Skip to main content

Detecting Anomalies in Microblogging via Nonnegative Matrix Tri-Factorization

  • Conference paper
Book cover Social Media Processing (SMP 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 489))

Included in the following conference series:

  • 1092 Accesses

Abstract

With the increasing of anomalous user’s intelligent, it is difficult to detect the anomalous users and messages in microblogging. Most of the studies attempt to detect anomalous users or messages individually nowadays. In this paper, we propose a co-clustering algorithm based on nonnegative matrix tri-factorization to detect anomalous users and messages simultaneously. A bipartite graph between user and message is built to model the homogeneous and heterogeneous interactions, and homogeneous relations as constraints to improve the accuracy of heterogeneous co-clustering algorithm. The experimental results show that the proposed algorithm can detect anomalous users and messages with high accuracy on Sina Weibo dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a Social Network or a News Media? In: Proceedings of the 19th International Conference on World Wide Web, pp. 591–600. ACM, New York (2010)

    Chapter  Google Scholar 

  2. Wu, S., Hofman, J.M., Mason, W.A., Watts, D.J.: Who Says What to Whom on Twitter. In: Proceedings of the 20th International Conference on World Wide Web, pp. 705–714. ACM, New York (2011)

    Chapter  Google Scholar 

  3. Yu, L., Asur, S., Huberman, B.A.: What Trends in Chinese Social Media. In: Proceedings of the 5th SNA-KDD Workshop (2011)

    Google Scholar 

  4. Gao, Q., Abel, F., Houben, G.-J., Yu, Y.: A Comparative Study of Users’ Microblogging Behavior on Sina Weibo and Twitter. In: Masthoff, J., Mobasher, B., Desmarais, M.C., Nkambou, R. (eds.) UMAP 2012. LNCS, vol. 7379, pp. 88–101. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  5. Zhu, Y., Wang, X., Zhong, E., Liu, N.N., Yang, Q.: Discovering Spammers in Social Networks. In: Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence (AAAI 2012), Toronto, Ontario, Canada, pp. 172–177 (2012)

    Google Scholar 

  6. Bosma, M., Meij, E., Weerkamp, W.: A Framework for Unsupervised Spam Detection in Social Networking Sites. In: Baeza-Yates, R., de Vries, A.P., Zaragoza, H., Cambazoglu, B.B., Murdock, V., Lempel, R., Silvestri, F. (eds.) ECIR 2012. LNCS, vol. 7224, pp. 364–375. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Chu, Z., Widjaja, I., Wang, H.: Detecting Social Spam Campaigns on Twitter. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 455–472. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. McCord, M., Chuah, M.: Spam Detection on Twitter Using Traditional Classifiers. In: Alcaraz Calero, J.M., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 175–186. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Juan, M.R., Lourdes, A.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Systems with Applications 40(8), 2992–3000 (2013)

    Article  Google Scholar 

  10. Chen, Y., Wang, L., Dong, M.: Non-negative Matrix Factorization for Semi Supervised Heterogeneous Data Coclustering. IEEE Transactions on Knowledge and Data Engineering 22(10), 1459–1474 (2010)

    Article  Google Scholar 

  11. Jiang, J., Wilson, C., Wang, X., Huang, P., Sha, W.: Understanding Latent Interactions in Online Social Networks. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 369–382. ACM, New York (2010)

    Google Scholar 

  12. Dai, H., Zhu, F., Lim, E., Pang, H.: Detecting Anomalies in Bipartite Graphs with Mutual Dependency Principles. In: IEEE 12th International Conference on Data Mining (ICDM 2012) (2012)

    Google Scholar 

  13. Sun, J., Qu, H., Chakrabarti, D., Faloutsos, C.: Neighborhood Formation and Anomaly Detection in Bipartite Graphs. In: IEEE 5th International Conference on Data Mining (ICDM 2005) (2005)

    Google Scholar 

  14. Xing, E.P., Ng, A.Y., Jordan, M.I., Russell, S.: Distance Metric Learning, with Application to Clusering with Side-information. In: Proceeding of the 16th Neural Information Processing Systems, Vancouver, pp. 505–512 (2002)

    Google Scholar 

  15. Chang, C.-C., Lin, C.-J.: LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2(3), 27:1–27:27 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shen, G., Yang, W., Wang, W., Yu, M., Dong, G. (2014). Detecting Anomalies in Microblogging via Nonnegative Matrix Tri-Factorization. In: Huang, H., Liu, T., Zhang, HP., Tang, J. (eds) Social Media Processing. SMP 2014. Communications in Computer and Information Science, vol 489. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45558-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45558-6_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45557-9

  • Online ISBN: 978-3-662-45558-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics