Nothing Special   »   [go: up one dir, main page]

skip to main content
tutorial

Systems Applications of Social Networks

Published: 26 September 2017 Publication History

Abstract

The aim of this article is to provide an understanding of social networks as a useful addition to the standard toolbox of techniques used by system designers. To this end, we give examples of how data about social links have been collected and used in different application contexts. We develop a broad taxonomy-based overview of common properties of social networks, review how they might be used in different applications, and point out potential pitfalls where appropriate. We propose a framework, distinguishing between two main types of social network-based user selection—personalised user selection, which identifies target users who may be relevant for a given source node, using the social network around the source as a context, and generic user selection or group delimitation, which filters for a set of users who satisfy a set of application requirements based on their social properties. Using this framework, we survey applications of social networks in three typical kinds of application scenarios: recommender systems, content-sharing systems (e.g., P2P or video streaming), and systems that defend against users who abuse the system (e.g., spam or sybil attacks). In each case, we discuss potential directions for future research that involve using social network properties.

References

[1]
T. Abdelkader, K. Naik, A. Nayak, and N. Goel. 2010. A socially-based routing protocol for delay tolerant networks. In Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM’10). 1--5.
[2]
J. Akehurst, I. Koprinska, K. Yacef, L. Pizzato, J. Kay, and T. Rej. 2012. Explicit and implicit user preferences in online dating. In New Frontiers in Applied Data Mining. Springer, Berlin, 15--27.
[3]
R. Albert and A. L. Barabasi. 2002. Statistical mechanics of complex networks. Rev. Modern Phys. 74, 1 (Jan. 2002), 47--97.
[4]
L. Alvisi, A. Clement, A. Epasto, U. Sapienza, S. Lattanzi, and A. Panconesi. 2013. SoK: The evolution of sybil defense via social networks. In Proceedings of the 34th IEEE Symposium on Security and Privacy.
[5]
S. Androutsellis-Theotokis and D. Spinellis. 2004. A survey of peer-to-peer content distribution technologies. Comput. Surveys 36 (Dec. 2004), 335--371.
[6]
S. Aral, L. Muchnik, and A. Sundararajan. 2009. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proc. Natl. Acad. Sci. 106, 51 (2009).
[7]
O. Arazy, N. Kumar, and B. Shapira. 2009. Improving social recommender systems. IT Prof. 4 (2009), 38--44.
[8]
M. G. Armentano, D. Godoy, and A. Amandi. 2012. Topology-based recommendation of users in micro-blogging communities. J. Comput. Sci. Technol. 27, 3 (Jan. 2012), 624--634.
[9]
L. Backstrom and J. Leskovec. 2011. Supervised random walks: Predicting and recommending links in social networks. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining (WSDM’11). ACM, New York, NY, 635--644.
[10]
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. 2009. Persona: An online social network with user-defined privacy. In Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (SIGCOMM’09). ACM, New York, NY, USA, 135--146.
[11]
N. Banerjee, S. Agarwal, P. Bahl, R. Chandra, A. Wolman, and M. Corner. 2010. Virtual compass: Relative positioning to sense mobile social interactions. In Proceedings of the International Conference on Pervasive Computing. Springer, 1--21.
[12]
J. Bao, Y. Zheng, D. Wilkie, and M. F. Mokbel. 2013. A survey on recommendations in location-based social networks. ACM Trans. Intell. Syst. Technol. (Aug. 2013).
[13]
D. Beaver, S. Kumar, H. C. Li, J. Sobel, P. Vajgel, et al. 2010. Finding a needle in haystack: Facebook’s photo storage. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI’10). 1--8.
[14]
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. 2010. Detecting spammers on twitter. In Proceedings of the Conference on Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS’10), Vol. 6.
[15]
F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. 2009. Characterizing user behavior in online social networks. In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference. ACM, 49--62.
[16]
K. Berger, J. Klier, M. Klier, and F. Probst. 2014. A review of information systems research on online social networks. Commun. Assoc. Info. Syst. 35, 1 (2014), 8.
[17]
L. Bianchi. 2011. The History Of Social Networking. Retrieved from http://www.viralblog.com/research/the-history-of-social-networking/.
[18]
G. Bigwood and T. Henderson. 2008. Social DTN routing. In Proceedings of the 2008 ACM CoNEXT Conference (CoNEXT’08). ACM, New York, NY, 35:1--35:2.
[19]
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. 2009. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). ACM, New York, NY, 551--560.
[20]
V. D. Blondel, J. Guillaume, R. Lambiotte, and E. Lefebvre. 2008. Fast unfolding of communities in large networks. J. Stat. Mech. (2008), P10008.
[21]
J. Bobadilla, F. Ortega, A. Hernando, and A. Gutierrez. 2013. Recommender systems survey. Knowledge-Based Systems 46 (July 2013), 109--132.
[22]
S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang. 2006. Complex networks: Structure and dynamics. Phys. Rep. 424, 4--5 (Feb. 2006), 175--308.
[23]
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. 2011. On the penetration of online social networks: Exploiting the social structure. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC’11).
[24]
D. M. Boyd and N. B. Ellison. 2008. Social network sites: Definition, history, and scholarship. J. Comput.-Med. Commun. 13, 1 (2008), 210--230.
[25]
S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. 2005. Gossip algorithms: Design, analysis and applications. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’05), Vol. 3. IEEE, 1653--1664.
[26]
S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. 2006. Randomized gossip algorithms. IEEE Trans. Info. Theory. 52, 6 (2006), 2508--2530.
[27]
P. O. Boykin and V. P. Roychowdhury. 2005. Leveraging social networks to fight spam. Computer 38, 4 (2005), 61--68.
[28]
C. Brown, C. Efstratiou, I. Leontiadis, D. Quercia, C. Mascolo, J. Scott, and P. Key. 2014. The architecture of innovation: Tracking face-to-face interactions with ubicomp technologies. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 811--822.
