SlideShare a Scribd company logo
1 of 12
Download to read offline
Benchmarking	
  the	
  
Privacy-­‐Preserving	
  
People	
  Search	
  
Shuguang Han, Daqing He and Zhen Yue
SIGIR 2014 Workshop on Privacy-Preserved Information Retrieval
Social	
  Match	
  is	
  
Important	
  in	
  
People	
  Search	
  
2
because a tighter social similarity
make it easier for people to
connect

Then

Need the users’ social networks
to return the potential candidates
who have either direct or indirect
connections with the given
users.
But	
  Privacy	
  is	
  a	
  BIG	
  Concern	
  in	
  People	
  Search	
  
3
—  People	
  search	
  often	
  
performed	
  in	
  many	
  users	
  in	
  
SNS	
  such	
  as	
  Facebook,	
  
LinkedIn	
  
—  Users	
  in	
  SNS	
  often	
  either	
  opt	
  
out	
  from	
  certain	
  social	
  
networks	
  or	
  provide	
  
incomplete	
  or	
  even	
  fake	
  
information.	
  	
  
—  data	
  mining	
  algorithms	
  may	
  
not	
  work	
  or	
  even	
  harm	
  the	
  
user	
  experience	
  when	
  
equipped	
  with	
  such	
  
incomplete	
  and	
  noisy	
  social	
  
information	
  
People	
  Search	
  Studies	
  o:en	
  Adopt	
  Public	
  Available	
  
Network	
  	
  
4
Coauthor	
  networks	
  are	
  
often	
  used	
  because	
  of	
  
lacking	
  privacy	
  concerns	
  	
  
	
  
However	
  this	
  limits	
  
	
  
the	
  type	
  of	
  people	
  search	
  
being	
  studied,	
  
	
  
So	
  should	
  study	
  
	
  
other	
  social	
  networks	
  
which	
  has	
  privacy	
  concerns	
  
	
  
	
  	
  
Our	
  Research	
  
—  Obtaining	
  a	
  privacy-­‐preserving	
  social	
  network	
  	
  
—  By	
  simulating	
  with	
  the	
  public	
  available	
  coauthor	
  networks	
  
—  Assume	
  coauthor	
  networks	
  could	
  be	
  used	
  as	
  surrogates	
  
—  Motivation1:	
  many	
  real-­‐world	
  social	
  networks	
  (including	
  coauthor	
  
networks	
  and	
  many	
  other	
  privacy-­‐concerned	
  networks	
  such	
  as	
  
Facebook	
  social	
  networks)	
  share	
  the	
  same	
  patterns	
  [Ugander,	
  et	
  al	
  
2011,	
  Barabási	
  et	
  al.	
  	
  1999,	
  Watts,	
  et	
  al	
  1998]	
  
—  All	
  small-­‐world	
  networks	
  and	
  their	
  degree	
  distributions	
  are	
  highly	
  skewed.	
  	
  
—  Motivation	
  2:	
  assortative	
  patterns	
  (the	
  preferences	
  of	
  connecting	
  
people	
  who	
  share	
  the	
  similar	
  features)	
  of	
  social	
  networks	
  are	
  all	
  
assortatively	
  mixed	
  [Newman	
  2002]	
  
—  whereas	
  the	
  technological	
  and	
  biological	
  seems	
  to	
  be	
  disassortative.	
  
5
Research	
  Focuses	
  
—  Privacy	
  issues	
  on	
  people	
  search	
  
—  Either	
  global	
  and/or	
  local	
  network	
  features	
  used	
  in	
  people	
  search	
  
—  Global	
  network	
  features:	
  the	
  features	
  that	
  are	
  propagated	
  through	
  the	
  
whole	
  networks	
  	
  
—  measured	
  by	
  the	
  PageRank	
  value	
  running	
  on	
  the	
  whole	
  social	
  networks	
  
—  Local	
  network	
  features:	
  the	
  features	
  that	
  are	
  directly	
  related	
  to	
  the	
  
ego-­‐network	
  of	
  the	
  querying	
  user	
  	
  
—  measured	
  by	
  the	
  proportion	
  of	
  common	
  social	
  connections	
  
—  Query	
  users’	
  privacy	
  concerns	
  and	
  candidates’	
  privacy	
  
concerns	
  
6
Data	
  
—  Academic	
  publication	
  collection	
  
—  containing	
  219,677	
  conference	
  papers	
  from	
  the	
  ACM	
  Digital	
  Library.	
  	
  
—  between	
  1990	
  and	
  2013.	
  	
  
—  Only	
  public	
  available	
  information	
  of	
  a	
  paper:	
  the	
  title,	
  abstract	
  and	
  authors	
  
—  No	
  further	
  author	
  disambiugation	
  besides	
  ACM	
  Digital	
  Library	
  author	
  ID	
  
—  In	
  total,	
  the	
  collection	
  contains	
  253,390	
  unique	
  authors	
  and	
  953,685	
  coauthor	
  
connection	
  instances.	
  
