skip to main content
10.1145/2339530.2339612acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Low rank modeling of signed networks

Published:12 August 2012Publication History

ABSTRACT

Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight captures the degree of trust while a negative edge weight captures the degree of distrust. Analysis of such signed networks has become an increasingly important research topic. One important analysis task is that of sign inference, i.e., infer unknown (or future) trust or distrust relationships given a partially observed signed network. Most state-of-the-art approaches consider the notion of structural balance in signed networks, building inference algorithms based on information about links, triads, and cycles in the network. In this paper, we first show that the notion of weak structural balance in signed networks naturally leads to a global low-rank model for the network. Under such a model, the sign inference problem can be formulated as a low-rank matrix completion problem. We show that we can perfectly recover missing relationships, under certain conditions, using state-of-the-art matrix completion algorithms. We also propose the use of a low-rank matrix factorization approach with generalized loss functions as a practical method for sign inference - this approach yields high accuracy while being scalable to large signed networks, for instance, we show that this analysis can be performed on a synthetic graph with 1.1 million nodes and 120 million edges in 10 minutes. We further show that the low-rank model can be used for other analysis tasks on signed networks, such as user segmentation through signed graph clustering, with theoretical guarantees. Experiments on synthetic as well as real data show that our low rank model substantially improves accuracy of sign inference as well as clustering. As an example, on the largest real dataset available to us (Epinions data with 130K nodes and 840K edges), our matrix factorization approach yields 94.6% accuracy on the sign inference task as compared to 90.8% accuracy using a state-of-the-art cycle-based method - moreover, our method runs in 40 seconds as compared to 10,000 seconds for the cycle-based method.

Skip Supplemental Material Section

Supplemental Material

311a_m_talk_13.mp4

mp4

164.3 MB

References

  1. J.-F. Cai, E. J. candés, and Z. Shen. A singular value thresholding algorithm for matrix completion. Society for Industrial and Applied Mathematics (SIAM), 20(4):1956--1982, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. J. Candés and T. Tao. The power of convex relaxation: Near-optimal matrix completion. IEEE Trans. Inform. Theory, 56(5):2053--2080, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. J. Candés and B. Recht. Exact matrix completion via convex optimization. Found. of Comput. Math., 9:712--772, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Cartwright and F. Harary. Structure balance: A generalization of Heider's theory. Psychological Review, 63(5):277--293, 1956.Google ScholarGoogle ScholarCross RefCross Ref
  5. K.-Y. Chiang, N. Natarajan, A. Tewari, and I. S. Dhillon. Exploiting longer cycles for link prediction in signed networks. In CIKM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Chung, L. Lu, and V. Vu. Spectra of random graphs with given expected degrees. Internet Mathematics, 1, 2004.Google ScholarGoogle Scholar
  7. J. A. Davis. Clustering and structural balance in graphs. Human Relations, 20(2):181--187, 1967.Google ScholarGoogle ScholarCross RefCross Ref
  8. I. S. Dhillon, Y. Guan, and B. Kulis. Weighted graph cuts without eigenvectors: A multilevel approach. IEEE Trans. on pattern analysis and machine intelligence, 29(11):1944--1957, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. V. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In WWW, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Hanneke and E. P. Xing. Network completion and survey sampling. In AISTATS, 2009.Google ScholarGoogle Scholar
  11. F. Harary. On the notion of balance of a signed graph. Michigan Mathematical Journal, 2(2):143--146, 1953.Google ScholarGoogle ScholarCross RefCross Ref
  12. P. Jain, R. Meka, and I. Dhillon. Guaranteed rank minimization via singular value projection. In NIPS, pages 934--945, 2010.Google ScholarGoogle Scholar
  13. M. Kim and J. Leskovec. The network completion problem: infering missing nodes and edges in networks. In SDM, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  14. Y. Koren, R. M. Bell, and C. Volinsky. Matrix factorization techniques for recommender systems. IEEE Computer, 42:30--37, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Kunegis, A. Lommatzsch, and C. Bauckhage. The slashdot zoo: Mining a social network with negative edges. In WWW, pages 741--750, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Kunegis, S. Schmidt, A. Lommatzsch, J. Lerner, E. W. DeLuca, and S. Albayrak. Spectral analysis of signed graphs for clustering, prediction and visualization. In SDM, pages 559--570, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  17. J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. In WWW, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Y. Ng, M. Jordan, and Y. Weiss. On spectral clustering: Analysis and an algorithm. In NIPS, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. B. Recht, M. Fazel, and P. A. Parrilo. Guaranteed minimum-rank solutions of linear matrix equations via nuclear norm minimization. SIAM Review, 52(3):471--501, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. B. Yang, W. Cheung, and J. Liu. Community mining from signed social networks. IEEE Trans. on knowledge and data engineering, 19(10):1333--1348, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Low rank modeling of signed networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      KDD '12: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
      August 2012
      1616 pages
      ISBN:9781450314626
      DOI:10.1145/2339530

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 August 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,133of8,635submissions,13%

      Upcoming Conference

      KDD '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader