Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

GLAD: Group Anomaly Detection in Social Media Analysis

Published: 26 October 2015 Publication History

Abstract

Traditional anomaly detection on social media mostly focuses on individual point anomalies while anomalous phenomena usually occur in groups. Therefore, it is valuable to study the collective behavior of individuals and detect group anomalies. Existing group anomaly detection approaches rely on the assumption that the groups are known, which can hardly be true in real world social media applications. In this article, we take a generative approach by proposing a hierarchical Bayes model: Group Latent Anomaly Detection (GLAD) model. GLAD takes both pairwise and point-wise data as input, automatically infers the groups and detects group anomalies simultaneously. To account for the dynamic properties of the social media data, we further generalize GLAD to its dynamic extension d-GLAD. We conduct extensive experiments to evaluate our models on both synthetic and real world datasets. The empirical results demonstrate that our approach is effective and robust in discovering latent groups and detecting group anomalies.

References

[1]
Edoardo M. Airoldi, David M. Blei, Stephen E. Fienberg, and Eric P. Xing. 2008. Mixed membership stochastic blockmodels. Journal of Machine Learning Research 9, 1981--2014.
[2]
Leman Akoglu, Mary McGlohon, and Christos Faloutsos. 2009. Anomaly Detection in Large Graphs. In CMU-CS-09-173 Technical Report. Citeseer.
[3]
David M. Blei and John D. Lafferty. 2006. Dynamic topic models. In Proceedings of the 23rd International Conference on Machine Learning. Pittsburgh, PA, USA, 113--120.
[4]
David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent dirichlet allocation. Journal of Machine Learning Research 3, 993--1022.
[5]
Stephen P. Borgatti, Ajay Mehra, Daniel J. Brass, and Giuseppe Labianca. 2009. Network analysis in the social sciences. Science 323, 5916 (2009), 892--895.
[6]
Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Computing Surveys (CSUR) 41, 3, 15.
[7]
Hongbo Deng, Jiawei Han, Bo Zhao, Yintao Yu, and Cindy Xide Lin. 2011. Probabilistic topic models with biased propagation on heterogeneous information networks. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. San Diego, CA, USA, 1271--1279.
[8]
Arnaud Doucet and Adam M. Johansen. 2009. A tutorial on particle filtering and smoothing: Fifteen years later. Handbook of Nonlinear Filtering. Oxford University Press, Oxford, UK.
[9]
S. Fortunato. 2009. Community detection in graphs. Physics Reports 486, 3 (June 2009), 75--174.
[10]
Douglas M. Hawkins. 1980. Identification of Outliers. Vol. 11. Springer.
[11]
Nicholas A. Heard, David J. Weston, Kiriaki Platanioti, David J. Hand, and others. 2010. Bayesian anomaly detection methods for social networks. The Annals of Applied Statistics 4, 2, 645--662.
[12]
Michael I. Jordan, Zoubin Ghahramani, Tommi S. Jaakkola, and Lawrence K. Saul. 1999. An introduction to variational methods for graphical models. Machine Learning 37, 2, 183--233.
[13]
Mladen Kolar, Le Song, Amr Ahmed, Eric P. Xing. 2010. Estimating time-varying networks. The Annals of Applied Statistics 4, 1, 94--123.
[14]
Daphne Koller and Nir Friedman. 2009. Probabilistic Graphical Models: Principles and Techniques. MIT press.
[15]
G. Kossinets. 2006. Empirical analysis of an evolving social network. Science 311, 5757 (Jan. 2006), 88--90.
[16]
Krikamol Muandet and Bernhard Schölkopf. 2013. One-class support measure machines for group anomaly detection. In Proceedings of the 29th Conference on Uncertainty in Artificial Intelligence (UAI'13). AUAI Press.
[17]
Jia-Yu Pan, Hyung-Jeong Yang, Christos Faloutsos, and Pinar Duygulu. 2004. Automatic multimedia cross-modal correlation discovery. In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 653--658.
[18]
Carey E. Priebe, John M. Conroy, David J. Marchette, and Youngser Park. 2005. Scan statistics on enron graphs. Computational & Mathematical Organization Theory 11, 3, 229--247.
[19]
Jie Tang, Jing Zhang, Limin Yao, Juanzi Li, Li Zhang, and Zhong Su. 2008. ArnetMiner: Extraction and mining of academic Social Networks. In KDD’08. Las Vegas, NV, USA, 990--998.
[20]
Hanghang Tong, Christos Faloutsos, and Jia-Yu Pan. 2008. Random walk with restart: Fast solutions and applications. Knowledge and Information Systems 14, 3, 327--346.
[21]
Ulrike Von Luxburg. 2007. A tutorial on spectral clustering. Statistics and Computing 17, 4, 395--416.
[22]
Liang Xiong, Barnabás Póczos, and Jeff G. Schneider. 2011a. Group anomaly detection using flexible genre models. In NIPS. Vancouver, Canada, 1071--1079.
[23]
Liang Xiong, Barnabás Póczos, Jeff G. Schneider, Andrew Connolly, and Jake Vanderplas. 2011b. Hierarchical probabilistic models for group anomaly detection. AI and Statistics, 789--797.
[24]
Rose Yu, Xinran He, and Yan Liu. 2014. Glad: Group anomaly detection in social media analysis. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY, USA, 372--381.