[29]
J. Brown and P. Reingen. 1987. Social ties and word-of-mouth referral behavior. J. Consum. Res. (1987), 350--362.
[30]
T. Broxton, Y. Interian, J. Vaver, and M. Wattenhofer. 2010. Catching a viral video. In Proceedings of the 2010 IEEE International Conference on Data Mining Workshops. 296--304.
[31]
M. J. Brzozowski and D. M. Romero. 2011. Who should I follow? Recommending people in directed social networks. In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM’11).
[32]
S. Buchegger, D. Schiöberg, L. Vu, and A. Datta. 2009. PeerSoN: P2P Social networking: Early experiences and insights. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems (SNS’09). ACM, New York, NY, 46--52.
[33]
E. Bulut and B. K. Szymanski. 2010. Friendship based routing in delay tolerant mobile social networks. In Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM’10). 1--5.
[34]
Ronald S. Burt. 2004. Structural holes and good ideas1. Amer. J. Sociol. 110, 2 (2004), 349--399.
[35]
X. Cai, M. Bain, A. Krzywicki, W. Wobcke, Y. S. Kim, P. Compton, and A. Mahidadia. 2012. Reciprocal and heterogeneous link prediction in social networks. In Advances in Knowledge Discovery and Data Mining. Springer, Berlin, 193--204.
[36]
Q. Cao, M. Sirivianos, X. Yang, and K. Munagala. 2015. Combating friend spam using social rejections. In Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS). 235--244.
[37]
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI’12). USENIX Association, Berkeley, CA, USA.
[38]
R. Cappelletti and N. Sastry. 2012. IARank: Ranking users on twitter in near real-time, based on their information amplification potential. In Proceedings of the 2012 International Conference on Social Informatics. Washington, DC, 70--77.
[39]
F. Carmagnola, F. Vernero, and P. Grillo. 2009. SoNARS: A social networks-based algorithm for social recommender systems. In User Modeling, Adaptation, and Personalization. Springer, Berlin, 223--234.
[40]
J. Carretero, F. Isaila, A.-M. Kermarrec, F. Taiani, and J. M. Tirado. 2012. Geology: Modular georecommendation in gossip-based social networks. In 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS’12). 637--646.
[41]
G. Caruana and M. Li. 2008. A survey of emerging approaches to spam filtering. Comput. Surveys 44 (March 2008), 9:1--9:27.
[42]
M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi. 2010. Measuring user influence in twitter: The million follower fallacy. In Proceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM’10).
[43]
M. Cha, H. Kwak, P. Rodriguez, Y. Y. Ahn, and S. Moon. 2009a. Analyzing the video popularity characteristics of large-scale user generated content systems. IEEE/ACM Trans. Network. 17, 5 (2009), 1357--1370.
[44]
M. Cha, A. Mislove, and K. Gummadi. 2009b. A measurement-driven analysis of information propagation in the flickr social network. In Proceedings of the 18th International World Wide Web (WWW’09) Conference.
[45]
D. Chakrabarti and C. Faloutsos. 2006. Graph mining: Laws, generators, and algorithms. Comput. Surveys 38, 1 (2006), 2.
[46]
A. J. B. Chaney, D. M. Blei, and T. Eliassi-Rad. 2015. A probabilistic model for using social networks in personalized item recommendation. In Proceedings of the 9th ACM Conference on Recommender Systems (RecSys’15). ACM, New York, NY, 43--50.
[47]
J. Chen, W. Geyer, C. Dugan, M. Muller, and I. Guy. 2009. Make new friends, but keep the old: Recommending people on social networking sites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’09). ACM, New York, NY, USA, 201--210.
[48]
X. Cheng and J. Liu. 2009. NetTube: Exploring social networks for peer-to-peer short video sharing. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’09). 1152--1160.
[49]
P. Chirita, D. Jorg, and W. Nejdl. 2005. MailRank: Using ranking for spam detection. In Proceedings of the 14th ACM International Conference on Information and Knowledge Management (CIKM’05). ACM, 373--380.
[50]
T. Choudhury and A. Pentland. 2003. Sensing and modeling human networks using the sociometer. In Proceedings of the 7th IEEE International Symposium on Wearable Computers (ISWC’03), Vol. 1530. 17--00.
[51]
H. Chun, H. Kwak, Y. H. Eom, Y. Y. Ahn, S. Moon, and H. Jeong. 2008. Comparison of online social relations in volume vs interaction: A case study of cyworld. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement. ACM, 57--70.
[52]
B. Cohen. 2003. Incentives build robustness in BitTorrent. In Proceedings of the Workshop on Economics of Peer-to-Peer systems, Vol. 6. 68--72.
[53]
P. Costa, C. Mascolo, M. Musolesi, and G. P. Picco. 2008. Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks. IEEE J. Select. Areas Commun. 26, 5 (2008), 748--760.
[54]
D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and S. Suri. 2008. Feedback effects between similarity and social influence in online communities. In Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 160--168.
[55]
L. A. Cutillo, R. Molva, and T. Strufe. 2009. Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47, 12 (2009), 94--101.
[56]
E. M. Daly and M. Haahr. 2007. Social network analysis for routing in disconnected delay-tolerant MANETs. In Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’07). ACM, 32--40.
[57]
G. Danezis and P. Mittal. 2009. Sybilinfer: Detecting sybil nodes using social networks. NDSS. The Internet Society (2009).
[58]
L. Danon, A. Diaz-Guilera, J. Duch, and A. Arenas. 2005. Comparing community structure identification. J. Stat. Mech.: Theory Exp. 2005 (2005), P09008.
[59]
J. A. Davis. 1967. Clustering and structural balance in graphs. Human Relations (1967).
[60]
Dd. B. DeFigueiredo and E. T. Barr. 2005. TrustDavis: A non-exploitable online reputation system. In Proceedings of the 7th IEEE International Conference on E-Commerce Technology, 2005. CEC 2005. 274--283.
