õ [ 8 + x 98 8 ∈U 8 8= 8 ] )| 5 + + \ below: I  5 | − | V [ I ( ! \ 8 x [ + + ] ( 8 8 T x ] (| × ) _ = # + 8 98 2 46 ) |  8 8=

5 0 ob h aesg ypsigtruhzr to zero through pushing by sign same the be to \ + D − ( tews) erfrt hstr sthe as term this to refer We otherwise). 8 Õ # [ |) x ∈U + 8 8 8= |+ )| aedffrn in then signs differing have T + + I 98 [ * | − | 8 ] Z  |  − 5 # \ Õ ( : 8 8= x 8 − |+ )| 5 \ |) p (  x : Z : <  ) ! 0 + A '46 − :8 + ( V \ − ) T 5 \ − :8 (  x 8 + (| × ) [ − T − :8 # * (3.23) 8 status 8= (3.24)  +  ! − | 2

46 2 a h s fde erigeal etaiycosntok?ad()Hwd h parameters the do How (3) performance? and its networks? affect cross DeSCent centrality of enable learning deep of measurements? Can use centrality the (1) signed Can existing (2) other questions: than three scores following centrality the signed better answer learn to DeSCent signed seek deep We proposed the (DeSCent). of effectiveness measurement the centrality evaluate to experiments conduct we section, this In Experiments 3.2.4 relation in derivative the using only and error the to calculating when constant a as (3.24)) Eq. (i.e., matrices adjacency urn rpsdsge etaiyvle.Nx nln ,t efr h paeto update the perform to 7, line on Next values. centrality signed proposed current vector constant a calculate construct to We how objective. discuss our and convergence of until gradient the loop 8 to 5 parameters Lines the initialized. 4, randomly line extracts are on 3 network Then, Line structure. network unbalanced). the or on balanced based features are node triangles the whether on based (separated matrices treating 5 \ 9 5 4 2 1 3 8 7 6 loih 3.1: Algorithm ( 5 x loih . eal h tp o piiigormdl nln ecntuttetwo the construct we 1 line On model. our optimizing for steps the details 3.1 Algorithm vector centrality signed Construct Input: while parameters network neural the initialize Randomly Construct create Respectively Output: Use \ 9 ( ) x 8 paeparameters Update of gradient Calculate vector constant Create and A )  and hsudt rcdr srpae ni ovrec sn ac rdetdescent. gradient batch using convergence until repeated is procedure update This . + o convergent Not Í 9 G and c 5 k 5 = T \ \ : p ( (  respectively , (U A x x 9 + : 9 − , ) ) piiainpoeuefrDeSCent. for procedure Optimization , T oetatnd features node extract to E A with  A + − + 98 A , + , E + + do T − and k \ and * V ) 9 sn ac rdetdescent gradient batch using + + L( k , T and A A T + \ where 98 − * − )  − n hratro ie2cet h orsge ragemotif triangle signed four the create 2 line on thereafter and , using from k + : from [ c epciey n yhligtervle,w r effectively are we values, their holding by and respectively, , k + where T I E 5 \ ← + + 98 A * ( X + x and  8 5 c and ) \ − 8 ( fe replacing after ← E x Í : I − A ) 47 5 − 5 o user for \ \ p ( \ ( x x : 8 : ) ) A D − :8 I 5  \ k + ( x nln ,wihcnan DeSCent’s contains which 6, line on V 9 ) − and T − :8  5 \ + ( [ x − : ) T ihconstants with − :8 * \  ftede neural deep the of  norobjective our in \ ereplace we k 9

47 hspoie nadtoa 6faue.Freape n fteefaue ol eteaverage the that be neighbors would of features set these the of for degree one negative example, incoming For features. 16 on additional based an averages provides This these of with sets linked that different neighbors four over averaging obtain we However, features. positive/negative and user given the for degrees positive/negative in/out the are features 4 extracted. feature Below signed each in. discuss neighbors involved and are their define they we distribution, triangles balanced/unbalanced degree of signed number node’s the and given distribution, the degree – groups node manual three each extract try to for first propose features We will of work. we future one Here as embedding automatic structure. leave network and extraction the from embedding via automatically learnt ( theory balance of contribution the observe [ we to question, third DeSCent the on address analysis To parameter datasets. a learned other perform the the utilizing in nodes then of and centrality dataset the single calculate a to corresponding network on their training to by features evaluated evaluate node is the to which mapping experiments scores, for centrality further are perform networks we deep in learned question, later the second experiments general the these how answer of to results Then, the will and We section. problem this problem. prediction prediction link link signed signed the the for discuss them further utilizing quality by the values evaluate centrality to signed approach the indirect an of perform we common [65], the following literature Therefore, the the in [95]. thus evaluation status centrality node [67]; to distributions related is law is It networks power signed the network). in follow formation signed links link a negative of and users positive the both of that ranking observed centrality signed a (i.e., values centrality signed + and , o h ru fsge eredsrbto of distribution degree signed of group the For user a for features distribution degree signed node the extract to how discuss we First Features: Node Extracting “ground-truth” have not do we because straight-forward not is questions two first the Addressing | # 8 >DC [ − − n the and ) | ). BD< and BC0CDB sntdbfr,tend etrscnb xrce aulyor manually extracted be can features node the before, noted As osrit cnrle by (controlled constraints D 8 sn n ftefu osbedrce indlinks. signed directed possible four the of one using 48 D 8 D snihos eetatteaeaein/out average the extract we neighbors, ’s 8 a ie oiieln o fw eeto were we If to. link positive a given has _ 1 and D 8 (i.e., _ 2 respectively). , | # 8 8= + | , | # 8 8= − | D , 8 | V These . # + 8 >DC , V + − | , ,

48 D on user for features distribution to sign based neighbor 15 other the that Note oitcrgeso oe ntetann aae fegsadte rdc h in fuse links unseen set). of testing signs the the in predict those then and (i.e., edges of dataset training the on model regression logistic vector edge every For [4]. in follows: as are formulations of The sets connections. neighbor positive/negative incoming/outgoing the with associated scores centrality average the measurements. centrality signed feature, across first comparison The fair normalize a we for vectors, measurements feature centrality the signed constructing all before However, centrality. signed every computed For the [4]. is network networks signed existing signed an in given prediction when user links link negative of and problem positive to new The them predict using to task. by prediction measurements link centrality signed signed the the perform compare we [65], tradition the following Δ (i.e., balanced the calculate as feature example this denote f 8 8 2 8  x sivle n hs w etrscnb aiycluae ihvco n arxoperations matrix and vector with calculated easily be can features two These in. involved is S = eapoc h indln rdcinpolma lsicto rbe iia ota done that to similar problem classification a as problem prediction link signed the approach We Prediction: Link Signed triangles unbalanced and balanced undirected of number the are features two last the Finally 8 = ∗ + D . ( | 8 and # S f 8 ntesge ewr,w osrc etr vector feature a construct we network, signed the in 8 + 8 1 8= and ) + S S | + − S f D hc r h nietdsmercvrin of versions symmetric undirected the are which , 9 8 9 + Õ ∈ )/ # n h ae sbsdo hte h edge the whether on based is label the and 8 8= 2 f 2 + 8 ( + 1 9 , stecnrlt value centrality the is , S 8 + 4 ) f 9 8 8 S 3 ecncntutafauevco hti h octnto ffeature of concatenation the is that vector feature a construct can we , − = Δ S 8  8 − ic h ikfraini indntok srltdt oestatus, node to related is networks signed in formation link the Since | x # n naacd(i.e., unbalanced and ) ( + ) 8 ∗ 8 1 8= hnmr omlyti a edfie sfollows: as defined be can this formally more then , x − 8 S ∗ | 8 − = D ) : Õ S ∈ | # # + 8 8= S 8 >DC 1 2 − 8 − : )/ + , c 2 | 8 49 D o h user the for f 9 8 ∈ Δ 4 Õ # * 8 = 8 >DC Δ = | # * 8 + ( 8 S rage o user for triangles ) >DC | 1 # 8 4 − 9 8 ) 8= + 9 S | f D − a oiieo eaie etana train We negative. or positive was − 8 A 8 | D S ossigo etrsbsdon based features 5 of consisting 9 + hmevs h te orare four other The themselves. ∈ Õ 8 − # )/ and 8 D >DC 8 2 2 + hnctgrzdbsdon based categorized when ( + 9 A , D − S 8 8 − eew hwhwto how show we Here . f a edfie similar defined be can ) 8 D 5 S 8 + = as: S 8 + | # ( + ) 8 >DC 1 S − 8 + | ) D S : − ∈ Õ (3.25) # S 8 >DC 8 + 2 )/ − : 2

49 acltn h indcnrlt values. centrality signed the calculating Baselines. Network Separate groups: 2) two and into Baselines; baselines Network significantly the Single categorized perform 1) have we to Below shown task. have prediction link links signed positive the on to worse include equivalent not them do treating we or ignoring space, when links of experiments negative our sake but the measurements, ranking for node Similarly, unsigned against well. comparison any perform to shown have measurements that recent those include that and note that We measurements representative networks. selected signed have were in we that nodes succinctness of methods for importance baseline or selected centrality have the We determining study for can designed measurement. we proposed that our such of measurements effectiveness centrality network the signed existing some present we Here Comparison Performance 3.2.4.1 set. training Hyperparameter the For testing. on as cross-validation 10% performance. used remaining tuning the the and better training, the as 90% higher use randomly the we therefore dataset, each and one negative selected randomly higher edge a positive selected than randomly a rank we probability higher a links). means negative AUC higher than a links that Note positive and more significantly positive (i.e., the imbalanced datasets typically real-world are links in negative since (AUC), Curve characteristics operating receiver the igeNtokBaselines: Network Single Under Area use we problem classification binary prediction link signed the of evaluation the For • • ik n sbsduo aeak[2.I tlzsahuitcapoc na exponential parameter an exponential on ately. the approach if heuristic solution a fixed-point a utilizes has It and variation [92]. PageRank upon based is and negative and links positive both uses simultaneously method This [51]: (ER) Ranking Exponential of eigenvector matrix left adjacency dominant signed the the computes method This [24]: (SR) Ranking Spectral Signed hs htuiietepstv n eaielnstgte while together links negative and positive the utilize that those A . 50 ` sslce appropri- selected is

50 rdsac vrasto aaee aus oeseiclyw varied we specifically More values. parameter fixing of performed set had we a measurement over DeSCent search our of grid parameters a the For 1. or -1 either as weights edge SR use and MPR for 2) similar Slashdot; more to used a compared we have as datasets Epinions Bitcoin to two ratio link the positive/negative since and and balance Epinions, grid a and from Slashdot parameters for selected [96] the were in these search since Epinions, a same the use datasets Bitcoin two of values parameter edn ewrsadte tteedcmietosprt etaiyvle htwr calculated were that values centrality separate two independently. combine end the at then and networks pendent V and h aaee etnsfrtebslnswr e sflos )frsW eueteselected the use we sRWR for 1) follows: as set were baselines the for settings parameter The eaaeNtokBaselines: Network Separate • • • ` uhrt h nlsge etaiyi h uhrt cr ntepstv ewr iu the network. minus negative network the positive the on the score on is score authority centrality authority Then the is centrality networks. signed only final negative The authority and only positive authorities the and for hubs separately the calculates scores recursively method This [65]: (MHITS) HITS Modified r utatdfo h oiiecnrlt scores. centrality positive the from subtracted are oie aeak(P)[5:Hr aeak[2 spromdo h oiieol and only positive (i.e., the networks on only negative performed is [92] PageRank Here [65]: (MPR) PageRank Modified users other all for rankings personalized of centrality summation The the 3.1. be random Section signed in the proposed as we same method the restart not with is walk method this that and note We method restart theory. with balance walk incorporates random unsigned the on based networks personal- signed for in state-of-the-art ranking is ized model This [96]: (sRWR) Restart with Walk Random Signed [ = W odnt hs egdprmtrvle,respectively. values, parameter merged these denote to 2 = U sti au aifistercnegnerqieetdsusdi 5]bsdo signed on based [51] in discussed requirement convergence their satisfies value this as 0 = . 1 0 . and 15 o h apn rbblt scmol sdi rcie[4 5;3 o Rwe ER for 3) 65]; [24, practice in used commonly as probability zapping the for Z V = = 1 0 oeta noreprmnsw fixed we experiments our in that Note . . 6 and W = A hs htslttepstv n eaielnsit w inde- two into links negative and positive the split that those + 0 . and 9 o Slashdot, for A − epciey n hntengtv etaiyscores centrality negative the then and respectively) , 51 V = 0 . 5 and V W + = D = 9 0 V towards . − 9 and o h pnos n the and Epinions, the for c _ 8 1 fauser a of [ _ , + D 8 2 = . V, , [ − and n euse we and D 8 a thus can [ while

51 ahsge ewr aae,o fi slaigmr eea atrsta r neetyfudi all in found inherently are that datasets. patterns network general signed more leaning is it if inside or nested dataset, properties network specific signed learning each is framework deep the node whether respective tests their one from for networks This other features. utilize in then scores and centrality dataset the extrapolate single to a model on learned network that deep a train we where experiments we specifically, inductive More perform datasets. network DeSCent signed across our generalize well to how able is test framework to network deep experiments perform our we defining Thus in learning measurement. deep centrality using signed of advantages deep the quantify further to seek we subsection this In Datasets Across Generalization 3.2.4.2 in relations higher-order with along theories links) function. balance objective negative and our and status both positive of the utilization between the with patterns along network complex neural more deep extract a negative effectively utilize handling to can incorrectly ability to (which DeSCent’s sensitive is more performance is better the metric four believe AUC all we the across relations, that AUC fact best the the to has Due measurement (DeSCent) datasets. Centrality also We Signed necessary. Deep is our links negative that and note positive distinguishing and nor links links positive positive weak of neither negation as the links negatives These consider performance. not worse should obtain we that baselines network support single observations time, the of most that observe first We oprsnResults: Comparison Measurement Centrality DeSCent MHITS al .:Sge ikpeito eut ihAUC. with results prediction link Signed 3.6: Table sRWR MPR ER SR h eut cosorfu indntok a efudi al 3.6. Table in found be can networks signed four our across results The Bitcoin- Alpha 0.622 0.602 0.618 0.576 0.598 0.567 Bitcoin- 52 0.702 0.650 0.692 0.570 0.619 0.565 OTC Slashdot 0.692 0.680 0.593 0.570 0.602 0.570 Epinions 0.713 0.667 0.658 0.666 0.666 0.669

52 nutv xeiet rvd vnmr vdnet h sfleso ansigde erigin learning deep these harnessing Thus, of feeding usefulness the dataset. just to smaller evidence by the more even Slashdot) from provide experiments or optimized inductive already Epinions network as deep (such the calculate network through to features larger ability their a the have in network then scores small to centrality efficiently a and signed from fast the network datasets) bitcoin deep two DeSCent’s the of of parameters either as the (such learn to ability example many the such are One be efficiently. there would networks that across centralities note the We calculate to network. able better same being slightly of the advantages sometimes within fact calculated centralities in the (and to similar the identical) very since or general, is and networks robust cross very are trained networks when 3.4 deep Figure performance the from for make learned can parameters we the observation indeed main our that The of is three. each other in the training to when applying datasets and across datasets in four generalization seen the be shown can have This we performing where “cross”). thus 3.4, as Figure and denote we dataset (which another networks on signed trained across network calculations denote centrality deep we (which the network utilizing same when the or on “within”) trained as network deep a from calculated were centralities iue34 indln rdcinpromnecmaio fwti esscostraining. cross versus within of comparison performance prediction link Signed 3.4: Figure eew rsn h U o h indln rdcincmaigtepromnewe their when performance the comparing prediction link signed the for AUC the present we Here

AUC AUC 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 Bitcoin-Alpha Bitcoin-OTC B i t S c l o a a Bitcoin-Alpha (a) i s n h - c Slashdot (c) A d o l p t h

a Bitcoin-OTC

Slashdot

O t

O h e t h r

e d r a

d t a a s t e a Epinions Epinions t s s e t s Within Cross Within Cross 53

AUC AUC 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 Bitcoin-Alpha Bitcoin-Alpha B i E t c p o i b Bitcoin-OTC (b) n i n i d Epinions (d) o - O n s T

C

Bitcoin-OTC Slashdot

O

t O h t e h r e

d r

a d t a a t s a e s Slashdot t Epinions e s t s Within Cross Within Cross

53 _ nteBtonApadtst rmterslssoni iue35b,w a e iia findings similar see for can we discovered 3.5(b), those Figure in to shown theory. results status the by From suggested dataset. Bitcoin-Alpha sign the the on to adheres the still for sense) done global as a Similarly (in find we solution the the that of contribution the controlling for used been solution. while performing that out the point showing We thus decreased, 3.5(a). is Figure performance the in zero AUC of terms in results validation cross the while of fixed value parameters other the DeSCent’s vary of we all keep we that Note of contribution). any value eliminate the fully vary we as investigate performance we in Here change solution. the zero trivial the towards convergence avoid can algorithm our ensures have we datasets. since other dataset, representative on a observations as similar Bitcoin-Alpha on results show only We (3.23)). Eq. (i.e., the of contribution the evaluate we Here Analysis Parameter 3.2.4.3 scores. centrality signed discover to framework DeSCent our 2 = etw ayteparameter the vary we Next parameter The 1000 ssont eqieeffective. quite be to shown is _ 1 _ nti ehdi sdt oto h otiuino the of contribution the control to used is method this in 1 epeetterslsfrarpeettv aae,BtonApa from Bitcoin-Alpha, dataset, representative a for results the present We . _ 1 u constraint sum oeseicly entc h sg fthe of usage the notice we specifically, More . _ 2 hl epn h te aaeesfie.I hsmethod this In fixed. parameters other the keeping while u constraint sum erpr h U on hl ayn h au of value the varying while found AUC the report we 54 ttsconstraint status sum _ 1 icuigstigi ozr,wihwould which zero, to it setting (including osriti bet i nfidn higher a finding in aid to able is constraint ie,E.(.2)adthe and (3.22)) Eq. (i.e., hc a eindt ensure to designed was which , ttsconstraint status u constraint sum ttsconstraint status _ 1 sstto set is which , _ 2 with had _ 2

54 iue35 nlzn h indcnrlt diinlcntanso Bitcoin-Alpha. on constraints additional centrality signed the Analyzing 3.5: Figure (a) u constraint Sum (i.e., _ 1 ). 55 (b) ttsconstraint Status (i.e., _ 2 ).

55 9) seilyi niesca ei,wihte assteqeto hte eiae efforts dedicated whether – question the raises then which media, [30, social networks online signed in (or especially links 29]), negative and positive have unsigned can networks on many focused However, better has networks. in modeling attracted network Traditionally been has networks. attention modeling Increasing and 106], understanding 110]. [28, Web [109, the media social as and such 108], applications real-world [107, many data biology in more Nowadays, networks large 103]. as [98, represented diameter be small can and 105], 101], 104, typical [100, 103, the assortativity [102, 11], networks, 99, coefficients 98, unsigned clustering [97, In distribution degree law network. power the output are generated properties being modeled the properties to to observable/measurable similar many input as in the is result from that would network maintained this another Ideally construct to possible. parameters as of input as set the network a a provided learn when can that, model such the procedures input, and/or equations of set simple relatively few a prediction. link sign for harnessed verifying being analysis towards empirical applicability an its by followed networks, bipartite signed in extend theory to balance how model study we and Thereafter, models. baseline other existing and with models including compared network signed evaluate networks mechanistic empirically signed we for that framework model learning network parameter generative automated a an constructing on focus first we cally, nti chapter this In rceig fte1t nentoa ofrneo aaMnn okhp IDW.2018. (ICDMW). Workshops Mining Data on Conference International 18th the of Proceedings Knowledge and Information on Conference 2019. International (CIKM). ACM Management 28th the of Proceedings In works.” and Information on Conference International ACM 27th 2018. (CIKM). the Management of Knowledge Proceedings In Theory.” Balance 3 2 1 eeaientokmdln ist einamdlt ersn ope ewr through network complex a represent to model a design to aims modeling network Generative ye eradJlagTn.“ogesoa oeAayi sn indNtok. In Networks.” Signed Using Analysis Vote “Congressional Tang. Jiliang and Derr Tyler Net- Bipartite Signed in “Balance Tang. Jiliang and Chang, Yi Johnson, Cassidy Derr, Tyler Structural on Based Modeling Network “Signed Tang. Jiliang and Aggarwal, Charu Derr, Tyler 1 , 2 , 3 OEIGNTOK IHNGTV LINKS NEGATIVE WITH NETWORKS MODELING eivsiaemdln fntok aigngtv ik.Mr specifi- More links. negative having networks of modeling investigate we , HPE 4 CHAPTER 56

56 iigsge iatt ewr ak,w eeo utpesg rdcinmtosta utilize that butterflies. methods signed prediction of form sign the multiple in theory develop balance we theory tasks, balance of network applicability bipartite the investigate signed to Then, aiding types). node two cycles the (i.e., containing butterflies 4 signed length - networks of bipartite of signed validation in cycle and smallest analysis the comprehensive using first theory the balance conduct types we two 4.2, exist network Section there in signed furthermore Therefore, unipartite and nodes. triangles numerous of no for are triangles there of networks form bipartite cycles the in However, for in defined tasks. used generally being been is has and theory, length social any On signed of key applied. a being theory, from balance networks hand, bipartite other the unsigned most and prevent signed that challenges unipartite introduce on sets two literature the existing across form only node hand, can two having links one of signed the complexities where on Their types networks overlooked. been bipartite can primarily Signed have reviews but to found, network. users commonly bipartite are from signed ratings a helpfulness as and denoted transaction naturally are each be users after the other when the marketplaces rate multi-vendor to in asked sellers and buyers between network constructed bipartite bipartite be signed signed Actually, a can e-commerce, in types. example, different For of domains. nodes multiple across between appear formed networks be to able only nodes are of that links sets networks two and have signed networks These of form networks. bipartite common signed a – However, overlooked been are network. primarily links have the signed in and nodes type two node any connect single to a on have able focused that networks primiarly are have which networks networks, signed signed for unipartite theories and work signed previous of However, variants various fact networks. in are there ubiquitous, increasingly become has that network of type maintain they ensure to balance. of distributions level triangle correct to signed the specific and ratio those sign addition link in namely and networks, clustering signed local and distribution degree the including network core 4.1 properties maintaining Section on focuses in that Thus, model network techniques. signed generative unsigned proposed the our present to we addition in networks signed model to needed are lhuhw aepiaiyfcsdo h eeomn fsge ewrs hc r specific a are which networks, signed of development the on focused primarily have we Although 57

57 oe,wihtrest rsretrekypoete fsge ewrs–()dge distribution; degree network (1) – signed networks novel signed a of propose properties key we three Thus, preserve to targets process. which construction model, and dynamics their of terms networks in world real network and model varying network the between of relationship for the networks understand null-model further synthetic a to constructing properties as for used be or can testing model significance a property such Similarly network datasets. network synthetic the of through use advancements the further allowing and real privacy user’s corresponding the their compromising without as but properties network, similar having networks be synthetic could model constructing network for generative A utilized algorithms. furthermore and and methods mining, their discovery, benchmarking knowledge and for testing data for network the utilize to necessary their is advance it further field, to wanting researchers for However, media. social push in significant anonymization a better is for there Currently dynamics. and structure network the of understanding better the network design to need a is there Thus, networks. signed for networks. models signed for unsigned unequipped and modeling are network models unsigned network into triangles. incorporated formed not of are distribution the mechanisms distribution, as these sign such However, the principles their as by such suggested networks properties signed other networks also of but signed properties unique modeling (i.e., only Hence, formed not be preserve networks. to to signed likely requires in more unbalanced) are the (i.e., triangles in others found some than signs) [29], balanced) edge theory their balance on by (based Suggested triangles of network. distribution the driving network in the also in of but patterns formation their clustering, (i.e., are local clustering only not local networks, of signed amount with large comparison, a In we see triangles). networks we unsigned and in transitivity example, of For property 4]. the [2, have networks driving signed role of key a construction play and that theory, dynamics balance the as because such importantly) theories), more social (or (and principles also specific but are edge, there every with associated sign a having by network the Networks Signed of Modeling Generative 4.1 ewr oeshv aydrc plctosadadvresto eet eodadincluding and beyond benefits of set diverse a and applications direct many have models Network to added complexity increased the to due only not unsigned from unique are networks Signed 58

58 itiuin 6]smlrt hto nindntok.Hne epooet ul h signed the build distributions to degree the propose preserve can we which model, Hence, Chung-Lu unsigned the on networks. law based power model unsigned network follow of also that networks to signed similar of [67] degrees distributions node the that demonstrated study previous Model A (BSCL) Chung-Lu Signed Balanced of Overview An 4.1.2 6.4. Table in demonstrated are model network generative notations signed proposed The our unsigned defining networks. in signed by use will model we captured to demanded simply are be efforts cannot dedicated Hence, properties networks models. these network signed However, in triangles [28]. of most theory and balance [111]; satisfy links positive of result can impact links the negative of the over-estimation ignoring in For and networks signed [67]. in networks available unsigned are links from negative properties example, distinct have networks Signed properties. network properties. network measured of terms in network networks output synthetic model given a network signed a Given models. graph generative unsigned in notations traditional to compared as use graph, we signed here the 2.1 in one Section and in as undirected defined networks unlike on signed that note focus weighted We we and work. Here future directed modeling leave sign. and the networks considering signed not unweighted when network signed the in edges links indnetwork signed A Statement Problem 4.1.1 theory. balance by suggested distribution triangle balance/unbalanced (3) and distribution sign (2) rdtoal ewr oeighsfcsdo nindntok n rsrigunsigned preserving and networks unsigned on focused has modeling network Traditionally follows: as problem modeling network signed generative the define formally can We E + n e of set a and M G htcnrti h ewr rprisfudin found properties network the retain can that scmoe faset a of composed is " − G eaielinks negative G  > = = ( ( + +  > , , E U E  + > + , ersnigteuesi h indntokt olwmore follow to network signed the in users the representing , E E E  − + − > − ) Let . ) = using , sipt ese olanasto parameters of set a learn to seek we input, as { E 59 1 E E , = M 2 E , . . . , E + ae on based E ∪ # − } ersn h e of set the represent of Θ # htcoeyrsml h input the resemble closely that , G V  etcs e of set a vertices, uhta ecnconstruct can we that such , odnt h e fvertices of set the denote to " = " " + positive + + Θ " for −

59 etx hnicuigti de h rcs sepiil osrciga es n rageby triangle one least at constructing explicitly is process the edge, this including When vertex. from vertex single from vertices maintain two to picking [102] always than in Rather introduced was transitivity. the (TCL) Chung-Lu Transitive variant CL another FCL, and by CL generated those than coefficients clustering higher have networks unsigned real-world most sampling since when multi-edges and self-loops ignores FCL that Note distribution. from vertices two sample randomly just can FCL CL), the of each whether deciding than Rather vector. the vector a network of output that the of to distribution equivalent degree is expected the that shown be can It network. the in edges edge each networkwith unsigned the an of each takes whether first decides independently model and (CL) input Chung-Lu The work. input the of π Δ [ d Notations Δ Δ Δ Δ U 4 # d V π 9 8 9 8 9 8 8 A0=3>< A0=3>< CA80=6;4 CA80=6;4 G( G(  hc osssof consists which ( (     ) ) ) ) al .:Nttosrgrigsge ewr eeaiemodeling. generative network signed regarding Notations 4.1: Table 4 9 8 aigprobability having π vrg of average edge inserting when created the to approximation inserting randomly of average to due created get will that in triangles balanced the more to have approximation to wedge a closing of into probability edge edge inserted an randomly inserting a randomly probability in a triangle of instead a walk be two-hop to via wedge a closes edge new in probability distribution degree from vector sampling in balanced triangles of fraction in positive being links of fraction on based vector degree node for neighbors of set vertices between edge undirected Descriptions n hn ihaparameter a with then, and G  atvrato h hn-umdl C 12,i rpsdt create to proposed is [112], FCL model, Chung-Lu the of variant fast A . 2 " Δ Δ 9 8 9 8 A0=3>< CA80=6;4 aus hr o aheg ohicdn etcsaeaddto added are vertices incident both edge each for where values, ( (   ) ) 3 2 8 " 3 9 cosalpsil edges possible all across cosalpsil edges possible all across E E where #(aacd triangles] (balanced) [# triangles] (balanced) of [# E  8 where 60 3 4 d 8 9 8 efrsatohpwl oslc h second the select to walk two-hop a performs , stedge fnode of degree the is # # i h eg lsn procedure closing wedge the via G 2 π 3 E G 2  8 8 de e de otentok(sdn in done (as network the to added get edges  de r lcdi h eeae network generated the in placed are edges nfrl,sneti iuae h degree the simulates this since uniformly, and stedge of degree the is (i.e., E π G 9 nta,TLocsoal ik a picks occasionally TCL instead, , " > E  + spositive is  / 4 " 9 8  ) E E 8 8 and G > " " G de.However, edges. stenme of number the is  = G ( + >  , E  ) G as >

60 loihs nln fAgrtm41 efis construct first we of 4.1, learning Algorithm parameter of the 1 and line process On generation network algorithms. the both discussing processes level later high before the BSCL through step of we Here 4.1. Algorithm in shown is (BSCL) model Chung-Lu rpriso h nu ewr eamt rsre hs nld h ecnaeo oiielinks positive of percentage the include These preserve. to aim we network input the of properties of use the through perspective. created sign be will that edges negative or positive of bias using of introduce (instead we probability Therefore, corrected network. a input the of distribution sign true the from deviating on based sign the choose simply we if network the and (i.e., perspective) perspective sign sign local global (i.e., the theory on balance not on based is closure wedge for sign edge the mining triangles of percentage networks varied [4]. signed a balanced have all being can not networks since real-world fact necessary in is and This balanced, able completely networks. is are signed model in our balance being parameter, of this triangles range of the a introduction capture of the With to majority balanced. the are ensure edge to new this sign by edge created parameter the a assigning introduce of we probability Thus, the denotes vertices. two be these could between there neighbors but walk), common two-hop other our (through constructed explicitly only we not wedge are triangles single we these procedure, the closure of closing wedge the most performing and when networks that, Note signed theory. in balance the to property adhere mentioned, key a previously is as triangles However, local formed of the process. distribution also construction and the distribution during degree coefficient the clustering maintaining for mechanism the allows automatically walk. two-hop the by created procedure) closing wedge (i.e., wedge the off closing E ihteitouto ftreprmtr (i.e., parameters three of introduction the With deter- of process above the However, distribution. sign maintain to want also we Meanwhile, which model, TCL the on based is (BSCL) model Chung-Lu Signed Balanced proposed The ecncntuttevre apigvector sampling vertex the construct can we , [ .Ti mle htwe admyisriga deinto edge an inserting randomly when that implies This ). [ o admyisre ikadi sdt orc the correct to used is and link inserted randomly a for ) 61 [ hnti ol edt u eeae networks generated our to lead could this then , π d ssono ie2 etw aclt the calculate we Next 2. line on shown as , U and E hn sn h eredistribution degree the using Then, . V ,tepooe aacdsigned balanced proposed the ), V hc sfo h local the from is which U hc is which , V which ,

61 potnte o w-o ak ocet rage.W oeta fe ahieainfo ie 3 lines from iteration each after that note 17, many We to be not triangles. will closing create there wedge to sparse, the too walks initially performing two-hop is for when network fact opportunities starting the the to if 10), due to is 5 1 lines with line (from starting procedure on for FCL reason from The edges inserted. of edge set new initial each this for network the in edge oldest add the we removing 17, to 3 lines from Next, network. input on based signs, edge assigning itiuin hn nln ,w pi h nindegsit w sets, two into edges unsigned the split we 2, line on Then, use set distribution. we a 1, of line construction on the for First, method FCL properties. the network signed key the maintaining network signed synthetic for values parameter the Given BSCL for Generation Network 4.1.3 learned. efficiently and automatically be can parameters these how discuss then and BSCL by ae ntelan aaeeso ie7adte upttecntutdsnhtcsge network signed synthetic constructed the output then and 7 line on network parameters the learnt generate the we Finally, on 4.1.4. based subsection in discussed be will that algorithms learning our including BSCL of parameters major the estimate will we [ G etro degrees of vector , 7 6 5 4 3 2 1 > loih 4.1: Algorithm ntenx uscin ewl ics h eal ftentokgnrto rcs performed process generation network the of details the discuss will we subsection, next the In . Δ d [ π Output: Input: E E ,U V U, d, >  +  ← ← ← G , = ← E > Calculate_Degree_Vector( E " apigvco ae ntedge itiuinin distribution degree the on based vector Sampling > − anan h orc oa ubro edges, of number total correct the maintains ecnaeblne rage in triangles balanced Percentage  + ←  + indNetwork Signed " ← + E ∪ ytei indNetwork Signed Synthetic  + " Parameter_Learning( Network_Generation(  −  − aacdSge hn-u(SL Model (BSCL) Chung-Lu Signed Balanced d , n ecnaeo aacdtriads balanced of percentage and G  = ,U d, [ uhta h ecnaeo oiielnsmthsta fthe of that matches links positive of percentage the that such , ( + + E  ,", [, and   , , [, , E E  + G ) , V Δ > E π eso nAgrtm42hwBC a eeaea generate can BSCL how 4.2 Algorithm in show we ,  = G  − ,U V U, d, , , E  ) d ( + > " , 62  " fMegs hc dee oteoiia degree original the to adheres which edges, M of , E ) e de otentok n tatm,while time, a at one network, the to edges new ) > + , E " > − . Δ ) d  , U rmlns3t .Wt hs values, these With 5. to 3 lines from E and  V smnindo ie6using 6 line on mentioned as E > + and E > − yrandomly by ,

62 ewr ae ntettlblnei h nu indntok(i.e., network signed input probability the with in balance total the on based network parameter that neighbors common other any with triangles vertices of composed and h eeto of selection the procedures. insertion edge two these discuss further will we Next use. parameter our on use based we sign 5, its line On select and distribution. edge random a insert or balance, the E 18 17 11 15 13 12 16 14 10 8 1 3 2 5 4 9 7 6 loih 4.2: Algorithm 8 hog neighbor a through h eg lsn rcdr sslce ihprobability with selected is procedure closing wedge The using and triangle a into wedge a closing by edge an insert either will We return for E E 4 > > + 9 : , = oM to 1 eoeods defrom edge oldest Remove else if E E ocoeit rage ent htatog eaeepiil osrcigtetriangle the constructing explicitly are we although that note We triangle. a into close to 8 > ! − wedge_closing_procedure apefrom sample = V else if else if E E ← E netarno edge random a insert o eemnn fw huditouemr aacdo naacdtinlsit the into triangles unbalanced or balanced more introduce should we if determining for 9 9 create_positive_edge close_for_balance( > + apefrom sample = efr w-o akfrom walk two-hop Perform = do ( admypartition Randomly , Add Add E E M, E E egbr ohv oeblne triangles balanced more have to neighbors > > − + V 8 > − BSCL_Network_Generation( ecos oslc h desg of sign edge the select to choose we , nfrl trno from random at uniformly π E ← E ← 4 4 ) 9 8 9 8 E E 8 to to > + > − , : π E { ∪ { ∪ E E oln on land to : > + > + and 4 4 π or or 9 8 9 8 } } E E V E {E > ) − > − 9 ( E then U ae ntesg htcoe h eg n te common other and wedge the closes that sign the on based ( htedge that ohv oeublne triangles unbalanced more have to > + > E d ) E ∪ ) ae on based 9 then ehv utslce h eg ossigo edges of consisting wedge the selected just have We . then > − } E π respectively d 4 8 hn nln ,w efr w-o akfrom walk two-hop a perform we 6, line on Then, . 9 8 hog neighbor through ," ,d ,V U, d, c, ", [, 63 odtriewiheg neto ehdw will we method insertion edge which determine to [ E ol loipiil ecoigwde oform to wedges closing be implicitly also would 8 and E 4 9 9 8 ih ae ec,w s u learned our use we Hence, have. might uhta h aoiyo h triangles the of majority the that such d ). nln ,btsat nln with 4 line on starts but 5, line on E U : ocretymiti h sign the maintain correctly to Δ  .Teeoe nln 7, line on Therefore, ). V ohl maintain help to 4 8:

63 probability network. generated the into triangles unbalanced (1- probability with Similarly, respectively. uu sepy hnw rce osml from sample to proceed we then empty, Then, is queue. queue the from to edge added an are selecting vertices the time collision, each a before such have network we the time in every exists For already that self-loop). edge a an or insert to selecting (i.e, collisions having when for queue a and positive resulting the return sets can edge generator negative network 17 the and to removed 3 been lines have from will FCL loop from this performing After from. selected was it (i.e., sets edge negative and positive maintains it that such select and 16 line to go we insert closing wedge the during made selections by sign controlled local procedure the from induced bias the parameter incorporates learned using it that than our rather use therefore we and selection, distribution sign sign the global the disrupt will procedure closing edge the distribution, for sign sign correct the the maintain to network generated from our desire sampled we since is However, network. vertex second a 12, line on balance whether on depending 8, line suggest on would mentioned theory As theory. balance to adhere common will other through neighbors) implicitly and walk two-hop the through explicitly those (both created being fntpromn h eg lsn rcdr,BC ilisedisr admeg with edge random a insert instead will BSCL procedure, closing wedge the performing not If n tpw i o eto nAgrtm42fres fdsrpini htw lomk s of use make also we that is description of ease for 4.2 Algorithm in mention not did we step One network generated the in edge oldest the remove to is step next the insertion, edge After 4 9 8 sapstv ikadadi oteset the to it add and link positive a as ( 1 − d ) E hspoessat iial sln yslcigtefis vertex first the selecting by 4 line as similarly starts process This . > + " 4 4 and 9 8 9 8 V de.Ln 7sosta eslc h leteg rmteuino the of union the from edge oldest the select we that shows 17 Line edges. hrfr,wt probability with Therefore, . ed ocrflyb eemnd speiul icse,tewedge the discussed, previously As determined. be carefully to needs obigpstv rngtv,w iladteeg oteset the to edge the add will we negative, or positive being to E 4 > − 9 8 respectively. , ob eaieadteeoeadi otesto eaieedges negative of set the to it add therefore and negative be to E > + E ∪ π ie nlns4ad1) h uu scekd fthe If checked. is queue the 12), and 4 lines on (i.e. V > − ,tesg of sign the ), n hnrsetvl eoei rmteeg set edge the from it remove respectively then and ) π 64 E π uhta ecnte netedge insert then can we that such > + oee,i h uu snnepy hnwe then non-empty, is queue the if However, . U nteohrhn,wt probability with hand, other the On . eaannt that note again We . U nln 3 ecos og oln 4and 14 line to go to choose we 13, line on , 4 9 8 ilb eetdt nrdc more introduce to selected be will " ie,alteiiiledges initial the all times, U ilb ertsuch learnt be will 4 9 8 E E > + 8 ( nothe into Then, . 1 or − [ E E > − U G for > − . ) > , ,

64 au of value if 1 be to function indicator an edge the let edge specifically, each More to assigned triangle. variable latent a the the into be to closed added being was wedge edge a defining the through after whether or learned randomly determine be network which can edge, it each that with is associated idea variable general hidden The a [102]. model TCL the in process similar a parameter the For Learning 4.1.4.1 these learning for algorithm proposed the discuss to iteratively. we and edge alternatively next inserted parameters Hence, perspective this via sign created unbalanced. global being or the are balanced on triangles be solely whether based of perspective is the local insertion because the edge is ignores random This and a network. of the sign in balanced the are for that decision triangles of percentage the when and on Similarly, triangles based of sign perspective. a sign with local edge the random on a based inserting only are when decisions example, these For since on distribution other. (based unbalanced each or to balanced related be are to triangles parameters constructing these that notice We network. signed based process parameters generation network the and on model BSCL the introduced have we subsections, last the In BSCL for Learning Parameter 4.1.4 two a perform to unable if queue vertex the from utilize walk we Similarly, hop queue. the of front the from take instead I 9 8 = Let 0 niae htteeg a rae i admsmln from sampling random via created was edge the that indicates π 4 d 8 9 8 ersn h rbblt fselecting of probability the represent titeration at a rae hog h w-o akwdecoigprocedure. closing wedge walk two-hop the through created was d emk s fteEpcainMxmzto E)lann ehdfollowing method learning (EM) Expectation-Maximization the of use make we , ,U, d, d E 8 C etw ildsushww a er h parameters the learn can we how discuss will we Next . uigteE rcs.Nx eaayetetopoeue fwedge of procedures two the analyze we Next process. EM the during and V eew ics o olanteeprmtr rmteinput the from parameters these learn to how discuss we here , E 9 si h egbrstof set neighbor the in is 4 9 8 hs aetvralscnb qa o1o ,where 0, or 1 to equal be can variables latent These . U 65 hshsteptnilt irp h distribution the disrupt to potential the has this , E 8 rmtesmln vector sampling the from E : n tews,and otherwise, 0 and V ,ti ildsuttegoa sign global the disrupt will this ), π and I 9 8 π ,U, d, 8 = , I 1 [ d E ugssthat suggests and C 9 eoethe denote ∈ V I # . 9 8 : ] ∈ as /

65 htwr deigt aac hoy ese oapoiaeteepce ubro triangles of number expected the approximate to seek We theory. balance to adhering were that calculated have we that Note Learning 4.1.4.2 in edge edges of set fact a sampling via calculated be can expectation of edge expectation the probability the over closure wedge by of probability the calculates which of probability with represented is (that procedure closing wedge or insertion random the either for method the to of walk neighbor two-hop mutual a perform to able were we probability the probability with insertions random the for selecting (1) following: the on node) selected based first probabilities (i.e., node starting a given insertion random or closing a omlt h odtoa rbblte o lcn h edge the placing for probabilities conditional the formulate can selecting I 9 8 r sflos respectively: follows, as are ) o h aclto fteepcainof expectation the of calculation the For I 9 8 S scniinlyidpnet ecnidvdal aclt h xetto of expectation the calculate individually can we independent, conditionally is E E n hntk h vrg costesto de ape as: sampled edges of set the across average the take then and 9 9 rmthe from stescn oewt probability with node second the as I % I 9 8 9 8 ( I a edfie sn h ae’Rl sfollows: as Rule Bayes’ the using defined be can 9 8 to V E = 8 E 3 and % % : 1 [ I | ( ( egbr of neighbors 4 9 8 4 4 9 8 9 8 9 8 E | d E , 9 | | C I I Δ (i.e., ] 9 8 9 8 8 d ,  = = = C rmteiptntokta eoe h ecnaeo triangles of percentage the denotes that network input the from ) % 1 0 E I = E , E , ( 9 8 : ? I C E 9 8 8 8 ∈ + % en ae ntepoaiiyo h debigcreated being edge the of probability the on based 1 being d , d , : 1 ( nearvn ttemta neighbor mutual the at arriving once ) # = 4 = C C 9 8 I ) ) 8 9 8 1 and S 1 = = | I | 4 given 9 8 4 ( d 9 8 Õ 9 8 66 1 C E = E , 4 π ∈ E − : 9 8 S : % Õ 8 1 8 2 h eg lsn ihprobability with closing wedge the (2) ; ∈ d d , E d ∈ E , ( sepce ogtcetd hslast the to leads This created. get to expected is # C 4 C [ )( , 8 # 9 8 8 C I d , 4 ) 9 8  π utemr,temxmzto o the for maximization the Furthermore, . | 9 8 I I n hntewl otne to continues walk the then and ) | 9 8 C [ 9 8 d ) n h trignode starting the and , + ) E S C E 9 ] = nfrl from uniformly 9 3 ∈ % 1 4 8 sbsdo rthaving first on based is E , ( 9 8 # 4 : 9 8 8 given d , ] |   I C 9 8 ) 3 1 = d : h trignode starting the ,  E 0 8 E , ecncluaethe calculate can We . E 8 d , hn u othe to due Then, . E E C : 8 ) h conditional the , hrfr,we Therefore, . ( I E 1 9 8 : − o each for hti a is that E d 9 E d ) 8 (4.2) (4.1) (i.e., and and and

66 lsn rcdr r aacd hnw a solve can we we then if balanced, and are procedure values closing mentioned above the calculate can we let Then, network. input the of balanced the percentage be should methods two the from percentage balanced combined the states simply which desire we network, synthetic the in following: balanced the being triangles of percentage the maintain as correctly balanced be to expect we these Δ of percent what calculate will we Furthermore, utat1from 1 subtract both be edge the if created vertices two between neighbors added been probability have with will edge network each the Furthermore, into them. to assigned randomly signs edge and method estimate to how discuss we Next, methods two these for calculate we values the denote us Let as network. the average to on added methods edge insertion each edge for random the and closure wedge the through construct will BSCL E ; CA80=6;4 G Δ Δ ∈ Δ  ooti h ubro omnnihosfor neighbors common of number the obtain To Estimating 9 8 A0=3>< CA80=6;4 G E CA80=6;4 G + 8   and \{ eal festimating of Details . E 8 E . E , and 9 = oeta fe aigtepoaiiyo h xsec o h rtedge first the for existence the of probability the having after that Note . 9 } V  3 Δ sacmo egbrbsdo h rbblt hr xssa defrom edge an exists there probability the on based neighbor common a is Δ ; random G ic ehv led odtoe nteeitneo h rtedge first the of existence the on conditioned already have we since , CA80=6;4 G 4 A0=3>< G 9 8 a netdit h ewr hr ednt hsnme ftinlsto triangles of number this denote we where network the into inserted was ent httesatn e fegsaecntutdwt h FCL the with constructed are edges of set starting the that note We : hc eoe that denotes which , epciey hc ilb acltdwt epc oboth to respect with calculated be will which respectively, , V = Δ E 8 Δ Δ  and Δ A0=3>< ? G CA80=6;4 G Δ 9 8  CA80=6;4 G = E = 9 Δ Δ ol eeuvln otenme ftinlsta get that triangles of number the to equivalent be would , 3 2 , CA80=6;4 CA80=6;4 G G 8 Δ " 3 Δ  A0=3>< G 9 + Δ A0=3>< G ent htteepce ubro common of number expected the that note We .  67 V CA80=6;4 Δ G ecn ftetinlsw ls i h wedge the via close we triangles the of percent A0=3>< G V + + n bantebelow: the obtain and and Δ Δ E and , 8 A0=3>< A0=3>< G G and   Δ − CA80=6;4 G Δ E Δ A0=3>< G 9 A0=3>< G ecluaetepoaiiythat probability the calculate we ,   . ilb icse ae.To later. discussed be will Δ 4 CA80=6;4 G 8;  emust we , d 4 8; and thus , E (4.3) and ; U to .

