Trust Hole Identification in Signed Networks

In the trust-centric context of signed networks, the social links among users are associated with specific polarities to denote the attitudes trust vs distrust among the users. Different from traditional unsigned social networks, the diffusion of information in signed networks can be affected by the link polarities and users' positions significantly. In this paper, a new concept called "trust hole" is introduced to characterize the advantages of specific users' positions in signed networks. To uncover the trust holes, a novel trust hole detection framework named "Social Community based tRust hOLe expLoration" Scroll is proposed in this paper. Framework Scroll is based on the signed community detection technique. By removing the potential trust hole candidates, Scroll aims at maximizing the community detection cost drop to identify the optimal set of trust holes. Extensive experiments have been done on real-world signed network datasets to show the effectiveness of Scroll.

[1]  Carl T. Bergstrom,et al.  Finding Cultural Holes: How Structure and Culture Diverge in Networks of Scholarly Communication , 2014 .

[2]  V. Traag,et al.  Community detection in networks with positive and negative links. , 2008, Physical review. E, Statistical, nonlinear, and soft matter physics.

[3]  Éva Tardos,et al.  Strategic network formation with structural holes , 2008, EC '08.

[4]  Wei Chen,et al.  Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships , 2011, WSDM.

[5]  Ulrike von Luxburg,et al.  A tutorial on spectral clustering , 2007, Stat. Comput..

[6]  Jure Leskovec,et al.  Predicting positive and negative links in online social networks , 2010, WWW '10.

[7]  Jure Leskovec,et al.  Signed networks in social media , 2010, CHI.

[8]  Charu C. Aggarwal,et al.  A Survey of Signed Network Mining in Social Media , 2015, ACM Comput. Surv..

[9]  Sanjeev Goyal,et al.  Structural holes in social networks , 2007, J. Econ. Theory.

[10]  Rafael Wittek,et al.  Structural Holes , 2014, Encyclopedia of Social Network Analysis and Mining.

[11]  R. Burt Secondhand Brokerage: Evidence On The Importance Of Local Structure For Managers, Bankers, And Analysts , 2007 .

[12]  Mark Newman,et al.  Detecting community structure in networks , 2004 .

[13]  Weifa Liang,et al.  Identifying Top-k Structural Hole Spanners in Large-Scale Social Networks , 2015, CIKM.

[14]  G. Ahuja Collaboration Networks, Structural Holes, and Innovation: A Longitudinal Study , 1998 .

[15]  Jitendra Malik,et al.  Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[16]  Sahin Albayrak,et al.  Spectral Analysis of Signed Graphs for Clustering, Prediction and Visualization , 2010, SDM.

[17]  Patrick Doreian,et al.  Partitioning signed social networks , 2009, Soc. Networks.

[18]  R. Burt Structural Holes and Good Ideas1 , 2004, American Journal of Sociology.

[19]  K. Sycara,et al.  Polarity Related Influence Maximization in Signed Social Networks , 2014, PloS one.

[20]  Philip S. Yu,et al.  A Survey of Heterogeneous Information Network Analysis , 2015, IEEE Transactions on Knowledge and Data Engineering.

[21]  Jie Tang,et al.  Mining structural hole spanners through information diffusion in social networks , 2013, WWW.

[22]  A. van de Rijt,et al.  Dynamics of Networks if Everyone Strives for Structural Holes1 , 2008, American Journal of Sociology.