[61]
M. Dell’Amico and L. Capra. 2008. SOFIA: Social filtering for robust recommendations. In Trust Management II. Springer U.S., 135--150.
[62]
F. Draidi, E. Pacitti, D. Parigot, and G. Verger. 2011. P2Prec: A social-based P2P recommendation system. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM’11). ACM, New York, NY, 2593--2596.
[63]
N. Eagle and A. Pentland. 2005. CRAWDAD data set mit/reality (v. 2005-07-01). Retrieved from http://crawdad.cs.dartmouth.edu/mit/reality. Last accessed on Jun 15 2017. (2005).
[64]
V. Erramilli, X. Yang, and P. Rodriguez. 2011. Explore what-if scenarios with SONG: Social network write generator. arXiv:1102.0699 (2011).
[65]
F. Fabbri and R. Verdone. 2011. A sociability-based routing scheme for delay-tolerant networks. EURASIP J. Wireless Commun. Network. (Jan. 2011), 1:1--1:13.
[66]
Facebook. 2017. Facebook statistics. Retrieved from https://newsroom.fb.com/company-info/, last accessed on Jun 15, 2017 (2017).
[67]
A. Fast, D. Jensen, and B. N. Levine. 2005. Creating social networks to improve peer-to-peer networking. In Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (KDD’05). ACM, New York, NY, 568--573.
[68]
W. Feng and J. Wang. 2012. Incorporating heterogeneous information for personalized tag recommendation in social tagging systems. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’12). ACM, New York, NY, 1276--1284.
[69]
G. W. Flake, S. Lawrence, C. L. Giles, and F. M. Coetzee. 2002. Self-organization and identification of web communities. Computer 35, 3 (2002), 66--70.
[70]
A. Flaxman. 2007. Expansion and lack thereof in randomly perturbed graphs. Internet Math. (2007), 129--298.
[71]
S. Fortunato. 2010. Community detection in graphs. Phys. Rep. 486, 3 (2010), 75--174.
[72]
Linton C. Freeman. 1977. A set of measures of centrality based on betweenness. Sociometry 40, 1 (1977), 35--41.
[73]
F. Fu, L. Liu, and L. Wang. 2008. Empirical analysis of online social networks in the age of Web 2.0. Physica A: Stat. Mech. Appl. 387, 2--3 (2008), 675--684.
[74]
W. Gao and G. Cao. 2011. User-centric data dissemination in disruption tolerant networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’11). 3119--3127.
[75]
S. Garriss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazières, and H. Yu. 2006. RE: Reliable email. In Proceedings of the 3rd conference on Networked Systems Design 8 Implementation. 22--22.
[76]
E. Gilbert and K. Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’09). ACM, 211220.
[77]
M. Girvan and M. E. J. Newman. 2002. Community structure in social and biological networks. Proc. Natl. Acad. Sci. U.S.A. 99, 12 (2002), 7821.
[78]
J. Golbeck. 2006. Generating predictive movie recommendations from trust in social networks. In Trust Management. Springer, Berlin, 93--104.
[79]
M. Granovetter. 1973. The strength of weak ties. Amer. J. Sociol. (1973), 1360--1380.
[80]
M. Granovetter. 1985. Economic action and social structure: The problem of embeddedness. 91, 3 (1985), 481--510.
[81]
Mark Granovetter. 1995. Getting a Job: A Study of Contacts and Careers. University of Chicago Press.
[82]
G. Groh, A. Lehmann, J. Reimers, M. Frieß, and L. Schwarz. 2010. Detecting social situations from interaction geometry. In Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom’10). IEEE, 1--8.
[83]
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2004. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web. ACM, 403--412.
[84]
M. Gupta, R. Li, Z. Yin, and J. Han. 2010. Survey on social tagging techniques. ACM SIGKDD Explorations Newsletter 12 (Nov. 2010), 58--72.
[85]
I. Guy, M. Jacovi, E. Shahar, N. Meshulam, V. Soroka, and S. Farrell. 2008. Harvesting with SONAR: the value of aggregating social network information. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’08). ACM, New York, NY, 1017--1026.
[86]
S. Hameed, X. Fu, N. Sastry, and P. Hui. 2013. Fighting spam using social GateKeepers. Networking Science 2, 1--2 (2013), 28--41.
[87]
J. Hannon, M. Bennett, and B. Smyth. 2010. Recommending twitter users to follow using content and collaborative filtering approaches. In Proceedings of the Fourth ACM Conference on Recommender Systems (RecSys’10). ACM, New York, NY, 199--206.
[88]
Morten T. Hansen. 1999. The search-transfer problem: The role of weak ties in sharing knowledge across organization subunits. Admin. Sci. Quart. 44, 1 (1999), 82--111.
[89]
Caroline Haythornthwaite. 2001. Tie strength and the impact of new media. In Proceedings of the Annual Hawaii International Conference on System Sciences. 11--11.
[90]
J. He and W. W. Chu. 2010. A social network-based recommender system (SNRS). In Data Mining for Social Network Data. Springer U.S., 47--74.
[91]
F. Heider. 1946. Attitudes and cognitive organization. J. Psychol. 21, 2 (1946), 107--112.
[92]
P. Heymann, G. Koutrika, and H. Garcia-Molina. 2007. Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Comput. 11, 6 (2007), 36--45.
[93]
K. Hoffman, D. Zage, and C. Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. Comput. Surveys 42 (Dec. 2009), 1:1--1:31.
[94]
T. Hogg, D. Wilkinson, G. Szabo, and M. Brzozowski. 2008. Multiple relationship types in online communities and social networks. In Proceedings of the AAAI Symposium on Social Information Processing. 30--35.
[95]
W. H. Hsu, A. L. King, M. S. R. Paradesi, T. Pydimarri, and T. Weninger. 2006. Collaborative and structural recommendation of friends using weblog-based social network analysis. In Proceedings of the AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs. 55--60.