67 follows: h oe.W oeta h bv ol require would 2 above the that note We model. the of value average the present we Next in rewrite can therefore We includes where causing 0E6 9 " = $ is ent htw nyne ocompute to need only we that note we First 8 ( = ( 3 + # 2 Δ # 1 ) ) E A0=3>< G to E ersnsteaeaevleo qae ere.Te ehave: we Then degrees. squared of value average the represents ∗ ; ie.Scn,for Second, time). 8 ohv n esopruiyt onc to connect to opportunity less one have to 0E6 # and ecniseduednmcpormigt osrc vector a construct to programming dynamic use instead can we , ( E 3 ; E sue odnt h vrg rage osrce yarnol netdeg in edge inserted randomly a by constructed triangles average the denote to used is ∈ ) 9 + ecnuetefloigapoiaini etettesmainsc htit that such summation the treat we if approximation following the use can we , nta fecuigte.W use We them. excluding of instead Õ \{ E 8 ,E 9 Δ Δ } Δ A0=3>< G A0=3>< G Δ  9 8 A0=3>< 3 A0=3>< G ; Í ( 3 2 8 # ; = " − 1 − sfollows: as ≈ 1 = = 1 = 0E6 3 ) 0E6 E  Δ 8 ;  3 2 1 2 ∈ 9 8 A0=3>< Í 8 # = = = ≈ + " ( 3 ( Õ # 3 \{ 9 ( 3 9 E  = ( Õ ) # ; 2 1  0E6 E 3 8 0E6 "# ∈ + 8 − ) 1 2 E ,E + 1 − 0E6 ; 68 + ∈ 3 9 cosalpsil nree ar fvrie as vertices of pairs unordered possible all across  ( 1 ( + } 0E6 ( 3 3 9 3 3 ) $ Õ 0E6 # \{ ahrta trtn vrtense u of sum nested the over iterating than rather , (  2 ; # 2 2 2 3 # Õ 3 ( 8 ) 2 − ) ( E = + · · · + − 3 ) 2 # 8 − E # ( 8 ∗ " 1 3 ,E ; " 3 ( and 1 9 1  3 0E6 ; 3 0E6 efruaeti daa h following: the as idea this formulate We . − ) 0E6 9 9 ) )   − ) Õ } = 1 # # iet opt,btuigtefc that fact the using but compute, to time 8 Õ 8  0E6 + 3 ) = ( ( − 3 0E6 ( 1 3  3 1 3 9 1 3 ; 2 Δ ( 2 # ) ) ( ) 2 3 " 9 ( 3 2 Õ 9 8 A0=3>< ( − ) = odntsteaeaedge and degree average the denotes to  3 ( " ; # ; " 8 3 2 + − − ) ) 1 # 1 ne(hc a eperformed be can (which once 1 3 3 ) )  8 1  3  + · · · + 9 s 3 where # ) B 8 represents (4.4)

68 egs(.. omnnihos ob n ftefloigformations: following the of one be to neighbors) common (i.e., wedges ol edt aeasg uhta hr r nee ubro eaielnsi h resulting the in links negative of number even edge an third are added there the that triangle, such balanced sign a a to have close to to need edges would existing two with wedge a for where probability link positive corrected randomly, are: types wedge the all for use we (where Below, distribution positive). sign original then the and by network, created parameter were the original wedges with the distribution of this distribution maintain correctly sign to the attempt match we perfectly to FCL signs from edges edge with model select our and initialize first we that Note respectively. negative, and positive are Í rage hnadn h edge the adding when triangles using vector the in filling ieisedof instead time vertices of number {− # 9 , = Estimating h xetdnme fblne rage htwudb rae fteedge the if created be would that triangles balanced of number expected The −}) 8 + 1 where , 3 9 ecncntutti vector this construct can We . Δ  9 8 A0=3>< $ {+ Δ ( A0=3>< G , # #  −} a eotie i h xetdnme fwde fdffrn ye n the and types different of wedges of number expected the via obtained be can , 3 hrfr h eo prxmto for approximation below the Therefore . ) . sue orpeettewdefre yedges by formed wedge the represent to used is efrhraayebyn u aclto of calculation our beyond analyze further We : Δ Δ Δ Δ Δ B 9 8 A0=3>< 8  9 8 9 8 9 8 9 8 A0=3>< A0=3>< A0=3>< A0=3>< − Δ 1 A0=3>< G = 4 9 8 B +− U 8 −− +− ++ = n eefre ihawdeo type of wedge a with formed were and +( + as: orpeettenme fwde htwudb lsdinto closed be would that wedges of number the represent to U = Δ = 3 ≈ = 1 Δ 8 s [[ hc a epromdi iertm nrlto othe to relation in time linear in performed be can which , − ( 0E6 9 8 A0=3>< 0E6 trigwith starting 1 9 8 A0=3>< U Δ − ) 9 8 A0=3>< ( Δ ( [ 3 3 )( 9 8 A0=3>< ) 69 2 ++ "# 1 − ) −+ − ( + = 0E6 ( [ # −+ ) 1 B [ Δ 8 − ( − ( 9 8 A0=3>< = 1 + 3 U 1 − U ) 3 ) ) Δ # Δ [ # Õ 8 Δ ) 9 8 A0=3>< = 9 8 A0=3>< [ when − Δ 1 A0=3>< G 1 stepoaiiyo ikbeing link a of probability the is 9 8 A0=3>< 3 8 B 8 8 −− +− U = ec easm htall that assume we hence ; Δ a epromdin performed be can 4 # 8; A0=3>< G − ({+ {+ and 1 , , n hnrecursively then and −} +} 4 9 ; yeaiigthe examining by h definitions The . , n hi signs their and {+ 4 9 8 , −} sinserted is , {− $ (4.5) (4.6) , ( +} # ) ,

69 ecnaefrbt h eg lsn n h admeg neto,wihaedntdas denoted are which insertion, this edge examine random will the we and Therefore, closing [ wedge edges. positive the of both percentage for the percentage estimate to want we Here Learning 4.1.4.3 calculate also can we Then of formulation the simplify can we (4.4), Eq. in approximation the as Similarly, as edges neighbor the common with common wedge selected one a the forms denote this which us discover Let to insertion. both edge from closure wedge coming the links for the neighbor of one used explicitly of already degree have the we discount however must we that Note above). of created being neighbors be would triangle common that one triangles other of least number by expected at randomly the have add we also to that need such then We vertices time. wedge select each this created to for guaranteed idea are main we The that procedure. is closing closure wedge the using when percentage balanced the of calculation the edges. for all extended across be averaging also can This theory. balance to according triangle, CA80=6;4 Estimating and [ A0=3>< Δ Δ Δ CA80=6;4 G 9 8 CA80=6;4 CA80=6;4 G Δ U 9 8 CA80=6;4 epciey hn fw aeteetovle,w a orcl maintain correctly can we values, two these have we if Then, respectively. , iial,w ilcluaeteepce oa ubro rage and triangles of number total expected the calculate will we Similarly, : = = ≈ Δ 1 1 CA80=6;4 G ≈ 1 + + + 1 E  ; 3 + 0E6 ∈ 0E6 8 + 3  \{ 4 3 9 iia to similar Õ ( 82 8 ( E − 3 3 3 8 ,E ) and 9 2 2 3 "# − ) 9 8 − " ,E E − 2 3 2 8 4 0E6 3 } 8 ( " 9 2 and # −  9 Δ 70 . ( + − 3 A0=3>< G 3 ( 1 3 8 9 E 1 2 ) −  + 9 ) " E smlrt h admeg neto case insertion edge random the to (similar 1 1 # Õ 8 ; = ) ∈   − hc eut ntefollowing: the in results which , 3 1 + 1 ; \{ 0E6   Õ ( E E 3 8 ( 8 ,E 8 ( 3 and − 3 9 0E6 9 ,E 2 1 − − ) 2 )( } E 1 2 ( B  3 )( 9 " 0E6 8 3 ) y1 ic nti method, this in since 1, by 3 − ; ( ; # 3 2 ( − 3 ; " + 1 ) − )  8 1  ) )  Δ  9 8 CA80=6;4 Δ A0=3>< G  as: E by 2 ,

70 netn oiieeg ihtewdecouet etefollowing: the be of to probability closure the wedge denote the we with Therefore, edge later positive the insertion. a that link inserting positive triangles a unbalanced adhere in more result to construct would link we types positive wedge when a two be require would two it first while the theory; while balance and to sign edge third the controlling be would a in result probability would with {-,-} edge P({+,+}), positive and be {+,+} to wedge probability network the with created that the being note in edge we positive existing Next of probabilities P({-,-}). their and P({-,+}) define P({+,-}), we Then {-,-}. and {-,+} construct will method insertion random insert the will while procedure network closing generated wedge the the that fact the to due is above The following: the as network synthetic the in links positive of percentage the ecnteeoerwieE.48as: 4.8 Eq. rewrite therefore can We ecntutt epstv n hspoeswl happen will process this and [ positive be to construct we and that note We A0=3>< o h eg lsr,w xmn h rbblt ftefu ye fwde:{,} {+,-}, {+,+}, wedges: of types four the of probability the examine we closure, wedge the For et eso o ocalculate to how show we Next, V r orcl ovd hnteepce rbblt o h egsi ae on based is wedges the for probability expected the then solved, correctly are = ( 1 d − stepoaiiyo efrigtewdecoigpoeue fw suethat assume we If procedure. closing wedge the performing of probability the is d ) U ecnnwsubstitute now can We . [ CA80=6;4 [ CA80=6;4 ( 1 [ − = = = V d[ d [ ) d  h esnfrti sdet h atta aac theory balance that fact the to due is this for reason The . A0=3>< CA80=6;4 ( V  1 ( V % 1 − ( ({+ − [[ V V [ entc that notice We . ) hl eg +- n +- ol nypoiea provide only would {+,-} and {+,-} wedge while , V CA80=6;4 ( + ) , ) ( + 71 % } + +}) [ ({+ 1 ( 1 1 − , − − } + −}) % and d [ [ ) ({− )( [ ( + ) A0=3>< [ 1 , A0=3>< % ( − −}) 1 1 ({− [ − − U )   [ , d ilb h ecnaeo links of percentage the be will ) +}) ) [ noE.47adslefor solve and 4.7 Eq. into  ecn ftetm.Thus, time. the of percent    d ( 1 ecn ftelnsinto links the of percent − d ) percent. [ and ( 1 − (4.7) (4.8) (4.9) U [ as ) U .

71 $ aiypromduigcasclmtosin methods classical using performed easily follows: erei h ewr[1] h erigpoesfrteparameter the for process learning The network[113]. the in degree in theory, balance to the adhering for and balanced needed positive, determine time being to edges the is of algorithm then probability learning and the the for algorithm needed learning preprocessing The the process. of generation time network running the discuss first We BSCL of Complexity Time 4.1.5 xetdnme ftinlsaddb aho h rcse fBC,wihtakes which BSCL, of processes the of of each by added triangles of number expected of time running and The method iteration. EM the in iterations of number nytksasalcntn ubro trtost ovre,w aeteoeallann time learning overall the have we converge), as to BSCL iterations for complexity of number constant small a takes only in performed be both for can (4.10)) and (4.3) Eqs. (i.e., equations srdcdt h opeiyo omnnihosbtentovrie,wihi nw obe to known is which vertices, two closed, between being neighbors triangles common of of set complexity the the on to based reduced selection is sign best the determining of process closing sbituo h atta h unn iefrTLi hw obe to shown is TCL for time running the that fact the upon built is ( $ $ 3  <0G 2 ( 0 ( " # aiu trtoso h lentn paepoesbetween process update alternating the of iterations maximum 3 ) ) However, . ) hstegnrto rcs fBC is BSCL of process generation the Thus . u oteapoiainue n yai rgamn prah hnteupdate the Then approach. programming dynamic and used approximation the to due Δ  a erdcdtecmlxt ftinl itn loihs hc a be can which algorithms, listing triangle of complexity the reduced be can $ U ( + ( <8= = 1 ( − ( V 1 < − V 1 and 3 ) / d 2 [ ) <3 , U (

1 [ a edtrie sflos eiiilycluaethe calculate initially We follows. as determined be can Δ [ − − <0G n h rbblt ftinlsi h ewr being network the in triangles of probability the and ,  [ $  fteoiia ewr.W a determine can We network. original the of , ( + ) dV ( + ) B <8= 72 = ( 1 # [[ ( $ − 2 | " S ( + ) ( [ + | # 3 ) stenme fegssmldfreach for sampled edges of number the is / B [ 2 +  1 "3 ,  + "3 − !  [ 0 ) <0G <0G )( 2 h eeainpoeso BSCL, of process generation The . 1 $ $ )) − ) ( . ( 1 where , # [ ) ) U +  ie hswe allowing when Thus time. d and " is ) 3 $ n[0] h triangle The [102]. in V <0G ( wihempirically (which B ) stemaximum the is where $ ( # [ ) trivially  instead (4.10) sthe is

72 lh,BtonOC n pnos epoiemr eal ftedtst nTbe42 Note 4.2. Table in datasets the of details more provide We Epinions. and Bitcoin-OTC, Alpha, eaint h desgsi h rage) u eut r h vrgdrslso 0generated 10 of results averaged the dataset. each are on results methods Our the of (in each triangles). distribution for the networks triangle in the signs and edge distribution the coefficient to clustering Note relation local theory. the balance present by also suggested we triangles that balance/unbalanced of proportion (3) positive/negative (2) and distribution; ratio degree (1) link - properties we specifically, network signed More key three networks. the signed on of focus well dynamics will how underlying determine the to capture metric to a able as are used models be the will properties These baselines. the and model our networks generated from resulting the of properties network the compare to are experiments of set first The Experiment Generation Network 4.1.6.1 of directions the ignore we datasets. networks, these signed in links unweighted signed and undirected on focus we since that, network? signed input the from learning values parameter parameter appropriate the proposed the is the learn (2) to can and able (1) algorithm - properties? experiments network our signed via maintain questions effectively two BSCL, answer model, to try we particular, In network signed proposed model. the of effectiveness the evaluate to experiments conduct we section, this In Experiments 4.1.6 h rtgopo w aeie r xsigsge ewr models: network signed existing are baselines two of group first The Bitcoin- i.e., datasets, network signed three utilize we modeling, network signed of study our For • ns4 hsmto sa neato-ae oe o indntok ae nuigants using on based networks signed for model interaction-based an is method This Ants14: al .:Saitc ftresge oilntok o eeaiemodeling. generative for networks social signed three of Statistics 4.2: Table Bitcoin-Alpha Bitcoin-OTC Epinions Network 131,580 5,901 3,784 N 73 7120,0.830) , (711,210 2,2 0.867) , (21,522 0.915) , (14,145 (E, [ ) 0.892 0.869 0.862 Δ 

73 in oteegssc httegoa indsrbto smitie using maintained is assign distribution randomly sign then global and the model, that such baseline edges the the run to links, signs the ignoring by unsigned to network the for performed was search grid a Evo07, for parameters. Similarly, two the [114]. in reported values the to according a ici-lh oa Clustering. Local Bitcoin-Alpha (a) d ici-lh ereDist. Degree Bitcoin-Alpha (d) h ettobslnsaebituo w oua nindgnrtv oes efis convert first We models. generative unsigned popular two upon built are baselines two next The parameters 6 its for space parameter the on search grid a perform we Ants14, for that Note • • • Ko:Ti ehdi rmteusge rnce rdc oe [99]. model Product Kronecker unsigned the from is method This SKron: [102]. model TCL unsigned the from is method This STCL: that parameter a also and [115]. unbalance links of negative amount maximum or the positive controls of “friendliness” probability a the had controls that networks that signed index for model evolutionary an is method This Evo07: olypeooeo de [114]. edges on pheromone lay to iue41 iulzto ftedge itiuin n oa lseigcoefficients. clustering local and distributions degree the of Visualization 4.1: Figure b ici-T oa Clustering. Local Bitcoin-OTC (b) e ici-T ereDist. Degree Bitcoin-OTC (e) 74 c pnosLclClustering. Local Epinions (c) f pnosDge Dist. Degree Epinions (f) [ .

74 ftid nteBtonApa ici-T,adEiin aaesi al .,Tbe46 and 4.6, Table 4.5, Table in datasets Epinions and Bitcoin-OTC, types Bitcoin-Alpha, four the the separating on by comparison triads fine-grained of a show further We proportion the network. of the terms in in balance best the of performs Ants14 the dataset, Bitcoin-OTC the in Then triangles. two the are which SKron and STCL models. to network BSCL unsigned modified of comparison a with follow then network also signed existing and two methods, the to comparison a make We triangles. balance/unbalance network. proportion input original the of that near not but clustering, some has perform model STCL with SKron along The BSCL best. model can the proposed findings Our poor coefficient. similar clustering local existing models the two network for the signed found be existing as two poorly the as For perform not baselines. not does network is but signed SKron distribution, that degree mention the We model distribution. exactly power-law very to a perform able follow Evo07, to and appear Ants14 even not baselines, network do signed and poorly two the that seen distribution. be degree based the can maintain both it closely However, that are very see they can therefore We as and distribution model degree 4.1. Chung-Lu Transitive the Figure the on on in identically seen near be perform both can STCL be and can BSCL coefficient) clustering local the and distribution nBtonApadtst u oe SLi bet civ h lss rprino balance of proportion closest the achieve to able is BSCL model our dataset, Bitcoin-Alpha In the present we 4.4, Table in while ratio; link positive/negative the show we 4.3, Table In degree the (i.e., networks unsigned with common in are that properties the of results The al .:Pooto ftinlsblne ngnrtdsge networks. signed generated in balanced triangles of Proportion 4.4: Table boueDifference Absolute ecn Balanced Percent Bitcoin-Alpha Bitcoin-OTC Epinions boueDifference Absolute al .:Pstv/eaieln indistribution. sign link Positive/negative 4.3: Table Bitcoin-Alpha ik Positive Links Bitcoin-OTC Epinions 0.892 0.869 0.862 Real 0.830 0.867 0.915 STCL/SKron Real 75 0.484 0.644 0.698 0.786 Ants14 0.401 0.930 0.740 0.741 Ants14 0.174 0.939 0.817 0.787 Evo07 0.004 0.830 0.869 0.917 Evo07 0.557 0.639 0.677 0.750 BSCL 0.031 0.808 0.860 0.912 BSCL 0.321 0.748 0.752 0.802

75 h aeie ntrso h ragedsrbtos hl nya h xes fsacrificing percentage, of link positive expense correct the than the at performance matching only of better while terms achieve distributions, in to triangle able the is of Note BSCL terms model in 4.3. baselines Table our the of datasets, row Bitcoin difference the absolute of the both in in seen that be can which network, compared signed as input a network the the at in to positive comes being this links of that percentage observe inconsistent very can a we having of BSCL), tradeoff than difference signed absolute three smaller the a across balanced (having being Ants14 networks triangles the of although percentage Furthermore, the resembles 4.1(b). closely Figure more in method plot coefficient clustering local networks the output Ants14 in the seen in as clustering overall low drastically triangle a the notice of we terms Similarly in overall distribution. best the performs model our However, types. triangle distribution four the the changing among drastically by this achieves Ants14 that notice We respectively. 4.7, Table al .:Dsrbto fsge ragetpsi h ici-lh dataset. Bitcoin-Alpha the in types triangle signed of Distribution 4.5: Table al .:Dsrbto fsge ragetpsi h ici-T dataset. Bitcoin-OTC the in types triangle signed of Distribution 4.6: Table boueDifference Absolute al .:Dsrbto fsge ragetpsi h pnosdataset. Epinions the in types triangle signed of Distribution 4.7: Table boueDifference Absolute Difference Absolute ra Type Triad {+,+,+} {+,+,-} ra Type Triad Type Triad {+,-,-} {-,-,-} {+,+,+} {+,+,+} {+,+,-} {+,+,-} {+,-,-} {+,-,-} {-,-,-} {-,-,-} 0.009 0.145 0.122 0.724 0.013 0.084 0.096 0.808 0.004 0.069 0.134 0.793 Real Real Real STCL/SKron STCL/SKron STCL/SKron 0.158 0.001 0.020 0.213 0.766 0.511 0.005 0.072 0.351 0.572 76 0.356 0.002 0.046 0.300 0.652 [ Ants14 Ants14 fteiptntok.Terslsare results The networks. input the of , 0.694 0.013 0.341 0.200 0.446 0.243 0.000 0.010 0.061 0.929 Ants14 0.558 0.013 0.372 0.170 0.445 Evo07 Evo07 0.232 0.000 0.000 0.250 0.750 0.507 0.012 0.052 0.349 0.587 Evo07 0.401 0.000 0.064 0.323 0.613 BSCL BSCL 0.102 0.001 0.021 0.174 0.804 0.309 0.002 0.050 0.250 0.698 BSCL 0.248 0.002 0.045 0.246 0.707 < 1%

76 erigagrtm.Mr pcfial,tevleof value the specifically, More algorithms. learning of values in parameter proposed the have heuristics setting intuitive we and for algorithm natural utilized learning first we the Here BSCL. test for parameters to appropriate designed determining are experiments of set second The Experiment Learning Parameter 4.1.6.2 ratio. link positive/negative the average maintaining on in 1% datasets three about BSCL the losing each only that across while note properties We network signed of other distribution. in terms improvement triangle in this and SKron finds triangles and balanced STCL the performs of in out percentage seen BSCL the as see maintaining models can we network Furthermore, signed previous Figures. two and Tables the outperforms overall datasets. BSCL three the model across Our examining struggles when but triangles ratio, balanced link of positive/negative percentage the reasonable maintain maintain other to correctly the to On able edge ratio. is triangle link model positive/negative the Evo07 the the to maintaining hand, regards at (in poorly distribution as triangle just the performing and of signs) sacrifice the at but theory, balance to 0.484. of difference absolute an share SKron and STCL while BSCL 0.321 the datasets only network at of signed value looking three a the when has across Similarly, theory balance to 0.356. adhering of triangles of difference percentage absolute an in link positive results the correctly maintaining of percentage models network unsigned the while to dataset Bitcoin-OTC modification the straight-forward in the 0.248 method only of BSCL difference the absolute types, an having triangle better these much of of performs each terms in in percentages that the observe between can difference We absolute respectively. the types, triangle {-,-,-} and {+,-,-}, {+,+,-}, {+,+,+}, can distribution triangle expected as: their calculated and be links positive of percentage exact the have always will dataset. Epinions the in similar vrl ecnseta h ns4mdlfvr atrn h ecnaeo rage adhering triangles of percentage the capturing favors model Ants14 the that see can we Overall models two other these design by that mention we SKron and STCL with BSCL comparing When [[[  , 3 ( × [[ ( 1 − U [ and ))  , V 3 ofrhreaut h ffcieeso u parameter our of effectiveness the evaluate further to ( × [ 77 ( 1 − [ [ ie,tera ewr’ ecnaeo positive of percentage network’s real the (i.e., )( 1 − [ ))  and , ( 1 − [ )( 1 − [ )( 1 − [ )  o the for

77 bouedffrneaa rmtetu nu ewrsvle(hr oe sbte) h “stars” The better). is lower (where value the networks is input z-axis true the the that from Note away settings. difference other absolute with have Epinions we and since OTC dataset, Bitcion Alpha percentage for Bitcion of observations the terms similar for in ratio 6.4 link positive/negative Figures and in triangles results balanced the of present only We algorithm. proposed learning the of parameter ability the demonstrate to parameters optimal searched the and parameters learnt the for space parameter network. signed input real the to of parameters variants learn synthetic can generate accurately model more our evidence further providing natural thus most and the values performs picked out heuristically that significantly algorithm observe learning can parameter We our properties networks. three signed all real-world in three the across averaged are values difference selected algorithms for values picked learning heuristically parameter mentioned above proposed the against the values between types) triangle balanced, of triangles the of distribution contains proportion 4.8 and distribution, Table sign link algorithm. the to learning relation proposed (in our comparison use performance not to were we if triangle) balanced for value the as chosen be can for 4.1.4 Section value in described the Similarly, algorithm BSCL. learning proposed the utilizing not when positive) is edge of value the for choice natural a as used is links) averaged networks signed real property. the respective each to for networks datasets generated three the the from over difference Absolute 4.8: Table o oedtie nlssw lopromagi erhars esnbeae fthe of area reasonable a across search grid a perform also we analysis detailed more a For aacdTriangles Balanced U rageTypes Triangle Distribution Distribution and Proportion Sign V Δ ooti pia aaees hnw opr h efrac of performance the compare we Then parameters. optimal obtain to  V ie,tera ewr’ ecnaeo rage htaebalanced) are that triangles of percentage network’s real the (i.e., ie,tepretg ftm eepiil ls eg noa into wedge a close explicitly we time of percentage the (i.e., (learning U BSCL 0.220 0.107 0.031 78 ie,tepretg ftetm admyinserted randomly a time the of percentage the (i.e., U & V ) ( U = U [ and BSCL 0.351 0.164 0.040 & V V oeta hs absolute these that Note . Δ =  )

78 hoy[9 0.I ugssta yl nsge ewrswt nee ubro eaielinks negative of number even balance an is with networks analysis signed network in cycle signed a in that suggests theory structure It fundamental link 30]. a the [29, example, theory of For phenomena node social two network. the the the explains having in that connections when possible applicable the be methods limiting not Similarly, or might types links. networks negative signed of unipartite complexities for further developed the handle to capability the lacking in later application specific this in 6.2). detail negative Section more and in positive present as we represented which be 117], bills can [116, respectively) votes the "Nay" links, and and "Yea" representatives the the (where States from on United formed voted have network the they bipartite indeed signed that a observe is inherently we example is specifically, real-world Congress more Another domain, networks. science bipartite political signed the as from formulated be “thumbs-down" also or can “thumbs-up" adopt that YouTube, rating and Netflix as such systems, rating online many Networks Bipartite Signed in Balance 4.2 the From parameter. appropriate network. find learned input to the able the for is for parameters algorithm learning y-axis parameter and our indeed x- that convincing the looks along it figures, coordinates the are figures the in lhuhteehv enwrsfcsdo nindbprientok,teemtosare methods these networks, bipartite unsigned on focused works been have there Although example, For online. especially commonly more appear to begun have networks bipartite Signed a ici-lh aacdtinlsresults. triangles balanced % Bitcoin-Alpha (a) iue42 SLprmtrlann analysis. learning parameter BSCL 4.2: Figure 79 b ici-lh oiiengtv ai results. ratio positive/negative Bitcoin-Alpha (b)

79 aiaeisapiaiiyi indbprientok,adpromapeiiayaayi nour notations. on and analysis definitions the preliminary introduce a we perform first, but and wedatasets; networks, then bipartite perspective, signed network in signed applicability general this its a for validate from collected theory have balance we discuss datasets network we Thereafter bipartite signed study. the introduce will we section, this In Networks Bipartite Signed in Theory Balance 4.2.1 tasks. analysis way network the bipartite paves signed prediction other sign in in improvements for findings empirical the prediction Furthermore, sign link networks. of bipartite performance signed the in improving on effectiveness their signed show using then theory bipartite and balance butterflies of unsigned validation and and analysis networks comprehensive a signed present we unipartite Here to networks. additional in networks desired bipartite are efforts signed dedicated for Thus, networks. is enhance bipartite signed to it of possibility prevalence Therefore its the to and due networks nodes. applications, bipartite of signed types in different theory balance two understand the to having fundamentally important is while it triangles networks any bipartite have signed to in and However, impossible 65], 121]. 120, 53, 119, 61, [51, [23, measuring applications 118], 114, mining [115, modeling across extensively networks performance been real-world better various has obtain across “enemy theory cycle) to undirected an balance smallest networks while the signed (i.e., friend” triangles my unipartite signed In is on applied friend enemy”. my my of is friend friend “a my as of stated typically is which balanced, is osdra nietdsge iatt network, bipartite signed undirected an Consider V U A P P B Notations (  al .:Nttosrgrigsge iatt networks. bipartite signed regarding Notations 4.9: Table o-iesoa ersnaino oe in nodes of representation Low-dimensional in nodes of representation Low-dimensional from constructed matrix Adjacency the for matrix Adjacency the for matrix Adjacency matrix bidjacency signed Undirected Descriptions 80 U U G (  poeto network -projection poeto network -projection = (U  B , , U P  ( , , and E U U + , (  P E ( − ) where , U  =

80 ort nte sratratascin o ersnigtebyr n elr,w use we sellers, and buyers the respectively. representing For transaction. a “Negative” after and user “Neutral”, another “Positive”, rate of scale to rating comment. a short using a was with Bonanza along collection, other of the time about the rating At a provide purchases to buyer able a are After both seller, goods. a various from sell product or a buy can they which for account an create users that in network bipartite Bonanza website signed e-commerce first the The from study. is this for networks bipartite signed three collected have We Datasets Network Bipartite Signed 4.2.1.1 6.4. Table in section this throughout used notations major the summarize further We use We them. between where nodes of sets two the between spectively, with nodes geneous of E { 1 + 1 G 6 5 4 h ettodtst r ersnigterl alvtscmie rmte1tt 0hUnited 10th to 1st the from combined votes call role the representing are datasets two next The 1 , http://www.amazon.com http://www.ebay.com http://www.bonanza.com U ⊂ where , 2 E 1 , . . . , +  E ∩ U × B = 9 8 −  ( = } = est of Density Negative Links % Positive Links % = = |E| and 1 and (  ∅ , = nohrwrs w oe anthv ohapstv n eaieedge negative and positive a both have cannot nodes two words, other in , − = = = 1 B  |U E al .0 ttsiso indbprienetworks. bipartite signed on Statistics 4.10: Table U |U |E , − r0 hnteeeit oiie eaie rn ikbetween link no or negative, positive, a exists there when 0, or ∈ ( and ( +  R | |E + | U ⊂ | = B =  = { × ( B = 1  − ( B , ersnigtenme fndsfrec e,respectively. set, each for nodes of number the representing | U × orpeetteudrce indbpriebajcnymatrix biadjacency bipartite signed undirected the represent to 2 B , . . . , 2 . ( 339 Bonanza 4 97.98% U 36,543 2.02% oaz ssmlrt eBay to similar is Bonanza . 1,973 7,919 ersn h eso oiieadngtv de,re- edges, negative and positive of sets the represent  = × ( and } 10 81 ersn w uulyecuiest fhomo- of sets exclusive mutually two represent − U 3 ( elet We . ..Senate U.S. 44.69% 55.31% 0.1769 27,083 1,056 145 E = E + ..House U.S. 5 114,378 E ∪ 46.04% 53.96% 0.1734 n mznMarketplace Amazon and 1,281 515 − etesto l edges all of set the be U  1 8 and and U B ( 9 6 . ,

81 aac hoyi tl plcbetwrsabpriesetting. bipartite a towards applicable whether still unknown is is it theory types, balance node negative different two no have of they are number and there networks even since bipartite mentioned, an signed previously in having as triangles Nevertheless, to unbalanced. (due are balanced (d) are and (c) (b) while and links), (a) in observe triangles seen further that can As We 2.2 network. nodes. Figure three signed in the unipartite between a configurations possible in four 3) are length there of 2.2, cycles Figure almost (or but triangles 55], of 2, form [74, works the tasks many in analysis towards always network applied then signed and investigated recent usually is In maintaining theory in balance involved tensions connections. social unnatural the seemingly to due and balanced) “unbalanced” be (to change to those likely and stable), more (i.e., are “balanced” that socially are that networks signed 29], in [30, settings theory the balance discusses is which theories social studied fundamentally most the of one networks signed In Networks Bipartite Signed in Butterflies Signed 4.2.1.2 setting. investigate network next bipartite signed we the structures, to 29] social [30, Although real-world theory balance different datasets. vastly Congress U.S. representing two are the datasets to compared these as links the negative between imbalance and significant positive a of is there number dataset Bonanza the in that note We datasets. collected in those and “buyers” missing connection the leave and respectively, them, otherwise. between links negative or positive set as the these by In voted House). were U.S. that as bills by to the representatives refer represent will we we datasets (which these Representatives of of each House U.S. the for other datasets the separate two and collected we specifically, More Congress. States 7 et ewl hrfr nrdc o epa oetn h sg fblneter othe to theory balance of usage the extend to plan we how introduce therefore will we Next, in nodes the to refer will we section this of rest the throughout simplicity for that Note https://www.govtrack.us/data/ U ( facnrspro oe Ya r“a”frtebl,te erepresent we then bill, the for “Nay” or “Yea” voted congressperson a If . U ( s“elr” nTbe41 erpr oebscsaitc forthree our of statistics basic some report we 4.10 Table In “sellers”. as 82 7 n o h ..Senate U.S. the for one ; U  n h eaosor senators the and U  as

82 v htahr oblneter hl nytoaectgrzda naacd euethe use We sellers unbalanced. and buyers as the categorized are two only are while there notation that theory Note balance to butterflies. signed adhere undirected that non-isomorphic five 7 the present we 4.3 Figure In networks. bipartite signed in theory investigate to balance for structure extension natural possible most a the provides as higher-order this cohesive Thus, simplest the biclique. is complete a butterfly also a formally, and More structure 4. [122, length “butterfly” of a cycle a of is that which is 123], structure investigated commonly one networks, bipartite unsigned In Classes Isomorphism Butterfly Signed 4.2.1.3 signed real-world three in butterflies signed we these networks. Thereafter of bipartite analysis networks. initial bipartite our present signed and undirected investigate in butterflies) (i.e., cycles signed smallest ipeto ye are types of simplest hmars h orprhsswspstv.Nx,w have we Next, positive. was amongst sentiment purchases the four and the sellers two across same them the from bought as have class (+,+,+,+) buyers the two interpret where can situations We the respectively). 4.3(E), links and negative 4.3(A) of Figures in number seen even be an can having (and to due balanced are both and respectively, links, negative uta hr r ieettpso indtinls hr r ieettpso indbutterflies. signed of types different are there triangles, signed of types different are there as Just (∗ , ∗ , ∗ , ∗) iue43 nietdsge utryioopimclasses. isomorphism butterfly signed Undirected 4.3: Figure odnt indbtefl smrhs ls htrpeet h ik between links the represents that class isomorphism butterfly signed a denote to (+ ( , 1 + 8 , B , + , 9 1 , +) : and B , ; ) (− i htodrwt h atsg connecting sign last the with order that (in , − , − , −) 83 hc eoetecasshvn l oiieo all or positive all having classes the denote which , (+ , + , + , −) and (+ , B − ; , and − , −) 1 which , 8 .The ).