—  Users’	
  people	
  search	
  activities:	
  Han	
  et	
  al.	
  [5]	
  evaluation	
  of	
  a	
  people	
  
search	
  system.	
  	
  
—  four	
  different	
  people	
  search	
  tasks,	
  each	
  aimed	
  to	
  search	
  for	
  5	
  candidates.	
  	
  
—  A	
  baseline	
  plain	
  content-­‐based	
  people	
  search	
  system	
  	
  
—  An	
  experimental	
  system	
  that	
  enhances	
  people	
  search	
  with	
  three	
  interactive	
  facets:	
  
content	
  relevance,	
  social	
  similarity	
  between	
  the	
  user	
  and	
  a	
  candidate	
  (the	
  local	
  
network	
  feature)	
  and	
  the	
  authority	
  of	
  a	
  candidate	
  (the	
  global	
  network	
  feature).	
  	
  
—  The	
  experiment	
  system	
  allowed	
  the	
  querying	
  users	
  to	
  tune	
  the	
  value	
  associated	
  with	
  each	
  facet	
  
in	
  order	
  to	
  generate	
  a	
  better	
  candidate	
  search	
  results.	
  	
  
—  24	
  participants	
  were	
  recruited	
  for	
  that	
  user	
  study.	
  	
  
—  At	
  the	
  beginning	
  of	
  the	
  user	
  study,	
  each	
  participant	
  was	
  asked	
  to	
  provide	
  their	
  publications	
  and	
  
their	
  close	
  social	
  connections	
  (such	
  as	
  advisors).	
  	
  
—  In	
  the	
  post-­‐task	
  questionnaire,	
  the	
  participants	
  were	
  asked	
  to	
  rate	
  the	
  relevance	
  of	
  each	
  marked	
  
candidate	
  in	
  a	
  Five-­‐point	
  Likert	
  scale	
  (1	
  as	
  non-­‐relevant	
  and	
  5	
  as	
  the	
  highly	
  relevant).	
  
7
SimulaDng	
  Privacy-­‐Concern	
  networks	
  
8
pi is the probability of a
given user has privacy
concern, di is the degree of
association of a user and
dmax. Is the maximized
degree in the network, λ
helps to establish different
selection strategies 
Evaluation: 
•  How the new network impact people search performance: MAP
Impacts	
  of	
  Global	
  Network	
  Feature	
  of	
  Privacy-­‐
Concern	
  Network	
  on	
  People	
  Search	
  	
  
9
Impacts	
  of	
  Local	
  Network	
  Feature	
  of	
  
Privacy-­‐Concern	
  Network	
  on	
  People	
  Search	
  	
  
10
Impacts	
  of	
  Query	
  Users’	
  Privacy	
  Concerns	
  
on	
  People	
  Search	
  
11
Insights	
  
—  Both	
  the	
  local	
  and	
  global	
  network	
  features	
  are	
  important	
  for	
  the	
  
performance	
  of	
  people	
  search	
  (compare	
  to	
  not	
  using	
  social	
  
network).	
  	
  
—  Comparing	
  to	
  the	
  global	
  network	
  feature,	
  the	
  local	
  network	
  feature	
  is	
  more	
  
important.	
  	
  
—  Privacy-­‐concerns	
  reflected	
  in	
  local	
  and	
  global	
  network	
  features	
  can	
  
significantly	
  influences	
  on	
  the	
  performance	
  of	
  people	
  search	
  
—  The	
  privacy	
  concerns	
  from	
  the	
  high-­‐degree	
  candidates	
  in	
  the	
  network	
  will	
  have	
  
more	
  impacts	
  on	
  global	
  features.	
  	
  
—  The	
  local	
  network	
  feature	
  is	
  related	
  to	
  both	
  the	
  querying	
  users	
  and	
  the	
  candidates	
  
in	
  the	
  networks.	
  	
  
—  the	
  privacy	
  concerns	
  from	
  both	
  of	
  them	
  have	
  significant	
  impact	
  on	
  the	
  people	
  search	
  
performance.	
  	
  
—  The	
  privacy	
  concerns	
  from	
  high-­‐degree	
  candidates	
  have	
  bigger	
  influences	
  on	
  the	
  people	
  
search	
  than	
  that	
  of	
  the	
  lower-­‐degree	
  candidates,	
  especially	
  when	
  those	
  high-­‐degree	
  
candidates	
  are	
  related	
  to	
  the	
  querying	
  user.	
  	
  
—  We	
  also	
  find	
  that	
  if	
  the	
  querying	
  users	
  provide	
  more	
  social	
  connections,	
  the	
  search	
  
performance	
  would	
  increase	
  steadily.	
  