[96]
P. Hui and J. Crowcroft. 2007. How small labels create big improvements. In Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2007. 65--70.
[97]
P. Hui, J. Crowcroft, and E. Yoneki. 2008. Bubble rap: Social-based forwarding in delay tolerant networks. In Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’08). ACM, 241--250.
[98]
A. Iamnitchi, M. Ripeanu, and I. Foster. 2004. Small-world file-sharing communities. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Vol. 2. 952--963.
[99]
A. Iamnitchi, M. Ripeanu, E. Santos-Neto, and I. Foster. 2011. The small world of file sharing. In IEEE Trans. Parall. Distrib. Syst. 22, 7, 1120--1134.
[100]
C. L. Isbell, M. Kearns, D. Kormann, S. Singh, and P. Stone. 2000. Cobot in LambdaMOO: A social statistics agent. In Proceedings of the National Conference on Artificial Intelligence. 36--41.
[101]
J. Jiang, C. Wilson, X. Wang, P. Huang, W. Sha, Y. Dai, and B. Y. Zhao. 2010. Understanding latent interactions in online social networks. In Proceedings of the ACM SIGCOMM Internet Measurement Conference.
[102]
T. Karagiannis, C. Gkantsidis, D. Narayanan, and A. Rowstron. 2010. Hermes: Clustering users in large-scale e-mail services. In Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC’10). ACM, New York, NY, 89--100.
[103]
A. Karam and N. Mohamed. 2012. Middleware for mobile social networks: A survey. In Proceedings of the 2012 45th Hawaii International Conference on System Science (HICSS’12). 1482--1490.
[104]
D. Karamshuk, C. Boldrini, M. Conti, and A. Passarella. 2011. Human mobility models for opportunistic networks. IEEE Commun. Mag. 49, 12 (2011), 157--165.
[105]
D. Karamshuk, A. Noulas, S. Scellato, V. Nicosia, and C. Mascolo. 2013. Geo-spotting: Mining online location-based services for optimal retail store placement. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 793--801.
[106]
H. Kautz, B. Selman, and M. Shah. 1997. Referral web: Combining social networks and collaborative filtering. Commun. ACM 40, 3 (1997), 63--65.
[107]
N. Kayastha, D. Niyato, P. Wang, and E. Hossain. 2011. Applications, architectures, and protocol design issues for mobile social networks: A survey. Proc. IEEE 99, 12 (2011), 2130--2158.
[108]
M. Khambatti, K. D. Ryu, and P. Dasgupta. 2004. Structuring peer-to-peer networks using interest-based communities. In Databases, Information Systems, and Peer-to-Peer Computing. Number 2944 in Lecture Notes in Computer Science. Springer, Berlin, 48--63.
[109]
I. King, J. Li, and K. T. Chan. 2009. A brief survey of computational approaches in social computing. In Proceedings of the 2009 International Joint Conference on Neural Networks (IJCNN’09). IEEE Press, Piscataway, NJ, 2699--2706.
[110]
D. Kirkpatrick. 2010. The Facebook Effect: The Inside Story of the Company That Is Connecting the World. Simon 8 Schuster.
[111]
Mikko Kivelä, Alex Arenas, Marc Barthelemy, James P. Gleeson, Yamir Moreno, and Mason A. Porter. 2014. Multilayer networks. J. Complex Netw. 2, 3 (2014), 203--271.
[112]
J. Kleinberg. 2000. The small-world phenomenon: An algorithmic perspective. In Proceedings of the Annual ACM Symposium on Theory of Computing, Vol. 32. 163--170.
[113]
Gueorgi Kossinets and Duncan J. Watts. 2006. Empirical analysis of an evolving social network. Science 311, 5757 (2006), 88--90.
[114]
David Krackhardt. 1987. Cognitive social structures. Soc. Netw. 9, 2 (1987), 109--134.
[115]
David Krackhardt and Robert N. Stern. 1988. Informal networks and organizational crises: An experimental simulation. Soc. Psychol. Quart. (1988), 123--140.
[116]
J. Kunegis, A. Lommatzsch, and C. Bauckhage. 2009. The slashdot zoo: Mining a social network with negative edges. In Proceedings of the 18th International Conference on World Wide Web. ACM, 741--750.
[117]
H. Kwak, Y. Choi, Y. Eom, H. Jeong, and S. Moon. 2009. Mining communities in networks: A solution for consistency and its evaluation. In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference (IMC’09). ACM, New York, NY, 301--314.
[118]
H. Kwak, C. Lee, H. Park, and S. Moon. 2010. What is Twitter, a social network or a news media? In Proceedings of the 19th International Conference on World Wide Web. ACM, 591--600.
[119]
S. M. Kywe, T. Hoang, E. Lim, and F. Zhu. 2012. On recommending hashtags in twitter networks. In Soc. Info. Springer, 337--350.
[120]
H. Y. Lam and D. Y. Yeung. 2007. A learning approach to spam detection based on social networks. In Proceedings of the 4th Conference on Email and Anti-Spam (CEAS’07).
[121]
C. Leberknight, H. Inaltekin, M. Chiang, and H. V. Poor. 2012. The evolution of online social networks: A tutorial survey. IEEE Signal Processing Magazine 29 (2012), 41--52.
[122]
D. H. Lee and P. Brusilovsky. 2010. Social networks and interest similarity: The case of CiteULike. In Proceedings of the 21st ACM Conference on Hypertext and Hypermedia (HT’10). ACM, New York, NY, 151--156.
[123]
K. Lee, J. Caverlee, and S. Webb. 2010. Uncovering social spammers: Social honeypots + machine learning. In Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’10). ACM, New York, NY, 435--442.
[124]
K. Lerman. 2007. Social networks and social information filtering on digg. In Proceedings of the International Conference on Weblogs and Social Media.
[125]
J. Leskovec, L. A. Adamic, and B. A. Huberman. 2007. The dynamics of viral marketing. ACM Trans. Web 1, 1 (2007), 5.
[126]
J. Leskovec and C. Faloutsos. 2007. Scalable modeling of real graphs using kronecker multiplication. In Proceedings of the 24th International Conference on Machine Learning. ACM, 497--504.
[127]
J. Leskovec and E. Horvitz. 2008. Planetary-scale views on a large instant-messaging network. In Proceeding of the 17th International Conference on World Wide Web. ACM, 915--924.
[128]
J. Leskovec, J. Kleinberg, and C. Faloutsos. 2007. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD’07) 1, 1 (2007), 2.
[129]
J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. 2008. Statistical properties of community structure in large social and information networks. In Proceedings of the 17th International Conference on World Wide Web. ACM, 695--704.
[130]
J. Leskovec, K. J. Lang, and M. Mahoney. 2010. Empirical comparison of algorithms for network community detection. In Proceedings of the 19th International Conference on World Wide Web. ACM, 631--640.
[131]
C. Lesniewski-Laas and M. F. Kaashoek. 2010. Whanau: A sybil-proof distributed hash table. In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. USENIX Association, 8.
[132]
R. Levien. 2000. Advogato’s trust metric (2000). Retrieved from http://www.advogato.org/trust-metric.html.
[133]
F. Li and J. Wu. 2009. LocalCom: A community-based epidemic forwarding scheme in disruption-tolerant networks. In Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’09). 1--9.
[134]
H. Li, D. Wu, W. Tang, and N. Mamoulis. 2015. Overlapping community regularization for rating prediction in social recommender systems. In Proceedings of the 9th ACM Conference on Recommender Systems (RecSys’15). ACM, New York, NY, 27--34.
[135]
Q. Li, S. Zhu, and G. Cao. 2010. Routing in socially selfish delay tolerant networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’10). 1--9.
[136]
Z. Li and H. Shen. 2011. SOAP: A social network aided personalized and effective spam filter to clean your e-mail box. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’11). 1835--1843.
[137]
K. C.-J. Lin, C. Wang, C. Chou, and L. Golubchik. 2010. SocioNet: A social-based multimedia access system for unstructured P2P networks. IEEE Trans. Parall. Distrib. Syst. 21, 7 (2010), 1027--1041.
[138]
Data Team LinkedIn. 2008. People You May Know Retrieved from https://web.archive.org/web/20151001025322http://data.linkedin.com/projects/pymk.
[139]
G. Liu, H. Shen, and L. Ward. 2012. An efficient and trustworthy P2P and social network integrated file sharing system. In 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P’12). 203--213.
[140]
L. Liu, N. Antonopoulos, and S. Mackin. 2007. Social peer-to-peer for resource discovery. In Proceedings of the 15th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP’07). Washington, DC, 459--466.
[141]
Lon11. 2011. A Brief Cartoon History of Social Networking 1930--2011. Retrieved from http://www.slideshare.net/peoplebrowsr/a-brief-cartoon-history-of-social-networking-19302011. (March 2011). Commissioned by Peoplebrowsr. Illustrated by Adam Long. Additional commentary and highlights can be found on the Peoplebrowsr blog: http://blog.peoplebrowsr.com/blog/?p=780. Both URLs were last accessed on Jun 15, 2017.
[142]
H. Ma, I. King, and M. R. Lyu. 2009. Learning to recommend with social trust ensemble. In Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’09). ACM, New York, NY, 203--210.
[143]
H. Ma, H. Yang, M. R. Lyu, and I. King. 2008. SoRec: Social recommendation using probabilistic matrix factorization. In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM’08). ACM, New York, NY, 931--940.
[144]
S. Marti, P. Ganesan, and H. Garcia-Molina. 2005. DHT routing using social links. In Peer-to-Peer Systems III. Number 3279 in Lecture Notes in Computer Science. Springer, Berlin, 100--111.
[145]
P. Massa and P. Avesani. 2007a. Trust-aware recommender systems. In Proceedings of the 2007 ACM Conference on Recommender Systems (RecSys’07). ACM, New York, NY, 17--24.
[146]
P. Massa and P. Avesani. 2007b. Trust metrics on controversial users: Balancing between tyranny of the majority. In Int. J. Semant. Web Info. Syst. (IJSWIS’07), Vol. 3. IGI Global, Hershey, PA, 39--64.
[147]
A. Matic, V. Osmani, A. Maxhuni, and O. Mayora. 2012. Multi-modal mobile sensing of social interactions. In Proceedings of the 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth’12). IEEE, 105--114.
[148]
R. McMillan. 2006. Phishing attack targets MySpace users. Retrieved from http://www.infoworld.com/d/security-central/phishing-attack-targets-myspace-users-614.
[149]
M. McPherson, L. Smith-Lovin, and J. M. Cook. 2001. Birds of a feather: Homophily in social networks. Annu. Rev. Sociol. 27 (2001), 415--444.
[150]
A. Mei, G. Morabito, P. Santi, and J. Stefa. 2011. Social-aware stateless forwarding in pocket switched networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’11). 251--255.
[151]
A. Mei and J. Stefa. 2010. Give2Get: Forwarding in social mobile wireless networks of selfish individuals. In Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS). 488--497.
[152]
M. Mezghani, C. A. Zayani, I. Amous, and F. Gargouri. 2012. A user profile modelling using social annotations: A survey. In Proceedings of the 21st International Conference Companion on World Wide Web (WWW’12 Companion). ACM, New York, NY, 969--976.
[153]
R. Milo, S. Itzkovitz, N. Kashtan, R. Levitt, S. Shen-Orr, I. Ayzenshtat, M. Sheffer, and U. Alon. 2004. Superfamilies of evolved and designed networks. Science 303, 5663 (2004), 1538.
[154]
R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. 2002. Network motifs: Simple building blocks of complex networks. Science 298, 5594 (2002), 824.
[155]
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. 2007. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC’07). ACM, New York, NY, 29--42.
[156]
A. Mislove, A. Post, P. Druschel, and K. P. Gummadi. 2008. Ostra: Leveraging trust to thwart unwanted communication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, 15--30.
[157]
S. Misra, A. Tayeen, and W. Xu. 2016. SybilExposer: An effective scheme to detect Sybil communities in online social networks. In Proceedings of the IEEE International Conference on Communications (ICC’16). IEEE, 1--6.
[158]
B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. 2007. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Technol. 7, 4 (Oct. 2007).
[159]
A. Mohaisen, A. Yun, and Y. Kim. 2010. Measuring the mixing time of social graphs. In Proceedings of the ACM SIGCOMM Conference on Internet Measurements. ACM.
[160]
M. Mondal, B. Viswanath, A. Clement, P. Druschel, K. P. Gummadi, A. Mislove, and A. Post. 2011. Limiting large-scale crawls of social networking sites. SIGCOMM Comput. Commun. Rev. 41 (Aug. 2011), 398--399.
[161]
A. Mtibaa, M. May, C. Diot, and M. Ammar. 2010. Peoplerank: Social opportunistic forwarding. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’10). Piscataway, NJ, 111--115.
[162]
S. Nagaraja. 2007. Anonymity in the wild: Mixes on unstructured networks. In Privacy Enhancing Technologies. Springer, 254--271.
[163]
U. Nalluri. 2014. Utility of distrust in online recommender systems. Capstone Proj. Rep. 86 (2014), 87.
[164]
M. E. J. Newman. 2002. Assortative mixing in networks. Phys. Rev. Lett. 89, 20 (2002), 208701.
[165]
M. E. J. Newman. 2004. Detecting community structure in networks. Eur. Phys. J. B—Cond. Matter Complex Syst. 38, 2 (2004), 321--330.
[166]
M. E. J. Newman. 2003a. Mixing patterns in networks. Phys. Rev. E 67, 2 (Feb 2003), 026126.
[167]
M. E. J. Newman. 2003b. The structure and function of complex networks. SIAM Rev. 45, 2 (Jan. 2003), 167--256.
[168]
M. E. J. Newman and M. Girvan. 2004. Finding and evaluating community structure in networks. Phys. Rev. E 69, 2 (Feb 2004), 026113.
[169]
M. E. J. Newman and J. Park. 2003. Why social networks are different from other types of networks. Phys. Rev. E 68, 3 (2003), 036122.
[170]
C. Nickson. 2009. The History of Social Networking. Retrieved from http://www.digitaltrends.com/features/the-history-of-social-networking/.
[171]
S. Nilizadeh, S. Jahid, P. Mittal, N. Borisov, and A. Kapadia. 2012. Cachet: A decentralized architecture for privacy preserving social networking with caching. In Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies (CoNEXT’12). ACM, New York, NY, 337--348.
[172]
A. Noulas, S. Scellato, N. Lathia, and C. Mascolo. 2012. A random walk around the city: New venue recommendation in location-based social networks. In Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (SOCIALCOM-PASSAT’12). IEEE Computer Society, Washington, DC, 144--153.
[173]
N. Tran, J. Li, L. Subramanian, and S. S. M. Chow. 2011. Optimal sybil-resilient node admission control. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’11). IEEE.
[174]
J. O’Donovan and B. Smyth. 2005. Trust in recommender systems. In Proceedings of the 10th International Conference on Intelligent User Interfaces (IUI’05). ACM, New York, NY, 167--174.
[175]
J. Padgett and C. Ansell. 1993. Robust action and the rise of the medici, 1400-1434. Amer. J. Sociol. (1993), 1259--1319.
[176]
L. Page, S. Brin, R. Motwani, and T. Winograd. 1999. The PageRank Citation Ranking: Bringing Order to the Web. Technical Report 1999-66. Stanford InfoLab. Previous number = SIDL-WP-1999-0120.
[177]
N. Palaghias, S. Hoseinitabatabaei, M. Nati, A. Gluhak, and K. Moessner. 2015. Accurate detection of real-world social interactions with smartphones. In Proceedings of the IEEE International Conference on Communications (ICC’15). IEEE, 579--585.
[178]
N. Palaghias, N. Loumis, S. Georgoulas, and K. Moessner. 2016. Quantifying trust relationships based on real-world social interactions. In Proceedings of the IEEE International Conference on Communications (ICC’16). IEEE, 1--7.
[179]
A. Khan Pathan and R. Buyya. 2007. A taxonomy and survey of content delivery networks. Grid Computing and Distributed Systems Laboratory, University of Melbourne, Technical Report (2007).
[180]
A. Post, V. Shah, and A. Mislove. 2011. Bazaar: Strengthening user reputations in online marketplaces. In Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association.
[181]
J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. Reinders, M. R. van Steen, and H. J. Sips. 2008. TRIBLER: A social-based peer-to-peer system. Concurr. Comput.: Pract. Exp. 20, 2 (2008), 127--138.
[182]
J. M. Pujol, V. Erramilli, G. Siganos, X. Yang, N. Laoutaris, P. Chhabra, and P. Rodriguez. 2010a. The little engine(s) that could: Scaling online social networks. In Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM (SIGCOMM’10). ACM, New York, NY, 375--386.
[183]
J. M. Pujol, V. Erramilli, G. Siganos, X. Yang, N. Laoutaris, P. Chhabra, and P. Rodriguez. 2010b. The little engine(s) that could: Scaling online social networks. In Proceedings of the ACM SIGCOMM 2010 Conference (SIGCOMM’10). ACM, New York, NY, 375--386.
[184]
F. Radicchi, C. Castellano, F. Cecconi, V. Loreto, and D. Parisi. 2004. Defining and identifying communities in networks. Proc. Natl. Acad. Sci. U.S.A. 101, 9 (2004), 2658.