83 a ese stecmlmn i enda wpigln in nasge ewr)o the of network) signed a in signs link swapping as defined class (if isomorphism class complement The the as sellers. seen two the be for can structure single positive similar a this and with where buyer link, one matter negative links, positive no and two that with buyer observe one have can always we We placed, is the link link. all negative negative encompasses single that class a isomorphism negative with butterfly of butterflies signed number signed the odd have an we have 4.3(F) they Figure (since In butterflies links). signed of classes unbalanced two the are ik,w bev nFgr .()ta ohsleshv igepstv n igengtv link, negative single of and class positive isomorphism single the a positive have define two sellers and has both buyer that other 4.3(B) the Figure while in links, observe positive we two links, has buyers in the link negative of one one and When positive cycle. one have their sellers and buyers all class where the butterflies see signed we of represent 4.3(D) links, Figure negative In two classes. and positive isomorphism two three have having we butterflies which signed the leaves This definition. the in h indbprientok nohrwrs o xml,“ example, for words, other In to signs network. negative bipartite and signed positive the the reassigning randomly when the class isomorphism extending given the this, into quantify fall To “ calculate frequently. we [2], less in appear taken approach should unbalanced) while (being frequently (G) appear and should (E) (F) through (A) theory classes balance isomorphism Remember, balanced that underrepresented. suggest would or and overrepresented networks are they bipartite signed whether test in found to “ being wanted column butterflies in signed (given these dataset of each significance in the count each analyzed butterfly for signed total butterflies the signed isomorphism of each up of percentage takes the number calculated class further the We 4.3. counting Figure in after shown as analysis class our isomorphism report we 4.11 Table In Analysis Butterfly Signed 4.2.1.4 the as represent we which other, the to negatively class and seller, one to positively connected buyers (+ (+ , , + + , , − + , , −) −) hw nFgr 4.3(C). Figure in shown n endi iia a,btwt wpigtepstv n eaielinks negative and positive the swapping with but way, similar a in defined and (+  % , − steepce ecnaeo oa indbtefle to butterflies signed total of percentage expected the as ” , − , +) 84 ial,tels yeo indbtefl a both has butterfly signed of type last the Finally, .  % o h smrhs class isomorphism the for ” (+ , − , + % , −) ) et we Next, ”). (+ sue to used is , − , − , −)

84 Table 4.11: Signed butterfly statistics on signed bipartite networks.

U.S. House of Signed Butterfly Bonanza U.S. Senate Representatives Isomorphism Classes Count % % B Count % % B Count % % B () (+, +, +, +) 2554388 0.986 0.922 386 13404168 0.262 0.094 4142 227660420 0.244 0.085 17459 () (+, −, −, +) 3830 0.001 7.8e-04 40 5595440 0.110 0.122 -277 103731010 0.111 0.123 -1137 () (+, +, −, −) 726 2.8e-04 7.8e-04 -29 9404006 0.184 0.122 1349 173875858 0.186 0.123 5843 () (+, −, +, −) 456 1.7e-04 7.8e-04 -35 5537080 0.108 0.122 -302 101409932 0.109 0.123 -1368 () (−, −, −, −) 20 7.7e-06 1.7e-07 30 6815324 0.133 0.040 3414 137478104 0.147 0.045 15104 Balanced 2559420 0.988 0.924 40756018 0.797 0.500 744155324 0.797 0.500 () (+, +, +, −) 30685 0.012 0.076 -390 6225745 0.122 0.302 -2811 109763190 0.118 0.289 -11565 () (+, −, −, −) 100 3.9e-05 3.2e-05 2 4118075 0.081 0.197 -2099 79053742 0.085 0.210 -9430 Unbalanced 30785 0.012 0.076 10343820 0.203 0.500 188816932 0.203 0.500

85 indbtefl.Teeoe indctrilrcntk noeo ih ieetfrs since forms, different eight of becoming one to on link take one can just caterpillar missing signed are a that Therefore, 3 butterfly. length signed of a paths as define we caterpillar” “signed A Networks Bipartite in Caterpillars Signed 4.2.1.5 in tasks numerous advance when to theory applicable networks. them bipartite balance making signed to thus adhere butterflies, signed networks of bipartite terms signed in defined 2) and networks; bipartite signed for datasets. three all i.e., across link, negative sellers and one buyers and all positive where class one the have example, For overrepresented. found be always not to appear links negative two and positive signed two involving in classes isomorphism theory the However, balance networks. bipartite of applicability the strengthening further overrepresented, significantly the datasets all across Similarly, representation. the “ for significantly except are columns underrepresented, datasets three comparing the across (i.e., butterflies signed network unbalanced given all that the is observation in second expected ratio than sign balanced link more the significantly on are based they Furthermore, balanced. indeed are networks “ negative) expected. (or positive a [2], “ in on as (based number expected calculated our from “ value independent the the Finally, be would (i.e., link signs positive link single a assigned having of randomly probabilities with network signed a class in in appearing butterfly link signed a in link positive single a having (+ , − nsmay u nig ugs ht )w a s indbtefle oetn aac theory balance extend to butterflies signed use can we 1) that: suggest findings our summary, In bipartite signed three our in butterflies signed of majority large the that observe first We , − , −) scluae by calculated is B sue odnt h ubro tnaddvain h culcutdiffers count actual the deviations standard of number the denote to used is ” 1 4  (+  (|E , B − au infisapaigsgicnl oe(rls)than less) (or more significantly appearing signifies value ” + , − /E)×(|E × |/|E|) , −) utrisi oaz,weei hw iia over minimal a shows it where Bonanza, in butterflies (+ 86 |E , (+ − + , , −  + |/|E| + |/|E|) % , , + −) )frec indbtefl yeadjust and type butterfly signed each for ”) , +) n he eaielns(i.e., links negative three and ) sls omnyfudta expected than found commonly less is , (+ 3  and , ic hr r emttosof permutations 4 are there since , − , (− − , , −) − , n h rbblt feach of probability the and − , −) indbtefle are butterflies signed % and ”  |E % − .The ). |/|E| ).

86 )arno akbsdapoc htitgae n-oepoeto ewrsfor networks projection theory. one-mode balance using integrates constructed that approach based walk and random butterflies; a signed balanced 3) low-rank more creating a favor signs extend predicted 2) the ensure caterpillars/butterflies; to method signed modeling 1) uses propose: that we method specifically, More classification supervised group. a each from networks bipartite signed approximation to prediction low-rank specific sign representative method 2) a develop we methods; Therefore supervised methods. based 1) propagation 3) and groups: methods; networks main signed three unipartite into in signed categorized signs in be link butterflies predicting can signed for of Methods majority balanced. large are the no networks that are bipartite validated there we since 4.2.1.2, applicable, longer Section no In are methods triangles. these of many setting, bipartite signed the in matrix adjacency following: the as networks bipartite signed undirected in prediction sign of problem the define formally we notations, and definitions aforementioned the With Networks Bipartite Signed for Prediction Sign 4.2.2 signed unbalanced) (or balanced balance a and into links close to negative butterfly. link of positive) number (or negative odd a an suggest would having theory signed when a path” an “unbalanced define we an Similarly, link as negative) butterfly. (or caterpillar signed positive unbalanced) a (or suggest balanced would a theory into balance links, it negative and transforming path” of “balanced number even a is an as that contains this 4) caterpillar refer length we signed of cycle a a If into unbalanced. closed have or (i.e., types balanced butterfly caterpillar either signed all a that into Note transformed negative. be or to positive potential ether the being links three of composed is it {U  inpeito nsge ewrshsbe rvosysuid[1 2,15 2,4.However, 4]. 126, 125, 124, [61, studied previously been has networks signed in prediction Sign network bipartite signed undirected an Given U × ( }\{E + E ∪ B − ∈ } . R |U  |×|U ( | ese opeittesgso oln pairs link no of signs the predict to seek we , 87 G = (U  , U ( , E + , E − ) ersne sabi- a as represented U (  1 8 and B , 9 ∈ ) U (

87 ecntutd hsi ncmaio ool sn h ere namto iia nntr to nature in similar method and a in with degrees model the attachment using preferential only signed to a would comparison that in butterflies is signed This of or types constructed. positive the be be considering to likely when is theory sign balance link to their according whether negative to as informaiton of amount vast a provide would h onsfrec fte8psil indctrilr hthave that features caterpillars the signed that possible is 8 expectation The the of each for both counts for degrees the vector negative feature and the positive Thus, the the butterfly). includes signed unbalanced or caterpillar two balanced signed the the a transforming connection are to seller they and buyer caterpillars the be signed would they many (i.e., how of endpoints about information or distributions degree nodes signed directed on [4]. prediction in pair. work the seller learned networks following and unipartite model we buyer regression unknown what logistic an extrapolate a for can use sign negative we we specifically, or positive More model, a trained predict a to data having training after the from Then, seller). and buyer a signed (i.e., theory balance caterpillars). on based features neighborhood local sign or degrees) the negative predicting and we positive of Here problem the 128]. formulating 127, buyer by 61, a setting [4, between bipartite problem signed classification the supervised to a idea of the terms extend in task the networks frame unsigned and to signed both is in signs link or links predicting towards approach common One Classifier Based Caterpillars Signed 4.2.2.1 etr xrcin h w ieetst ffaue eeaut r ihrbsdo h two the on based either are evaluate we features of sets different two The Extraction. Feature (between links signed known of consisting dataset training a construct we model our train To x 9 8 B2 sSdadSs,respectively. SCsc, and SCd as 1 8 n seller a and B 9 x yetatn etrsfo ihrteidvdas(.. their (i.e., individuals the either from features extracting by 9 8 B2 ilb oeifraieta hs of those than informative more be will x 3 ednt h uevsdcasfir htuse that classifiers supervised the denote We . 88 1 8 and B 9 ncomparison, In . 1 8 and x 9 8 3 B o h pair the for 8 steendpoints. the as x 9 8 3 eas they because x 9 8 B2 contains ( 1 8 B , x 9 9 8 3 )

88 ugse mlctsge ik htwudcntuttems aacdsge utriswt the with from butterflies derived signed sign. balanced sellers link most and suggested the buyers construct would of that pairs links additional signed implicit of suggested inclusion signed the the through model model this to modify approach matrix factorization biadjacency matrix the basic using network a bipartite introduce first we bipartite signed Thus, in balanced being networks. link butterflies select signed to more towards structured push are explicitly none would 130], that 132, signs [131, networks signed on focused for some have works Although popularity these 131]. of gaining 130, [129, been predictions have network related approaches link involving factorization applications numerous matrix low-rank the years recent In Prediction Sign Low-Rank 4.2.2.2 where matrices oblneter ie,hvn oesge utrisblne hnublne) hrfr we Therefore unbalanced). than balanced butterflies adhere signed that more signs having link (i.e., predict to theory going balance actually to are explicitly links not non-existing does of it signs links, the existing whether the control predict accurately effec- is can model that this representation although However, a pairs. learning seller tively and buyer unknown of sign the predict to seller (4.11). Eq. in objective Stochastic to the use minimize associated we to [131] value (SGD) in loss work Descent the higher Gradient Following a process. is training the there during then minimization signs the drive differing have values predicted and real the then negative) both or (i.e., sign link problem: optimization following the solve to respectively, sellers, and buyers of set the E = ai arxFcoiainModel: Factorization Matrix Basic hsalw st hnuiietelandlwdmninlrpeettosfrec ue and buyer each for representations low-dimensional learned the utilize then to us allows This {( u 1 8 8 > B , U v 9 9 = )| sue omdlteln inbtenbuyer between sign link the model to used is B [ B u ≠ 9 8 1 , n h rdce iksg (i.e., sign link predicted the and ) 0 u } 2 min U ntrso h iksg rdcints ewudlk odsoe w latent two discover to like would we task prediction sign link the of terms In . , . . . , , V B 9 8 ( 1 ( u 8 u Õ ,B = 8 >  9 )∈E v ∈ ] 9 ) max spstv,adi vr1te hr sn os oee,when However, loss. no is there then 1 over if and positive, is R 3 ×  = 0  , 1 and h e feitn de in edges existing of set The − B V 89 9 8 B = ( hnw nrdc o ecnsuccessfully can we how introduce we Then . u u [ 8 > v 8 > v 1 v , 9 ) v 9  r ftesm in(.. ohpositive both (i.e., sign same the of are ) 2 2 , . . . , 1 + 8 oseller to _  v | U = ( |  2 ∈ ] | + B 9 R V oeta hntereal the when that Note . B 3 | ×  2 r eoe nteset the in denoted are =  ( fdimension of (4.11) 3 for

89 naacdsge utriscetdsmlaeul)i h ugse indln eet eadded be to were between link signed suggested the if simultaneously) created butterflies signed unbalanced of Proof. that such 3. Theorem of. endpoints the and in involved jointly they’re caterpillars signed of types ( pair seller and buyer each for exist. to were they if butterflies would signed but balanced network, into bipartite signed caterpillars the signed in many exist convert not link do learning currently model that pairs the seller encourage and further buyer to for signs is selected have the we predicting approach on The error the signs. minimizes link model low-dimensionalexisting the learning that on such focus seller and only buyer can each for it representations Instead relationships. balanced non-existing favor the to enforce explicitly signs not link does (4.11) Eq. in given approach factorization matrix basic to balanced. framework are basic links this missing to the extension between butterflies an signed present more will ensure we further Next, MF. as simply method this denote fi a omdb nublne ahi ol eur h lsn ikt engtv ofr a form to negative be to link closing that the follows require it would but Therefore, butterfly, it butterfly. signed path balanced a balanced unbalanced is a an one be by if to formed close caterpillar, was to signed it link a if positive of a definition suggest would By it then 3. path, length balanced of paths unbalanced of number the by seller and as represented network signed a in nodes of pairs R h B |U|×|U| ) | S h rtse scluaigwehrblneter ol ugs oiieo eaielink negative or positive a suggest would theory balance whether calculating is step first The Theory: Balance with Factorization Matrix ˆ BB BB 0 | diinlblne indbtefle rae atrsbrcigtenme fpotential of number the subtracting (after created butterflies signed balanced additional ) fw let we If 1 tr h ubro aacdadublne ah flength of paths unbalanced and balanced of number the store 8 B B86= 9 0 and ) eosreta hsrpeet h ubro fblne ah flnt subtracted 3 length of paths balanced of of number the represents this that observe we , B ie indudrce idaec matrix biadjacency undirected signed a Given ( i S B ˆ ent hti 13 thsbe shown been has it [133] in that note We . 9 8 A 9 hr edefine we where , ) = ugsstesg fanneitn ikin link non-existent a of sign the suggests h B B 0 ) 0 i 1 eteajcnymti in matrix adjacency the be 8 , B 9 ,ta urnl onthv ikbtente,bsdo the on based them, between link a have not do currently that ), B as B 9 8 B86= = 0 90 A if ( hs since Thus, .  BB B speiul icse,teaforementioned the discussed, previously As 9 8 ) ≠ B  0 ) R and = B A |U|×|U| hntematrix the then , ; B86= A B = B 9 8 3 9 8 htwudrsl nantgain net a in result would that M = M ecnosrethat observe can We . = ;   ;  1 BB ; − epciey ewe all between respectively, , − when M ) M B * ; * ;  where , 9 8 B  S ˆ 9 8 nedrepresents indeed o oebuyer some for = = BB 0 . M ) ;  B , M

A * ; B 3 1 is = ∈ 8

90 ffcieycut o ahnd pair using node by each theory for balance counts by effectively implied are links negative again and We positive respectively. implicit links, these negative that and note positive implicit the of inclusion the through butterflies where in where indbtefle ntesge iatt ewr.W en hs esa follows: as sets these define We network. balanced bipartite of signed gain the net in highest butterflies the signed create would that theory balance by suggested respectively, links, matrix dense very potentially the using avoid to with product element-wise difference the their taking after of value absolute for the similarly equaling and formed being butterflies, butterflies signed balanced balanced of more gain of net creation the the promote would that sign the ( 8.4, S ˆ efruaeorojc hticroae aac hoya follows: as theory balance incorporates that object our formulate We sn hoe ecncntutadtoa sets additional construct can we 3 Theorem Using that Note . | M min + U C>? U ;  , U V − and ( : ( M 1 1 ( 8 8 S ˆ ,B Õ ,B S * ; ˆ Õ ) V 9 9 |) a lob acltd(oeie oeecety sn h following: the using efficiently) more (sometimes calculated be also can )∈ and )∈E r sdt oto h ee twihw noprt h oeigo signed of modeling the incorporate we which at level the control to used are ti hnes oetn ool h ue n elrpairs seller and buyer the only to extend to easy then is It . E ˆ 8 + max 1>CC>< max  E E ˆ ˆ 0  8 8 0 − + , : , 1 = = 1 ( − S ˆ − {( {( ) B r sdt eoethe denote to used are S 1 ˆ 1 S 9 8 ˆ 9 8 8 8 9 8 B , B , ( ( u ( u = 9 8 > 9 1 8 > | ) | ) v 8          v B , S S 9 ˆ 0 ˆ  9 ) 9 8 9 8 BB ) 9  B )  2 > 2 < htzrsottepista aea xsiglink. existing an have that pairs the out zeros that httentgi fttlblne indbutterflies signed balanced total of gain net the what > + + 0 0 B _ 91 B V and  and  9 8 | ( o presge iatt networks. bipartite signed sparse for U 1 8 | ,B S S  2 ˆ ˆ Õ E otherwise if 9 8 9 8 9 | + )∈ 8 : + B ∈ ∈ ags n mletvle,respectively, values, smallest and largest E and 9 8 V ˆ 8 C>? − 1>CC>< | =  2 max E  0 : 8 − ( S ˆ fipii oiieadnegative and positive implicit of  )} 0 : , ( 1 S ˆ )} − S ˆ 1 9 8 8 and ( u 8 > v B 9 9 ) in  2  BB S ˆ ) which , B (4.13) (4.12) 

B 

91 oepoetosaetpclyue o ohaayi n iigt ov aiu ak 15 136, [135, tasks various solve to aiding and analysis both for used typically are projections mode propagate and promote further can network. that the throughout matrix relations transition matrix balanced adjacency signed signed a a defining of by construction followed the theory, be will balance step promoting be first walker The random the theory. have furthermore to but matrix, only not transition to proper approach a based walk allow random the signed a handling develop and in setting, aid bipartite the to with theory, faced issues balance using constructed are which matrices, adjacency projection a towards networks bipartite signed for relations. method balanced more based having walk solution random the using be guide also indeed to should butterflies, we theory therefore signed balance and the balance of of levels analysis high our showing to are networks due bipartite Thus, signed unipartite links. for unknown of methods sign when prediction the performance higher predicting sign obtaining towards random previous component key proposed in the our is seen against theory balance comparison as networks, signed a Furthermore as method this method. use based later walk will We node. stay probabilistically same will the walker the at where a walk, have random “lazy” not a do considered is networks unsigned networks in bipartite problem bipartite this handling that of way One is [134]. converge problem not do such thus and distribution One stationary from them methods. prevent typical that the challenges using multiple directly pose unipartite networks unsigned in bipartite tasks signed many related However, ranking seen and have networks. prediction [44] link restart solve to with applied walk been random and variants the as such methods, based propagation Typical Prediction Sign Based Walk Random 4.2.2.3 MFwBT. factorization as matrix theory this balance denote using We method 3). length of signed paths of unbalanced count or majority balanced the of to being (according caterpillars sign suggested the with link the including once be would osrcigteoemd daec matrices: adjacency one-mode the Constructing the integrates that approach based walk random a present we Here 92 nusge iatt ewr nlssone- analysis network bipartite unsigned In U  A and ae nbalance on based U ( one-mode

92 iue44we on from going when 4.4 Figure matrices adjacency in networks sellers the projection in for buyers one-mode the two connects definitions, that connections our one of implicit performed, terms be creates In can that type. network same projection the a of creating nodes between by constructed are They 137]. htsle)adsbrcigtenme fsleste iareo ie,teslesweeoebuyer one where sellers the (i.e., on disagree to they connected sellers positively of or number negatively the either subtracting and both seller) (i.e., that connections signed of terms in upon agree matrix constructing adjacency for the of Next formation triangles. the signed discuss of form will the we in theory balance construct utilize carefully to networks choose to we projection wanting networks, In the projection [138]. these construct performance to and usability methods the different to changes using drastic that cause [136, can studied projections one-mode been for also methods has possible many It are there 137]. fact in and set, same the in users hnw define we Then let Similarly that sellers common of number buyers two connect ent htteei o utoewyt icvrteeipii oncin ewe ar of pairs between connections implicit these discover to way one just not is there that note We ae nteieso omnniho iiaiyi nindntok,w ilpossibly will we networks, unsigned in similarity neighbor common of ideas the on Based iue44 ihlvloeve fhww construct we how of overview High-level 4.4: Figure =B 9 8  P P U 89 8 eoetenme fslesteetobyr iareo ntrso iksign. link of terms in on disagree buyers two these sellers of number the denote ( ( atog eol discuss only we (although 1 P ycntutn elrt elrlns hs eain a erpeetdi the in represented be can relations these links; seller to seller constructing by 8 =  and P ∈ 98  R 1 9 |U B = fte aea es n elri omnte r ikdt.Ltthe Let to. linked are they common in seller one least at have they if  to =B |×|U 1 P 8 9 8  ( and −  and | =B and 1 9 8  P 9 hc ecnsei aigtenme fslesthey sellers of number the taking is see can we which ,  ge pn(ntrso iksg)b eoe as denoted be sign) link of terms (in upon agree P rmlf orgttruhtefis arrow. first the through right to left from ( P 93  ∈ here). R U |U  ( oehraogttesle n h other the and themselves amongst together P |×|U  n iia rcs a efollowed be can process similar a and , ( | iuleapecnb enin seen be can example visual A . A from B , P ( and P  . =B 9 8  .

93 matrices where matrix construct biadjacency to how of intuition high-level the show we n-oepoeto ewrs etw osrc iia o omlzdajcnymatrix adjacency normalized row similar where a the construct through we obtained Next we links networks. projection implicit one-mode the to compared as network bipartite signed where where on, walk random our matrix perform we adjacency network signed an construct to them use can we to want not might we thus and significant very between be link not a construct might value small a such having settings in value non-zero a where follows: as version parameterized a construct we Ultimately, formed. are triangles when given be can argument of similar number lesser the while balanced, be to if triangles since design by is This theory. links the using that between to, formed linked triangles the all of out that verify now to can We seller). between that connection with the connection negative see a further has buyer second the while link positive a has osrcigboth constructing efrigterno walk: random the Performing A X l ˆ ? 9 8 P saprmtrta a eue oba h admwle ofvrtera ik nour in links real the favor to walker random the bias to used be can that parameter a is ˆ and  = and A X 9 8 = / P ˆ r sdt en hehlsfrtencsaymgiueof magnitude necessary the for thresholds define to used are Í P : (  o ecnformulate can we Now . P | A and 89 8 8: P | hsalw st goeadn mle aus(.. ) ic nsome in since 2), (e.g., values smaller adding ignore to us allows This . . 1 89 8 P 8 B ˆ ( and 9 8 . = B =      8: 1 B , 9 0 =B oeta o ipiiyw allow we simplicity for that Note . 9 8 B =0 o aigtetopoeto daec matrices adjacency projection two the having Now P 9 8  / : 9 =B 89 8 9 8 Í  : − 9 8 and  A | =0 > =B B n h omnniho iiaiymto.I seasy is It method. similarity neighbor common the and =B < = 8: 9 8  P A |        esmlrycntutrwnraie adjacency normalized row construct similarly We . 89 8 l 9 8  sfollows: as P ˆ 9 8  94 B ˆ  then eseta h aoiywl deet balance to adhere will majority the that see we , ) n if and otherwise X = A =B l =B < 1 P A ˆ U B86= ∈ 8 B ( 9 8 is edenote we First .  ˆ ,        =B 1 R = ilcoet eublne.Nt hta that Note unbalanced. be to close will 9 8  9 |U|×|U| ( 9 8  n h sellers the and , { P − 1 89 8 = 1 =B 1 . . . , =B ) 9 8  spstv n lsn the closing and positive is 9 8 hc ilb h unibipartite the be will which ,  X < = then  ? X B , ? B ˆ 1 P and B . . . , sterwnormalized row the as 89 8 B : hyaecommonly are they =B X = = = 9 8  ( 0 ob hrdfor shared be to } − n osigned no and nFgr 4.4 Figure In . U =B P  9 8   and and ohave to (4.15) (4.14) =B U P ( A 9 8  ˆ ( ,

94 odn h nerdln in sfollows: as signs link inferred the holding epromeprmnst esr h efrac o aho h rpsdsg prediction sign proposed the of each for performance the measure to questions these experiments address To perform work/compare? we for methods proposed performance the in do increase How extended an (2) the and provide setting Does prediction? sign bipartite (1) the following: in the butterflies signed answer to to theory seek balance We bipartite theory. signed balance for methods harness prediction that sign networks proposed our evaluate empirically we section, this In Experiments 4.2.3 LazyRW. as denote we which P between sign the where predicting when (i.e., predictions of sign corner link right the upper obtain the in butterflies signed balanced having to correlates involving butterfly signed each that Note probability with capability, restart the includes that solution form closed The theory. Similarly balance positive. a and negatives two or positives, when three either of consisting triangle adjacency a the be of would triangles of terms in theory balance matrix to adheres above the how describe we Next fu to up of ( 1  − o oprsn fw e h w n-oepoeto arcst h dniymti (i.e., matrix identity the to matrices projection one-mode two the set we if comparison, For utilize we Finally, = 2 P ) A ˆ A 9 sgvnt etefollowing: the be to given is , ( 0 8: hsi eas o some for because is This . = = Y 3 4  ( 9 : I = n set and ) rage in triangles  < + 0 9 ) eaedecreasing are we ednt hsmto sSge iatt admWl (SBRW). Walk Random Bipartite Signed as method this denote We . A l ˆ narno akpoaainmdlweew define we where model propagation walk random a in = A ˆ 1 hs hnw r norgn aacdtinlshr in here triangles balanced encouraging are we when Thus, . hnE.41 eoe h qainfralz admwl method, walk random lazy a for equation the becomes 4.16 Eq. then : if Y A Y ˆ = Y 8: 9 8 1 9 8 ( Y 8 n norgn tt engtv,tu lofollowing also thus negative, be to it encouraging and 1 B , 9 : = − 9 Õ 1 , 2 > : 95 )( 0 : A I ˆ , tincreases it 8: − and Y 2 A 9 : ˆ B ) ; − nteoiia network original the in 1 Y 9 8 nuigi ob oiie which positive, be to it ensuring 1 8 and Y hc sweewe where is which , B Y 9 ehv use have we ob h matrix the be to B o consists now Y (4.16) (4.17) B ˆ this 9 8 0

95 etrta hi epciebsln ehd(.. C,M,LzR)ta nyuegnrcsigned generic use only that LazyRW) MF, SCd, (i.e., method baseline respective perform their always than butterflies, better signed using defined when theory balance from prediction that in aid method receive proposed one not is found there be that can datasets. is the F1 all make and across we others AUC the observation of outperforms first terms the in and networks 4.12 bipartite Table signed in three our across results The Results Comparison 4.2.3.1 dissertation. this in presented have we Thus, methods the networks. against bipartite comparison signed a of provide types only different insights we provide with to predictors want sign we of Second, usage practical prediction. guide balance sign to of in applicability aid to the test butterflies) signed to on want not (based we likely theory First, are two-fold. networks is bipartite investigation main unsigned The or hence signed applicable. networks; unipartite bipartite for signed in either signs methods link existing predicting other of study best first the To the is dataset. this Bonanza knowledge the our in of especially unbalanced are (AUC), links Curve negative characteristic and operating positive pair. receiver the the undirected since Under that Area for and suggests F1 method both specific use the we sign evaluation For link the with compare we sign set, link testing truth the in ground edge the each signed for the then, to links, training access given the only from induced is network method bipartite each specifically, More datasets. as our 85% remaining of the each and for models, training our of random hyperparameters a the utilized tuning test, of as purposes validation links for the our 5% of For 10% selected House. randomly U.S. have and we experiments Senate, prediction U.S. sign Bonanza, namely, study, this for networks three collected bipartite have we signed 4.2.1.1 Section in discussed previously As networks. bipartite signed in tion the for analysis methods. sensitivity our parameter of a parameters with major follow-up also we and theory, methods balance our of understand contribution better To the networks. bipartite signed real-world three across methods h eodosrainw aei httetremtosSs,MwT n BW which SBRW, and MFwBT, SCsc, methods three the that is make we observation second The Settings: Experimental eew ics h etnsue o u xeiet nsg predic- sign on experiments our for used settings the discuss we Here 96

96 utrybsdblneter.W yohsz hsi u otehaycasiblnebetween imbalance class heavy the to signed due the is utilize this hypothesize that We methods of theory. ranking balance the based for butterfly AUC) of terms (in behavior opposite complete AUC both (for best F1). the the and performs outperforms method walk model random low-rank the the predicting while approach, see when classifier we supervised created SBRW), the and being MFwBT, are SCsc, butterflies (i.e, signs signed link balanced missing more ensure correctly to how of improvement. prediction verifiable sign empirically for an butterflies provides signed indeed of networks form bipartite the signed in in theory balance of usage to answer the positive – a question give first can we our that very suggests a fact This provides in networks cases. that bipartite all almost signed observe in in improvement we prediction significant general sign than for In less butterflies AUC. is signed in of SBRW increase usage and the significant SCsc fact a of with F1 comes of the sacrifice but why LazyRW, the is and at which SCd comes links, links negative positive few the the of detect some better misclassifying to that see can we Therefore performance the better. positive, understand to are preferred is links measurement AUC the the of where setting 98% a generally almost the is specifically, which between more imbalance dataset, heavy this the in is links negative this Bonanza and for the of positive reason In terms The AUC). in respectively, in worse. SBRW, worse and is performing SCsc (although F1 outperforming F1 the LazyRW cases and two SCd the in have only we and dataset AUC of terms in information network oee,ulk h w ..Cnrs aaes nteBnnadtstw culyosrethe observe actually we dataset Bonanza the in datasets, Congress U.S. two the unlike However, intuitions on based constructed methods the for datasets, House U.S. and Senate U.S. the In inPrediction Sign LazyRW MFwBT Method SBRW al .2 iksg rdcinrslsi em f(AUC,F1). of terms in results prediction sign Link 4.12: Table SCsc SCd MF 052,0.949) , (0.582 057,0.979) , (0.547 068,0.905) , (0.608 0.903) , (0.593 0.674) , (0.664 0.959) , (0.553 Bonanza 97 088,0.821) , (0.808 086,0.849) , (0.836 0.827) , (0.814 0.812) , (0.792 0.823) , (0.812 0.654) , (0.638 ..Senate U.S. 085,0.827) , (0.815 086,0.858) , (0.846 0.848) , (0.834 0.846) , (0.831 0.837) , (0.827 0.635) , (0.625 ..House U.S.

97 u oitcrgeso oe ouewihso ahtann xml nesl rprinlt the tuned type. to have link proportional we that inversely example of because training frequency is each on This weights use to links. model negative regression more logistic method our this predicting thus of and trade-off measure, F1 a the discovering to just cost great is at comes this observe for also AUC we of method, terms SCsc the in the improvement learning drastic towards a see links we negative although Finally, and representations. positive effective implicit most of contribution signed the balance balance to into fixed MFwBT we turn study our to in that caterpillars note signed we Also, most butterflies. the cause would the links both in which of used investigating size being links the implicit selecting negative to (through positive procedure of training ratio the control accurately more to MFwBT comparison, able In is created). being link positive a in projection result one-mode would negatives two two the (since in matrices constructed be to links positive more even cause would this actually balance/unbalance and real/implicit separating on through focus only directly parameters to the unable as be setting might this method SBRW handle the imbalance this With links. negative and positive the iue45 aaee estvt on sensitivity Parameter 4.5: Figure l and X ? / X = uhroe fms eaielnsaeivle nblnerltosisthen relationships balance in involved are links negative most if Futhermore, . a FB (AUC) MFwBT (a) U and 98 V U nMwTo h ..Snt dataset. Senate U.S. the on MFwBT in = V E ˆ u hsmcaimwudfrhrallow further would mechanism this but , 8 + and b FB (F1) MFwBT (b) E ˆ 8 − hnetatn hmfrom them extracting when )

98 efre rdsac o ohtesz of size the both for search grid in a included performed being butteflies signed from links negative and positive networks. bipartite signed in theory balance the understand from further the- hyperparameters to wanting interesting balance of contain perspective with methods modeling (SBRW) walk low-rank random the and methods, (MFwBT) prediction ory sign proposed three our Among Analysis Parameter 4.2.3.2 ftann nbt oiieadngtv ik ugse ae nsge utris(.. ik in links (i.e., butterflies signed on based suggested links negative and positive both on training of of values the Furthermore, links. having negative than was links datasets three the across considering when setting best the that uhfcso hs mlctlns eosresmlrfidnsi u te datasets. other our in findings similar observe We links. implicit these on focus much when is (which account taking into not the over theory improvement updating balance an the provides that close butterflies) would observe signed they We balanced into since caterpillars selected signed 4.5. were most (that Figure links in signed dataset suggested Senate using representations U.S. node the for set validation our on E |E 8 + 8 − norMwTmto,w icse htw a oto h ubro ugse implicit suggested of number the control can we that discussed we method, MFwBT our In o u BWmto,teeaetomi eso parameters of sets main two are there method, SBRW our For and | = iue46 aaee estvt on sensitivity Parameter 4.6: Figure 10000 E 8 − ,rsetvl.Frsmlct foraayi eset we analysis our of simplicity For respectively. ), hc esseti u otecasiblneadhvn oeepii positive explicit more having and imbalance class the to due is suspect we which , a BW(AUC) SBRW (a) X E ? U 8 + and and 99 = V X E = = U 8 − nSR nteUS os dataset. House U.S. the on SBRW in ntest{,00100.W discovered We {0,1000,10000}. set the in , 0 and ,btcr hudb ae ontpttoo put not to taken be should care but ), V eeue ocnrltecontribution the control to used were U = b BW(F1) SBRW (b) E V l 8 + n eotteperformance the report and n h hehl pair threshold the and and E 8 − epciey We respectively. , |E 8 + | = 1000 and X ?

99 u oteaeaemgiueof magnitude average the to due of magnitude specific the datasets, three the for similarly signs. link missing the predicting for performance of datasets three the across varying in found as difference significant much with hoyspotfo h ewr r etrlf u ftepoaainprocess. balance propagation of the amount of low out have left that better are ones network helpful, the is from few support a theory two including of case Although the for buyer). (similarly balance seller a on a and and based sellers buyers two obtained between we triangles signed which of form links, include. the negative in to theory inferred helpful avoid are support to low better have that seems links it positive However, implicit that appears a It have not method. do our to that | links of magnitude implicit low avoid (i.e., to information thresholds of amount two significant these using indeed that 4.6 Figure from constructing for respectively) on, disagree or X = o osrcigbt n-oepoeto arcs eosrei em fbt U n F1 and AUC both of terms in observe We matrices. projection one-mode both constructing for nFgr .,frteUS os aae,w aidboth varied we dataset, House U.S. the for 4.6, Figure In X = evaried We . X = ntest{,2,5,-5 10.Nt htatog eswsmlrted across trends similar saw we although that Note -100}. -75, {0,-25,-50, set the in l talregauaiyi h set the in granularity large a at l = 2 =B n xdti au oivsiaeteipc of impact the investigate to value this fixed and 9 8  and =B X = 9 8  P and 100  ie,nme fcmo sellers common of number (i.e., X n iial for similarly and ? X ? and enee otn eaaeyfrec dataset each for separately tune to needed we { 1 X , =B = 2 hsw eetdtebs naverage on best the selected we thus , , 9 8  3 , - X 5 =B ? } n bevdteewsntas not was there observed and , ntest{,55,510 and {0,25,50,75,100} set the in 9 8  P )poie ra improvement great provides |) ( lhuhw fixed we although , X 1 ? 8 and and X 1 = 9 X nthe on ? agree and

100 2 4,7,16 htaeacaso eplann ehd pcfial eindfrgraph-structured for designed specifically methods learning deep of 144, class a [143, are networks that neural 146] by 75, graph embeddings 145, of 22, node techniques state-of-the-art modern develop the to with seek theories social first signed we compared combining 5.1 stages Section of in earliest Hence, the others. in the the is is to embedding 142] network [141, signed detection while community studied, extensively which most among embedding, node and classification, detection, community node include tasks node-oriented major the networks, signed for Hence, networks. prediction tie-strength networks. and signed sign in of tasks mining link-oriented these on presented evaluated we were measures 3.1 relevance Section node in signed tie the that signed note on We research limited. explored, rather extensively is been prediction have strength 140] 139, 4, [26, [3, prediction prediction sign link and positive/negative 131] While 61, networks prediction. signed link negative to and specific prediction tasks sign link-oriented as novel such strength encourages tie also as but such 64], networks negative 63, unsigned of [62, for prediction availability tasks link-oriented The existing the enriches links. only negative not links and positive of understanding comprehensive and either into categorized be can they specifically, tasks. More node-oriented and utilizing tasks link-oriented on data. focuses graph which for mining, techniques network mining for data directions major two are there analysis network nti chapter this In oebsdSge ewr medn. nPoednso h 9hItrainlCneec on Conference International 2020. 29th (WWW). Web the Wide of World Proceedings The In Embedding.” Network Signed Role-based 2018. (ICDM). Mining Data on Conference International 18th the of 2 1 oeoine iigtsspoiencsaymasi re obte nesadndsin nodes understand better to order in means necessary provide tasks mining Node-oriented fine-grained reveal to are tasks link-oriented of objective the analysis network signed For mnJvr,TlrDr,PuaEmla,JlagTn,adKvnCe-ha hn.“ROSE: Chang. Chen-Chuan Kevin and Tang, Jiliang Esmalian, Pouya Derr, Tyler Javari, Amin Proceedings In Networks.” Convolutional Graph “Signed Tang. Jiliang and Ma, Yao Derr, Tyler 1 , 2 efcso h eeomn fsge ewr iigmtos ntraditional In methods. mining network signed of development the on focus we , IIGNTOK IHNGTV LINKS NEGATIVE WITH NETWORKS MINING HPE 5 CHAPTER 101

101 h udmna oilter oohl 8,wihsae sr aigcnetosaemore are connections having users states using which representation [8], node homophily a theory learn networks social unsigned fundamental for the designed of assumptions GCNs key signed example, underlying in For the links of negative GCNs. some of invalidate availability links the negative handle furthermore, would and they signed networks, how in unclear representations is node meaningful it learning First, of capable networks. not are reasons GCNs many are unsigned there why Unfortunately, to networks. as signed on used be to suitable whether are to GCNs as unsigned question the leads naturally This media, social ubiquitous. increasingly online becoming of are graphs popularity signed growing ever the with especially However, links). positive only 152], [151, detection community 149]. 150], [153, [149, visualization prediction and link as such 77], including tasks [82, analysis classification network many node in useful be to proven previously GCNs been node utilized have low-dimensional representations they learning where Furthermore, [22], problem. classification in node was semi-supervised level the node for the GCN first at The representations [70]. learning networks for neural introduced convolutional classical the after modeled are which networks convolutional (GCNs) graph are GNN of type particular One approaches. to principled compared more and heuristics slow fast with associated previously trade-offs and difficulties developed the more overcoming become by to started lately neural has 148], graph 147, namely 146, 75, structures, 145, 22, graph 144, [143, to (GNNs) networks models network neural generalizing social of in idea found those The as (such media). graphs being structures prevalent most the of one with data, structured Networks Convolutional Graph Signed 5.1 network. signed the original aggregate the then to back and embeddings models learned embeddings network traditional of directed advantage with take associated to roles edges node on labeled based network the transform first to embedding able network is signed that transformation-based methodology novel a develop to seek we thereafter Then, data. rvoswr a otyfcsdo sn Csfrusge rps(rgah ossigof consisting graphs (or graphs unsigned for GCNs using on focused mostly has work Previous to models network neural generalizing of interest growing and large a been has there Recently 102

102 ekt ans hssge ewr oilter osleteetocalne fapyn graph applying of challenges two graphs. these we signed solve Thus, to to networks convolutional theory 30]. social [29, network theory signed balance this is harness network psychology to social signed seek in fundamental developed one been had specifically, that More theory social homophily). like constructed theories were models unsigned unsigned using the how to towards (similarly networks attention signed our to turn specific we theories Thus, social a representations. into node links negative effective and learn positive inherently to the model are combine coherent to properties single how their (2) and since links; positive links, primary of negative those the handle than different GCNs correctly signed to how designing (1) When are: overcome. challenges to challenges networks, tremendous signed still to are applied when there networks unsigned in shown previously as performance fruitful signed for specifically and networks. GCNs positive redesigning both for having needed are of efforts context dedicated the Therefore in links. defined negative principles networks, and signed theories in social Instead, specific are [67]. use there networks signed GCNs to of applicable be processes not aggregation may node. homophily the each However, for Hence, embedding low-dimensional the constructing links. when information without neighborhood local those than similar be to likely lhuhi snwcerta Cswl edt eseiclyrdsge opoietesame the provide to redesigned specifically be to need will GCNs that clear now is it Although W h N z Z Notations   al .:Nttosi ead osge rp ovltoa networks. convolutional graph signed to regards in Notations 5.1: Table 8 8  8 ( 8 + (  ; ( ; ( ) ; ( ( ) (N ) ; ) ( * * h ( 8 − W ( * 8 8 ) ; ( )) ( ; * ; )) ) ( ) ; ) ) u)aacdifraini the in propagate information to (un)balanced how learning for used matrices Weight of representation (un)balanced The of neighbors (negative) positive of Set user of embedding users final of The set the from information the incorporating for responsible aggregator length The of from path reached (un)balanced be a can along that users of set The network signed of representation Low-dimensional Descriptions 103 D 8 ; th layer D ; . 8  tthe at 8 D ( 8 ; )( D 8 * ; 8 th ( ; layer )) G