12

More Related Content

What's hot

Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisScott Gomer
 
04 Diffusion and Peer Influence
04 Diffusion and Peer Influence04 Diffusion and Peer Influence
04 Diffusion and Peer Influencednac
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
11 Network Experiments and Interventions
11 Network Experiments and Interventions11 Network Experiments and Interventions
11 Network Experiments and Interventionsdnac
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis WorkshopData Works MD
 
Conversation graphs in Online Social Media
Conversation graphs in Online Social MediaConversation graphs in Online Social Media
Conversation graphs in Online Social MediaMarco Brambilla
 
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...ACMBangalore
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)Katy Jordan
 
Published Paper
Published PaperPublished Paper
Published PaperFaeza Noor
 
Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Rute C. Sofia
 
Making the invisible visible through SNA
Making the invisible visible through SNAMaking the invisible visible through SNA
Making the invisible visible through SNAMYRA School of Business
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measuresdnac
 
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...IIIT Hyderabad
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Xiaohan Zeng
 

What's hot (20)

Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
04 Diffusion and Peer Influence
04 Diffusion and Peer Influence04 Diffusion and Peer Influence
04 Diffusion and Peer Influence
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
11 Network Experiments and Interventions
11 Network Experiments and Interventions11 Network Experiments and Interventions
11 Network Experiments and Interventions
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis Workshop
 
Conversation graphs in Online Social Media
Conversation graphs in Online Social MediaConversation graphs in Online Social Media
Conversation graphs in Online Social Media
 
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...
 
topol05
topol05topol05
topol05
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)
 
Published Paper
Published PaperPublished Paper
Published Paper
 
Roles In Networks
Roles In NetworksRoles In Networks
Roles In Networks
 
Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)
 
Making the invisible visible through SNA
Making the invisible visible through SNAMaking the invisible visible through SNA
Making the invisible visible through SNA
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
 
Research Paper On Correlation
Research Paper On CorrelationResearch Paper On Correlation
Research Paper On Correlation
 
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
 

Similar to Benchmarking the Privacy-­Preserving People Search

Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...CloudTechnologies
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environmentpaperpublications3
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Mike Kujawski
 
Information Access on Social Web
Information Access on Social WebInformation Access on Social Web
Information Access on Social WebDaqing He
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual informationeSAT Journals
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual informationeSAT Journals
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
992 sms10 social_media_services
992 sms10 social_media_services992 sms10 social_media_services
992 sms10 social_media_servicessiyaza
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Social Network Analysis based on MOOC's (Massive Open Online Classes)
Social Network Analysis based on MOOC's (Massive Open Online Classes)Social Network Analysis based on MOOC's (Massive Open Online Classes)
Social Network Analysis based on MOOC's (Massive Open Online Classes)ShankarPrasaadRajama
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED
 
Data collection thru social media
Data collection thru social mediaData collection thru social media
Data collection thru social mediai4box Anon
 
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...inventionjournals
 
2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network AnalysisMarc Smith
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfAmber Ford
 

Similar to Benchmarking the Privacy-­Preserving People Search (20)

nm
nmnm
nm
 
Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
 
Information Access on Social Web
Information Access on Social WebInformation Access on Social Web
Information Access on Social Web
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
992 sms10 social_media_services
992 sms10 social_media_services992 sms10 social_media_services
992 sms10 social_media_services
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Social Network Analysis based on MOOC's (Massive Open Online Classes)
Social Network Analysis based on MOOC's (Massive Open Online Classes)Social Network Analysis based on MOOC's (Massive Open Online Classes)
Social Network Analysis based on MOOC's (Massive Open Online Classes)
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09
 
Data collection thru social media
Data collection thru social mediaData collection thru social media
Data collection thru social media
 
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
 
2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Benchmarking the Privacy-­Preserving People Search