[185]
A. Rae, B. Sigurbjörnsson, and R. van Zwol. 2010. Improving tag recommendation using social networks. In Adaptivity, Personalization and Fusion of Heterogeneous Information (RIAO’10). Le Centre de Hautes Etudes Internationales D’Informatique Documentaire, Paris, France, 92--99.
[186]
F. Ratiu. 2008. People You May Know. Retrieved from https://www.facebook.com/notes/facebook/people-you-may-know/15610312130.
[187]
M. Richardson and P. Domingos. 2002. Mining knowledge-sharing sites for viral marketing. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 70.
[188]
D. Saez-Trumper, D. Quercia, and J. Crowcroft. 2012. Ads and the city: Considering geographic distance goes a long way. In Proceedings of the Sixth ACM Conference on Recommender Systems (RecSys’12). ACM, New York, NY, 187--194.
[189]
A. Sala, L. Cao, C. Wilson, R. Zablit, H. Zheng, and B. Y. Zhao. 2010. Measurement-calibrated graph models for social network experiments. In Proceedings of the 19th International Conference on World Wide Web. ACM, 861--870.
[190]
N. Sastry. 2012. How to tell head from tail in user-generated content corpora. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media.
[191]
N. Sastry, D. Manjunath, K. Sollins, and J. Crowcroft. 2011. Data delivery properties of human contact networks. IEEE Trans. Mobile Comput. 10, 6 (June 2011), 868--880.
[192]
N. Sastry, E. Yoneki, and J. Crowcroft. 2009. Buzztraq: Predicting geographical access patterns of social cascades using social networks. In Proceedings of the 2nd ACM EuroSys Workshop on Social Network Systems (SNS’09). ACM, New York, NY, 39--45.
[193]
S. Scellato, C. Mascolo, M. Musolesi, and J. Crowcroft. 2011a. Track globally, deliver locally: Improving content delivery networks by tracking geographic social cascades. In Proceedings of the 20th International Conference on World Wide Web (WWW’11). ACM, New York, NY, 457--466.
[194]
S. Scellato, A. Noulas, and C. Mascolo. 2011b. Exploiting place features in link prediction on location-based social networks. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’11). ACM, New York, NY, 1046--1054.
[195]
Catherine Schaefer, James C. Coyne, and Richard S. Lazarus. 1981. The health-related functions of social support. J. Behav. Med. 4, 4 (1981), 381--406.
[196]
T. C. Schelling. 1972. A process of residential segregation: Neighborhood tipping. Racial Discrimination in Economic Life (1972), 157--84.
[197]
M. F. Schwartz and D. Wood. 1993. Discovering shared interests using graph analysis. Commun. ACM 36, 8 (1993), 78--89.
[198]
John Scott. 2012. Social Network Analysis. Sage.
[199]
A. Shepitsen, J. Gemmell, B. Mobasher, and R. Burke. 2008. Personalized recommendation in social tagging systems using hierarchical clustering. In Proceedings of the 2008 ACM Conference on Recommender Systems (RecSys’08). ACM, New York, NY, 259--266.
[200]
W. Sherchan, S. Nepal, and C. Paris. 2013. A survey of trust in social networks. ACM Comput. Surv. 45, 4 (Aug. 2013), 47:1--47:33.
[201]
U. Shevade, H. H. Song, L. Qiu, and Y. Zhang. 2008. Incentive-aware routing in DTNs. In Proceedings of the IEEE International Conference on Network Protocols. 238--247.
[202]
A. Silberstein, J. Terrace, B. F. Cooper, and R. Ramakrishnan. 2010. Feeding frenzy: Selectively materializing users’ event feeds. In Proceedings of the 2010 International Conference on Management of Data. ACM, 831--842.
[203]
N. Silva, I. Tsang, G. Cavalcanti, and I. Tsang. 2010. A graph-based friend recommendation system using genetic algorithm. In Proceedings of the 2010 IEEE Congress on Evolutionary Computation (CEC’10). 1--7.
[204]
M. Simon. 2009. The Complete History of Social Networking—CBBS to Twitter. Retrieved from https://web.archive.org/web/20150922070216http://www.maclife.com/article/feature/complete_history_social_networking_cbbs_twitter.
[205]
sophos. 2009. Facebook users at risk of “rubber duck” identity attack: 46% of users happy to reveal all to complete strangers. Sophos Press Release. Retrieved from http://www.sophos.com/pressoffice/news/articles/2009/12/facebook.html. (December 2009). Last accessed on Jun 15, 2017.
[206]
K. Sripanidkulchai, B. Maggs, and H. Zhang. 2003. Efficient content location using interest-based locality in peer-to-peer systems. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’03), Vol. 3. 2166--2176.
[207]
W. Stallings. 1995. PGP web of trust. Byte 20, 2 (1995), 161--162.
[208]
J. Stehlé, N. Voirin, A. Barrat, C. Cattuto, L. Isella, J. Pinton, M. Quaggiotto, W. Van den Broeck, C. Régis, B. Lina, et al. 2011. High-resolution measurements of face-to-face contact patterns in a primary school. PloS One 6, 8 (2011), e23176.
[209]
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM’01). ACM, 149--160.
[210]
E. Sun, I. Rosenn, C. Marlow, and T. Lento. 2009. Gesundheit! Modeling contagion through facebook news feed. In Proceedings of the International AAAI Conference on Weblogs and Social Media.
[211]
G. Swamynathan, C. Wilson, B. Boe, K. Almeroth, and B. Y. Zhao. 2008. Do social networks improve e-commerce? A study on social marketplaces. In Proceedings of the 1st Workshop on Online Social Networks. ACM, 1--6.
[212]
P. Symeonidis, E. Tiakas, and Y. Manolopoulos. 2011. Product recommendation and rating prediction based on multi-modal social networks. In Proceedings of the 5th ACM Conference on Recommender Systems (RecSys’11). ACM, New York, NY, 61--68.