103 n eaielnsitrc ntentoksrcuei ope asadide r o segregated not other. are each indeed from and ways isolated positive complex and in certainly structure because network essential the in is interact combination links and negative This positive and (i.e., links model. of coherent sets meaning single two semantic a the combine and into can negative) properties we how their is since challenge second links, The positive differ. as vastly same the links simply negative cannot We the process. treat aggregation the out during figuring links is negative which incorporate of correctly first can The we how overcome. and face must we challenges tremendous still are there with bridge to (SGCN). inherent network seek convolutional the we graph to that signed a gap Due of a development leaves the this networks. networks, unsigned signed and for unsigned GCNs between constructing differences link on from focused previous tasks However, mostly many visualization. has enhance and work to detection community shown to previously classification, has node network and prediction the in node low-dimensional each representative be for of to discovery features shown The has that embedding. domain network such is one recently but influential analysis, very network of Their field vast data. the over graph spread from cases information use aggregating have and and extracting developed in more superiority become their shown to already started recently have networks neural convolutional Graph Framework Network Convolutional Graph Signed Proposed The 5.1.2 a to as node each for vector low-dimensional a discover to follows: as network embedding network signed signed a of Given problem the define sum- formally those can we and 6.4, chapters Table previous in marized in presented definitions and notations aforementioned the With Statement Problem 5.1.1 where vnwt eiae ffrstwrstecntuto faGNseict indnetworks, signed to specific GCN a of construction the towards efforts dedicated with Even 3 dmninlrepresentation -dimensional  salandtasomto ucinta astesge ewr’ daec matrix adjacency network’s signed the maps that function transformation learned a is G = (U , E Z + ∈ , E R − = ) × ersne sa daec matrix adjacency an as represented 3  o the for : 104 A → = Z oe ftesge network. signed the of nodes A ∈ R = × = eseek we , (5.1) A

104 ntermidro h loih.Te,o ie2w opudtn h aaeeso h GCN the of parameters the updating loop we 2 line on Then, algorithm. the of remainder the in layer for X the generating of process the Z In 5.1. Algorithm in shown the of terms (in sizes even and edges). structures and varying nodes of of single graphs number a input 3) as and handling overfitting; avoid of to capable network is the GCN across sharing larger parameter handling for when allows it (especially 2) layers avoids graphs); connected it 1) fully fold: with in three associated structure least explosion network at parameter neural are models the this connected of fully benefits cumbersome the The to compared graph. as graphs the in can locations that all operator convolutional across a weights utilize they share that in structure similar a have GCNs most Currently, Networks Convolutional Graph Unsigned 5.1.2.1 objective. proposed our optimize to the taken discussing finally procedure function and optimization networks, objective signed an in of representations construction node the the learn through effectively first to – designed SGCN our of parameters present the both we learn Thereafter, capture to correctly process. how we to aggregation the theory Then during social simultaneously signed links networks. negative this signed and use positive can of we structure how the and to theory framework balance introduce this setting of network unsigned relationships the the in framework discuss GCN of general and a remainder discuss the briefly In first the will between networks. we gap signed section the this and connect networks to unsigned for bridge a GCNs construct of development to ongoing theory balance harness We 29]. [30, balance theory psychology, social in developed theories social signed indispensable and fundamental most ∈ ∈ ; yial h rhtcueo nusge C o erignd ersnain so h form the of is representations node learning for GCN unsigned an of architecture the Typically the of one utilize and analysis network signed of roots the to go to propose we work this In R { ∈ R ; = G fteGN nln estteiiilrepresentation initial the set we 1 line On GCN. the of × × 1 3 3 ! , . . . , 8= >DC where , hymk s fteusge daec matrix adjacency unsigned the of use make they , } ersn h idnrpeettosfrec fthe of each for representations hidden the represent 3 8= stelnt ffauevector feature of length the is 105 x 8 o user for 3 H >DC ( 0 D ) dmninlebdigmatrix embedding -dimensional A 8 qa to equal h matrices The . ∈ = R oe ftegaha each at graph the of nodes = × = X n etr matrix feature a and oes h notations the ease to H ( ; ) ∈ R = × 3 >DC

105 atrn ohtepstv n eaielnschrnl oehrdrn h grgto process. aggregation the during together for coherently it links harness negative will to and we propose positive we next the how both Therefore, and capturing 30] [29, 24]. theory positive balance [4, theory, the results social signed between fruitful such provide relations one discuss can complex extracted, exist if there that 30], links 29, negative and and [2, information, of theories amount social large signed a on ignoring certainly based only is negative choice and first only ignoring the positive intuitively the of on but thoughts separately networks, initial GCN two unsigned last an the applying leaves or links This negative the [67]. positive assumption of incorrect negation an the likely as is links semantically links negative and treating Similarly, principles different meanings. have different to incorrect vastly shown an represent be been would have links links positive negative the since as assumption, same the links negative For the representation. treating low-dimensional trivially advantageous example, an of learning structure network the complex towards the networks from signed extracted of be or to assumptions awaiting incorrect information on rich based the either of is parts methods ignoring these of each However, stage. end combining finally the with at network them negative the the applying then separately and network, or positive links, the positive first of to framework negation GCN the or same the them treating them, ignoring links. negative the ignore would this However, them). between link users between matrix link the applying adjacency to only similar positive be the would on this GCN networks unsigned signed to relation in that note we framework, GCN matrix representation layer’s last the as taken is embedding the converges, model the after function through features graph the propagate the we iteration update each for loop, this Inside convergent. until ntal,ortogt a edt oenïeapoce fhnln h eaielnsb either by links negative the handling of approaches naïve some to lead may thoughts our Initially, unsigned the on discussion above the Given networks: signed for GCN unsigned of Limitations ! aeso h C sn h nindajcnymatrix adjacency unsigned the using GCN the of layers 5 () oeta h function the that Note . D 8 and D 9 n tews ie,we hr xssete eaieln rno or link negative a either exists there when (i.e., otherwise 0 and , 5 () sweetevrain fGN rmrl ie.Finally, differ. primarily GCNs of variations the where is 106 A + where A A n egbrodaggregation neighborhood and 9 8 + = 1 fteeeit positive a exists there if H ( ! ) .

106 a efudi eto ...,weei iue22w a e httinls()ad()are (b) and a (a) denote triangles to propose that We see can unbalanced. we are 2.2 (d) Figure and (c) in while where balanced, 2.3.3.1, network signed Section a in in formed found be can be that cycles unbalanced. can possible considered four is the links and negative theory balance of on number details odd More an having signed cycle a a while in cycles links negative classifies of theory is The friend my enemy”. my of either is being friend as friend network “the my of implies enemy theory “the having balance and [30] general, friend” in my generalized In later and foundation. [29] theoretical in work graph seminal a early the to back dates theory Balance Links Negative and Positive with Paths Aggregation 5.1.2.2 iue51 nilsrto fteageainptsacrigt aacdadublne paths. unbalanced and balanced to according paths aggregation the of illustration An 5.1: Figure 6 2 1 5 3 4 loih 5.1: Algorithm Z while H Output: Input: ( ← 0 paeGNprmtr ae on based parameters GCN Update for ) ← H o convergent not ; H ubro grgto layers aggregation of number matrix adjacency network unsigned An ( ! X { ∈ o-iesoa ersnainmatrix representation Low-dimensional ( ) ; + 1 0 ) ! , . . . , yia nindGNframework. GCN unsigned Typical ← 5 ( balanced H − do ( 1 ; ) } , A do ) or unbalanced ! ;>BB egbrodageainfunction aggregation neighborhood ; ( 107 hr aacdccecnito nee number even an of consist cycle balanced a where , H ( ! A ) ) Z ∈ ∈ R = R × = = × etr matrix feature a ; 3 >DC aacdpath balanced X 5 ∈ () R = × soethat one as 3 8= ;

107 D steset the as user some when if setting. definition undirected our general that more and illustration the the on aid based to is used only from are arrows paths the along that users Note place would sets. respective length given their a of paths signed the all how of illustration from reached length be of can that path users unbalanced) case, (or general the In 2. length of path balanced a users between cycle balanced connecting a link in positive a suggest would theory from balance two thus length and links of negative path the where (b), triangle 2.2 Figure in between link positive a suggest would theory length that of see can path we a theory, had balance we with along if definitions, these With links. negative of number an odd similarly an and links, negative of number even an of consists sets an obtain we path, balanced a to link negative path. a but unbalanced adding path, when balanced Similarly a in results length. still additional links) of negative of just number even an of consisting path a (i.e., path When user of perspective the from length 9 A noteset the into eoecniun,ltu define us let continuing, Before nte e bevto rmFgr . shww a banteblne n unbalanced and balanced the obtain can we how is 5.1 Figure from observation key Another 9 8  8 A ; = ( ; eo epoiearcriedfiiinfrcluaigteblne n naacdsets unbalanced and balanced the calculating for definition recursive a provide we Below . ; 9 8 = 1 + N esmlrydnt h e fngtv egbr o user for neighbors negative of set the denote similarly We . 1 = D 1 : ) : + − ol epae in placed be would ) and 1 (i.e.,   nFgr . ecnseta hnhvn aacdpt flength of path balanced a having when that see can we 5.1 Figure In . 8 8 ( ( 2 * 1 ) D ) 8 hc euet eoetesto sr htcnb ece rmuser from reached be can that users of set the denote to use we which , ( : = ; + ∈ { D 1  ) 9 ; 8 flength of ( | from D ; D ) 8 ,te l h oiieylne egbr of neighbors linked positively the all then ), 9 sfollows: as ; N ∈ epaei h set the in place we D D 8  N 8 , 8 to + 8 ; 8 D + ( } + ; : D * , ob h e fpstv egbr fauser a of neighbors positive of set the be to and , + 1 9 epcieyfruser for respectively , 1 hthda vnnme fngtv ik,te balance then links, negative of number even an had that ) hsi eas digapstv ikt balanced a to link positive a adding because is This . D D 8 9 108 .Fo h otx fuser of context the From ). an D  9 neapeo aacdpt a eseen be can path balanced a of example An . 8 ( ; ) (or 8 D ( * 1 naacdpath unbalanced 8 D ) 8 to 8 ( = rmtesets the from , ; ) D .I iue51w rvd an provide we 5.1 Figure In ). { 9 D (through 9 D | 8 D as 9 D D N ∈ 8 N : ewudte place then would we 8 D wihw denoted we (which D − D en n hthas that one being 8  8 : where , 8 − ln balanced a along ossso two of consists ) 8 D and } ( 8 ; i.e., , ) and D ; 9 from D D t result (to D * 9 9 8 D 8 N ∈ N ∈ along ( 8 D ; into ) 8 of to 8 8 − +

108 D For anann igerpeetto o ahnd,w eparpeetto fbt hi “friends” their both of representation a keep we node, each than for rather propose representation we single Therefore, a 5.1. maintaining Figure in visualized be can phenomenon This theory. social in those in and users linked) for Similarly, directly “foes”. their are links negative across to neighbors links while positive “friends” through their connected as are same. that the users users semantically all because categorize is cannot we This networks, signed in However, information away hops from). of aggregated number being the is denotes GCN multi-hop the a multiple in from layers information of number incorporate the use to (where neighborhood node the a through allowing network then the and in this representation propagate layers, single a is immediate their into insight aggregate first information they The neighbors’ representation, node local paths. a and constructing when sets GCNs, unbalanced unsigned and in balanced that of light in construction the behind intuitions and insights some provide we network, convolutional graph signed our formalizing Before Network Convolutional Graph Signed 5.1.2.3 framework. our of details the of rest the with functions follow aggregation and propose GCN will signed our we for Next paths/sets. unbalanced and balanced signed using in information networks propagating and upon aggregating of based way principled definitions, a these us allow that definition now theory, note the balance We sets links. unbalanced negative the direct/suggested For with even except them. an similar, have connecting is they path since the them along between links link negative positive of a number suggest would theory balance that those 2) user a for paths) balanced along 8 sblne es aac hoywudsgette r hi fins ee huhte r not are they though (even “friends” their are they suggest would theory balance sets, balanced ’s ie h bv ento,w gi oeta h sr nteblne es(hc r reached are (which sets balanced the in users the that note again we definition, above the Given > ; *  1 8 8 ( ( ; ; + + 1 1 ) ) = = { { D D 9 9 | | D D : : ∈ ∈ D *  8 sublne esaesgetdt eter“os ae nthis on based “foes” their be to suggested are sets unbalanced ’s 8 8 ( ( D ; ; 8 ) ) r hs htete:1 aeapstv ikdrcl to directly link positive a have 1) either: that those are and and D D 9 9 N ∈ N ∈ 109 : : + + { ∪ } { ∪ } D D 9 9 | | D D : : ∈ ∈ *  8 8 ( ( ; ; ) ) and and D D 9 9 N ∈ N ∈ D 8 : : r huh of thought are − − } } D (5.2) 8 or ;

109 * u endblne n naacdptsst.Teeoew mlyascn e faggregators, of set to second a according namely employ we theory Therefore balance paths/sets. to unbalanced and adhere balanced to defined our correctly neighbors these must of we that information is here the in step layer aggregate crucial second the However, a neighbors. of two-hop use the the incorporate through can we Then, GCN, our representation. “foes” one level the learning for used is aggregator of 5.2 use of the Figure through neighbors of representation layer positive first two the the in that example, see For can information we the sets. unbalanced incorporating and for balanced responsible respective aggregator each separate from a have user for could representations we learned that two observe the into incorporated be will information user’s from is user labeled the circles away the hops that Note networks. signed a in more a user. gives given and a links of negative representation and thorough positive the both incorporates successfully which “foes”, and iue52 nilsrto fhwSC grgtsniho nomto nasge network. signed a in information neighbor aggregates SGCN how of illustration An 5.2: Figure 8 ( 2 nFgr . epoiea lutaino o epa oageaeadpoaaeinformation propagate and aggregate to plan we how of illustration an provide we 5.2 Figure In ) epciey oieta uta hw nFgr . sr en nlddb the by included being users 5.1 Figure in shown as just that Notice respectively. ,  ( 2 ) and * ( 2 ) hc ilhl rpgt h nomto rmuesi sets in users from information the propagate help will which D 8 n iutnosydntsa hc ae norsge C that GCN signed our in layer which at denotes simultaneously and  ( D 110 1 8 ) Similarly . ilb noprtdit h ee n “friend” one level the into incorporated be will ; = 1 , 2 ! , . . . , D 8 ssnl eaieylne neighbor linked negatively single ’s r sdt eoehwmany how denote to used are D 8  ecan We . 8 ( 2 )  and ( 2 )

110 grgto ae ie when (i.e, layer aggregation h grgtosfor aggregations The of definition the as just complex, more is aggregation user representation hidden the determining for and sets respectively, from coming “foes” and “friends” the for responsible matrices transformation unsigned the to Similar “foes”). suggested use (i.e., we set GCN, unbalanced respective the and in “friends”), users suggested (i.e., the users for of one set balanced corresponding the for one layer, each at tations SGCN. proposed our by used functions (in set link negative into one fall and both positive since one ordering, of either consist that paths along users from information the the utilize On theory. balance to according aggregator “friends” hand, other as suggested consecutive both two or are links, they positive because consecutive two links, of negative path a along are who users the are aggregator > ; where represen- two maintain will we SGCN, our in information propagating and aggregating While 1 D nE.(.) hsi iial u otecoslnigo eaielnsa eni iue5.1. Figure in seen as links negative of linking cross the to due similarly is This (5.2). Eq. in 8 (i.e., f () h h 8 ( 8 ( sannlna ciainfunction, activation non-linear a is 0 0 ) ) 3 ln ihtema fteuesi set in users the of mean the with along ) >DC ∈ h 8  > ; R stelnt ftetoitra idnrpeettos oespecifically, More representations. hidden internal two the of length the is ( * 3 ; ) 8= 1 ( = 2 orpeetteinitial the represent to r enda follows: as defined are ) f ; wihi ahrn nomto rmuesi h set the in users from information gathering is (which h

h = W * 8 8  1 ( (  1 ,w tlz h following: the utilize we ), 1 ) ( ) ; ) = = h f f 9 * ∈N Õ

8 W W ( 8 2 + h * )  8  h .Nww a oefral ics h aggregation the discuss formally more can we Now ). ( ( (  |N 9 1 1 1 ) ( 111 ) ) ; 8 h h + − eas octnt h idnrpeetto of representation hidden the concatenate also we : 9 | 1 3 Õ ∈N Õ ∈N ) 8= , W : 8 8 + − oefaue o user for features node ∈N Õ  |N |N h  h ( 8 − ( 9 8 : ( 1 8 0 8 0 ( + − ) ) h ; ) , | | ) * W : , |N ,  h an h ( 8 ; * 8 8 ( 8 − ( ( − 0 0 1 ( | 1 ) * ) 1 ) i ) i ) nalsbeun aes the layers, subsequent all In . 8 ! , ! ( h ; ∈ 8  ) ( eemr ope when complex more were R ; − 3 1 >DC ) i D ! × 8 hs o h first the for Thus, . 2 3 8=  * 8 ( r h linear the are 8 1 ( ) 2 ) and ek to seeks ) * (5.4) (5.3) 8 (5.5) ( 1 ) ,

111 egtdmlioillgsi ersin(L)casfir eew iht lsiywehra whether classify to wish we Here classifier. performing (MLG) the for regression layer in logistic additional users multinomial an weighted of would incorporates a pairs we term between first that The relationships goal the space. the understand embedded on network’s to signed based able are be which to of representations both the components, like two upon based is SGCN for user for representations hidden two the h concatenating is theory. step balance last on the based 14 designed line we on Finally, functions aggregation level higher defined the to (i.e, according of one number than total the greater if is Next, SGCN process. the aggregation in layers layers first the show we 5 through user 2 lines each on for set Then we embedding 1, the line obtain On to how network. discuss signed we 5.2 Algorithm in First, SGCN. friends. foes’ from their gathering and are foes we layer, second the in but information, neighbor linked negatively of case the in Similarly, foes’. of representation foes and friends’, of also friends but level) hop neighbors), two linked the positively (at (i.e., friends direct their only not from information gathering neighbors h vrg mns h fe”level “foes” the amongst average the h sets the defining when as ( ; 8 8   − ( ( etw eina betv ucint er h aaeeso GN h betv function objective The SGCN. of parameters the learn to function objective an design we Next of framework entire the present now can we methods, aggregation discussed above the With where ; ! ) 1 ) ) ) and tlayer at (i.e., D W h : * 8 h  N ∈ (  : ( ! h ; ; ( ) ) * 8 ; , − (when oehrit igelwdmninlrepresentation. low-dimensional single a into together ( 8 W − 1 ; ) ) hs o h aewhen case the for Thus, . h o l oiieylne neighbors linked positively all for )  ie,user (i.e., * 8 ( ( ; ; ) ) > ; ∈ =  R 8 f ( 1 3 ;

) >DC ti ae pnageaigte“red ersnaina layer at representation “friend” the aggregating upon based is it ) W D 8 and s“os ersnain,tefis ae ol aegtee direct gathered have would layer first the representation), “foes” ’s * × ( 3 ; h 3 ) * 8 h >DC ( ( 0 8 9 ; ( ) ∈N Õ ; − qa to equal ) for hngteiguser gathering When . 8 1 + ) > ! h > ; (i.e, ; * 9 |N = 112 ( ; 8 + 1 − 1 2 x oeta eaeuiiigtesm oi here logic same the utilizing are we that Note . | h 1 ,te epromtesbeun aggregations subsequent the perform we then ), 8 ecnsete“red ersnaini nfact in is representation “friend” the see can we ) * 9 , o aei enn h eto h algorithm. the of rest the defining in ease for ( : ; ∈N − Õ 1 D ) 8 − nomto rmalngtvl linked negatively all from information ) 9 h N ∈  : |N ( ; 8 − 8 − + D 1 | hl iutnosycollecting simultaneously while ) 8 s“red ersnain(i.e., representation “friend” ’s , h * 8 ( ; − 1 ) i ! ; = 2 D 8 u hidden our D sfriends’ ’s 8 D namely , 8 nthe in (5.6)

112 meddsaeta h oln ar,adten ikpie sr hudb lsrta users than closer be should users paired link no the the in and closer users pairs, linked link positively no have the to is than term space second embedded this of goal The objective. overall the by controlled is term This theory. balance structural extended classifier, the into input For users l for users. embeddings of final pair the the between use link we no or negative, positive, a was there aro oeebdig r rmueswt oiie eaie rn ikbtente.More them. set between a then link and no users or of mini-batch negative, a positive, construct a we specifically, with users from are embeddings node of pair ( 10 D 2 1 5 6 4 3 7 B loih 5.2: Algorithm 9 8 8 D , odnt h egtascae ihclass with associated weight the denote to for h z if Output: Input: 8 8 ( L 9 0 [ ← B , ) D for h h > 8 ← * 8 8  ) U ∈ 1 h ( ( hc eoe h aro sr ( users of pair the denotes which aesL egtmatrices weight L; layers G ; 1 1 for 8  x then ) ) = o-iesoa representations Low-dimensional 8 ( = , ← ! ← ∀ 2 do D ) h h (U D 8 , ! . . . * 8 8  f 8 f h U ∈ ( ( * 8 U ∈ indGahCnouinlNtok(GN medn generation. embedding (SGCN) Network Convolutional Graph Signed ,

;

; ) E W ) W ( ! = + = do  * ) do , ] f f E ( ( , 1 1 ∀

) ) W W D h ) h niiilse oerpeetto { representation node seed initial an ; 8 9 :  * ∈N U ∈ ∈N Í ( Í ( ; ; ) 8 ) + 8 − h h 9 |N h 9 |N h ∈N W ∈N ( Í 9 Í : ( 8 0 + 8 0 −  ) 8 | 8 ) + + | , ( , ; h h ) h h D 8 (  * 9 |N 8 9 and ( 0 |N 8 0 ( ) ( ; ) 8 i ; and + 8 z − + i − ! 8 D | 1 W ! | , 1 8 ) ∀ ) , , D 113 * B D , D : eitoueascn emta sfuddon founded is that term second a introduce We . : 8 9 ( ∈N 9 ln with along ) ∈N ; Í U ∈ Í ) octntdtgte ie.[ (i.e,. together concatenated , 8 − ∀ 8 − ; h h { ∈ * : |N  : |N ( ( ; 8 1 ; − 8 − − − ! , . . . , | 1 | 1 M x ) ) _ 8 , , , B hc otistilt fteform the of triplets contains which , h oblnetecnrbto towards contribution the balance to h ∀ 8  * 8 D {+ ∈ } ( 8 ( ; o-ierfunction non-linear ; ; − U} ∈ − 1 1 ) , ) i − i ! ! ubro aggregation of number ; , ? } o eoigwhether denoting for z 8 , z 9 f ) euse We ]).

113 ypromn h otfnaetlsge ewr nlssts,nml iksg rdcin[4], prediction sign link namely task, analysis network signed fundamental most the performing by path longer embeddings? node with the along learning process in aggregation increase performance the a into provide and information theory balance representations? of low-dimensional introduction meaningful the learning following Does of the (2) answer capable to SGCN seek Is We (1) con- graph representations. questions: signed node proposed learning the in of (SGCN) effectiveness network the volutional evaluate experimentally we section, this In Experiments 5.1.3 that [22] in as such descent). work gradient previous the to batch update compared performed effectively (as to setting mini-batch show a been using has GCN it a since of [75], parameters utilize in we presented parameters, as the updating updating style For SGD model. same our the of parameters the on regularization for use we user pair linked every for where respectively, users, linked negatively classes), link no and negative, positive, classifier, MLG the aigangtv ikbtente.Teoealojciei omlzdi h following: the in formalized is objective overall The them. between link negative a having \ , oadestefis usin ecnuteprmnst esr h ere medn quality embedding learned the measure to experiments conduct we question, first the address To ersnstewih arcsue ntelyr forSGCN, our of layers the in used matrices weight the represents D : admy(n ieeti aheoh hthsn ikto link no has that epoch) each in different (and randomly L( \ , \ , "! l B sue o h egtascae ihteclass the with associated weight the for used is ) = + + − + _ '46 |M M 1 " |M (− 1 ( ( D \ 8 , (+ 1 ? , ,D ) Õ , | 9 \ , ? M ,B ( ) ∈M D | )∈M "! 8 ( (+ ,D Õ ∈M D (− 8 , 9 ? ,D Õ ,D ) l , ) (+ ? 9 : 114 and ) B ,D ) , ? log : max ) ) M max @ ∈{+ (−  0 Í , ,  ? , exp 0 (|| ) − , , r h esfrtepiso oiieand positive of pairs the for sets the are ? z (|| } 8 ([ exp z − 8 z ( z 8 − D , : \ ([ 8 z z D , || D "! 9 z 2 9 2 8 ] 8 h term The . || \ 9 , || − 2 ) 2 B B z "! efrhrsml another sample further we || − (with 9 eoe h aaeesof parameters the denotes ] z \ 8 @ "! z − ) 8 z − B 9 {+ ∈ z || ) '46 : 2 2 || )  2 2 , # ) ( −  \ , , ? \ , } o the for "! (5.7) )

114 a td h ffcieeso u indGN(GN nlann oerpeettosi signed in representations node learning in (SGCN) GCN signed we our that of such effectiveness methods the study embeddings can network signed state-of-the-art existing some present we Here Comparison Performance 5.1.3.1 model. along our search of grid hyperparameters a the used tune we to that data Note training the training. on as validation 80% cross remaining with the and test, choose as randomly we data dataset, the each of For 20% We performance. better (AUC). mean Curve both characteristic AUC and operating F1 receiver higher the that Under note Area and F1 both negative utilize than links we positive more links), many are since of there evaluation, (i.e., set For unbalanced the are data. links training as negative the and together positive from users the edges labeled two the the using of trained is embeddings model final The regression the logistic features. concatenate a employ we we based case specifically sign our (more the users In of predict pair model). to the used from is features input classifier or of binary positive set a being a Thus, signs on their users. predict to of wish pairs we those set, between training negative the of out held been had that network 4.2. basic Table some in presented with previously 5.2 as We same Table the in are links. datasets Bitcoin-OTC few and Epinions Bitcoin-Alpha very and while statistics, Slashdot had the that of Epinions) variants new and the (Slashdot summarize networks users larger out two filtered further the have from and networks randomly signed datasets undirected these the of on experiments each for our that perform we note We Epinions. and datasets, Slashdot, network Bitcoin-OTC, signed Bitcoin-Alpha, real-world graph i.e., four signed on using experiments representations our learning conduct of we study networks, our convolutional For evaluation. for used metrics the and the (i.e., theory balance of theory). use network make social not signed do fundamental that paths or longer step) the aggregation exploit single not a do performing that only framework (i.e., our of variants answer investigate To we question, methods. second baseline the state-of-the-art embedding network signed the against compare and h rbe fpeitn h in flns[]i htgvnasto xsiglnsi h signed the in links existing of set a given that is [4] links of signs the predicting of problem The Settings: Experimental et ent h aaesue,teln inpeito problem, prediction sign link the used, datasets the note we Next, 115

115 yeprmtr 8]froreprmns )FrSD,w s h uhr implementation authors the use we SIDE, For SiNE 4) for experiments; code our released for authors [87] the hyperparameters used We 3) (i.e., 64; matrix be feature to input representation the as model SSE the of embedding final the use we instead therefore follows: as are baselines The network signed network embeddings. towards signed efforts non-dedicated previous the over since superiority methods their shown unsigned has work include embedding not do we succinctness For networks. - ) 4 3 oefia oe r h olwn:1 noreprmnsw onthv oeattributes, node have not do we experiments our in 1) following: the are notes final Some model: our of variants two following the evaluate to propose we Furthermore, oalorSC ains )fralebdigmtosw xdtefia low-dimensional final the fixed we methods embedding all for 2) variants; SGCN our all to • • • • • https://datalab.snu.ac.kr/side/resources/side.zip swang187/codes/SiNE.zip http://www.public.asu.edu/ ersnainfrec sri ae npoaaigifrainaogtepstv links final positive the the words, separately. along twice, other links information negative In propagating the and on twice, twice. based but is layer, user first each instead for the theory, representation of balance aggregation of naïve use make the not performs does it SGCN-1 to similar method This SGCN-1+: theory balance of use make paths). yet balanced not defined does our and (i.e, links negative the only from therefore positive and layer the aggregation separates single first the of use makes only method This SGCN-1: indirect obtain formulation. to likelihood used a is for theory, connections balance utilizing method, based walk random A structural [89]: extended SIDE utilized that framework learning deep a theory. balance is method This [87]: SiNE top- the utilize We the on matrix. based Laplacian algorithm the clustering of spectral version A signed proposed [153]: (SSE) Embedding Spectral Signed orsodn otesals ievle steebdigvcosfrec node. each for vectors embedding the as eigenvalues smallest the to corresponding 116 3 n s hi suggested their use and 3 >DC eigenvectors 4 and

116 o h als emk h olwn observations: following the make we respectively. 5.4, tables, and the 5.3 Tables For in demonstrated are F1 and AUC of terms in results comparison The Results: Comparison 64. size of were embeddings final the that such 32, to set each were set representations we a hidden models “foe” our used and for we 5) and parameters settings; unsuggested default code’s the their around for search but grid [89], from settings hyperparameter suggested the • efrac ihtebs efrac rmtebslns hsosrainsget htit that suggests observation This baselines. the from performance best the comparable with obtains performance links negative and positive from aggregation step one only with SGCN-1 al .:Saitc ftosge ewr aae ainsfrSGCN. for variants dataset network signed two of Statistics 5.2: Table Embedding Embedding SGCN-1+ SGCN-1+ SGCN-2 SGCN-1 SGCN-2 SGCN-1 Method Method SIDE SIDE SiNE SiNE SSE SSE al .:Ln inpeito eut ihAUC. with results prediction sign Link 5.3: Table Epinions Network Slashdot al .:Ln inpeito eut ihF1. with results prediction sign Link 5.4: Table Bitcoin-Alpha Bitcoin-Alpha 0 0 0.912 0.910 0.738 0.888 0.898 0.785 0.780 0.630 0.778 0.764 . . Users # 917 796 16,992 33,586 Bitcoin-OTC Bitcoin-OTC Positive # 117 276,309 295,201 Links 0 0 0.817 0.818 0.618 0.814 0.803 0.923 0.918 0.750 0.878 0.923 . . 823 925 Negative # Slashdot Slashdot 100,802 0 0 0 50,918 0.784 0.547 0.792 0.769 0.864 0.853 0.646 0.854 0.820 Links . . . 804 804 865 Epinions Epinions 0 0 0.722 0.663 0.571 0.849 0.822 0.893 0.851 0.711 0.914 0.901 _ . . 864 933 = 5 n h “friend” the and

117 olne ar lsrtgte hntengtv pairs. wanting negative by the apart than further together pulled closer links pairs negative linked with no users no have had to they sought users also other further to and than with, space link embedding low-dimensional the in closer be to links positive structural by extended controlled to contribution adhere its With that [154]. embeddings relationship. theory node their balance discovering distinguish positive, for can have utilized classifier we that the term user that second of such The pairs positioned be that can such link separable no be and to negative, embedding attempt node an learned in term the regression guide logistic (5.7). to multinomial Eq. the in given introduced as term function first objective our the specifically, in More terms two the between balance the control to parameter used The is SGCN). of variants our with investigated already have we which types aggregation hyperparameter, major one has GCN signed proposed The Analysis Parameter 5.1.3.2 iue53 aaee estvt hnvrigteparameter the varying when sensitivity Parameter 5.3: Figure • • ogrblneadublne ah a os h performance. the boost can paths the unbalanced following and Aggregation balance SGCN-1+. longer and SGCN-1 outperforms SGCN-2 time, the of Most performance. the improve help can during aggregation steps the multiple propagating that indicate results The SGCN-1. outperforms SGCN-1+ sncsayt eaaepstv n eaielinks. negative and positive separate to necessary is a GN2(F1) SGCN-2 (a) 118 _ hstr ocdpiso sr hthave that users of pairs forced term this , _ b GN2(AUC) SGCN-2 (b) bsdstenme flyr n the and layers of number the (besides _ nteBtonApadataset. Bitcoin-Alpha the on _

118 ihrcoeeso itnns.Eitn ok 18 5,17 ov hscalneb eyn on relying by challenge this solve 157] indicate 156, [118, can works paths Existing signed distantness. since or challenging closeness are either similarities path-based networks How- signed closeness. in represent ever, paths connecting assuming network nodes the between embed similarities to finding try models through these networks, unsigned for models embedding many to Similar to potential [87]. the prediction link/sign has as it such challenging, tasks analysis is network networks advance greatly signed of embedding While links. negative models. classic and applying embedding simply positive by out both carried having be cannot to networks signed due for embedding networks network Therefore, classic of those from can different networks signed quite of negativebe principles underlying while The friendship enmity. or or disagreement agreement distrust, trust, show may represent ones signs positive where network signed a as and positive links: of types two 7]. having [55, networks, negative such of class important an are networks Signed can network embedding a the i.e., in type, link closer have one are than nodes more have neighboring might networks that real-world However, way [155]. a space in primarily network they unsigned Hence, an closeness. encode implies to nodes try two between relations where and [155] type edge Embedding Network Signed Role-based improvement. an provide the to 5.2 that able was in theory, datasets balance all on across based results term, second similar the saw of we contribution that Note setting performance. when in that decrease is drastic observation a second The performance. F1 and figures AUC two these from similar see have can can we we since As settings observations. other of results show not do We Bitcoin-Alpha. namely datasets, eety indntokebdighsatatdicesn teto 16 5,18 118]. 158, 157, [156, attention increasing attracted has embedding network signed Recently, represented be can Epinions and Wikipedia, Amazon, as such sites, media social of variety A single a only with networks for designed been have methods embedding network existing Most varying when results the report we 5.3(b) and 5.3(a) Figures In

ye flnsweeec yerpeet ieetqaiyo eainbtentenodes. the between relation of quality different a represents type each where links of types 119 _ = 5 em ob odblnebtenthe between balance good a be to seems _ o n ftesge network signed the of one for _ qa ozr ehave we zero to equal

119 r h ie n eevro indlns epciey hrfr,ec oeo indnetwork signed a of node each Therefore, respectively. links, signed of they which receiver for and roles giver “item” the and “user” are both takes node each where network bipartite a into signed the network transform to is idea underlying The challenges. aforementioned the bypasses that (ROSE) Embedding network Signed network. based ROle original a introduce the we networks, encode signed embed to to specifically, aggregated More embedding be can the network Finally, transformed the embedded. from be obtained can vectors the network in transformed nodes the multiple to Next, network original network. the transformed in node each The mapping complexity. by lower done has be task can embedding transformation the which for it network challenging, another is into network transformed original be can the embedding if embedding: based transformation network as well, links of prediction. link presence/absence in the performance reconstruct low in not resulting can link ignore they they state), since interaction Thus, third links. (the negative and absence positive states: interaction possible the of only models two embedding use signed existing while embed- links classic of presence/absence Second, capture to theories. aim these models ding to align networks the closely how quality lower depend in and result sometimes embeddings and affected are them social on built explaining of models in so use incomplete structure, are network the theories signed and social First, nodes challenges. two major the two between However, with associated similarity is [2]. define theories theory they status way and the 30] on [29, architecture theory general balance namely theories, social signed two network bipartite unsigned an to nodes two with network signed role-nodes. a of of Transformation 5.4: Figure oadesteesotoig,w a u e esetv o ewr medn denoted embedding network for perspective new a out lay we shortcomings, these address To 120

120 , rmterebdig.4 osfnto hteautstercntutdsmlrt aus The values. similarities similarity reconstructed node the pairwise evaluates that the function recover loss to A function 4) embeddings decoding create embeddings. their A to from function 3) encoder An function. 2) similarity the function. from similarity node pairwise com- A four having 1) [160] framework ponents: encoding-decoding an as described be can models Embedding Embedding Network Unsigned 5.2.1.1 node each maps graph the Given negative. networks unsigned In nodes, the as defined be graph a Let Statement Problem 5.2.1 to work network. first signed the a is in this knowledge, nodes our of of embeddings best aware target the To build entity. target weights the attendance to which respect in with role-nodes obtained of are embeddings attention an the propose aggregate we to idea, this model on based Based mechanism [159]. users of encodings dependent introduced target that target- for model model recommendation The a based learning deep together. recent embeddings a on role-node based is the aggregation aware all concatenates simply aggregation fixed The aggregation. target-aware role-nodes. and aggregation their fixed of as embeddings denoted methods, the aggregation aggregating two by introduce We obtained be can node a of embedding hensive transformation the of example toy a is 5.4 Figure process the technique. utilize embedding can unsigned network art transformed the this of ultimately state Then, links. can unsigned role-nodes between using relations captured the fully where role-nodes, be as denoted roles, of set a by modeled be can ihsize with ahrl-oecpue eti seto oei h rgnlntok ec,acompre- a Hence, network. original the in node a of aspect certain a captures role-node Each  | + ersnstelns n ahlink each and links, the represents ∗ | E 3 oa to .  3 dmninlebdigvco hc a eprmtie yteMatrix the by parametrized be can which vector embedding -dimensional  a nyoevle,btsge ewrshv w aus oiieand positive values: two have networks signed but values, one only has (  , +, h ako oeecdn st er function a learn to is encoding node of task the , ) ihaln yempigfunction mapping type link a with 121 4 ∈  eog oaln type link a to belongs i :  →  where 5 i ( : 4 + ∈ ) + →| −→ represents  = 3 | + that , − .

121 ewe hm fapt niae lsns,te me h oe lsraddsac them distance and closer nodes the embed they closeness, indicates path a If them. between [118]. theory balance on relies which and introduced for been relevance method has network node networks convolutional to embedding a applied Then, walks. [133] random algorithm, using [164] node2vec ranking to personalized random similar a networks run both signed 163] [156, on theories. walk social of version extended the on relying by mainly process structures. global two. capturing length in of power paths limited beyond have go they not such, As do methods closeness these representing However, is nodes. path two signed between the distantness whether or determine to them used have 157] [87, methods two status. the and used works balance previous namely this theories, aid social To signed nodes? the between distantness containing or closeness path indicate a path given e.g., challenging, However, and is links networks positive nodes. signed between in proximities structures limited order has global however, higher This, capturing the 88]. capture [162, cannot neighbors it immediate because its on effectiveness based node a embed to is links paths. order higher or two, one, length to at sought them between have paths methods the to using Existing how similarity is node proximity. capture networks positive signed hindering embedding in without challenge edges the negative involve Thus, closeness. negative represent because networks not signed do to edges applied directly be cannot functions similarity unsigned The Embedding Network Signed 5.2.1.2 nodes 149]). two 150, between [161, path in unsigned as an (e.g., closeness that their is indicates functions similarity unsigned in However, principle similarity. shared node define the methods embedding the how is literature the in difference primary nal h hrdsrtg falteewrsi htte me oe yaayigtepaths the analyzing by nodes embed they that is works these all of strategy shared the all, In paths: Longer two: length of Paths paths: Single-length = oercn okhstidt atr ogrcceptsi hi embedding their in paths cycle longer capture to tried has work recent More eaielns o a h iiaiyo h oe a edfie?De the Does defined? be can nodes the of similarity the can how links, negative steaoesca hoisaefre ntinl tutrs existing structures, triangle on formed are theories social above the As rva praht me indntok hl novn negative involving while networks signed embed to approach trivial A 122 <

122 sdsrbdbsdo h frmnindtrese rhtcue ete lutaehwROSE how illustrate problem. then the We of requirements architecture. the addresses three-step aforementioned ROSE the following, on the based In ROSE. described propose is we transformation, network of idea general By the network. transformed on the relying of embeddings the aggregating by network network. original transformed the the Embedding Embedding 3) 2) transformation. Network be 1) can steps: model main embedding three based in transformation described network a sum, an In embeddings of the role-node. aggregating aspect corresponding by derived the certain be of can a node target captures a of role-node by vector embedding each determined the be Since node, original can build role-nodes functions. between and similarity similarities “role-nodes”, classic the as the that denoted adopting way node, a a in for role-nodes way of roles possible network different One a define network. to input is the transformation which in in do present network to challenges another embedding to the transformed the be encounter finding can not it directly do network, we than input the Rather in nodes the embedding. of based similarities transformation network of notion general about assumptions make not do network. 3) the and of links), origin of the labels absence link or the (presence account structures link into take the as 2) well nodes, as between connectivity order higher the capture be 1) should model to embedding able works, network universal previous effective the an of drawbacks requirements: following the the on outline Based we ROSE. of structure the describe we section, this In Embedding Network Signed Role-based 5.2.2 them, between links/paths paths. of positive/negative absence capturing the on focuses on only strategy based it nodes this i.e., distant Also, to way principled process. a embedding some use exploit the not they to does distantness, noise or induce closeness naturally which indicates assumptions path strong a if interpret to However, otherwise. ewr rnfrainbsdembedding: based transformation Network 123 oadesterqieet,w nrdc the introduce we requirements, the address To

123 from ihtotpso oe i”ad“u” oee,apyn lsi iiaiymaueo the links. negative on and measure positive of similarity presence classic to a due challenge applying a However, still is [165] “out”. network network transformed and bipartite “in” signed nodes a to of transformed types is two network with input the 5.5(a), Figure in seen be can node the i.e., role-nodes, two to mapped transformation a through separately node a of roles process. receives. user/item it links capture the we for analogy, role “item” this an plays where on and network Based creates bipartite it links a the for as role viewed “user” be a plays also node each can network connected all-to-all signed bipartite A user-item a network. by modeled are systems recommender in interactions systems. user-item Traditionally, recommender by inspired is idea transformation Our transformations. different creating Similarly,by embedding based Various transformation of measures. idea the on similarity process. based developed be different transformation can methods on embedding the different based define introduced to ways been have multiple to techniques be aim embedding can We there ROSE. that of classical Note using effectiveness obtained be the methods. can to role-nodes between fundamental similarities that is such transformation defined the are define nodes role the way The Transformation Network 5.2.2.1 iue55 rnfrainpoeso h nu indntokt h ewr frole-node. of network the to network signed input the of process Transformation 5.5: Figure tp2 rnfraint nusge network. unsigned an to Transformation 2: Step network. bipartite a to Transformation 1: Step D to E nteoiia ewr smdlda nudrce ikbetween link undirected an as modeled is network original the in D smpe oterole-nodes the to mapped is 124 etasomtentokit nunsigned an into network the transform We ae nue-tmaaoy ahnd is node each analogy, user-item on Based D >DC and D >DC D 8= and hr link a where E 8= sit As .

