1 / 48

Network Reconstruction under Compressive Sensing

Network Reconstruction under Compressive Sensing. By: Motahareh Eslami Mehdiabadi eslami@ce.sharif.edu Sharif University of Technology Authors: Payam Siyari , Hamid R. Rabiee Mostafa Salehi , Motahareh EslamiMehdiabadi. Outline. Introduction Related Work Network Reconstruction

chesna
Download Presentation

Network Reconstruction under Compressive Sensing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Reconstruction under Compressive Sensing • By: MotaharehEslamiMehdiabadi • eslami@ce.sharif.edu • Sharif University of Technology • Authors: PayamSiyari, Hamid R. Rabiee • MostafaSalehi, MotaharehEslamiMehdiabadi

  2. Outline • Introduction • Related Work • Network Reconstruction • Compressive Sensing • Problem Formulation • Proposed Framework: CS-NetRec • Experimental Evaluation • Conclusion

  3. Introduction Large Scale Unknown Structure Many Systems Modeled as Networks Partial Observations

  4. Introduction (cont’d) • Network Reconstruction Problem: • Given a network with missing edges • Assumptions: • Certain observable quantities on the network • Can have partial observations • Process-> Node values • Goal: Uncover network structure

  5. Introduction (cont’d) • Network Reconstruction Problem: (a) An example network Figure 1: An example of the network reconstruction problem.

  6. Introduction (cont’d) • Network Reconstruction Problem: (b) The example network with no Information about the edges Figure 1: An example of the network reconstruction problem.

  7. Introduction (cont’d) • Network Reconstruction Problem: (c) A partial observation from the network structure. The process output is f(v1,v2,v3,v5,v6). Figure 1: An example of the network reconstruction problem.

  8. Introduction (cont’d) • Network Reconstruction Problem: (c) Another partial observation from the network structure. The process output is f(v2,v3,v4,v5,v6). Figure 1: An example of the network reconstruction problem.

  9. Introduction (cont’d) • Network Reconstruction Problem: • Encountered in many real-world applications: • Inaccuracies in uncovering the Protein interaction data [1]. Figure 2: Protein interaction network in yeast image from http://www.bordalierinstitute.com/images/yeastProteinInteractionNetwork.jpg

  10. Introduction (cont’d) • Network Reconstruction Problem: • Encountered in many real-world applications: • In the social networks analysis, particularly online social networks (OSNs), there is missing data due to several reasons: • Security • User privacy • Data aggregation overhead, etc. • In recommender systems, especially in OSNs

  11. Introduction (cont’d)

  12. Related Work

  13. Network Reconstruction

  14. Compressive Sensing

  15. Compressive Sensing

  16. Compressive Sensing

  17. Compressive Sensing Looking for sparse solutions Combinatorial, NP-Hard

  18. Compressive Sensing

  19. Compressive Sensing LASSO [22,23]

  20. Compressive Sensing Mainly studied in signal & image processing [26-28]

  21. Problem Formulation 21

  22. Preliminaries • Diffusion of information, e.g. news headlines, virus, rumor, etc.

  23. Problem Formulation • Information Diffusion & The Cascading Behavior (a) A news blogs network Figure 3:An example of information diffusion on a news blogs network.

  24. Problem Formulation • Information Diffusion & The Cascading Behavior: (b) Example cascade Figure 3:An example of information diffusion on a news blogs network.

  25. Problem Formulation • Information Diffusion & The Cascading Behavior: Cascade Hit times = <(A, tA), (B, tB), (D, tD), (G, tG), (E, tE), > (b) Example cascade Figure 3:An example of information diffusion on a news blogs network.

  26. Problem Formulation Conditional probability of observing cascade c spreading from u to v [16]

  27. Problem Formulation Conditional probability of observing cascade c spreading from u to v [16] The likelihood of a cascade Spreading in a given tree pattern T [16] β: The probability that a cascade will continue

  28. Problem Formulation Conditional probability of observing cascade c spreading from u to v [16] The likelihood of a cascade Spreading in a given tree pattern T [16] The probability that a cascade c can occur in the graph G [16] Computationally expensive!