Cited By

View all

Index Terms

  1. GLAD: Group Anomaly Detection in Social Media Analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Knowledge Discovery from Data
    ACM Transactions on Knowledge Discovery from Data  Volume 10, Issue 2
    October 2015
    291 pages
    ISSN:1556-4681
    EISSN:1556-472X
    DOI:10.1145/2835206
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2015
    Accepted: 01 July 2015
    Received: 01 January 2015
    Published in TKDD Volume 10, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Group anomaly
    2. community detection
    3. topic modeling

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • U.S. Defense Advanced Research Projects Agency (DARPA) under the Anomaly Detection at Multiple Scales (ADAMS) program
    • NSF

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)71
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Multi-view Outlier Detection via Graphs DenoisingInformation Fusion10.1016/j.inffus.2023.102012101(102012)Online publication date: Jan-2024
    • (2024)HEOD: Human-assisted Ensemble Outlier Detection for cybersecurityComputers & Security10.1016/j.cose.2024.104040146(104040)Online publication date: Nov-2024
    • (2024)Temporal graphs anomaly emergence detection: benchmarking for social media interactionsApplied Intelligence10.1007/s10489-024-05821-354:23(12347-12356)Online publication date: 12-Sep-2024
    • (2023)Swinging in the States: Does disinformation on Twitter mirror the US presidential election system?Companion Proceedings of the ACM Web Conference 202310.1145/3543873.3587638(1395-1403)Online publication date: 30-Apr-2023
    • (2023)Hybrid-Order Anomaly Detection on Attributed NetworksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.311784235:12(12249-12263)Online publication date: 1-Dec-2023
    • (2023)Deep Fuzzy Contrast-Set Deviation Point Representation and Trajectory DetectionIEEE Transactions on Fuzzy Systems10.1109/TFUZZ.2022.319787631:2(571-581)Online publication date: Feb-2023
    • (2023)Exploiting Spatial-Temporal Behavior Patterns for Fraud Detection in Telecom NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.322879720:6(4564-4577)Online publication date: Nov-2023
    • (2023)A Systematic Review: Detection of Anomalies in Social Networks2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)10.1109/ICSCDS56580.2023.10104612(1470-1476)Online publication date: 23-Mar-2023
    • (2023)ADAMM: Anomaly Detection of Attributed Multi-graphs with Metadata: A Unified Neural Network Approach2023 IEEE International Conference on Big Data (BigData)10.1109/BigData59044.2023.10386245(865-874)Online publication date: 15-Dec-2023
    • (2023)Why do banks fail? An investigation via text miningCogent Economics & Finance10.1080/23322039.2023.225127211:2Online publication date: 3-Sep-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media