124 D   hudb oe httetasomto slsls,i.e., lossless, is transformation the that noted be should links to 4) and link, of set the with network unsigned the in “out” connections type of node of each set for a i.e., with “out”, network type of unsigned nodes our dummy augment we problem, sparsity the attenuate can which process, role-nodes: opposite their between node If leverage domain. we problem this, the solve To about knowledge role-nodes. implicit such results, of our embedding to accurate the According number hinder the dramatically links. that can positive In this fact to the compared to under-represented degree. due often low degree is low very links very negative a a of have have to may tend “in-” role-nodes type the of role-nodes of particular, some However, network. transformed the role-nodes. from link “in” type of role-node A role-nodes. new defining by network E E F { E 8= 8= + ; >DC 8= − D D 1 hsealsu ouetewl-salse iiaiyfntost eemn h iiaiisof similarities the determine to functions similarity well-established the use to us enables This . ( ( 8= o nyi eet h daec ewe hs w oendsbtas tipisdependence implies it also but role-nodes two these between adjacency the reflects it only not , ; umr ftransformation: of Summary tp3 umnigtenetwork. the Augmenting 3: Step (or + + 1 0 hc ntae ik 2) link, a initiates which E , D D  ,  , E 2 4 8= − 8= ; D D D 2 0 D ersnigisrl hnpstv o eaie ik on oadi.Acrigy a Accordingly, it. toward point links negative) (or positive when role its representing ) ) ) >DC .,E= ..., , . >DC where { D E ,E 8= − 1 8= ; to 8= ; 1 hc eevsangtv ik n link a And link. negative a receives which 8= ; E , and E < 0 | + 8= } 2 | 8= ; where ihlabel with 2 = 4 .,E= ..., , D 4 >DC 3D<DC 3D<DC ∈ s“-”, is ( + , +, a oncin oad both towards connections has smpe ofu oendsin role-nodes four to mapped is 4 D,E E ; ) 8= 0 a eflyrcntutdfrom reconstructed fully be can s“”advc versa. vice and “+” is ihtelabel the with smpe notorole-nodes: two into mapped is D 8= + hc eevsapositive a receives which ; stransformed is D >DC E 8= + + A and and 1) :

125 nyfie medns norfaeok nutvl rdcigtepiws neato from interaction pairwise the predicting build intuitively framework, techniques our existing In the knowledge, embeddings. our fixed of only best the To model. aggregation target-aware a ing [159]. item target the to item corresponding the of similarity rating the a of on weight based the Typically, interactions determined her [167]. is item of the all towards taste not her because reflecting way in weighted important equally a recommendation towardsare in user the aggregated a are of of ratings most rating previous the for her predict item, target basis to an the the filtering, to collaborative is item-based respect profiling in with example, target-aware For node of initiator models. idea given the the fact, encode In to accurate entity. more Intuitively, is prediction. it link tasks, e.g., such nodes, of for interactions pairwise the predict to vectors embedding nodes. original the of representations the about knowledge extra nodes add role not the do of inverses and are “out” nodes type role of “out-dummy” fact, In process. aggregation the in used not node embedding of the representation as fixed concatenate the to such, is As node role-nodes. a corresponding the of of forward embedding vectors straight unified a and Accordingly, comprehensive a representation. build unified to a way build concatenate to can we them entity, combine an linearly of or representations them multiple are there if general, In network. original oends ntefloig eitouetodffrn grgto models. corresponding aggregation different the two of introduce we embeddings following, the the of In embeddings aggregating the role-nodes. by having created Once is ROSE. embedding of node’s structure a the However, introducing role-nodes, on purpose. is this focus for our used/designed paper, be this in can 166] that [155, Note models [150]. embedding node2vec employ advanced We more role-nodes. embed to used a be Hence, can closeness. model their embedding classic indicates role-nodes between links the networks, unsigned to Analogous Network Original the Embedding 5.2.2.2 E eed nte“u”rl oeof node role “out” the on depends , nprdb eomne ytm,w nrdc agtaaeebdigtcnqeb propos- by technique embedding target-aware a introduce we systems, recommender by Inspired Aggregation: Aware Target ie Aggregation: Fixed D = , D >DC || , D 8= + || , D aho h oe ersnsacranprpcierl fand nthe in node a of perspective/role certain a represents roles the of Each 8= − nwhich in n motn plcto fgahebdigi ouethe use to is embedding graph of application important One D || n i”rl oe of nodes role “in” and ersnscnaeain oeta um oendsare role-nodes dummy that Note concatenation. represents 126 E epooeta ot oend of role-node “out” that propose We . D a edefined be can D to

126 , D hr h bandntokhstotpso oends i”ad“u” et h transformed the Next, “out”. Finally, and “in” node2vec. network using bipartite role-nodes: embedded a is of network to types it two transform has network and obtained unsigned the are where links the the given assume labels idea, we the the network, implement account systematically signed into To target take nodes. not two do of relevancy we related the that more find Note to are connections network. nodes of the two in of connected role-nodes tightly “in” more the are that the is if model the behind intuition The model. to connected where tedn otenihosof neighbors the to attending build To of ding OEcnb e oannierfnto rie yamto ieMPt eemn h target the determine to MLP like method a by trained function nonlinear a from to embeddings fed the tasks be prediction can sign/link ROSE the preserves address model To model The structures. based 3) link walk and proximities. labels random order link a higher both use the we capture embeddings role-nodes, obtained of the embedding ensure the to obtain origin To the 2) about assumption any network. on the rely of not does ROSE models, existing Unlike the fulfills 1) ROSE requirements. technique. embedding signed effective an for requirements main three outline We Justification Model 5.2.2.3 values. rating the of regardless them of embedding nfc,ti egtdtrie o tightly how determines weight this fact, In a eebde codn to according embedded be can D E >DC sdfie as: defined is 4 D ( , B ihacmoetta eed ntetre niyt ul t agtaaeembedding. target-aware its build to entity target the on depends that component a with 8= ; D E , E >DC D D ) >DC edsg natninmcaim esgetthat suggest We mechanism. attention an design we , steiprac egtof weight importance the is w.r.t. oetmt h motnewihs eitouea nuevsdattention unsupervised an introduce we weights, importance the estimate To . 0CC E sdfie as defined is ( B 8= ; E , D , >DC ) E D = E >DC hc sdntdby denoted is which ae nterrlvnyt h agtentity target the to relevancy their on based f ( = , , D B E B 8= ; 8= = ∈ , , B # Õ , and ( E D D E B 8= 127 0CC >DC >DC 8= ) E ( ) w.r.t. = || B [ r once ntrso h oe htrated that nodes the of terms in connected are , 8= ; 4 1 ( D E , B , + ned ecnaeaetefie embed- fixed the concatenate we Indeed, . 8= ; ) D 4G? E , E E >DC sdfie sfollows: as defined is and ) , (− Having . B 1 , 8= ; # B ] 8= ( , D ., >DC , E , ) 8= D D E >DC stesto role-nodes of set the is ) E >DC . h agtdependent target the , a eotie by obtained be can E oeformally, More .

127 D oboth to from link the of label of proximity the embeddings, of similarities the find to label with link a if that way a in role-nodes fully the to encode aid We can that graph. patterns major the contain reconstruct role-nodes of embeddings the fact, In state. interaction oe ewe users. positive/negative between the votes from is dataset this reviews; their of trustworthiness the regarding users other to Epinions: administrators. of elections for votes users’ from obtained administrator. network as signed users the is other dataset of WikiElection promotion the for votes negative or positive give may users election, [55]. works previous in used been have which [169] Slashdot and [168], questions: key ideas two answering the on and focused framework are experiments proposed The the model. of the effectiveness behind the verify to experiments conducted We Experiments 5.2.3 links. of multi-type with networks, networks signed for for generalized specific be assumption can any it on is rely model not does proposed model the the Lastly, Since generalizable. contexts. quite networks signed connection a and make systems to recommender avenue the an between creates addressing framework to proposed addition the In problem, the section. of experiments requirements the the in discussed be will which experiments, our in E , to , Datasets: • • D E >DC hti h nepeaino h mednsotie rmtentoko role-nodes? of network the from obtained embeddings the of interpretation the is What tasks? prediction link and art prediction the link-label of of state terms the in to models compared when perform frameworks embedding proposed the do How , , , E sepce ohv o rxmte oboth to proximities low have to expected is D 8= + pnoswsa niepoutrve ie sr a xrs oiieo eaievotes negative or positive express can Users site. review product online an was Epinions >DC and , he elwrddtst eeue nteeprmns pnos[] WikiElection [3], Epinions experiments: the in used were datasets real-world Three a ihrpoiiyto proximity higher has D >DC , E to 8= − Slashdot , tidctsasneo ik oevr eosreohritrsigpatterns interesting other observe we Moreover, link. of absence indicates it E 8= ; sgetrta tspoiiyto proximity it’s than greater is lsdtdtsti lootie rma niesrie(technology service online an from obtained also is dataset Slashdot : , E 8= ; than 128 , E , 8= ; 0 n fteei oln rmfrom from link no is there if And . E 8= ; , and E 8= ; 0 , n if And . E D 8= ; 0 to ssc,hvn function a having such, As . WikiElection: E sepce obe to expected is , D >DC a o similarity low has ; nWikipedia In xssfrom exists ; fthe if D to

128 ieso o l ftemdl a e o30. to set was models embedding the The of authors. all their for by dimension the released source-codes balanced the on we based evaluated 157], were experiments. our baselines [4, for The cross-validation works 5-fold used previous and links to misleading, positive removing be analogous randomly could by Thus, datasets accuracy set prediction. test original sign their for on especially based methods comparing Thus, links. [87]. foes” their than [88]. negative targeted friends sampling. using their balance structural to maintains that closer model based sit random-walk a should also is “users SIGNet main that The is networks. model undirected on the based behind performs principle that framework based networks[157]. signed learning encode deep to a manner is complementary SiNE to a aims in BESIDE theories status [156]. and process balance embedding both the use in structures global capture to aims that approach evaluation the as used variant was Curve) fixed the Under metric. the (Area AUC with we tasks. ROSE-UAT the Moreover, as of both denoted on ROSE ROSE prediction. by represented of link variant and dependent prediction target sign the compared tasks: signed two introduced recently on four models with ROSE embedding of network performance the compared we experiment, this In Comparison Performance 5.5. 5.2.3.1 Table in given are datasets the of Statistics models network. flags signed dataset The a Slashdot using foe. Epinions, users of or to interactions Analogous friend the as comments. other of each disapproval flag or and approval indicate comments share can users where website) news Evaluation: based walk random a is SIDE experiment. this in used models the of list the is following The al .:Saitc ftresge ewr aae ainsfrROSE. for variants dataset network signed three of Statistics 5.5: Table WikiElection Epinions Slashdot nordtst,tenme fngtv de smc mle hntepositive the than smaller much is edges negative of number the datasets, our In 119217 Nodes 82144 7118 549202 841200 103747 Edges 129 oiieEdges Positive 77.4% 85.0% 78.7% eaieEdges Negative 22.6% 15.0% 21.2%

129 ewe oe nisebdigprocess. embedding its in interaction-states nodes different between three the differentiates systematically but model all the on since models datasets baseline the the the of than of one performance results superior the has shows ROSE 5.6 seen, Table be can set. it test As the on experiments. based obtained was model trained the of and AUC classifier, the perceptron multi-layer a to fed was method embedding each from obtained set training and 1 label from link a is there if pair 1 node sets a of training/test vectors the encoding in the instance the of data obtained concatenation Each the and is sets. models test the and to training the graph created evaluate we training Next, To the encodings. fed node first task. we prediction task, prediction link link on the based for models models their evaluated not have works previous entity. better the to and helps node entity the target of a interactions to the respect analyze with nodes the encoding fact, In ROSE. ROSE-UAT than observe better we perform Additionally, problem. the of its requirements WikiElection, to the attributed on addressing be in AUC can effectiveness ROSE of of accuracy terms higher The in respectively. datasets, 2% Epinions and and Slashdot, 0.8%, example, 1.6%, For by baselines. on BESIDE the models all outperforms the outperform ROSE-UAT of ROSE AUC and ROSE-UAT the notice shows we 5.6 First, Table datasets. The three works. previous in models encoding evaluate to WikiElection, the on methods baseline the and (ROSE) model datasets. proposed Epinions and the Slashdot of AUC 5.6: Table ikPrediction: Link Prediction: Sign 50% ROSE-UAT SIGNET BESIDE Model ROSE SIDE SiNE fte aelbl0 h oepiswt ae eernol eetd The selected. randomly were label 0 with pairs node The 0. label have them of h rbe fsg rdcin[,14 stemjrts hthsbe used been has that task major the is 124] [3, prediction sign of problem The D lhuhln rdcini nipratts nntokmnn [54], mining network in task important an is prediction link Although WikiElection to E 0.9116 0.9091 0.8943 0.8632 0.8953 0.7986 n tews.I ohtann n etsets, test and training both In otherwise. 0 and inPrediction Sign Slashdot 0.9095 0.9082 0.8997 0.8680 0.9012 0.8815 Epinions 130 0.9547 0.9533 0.9181 0.8543 0.9342 0.8672 WikiElection 0.9426 0.9418 0.9099 0.5833 0.9092 0.9184 ( , D , , ikPrediction Link E ) n h ae fteisac is instance the of label the and Slashdot 0.9391 0.9357 0.8862 0.5983 0.9265 0.9342 50% Epinions 0.9444 0.9403 0.9205 0.6488 0.9397 0.9314 fisacshave instances of

130 opnnsaecnitn ihteitoue ao atrs fteln from link the If patterns. major introduced the with consistent are components average the positive is link of the if distance dataset ( Slashdot in pair example, node For a them. of between interaction-state components shows encoding 5.6, different Figure of patterns. distance such average of the existence the investigated We of them. between vectors type extracted encoding interaction pattern the major the of introduced distance/similarity We the link. negative from and link positive link, of absence them: ie nodes Given Role-nodes: of Encodings the of Interpretation 5.2.3.2 link. iue56 h vrg ariedsac fteecdn etr fterl-oe fand pair node a of role-nodes the of vectors encoding the of distance pairwise average The 5.6: Figure 3 3 ( ,E D, 0E6 ( D >DC ) ( D o ieetitrcintpsbtente:pstv ik eaieln,adasneo a of absence and link, negative link, positive them: between interaction-types different for E , >DC u u u 8= + u u u u u u o o o i i i i i i E , u u u + + + n n n n n n t t t ) , sepce ob mle than smaller be to expected is 8= + D v v v 2.1 2.1 2.1 1.6 1.3 1.3 1.8 1.1 1.1 D ) o o o u u u >DC siiitrand initiator as t t t s11while 1.1 is (a) Epinions Negative Positive Absent from v v v 2.1 2.1 1.5 1.7 1.7 1.8 1.1 1.1 2.1 i i i + + + n n n , v v v 2.1 2.1 2.1 1.6 1.3 1.3 1.3 1.7 1.7 i i i n n n E 8= + 3 0E6 eoe as denoted E 1.2 1.4 1.6 1.8 2.0 1.2 1.4 1.6 1.8 2.0 1.2 1.4 1.6 1.8 2.0 ( srcie,treitrcinsae a ecniee between considered be can interaction-states three receiver, as D u u u >DC u u u u u u o o o i i i i i i u u u + + + n n n n n n t t t E , v v v 1.7 1.7 1.7 1.6 1.3 1.3 1.6 1.2 1.2 8= − 3 o o o u u u t t t ( ) 3 (b) Slashdot D 0E6 Negative s17 oevr eosreta fteei link a is there if that observe we Moreover, 1.7. is Positive >DC Absent 131 v v v 1.7 1.6 1.6 1.6 1.5 1.5 1.6 1.2 1.2 i i i + + + n n n ( E , D >DC 8= − ) v v v 1.4 1.5 1.5 1.6 1.7 1.7 1.6 1.3 1.3 E , o xml,frapstv iki Epinions, in link positive a for example, For . i i i n n n 8= + ) D 1.3 1.4 1.5 1.6 1.7 1.2 1.3 1.4 1.5 1.6 1.7 1.2 1.3 1.4 1.5 1.6 1.7 1.2 s12 h vrg itne fthe of distances average The 1.2. is and u u u u u u u u u o o o i i i i i i u u u + + + n n n n n n E t t t htcnadt eemn the determine to aid can that v v v 1.6 1.7 1.7 1.3 1.3 1.3 1.3 1.1 1.1 o o o u u u t t t (c) Wikipedia Negative ,E D, Positive Absent v v v 1.6 1.7 1.7 1.3 1.4 1.4 1.3 1.1 1.1 i i i + + + n n n safnto fthe of function a as ) v v v 1.4 1.5 1.5 1.3 1.3 1.3 1.1 1.4 1.4 D i i i n n n to E 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.1 1.2 1.3 1.4 1.5 1.6 1.7 spositive, is

131 r o ihl once n eogt ieetclusters. different they to implies nodes belong two and of connected embeddings tightly the not between distance are large A link. between a link is no there is when there than when larger them distance quite average is the nodes two Fourth, of role-nodes theory. the status of to embeddings the contradictory between is pattern This link. negative a is there hspten hr,tesgso h ikbtentondsi ieetdrcin r correlated. are directions different in nodes two between link the of signs the Third, pattern. this seen, from link be indicate positive can nodes a it two is As of there similarly. “out” nodes type similar of rated have role-nodes smaller they The the that them. of connecting embeddings link the a negative between a values is there distance when than them between link a positive a as Second, is regarded be [170]. aligned can pattern is theory this pattern balance of this in case said described special be structures can triangle It the negative. i.e., is theory, sign balance edge with the when respectively 1.6 from and edge 1.7 the are of sign the when respectively were 1.3 they and that 1.1 means are dataset nodes Epinions two in example, of For “in-” similarly. type nodes similar of by and rated “in+” type of role-nodes the of embeddings negative, is hs atrsa mlctpten eas u oe a o agtdt xrc them. extract name to We targeted not patterns. has other model four our observe we because pattern, patterns major implicit the as to patterns addition these In link. a is there if 2.75 is Slashdot, in example, from 3 0E6 is,i h ino h ikfrom link the of sign the if First, ( D E >DC to D , E , similar 8= + 3 ) 0E6 - 3 ( D 0E6 oe aete ihdffrn in.I at h mle itnebtenthe between distance smaller the fact, In signs. different with them rate nodes >DC 3 ( E , 0E6 E >DC 8= − ( + ) D , D D >DC 8= − to 3 ) 0E6 E , E ssalrwe hr sapstv ikfrom link positive a is there when smaller is 8= − gi,blneter a ergre steseilcs of case special the as regarded be can theory balance Again, . ( + ) D D >DC to 3 E , 0E6 E 8= + D spositive, is ( ) D and ssalrta h aewe hr sn ik For link. no is there when case the than smaller is 132 >DC E , E aesmlrndsmr iial hnthere when similarly more nodes similar rate 8= + ) similar s33i hr sn ikfrom link no is there if 3.3 is D to oe aete iial n fit if and similarly them rate nodes E 3 3 spstv hl hs distances those while positive is 0E6 0E6 ( ( D D >DC 8= + E , E , 8= + >DC ) and ) D ssalrwhen smaller is to 3 0E6 E D hnwhen than to ( D E 8= − n it and E , 8= − )

132 inlVt rdcin”I rceig fte21 EEAMItrainlCneec on Conference International IEEE/ACM 2019 2019. (ASONAM). the Mining of and Analysis Proceedings Networks Social In in Advances Prediction.” (ASONAM). Vote Mining sional IEEE/ACM and 2018 Analysis the Networks of Social Proceedings in In Advances 2018. on Networks.” Conference Signed International in Predictions Polarity Interaction 2020. Mining. and Analysis Network Social science Networks.” Signed political in in Predictions and [184]; community glasses analyzing spin in for frustration ecology modeling in for physics [182]; in systems [183]; structure molecular Möbius studying (i.e., with chemistry in used networks are signed specifically, graphs) More networks. signed from benefit can polarity interaction users. between the directly predict polarity both the predict to simultaneously able but is content, that and users model between themselves. joint scores users a the present by we generated 6.1 were Section “items”) in (i.e., Thus, content the utilize not if does two naturally the This between independently. linkage tasks the two these tackled have them most methods Furthermore, these yet. of interactions/links many logged not have and system the defined join is first which users 179], when networks [181, problem signed cold-start between with the associated signs as such challenges link polarities, some interaction/link and still predicting for are 179] there However, 178, 180]. 177, both 4, [176, for 131, scores [61, algorithms users polarity been have interaction there predicting recently of although tasks addition, the In recom- and 130]. 174] 132, 173, [111, [175, towards propagation mendation used information been in also applications have traditional networks these signed Similarly, improving propaga- [172]. information recommendation as and such [171] networks, tion these harnessing mining through data improved many are are that there analysis applications network unsigned traditional In problems. application world chapter this In 3 2 1 nadto otetaiinlapiain,teeaeas ltoatssi te oan that domains other in tasks plethora a also are there applications, traditional the to addition In ye er,HmdKrm* ao rohue n iin ag MliFco Congres- “Multi-Factor Tang. Jiliang and Brookhouse, Aaron Karimi*, Hamid and Derr*, Link Tyler Joint Opinions: Power “Opinions Tang. Polarity Jiliang Interaction and and Wang, “Link Zhiwei Derr, Tang. Tyler Jiliang and Dacon, Jamell Wang, Zhiwei Derr, Tyler 1 , 2 , 3 eivsiaeapyn indntok oudrtnigadsligreal- solving and understanding to networks signed applying investigate we , INDNTOKAPPLICATIONS NETWORK SIGNED HPE 6 CHAPTER 133

133 where of set the be to link negative matrix, adjacency Let Statement Problem 6.1.1 corresponding the in respectively. predictions, problems polarity cold-start interaction and and link sparsity enrich – data can tasks predictive they the Meanwhile, mitigate help tasks. can both that potential for other the problems each has cold-start framework and capturing joint sparsity by a data other Hence, the the mitigate opinions. power to of to types opinions two of these type between one correlation leverage the can negatively) we (or Therefore positively frequently they with. that those interact with links negative) (or (or positive positive give create users to to and likely tend links; negative) are (or positive users established have example, they those For from content to related. opinions negative) be Intuitively should rating. content opinions and of to commenting types as opinions two such give interactions these can social of also variety they a and via others links; by negative opinions generated or specify directly positive can establishing either users via namely networks, others ways, signed to main in two specifically, in More expressed be indirectly. can or users directly among opinions These opinions. their Prediction Polarity Interaction and Link 6.1 network. bipartite signed with a factors, as social modeled and being ideological latter the both modeling congres- comprehensive around a built framework present we prediction vote 6.2 Section sional to in networks Thus, social 188]) utilizing [187, (e.g., teachers understand education better [186]), (e.g., networks health social as such using areas prediction domain loss other weight addition, In [185]. polarization and balance analyzing for niesca ei a eoea nraigypplrpaefrpol osaeadexchange and share to people for place popular increasingly an become has media social Online U A = 9 8 { D = 1 D , < 1 2 D otn tm eeae by generated items content if D , . . . , 9 n tews ie,when (i.e., otherwise 0 and , D T 8 creates ∈ = R } = eoetestof set the denote × = A where , 9 and A T 9 8 9 8 = = 0 U = 1 tews.Sca ei rvdsmlil asfor ways multiple provides media Social otherwise. sr.W ersn indlnsbtenuesi an in users between links signed represent We users. euse We . D if 134 8 D a hw oln to link no shown has 8 rae oiieln to link positive a creates A ∈ R = × < odnt h uhrhpmatrix authorship the denote to D 9 .Let ). D R 9 , = − 1 { A if 1 A , D 2 8 A , . . . , rae a creates < }

134 D a eeae by generated was triplet a as defined is users between interaction as to opinion negative) (or neato oaiis ebgnb nrdcn netne eso forEiin aae as dataset Epinions our and of links version 4.2. signed extended Table in an between described introducing previously correlation by the begin We on analysis polarities. preliminary interaction conduct we section, this In Analysis Data Opinion User Network Signed 6.1.2 work. future one as content exploiting leveraging on focus we paper, this in However, leveraging by simultaneously polarities interaction and links signed infer can that relations from scores with content the H of helpfulness the rate to buttons; users -down its and enables thumbs-up Epinions provides and Youtube content; on comment and to Facebook example, users For their users. allow Twitter other by generate items content to opinions their express to users 8 ∈ to D oeta hntecneto h tmi vial,w locnuiietecnetof content the utilize can also we available, is item the of content the when that Note follows: as stated is problem our definitions, and notations above the With 8 R A iigpstv o eaie pnost otn tm eeae by generated items content to opinions negative) (or positive giving = : × oeta nti ae,w en oiie(rngtv)itrcin between interactions negative) (or positive define we paper, this in that Note . < T h uhrhpmatrix authorship the , odnt pnosepesdby expressed opinions denote to D 9 . A al .:Etne pnosdtststatistics. dataset epinions Extended 6.1: Table : n euse we and fRves755,722 1,086,551 of Density 12,581,553 Interactions Negative 233,429 of # Interactions Positive 123,705 of # 717,667 Reviews of # of Density Links Negative of # Links Positive of # Users of # A n h srie pno matrix opinion user-item the and H H T 8: U = 0 T 135 to ( , D oidct oepii pno sepesdfrom expressed is opinion explicit no indicate to A R 8 A , and , where , : D , 9 1 7 H ) . . 54 75 where n ol iet ev h rbe of problem the leave to like would and H 8: × × 10 10 = D − − 1 8 5 5 ( H xrse pnosto opinions expresses >A eamt er predictor a learn to aim we , − 1 D ) 9 if nohrwrs an words, other In . D 8 ie h signed the given ie positive a gives T 1 , A to and , 6 D euse We . 8 and A : H that . D R 9 .

135 rmohr o ahgopadw ltkre mohn est siainfrec ru in group each for estimation density smoothing kernel plot we and content to group gave each they ratings) for helpfulness others (or from opinions the calculate outgoing negative we and Then, positive users). both only have (11,361 having who links users users (3) (2) and users); users); (76,819 (7,138 links links outgoing outgoing positive negative have only who users (1) follows: as behaviors. receiving as content on opinions or links opinions receiving or while links behaviors; giving more giving to receive as refer content to we on work, likely this links, In ) content? negative his/her (or on positive opinions negative) more (or receiving positive content user, user, on a negatively) a is (or is (2) positively and (1) more give – others? to questions from likely following links, the ) answer negative to (or positive aim more we giving particular, In implicit user. and one explicit these from between opinions correlations the examine to want we perspective, global a From Perspective Global A Opinions: User Correlated 6.1.2.2 and global both implicit from perspectives. the correlations local these that and investigate assume we so to correlated, reasonable are users is among it opinions explicit Therefore, interactions. opinion their these marking contrast, implicitly in are In others they towards others, others. by from) authored (or content of the others with opinion to interacts one’s link user expressing a signed of when form a explicit receiving) an (or as creating of of thought task be The can both (2) sparse. and very ones; are negative than interactions interactions) and (or links links positive more are there (1) that observe can matrix the construct to matrix authorship from the scores construct use to can data this the use construct we to give and use reviews can we write which users other, Epinions each to investigation. links this negative for and positive Epinions from dataset extended an collected We Dataset Epinions Extended 6.1.2.1 { 1 , 2 oase h rtqeto,w ru sr notrecassbsduo hi ugiglinks outgoing their upon based classes three into users group we question, first the answer To , 3 } epciey oesaitc ftedtstaesoni al ..Fo h al,we table, the From 6.1. Table in shown are dataset the of statistics Some respectively. , 1 to H edfiepstv n eaiehlflesrtnst be to ratings helpfulness negative and positive define We . 6 oidct h epuns ftegvnrvesadta euethese use we that and reviews given the of helpfulness the indicate to 136 A o ahrve others review each For . T arx hyas can also They matrix. { 4 , 5 , 6 } and

136 eann ewr.I hssbeto,w ou napi fuesadw att investigate to want we and users of pair a on the focus and we user subsection, one this between In correlations on network. focuses remaining 6.1.2.2 Subsection in perspective global The Perspective Local A Opinions: User Correlated 6.1.2.3 content. their on opinions negative) (or links, positive negative) more (or positive obtain more to receiving likely users, are – question second which the behaviors, to and giving answer 6.1(a) positive as a behaviors figures, to receiving lead the for From observations similar very 6.1(b). make Figure can in we 6.1(b), group each for density behaviors smoothing receiving kernel negative of plot and we estimation positive procedure, both similar the have Following who users). users (17,090 (3) links incoming and having users users); (2) (14,701 users); links (52,810 incoming links incoming negative positive only have only who users (1) follows: as links both express to interactions. higher likely their more a in are behaviors show thus negative and and links positive classes, negative negative only and and positive positive only both create the only create than who variance who users users to compared Furthermore, interact as to users tend links. other also negative by links generated positive content create the only with who positively users average more on that note We 6.1(a). Figure iue61 iigadrciigbhvosfo h lblprpcieo pno correlations. opinion on perspective global the from behaviors receiving and Giving 6.1: Figure oase h eodqeto,w iieuesit he rusbsduo hi incoming their upon based groups three into users divide we question, second the answer To a iigbehaviors. Giving (a) 137 b eevn behaviors. Receiving (b)

137 D hc aehge crsta eaiepis ec,i sqieeietfo h gr htif that from figure content the to from link evident negative) quite (or is positive it a Hence, gives pairs. negative pairs, than no-link scores than scores higher helpfulness have higher which have pairs positive average on that From note 6.2(a). we Figure figure, in this shown are distributions the and group each for estimation density smoothing from ratings) helpfulness (or opinion average the calculate euse we users of pair a if for (1) particular, – answer In to how aim content. on we other’s difference each a makes on users opinions of receive) pair (or a give for they link negative) (or positive a of existence the whether eevsangtv ikfrom link negative a receives consequence, is from content to opinions negative) 8 iue62 iigadrciigbhvosfo h oa esetv noiincorrelations. opinion on perspective local the from behaviors receiving and Giving 6.2: Figure D + nutvl,if Intuitively, pairs positive (a) – groups three into users of pairs all divide we question, first the answer To 9 D ieyt iepstv o eaie pnost h otn from content the to opinions negative) (or positive give to likely 9 D b eaiepairs negative (b) ; 8 + D D 9 D , 9 a iigbehaviors. Giving (a) D 9 . 8 slkl ogv oiieoiin otecnetof content the to opinions positive give to likely is D − 9 D eevsapstv ikfrom link positive a receives 9 and D 8 D ie oiie(rngtv)ln to link negative) (or positive a gives D D 8 8 ? 8 , D − D 9 D 9 odnt oiie eaieadn ikfrom link no and negative positive, a denote to D 9 ol orvnebc n iengtv pnost h content the to opinions negative give and back revenge do could n oln pairs no-link and ; 9 n 2 if (2) and ; ? D 9 , D 8 slkl ogv oiie(rngtv)oiin othe to opinions negative) (or positive give to likely is 138 D D 9 8 eevsapstv o eaie ikfrom link negative) (or positive a receives , D D 9 8 ? D slkl ob redyto friendly be to likely is D 8 9 otecnetof content the to o ahpi nec ru,we group, each in pair each For . b eevn behaviors. Receiving (b) D 9 is , D D 8 D nteohrhn,if hand, other the On . 8 8 oeta nti work, this in that Note ? ieyt iepstv (or positive give to likely D 9 eapykernel apply We . D 8 to D D 8 n sa as and , 9 . D 8 to D D D D 9 8 9 8 , ,

138 ikpeito ak ewudlk ofidtoltn matrices latent two V find to like would we task, prediction link of 7] nti ok ecos obidtebscpeito oesbsdo h o-akmatrix low-rank the on based models prediction basic [132, the approach. build systems factorization to recommender choose and we work, 131] this [189, In prediction 179]. link as used being such now applications is various and recently across popularity gained has approach factorization matrix low-rank The Models Prediction Polarity Interaction and Link Basic 6.1.3.1 jointly. interactions and links of optimization polarities the joint infer a can into that our algorithm correlations present these we Finally incorporates directly other. the which power LIP, task framework one proposed opinion of in opinions the tasks the model two have to to the how us solve enable discuss that to then correlations We framework basic individually. predictions a polarity discuss interaction briefly and first link we polarity section, interaction and this link knowledge domains; In two this the whether in prediction. found of are question that interactions the tasks the prediction to two of us the polarities benefit lead can the naturally and findings networks these social Thus, signed them. in between form users other they of links opinion the user’s to a between regards correlations in exist there that validated we 6.1.2, Framework Section (LIP) In Prediction Polarity Interaction and Link Joint The 6.1.3 from content the to negative) (or positive more being to opinions give links negative give who if those that support from observations content to the links positive to average, give opinions on who negative (1) those gives from that mostly content observe the we to figure, opinions this positive From gives mostly 6.2(b). Figure in demonstrated are results D = ikPrediction: Link 8 eflo iia rcdr faseigtefis usinfrtescn usin The question. second the for question first the answering of procedure similar a follow We . [ v 1 , v 2 , . . . , v = ∈ ] Let R

T ! D × = 9 = {( eevsapstv o eaie ikfrom link negative) (or positive a receives ,with D 8 D ,

9 | ) ! en h ubro aetdmnin,b ovn the solving by dimensions, latent of number the being T 9 8 ≠ 139 0 } etesto ar ihlns ntrso the of terms In links. with pairs of set the be U = [ D u 8 . 1 , u 2 , . . . , D 8 then , u = ∈ ] D D 9 R 9 slkl to likely is D while ;

9 These . ! × = and D D 9 9

139 ersnain nta a ecuddefine could we way that In representation. for similarly overfitting, prevent to signed term user-user unknown for prediction that Note a network. as the in products links inner such use can we formulation, above Thus, respectively. problem: optimization following hntkn h yia srie omlto,w nta att omlt h oe ota we that content. so the of model author the the formulate about rather to information Thus, want include instead can author. we the formulation, information, user-item of typical piece the third taking a than based have factorization now matrix we traditional that from is task systems this recommender for model basic the between difference main and triplets interaction arcscnb bandvasligtefloigotmzto problem: optimization following the solving via obtained be can matrices use i.e., author, the use only want and author the ignore user to between be would this represent to way of One behaviors interaction receiving and giving the V [ where h term the q 2 1 oeta nte a fmdln ol et ierycmieteato n content and author the combine linearly to be could modeling of way another that Note . , nti rbe,w iht n he aetmatrices latent three find to wish we problem, this In Prediction: Polarity Interaction p q 8 > 2 ( , . . . , u q 8 9 and + P k min q , s P D Q = : v 8 k ∈ ] , hc nldsbt h otx fteato n h otn tef hs three These itself. content the and author the of context the both includes which , 8 S 2  ncontent on r h srltn etr ersniggvn n eevn ikbhvosof behaviors link receiving and giving representing vectors latent user the are + 2 1 R u

8 > k ( D min U Q  v 8 × , ,A H 9 V k = p : 2 Õ  oestesg faln from link a of sign the models and , 8: ,D 8 > 2 1 A + q 9 : eoe h pno from opinion the denotes )∈H ( 9 k D k htwsatoe by authored was that ) 8 S S U u aho hs r akn nomto.Hne epooeto propose we Hence, information. lacking are these of each but , ,D Õ k ( k = 2 9  H 2  )∈T [  8: eoe h rbnu omof norm Frobenius the denotes s 1 sitoue oaodoe-tig hc scnrle by controlled is which over-fitting, avoid to introduced is ( − , Let T s V 2 p 9 8 , . . . , n ohaecnrle ytehyperparameter the by controlled are both and , 8 > − H ( q M u 9 8 = > 140 s + < ∈ v {( s ∈ ] 9 R : ) D D D 2 ))

8 8 9 and , + A ,  R 2 iial,w ol goetecnetand content the ignore could we Similarly, . × D

+ D : V 2 2 8  8 D ,

1 × V otecontent the to to 2   2 < s 9 P k with : | ) D  where , U k 9 = steltn etrfrcontent for vector latent the is k n hrfr fe piiigthe optimizing after therefore and , P H 2  k [ p 8: p 2  U + 8 p 1 ( + k , n sue saregularization a as used is and M ≠ 8 p > p V 8 k s 2 ( 0 : Q and k q , . . . , , 2  A omdlteinteraction the model to k A 9 : 2  ||  q : 9 s uhrdby authored + 8 : p )) epcieydenote respectively ≠ k = S where , ∈ ] 0 k 2  }  etestof set the be R

 || × D V = 9 sused is 1 The . , . (6.1) (6.2) Q A D : = 8 , .

140 D epciey h mapping The respectively. vectors latent obig h w ai oesfrln n neato oaiypeitostgte.Nx ewill we Next together. framework. predictions joint polarity proposed interaction the and introduce link for models basic two the bridge to users all for vectors latent problem: of optimization set following a Given network. the in users other by authored content the to vector latent the to links, create R via behaviors via giving behaviors two receiving the can bridging we by Therefore, correlations separately. opinion interactions, the capture receiving and giving when use behaviors we users’ While indicate respectively. links, receiving and giving when behaviors learn to needing by complexity use extra add would this However, concatenation. denote to r orltd ntebscmdl rmSbeto ...,w use we 6.1.3.1, Subsection from models basic the interactions and In links of terms correlated. in behaviors are receiving) (or giving the that found we 6.1.2, Section In Correlations Opinion User Modeling 6.1.3.2 models. basic aforementioned two the on based correlations q.(.)ad(.)cncpueoiincreain o ik n neatos hyas lo us allow also They interactions. and links for correlations opinion capture can (6.4) and (6.3) Eqs. iial,w ekt n matrix a find to seek we Similarly, 8

U ∈  ic h w iigbhvosaecreae,w a n iermpigmatrix mapping linear a find can we correlated, are behaviors giving two the Since p × 8 >

! ( tcnte eesl enta h iermpigbtente ol easlto othe to solution a be would them between mapping linear the that seen easily be then can it , q htcnmap can that 9 + s v : ) 9 , n ev te omltosa uuewr.Nx ewl ics o ocapture to how discuss will we Next work. future as formulations other leave and , and q D 9 hc eoeterrciigbhvoso eevn ik n interactions, and links receiving of behaviors receiving their denote which , v 8 sltn vector latent ’s 8 and W  q a elanda follows: as learned be can 8 p . 8 hc atrsterbhvo oad o hygv opinions give they how towards behavior their captures which , W min min W W  O I ∈ u D D R Õ Õ 8 8 9 hc eoe i/e neligbhvo nhwto how on behavior underlying his/her denotes which , ∈U ∈U

 × k

141

W W ! $  orpeettempigbtenteuser the between mapping the represent to v u 9 8 − − p p 8 9 k

2 2 2 2 u 8 p and 8 u and 8 and v 8 q odnt users’ denote to 8 p orespectively to 8 n h two the and , M owe so , W (6.4) (6.3) $ D 9 ’s ∈

141 rbesi oeb h iermpigue nLP(oeseiclytetrscnrle by controlled terms the specifically (more LIP in used mapping linear the by done is between information problems of transfer this Also, similarly and value. its task, decreasing prediction when task polarity prediction interaction link the user towards the of importance the to increase an in result hyperparameter the by balanced is polarities) interactions overfitting. avoid hyperparameter a by respectively, controlled behaviors, are receiving contributions and their giving and of correlations the capture terms fourth and third The user-review the author the to of vector modification influence additional a the the is incorporates term also that second model The factorization matrix problem. prediction link the for 6.1.3.1) neato oaiypeito.LPsle h olwn piiainproblem: optimization and following link the joint solves two of LIP as purpose prediction. used the polarity for be LIP, interaction framework, can factorization mappings matrix these joint how our giving show in we the terms Next both additional between tasks. mapping two linear the a in behaviors optimize receiving to and how on model a formulated have we Now Framework Joint Proposed The 6.1.3.3 hr h rttr sasadr srue arxfcoiainmdl(sdsusdi Subsection in discussed (as model factorization matrix user-user standard a is term first the where ent htteblnebtenotmzn o h w ak sg ikpeito n user and prediction link (sign tasks two the for optimizing between balance the that note We + + + + = S U , W [ 2 W 2 , V V 1 2 2 2 V min 3 1   ( , ( P D D ,   D D W 8 , Õ 8 8 9 k k Q ,A ,D ∈U Õ $ W U ntepeito of prediction the in , : Õ 9 ,D k )∈T  2  k 9 k W )∈H L( 2  + ( $ + T k U V u 9 8 ( k , H 8 W k V − − 2  8: , $ u p P  − 8 > k 8 , + k 2  v Q p 2 2 142 V 8 9 >  , 2 + ) 2 S ( 2 q D  , D Õ W 9 8 k 9 soiinon opinion ’s ∈U P +  k , s 2  W

: [ W )) + hr ml nraei hsvlewill value this in increase small a where , W $ 2  te em nE.(.)aeaddto added are (6.5) Eq. in terms Other . k ) v Q 9 k − 2  q A + : 9

k when , 2 2 S k  q 2  9  ∀ A D : 9 a rte by written was U ∈ orepresent to (6.5) D 9 W .