  29. Problem Formulation Conditional probability of observing cascade c spreading from u to v [16] The likelihood of a cascade Spreading in a given tree pattern T [16] The probability that a cascade c can occur in the graph G [16] The approximated tree and its corresponding probability

  30. Problem Formulation (b) Example cascade Figure 4:An example of information diffusion on a news blogs network.

  31. Problem Formulation (c) Most likely cascade tree shown by dotted links Figure 4:An example of information diffusion on a news blogs network.

  32. Proposed Framework • Defining cascade probabilities as an inner product: • Where:

  33. Proposed Framework(CS-NetRec) Each equation = a cascade.

  34. Proposed Framework

  35. Experimental Evaluation 35

  36. Dataset * Synthetic • Erdos-Reyni (ER) • Small-World • Barabasi-Albert(BA) • Core-Priphery (Kronecker) * Real 36

  37. Evaluation 37

  38. Cascade Dependency Real Networks Synthetic Networks

  39. The Effect of Sparsity Performed in ER network

  40. Performance Comparison (with NetInf) BA ER Small World Core Kron.

  41. Performance Comparison (with NetInf) C.elegans Football US Top500

  42. Conclusion

  43. Future Work

  44. Q&A

  45. References • [1]  J. L. Schafer and J. W. Graham, “Missing data: Our view of the state of the art.”, Psychological Methods. Vol 7(2), Jun 2002, 147-177., vol. 7, no. 2, pp. 147–177, 2002. • [2]  C. T. Butts, “Network inference, error, and informant (in)accuracy: a Bayesian approach”, Social Networks, vol. 25, no. 2, pp. 103–140, May 2003. • [3]  G. Kossinets, “Effects of missing data in social networks”, Social Networks, vol. 28, no. 3, pp. 247–268, July 2006, PT: J; PG: 22. • [4]  R. Guimer`a and M. Sales-Pardo, “Missing and spurious interactions and the reconstruction of complex networks”, Proceedings of the National • Academy of Sciences, vol. 106, no. 52, pp. 22073– 22078, Dec. 2009. • [5] A. Clauset, C. Moore, and M. E. J. Newman, “Hierarchical structure and the prediction of missing links in networks”, Nature, vol. 453, no. 7191, pp. 98–101, May 2008. • [6] K. Bleakley, G. Biau, and J.-P. Vert, “Super- vised reconstruction of biological networks with local models”, in ISMB/ECCB (Supplement of Bioinformatics), 2007, pp. 57–65. • [7] Y. Yamanishi, J.-P. Vert, and M. Kanehisa, “Protein network inference from multiple ge- nomic data: a supervised approach”, Bioinfor- matics, vol. 20, no. 1, pp. 363–370, Jan. 2004. • [8] M. Kim and J. Leskovec, “The Network Com- pletion Problem: Inferring Missing Nodes and Edges in Networks.”, in SDM. 2011, pp. 47–58, SIAM / Omnipress. • [9] S. Hanneke and E. P. Xing, “Network comple- tion and survey sampling”, Journal of Machine Learning Research - Proceedings Track, vol. 5, pp. 209–215, 2009. • [10] E. J. Candes and T. Tao, “Decoding by Linear Programming”, IEEE Transactions on Informa- tion Theory, vol. 51, no. 12, pp. 4203–4215, Dec. 2005. • [11] E. J. Candes and M. B. Wakin, “An Introduc- tion To Compressive Sampling”, Signal Process- ing Magazine, IEEE, vol. 25, no. 2, pp. 21–30, Mar. 2008. • [12] D. L. Donoho, “High-dimensional centrally sym- metric polytopes with neighborliness propor- tional to dimension.”, Discrete and Computa- tional Geometry, vol. 35, no. 4, pp. 617–652, 2006. • [13] E. J. Candes and B. Recht, “Exact matrix com- pletion via convex optimization”, Found. Com- put. Math., vol. 9, no. 6, pp. 717–772, Dec. 2009.

