Abstract
Detection of anomalies in question/answer based social networks is important in terms of finding the best answers and removing unrelated posts. These networks are usually based on users’ posts and comments, and the best answer is selected based on the ratings by the users. The problem with the scoring systems is that users might collude in rating unrelated posts or boost their reputation. Also, some malicious users might spam the discussion. In this paper, we propose a network analysis method based on network structure and node property for exploring and detecting these anomalies.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Savage, D., Zhang, X., Yu, X., Chou, P., Wang, Q.: Anomaly detection in online social networks. Soc. Netw. 39, 62–70 (2014)
Liu, Y., Chawla, S.: Social media anomaly detection: challenges and solutions. In: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, pp. 817–818. ACM, Cambridge (2017)
Akoglu, L., McGlohon, M.: Anomaly detection in large graphs. CMU-CS-09-173 Technical Report (2009)
Akoglu, L., McGlohon, M., Faloutsos, C.: Oddball: spotting anomalies in weighted graphs. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) Advances in Knowledge Discovery and Data Mining. PAKDD 2010. LNCS, vol. 6119. Springer, Berlin (2010)
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection for discrete sequences: a survey. IEEE Trans. Knowl. Data Eng. 24(5), 823–839 (2012)
Sun, J., Qu, H., Chakrabarti, D., Faloutsos, C.: Neighborhood formation and anomaly detection in bipartite graphs. In: Fifth IEEE International Conference on Data Mining, pp. 418–425. IEEE Computer Society, Washington, DC (2005)
Cheng, H., Tan, P.N., Potter, C., Klooster, S.: Detection and characterization of anomalies in multivariate time series. In: Proceedings
Tong, H., Lin, C.-Y.: Non-negative residual matrix factorization with application to graph anomaly detection. In: Proceedings of the 2011 SIAM International Conference on Data Mining, pp. 143–153. Society for Industrial and Applied Mathematics (2011)
Qiu, H., Liu, Y., Subrahmanya, N.A., Li, W.: Granger causality for time-series anomaly detection. In: IEEE 12th International Conference on Data Mining (ICDM), pp. 1074–1079. IEEE (2012)
Sun, P., Chawla, S., Arunasalam, B.: Mining for outliers in sequential databases. In: Proceedings of the 2006 SIAM International Conference on Data Mining, pp. 94–105. Society for Industrial and Applied Mathematics (2006)
Ge, Y., Xiong, H., Liu, C., Zhou, Z.H.: A taxi driving fraud detection system. In: 2011 IEEE 11th International Conference on Data Mining (ICDM), pp. 181–190. IEEE (2011)
Wong, W.K., Moore, A.W., Cooper, G.F., Wagner, M.M.: Bayesian network anomaly pattern detection for disease outbreaks. In: Proceedings of the 20th International Conference on Machine Learning (ICML-03), pp. 808–815. IEEE (2003)
Friedland, L., Jensen, D.: Finding tribes: identifying close-knit individuals from employment patterns. In: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 290–299. ACM, Vancouver, August 2007
Yu, R., He, X., Liu, Y.: Glad: group anomaly detection in social media analysis. ACM Trans. Knowl. Discov. Data (TKDD) 10(2), 18 (2015)
Bindu, P.V., Thilagam, P.S., Ahuja, D.: Discovering suspicious behavior in multilayer social networks. Comput. Hum. Behav. 73, 568–582 (2017)
Chino, D.Y., Costa, A.F., Traina, A.J., Faloutsos, C.: VolTime: unsupervised anomaly detection on users’ online activity volume. In: Proceedings of the 2017 SIAM International Conference on Data Mining, pp. 108–116. Society for Industrial and Applied Mathematics (2017)
Laleh, N., Carminati, B., Ferrari, E.: Risk assessment in social networks based on user anomalous behaviour. IEEE Trans. Dependable Secure Comput. (2016)
Stack Exchange Data Dump. https://archive.org/details/stackexchange. Accessed 9 Nov 2017
Pandit, S., Chau, D.H., Wang, S., Faloutsos, C.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: Proceedings of the 16th International Conference on World Wide Web, pp. 201–210. ACM (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Soltani, N., Hormizi, E., Golpayegani, S.A.H. (2019). Anomaly Detection in Q & A Based Social Networks. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 880. Springer, Cham. https://doi.org/10.1007/978-3-030-02686-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-02686-8_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02685-1
Online ISBN: 978-3-030-02686-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)