142 A olw,respectively: follows, vector latent their to user from mapping denote linear we our finally, for error and others), by created content with interact they how user and learn learn for to prediction way no is there Thus task. user prediction a If ). (6.5) Eq. in nsm oilntok,sc sEiin,cnrpeettutdsrs)fo user from trust-distrust) represent can Epinions, as such networks, social some in when help also can LIP Similarly, (6.5). Eq. in terms fourth neato riigdt,respectively. data, training interaction data training combined the the of use We each convergence. to respect with joint derivatives the partial of (i.e., the non-convexity parameters compute the we to First, due problem. (SGD) this formulation. descent solve optimization gradient to stochastic how use present to now chosen we have above, We shown objective optimization the the Given LIP for Method Optimization An 6.1.3.4 prediction. polarity interaction or sparsity prediction data link the either mitigate in to problems potential the cold-start has and LIP that note we analysis, above the Via information. 4 : H :9 8: hthdbe uhrdb user by authored been had that rdet of Gradients o ipiiyi h eo,let below, the in simplicity For v D 8 p 8 = sltn vector latent ’s i h oe opnnso atrn iigadrciigcreain i h hr and third the via correlations receiving and giving capturing of components model the via 8 and ( H 8: q − 8 D 8 rmhshritrcindt.Tu,tepooe rmwr I a lolearn also can LIP framework proposed the Thus, data. interaction his/her from p oee,if However, . u 8 > L 8 , ( q v ihrsett n V: and U to respect with q 9 u 9 9 , + 8 p rpeetn o h otn hyhdatoe eevsinteractions). receives authored had they content the how (representing rpeetn h a hygv ik)t hi aetvector latent their to links) give they way the (representing D s 8 , : 8 q )) a oln nomto,te r emdacl-tr sri h link the in user cold-start a deemed are they information, link no has 9 , eteerro siaigteitrcinvleuser value interaction the estimating of error the be D s 8 : a a oeitrcin ihohruesi h ewr,w can we network, the in users other with interactions some had has , W D 4 9 $ T , 9 8 and , D 4 $ 9 = sltn vector latent ’s = ( W T ( W 9 8  143 n hnieaieyudt hmuigSDuntil SGD using them update iteratively then and ) u $ − h rdet fE.(.)w.r.t. (6.5) Eq. of gradients The 8 u X u and 8 8 > − = v p 9 v T∪H} H ∪ {T ) 8 v 8 ) eteerro siaigteln (which link the estimating of error the be 9 ntebscmdladw alt olink do to fail we and model basic the in eteerrfrorlna apn from mapping linear our for error the be rpeetn h a hyrcielinks) receive they way the (representing D 8 a oitrcindt u a link has but data interaction no has where , T 4  and = ( W H D  8 u p r h ikand link the are v aet content to gave 8 8 9 D and (representing 8 − ouser to q v 9 ) 9 ethe be r as are D u 9 8 ,

143 riigdata training respectively: following, the are w.r.t. ihudt ue ootmz q 65,w s G ootmz h rmwr sn h combined the using framework the optimize to SGD use we (6.5), Eq. optimize to rules update With rdet of Gradients of Gradients W $ and X W =  T∪H} H ∪ {T L L hc r hw eo,i epcieorder. respective in below, shown are which , ihrsetto respect with ihrsetto respect with m m m L( m m L( m L( m L( p m q m u 8 P v Q {( 9 U L( 8 m V ) 9 where , ) ,9 :, s ) ) = : S = = = ( | ) ) m { { m = 8 { L( 9 m 8 L( D ( | m Õ ( | W { T ( | 8 W 8 W ,A D W D D $ 8 ( | P W : Õ and Õ 8 ,A  8 O Õ ,D ,D , ,D  D : ) $ ) Q 8 9 9 ,D 9 ,A ∈ } )∈H ∈ } )∈T Õ = ∈ } )∈T = H  and , and : 9 ∈ } )∈H − D ,D D Õ 8 r h ikaditrcintann aa respectively. data, training interaction and link the are Õ 9 ∈U 9 [4 ∈U ∈ } )∈H   W 144 S H − −   :   :9 8: W4 4 − : W4 4 h rdet fE.(.)w.r.t. (6.5) Eq. of gradients The T T  $ ial,w rsn h rdet fE.(6.5) Eq. of gradients the present we Finally, [4 ( 9 8  9 8 − q v u v u > H 8 > 9 9 [4 8 9 :9 8:  +    H + + + s + :9 8: p : V V W W 8 ) 3 3   W W W W p − − 8 >  $ >  $  W4 W4 4 4 +  $  $ V + + + 2 + V s V V : 1 V 1 2 v 2 u q 9 p 8 9 8 p 8 , q 9 and s :

144 oe epalvaetesast rbe nteetopeito ak?()D h em based terms the Do (2) tasks? prediction two joint these our in Can problem (1) sparsity questions: the two alleviate following help the answer model to experiments conduct we section, this In Experiments 6.1.4 interaction) or the link method. for signed based parameters a gradient model a on using updating the updated are 12, be we can whether line on on (based Then, interaction problem the an of used. having part when are respective to 11 compared through as 9 gradients, lines the example, calculate training to 8 through algorithm the 6 example, training lines link user-user utilizes signed a having decent When gradient 12. using line parameters each to model 5 for line update particular, from then methods and In 4; line framework. in the data optimize the shuffle to first decent we iteration, gradient line stochastic From randomly use we interactions. we and 1, 14, links line line includes to data In 3 learning the 6.1. 2, line Algorithm In introduce parameters. briefly model we initialize Next 6.1. Algorithm in presented rates. learning adaptive e.g., tune, to easy and efficient both be to shown methods, been based has factorization SGD matrix optimizing for methods additional are there although that Note 10 3 2 1 5 4 8 6 loih 6.1: Algorithm 9 7 ihgainscluae bv ootmz q 65,tedtie piiainagrtmis algorithm optimization detailed the (6.5), Eq. optimize to above calculated gradients With while set data learning the Construct initialize Randomly Output: Input: foreach Shuffle( o convergent Not paetersetv aaeesuiggain ecn methods descent gradient using parameters respective the Update if if H T U G G = = aclt rdet of gradients Calculate of gradients Calculate X H ∈ T ∈ and G {( {( ) X ∈ h piiainmto o h rpsdLPframework. LIP proposed the for method optimization The D D 8 V 8 then D , then A , o ikpeitos and predictions; link for do : 9 U )| D , T do , V 9 9 8 )| , H P ≠ , 8: 0 Q } ≠ , X etesto ar ihlnsand links with pairs of set the be S 0 , = L( , L( W A T∪H} H ∪ {T $ U U : 9 , , , W V ≠ V , ,  0 P P P 145 } , , , Q etesto neato triplets interaction of set the be Q Q , , , S S and , , W W  S  , , W o neato oaiypredictions polarity interaction for W $ $ ) ) w.r.t. w.r.t. p u 8 8 , , q v 9 9 , , s W : ,  W , and  , and W $ W $

145 xeietwsfie eg,alLPrslsfrtefievrigcl-tr xeietwr selected were experiment cold-start varying five each the for for settings results LIP hyperparameter all the (e.g., Also, fixed was experiment model. respective each for hyperparameters best the [4]. in done that to then similar we negative 50% that and Note positive 50% testing. be for to 20% dataset and testing validation, our for balanced been 10% has training, dataset for The 70% into ratings. split helpfulness randomly 11,555,599 and links, with user-user left were 600,976 we users, process, 29,901 filtering mentioned above the After ratings. helpfulness 13,668,105 and dataset. raw the to different similar also more and becoming users seemingly to start therefore data and cold the sparsity of of of percentage portions levels varying remove a later have to that us allow sets will training it with create that associated artificially is ratings filtering helpfulness out, this for and filtered reason written, be The had to user. they users that reviews selected links, all user For their all rating. one remove least helpfulness we at one authored least also at have received and rating has helpfulness that one review least at given have to users the requires from sets testing and validation, training, our dataset. appropriate our filtered the have have we that we is such step study, data first the The this pre-process matrices. of to user-content and purpose user-user dense the more form for to dataset that Epinions Note collected experiments. these for Epinions in types used two metric the for the performed. settings have used, we experimental experiments the was of introduce it we how then the tasks, and prediction In dataset two our the users. evaluating introduce cold-start some further handle will to we robust subsection the is next address algorithm We our if baselines. examining representative by with question performance second the compare and sparsity the data increase training we the which in of experiments perform two we the question, first between the information address of To transfer problems? a provide LIP in opinions/behaviors user correlated upon o l h oesta eurdhpraaeest etnd eue h aiainstt obtain to set validation the used we tuned, be to hyperparameters required that models the all For links, user-user 841,373 users, 233,429 contained had dataset Epinions extended initial The also and link, a received and given both have that users keeps only perform we filtering The Settings: Experimental smnindi eto ..,w aecletdadtstfrom dataset a collected have we 6.1.2, Section in mentioned As 146

146 a efudi hi epciectdwork. cited respective their in found be can polarity interaction the task. prediction for link baselines the for the those present by followed first task We prediction interaction methods. existing with prediction LIP, link framework, and proposed the polarity compare we question, first the answer To Experiments Sparsity 6.1.4.1 performance. the better prediction the link value, the the and higher polarity the interaction that the Note for tasks. measure the F1 compare the and present evaluate we To LIP baselines. of the performance for similarly different and a model required our sparsity for induced hyperparameters of of amount set the varying and users cold-start of hyperparameters dynamics different the for as allowed we experiments, two the for between However, separately not five). and the percentages, of five each all for hyperparameters of set “good” commonly a on based o ikpeito,terpeettv aeie r rsne eo n eal ftemethods the of details and below presented are baselines representative the prediction, link For comparison: for baselines prediction polarity interaction representative following the choose We • • ersnaino h srrve arx oeti olw h aefruaina htin matrices that the as formulation use same we the where follows Eq.(6.2) this Note matrix. user-review the of dimensional lower representation a find to attempts that method, factorization matrix low-rank the with made M predictions. similarity) the cosine making of for terms history rating (in helpfulness users their similar on most based five the we used Here we where polarities. results interaction the user the present predicting collaborative for user-based baseline the first use our We as approach [190]. filtering see please filtering collaborative on details predictions. For the making for history rating helpfulness their on based similarity) cosine of terms u predictions. F srbsdclaoaiefitrn prahweew sdtefiems iia sr (in users similar most five the used we where approach filtering collaborative User-based CF: :Orlwrn arxfcoiainmto ssoni q 62.Hr oprsnis comparison a Here (6.2). Eq. in shown as method factorization matrix low-rank Our F: P , Q 147 , S and , H qiaetya hyaei I o the for LIP in are they as equivalently

147 srrve arx,i sntutlte8%sast httedniyo h ewr rp eo that below drops network the of density the that sparsity 80% the until not of is levels it , the matrix user-review across MF over gains significant collaborative induced. finding user-based sparsity LIP the have outperforms we method Similarly, MF baseline method. the filtering that see we time, the of Most by dataset the of sparsity 10%. the of increments vary we in We data, 90}. the user. 80, of 70, each 90% to 60, across 50% {50, sparsity removing in ranging x a dataset. vary simulate original and user the to each than able for denser are interactions is and that links data the the of of x% remove subset We a to attention our limited already have xeietlResults: Experimental we since user, each across sparsity ranging a simulate to able are we experiment, first the In • • • q(.)adtematrices the and Eq.(6.1) the has error, squared the optimizes method hyperparameter This regularization technique. MF model this our upon for predictor built baseline is natural LIP the since is This was [131]. which in method, problem this factorization for matrix introduced low-rank first the with is comparison final The [131]. in M in found be can method this of [4]. details possible The 16 features. on node based 7 created and are (e.g., configurations, features triad features 23 directed of node total also A and edges). positive triads incoming from of extracted number are approach supervised a for Features H undirected for making presented by was information method link this directed fact the the convert to we networks, Due used. is [191] kernel Laplacian S na nietdntok eueteudrce eso ftedtstb eoigthe removing by same. dataset the set the testing of the keep version but undirected links, the the of directions use we network, undirected an in A pcrlbsdmto sn h indLpainmti 13 n regularized and [153] matrix Laplacian signed the using method based spectral A SA: C3 ti napoc htwsbsdo h oilblneadsau hois[2]. theories status and balance social the on based was that approach an is It OC-3: :Lwrn arxfcoiainmto ssoni q 61,wihwsfis introduced first was which (6.1), Eq. in shown as method factorization matrix Low-rank F: A ohrtigt eto sta ic ehdfis nrae h est fthe of density the increased first had we since that is mention to thing nother h neato oaiypeito eut a efudi iue6.3(a). Figure in found be can results prediction polarity interaction The U , V and , V n ssSD ent hti sfruae uta enin seen as just formulated is it that note We SGD. uses and , T r sdeuvlnl otoefudi LIP. in found those to equivalently used are 148 T ymti,tu resulting thus symmetric,

148 oase h eodqeto,w opr I iheitn loihsta r bet handle to able tasks. are prediction two that the algorithms of existing both Therefore with in users LIP datasets. cold-start compare these we in question, second characteristics the common answer quite to are cold-start which with faced networks, commonly signed are that in issues users alleviate help just to not also handle but to framework problem, the sparsity of ability data the the is work this of contributions main the of one that Note Experiments Cold-Start 6.1.4.2 sparsity. the of increase the with prediction link predictions, the polarity for improvement interaction net- increasing the signed and in in improvement significant inherent a problem see sparsity we specifically, the More alleviate partially works. to able is framework joint evidence providing our thus that tasks; prediction link and polarity interaction the in found problem sparsity than performance better achieves LIP lowerMF. level, the sparsity for higher method the SSA MF reaching the than upon to but performance comparable settings, performs better sparsity LIP much that obtain observe to MF experiments able and sparsity are We LIP the HOC-3. of and 6.3(b). results Figure the in report We prediction link network. the original for the of that to similar quite is matrix original the of o hseprmn ewn oeprclyeaut h outeso I hnfcdwith faced when LIP of robustness the evaluate empirically to want we experiment this For the alleviate help to ability LIP’s seen have we experiment, sparsity the in results the From a neato oaiyPrediction. Polarity Interaction (a) iue63 xeietlrslswt aidsast settings. sparsity varied with results Experimental 6.3: Figure H hrfr nfc t8%sast h est fti nue prenetwork sparse induced this of density the sparsity 80% at fact in Therefore . 149 b ikPrediction. Link (b)

149 fete ftetoues etr aentbe pae ie,te a otann neato data interaction training no had they (i.e., updated been not have vectors users’ two inner the the of modified either on we if based Thus, assigned vectors. be initialized to users randomly value such two predicted of of the vectors product leave latent would the This then user, updated. given be a never experiment, for would this information in interaction applicable no be have not we would if method since factorization matrix typical the that note We tasks. users for the information of gain one to in able none be had previously should that they simultaneously can and task task one other in jointly the formulated if in is opinions those the difficult, LIP power polarities, becomes since interaction However, it user and then links them. domain, signed involving the certain predicting predictions a reasonable to in make due user overcome to a to about impossible, problem knowledge not difficult no very is a there is if this fact that the Note users. cold-start having networks o h odsatstig ecos h olwn sritrcinplrt rdcinbaselines: prediction polarity interaction user following the choose we setting, cold-start the For • • • pae ie,te a odt ntetann e n hsaeacl-tr sr,te instead with would then the normally user), we cold-start as a product are dot thus and the set using training of the in data no had they we (i.e., instead updated So vectors. initialized randomly value two predicted of product modify the dot leave the would on this latent based Thus, the assigned then be updated. user, to be given never a would for users information such training of no vectors have we if since experiment, this assigned. be to yet have M it that then network the and in values, edges missing other all all for for value value that same that predicts predicts it next set, training entire the in found A values. unknown for predictions make to distribution that on based randomly selects then and R g:Teaeaegesn ehd(vG,fis acltsteaeaeitrcinvalue interaction average the calculates first (AvgG), method guessing average The vgG: distributions, class the calculates first interactions user for method guessing random The G: wG ent httetpclmti atrzto ehdwudntb plcbein applicable be not would method factorization matrix typical the that note We FwRG: R ehdfrtegvnlink. given the for method G M yadn h odto hti ihro h w sr’vcoshv o been not have vectors users’ two the of either if that condition the adding by F 150 M o rdciglns eiseduse instead we links, predicting for F M yadn h odto that condition the adding by F

150 efr ut el nti al,w r bet bev I’ ueirt vrtebsln methods baseline the over superiority LIP’s observe to able are we naive table, very the this In but The measure, well. F1 quite the perform users. for reference start a provide cold to of shown just number is RG the baseline varying when task prediction polarity subsets. data teraction 5 making thus cold-start 5%, of of intervals number in the 25%, to i.e. users 25} dataset training 20, the 15, of their 5% 10, remove from {5, users and in selected) x already their vary not all varying have remove we while and (who information users users interaction the the of of x% x% select select randomly randomly We then set. links, testing the modify not do but task, would normally we as product inner the using of with instead then user), cold-start a therefore are and xeietlResults: Experimental given a in users start cold become that users of percentage the vary we experiments, these For baselines: prediction link following the with LIP framework proposed the compare We • • M M M distribution. R o rdciglns eiseduethe use instead we links, predicting for F :Rnol us isn ik ob oiieo eaiebsdo riigdt class data training on based negative or positive be to links missing guess Randomly G: wG hsmto a h dnia xeso o h odsatuesa ecie in described as users task. prediction cold-start polarity the interaction for the for extension FwRG identical the has method This FwRG: al .:Itrcinplrt rdcincl-tr results. cold-start prediction polarity Interaction 6.2: Table LIP MFwRG RG Method LIP MFwRG AvgG RG Method al .:Ln rdcincl-tr results. cold-start prediction Link 6.3: Table al . od h eut ftecl-tr xeiet o h in- the for experiments cold-start the of results the holds 6.2 Table 0.860 0.848 0.641 0.773 0.769 0.667 0.655 5% 5% nue ecn odSatUsers Start Cold Percent Induced Users Start Cold Percent Induced 0.858 0.837 0.641 0.771 0.764 0.667 0.655 10% 10% 151 R ehdfrta ie link. given that for method G 0.853 0.825 0.641 0.769 0.754 0.667 0.655 15% 15% 0.848 0.813 0.641 0.766 0.746 0.667 0.655 20% 20% 0.839 0.797 0.640 0.763 0.739 0.667 0.655 25% 25% MFwRG sepce to expected is

151 ewe piiigteitrcinplrt rdcints ln ihteln rdcintask. prediction link the with along balance task the prediction and polarity terms interaction correlation the the optimizing control between that ones the specifically other; the to task prediction on focus the the of is understanding better a (i.e., gain tasks prediction to two only our these not between present to relation we seek Next We LIP. two simultaneously. of the tasks hyperparameters in the prediction expressed on the analysis opinions both the in performance behind the correlations boost inherent to the tasks that utilize shown have to we able experiments, cold-start is the LIP and indeed sparsity results the the both upon for Based section, other. this the power in the task presented between one information in of opinions user’s transfer a a have provide ultimately to that tasks able based two are terms LIP linking in the if opinions determine user to correlated out the set we upon where question, second our to back us leads This Discussions Experiment 6.1.4.3 prediction. favor best in the larger having becomes LIP F1 of of the terms in as gap task, performance the prediction the then increases, polarity users user, interaction cold-start given the of percentage to a Similarly for information guessing. randomly link learned to no it’s resort is using must there user prediction when the But perform vectors. then latent can dimensional it low user, a for baseline whenever representation other that dimensional the note over low We LIP of obvious. advantages more the even results become these methods seeing Upon set. training the in users mapping linear the through opinions) their (i.e., matrices information transfer rating to helpfulness current able no has is user a LIP if even information, because is This terms. correlation based the intuitive of extremely use is the which upon increases, users baselines cold-start the of to number compared the as as performance increases LIP’s drastically that see also We users. cold-start observing when ae nteaoeeprmna eut ehv ucsflyvrfidorcamta u joint our that claim our verified successfully have we results experimental above the on Based cold-start of amount the varying when results prediction link the present we 6.3, Table In W $ and W ic tcnrle h muto pno nomto ob rnfre rmone from transferred be to information opinion of amount the controlled it since , W  n s nomto htteue a rmterln information. link their from had user the that information use and 152 [ ,btprasee oeiprati hsstudy, this in important more even perhaps but ), MFwRG a h blt olana learn to ability the has

152 ihrpromne(ehp ttecs fteohr o n ftetopolm vrteohr As other. the over problems favoring two the is of this optimization one for for the varying other) the extend when of cost what performance the to at in (perhaps controls performance changes it higher large because in is This result to greatly. assumed hyperparameter is which tasks, two the modeling For joint problems). for recommendation typical cross-domain for and similarly necessary (and quite are hyperparameters other The hyperparameters). hyperparameter regularization single a into collapsed be could they fact, In normally. behave they some on model. analysis our an in discuss hyperparameters we important Thereafter the LIP. of in used hyperparameters the discuss will we First Analysis Parameter 6.1.4.4 to task prediction one from transferred be other. to the information opinion of amount the controlled it since between relation (i.e., the tasks only not prediction the to two alleviate understanding these better help a we indeed subsection gain next to does the analysis In LIP hyperparameter baselines. a that other perform the is and express method MF to baseline able the over now problem cold-start are However, we datasets. claim sparse obvious with faced most when the tasks across ways correlated in opinions networks their social express in user’s that fact the modeling for terms additional using model factorization matrix oan,rsetvl.Teeaetetpclhpraaeesfrebdigbsdmtos and methods, based embedding for hyperparameters typical the are These respectively. domains, assume also we hyperparameter (since have the we error Finally, introduce minimal we Hence, with mapping noisy). a is find data instead the to constraint mapping this a relaxed have such we problem finding this solve of to and interactions, and between links transformation a of be domains should two there the appears it analysis, our on based words, other In problem. V ihu uhcag otepromne(scmae osltigte notreseparate three into them splitting to compared (as performance the to change much without W nti work this In ehv nrdcdti saLgag utpirue osleti hlegn optimization challenging this solve to used multiplier Lagrange a as this introduced have we , V

1 , ! V and 2 and ,

 V htdnt h egho h ersnain nteln n interaction and link the in representations the of length the denote that 3 r sda h yia euaiainhpraaeesadw noticed we and hyperparameters regularization typical the as used are [ ,btprasmr motnl nti td stefcson focus the is study this in importantly more perhaps but ), 153 W osleteotmzto problem. optimization the solve to [ hsi sdt aac between balance to used is this W ,

153 yeprmtr sbt otelf n ih h efrac ntrso 1dosfrtelink the for drops F1 of terms in performance the right and left the to that both see as can hyperparameter, we 6.4(a), Figure In eters. in variation most the had settings. it different since the experiment across sparsity performance 90% the on experimental analysis other the every present in We observations setting. similar have we since experiment, representative hyperparameter user one best sparsity display the only the from we Although experiments, mentioned above search. two the grid between varied the settings running for combinations possible 20 with paired the all of over on value search performance the grid the a evaluate performing We when space. set hyperparameter validation our against found hyperparameters the best (i.e., hyperparameters other all two fix hyperparameters these first regularization We changing LIP. how of on performance analysis the an affects perform hyperparameters we subsection, this representations dimensional In low tasks respectively. two the correlated, keep to strongly how and tasks, polarity interaction an discuss will we Next large. too becomes embedding on analysis the performance once the drops i.e., then embedding, but the increase, vary to that starts methods other as results similar observed have we iue64 efrac aitoso I nte9%dt priyeprmn w.r.t. experiment sparsity data 90% the on LIP of variations Performance 6.4: Figure nFgr .,w aesonte3 ufcsfrtemnindcmiaino hyperparam- of combination mentioned the for surfaces 3D the shown have we 6.4, Figure In hyperparameters The a ikprediction. Link (a) [ [ and s{.5 . .5 .,12}and 1.25} 1.0, 0.75, 0.5 {0.25, as W steeaetems neetn yeprmtr fLIP. of hyperparameters interesting most the are these as [ and W V oto h aac ewe piiigteln rdcinaduser and prediction link the optimizing between balance the control b neato oaiyprediction. polarity Interaction (b) 1 V , 2 , and W = V 3 0 154 . n ieso sizes dimension and 01 W ssont lal eago einfrthis for region good a be clearly to shown is s{.01 .0,00,01,poiigus providing 0.1}, 0.01, 0.001, {0.0001, as ie,ma f64a n 6.4(b)). and 6.4(a) of mean (i.e., tasks two the between Trade-off (c) (

,W [, ! and ) auswiew vary we while values

 ae pnthe upon based ) [ and W .

154 a osrc etrvt rdcinmdl,w ol tlz hsifraint etrifr the inform we better If to information them. this understand utilize could and we predict models, to prediction able vote being better construct of can goal the towards diligent remain we cated, vote; no system. cast complex or highly party a their in against resulting vote thus sometimes they grounds, ethical refusing and representatives beliefs their some up of give nature to the to due However, leaders. associated and party political their following [185], blindly U.S. towards pressure the social immense in receiving parties are representatives political congressional dominant two the between tension ever-growing With seemingly voting. the congressional and elections political to relation in especially problems, related science Prediction Vote Congressional 6.2 it figure the from although sensitive, very choosing not appears is tasks two the optimizing between balance the that have would point a such analysis our on such Based setting balanced. hyperparameter is to tasks a two Thus choose the worse. between to trade-off slightly want the becomes would that task we other tasks, the both then in F1, performance in better increase obtain large a has tasks the of one if user the between correlation the with associated vectors. be latent to weight preferred smaller different a a link have with the tasks better in two performs observed we prediction what polarity Unlike interaction the task. task, prediction prediction link the to compared as prediction polarity larger a because larger the 6.4(b)) Figure in (seen when predictions link the between difference significant varying no to little is there However, prediction. W = lhuhkoigtevtn eair ntecnrsinlsse r nobel compli- undoubtedly are system congressional the in behaviors voting the knowing Although political solve to approaches computational in interest enormous an been has there Recently Where tasks. two the between trade-off drastic a is there that shows 6.4(c) Figure in Finally, 0 . 01 [ u sfrtevleof value the for as but , nternepoie.I a lob oie htfrteitrcinplrt rdcintask prediction polarity interaction the for that noticed be also can It provided. range the in [ [ eae oicesn h egto o uhw eet piieteinteraction the optimize to were we much how of weight the increasing to relates = 0 . 75 a lgtavnaei oho h w tasks. two the of both in advantage slight a has [ [ ed omc etrpromne hc nutvl ae sense makes intuitively which performance, better much to leads hr sntadcsv au ocos.Tu,w aeshown have we Thus, choose. to value decisive a not is there , 155 W enn the meaning ;

155 oe o hc eko h oigotoe.Teevtn ucmsaedntdi h set the in denoted are outcomes voting These outcomes. voting the know we which for votes of set the let denote We first we problem, the introduce To Statement Problem 6.2.1 vote for utilized be to combined prediction. features. are factors novel multiple construct from to coming features theories extracted social the all signed Finally, representatives powerful the harnessing between by followed network voting bills, the bipartite and a construct first to analysis utilize we network Next, signed information. ideological texts semantic their their encodes use that we embedding an bills, learn the directly to for Then, representative. each with associated information ideological Wikipedia utilizes first that features. predictive novel of plethora a extracting to door the the and opens representative which social the [116], bipartite between bills signed connections) a negative as and positive modeled both be contains to (i.e., records network voting for the As propose we time). factor, the all social not second (although the votes thus their and well casting 185]; when is 197, affiliation 196, political it 195, their factor, follow [194, to social polarized likely are first Congress the U.S. the to in relation representatives that In known voting past representatives. their how other 2) with and representatives, intertwines social of are affiliations recording factors party influential the of 1) to set relation second in The are and bills. and factors the values come of whose content and bills, the 193] the into of deep [192, woven ideology are congress the beliefs U.S. as well the as in representatives role congressional the important both an from play to recognized well are which voters. swing potential targeting Similarly, specifically for issues. models these critical utilize upcoming could on leadership re-election congressional for running those of intentions real the of public 4 epooea n-oedfaeokMliFco ogesoa oePeito (MFCVP) Prediction Vote Congressional Multi-Factor framework end-to-end an propose We factors, ideological being set first The factors. effective of sets two identify and recognize We https://www.wikipedia.org/ B = [ 1 1 1 , 2 1 , . . . , < 4 ] ae fterpeettvst er nebdigta encodes that embedding an learn to representatives the of pages eoetesqec fblsascae ihtepast the with associated bills of sequence the denote 156 = ersnaie as representatives R = { A 1 A , < 2 A , . . . , roll-call = } .

156 tlz dooia atr n oilfcos hc h atrcnit ffcoscmn rmboth from coming factors of consists latter the which factors, social and will factors MFCVP ideological specifically, utilize More 6.5. Multi- Figure framework in end-to-end demonstrated the Prediction Vote propose Congressional we Factor these address the To represent factors. to multiple incorporating how by introduced of complexity added challenges this handle to the how and system overcome voting the influencing must factors underlying we prediction, vote congressional For (MFCVP) Prediction Vote Congressional Multi-factor of Overview 6.2.2 bills the votes associated having on nTbe64 ial,w a omlydfietecnrsinlvt rdcinpolmas problem prediction vote congressional the define formally follows: can we Finally, 6.4. Table in found set from extracted the those as or votes feature contextual past additional the any denote then We . predict to seek we which of sequence the have we Furthermore, respectively. vote”, V B ˜ = = ie e fcnrsinlrepresentatives congressional of set a Given [ { 1 ˜ E 1 9 8 B , ˜ | 1 ˜ A ese olanamodel a learn to seek we , 2 8 . . . , oe nbill on voted 1 ˜ < al .:Nttosrgrigcnrsinlvt prediction. vote congressional regarding Notations 6.4: Table Notations ˜ E ] 9 8 h sequence The . V V 2 B B B R ( C ˜ 8 ˜ E 9 ˜ 9 X V 9 8 1 oeta hs oain n tesue hogottepprcnbe can paper the throughout used others and notations these that Note . ) features , 9 } and h oeascae ihvoter with associated vote bill The the for cosponsors of set The bill of sponsor The representative predict. The to seek bills. we votes their future and votes The roll-call future of set The votes past bills. of their set and votes The roll-call past of set The representatives. of set The Descriptions E  9 8 X  B : {+ ∈ ˜ n uuesqec fteucmn olcl oe on votes roll-call upcoming the of sequence future a and , {R sfollows: as a orsodn votes corresponding has , , B − , > , V 157 R } , hc eoe ya,“a” r“present”/“no or “nay”, “yea”, a denotes which , euneo atrl-alvtso h bills the on votes roll-call past of sequence a , X A 1 8 , R 9 hnte r voting. are they when }→ B} . ˜ aeon gave V ˜ C < 8 B ˜ nbill on 1 . V uuerl-alblsdntdas denoted bills roll-call future 9 ˜ . = { 1 E ˜ 9 9 8 ( | 1 ˜ A 8 9 ). ilvt nbill on vote will (6.6) 1 ˜ 9 B }

157 9,19.Nvrhls,ielpitmtosrqiemn supin bu oe behaviors voter about assumptions many require methods point ideal Nevertheless, 199]. 198, present are bills. that the those with in along cosponsors, are and sponsors, voters, entities the of two values and beliefs These the representations about learn to seek we cosponsor(s). Hence, bill. possible a promote and and construct who representatives sponsor essentially the namely associated factors, are which ideology representative) voting a with and bill and a (besides To recognize entities other we two bill. framework, of a use our the on propose in vote ideology factors will representatives’ voter ideology that a represent doubt how comprehensively a influencing and are without effectively bill is a It in reflected information factors. ideological ideology and is factors of set first The MFCVP of Factors Ideology 6.2.3 the for used and combined are factors classification. vote different of representations features. the hand-crafted how novel discuss constructing factors we and Thereafter, different embeddings these how learning explain both first through We represented are perspective. affiliation party political and network a iue65 h rpsdMliFco ogesoa oePeito MCP framework. (MFCVP) Prediction Vote Congressional Multi-Factor proposed The 6.5: Figure orpeetterpeettvs aypeiu ok oue nielpitmdl [192, models point ideal on focused works previous many representatives, the represent To Doc2Vec Bill Ideological Embedding Ideological Factors Negative Positive No vote Sponsor Doc2Vec Cosponsor(s) Doc2Vec Classification 158 Doc2Vec Voter || Features Network Theories Network Social Social Social Factors Features One Party Party - hot

158 sponsor let we Finally, work. future one representatives congressional as the about data of sources other connecting leave We media them. social supporting on voters of content Twitter on generated tweets the their (e.g., as such representation, used be ideological could the sources data obtain other However, to community. large a by maintained is it since falsehoods leakage. pages data Wikipedia no historical is utilize there we ensure experiments to our in that emphasize should in We representative the roles. for three factors all ideology the as representatives) of doc2vec pages the Wikipedia (i.e., with fed model doc2vec repre- model trained same our the of utilize embeddings we learned representatives, the through all obtained are sentation cosponsors and Due sponsors, voters, ideology. that political fact their the including to representative a page) about Wikipedia information representative’s semantic a the (i.e., encoding document entire each which about model doc2vec embedding a compact train we a Then, learns document. single representa- a a as about page information profile Wikipedia textual their all from combine tive We 6.5. Figure in illustrated as doc2vec using 202]. [201, significant approaches shown many has in Doc2vec improvement factors. ideological the represent to method embedding efficient as an [200] doc2vec utilize models to deep propose developed we documents, recently text more for representations the meaningful Given extracting for construction. human their in biases for open are also which [192] points ideal compute to attempting than vector feasible extracting collectively more practically Furthermore, are are representations community). that online pages large Wikipedia the from (e.g., representative 193] the about [195, extract written data to raw reasonable the and natural from more representation seems vector it a instead, so complex, highly inherently are which 1 9 5 ∪ B ∈ h sfleso iiei sta hsielgclprpciei esssetbet issor biases to susceptible less is perspective ideological this that is Wikipedia of usefulness The representatives congressional the of each for representation a learn to pages Wikipedia use We http://www.twitter.com B 9 B ˜ R ∈ o h votes the for pnoigtebill the sponsoring E 9 8 5 ∪ V ∈ rtercmag nnilifraina owihognztosare organizations which to as information financial campaign their or  1 V C 9 ˜ 8 , . ∪ B ∈  B 9 and , B 159 ˜ n h cosponsor the and ,  2 9 eoeebdig ftevoter the of embeddings denote B 9 R ∈ opnoigtebill the cosponsoring C 8 R ∈ the ,

159 h ffiitdpryo h oe n pno,rsetvl.Te o h e fcosponsors of set the for Then respectively. sponsor, and voter the of party affiliated the specifically, More respectively. affiliations, party their representatives of set the the with aligned votes their cast to party political a of interest. voters party’s sometimes from that coming fact influence the an from comes is framework there proposed our for features these of inspiration The Features Party 6.2.4.1 categories. feature two these discuss we Next as constructed records. groups network voting main the past from the two coming from features into 2) factors and features, social affiliation these party political categorize 1) to follows: propose We votes. commonly congressional been understanding of and have predictions that the to features) relation network in analyses the and methodologies on previous by the overlooked emphasis discuss an we (with here factors MFCVP, social into novel incorporated more get that factors ideological the discussed Having MFCVP of Factors Social 6.2.4 voter a cosponsor(s), between relation the considering when Let bill document. the a of as embedding each considered where is bills, preprocessing) the some our (after represent to data to similar textual model bill’s this, doc2vec achieve a To utilize way. we representatives, efficient the the and represent for compact effectively embeddings a to in importance bill great a of about is information it semantic Therefore, it. sponsor prepared the who of cosponsors ideologies instilled and subconsciously even sometimes and conscious the both reflects ie igevote single a Given utilize will we that features ideological embedded of set the represent succinctly now can We bill a of text the fact, In information. essential very offers bill the of content textual The B 9 and 2 1 9 E epciey as respectively) , 9 9 8 2 ∪ B ∈ 9 aeb voter by made ecntuttecrepnigfeatures corresponding the construct we , B ˜ oeta etantebl o2e oe on model doc2vec bill the train we that Note . E C 8 9 8 nbill on = 160 {  C C 1 8 8  , 9 n bill a and htwssosrdby sponsored was that 1 % 9  , C 8 and B 9  , 1 % 2 9 B 9 9 } aogwt hi pno and sponsor their with (along . r n-o etr indicating vectors one-hot are % C 8 , % B 9 B and , 9 n opnoe by cosponsored and  B 1 % 9 . 2 etelearned the be 9 orepresent to 2 9 we

160 bill a h ubro aacdadublne rage ln ihtenme foe tutrs(i.e., structures open of number the with along over triangles distribution unbalanced The and theory. balanced balance of to number adhering the are links negative of number even an involving triplet the considering voter the friend” 29]. a [30, is enemy” an friend is a of “a enemy as “an while summarized be we specifically, can More colloquially signed which features. a theory, insightful of balance extract form utilize to the theories in social history signed voting utilize the in can modeled we link have network, non-existent we and that negative, given positive, Now, a network. as vote” signed “no the and “nay”, “yea”, treat we where them advanced more a propose network. we bipartite signed Therefore, - representation simultaneously. votes that “nay” techniques and analysis “yea” of network the using amounts if drastic incorporate extracted lose been to perhaps destined have inherently could that is condenses information this and/or However, vital separates [203]. ultimately votes “nay” which and network one- “yea” bipartite two the the a are from records coming voting networks congressional mode for used are that representations network Typical Features Network Bipartite Signed 6.2.4.2 features of ikt h te bills other the to link how no are there if that Note for zeros affiliations. of vector party a use the simply we across cosponsors, cosponsors the of distribution the obtain R∪B} ∪ {R # C  8 B h rtsto etrsw osrc hncnieigterltosi ewe voter a between relationship the considering when construct we features of set first The Let 9 C 8 1 htrpeet h itiuinoe h ieaoeetoe osblte hr h triangles the where possibilities aforementioned nine the over distribution the represents that 9 ih oeo h urn bill current the on vote might G a ese nFgr .() ecnosreta ewn oetatifraino how on information extract to want we that observe can We 6.6(a). Figure in seen be can of C 8 = P = n h sponsor the and 9 8 { B} ∪ {{R + = < { oe ie,terpeettvsadbls,adsto ik ie,votes (i.e., links of set and bills), and representatives the (i.e., nodes % C 8 % , ( 1 , C V} B : 8 1 , 9 % , B\{ ∈ : eoetesge iatt ewr hti osrce sn h set the using constructed is that network bipartite signed the denote B 2 B , 9 9 } 9 aeitrce oehro te bills other on together interacted have ) . ic both since , 1 9 } euiieti nomto ocntutafauevector feature a construct to information this utilize We . 1 9 ent htteecnb osbestain when situations possible 9 be can there that note We . C 8 161 % and 2 9 hs he etrsaerpeetdi h set the in represented are features three These . B 9 a aeete oiie eaie rno or negative, positive, a either have can 1 : ogi nomto on information gain to V between ) C 8 and