  46. References (cont’d) • [15] D. S. Goldberg and F. P. Roth, “Assessing experimentally derived interactions in a small world”, Proceedings of the National Academy of Sciences, vol. 100, no. 8, pp. 4372–4376, Apr. 2003. • [16]  M. Gomez Rodriguez, J. Leskovec, and A. Krause, “Inferring networks of diffusion and influence”, in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, 2010, KDD ’10, pp. 1019–1028, ACM. • [17]  M. Eslami, H. R. Rabiee, and M. Salehi, “Dne: A method for extracting cascaded diffusion networks from social networks.”, in Social- Com/PASSAT. 2011, pp. 41–48, IEEE. • [18]  D. Gruhl, R. V. Guha, D. Liben-Nowell, and A. Tomkins, “Information diffusion through blogspace”, in Proceedings of the 13th inter- national conference on World Wide Web, New York, NY, USA, 2004, WWW ’04, pp. 491–501. • [19]  G. Kossinets, J. Kleinberg, and D. Watts, “The structure of information pathways in a social communication network”, in Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, 2008, KDD ’08, pp. 435–443. • [20]  E. J. Candes, J. K. Romberg, and T. Tao, “Sta- ble signal recovery from incomplete and inaccu- rate measurements”, Comm. Pure Appl. Math., vol. 59, no. 8, pp. 1207–1223, Aug. 2006. • [21]  D. L. Donoho, “Compressed sensing”, IEEE Transactions on Information Theory, vol. 52, no. 4, pp. 1289–1306, 2006. • [22]  R. Tibshirani, “Regression shrinkage and selec- tion via the lasso”, Journal of the Royal Sta- tistical Society (Series B), vol. 58, pp. 267–288, 1996. • [23]  E. J. Candes, M. Rudelson, T. Tao, and R. Ver- shynin, “Error Correction via Linear Program- ming”, Foundations of Computer Science, An- nual IEEE Symposium on, vol. 0, pp. 295–308, 2005. • [24]  J. A. Tropp and A. C. Gilbert, “Signal recov- ery from random measurements via orthogonal matching pursuit”, IEEE Transactions on Infor- mation Theory, vol. 53, no. 12, pp. 4655–4666, 2007. • [25]  E. J. Candes, “The restricted isometry prop- erty and its implications for compressed sens- ing”, ComptesRendusMathematique, vol. 346, no. 9-10, pp. 589–592, May 2008. • [26] A. C. Sankaranarayanan, P. K. Turaga, R. Chel- lappa, and R. G. Baraniuk, “Compressive acquisition of dynamic scenes”, CoRR, vol. abs/1201.4895, 2012. • [27] M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Bara- niuk, “Single-Pixel Imaging via Compressive Sampling”, IEEE Signal Processing Magazine, vol. 25, no. 2, pp. 83–91, Mar. 2008.