  • 1. Benchmarking  the   Privacy-­‐Preserving   People  Search   Shuguang Han, Daqing He and Zhen Yue SIGIR 2014 Workshop on Privacy-Preserved Information Retrieval
  • 2. Social  Match  is   Important  in   People  Search   2 because a tighter social similarity make it easier for people to connect Then Need the users’ social networks to return the potential candidates who have either direct or indirect connections with the given users.
  • 3. But  Privacy  is  a  BIG  Concern  in  People  Search   3 —  People  search  often   performed  in  many  users  in   SNS  such  as  Facebook,   LinkedIn   —  Users  in  SNS  often  either  opt   out  from  certain  social   networks  or  provide   incomplete  or  even  fake   information.     —  data  mining  algorithms  may   not  work  or  even  harm  the   user  experience  when   equipped  with  such   incomplete  and  noisy  social   information  
  • 4. People  Search  Studies  o:en  Adopt  Public  Available   Network     4 Coauthor  networks  are   often  used  because  of   lacking  privacy  concerns       However  this  limits     the  type  of  people  search   being  studied,     So  should  study     other  social  networks   which  has  privacy  concerns        
  • 5. Our  Research   —  Obtaining  a  privacy-­‐preserving  social  network     —  By  simulating  with  the  public  available  coauthor  networks   —  Assume  coauthor  networks  could  be  used  as  surrogates   —  Motivation1:  many  real-­‐world  social  networks  (including  coauthor   networks  and  many  other  privacy-­‐concerned  networks  such  as   Facebook  social  networks)  share  the  same  patterns  [Ugander,  et  al   2011,  Barabási  et  al.    1999,  Watts,  et  al  1998]   —  All  small-­‐world  networks  and  their  degree  distributions  are  highly  skewed.     —  Motivation  2:  assortative  patterns  (the  preferences  of  connecting   people  who  share  the  similar  features)  of  social  networks  are  all   assortatively  mixed  [Newman  2002]   —  whereas  the  technological  and  biological  seems  to  be  disassortative.   5
  • 6. Research  Focuses   —  Privacy  issues  on  people  search   —  Either  global  and/or  local  network  features  used  in  people  search   —  Global  network  features:  the  features  that  are  propagated  through  the   whole  networks     —  measured  by  the  PageRank  value  running  on  the  whole  social  networks   —  Local  network  features:  the  features  that  are  directly  related  to  the   ego-­‐network  of  the  querying  user     —  measured  by  the  proportion  of  common  social  connections   —  Query  users’  privacy  concerns  and  candidates’  privacy   concerns   6
  • 7. Data   —  Academic  publication  collection   —  containing  219,677  conference  papers  from  the  ACM  Digital  Library.     —  between  1990  and  2013.     —  Only  public  available  information  of  a  paper:  the  title,  abstract  and  authors   —  No  further  author  disambiugation  besides  ACM  Digital  Library  author  ID   —  In  total,  the  collection  contains  253,390  unique  authors  and  953,685  coauthor   connection  instances.   —  Users’  people  search  activities:  Han  et  al.  [5]  evaluation  of  a  people   search  system.     —  four  different  people  search  tasks,  each  aimed  to  search  for  5  candidates.     —  A  baseline  plain  content-­‐based  people  search  system     —  An  experimental  system  that  enhances  people  search  with  three  interactive  facets:   content  relevance,  social  similarity  between  the  user  and  a  candidate  (the  local   network  feature)  and  the  authority  of  a  candidate  (the  global  network  feature).     —  The  experiment  system  allowed  the  querying  users  to  tune  the  value  associated  with  each  facet   in  order  to  generate  a  better  candidate  search  results.     —  24  participants  were  recruited  for  that  user  study.     —  At  the  beginning  of  the  user  study,  each  participant  was  asked  to  provide  their  publications  and   their  close  social  connections  (such  as  advisors).     —  In  the  post-­‐task  questionnaire,  the  participants  were  asked  to  rate  the  relevance  of  each  marked   candidate  in  a  Five-­‐point  Likert  scale  (1  as  non-­‐relevant  and  5  as  the  highly  relevant).   7
  • 8. SimulaDng  Privacy-­‐Concern  networks   8 pi is the probability of a given user has privacy concern, di is the degree of association of a user and dmax. Is the maximized degree in the network, λ helps to establish different selection strategies Evaluation: •  How the new network impact people search performance: MAP
  • 9. Impacts  of  Global  Network  Feature  of  Privacy-­‐ Concern  Network  on  People  Search     9
  • 10. Impacts  of  Local  Network  Feature  of   Privacy-­‐Concern  Network  on  People  Search     10
  • 11. Impacts  of  Query  Users’  Privacy  Concerns   on  People  Search   11
  • 12. Insights   —  Both  the  local  and  global  network  features  are  important  for  the   performance  of  people  search  (compare  to  not  using  social   network).     —  Comparing  to  the  global  network  feature,  the  local  network  feature  is  more   important.     —  Privacy-­‐concerns  reflected  in  local  and  global  network  features  can   significantly  influences  on  the  performance  of  people  search   —  The  privacy  concerns  from  the  high-­‐degree  candidates  in  the  network  will  have   more  impacts  on  global  features.     —  The  local  network  feature  is  related  to  both  the  querying  users  and  the  candidates   in  the  networks.     —  the  privacy  concerns  from  both  of  them  have  significant  impact  on  the  people  search   performance.     —  The  privacy  concerns  from  high-­‐degree  candidates  have  bigger  influences  on  the  people   search  than  that  of  the  lower-­‐degree  candidates,  especially  when  those  high-­‐degree   candidates  are  related  to  the  querying  user.     —  We  also  find  that  if  the  querying  users  provide  more  social  connections,  the  search   performance  would  increase  steadily.   12