161 h rtntokfaue(ecie eoe,w ogtt icvrhwteoealdsrbto of voter distribution the overall from the votes how the discover between to balance sought we before), (described feature network first the set the in cosponsors the over average the obtain towards positively if that suggest would bill introduced their between for sign proxy missing a the predict to model supervised a building on rich such hold they since network. [204], signed a models about network information signed generative recently also benchmarking have in distributions the used discover triangle to Signed been model theory. our social for fundamental insight this great to provide related should patterns link”) “no one least at involving those bev how observe indntok[0] nFgr .()w hwa lutainfrhww osrc h feature the construct we how for illustration an show we 6.6(b) the in Figure interactions In their of [205]. polarity network the to signed related is which features), social of set personalized more 2 9 oad h eto h bills the of rest the towards ) efrhroeetattescn yeo etr rmorcntutdsge ewr.In network. signed constructed our from feature of type second the extract furthermore We focused that [4] work seminal the in utilized ones the to similar are features these that note We C 8 a neatdo h il pnoe by sponsored bills the on interacted has iue66 lutain ftesge iatt ewr features. network bipartite signed the of Illustrations 6.6: Figure 1 9 iial,w osrc etr vector feature a construct we Similarly, . C 8 a oe qal to equally voted has (a) # C  8 B 9 1 1 9 hsrltst aac hoybcuetesge oiltheory social signed the because theory balance to relates This . : oee,ulk h rtfaue,hr ewn odirectly to want we here features, first the unlike However, . C 8 B n h urn pnosadcsosr (i.e, cosponsors and sponsors current the and 9 (i.e., 162 2 9 . E 8: = B 9 E rsosrdb oen in someone by sponsored or : 9 ,te ti ieythat likely is it then ), # C  8 2 9 (b) C hr nta fusing of instead where 8 an # C ( 8 B B 9 9 u eew use we here but , C 8 hudthink should 2 9 B ie,a (i.e., B 9 9 B we , and 9 as

162 oeon vote vector cosponsors bills of set the over that network) signed the of terms in link epnua ewrsi urn o oi edi tef.I hswr,w tlz ohrandom both utilize we work, this In classifiers. as network itself). neural in deep field a topic and forest hot better current perhaps a interpreting that obtaining is note networks for we neural (although [208] deep interpretation learning of ease deep the of losing but power prediction, the in performance utilize to Another made 6.2.6.5). Section be in more shown could are be features choice will (this which votes into the of insight classification give correct can the for that important model this from calculated feature be specifically, More can interpretable. importance being off-the- of easy benefit an added typically the have is also it and since train the to [207] model forest on shelf random based a chosen utilize be to can is and choice fixed One not is outcome. our classifier desired that the note of We choice the prediction. that vote in flexible congressional is for framework model a we how training discuss for next together we them factors, utilize multiple can from coming features the all discussed have we that Now MFCVP of Details Classification 6.2.5 future as [206]. this embeddings leave network signed we advanced representatives; of the use the between with context along social work larger extend a easily obtain could to we Twitter), ideas on these cosponsors and sponsors, voters, the between connections the B |N 9 iial,w osrc h etr vector feature the construct we Similarly, . 9 8 ial,w osrc h ulsto ewr features network of set full the construct we Finally, | = # 24 1 C ( 8 9 B oeta hs ewr etrsaei atgnrladi ie diinlcnet(e.g., context additional given if and general fact in are features network these that Note . eosretedsrbto vrtetrepsil oe ie,pstv,ngtv,o no or negative, positive, (i.e., votes possible three the over distribution the observe we , 9 2 aiglnt .Gvntefc htw att xrc nomto bu how about information extract to want we that fact the Given 3. length having 9 wohscosponsored has (who 1 B 9 nta,w vrg over average we instead, , 1 9 C ). 8 a ie oalohrbills other all to given has # 163 C ( 8 1 2 2 9 9 hc eoe h e fblssosrdb the by sponsored bills of set the denotes which , u ahrta bevn h oedistribution vote the observing than rather but , N 9 8 = { # C  8 1 B 9 B 9 # , htwr lososrdby sponsored also were that C  8 2 9 # , C ( 8 B 9 # , C ( 8 2 9 } C where , 8 might

163 oe eae oaedet r o nlddi u aae.W bandielgclembeddings ideological obtained We roll-call dataset. example, our for in resolution; included not simple are a amendments or to related resolution, votes concurrent resolution, joint bill, the a from with affiliation party and cosponsor, sponsor, database the Govtrack with along data vote roll-call the collected the on focused have we experiments, our For Collection Data and Dataset 6.2.6.1 and experiments presenting by section analysis. this factor on conclude discussions We results. comparison and methods lines questions: research conducted following the the Through answer to information. seek historical we of experiments, set training set a a giving for when vote bills roll-call incoming the new of of outcome overall the and experiments votes of representative set individual a predicting conduct for we MFCVP, framework proposed the of performance the evaluate To Experiments 6.2.6 6 et edsrb h aae olwdb xeietlstig hn edsrb h base- the describe we Then, setting. experimental by followed dataset the describe we Next, • • https://www.govtrack.us Q2: Q1: o ieetfcoscnrbt otecnrsinlvt prediction? vote congressional the to contribute factors different How prediction? vote congressional on perform framework proposed the does How 6 Peet/ovotes “Present”/No fe bann hsdtst efitrdotterl-alvtsntassociated not votes roll-call the out filtered we dataset, this obtaining After . Representatives olcl votes roll-call # 113 Ny votes “Nay” Ya votes “Yea” th total # total # total # os of House al .:U ogesdtststatistics. dataset Congress US 6.5: Table 137,926 Dataset 68,487 8,929 Total 499 113 164 th 110,882 54,874 ..Cnrs os fRpeettvs We Representatives. of House Congress U.S. (80%) 6,934 Train 400 12,407 (10%) 7,790 Dev. 902 49 14,637 (10%) 1,093 5,823 Test 50

164 DM[4 steotmzto loih hs erigrt trsfrom starts rate learning every whose dynamically algorithm optimization the the search, as grid [94] the ADAM Using to set. set dev the is on layers framework of the number evaluating via search Hyperparameters grid the function. by activation set non-linear are the as [94] Unit) with Linear network (Rectified connected ReLU fully multi-layer Leaky a employ we 6.5), Figure (see model network neural deep MFCVP as framework our of MFCVP variants as neural two our these for library denote PyTorch We network. the used neural implementation. we network deep and a library and scikit-learn the forest utilize random we forest a random utilize frameworkFor we MFCVP classifiers, our Since different vote). utilizing roll-call in the flexible vote of is roll-call outcome overall the the whether is to (which fail as or prediction utilize pass aggregated we will Next, the get votes. to representative predictions individual vote of individual prediction these the for results the obtain we First, Settings Experimental 6.2.6.2 our obtain to used and collected then was data this 2014; embeddings. 5, ideological find March to before data representatives but the no to of ensure closest each to date for before, the pages mentioned profile we Wikipedia as historical the Thus, searched we roll-call 2014. the leakage, 5, of 80% March first before the happened roughly test with all a constructed and and is votes set, set dev training Congress The a of set, 6.5. Library Table train in a the shown i.e., from as sets set obtained three we into which chronologically dataset text, the bill’s split the we Ultimately, on based bills the of each for otets set. test the to 50 of size batch the with steps erpa ahsmlto v ie n eotteaeaeF cr n cuayi regards in accuracy and score F1 average the report and times five simulation each repeat We . 7 aeie Methods: Baselines https://www.congress.gov _ N epciey o h admfrs,w s h irr eal etns o the For settings. default library the use we forest, random the For respectively. NN, 100 piiainseswt h ea aeof rate decay the with steps optimization oso h ffcieeso u rpsdfaeokMCP epresent we MFCVP, framework proposed our of effectiveness the show To 5 100 with oe tec tp h medn ieo o2e oe sstto set is model doc2vec of size embedding The step. each at votes 100 idnuisadn euaiaini tlzd eutilize We utilized. is regularization no and units hidden 165 0 . 9 ahsmlto srun is simulation Each . 0 . 01 n sadjusted is and _ F and RF, 2000 7 .

165 e fbsln ogesoa oepeito ehd n ics h ehv eetdthese selected have we why standpoint. discuss political and a methods from baselines prediction vote congressional baseline of set a • • • • • dooia ilembedding bill ideological sponsor the of affiliation o- il:We ekn opeittevote the predict to seeking When Bills: Top-K “yea”, bill. vote a again on vote” will “no they or they then “nay” if voting sponsor, for words, this reasoning other of similar In having bills past bill. the current “yea”) voted the (i.e., of liked sponsor have the with their base experiences they past but their voting, on when affiliation vote political the to adhere necessarily not does Voter vote a Given Voter: Biased Sponsor political the with vote aligned a vote predicting for to specifically, representatives More the parties. all forces method This Voter: Party by from representative another). one than often (e.g., more distribution significantly vote vote not their and of abstain might terms in patterns unique own their have lblcasdsrbto,w xrc esnlzdcasdsrbto o ahvtr In voter. vote each the for guess distribution to class a personalized words, than a rather other extract here we method, distribution, Guess class Random global the Extending Guess: Random Personalized vote a with presented when guess random a performs method This Guess: Random iecnetit o icl hspolmi scmae otems av approach. naïve most the to compared as is problem this difficult votes how past into of context give set the from vote” “no and “nay”, “yea”, of voter for predict to B} { E 8: hsrpeet h oe htvoter that votes the represents This . B ˜ |∀ 9 1 ˜ n ecos h ihs oetp vrtecasdsrbto.TeSosrBiased Sponsor The distribution. class the over type vote highest the choose we and 1 9 n hnw bantesto l atvotes past all of set the obtain we then and , : B ∈ and C 8 E naftr bill future a on 8: V} ∈ B ˜ 9 fbill of  1 hsmto sue ots fide niiulvoters individual indeed if test to used is method This . 9 n hnfid h closest the finds then and E ˜ 1 ˜ 9 8 9 E 1 hnw rdc ya n tews epeit“nay”. predict we otherwise and “yea” predict we then , ˜ ˜ 9 8 ∈ 9 h admgesi ae ntecasdistribution class the on based is guess random The . C ∈ 8 V 166 a ie nps bills past on given has ˜ V ˜ eetattecasdsrbto rmteset the from distribution class the extract we ob rdce,fis h sponsor the first predicted, be to E ˜ { 9 8 E E 8: ˜ 9 8 ∈ | E V 8: ∈ ˜ V V ∈ ftevoter the if V hsmto sslce ojust to selected is method This .

˜ hsmto rtotisthe obtains first method this bills and 1 : htwr losponsored also were that 1 B ˜ 9 : stesosrof sponsor the is C B ∈ 8 a h aeparty same the has : ae ntheir on based B ˜ 9 sobtained is E ˜ 9 8 ∈ 1 : V ˜ ∈

166 h eut r hw nFgr ..Bsdo h eut rsne nti gr,w aethe make we figure, this in presented results the on Based observations: following 6.7. Figure in shown are results The Predictions Vote Representative Individual 6.2.6.3 methods). Guess Random Personalized Guess, Random the methods repeat we roll- overall variants, global MFCVP the to for Similar also vote. and call level vote representative individual local the both for baselines oase h research the answer To • iue67 efrac vlaino FV rdcigidvda ersnaievotes. representative individual predicting MFCVP of evaluation Performance 6.7: Figure h atta h itrclrltosbtenavtradsosrhv infiatimpact significant a have sponsor and voter a between relations shows historical This the that others. fact the the outperforms approach voter sponsor methods, baselines the Among only vote their cast to hyperparameter voter select To the method allows ideologies. Bills their and Top-K on the affiliations based using party votes indirect the or predicting direct say, all to ignores is That text. bills proposed the embeddings efrigvle euiie h ulda itnefrdtriigteclosest the determining embeddings. for their distance on Euclidean based the utilized We value. performing { 1 , 5 3 , ie n eotteaeaeF cr n cuay(ic hyaenon-deterministic are they (since accuracy and score F1 average the report and times 5 , 8 , 10  , 20 1 : , o- il ehdsll ae hi oeo h dooia atr of factors ideological the on vote their bases solely method Bills Top-K . 30 Q1 } hl rdcigo h e e;wihrsle in resulted which set; dev the on predicting while ecmaetepooe rmwr FV ihterepresentative the with MFCVP framework proposed the compare we , 167

evre h au of value the varied we ,

= 8 en h best the being

nteset the in

bills

167 in)t banteoealgoa olcl oeotoeo hte h ilwl aso al The fail. or pass will bill the whether of outcome vote roll-call global predic- overall vote representative the individual obtain the to (i.e., tions) level local the from predictions the utilize we Here, Predictions Outcome Vote Roll-call Overall 6.2.6.4 fail. or pass will bill proposed a when detect accurately predictions can global MFCVP the whether investigate to we as Next, framework. prediction vote congressional reliable a as hrfr,fo oa ogesoa oeprpcie hssosta FV a eutilized be can MFCVP that shows this perspective, vote congressional local a from Therefore, • • • s h admfrs o h eto xeiet ic tpoie ihmr interpretable more with provides it factors. proposed since the experiments into of insights rest the for forest random the use voting. MFCVP congressional with Although associated factors political man- influencing sophisticated various and comprehensive incorporates a ner, in in framework, and This methods significantly. baselines very all cases outperform some MFCVP framework proposed the of variants a The how of history prior the bills. past though, on per- voted effectively representative as not surprising, not incorporates, is guess This random sonalized guess. random the outperforms guess political random sponsor’s Personalized the on based bill proposed a against affiliation. instead or ideology with and voting beliefs always prior merely their of of to behavior adhere voting representatives polarized some the Congress, despite U.S. that performance the argument low the the fact, supports In method voter party. party sponsor bill’s of a on more is based bill voting a blindly of content than the important that note can we voter, party with method bills Top-K Comparing u rpsdfaeok niesosrvtrmto,icroae hs eain na in relations network. signed constructed these the from features incorporates principled more extracting method, by way sophisticated voter before, described sponsor as Further, unlike framework, bill. upcoming proposed an for our voter a of status vote the determining on _ Nahee lgtybte efrac hnMFCVP than performance better slightly achieves NN 168 _ F eotto opt we RF,

168 eut r hw nFgr ..Bsdo h eut rsne nti gr,w aetefollowing the make we figure, this in presented observations: results the on Based 6.8. Figure in shown are results iue68 efrac vlaino FV rdcigteoealrl-alvt outcome. vote roll-call overall the predicting MFCVP of evaluation Performance 6.8: Figure • • • h oa oigpten)adtu antgnrlz swl hnageae oteglobal the to aggregated when well as on generalize trained cannot were thus models and the patterns) (since voting data local training the the overfit slightly have to likely is it better, lhuhteMFCVP the Although bill. proposed the of sponsor the to compared relation as their content to bill the is to fail according or history pass representatives will the bill through a predicted whether better in of prediction stable the quite out, averaged are when representatives 2) and bill. the ideologies; the 1) their of sponsor phenomena: the two with indicates have this voters specifically, the past More all with relationship has the bill to upon voted compared the as correlation bills the roll- similar to for due decisions likely pass/fail more overall happening the Sponsor are that the votes implies call outperforming it now since is interesting bills is Top-K This the model. that Voter in swap similar a observe we Next party. their considering just than better patterns is voting the previous representatives to the using votes pass/fail, representative with bill all the aggregating whether of when prediction However, party. political their on based predictor better is the votes representative individual for that means This method. outperforms voter significantly party the it here votes, representative individual determining for voter the than party worse performed guess random personalized the although that is observation first The _ Ni etral opeittelclidvda ersnaievotes representative individual local the predict to able better is NN 169

169 fielgclfcos ae nti gr,w aetefloigobservations: following the make [209]. we figure, importance this on Gini Based the factors. ideological using of where factors) factors three social these of are importance the two shows 6.9 latter Figure (the factors party and network forest random the using on individual attention MFCVP local our (i.e., focus the We for experiments prediction. some vote conduct congressional we representative question, this answer To prediction. vote question research The Analysis Factor Political 6.2.6.5 MFCVP our votes. that congressional clear the is predicting for it methodology bills, effective and proposed superior the a for as is framework predictions well aggregated as fail predictions representative or individual pass local global the the both for results the on based Therefore, is,w opt h motneo h he seta atr norfaeokie,ideological, i.e., framework our in factors essential three the of importance the compute we First, • • • aea nosqeta ffc nidvda oepeito.Ti spltclyreassuring politically features is party This 6.7), Figure prediction. vote (see individual baseline on Voter effect Party inconsequential the an have of performance the with line prediction. vote In in effective quite is established it networks since votes, social historical of their role and representatives the among overlooking avoid and factors merely not ideological should on prediction vote focus political any 2) and behavior, the voting voter’s 1) the on indicates bearing This significant a have representatives Congress important. of House very U.S. among be connections and to interactions out turn features network interestingly, Quite beliefs. and ethics their cast to vote adhere representatives a many determining and in bill vote role a central individual on a play in factors features ideological that important shows most This the prediction. are factors) ideological (i.e., Embeddings ee.Hwvr hnpiigterno oetmdlwt u FV rmwr (i.e., framework MFCVP our with model forest MFCVP random the pairing when However, level. _ _ F)a tpoie swt etr motnevle na xlial manner. explainable an in values importance feature with us provides it as ) RF F,w e tejy etrgnrlzto vrtenua ewr variant. network neural the over generalization better a enjoys it see we RF), Q2 scnendwt h otiuino oiia atr o congressional for factors political of contribution the with concerned is 170 Embeddings niaetecontribution the indicate

170 etrsi aho h he vrl atr nmr eal emk h olwn observations following the make figure: We this in detail. shown more results the in to factors according overall three the of each in features o,w arwdw h etr nlssilsrtdi iue69t netgt contributing investigate to 6.9 Figure in illustrated analysis feature the down narrow we Now, • • eevdbpria upr,o nyfo igepry hsi u otefc htthe model. that our thus for fact and space the embedded ideology the their to in hold due separable they easily is that likely such This designed are party. representatives single the of a embeddings from only or has it support, whether bipartisan across into received insight aggregated provide when can or embedding representative cosponsors, model average no our the received cosponsors allows all has it bill fact, into given this introduced a on being whether based bills categorize Therefore, of to half [210]. over cosponsored that known are is Congress It U.S. sponsors. of those than effective more are cosponsors with associated embeddings the surprisingly, somehow on. and Interestingly voted being is that bill a seems is it This all, contribution. after highest since, the reasonable has embedding bill the factors, ideological the Among ree nohrcutyspltclsystems. political Senate country’s and other House U.S. in the even a in or such history if throughout investigate time to in research points of other line at this persists on phenomenon more up bill’s follow a will of we future, party the political In the sponsor. of inclination the follow submissively not do representatives as iue69 etr nlssuigtefaueiprac ausfo MFCVP_RF. from values importance feature the using analysis Feature 6.9: Figure 171

171 • • • eeosre ob elsie o rdcigwehrtesg famsigln ol be would link missing a of sign the negative. whether or positive predicting for suited well they be where [4] to in observed extracted features were the to on related note are we based and (that triangles) are contain network features not bipartite does related naturally signed balance constructed our our fact from the extracted that to we by due pseudo-triangles proposed previously likely bills is at this look Also, only that (co)sponsor. features social view, local global the more is to a this at compared looking for as and voters reasoning principled more One a are features how (co)sponsor. based at theory same balance looked the the that by that bills ones proposed social past the with related than was features behavior insightful the more that were observe theory we balance features, to network two the between comparing When of information. number the the of of most order retain the can on just that is cosponsors) (which signal features the noisy embeddings more of or a party in any the results by to votes) compared of proposed as set large bill very a a because be to to likely given tends is (which has cosponsors This representative current a signal. votes stronger the a have all over sponsors the aggregating here embedding that the in to features compared as party opposite and the observe we features, network the for with. However, associated are they party political the knowing just than important are more ideology representative’s significantly the about embeddings learned the taken expected, be as should but affiliation this account, party into factors, even ideological whose role to important Similar an play bills. cosponsors that of indicates party to cosponsors compared the insignificant from very stems (though factors) features other party the of contribution entire the Almost 172

172 hs edvlpdanvlojciefrDSetbsdo ttster n aac hoythat networks. theory signed balance other and in theory status users on of based DeSCent centrality for such the objective mapping novel out a enough extract developed general we to Thus, a applied learns efficiently network be signed networks. can one across it in calculated that model be a to training centrality words, for other allows each In framework for score deep centrality the signed Furthermore, a identifying user. while links negative complex and these learn positive and between out extract patterns to learning deep (DeSCent) of power Centrality the Signed harness to Deep us allowed a that developed measure we Thereafter, prediction. outperform build link significantly for to methods methods global necessary local (2) are links; efforts negative strength with dedicated tie measurements (1) and relevance that signed prediction demonstrate sign results link Experimental i.e., relevance tasks, signed prediction. analysis of network impact the signed study two further on We measurements theory. by guided balance measurements and global properties and network local relevance signed numerous node built of We study networks. comprehensive signed and in initial measurements an performed and individually, we both Next, links negative together. and holistically positive both consideration into taking networks signed signed (3) modeling; network signed applications. (2) network signed measuring; (4) and network mining; network signed (1) - links negative with Summary 7.1 directions. chapter this In nentoa ofrneo e erhadDt iig(SM.2020. (WSDM). Mining Data and Search Web on Conference International 1 o esrn indntok,w rtpromda nlsso h rprisadtere in theories and properties the of analysis an performed first we networks, signed measuring For analysis network of directions major four the in research novel proposed we dissertation, this In ye er NtokAayi ihNgtv ik. nPoednso h 3hACM 13th the of Proceedings In Links.” Negative with Analysis “Network Derr. Tyler 1 epoieasmayo u eerhrsl n rsn rmsn uueresearch future promising present and result research our of summary a provide we , OCUINADFTR DIRECTIONS FUTURE AND CONCLUSION HPE 7 CHAPTER 173

173 esdwt h nrdcino eaielns ec,w ul oe grgto ceefor scheme aggregation novel a built we Hence, links. be negative easily of not could introduction technique the the with aggregation reused neighborhood assumption local the the apply on to built that are homophily, (GCNs) of networks convolutional graph unsigned since examined and networks. into bipartite signed insight in provide prediction to sign and networks theory bipartite balance signed both real-world and three methods; on prediction experiments sign performed multiple net- of (4) bipartite construction the signed for in theory signed unbalanced balance balanced to leveraged (3) compared indeed works; as that often validated more (2) significantly found classes; are isomorphism butterflies butterfly definition signed the extends of (1) form that: the networks in bipartite signed an provided in also theory we balance addition, of In investigation and initial properties. properties, desired key the the maintaining model network similar to a needed output take parameters then to appropriate BSCL learn allows network, edge signed random a a input inserting as versus parameter triangles another create with to paired often parameters how two controlling for the respec- for links, approach signed a estimation and and automated triangles An parameter formed of balancing tively. distribution triangle the a control introduced to we parameter balancing this, sign achieve To theory. balance sug- triangles by clustering balance/unbalanced gested local of (2) proportion (3) distribution; and degree ratio link (1) positive/negative of - (2) objective coefficient; networks the signed with of designed properties was key BSCL three model. preserving network generative signed first the was which the strengthens further which networks, approach. proposed signed the of other applicability in enough scores general are centrality that meaningful network one extract in to parameters the learning validate for framework to deep performed the recently were of other experiments usefulness over Furthermore, DeSCent of measures. superiority centrality signed the shown proposed have networks signed real-world four results on experimental These prediction. link signed for conducted scores we centrality approach, signed the our using of experiments effectiveness the evaluate to Then, structures. higher-order utilizes o iigsge ewrs epooe h rtsge rp ovltoa ewr (SGCN) network convolutional graph signed first the proposed we networks, signed mining For (BSCL), model Chung-Lu Signed Balanced our proposed we networks, signed modeling For 174

174 bet icvrtems nunilatiue ncnrsinlvt rdcinwiediscovering while prediction vote congressional in were attributes furthermore, influential We most the features. discover to affiliation able party finally and embeddings document from features ideological coming other to addition in features a network as extracted on then vote and to network are they bipartite bills signed the and congress of members modeled the between We congress factors. in votes social historical and the ideological prediction both vote harnessing congressional of capable comprehensive is a that presented MFCVP, framework links we user-content addition, and In user-user the dataset. both cold-start real-world of the a polarity alleviate in the help predict to to since seeking able and in empirically resides problems, were that both we problem from correlated, opinions are the opinions harnessing by these on generated show built we content is and framework users The between scores users. polarity other interaction the as well as users between theories. social on relying not while link we tasks the Empirically prediction on sign performance network. and state-of-the-art achieved signed and original effective the very in surprisingly is nodes this the discovered of each for embedding an construct network to roles/viewpoints multiple unsigned the a back an performing aggregate to after of able are and we creation network, embedding network the original unsigned the traditional to from led node each This for viewpoints perspective). multiple of in/out consisting e.g., role, per instance (one node times multiple the appear of they where network a to transformed being nodes signed initial into the network transform to namely is idea embedding, the Essentially based (ROSE). embedding transformation network network signed role-based for idea the network proposed signed universal we more method, a develop embedding to seeking Thereafter, the task. performing prediction when sign SGCNs link the classical of signed superiority state-of-the-art the shown the had against we algorithms, Comparing embedding network through networks. evaluations our signed real-world empirical Using four performed on analysis. we experiments network between network, signed convolutional gap of the domain graph the bridge signed and to constructed GCNs us unsigned allowed in other This advances each with recent defined. interact the links we negative paths and balanced/unbalanced positive the the how along and theory balance on built SGCN o pligsge ewrs epooe I h on oe htcnpeitbt h polarity the both predict can that model joint the LIP proposed we networks, signed applying For 175

175 ewr nlssi eaint aho h ao ietoso esrn,mdln,mnn,and mining, modeling, measuring, of directions major applying. the of each to relation in analysis network Directions Future 7.2 significant prediction. having vote are congressional informative the being at role while features network signed proposed we the Ultimately, that performance. showed worse significantly have affiliations party on based predicting simply nti eto epeetsm osbeftr ietosars h ao ra fsigned of areas major the across directions future possible some present we section this In • • • ffrscetdt ohatc n eedaantavrailatcso rdtoa network traditional on attacks adversarial against defend and attack both to created efforts Networks: Signed in Methodologies Defense and Attack a to readers the [214]. refer topic We general this interest. on survey of recent be would modeling the generative 4, deep Chapter a in presented of method development BSCL self- our upon and improve to [78], Thus, (VAE-based) [213]. autoencoders attention-based attention variational recurrent [212] graph GRAN-based) [79], (i.e., RNN-based) network (i.e., networks neural recurrent GAN- utilize [211], (i.e., that networks based) adversarial networks generative from attributed ranging techniques node graph or on learning unsigned deep for models graph generative of opment Networks: Signed of Modeling Generative Deep ihtelns con raintm,etc. time, creation account links, the associated with comments links users, between the logs chat with timestamps, creation associated link information as or such side structure, nodes, and/or network additional having the only of using assumption with added dedicated performed the with be with direction can this task in this done example, be For can what efforts. of this However, surface the problems. scratched prediction just strength effort tie initial empirical and an prediction performed sign and the measurements both relevance on node evaluation signed global and local of set a i teghPeito nSge Networks: Signed in Prediction Strength Tie 176 o esrn,i hpe epresented we 2 Chapter in measuring, For eety hr a enarpddevel- rapid a been has there Recently, lhuhteehsbe some been has there Although

176 • niet(.. eaieycmetn naohrue’ ot[1] eaielnsi social in links negative [218]) and post media. [217]) user’s unfollowing another (e.g., on direct commenting both negatively of (e.g., modeling indirect the to types lead which can characterize online and understand interactions to of important is it forward analysis frontier network the social push signed to in Hence, purposes. research for anatomized data this later this only released ties, negative having although For that website available. review data product of a lack was Epinions the focusexample, give Twitter), to as able (such been sites media not social has mainstream far many linking on thus edges analysis and network nodes signed of most However, of set (i.e., viewpoint together). network realistic them a more with model a to provides seek it we system that underlying is the anlaysis network signed of aspect Media: portant Social Online in Relations Unfollower Predicting and Understanding lce sr,ufloig,ec erfrteraest eetsre nti general this on survey recent a to readers the [216]. as refer topic such We defenses links, negative and etc. of attacks unfollowings, information the users, additional both blocked this utilizing attacks, by such improved for be concerns to likely of are networks areas media major social the and of online one polarization being increased the given the and With developed recently evolving. is area still this [215]) (e.g., models network neural graph and embedding 177 n im- One

177 BIBLIOGRAPHY 178

178 IaaiKrakrKreadYswn hsa Damle. Bhaskar Yashwant and Karve Understanding Karmarkar Irawati Liu. Huan and [14] Chang, Yi Wan, Yali Wang, Yilin Tang, Jiliang Li, Jundong [13] Scott. John [12] networks. random in scaling of Emergence Albert. Réka and Barabási papers. Albert-László scientific of Networks [11] Price. Solla De J Derek sociogram. large a of study [10] A Horvath. J William and Homophily Rapoport Anatol feather: a of Birds Cook. [9] M James and Smith-Lovin, Lynn McPherson, Miller In [8] links. negative with analysis Network Derr. distrust Tyler and trust with recommend to [7] Learning King. Irwin and Lyu, R Michael Ma, Hao [6] distrust- Trust-and Teredesai. Ankur and Cock, De Martine Cornelis, Chris Victor, Patricia negative and [5] positive Predicting Kleinberg. Jon and Huttenlocher, Daniel Leskovec, Jure [4] of Propagation Tomkins. Andrew and Raghavan, Prabhakar Kumar, Ravi Guha, Ramanthan media. social [3] in networks Signed Kleinberg. Jon and Huttenlocher, Daniel Leskovec, Jure In computing. social [2] in Trust Liu. Huan and Tang Jiliang [1] 1963. nity relations. reciprocal in delay predicting and 1961. 6(4):279–291, networks. social in Mining Data and Search Web on Conference 2009. ACM, 189–196. In relationships. On-Line) In Society reviews. controversial for recommendations based In web networks. wide World social online in links 2004. ACM, 403–412. pages In distrust. and trust 2010. ACM, 1361–1370. In Web Wide World on Conference tional 8(49:0–1,1999. 286(5439):509–512, rceig fteSGH ofrneo ua atr ncmuigsystems computing in factors human on conference SIGCHI the of Proceedings oue2.Pbihdb MKtefrteDca olg otgaut n Research, and Post-graduate College Deccan the for Katre SM by Published 24. volume , oilntokanalysis network Social ae 4–5.AM 2010. ACM, 641–650. pages , 2009. , rceig ftetidAMcneec nRcmedrsystems Recommender on conference ACM third the of Proceedings nulrve fsociology of review Annual rceig fte1t nentoa ofrneo ol ieWeb Wide World on Conference International 13th the of Proceedings BIBLIOGRAPHY ae 2012. Sage, . rceig fte1t nentoa ofrneon conference International 19th the of Proceedings ae 0–0.AM 2014. ACM, 207–208. pages , 179 ri rpitarXiv:1703.01393 preprint arXiv ae 1–1,2020. 917–918, pages , ae 1–4,2001. 415–444, pages , rceig fte1t International 13th the of Proceedings e cec ofrne(WebSci’09: Conference Science Web Science ru eain nvlaecommu- village in relations Group rceig fte2r Interna- 23rd the of Proceedings ae 1–1,1965. 510–515, pages , eairlscience Behavioral 2017. , Science pages , pages , , , ,

179 McalSel eadLmite n tfnTunr utrltoa raiaino large- of organization Multirelational Thurner. Stefan and Lambiotte, Renaud Szell, Michael [28] JlagTn,SiuCag hr gawl n unLu eaieln rdcinin prediction link Negative Liu. Huan and Aggarwal, Charu Chang, Shiyu Tang, Jiliang [27] or Friend Chang. Yi and Zha, Hongyuan Long, Bo Smola, J Alexander Yang, Shuang-Hong [26] ex- An metrics: trust local demand users Controversial Avesani. Paolo and Massa Paolo [25] Jrm uei,AdesLmazc,adCrsinBukae h lsdtzo mining zoo: slashdot The Bauckhage. Christian and Lommatzsch, Andreas Kunegis, Jérôme [24] weight Edge Faloutsos. Christos and Subrahmanian, VS Spezzano, Francesca Kumar, Srijan convolutional graph [23] with classification Semi-supervised Welling. Max and Kipf N Thomas formation. [22] network on homophily of Effect Altmann. method- Jörn and and substantive Kim Kibae a process: social [21] a as Friendship Merton. RK. and the Lazarsfeld on PF structure. evidence some group reply: [20] of leinhardt and analysis Holland matrix Leinhardt. Samuel of and method Holland W A Paul Perry. [19] D Albert and Luce Duncan R [18] Newman. Mark network. [17] social a in reciprocity of Measures Bandyopadhyay. Suraj and Rao Ramachandra A choice. of [16] reciprocation toward tendency the of Measurement Powell. H James and Katz Leo [15] cl oilntok na nieworld. online an in networks social scale 0(1:33–34,2010. 107(31):13636–13641, Mining Data and oilmda In media. social retrieval information in 2012. development ACM, and 564. Research on conference In SIGIR networks. ACM social in ties signed predicting frenemy?: In community. com epinions. on study perimental AIPes I rs;19,2005. 1999, Press; MIT Press; AAAI Intelligence artificial on web wide World on oilntokwt eaieegs In edges. negative with network social a In networks. signed weighted in prediction 2016. networks, Simulation Numerical and Science Nonlinear in 1954. sentiment, interpersonal analysis ological 1972. sentiment, interpersonal positive of transitivity Psychometrika Sankhy Sociometry S,2010. USA, :TeIda ora fSaitc,Sre A Series Statistics, of Journal Indian The a: ¯ 84:0–0,1955. 18(4):403–409, , 42:516 1949. 14(2):95–116, , ewrs nIntroduction An Networks: ae 79.AM 2015. ACM, 87–96. pages , rceig fteEgt C nentoa ofrneo e Search Web on Conference International ACM Eighth the of Proceedings ae 4–5.AM 2009. ACM, 741–750. pages , oue2,pg 2.MnoPr,C;Cmrde A London; MA; Cambridge, CA; Park, Menlo 121. page 20, volume , 180 rceig fteNtoa cdm fSciences of Academy National the of Proceedings rceig fte1t nentoa conference International 18th the of Proceedings ICDM xodUiest rs,Ic,NwYr,NY, York, New Inc., Press, University Oxford . 44244 2017. 44:482–494, , ae 2–3,2016. 221–230, pages , rceig fteNtoa Conference National the of Proceedings ae 4–8,1987. 141–188, pages , rceig fte3t International 35th the of Proceedings Communications ae 555– pages , ,

180 Hnhn og hitsFluss n i-uPn atrno akwt etr n its and restart with walk random Fast Pan. web. Jia-yu and the Faloutsos, on Christos Tong, neighbors Hanghang and tail Friends long [44] Adar. the Eytan Challenging and Adamic Chen. A Chen Lada and Yao, Junjie [43] Li, Jing media. Cui, social Bin in Yin, mining Hongzhi and detection Community [42] social Liu. in Huan classification and Tang Node Lei Muthukrishnan. S [41] and Cormode, Graham Bhagat, Smriti [40] Ziu i,Mns ut,TmWnne,adJae a.Auie rmwr o link for framework unified A Han. Jiawei and Weninger, Tim Gupta, Manish Yin, Zhijun [39] recommending and predicting walks: random Supervised Leskovec. Jure In and Backstrom Lars balance. social computing for [38] algorithm spectral A Winkler. Marco and Terzi Evimaria [37] Guep acet,Goan aoo n lui lan.Cmuiggoa structural global Computing Altafini. Claudio and Iacono, Giovanni Facchetti, Giuseppe [36] clustering. Correlation Chawla. Shuchi and Blum, Avrim Bansal, graphs. Nikhil in balance structural and [35] Clustering Davis. social A and James figure of Goodness Soto. [34] De digraph. B a Clinton and in Horsfall, cycles B Robert and Henley, paths M Nancy of number The [33] Gleason. C Terry and Cartwright Dorwin graph. signed a [32] of balance of notion the On al. et Harary Frank [31] theory. heider’s of generalization a balance: Structural Harary. Frank and Cartwright Dorwin [30] organization. cognitive and Attitudes Heider. Fritz [29] plctos In applications. recommendation. Discovery Knowledge and Mining Data on Lectures In networks. 1–2.IE,2006. IEEE, 613–622. 2003. 25(3):211–230, on Conference International 2010 (ASONAM), eomnainuigrno ak.In walks. random using recommendation mining data and search In networks. social in links graph web the for models and Algorithms Sciences aac nlresaesge oilnetworks. social signed large-scale in balance structure. Psychometrika review Psychological 1946. 112, 613:913 2004. 56(1-3):89–113, Journal ()1316 1953. 2(2):143–146, , 0(2:05–05,2011. 108(52):20953–20958, , scooia Review Psychological oilntokdt analytics data network Social 12:7–9,1966. 31(2):179–199, , aaMnn,20.ID’6 it nentoa ofrneon Conference International Sixth ICDM’06. 2006. Mining, Data rc LBEndow. VLDB Proc. 35:7,1956. 63(5):277, , ae 3–4.AM 2011. ACM, 635–644. pages , rceig ftefut C nentoa ofrneo Web on conference International ACM fourth the of Proceedings 62:9,1969. 76(2):194, , ()8697 a 2012. May 5(9):896–907, , 181 ae –3 pigr 2011. Springer, 1–13. pages , dacsi oilNtok nlssadMining and Analysis Networks Social in Advances ae 1–4.Srne,2011. Springer, 115–148. pages , ae 5–5.IE,2010. IEEE, 152–159. pages , rceig fteNtoa cdm of Academy National the of Proceedings ()117 2010. 2(1):1–137, , h ora fpsychology of Journal The ua relations Human h ihgnMathematical Michigan The ahn Learning Machine oilnetworks Social 1967. , 21(1):107– , Synthesis pages , , ,

181 RgrA onadCalsR Johnson. R. Charles and context Horn structure A. network Roger asymmetric an [59] Ascos: Giles. Lee C and Chen Hung-Hsuan [58] analysis. sociometric from derived social index in status new individuals A of Katz. Leo equivalence Structural [57] White. C Harrison and Lorrain Francois mining network signed of [56] survey A Liu. Huan and Aggarwal, Charu Chang, Yi Tang, Jiliang [55] networks. social for problem link-prediction The Kleinberg. Jon and Liben-Nowell David [54] web social in relationships distrust and trust Mining Aghaie. Abdollah and Zolfaghar Kiyana [50] Faust. Katherine and Wasserman Stanley worldwide [49] The Amaral. Nunes LA and Turtschi, Adrian Mossa, Stefano Guimera, Roger [48] JnogJn,Woen i,LeSe,adU ag esnlzdrnigi signed in ranking Personalized Kang. U. and Sael, Lee Jin, Woojeong Jung, and Jinhong predicting similarity: [53] node Transitive Tiakas. Eleftherios into and Taking Symeonidis ranking: Panagiotis Exponential [52] Dooren. Van Paul and Nesterov, Yurii Traag, Vincent [51] of networks spatial in measures Centrality Porta. Sergio and Latora, Vito Crucitti, Paolo [47] gene-disease Identifying Radev. R Dragomir and Erkan, Güneş Vu, Thuy Özgür, Arzucan firm and resources network [46] of influence The learning: and location Network Gulati. Ranjay [45] abig,scn dto,2013. edition, second Cambridge, EEAMItrainlCneec on Conference International IEEE/ACM In measure. similarity 1953. 43, networks. media. social in technology and science information for 2007. society American the of Journal In applications. global cities’ and structure, community centrality, roles. Anomalous network: transportation air aaMnn,ID 06 eebr1-5 06 acln,Spain Barcelona, 2016, 12-15, December 2016, ICDM Mining, Data on Conference International 1994. press, university Cambridge 8. volume ewrsuigsge admwl ihrsat In restart. with walk random signed using networks networks. social signed in links recommending links. negative account streets. urban network. gene-interaction mined literature a on centrality using associations formation. alliance on capabilities 41)i7–25 2008. 24(13):i277–i285, rceig fteNtoa cdm fSciences of Academy National the of Proceedings h ora fmteaia sociology mathematical of Journal The hsclRve E Review Physical C optn uvy (CSUR) Surveys Computing ACM nelgn optrCmuiainadPoesn IC) 00IEEE 2010 (ICCP), Processing and Communication Computer Intelligent dacsi oilNtok nlssadMnn AOA) 2013 (ASONAM), Mining and Analysis Networks Social in Advances oilInformatics Social ae 38.IE,2010. IEEE, 73–80. pages , 33:315 2006. 73(3):036125, , taei aaeetjournal management Strategic ae 4–4.IE,2013. IEEE, 442–449. pages , 182 oilntokaayi:Mtosadapplications and Methods analysis: network Social ae 9–0,2010. 192–202, pages , arxanalysis Matrix ol ieWeb Wide World ()4–0 1971. 1(1):49–80, , 93:2 2016. 49(3):42, , EE1t nentoa ofrneon Conference International 16th IEEE 0(2:7479,2005. 102(22):7794–7799, , abig nvriyPress, University Cambridge . 74:4–7,2014. 17(4):743–776, , 05:9–2,1999. 20(5):397–420, , Psychometrika ae 7–7,2016. 973–978, pages , 58(7):1019–1031, , Bioinformatics 18(1):39– , , ,