  47. References (cont’d) • [28] M. B. Wakin, J. N. Laska, M. F. Duarte, D. Baron, S. Sarvotham, D. Takhar, K. F. Kelly, and R. G. Baraniuk, “An architecture for com- pressive imaging”, in in IEEE International Conference on Image Processing (ICIP, 2006, pp. 1273–1276. • [29] W. Bajwa, J. Haupt, A. Sayeed, and R. Nowak, “Compressive wireless sensing”, in Proceedings of the 5th international conference on Informa- tion processing in sensor networks, New York, NY, USA, 2006, IPSN ’06, pp. 134–142, ACM. • [30] J. J. Meng, H. Li, and Z. Han, “Sparse event detection in wireless sensor networks using com- pressive sensing.”, in CISS. 2009, pp. 181–185, IEEE. • [31] J. Haupt, W. U. Bajwa, M. Rabbat, and R. Nowak, “Compressed Sensing for Networked Data”, Signal Processing Magazine, IEEE, vol. 25, no. 2, pp. 92–101, Mar. 2008. • [32] W. Xu, E. Mallada, and A. Tang, “Compressive sensing over graphs”, CoRR, vol. abs/1008.0919, 2010. • [33] Y. Lu, A. Montanari, B. Prabhakar, S. Dharma- purikar, and A. Kabbani, “Counter braids: a novel counter architecture for per-flow measure- ment”, in Proceedings of the 2008 ACM SIG- METRICS international conference on Measure- ment and modeling of computer systems, New York, NY, USA, 2008, SIGMETRICS ’08, pp. 121–132, ACM. • [34] Y. Zhang, M. Roughan, W. Willinger, and L. Qiu, “Spatio-temporal compressive sensing and internet traffic matrices”, in SIGCOMM, 2009, pp. 267–278. • [35] R. Gaeta, M. Grangetto, and M. Sereno, “Lo- cal access to sparse and large global information in p2p networks: A case for compressive sens- ing.”, in Peer-to-Peer Computing. 2010, pp. 1– 10, IEEE. • [36]  H. Lee, D. S. Lee, H. Kang, B.-N. Kim, and M. K. Chung, “Sparse brain network recovery under compressed sensing”, IEEE Trans. Med. Imaging, vol. 30, no. 5, pp. 1154–1165, 2011. • [37]  W.-X. Wang, Y.-C. Lai, C. Grebogi, and J. Ye, “Network Reconstruction Based on Evolutionary-Game Data via Compressive Sens- ing”, Physical Review X, vol. 1, no. 2, pp. 021021, Oct. 2011. • [38]  D. Kempe, J. Kleinberg, and E. Tardos, “Max- imizing the spread of influence through a so- cial network”, in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, 2003, KDD ’03, pp. 137–146, ACM. • [39]  J. Leskovec, M. McGlohon, C. Faloutsos, N. S. Glance, and M. Hurst, “Patterns of Cascading Behavior in Large Blog Graphs”, in Proceedings of the Seventh SIAM International Conference on Data Mining, April 26-28, 2007, Minneapo- lis, Minnesota, USA, 2007. • [40]  J. Edmonds, “Optimum branchings”, Res. Nat. Bur. Standards, vol. 71B, pp. 233–240, 1967.

  48. References (cont’d) • [41]  P. Erdos and A. Renyi, “On the evolution of random graphs”, Publ. Math. Inst. Hung. Acad. Sci, vol. 5, pp. 17–61, 1960. • [42]  D. J. Watts and S. H. Strogatz, “Collective dy- namics of small-world networks”, Nature, vol. 393, no. 6684, pp. 440–442, June 1998. • [43]  A.-L. Baraba ́si and R. Albert, “Emergence of Scaling in Random Networks”, Science, vol. 286, no. 5439, pp. 509–512, Oct. 1999. • [44]  J. Leskovec and C. Faloutsos, “Scalable mod- eling of real graphs using kroneckermultiplica- tion”, in Proceedings of the 24th international conference on Machine learning, New York, NY, USA, 2007, ICML ’07, pp. 497–504, ACM. • [45]  J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney, “Statistical properties of community structure in large social and information net- works”, in Proceedings of the 17th international conference on World Wide Web, New York, NY, USA, 2008, WWW ’08, pp. 695–704, ACM. • [46]  M. Girvan and M. E. J. Newman, “Community structure in social and biological networks”, Pro- ceedings of the National Academy of Sciences, vol. 99, no. 12, pp. 7821–7826, June 2002. • [47] V. Colizza, R. Pastor-Satorras, and A. Vespig- nani, “Reaction–diffusion processes and metapopulation models in heterogeneous net- works”, Nat Phys, vol. 3, pp. 276–282, Jan. 2007.

More Related