182 Xa ag egCi igWn,Ja e,WnuZu n hqagYn.Community Yang. Shiqiang and Zhu, Wenwu Pei, Jian Wang, Jing Cui, Peng Wang, Xiao networks feedforward Multilayer [74] White. Halbert and Stinchcombe, Maxwell Hornik, Kurt [73] Gog yek.Apoiainb uepstoso imia function. sigmoidal a of superpositions by Approximation Cybenko. George [72] Ripley. D Brian learning Gradient-based Haffner. [71] Patrick and Bengio, Yoshua Bottou, Léon LeCun, Yann [70] Yn eu,Ysu ego n effe itn eplearning. Deep Hinton. Geoffrey and Bengio, Yoshua with Lecun, Yann data of dimensionality the [69] Reducing Salakhutdinov. R Ruslan and Hinton E distrust Geoffrey of value the [68] trust?: of negation the distrust Is Liu. Huan and Hu, Xia Tang, Jiliang web rank [67] to How algorithm: pagetrust The Dooren. Van Paul and Kerchove de Cristobald [66] networks. social signed in nodes Ranking Jalili. Mahdi and Shahriari Moshen [65] strength link predict to information transactional Using Neville. Jennifer and Kahanda Indika in [64] strength relationship Modeling Rogati. Monica and Neville, Jennifer Xiang, Rongjing [63] In media. social with strength tie Predicting Karahalios. Karrie and Gilbert Eric [62] Exploiting Dhillon. S Inderjit and Tewari, Ambuj survey. Natarajan, A Nagarajan Chiang, Kai-Yang networks: complex in [61] prediction Link Zhou. Tao and Lü Linyuan [60] rsrigntokebdig In embedding. network preserving approximators. universal are fcnrl inl n systems and signals control, of recognition. document to applied 4,2015. 444, erlnetworks. neural 2014. ACM, 148–157. pages In media. social in In allowed? are links negative when pages Mining and Analysis In Media networks. social online in web In networks. social online In management knowledge networks. and 2011. signed ACM, Information in on conference prediction International link for cycles longer ofrneo aaMining Data on Conference systems computing in factors human 2009. on conference SIGCHI the of Applications its and Mechanics Statistical ae 8–9.AM 2010. ACM, 981–990. pages , 2009. , atr eonto n erlnetworks neural and recognition Pattern science rceig fte2t C ofrneo yetx n oilmedia social and Hypertext on conference ACM 25th the of Proceedings ()12 2014. 4(1):172, , 1(76:0–0,2006. 313(5786):504–507, , rceig fte1t nentoa ofrneo ol wide World on conference International 19th the of Proceedings ae 4–5.SA,2008. SIAM, 346–352. pages , erlnetworks Neural hr nentoa AICneec nWbosadSocial and Weblogs on Conference AAAI International Third ()3334 1989. 2(4):303–314, , rceig fteIEEE the of Proceedings AAAI 183 ae 2329 2017. 7203–209, pages , 9()15–10 2011. 390(6):1150–1170, , ()3936 1989. 2(5):359–366, , rceig fte20 IMInternational SIAM 2008 the of Proceedings abig nvriypes 2007. press, university Cambridge . 61)27–34 1998. 86(11):2278–2324, , rceig fte2t ACM 20th the of Proceedings ae 1–2.ACM, 211–220. pages , Nature ae 1157–1162. pages , 521(7553):436– , oilNetwork Social Mathematics Proceedings hsc A: Physica ,

183 Mhma ahnlIlm dtaPaah n ae aarsnn int scalable Signet: Ramakrishnan. Naren and Prakash, Aditya B Islam, Raihanul Mohammad network Signed [88] Liu. Huan and Chang, Yi Aggarwal, Charu Tang, Jiliang Wang, Suhang deep of boundary decision [87] the Characterizing Tang. dark Jiliang the and Towards Derr, Tyler want: Karimi, i Hamid what Say Tang. [86] Jiliang adversarial and Deep Liu, Zitao Derr, Tang. Tyler Jiliang Liu, Haochen and Xu, Jiejun [85] Liu, Xiaorui Karimi, Hamid Derr, Tyler adversarial Deep [84] Li. Qing and Tang, Jiliang Wang, Jianping Ma, Yao Derr, Tyler Fan, Wenqi embed- document Linked [83] Liu. Huan and Aggarwal, Charu Tang, Jiliang Wang, Suhang [82] auto-encoders. graph Variational Welling. Max and deep Kipf Learning N Thomas Battaglia. Peter and [81] Pascanu, Razvan Dyer, Chris Vinyals, Graphrnn: Oriol Leskovec. Li, Jure Yujia and Hamilton, [80] L William Ren, Xiang Ying, Rex You, Jiaxuan modeling generative Iterative [79] Graphite: Ermon. Stefano and Zweig, Aaron Grover, Aditya social of learning [78] Online Deepwalk: Skiena. Steven and Al-Rfou, Rami Perozzi, Bryan S Thomas and [77] Aggarwal, C Charu Qi, Guo-Jun Tang, Jiliang Han, Wei Chang, Shiyu [76] large on learning representation Inductive Leskovec. Jure and Ying, Zhitao Hamilton, Will [75] aaMining Data In networks. signed for embeddings Mining Data In media. social in embedding networks. neural models. dialogue neural of side alignment. network recommendation. social Management Knowledge and In Information classification. for ding Learning Deep Bayesian graphs. of models generative In models. auto-regressive deep with graphs realistic Generating In graphs. of Mining Data and Discovery Knowledge In representations. Mining Data and Discovery 2015. Knowledge ACM, 119–128. on In pages Conference architectures. International deep SIGKDD ACM via 21th embedding network Heterogeneous Huang. 2017. In graphs. dacsi erlIfrainPoesn ytm (NIPS) Systems Processing Information Neural in Advances ae 5–6.Srne,2018. Springer, 157–169. pages , 2017. SIAM, 327–335. pages , nentoa ofrneo ahn Learning Machine on Conference International ri rpitarXiv:1912.11460 preprint arXiv ri rpitarXiv:1902.10307 preprint arXiv rceig fte2t C IKDItrainlCneec on Conference International SIGKDD ACM 20th the of Proceedings ri rpitarXiv:1905.13160 preprint arXiv 2016. , rceig fte2t C nentoa nCneec on Conference on International ACM 25th the of Proceedings ri rpitarXiv:1803.03324 preprint arXiv rceig fte21 IMItrainlCneec on Conference International SIAM 2017 the of Proceedings ri rpitarXiv:1909.06044 preprint arXiv aicAi ofrneo nweg icvr and Discovery Knowledge on Conference Pacific-Asia ae 0–1.AM 2014. ACM, 701–710. pages , 184 ae 1–2.AM 2016. ACM, 115–124. pages , 2019. , 2019. , 2019. , ae 4424,2019. 2434–2444, pages , 2018. , ICML 2019. , nNP okhpon Workshop NIPS In 2018. , ae 1025–1035, pages , rceig fthe of Proceedings ,

184 Jsp fie,TmtyL od eata oeo n enfrNvle atgeneration Fast Neville. Jennifer and Moreno, Sebastian Fond, La Timothy Pfeiffer, J Joseph [102] Mr JNwa.Asraiemxn nnetworks. in mixing Assortative Newman. EJ Mark [101] Incorporating Neville. Jennifer and III, Pfeiffer, J. Joseph Moore, Zoubin John Mussmann, and Stephen Faloutsos, [100] Christos Kleinberg, Jon Chakrabarti, Deepayan Leskovec, Jure [99] densification time: over Graphs Faloutsos. Christos and Kleinberg, Jon expected given Leskovec, with Jure graphs random in [98] distances average The Lu. Linyuan and Chung net- Fan signed in ranking [97] Personalized Kang. U and Sael, Lee Jin, Woojeong Jung, Jinhong networks. growing in [96] attachment preferential and Clustering optimization. Newman. stochastic EJ for Mark method A Adam: [95] Ba. Jimmy and improve Kingma nonlinearities P Rectifier Diederik Ng. Y. Andrew [94] and Hannun, Y. Awni Maas, L. Andrew citation pagerank The [93] Winograd. Terry and Motwani, Rajeev Brin, Sergey Page, Lawrence In [92] ties. weak and Strong Kleinberg. Jon and Easley David [91] measures. of family A centrality: and Power in Bonacich. Phillip learning Representation Side: [90] Kang. U and Park Haekyu Kim, Junghwan Lee Ji-Eun [89] iy ikadTut(AST,21 nentoa ofrneo n 02International 2012 and on In Conference (SocialCom) Computing International closures. Social 2012 on transitive (PASSAT), Confernece Trust incorporating and while Risk networks rity, social scale large of 2002. sottvt n eredpnec nosaal ewr oes In 2015. Press, Intelligence models. Artificial network on scalable Conference AAAI into Twenty-Ninth dependence degree and assortativity networks. modeling to approach Research Learning An graphs: Kronecker Ghahramani. mining data 2005. in ACM, discovery Knowledge In on conference explanations. International possible SIGKDD and diameters shrinking laws, degrees. In restart. on with Conference walk International random signed using works E review arXiv:1412.6980 preprint In models. acoustic network neural 1999. InfoLab, Stanford report, Technical web. the to order Bringing ranking: World Connected Highly a about Reasoning Conference) Web (The Web In Wide networks. directed signed 25:1018,1987. 92(5):1170–1182, 42:212 2001. 64(2):025102, , rceig fteNtoa cdm fSciences of Academy National the of Proceedings 1Fb:8–02 2010. 11(Feb):985–1042, , 2014. , ae 7–7.IE,2016. IEEE, 973–978. pages , rceig fte2t nentoa ofrneo World on Conference International 27th the of Proceedings 2018. , rc ICML Proc. 185 ae 78,2010. 47–84, pages , ae 5–6.IE,2012. IEEE, 154–165. pages , 2013. , aaMnn ID) 06IE 16th IEEE 2016 (ICDM), Mining Data hsclrve letters review Physical AI1,pgs2826 AAAI 238–246. pages AAAI’15, , rceig fteeeet ACM eleventh the of Proceedings ewrs rws n Markets: and Crowds, Networks, 92)189182 2002. 99(25):15879–15882, , mrcnjunlo sociology of journal American ora fMachine of Journal rceig fthe of Proceedings ae 177–187. pages , 89(20):208701, , rvc,Secu- Privacy, Physical arXiv ,

185 TlrDr n iin ag ogesoa oeaayi sn indntok.In networks. signed using analysis vote Congressional Tang. Jiliang and Derr Tyler [116] networks. social of model evolutionary An Abell. Peter and Ludwig Mark [115] based networks acquaintance Modeling Škrekovski. Risth and Šilc, large Jurij in Vukašinović, Vida triangles all [114] listing and counting Finding, Wagner. Dorothea and Schank Thomas [113] stochastic between similarity The Kolda. G Tamara and Seshadhri, Comandur Pinar, Ali [112] and dynamics diffusion Influence Zhang. Zhi-Li and Wang, Yajun Chen, Wei Li, In Yanhua networks. ego [111] in circles social discover to Learning Social Mcauley. J Safari. Julian and M Leskovec and Jure Rabiee, [110] H Khalilabadi, Jalali P Fazli, M Malekzadeh, Mohammad [109] dynamic in epidemics Susceptible–infected–recovered Meyers. cell’s Ancel Lauren the and Volz understanding Erik biology: [108] Network Oltvai. N Zoltan and Barabasi Albert-Laszlo [107] Community Mahoney. W Michael and Dasgupta, Anirban Lang, clustering. J Kevin tunable Leskovec, with Jure networks scale-free [106] Growing Kim. Jun Beom and Holme Petter scale-free [105] and structure Community Pinar. Ali and Kolda, ‘small-world’networks. G Tamara of Seshadhri, dynamics Comandur Collective [104] Strogatz. H Steven and Watts J Duncan [103] EEItrainlCneec nDt iigWrsos(ICDMW) Workshops Mining 2018. Data IEEE, on Conference International IEEE Matter B–Condensed Journal theory. balance on In study. experimental an graphs, In Mining Data models. on Conference graph chung-lu and kronecker Mining Data and search Web 2013. on ACM, conference In International relationships. ACM foe sixth and the friend of with networks social in maximization influence systems processing information neural in Advances 2011. games. formation network signed and balance 2007. 2934, networks. contact well-defined organization. large functional of absence the and sizes cluster Natural clusters. networks: large in structure E review Physical graphs. erdős-rényi of collections nature 43:8–9,2014. 24(3):683–696, 9(64:4,1998. 393(6684):440, , nentMathematics Internet 52:217 2002. 65(2):026107, , rceig fteRylSceyB ilgclSciences Biological B: Society Royal the of Proceedings nentoa ora fApidMteaisadCmue Science Computer and Mathematics Applied of Journal International auervesgenetics reviews Nature ae 0118.SA,2012. SIAM, 1071–1082. pages , 81,2007. 58(1), , ()2–2,2009. 6(1):29–123, , WEA hsclRve E Review Physical pigr 2005. Springer, . 186 rceig fte21 IMInternational SIAM 2012 the of Proceedings ()11 2004. 5(2):101, , ae 3–4,2012. 539–547, pages , 55:519 2012. 85(5):056109, , ae 1501–1502. pages , uoenPhysical European 274(1628):2925– , ae 657–666. pages , Proceedings 2018 ,

186 Aiy rsn eo n hre la.Ln rdcinvamti atrzto.In factorization. matrix via prediction Link Elkan. Charles and Menon Krishna Aditya [129] prediction link Supervised Dhillon. S Inderjit and Tang, Wei Savas, Berkant Lu, Zhengdong [128] prediction Link Zaki. Mohammed and Salem, Saeed Chaoji, Vineet Hasan, Al Mohammad [127] Var- Dora and Tserpes, Konstantinos Kardara, Magdalini Papaoikonomou, Athanasios [126] and Characterization Zhang. Yingfeng and Bao, Zhouxiao Jiang, Haomiao Zhang, Tongda in [125] prediction sign for filtering collaborative Cluster-based Jalili. Mahdi and Javari Amin [124] count- Butterfly Tirthapura. Srikanta and Sariyuce, graphs Erdem Ahmet bipartite Seyed-Vahid Sanei-Mehri, modeling [123] and Measuring Pinar. Ali and Kolda, G Tamara Aksoy, G Sinan [122] networks: signed in balance and Communities Magdon-Ismail. Malik and Anchuri Pranay in ranking [121] for model troll-trust The Sun. Jimeng and Aggarwal, C Charu relations. Wu, negative Zhaoming with [120] status Calculating Lloyd. Paulette and Bonacich Phillip [119] In networks. convolutional graph Signed Tang. Jiliang and Ma, Yao Derr, Tyler [118] congressional Multi-factor Tang. Jiliang and Brookhouse, Aaron Karimi, Hamid Derr, Tyler [117] nKoldeDsoey&Dt Mining Data & Discovery Knowledge on ahn erigadKoldeDsoeyi Databases in Discovery Knowledge and Learning Machine on In sources. multiple using In security learning. supervised using discovery. subgraph frequent via networks social in Computing prediction Internet sign Edge varigou. networks. Vol signed in prediction sign edge (TIST) links. Technology negative and and positive with networks social In networks. bipartite in ing structure. community with on Conference International IEEE/ACM In approach. spectral A Mining Data and In networks. signed on Conference International IEEE/ACM In prediction. vote Networks (ICDM) Mining Data on Conference International ae 2–2.IE,2010. IEEE, 923–928. pages , () 2013. 1(1), , 2006. , 64:3–3,2004. 26(4):331–338, , ae 4–5.AM 2016. ACM, 447–456. pages , 2014. , rceig fteNnhAMItrainlCneec nWbSearch Web on Conference International ACM Ninth the of Proceedings dacsi oilNtok nlssadMnn AOA) 2019 (ASONAM), Mining and Analysis Networks Social in Advances ()2,2014. 5(2):24, , dacsi oilNtok nlssadMnn AOA) 2012 (ASONAM), Mining and Analysis Networks Social in Advances aaMnn ID) 00IE 0hItrainlConference International 10th IEEE 2010 (ICDM), Mining Data ora fCmlxNetworks Complex of Journal rceig fte2t C IKDItrainlConference International SIGKDD ACM 24th the of Proceedings D0:wrso nln nlss one-errs and counter-terrorism analysis, link on workshop SDM06: ae 3–4.IE,2012. IEEE, 235–242. pages , 2019. IEEE, . 187 ae 1025.AM 2018. ACM, 2150–2159. pages , ora fIdsra n nelgn Information Intelligent and Industrial of Journal C rnatoso nelgn Systems Intelligent on Transactions ACM ae 2–3.IE,2018. IEEE, 929–934. pages , ()5163 2017. 5(4):581–603, , ae 3–5.Srne,2011. Springer, 437–452. pages , 08IEEE 2018 Social IEEE

187 KiYn hag oc ion hn,adIdri hlo.Saal lseigof clustering Scalable Dhillon. S Inderjit and Whang, Jiyoung Joyce Chiang, Kai-Yang [142] online in subgroups Detecting Radev. Dragomir and Abu-Jbara, Amjad Hassan, Ahmed [141] Jhn e ogCeg h h,adMnhaCe.Peitn oiieadngtv links negative and positive Predicting Chen. Minghua and Zhu, Zhe Cheng, heterogenous Hong Ye, across Jihang ties [140] social Inferring Kleinberg. Jon and Lou, Tiancheng Tang, Jie associations generate [139] to walks random Using Coscia. Michele one-mode and the Yildirim A to Muhammed approach systematic [138] A Kaufmann. Michael and and Zweig projection Anna network Katharina Bipartite [137] Zhang. Yi-Cheng and Medo, Matúš Ren, Jie link Zhou, Projection-based Tao Xu. Yong-cheng [136] and Liu, Wei Li, Yun Li, Bin Chen, Ling Gao, Man [135] survey. A graphs: on walks Random Lovász. László [134] TlrDr,Cexn ag uagWn,adJlagTn.Rlvnemaueet in measurements Relevance Tang. Jiliang and Wang, Suhang Wang, Chenxing Derr, Tyler [133] Hayder and Esfahanian, Abdol-Hossein Masrour, Farzan Barjasteh, Iman Forsati, signed Rana of [132] modeling rank Low Dhillon. S Inderjit and Chiang, Kai-Yang Hsieh, Cho-Jui [131] networks. social signed in Recommendations Liu. Huan and Aggarwal, Charu Tang, Jiliang [130] ofrneo nomto n nweg management knowledge and Information on conference In cut. normalized balance using networks signed and Processing Language Natural 2012. in Linguistics, Methods Learning Language Empirical Natural on Conference Computational Joint In 2012 participants. the among relations of negative and positive modeling by discussions teigCmite 2013. Committee, Steering eec nWrdWd Web Wide World In on ference learning. transfer by networks social signed in Mining In networks. objects. between graphs. bipartite of projection recommendation. personal network. bipartite a in prediction 1993. 2(1):1–46, n erigwt rps(MLG) Graphs with Learning and niesge oilntok.In networks. social signed online distrust and 2015. ACM, trust leveraging 51–58. by In algorithm recommendation efficient relations. An Pushtrust: Radha. Mining Data and discovery In networks. 2016. Committee, Steering Conferences Web Wide World International In rceig fte2t nentoa ofrneo ol ieWeb Wide World on Conference International 25th the of Proceedings ae 4–5.AM 2012. ACM, 743–752. pages , rceig fte1t C IKDItrainlcneec nKnowledge on conference International SIGKDD ACM 18th the of Proceedings rceig ftefit C nentoa ofrneo e erhadData and search Web on conference International ACM fifth the of Proceedings rceig fte9hAMCneec nRcmedrSystems Recommender on Conference ACM 9th the of Proceedings lSone PloS ()e083 2014. 9(8):e104813, , ae 0–1.AM 2012. ACM, 507–515. pages , hsclRve E Review Physical ae 4718.ItrainlWrdWd e Conferences Web Wide World International 1477–1488. pages , oilNtokAayi n Mining and Analysis Network Social rceig fte1t nentoa okhpo Mining on Workshop International 14th the of Proceedings nomto Sciences Information 2018. , 188 ae 97.AscainfrComputational for Association 59–70. pages , 64:415 2007. 76(4):046115, , rceig fte2n nentoa con- International 22nd the of Proceedings rceig fte2s C International ACM 21st the of Proceedings obntrc,Pu ro seighty is erdos Paul Combinatorics, 7:5–7,2017. 376:158–171, , ae 1–2.AM 2012. ACM, 615–624. pages , ()1728 2011. 1(3):187–218, , ae 31–40. pages , Proceedings pages , ,

188 MrkCgn acnPlpzk ihłPlpzk n au nfyWjazzk Sitting Wojtaszczyk. Onufry Jakub and Pilipczuk, Michał Pilipczuk, Marcin Cygan, Marek [154] W Ernesto Lerner, Jürgen Lommatzsch, Andreas Schmidt, Stephan Kunegis, Community Yang. Jérôme Shiqiang [153] and Zhu, Wenwu Pei, Jian Wang, Jing Cui, Peng Wang, Xiao [152] SasegCo e u n inkiX.Gae:Lann rp ersnain with representations graph Learning Grarep: Xu. Qiongkai and Lu, Wei Cao, Shaosheng In [151] networks. for learning feature Scalable node2vec: Leskovec. Jure and Grover Aditya [150] In embedding. network deep Structural Zhu. Wenwu and Cui, Peng Wang, Daixin [149] Tang. Jiliang and Liu, Zitao Wang, Suhang Wang, Yiqi Liu, Haochen Derr, Tyler Jin, Wei [148] TlrDr,YoM,WniFn iou i,CauAgra,adJlagTn.Epidemic Tang. Jiliang and Aggarwal, Charu Liu, Xiaorui Fan, Wenqi Ma, Yao Derr, Tyler and [147] networks Spectral Lecun. Yann and Szlam, Arthur Zaremba, Wojciech Bruna, Joan [146] Timothy Bombarell, Rafael Iparraguirre, Jorge Maclaurin, Dougal Duvenaud, K David [145] net- neural Convolutional Vandergheynst. Pierre and Bresson, Xavier Defferrard, Michaël [144] neural convolutional Learning Kutzkov. Konstantin and Ahmed, Mohamed Niepert, Mathias [143] Mining lsrt red hneeis revisited. enemies, than friends to closer predic- clustering, for graphs signed of analysis In Spectral visualization. Albayrak. and tion Sahin and Luca, De In embedding. network preserving 2015. (CIKM) Management Knowledge and Information on lblsrcua nomto.In information. structural global Discovery Knowledge on conference Mining International Data SIGKDD and ACM 22nd the of Proceedings Data and Discovery Knowledge on conference International Mining SIGKDD ACM 22nd the of ings direction. new and insights Deep graphs: arXiv:2006.10141 on learning Self-supervised erhadDt Mining Data and Search rp ovltoa ewr.In network. convolutional graph (ICLR) In Representations Learning graphs. on networks connected locally for graphs on networks Convolutional In (NIPS) Adams. fingerprints. P Ryan molecular and learning Aspuru-Guzik, Alán Hirzel, In filtering. spectral (NIPS) localized Systems fast Processing with graphs on works 2016. 2023, In graphs. for networks ae 2423,2015. 2224–2232, pages , ae 5–7.SA,2010. SIAM, 559–570. pages , ae 2513.AM 2016. ACM, 1225–1234. pages , ae 5–6.AM 2016. ACM, 855–864. pages , 2020. , nentoa ofrneo ahn erig(ICML) Learning Machine on Conference International ae 6–6,2020. 160–168, pages , rceig fte21 IMItrainlCneec nData on Conference International SIAM 2010 the of Proceedings ae 8435,2016. 3844–3852, pages , rceig fte2t C nentoa nConference on International ACM 24th the of Proceedings rceig fte1t nentoa ofrneo Web on Conference International 13th the of Proceedings 2014. , AAAI dacsi erlIfrainPoesn Systems Processing Information Neural in Advances 189 ae 2329 2017. 7203–209, pages , rceig fteItrainlCneec on Conference International the of Proceedings hoyo optn systems computing of Theory ae 9–0.AM 2015. ACM, 891–900. pages , dacsi erlInformation Neural in Advances 56(2):394–405, , ri preprint arXiv ae 2014– pages , Proceed-

189 SuiZag iaYo ii u,adY a.De erigbsdrcmedrsystem: recommender based learning Deep Tay. Yi and Sun, Aixin Yao, Lina Zhang, Shuai Yu. [167] S Philip and Zhang, Chengqi Long, Guodong Chen, Fengwen bipartite Pan, signed Shirui Wu, in Zonghan Balance [166] Tang. Jiliang and Chang, Yi Johnson, Cassidy Derr, Tyler [165] networks signed in ranking Personalized Kang. U and Sael, Lee Jin, Woojeong Jung, Jinhong [164] In embedding. network signed Sne: Xiang. Yang and Wu, Xintao Yuan, Shuhan [163] signed Shine: Liu. Qi and Guo, Minyi Xie, Xing Hou, Min Zhang, Fuzheng Wang, Hongwei [162] transitivity Asymmetric Zhu. Wenwu and Zhang, Ziwei Pei, graphs: Jian Cui, on Peng learning Ou, Mingdong Representation [161] Leskovec. Jure and Ying, Rex Hamilton, L William [160] item- Deep Hong. Richang and Liu, Kai Xu, Jiandong Wang, Xiang He, Xiangnan Xue, Feng network [159] signed Attributed Liu. Huan and Tang, Jiliang Aggarwal, Charu Wang, Suhang [158] network directed signed Enhanced Bridge: Sun. Ke and Liu, Huan Qian, Tieyun Chen, Yiqi [157] in learning Representation Side: Kang. U and Lee, Ji-Eun Park, Haekyu embedding. Kim, network Junghwan on survey [156] A Zhu. Wenwu and Pei, Jian Wang, Xiao Cui, Peng [155] ofrneo nweg icvr n aaMining Data and Discovery Knowledge on conference uvyadnwperspectives. new and survey A networks. neural graph on survey comprehensive A Management Knowledge In networks. (ICDM) In Mining restart. with walk random signed using Mining Data and Discovery knowledge on conference Mining Data and 2018. Search ACM, Web 600. on Conference International ACM Eleventh the In of prediction. link sentiment for embedding network information heterogeneous In embedding. graph preserving applications. and Methods (TOIS) recommendation. Systems top-n for filtering collaborative based Management In embedding. Management Knowledge In embedding. In networks. directed signed Engineering Data and Knowledge on Transactions 2018. Web Wide ae 0–1.ItrainlWrdWd e ofrne teigCommittee, Steering Conferences Web Wide World International 509–518. pages , ae 3–4.AM 2017. ACM, 137–146. pages , rceig fte2t C nentoa ofrneo nomto and Information on Conference International ACM 28th the of Proceedings rceig fte21 C nCneec nIfrainadKnowledge and Information on Conference on ACM 2017 the of Proceedings 73:3 2019. 37(3):33, , rceig fte2t C nentoa ofrneo nomto and Information on Conference International ACM 27th the of Proceedings ae 7–7.IE,2016. IEEE, 973–978. pages , ae 2113.AM 2019. ACM, 1221–1230. pages , 2018. ACM, 773–782. pages , ri rpitarXiv:1709.05584 preprint arXiv rceig fte21 ol ieWbCneec nWorld on Conference Web Wide World 2018 the of Proceedings C optn uvy (CSUR) Surveys Computing ACM rceig fte2n C IKDInternational SIGKDD ACM 22nd the of Proceedings 190 06IE 6hItrainlCneec nData on Conference International 16th IEEE 2016 15:3–5,2018. 31(5):833–852, , ri rpitarXiv:1901.00596 preprint arXiv ae 8–9.Srne,2017. Springer, 183–195. pages , ae 1511.AM 2016. ACM, 1105–1114. pages , C rnatoso Information on Transactions ACM 2017. , 21:,2019. 52(1):5, , Proceedings ae 592– pages , Pacific-Asia 2019. , IEEE

190 Pngoi yendsadNklo ats pcrlcutrn o ikpeito nsocial in prediction link for clustering Spectral Mantas. Nikolaos and recommender Symeonidis Panagiotis in users [180] of roles dual Toward Liu. Huan and Tang, Jiliang Wang, Suhang [179] rating helpfulness review Context-aware Liu. Huan and Hu, Xia Gao, Huiji Tang, Jiliang [178] per- recommendation: Review Ester. Martin and Jamali, Mohsen Moghaddam, Samaneh [177] factorization tensor extended Etf: Ester. Martin and Jamali, Mohsen Moghaddam, Samaneh [176] Matrix Sarwat. Mohamed social and signed Shamsfard, on Mehrnoush Mahdavi, model Mehrdad Voter Forsati, Rana Zhang. [175] Zhi-Li and Wang, Yajun in Chen, model Wei spreading opinion Li, An Yanhua Pan. [174] Yiguang and Wang, Hui Li, Pei Fan, review. Pengyi a Li, Wei recommendation: [173] Social Liu. Huan and Hu, Xia Tang, Jiliang [172] through influence of spread the Maximizing Tardos. Éva and Kleinberg, Jon Kempe, David [171] networks. signed in Balance Newman. MEJ and Cantwell, T George Kirkley, Alec [170] on comments filtering reader: the Follow Resnick. Paul and Johnston, Erik Lampe, AC Cliff [169] In decisions. promotion wikipedia modeling up: Mopping Kraut. Robert and Burke Moira [168] ewrswt oiieadngtv links. negative and positive with networks Management Knowledge In systems. 2013. ACM, In prediction. In management knowledge reviews. and 2011. ACM, online Information of on quality conference International the of prediction sonalized mining data and In search Web helpfulness. on conference review International of prediction personalizing for model recommen- social improved for information side dation. distrust and trust explicit with factorization networks. networks. signed Mining and Analysis Mining Data and discovery Knowledge In network. social a E Review 2007. 1253–1262, pages In slashdot. work cooperative supported Computer on 2008. conference 27–36, ACM 2008 the of Proceedings 47 2013. 1447, C rnatoso nomto ytm (TOIS) Systems Information on Transactions ACM 91:130 2019. 99(1):012320, , nentMathematics Internet rceig fteSGH ofrneo ua atr ncmuigsystems computing in factors Human on conference SIGCHI the of Proceedings rceig fte2t C nentoa nCneec nIfrainand Information on Conference on International ACM 24th the of Proceedings rceig fte7hAMcneec nRcmedrsystems Recommender on conference ACM 7th the of Proceedings oenPyisLtesB Letters Physics Modern ()11–13 2013. 3(4):1113–1133, , rceig ftennhAMSGD nentoa ofrneon conference International SIGKDD ACM ninth the of Proceedings ae 6116.AM 2015. ACM, 1651–1660. pages , 2014. , ae 3–4.AM 2003. ACM, 137–146. pages , 191 oilNtokAayi n Mining and Analysis Network Social 71) 2013. 27(12), , ae 6–7.AM 2012. ACM, 163–172. pages , 24:7 2014. 32(4):17, , rceig fte2t ACM 20th the of Proceedings rceig ftefit ACM fifth the of Proceedings ae 2249–2252. pages , oilNetwork Social 3(4):1433– , ae 1–8. pages , Physical pages , ,

191 NlnMCry et ol,adHwr Rosenthal. Howard and Poole, T Keith McCarty, Nolan [194] roll-call predicting for model embedding An Rush. M Alexander and Jain, Hirsh Kraft, Peter [193] Iden- simulation: bayesian via data call roll of analysis Multidimensional Jackman. Simon [192] kernels of Application Matsumoto. Yuji and Kudo, Taku techniques. Shimbo, Masashi filtering Ito, collaborative Takahiko of survey [191] A Khoshgoftaar. M Taghi and Su Xiaoyuan [190] Piak gaa,VksKGr,adRmsr aaaa.Ln ae rdcini signed in prediction label Link Narayanam. Ramasuri and Garg, K Vikas Agrawal, Priyanka [189] Character- Tang. Jiliang and Frank, A Kenneth Derr, Tyler Torphy, T Kaitlin Karimi, Hamid [188] Towards Tang. Jiliang and Frank, A Kenneth Torphy, T Kaitlin Derr, Tyler Karimi, Hamid [187] congress, us the weight in predicting and Understanding polarization Tang. Jiliang strong and and Yin, Dawei Derr, weak Tyler Wang, Zhiwei times? [186] the of sign A I. Neal. glasses: P spin Zachary in [185] effect frustration the of Theory Toulouse. G [184] Jffe abce,HrmWL,adPiip osgo.Rlvneo community of Relevance Rossignol. A Philippe and Li, W Hiram Dambacher, M Jeffrey [183] Trinajstic. Ambuj Nenad and [182] Dhillon, S Inderjit Natarajan, Nagarajan Hsieh, Cho-Jui Chiang, Kai-Yang [181] dooyadueulriches unequal and ideology Processing In votes. checking. model and 2001. inference, estimation, tification, mining data in discovery Knowledge In analysis. link to intelligence artificial in Advances rica Intelligence Artificial oilntok.In networks. social In Scale pinterest. on Learning@ study on Conference case ACM A Seventh media: the social of online in connections teacher izing on study case A 2020. media: Springer, social online on In pinterest. teachers of representativeness sample improving Management Knowledge and In Information data. networking social mobile with loss 1973–2016. Applications Its and Method Replica the to Introduction An Beyond: 2002. tutr nassigidtriayo clgclpredictions. ecological of indeterminacy assessing in structure perspective. global to local Research a Learning Machine networks: of signed in clustering and Prediction Tewari. rceig fte21 ofrneo miia ehd nNtrlLanguage Natural in Methods Empirical on Conference 2016 the of Proceedings ae 0627,2016. 2066–2070, pages , nentoa ofrneo rica nelgnei Education in Intelligence Artificial on Conference International oilNetworks Social hmclgahtheory graph Chemical rceig fteeeet C IKDItrainlcneec on conference International SIGKDD ACM eleventh the of Proceedings ae 5129.AA rs,2013. Press, AAAI 2591–2597. pages , rceig fteTet-hr nentoa on ofrneon conference joint International Twenty-Third the of Proceedings 2016. . 2018. , 51:1711,2014. 15(1):1177–1213, , 094 2009. 2009:4, , ae 8–9.AM 2005. ACM, 586–592. pages , 192 oteg,2018. Routledge, . ae 2917.AM 2017. ACM, 1269–1278. pages , rceig fte21 C nCneec on Conference on ACM 2017 the of Proceedings ae 4–5,2020. 249–252, pages , oiia Analysis Political oaie mrc:Tedneof dance The America: Polarized Ecology pnGasTer and Theory Glass Spin :9 1987. 9:99, , 83(5):1372–1385, , ae 130–134. pages , 9(3):227–241, , Proceedings Journal

192 TlrDr,YoM,adJlagTn.Sge rp ovltoa ewrs In networks. convolutional graph Signed Tang. Jiliang and Ma, Yao Derr, Tyler [206] Jre cmdue.De erigi erlntok:A overview. An networks: neural in learning Deep Schmidhuber. Jürgen [208] forests. Random Breiman. Leo [207] interac- and link Joint opinions: power Opinions Tang. Jiliang and Wang, Zhiwei Derr, Tyler [205] structural on based modeling network Signed Tang. Jiliang and Aggarwal, Charu and Derr, Tyler Gunning, [204] E Christian Martino, Mauro Hamilton, J Marcus Lee, David Andris, Clio [203] compromised End-to-end Tang. practical Jiliang with and Ye, Liyang doc2vec VanDam, of Courtland Karimi, evaluation Hamid empirical [202] An Baldwin. Timothy and Lau Han In Jey documents. [201] and sentences of representations Distributed Mikolov. Tomas and di- Le the Quoc and [200] speechmaking, Voting, Ratkovic. Marc and Londregan, John Kim, Song In In text. [199] from calls roll legislative Predicting Blei. M David and Gerrish Sean Alessandro [198] and Riotta, Gianni Puliga, Michelangelo Pompa, Gabriele Maso, Dal Carlo network [197] A Warmbrand. M Casey and Newman, EJ Mark Mucha, J call Peter roll Porter, of A analysis Mason statistical [196] The Rivers. Douglas and Jackman, Simon Clinton, Joshua [195] nentoa ofrneo aaMnn (ICDM) Mining Data on Conference International (ASONAM) Mining and Analysis Networks 2018. Social in Advances on inplrt rdcin nsge ewrs In networks. signed in predictions polarity tion Management Knowledge and In theory. balance of house us the in super-cooperators and partisanship of rise representatives. The Selden. Armistead John Mining and In detection. account generation. embedding document into insights Learning Machine on Conference International In senate. us the Association in conflict of mensions Learning Machine on Conference network complex a through strength government and analysis. coalitions behavior, Voting Chessa. representatives. of house us Sciences the of Academy in committees of analysis data. 18–1,2015. 61:85–117, mrcnPltclSineReview Science Political American lSone PloS ae 1–2.IE,2018. IEEE, 314–321. pages , 2014. , lSone PloS (2:164,2014. 9(12):e116046, , rceig fte2t C nentoa ofrneo Information on Conference International ACM 27th the of Proceedings 0(0:0776,2005. 102(20):7057–7062, , nentoa ofrneo dacsi oilNtok Analysis Networks Social in Advances on Conference International 04:0257 2015. 10(4):e0123507, , ae 5–6.AM 2018. ACM, 557–566. pages , ahn learning Machine ae 8–9,2011. 489–496, pages , 193 82:5–7,2004. 98(2):355–370, , nulMeigo h iws oiia Science Political Midwest the of Meeting Annual ri rpitarXiv:1607.05368 preprint arXiv ae 1819,2014. 1188–1196, pages , 08IE/C nentoa Conference International IEEE/ACM 2018 51:–2 2001. 45(1):5–32, , ae 2–3.IE,2018. IEEE, 929–934. pages , rceig fteNational the of Proceedings ae 6–6.IEEE, 363–366. pages , erlnetworks Neural International 08IEEE 2018 2016. , ,

193 ShlAu hhadValnKlu.At-eoiggraphs. Auto-decoding Koltun. Vladlen and Shah Atul Sohil Duvenaud, [213] K David Hamilton, Will Wang, Shenlong Song, Yang Li, Yujia Liao, Renjie [212] BtyvnAe,Jla ic,Rl rse,adAeadrLsr hlegsfrtoxic for Challenges Löser. Alexander and Krestel, Ralf Risch, Julian Aken, van Betty [218] at look first a relationship: online Fragile Moon. Sue and Chun, Hyunwoo defenses Kwak, and Haewoon attacks Adversarial [217] Tang. Jiliang and Wang, Yiqi Xu, Han Li, Yaxin Jin, convo- Wei graph Attacking [216] Tang. Jiliang and Wu, graph Lingfei for Derr, Tyler models Wang, generative Suhang deep Ma, Yao on survey [215] systematic A Zhao. Liang and Guo Xiaojie [214] Net- Günnemann. Stephan and Zügner, Daniel Shchur, Oleksandr Bojchevski, Aleksandar [211] congress. us the in Cosponsorship Young. D Cheryl and Wilson K Rick [210] Olshen. R.A. and Stone, C.J. Friedman, J. Breiman, L. [209] aulUtsn n ihr ee.Ecetgahgnrto ihgahrcretattention recurrent In graph with networks. generation graph Efficient Zemel. Richard and Urtasun, Raquel arXiv:2006.02879 ing omn lsicto:A ndpherranalysis. error in-depth An classification: comment Systems Computing in In twitter. in dynamics unfollow study. empirical and review A graphs: on rewiring. via networks lutional generation. In walks. random via graphs Generating gan: Quarterly 1984. Francis, & Taylor series. statistics-probability Brooks-Cole and Wadsworth The ae 1–1,2018. 610–619, pages , ae 54,1997. 25–43, pages , ri rpitarXiv:2007.06686 preprint arXiv dacsi erlIfrainPoesn Systems Processing Information Neural in Advances 2020. , ae 0110,2011. 1091–1100, pages , ri rpitarXiv:1906.03750 preprint arXiv rceig fteSGH ofrneo ua Factors Human on Conference SIGCHI the of Proceedings 194 ri rpitarXiv:2003.00653 preprint arXiv 2020. , nentoa ofrneo ahn Learn- Machine on Conference International ri rpitarXiv:1809.07572 preprint arXiv lsicto n ersinTrees Regression and Classification 2019. , ae 2546,2019. 4255–4265, pages , eiltv Studies Legislative 2020. , ri preprint arXiv 2018. , .

194