[213]
M. Szell, R. Lambiotte, and S. Thurner. 2010. Multirelational organization of large-scale social networks in an online world. Proc. Natl. Acad. Sci. U.S.A. 107, 31 (2010), 13636.
[214]
A. Tahbaz-Salehi and A. Jadbabaie. 2007. Small world phenomenon, rapidly mixing markov chains, and average consensus algorithms. In Proceedings of the 46th IEEE Conference on Decision and Control. IEEE, 276--281.
[215]
E. Tan, L. Guo, S. Chen, X. Zhang, and Y. Zhao. 2012. Spammer behavior analysis and detection in user generated content on social networks. In Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS). 305--314.
[216]
J. Tang, C. Aggarwal, and H. Liu. 2016a. Recommendations in signed social networks. In Proceedings of the 25th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 31--40.
[217]
J. Tang, Y. Chang, C. Aggarwal, and H. Liu. 2016b. A survey of signed network mining in social media. ACM Comput. Surveys (CSUR) 49, 3 (2016), 42.
[218]
J. Tang, X. Hu, and H. Liu. 2013. Social recommendation: A review. Social Network Analysis and Mining 3 (2013), 1113.
[219]
C. Tempich, S. Staab, and A. Wranik. 2004. Remindin’: Semantic query routing in peer-to-peer networks based on social metaphors. In Proceedings of the 13th International Conference on World Wide Web (WWW’04). New York, NY, 640--649.
[220]
A. S. Tigelaar, D. Hiemstra, and D. Trieschnigg. 2012. Peer-to-peer information retrieval: An overview. 30, 2 (2012), 9:1--9:34.
[221]
D. A. Tran, K. Nguyen, and C. Pham. 2012. S-CLONE: Socially-aware data replication for social networks. Comput. Netw. 56 (May 2012), 2001--2013.
[222]
N. Tran, B. Min, J. Li, and L. Subramanian. 2009. Sybil-resilient online content voting. In Proceedings of the 6th USENIX symposium on Networked Systems Design and Implementation. USENIX Association, 15--28.
[223]
J. Travers and S. Milgram. 1969. An experimental study of the small-world problem. Sociometry 32, 4 (1969), 425--443.
[224]
S. Traverso, K. Huguenin, I. Trestian, V. Erramilli, N. Laoutaris, and K. Papagiannaki. 2012. TailGate: Handling long-tail content with a little help from friends. In Proceedings of the 21st International Conference on World Wide Web (WWW’12). ACM, New York, NY, 151--160.
[225]
D. Tunkelang. 2009. The Noisy Channel Blog. Retrieved from http://thenoisychannel.com/2009/01/13/a-twitter-analog-to-pagerank/.
[226]
UCSD. 2004. Wireless Topology Discovery Project. http://sysnet.ucsd.edu/wtd/wtd.html. Last accessed on Jun 15, 2017. (2004).
[227]
Y. Upadrashta, J. Vassileva, and W. Grassmann. 2005. Social networks in peer-to-peer systems. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS’05).
[228]
Giridhari Venkatadri, Oana Goga, Changtao Zhong, Bimal Viswanath, Krishna Gummadi, and Nishanth Sastry. 2016. Strengthening weak identities through inter-domain trust transfer. In Proceedings of the 25th International Conference on World Wide Web. ACM.
[229]
J. Vera-del Campo, J. Pegueroles, Juan Hernández-Serrano, and Miguel Soriano. 2012. Design of a P2P content recommendation system using affinity networks. Comput. Commun. 36 (Dec. 2012), 90--104.
[230]
A. Vespignani. 2005. Complex networks: Behind enemy lines. Nature Phys. 1, 3 (Dec. 2005), 135--136.
[231]
P. Victor, C. Cornelis, M. De Cock, and A. Teredesai. 2009a. A comparative analysis of trust-enhanced recommenders for controversial items. In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM’09).
[232]
P. Victor, C. Cornelis, M. De Cock, and A. Teredesai. 2009b. Trust-and distrust-based recommendations for controversial reviews. In Proceedings of the Web Science Conference (WebSci’09).
[233]
P. Victor, N. Verbiest, M. Cornelis, and C. Cock. 2013. Enhancing the trust-based recommendation process with explicit distrust. ACM Trans. Web (TWEB) 7, 2 (2013), 6.
[234]
B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. 2009. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online Social Networks. ACM, 37--42.
[235]
B. Viswanath, M. Mondal, A. Clement, P. Druschel, K. P. Gummadi, A. Mislove, and A. Post. 2012a. Exploring the design space of social network-based Sybil defenses. In Proceedings of the 4th International Conference on Communication Systems and Networks (COMSNETS’12). 1--8.
[236]
B. Viswanath, M. Mondal, K. P. Gummadi, A. Mislove, and A. Post. 2012b. Canal: Scaling social network-based Sybil tolerance schemes. In Proceedings of the 7th ACM European Conference on Computer Systems. ACM, New York, NY, 309--322.
[237]
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. 2010. An analysis of social network-based sybil defenses. ACM SIGCOMM Comput. Commun. Rev. 40, 4 (2010), 363--374.
[238]
B. Wang, C. Wang, J. Bu, C. Chen, W. V. Zhang, D. Cai, and X. He. 2013. Whom to mention: Expand the diffusion of tweets by @ recommendation on micro-blogging systems. In Proceedings of the 22nd International Conference on World Wide Web (WWW’13). Republic and Canton of Geneva, Switzerland, 1331--1340.
[239]
F. Wang, Y. Moreno, and Y. Sun. 2006. Structure of peer-to-peer social networks. 73, 3 (2006), 036123.
[240]
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, and B. Y. Zhao. 2013. Social turing tests: Crowdsourcing sybil detection. In Proceedings of the 20th Network 8 Distributed System Security Symposium (NDSS’13).
[241]
H. Wang, F. Wang, and J. Liu. 2012. Accelerating peer-to-peer file sharing with social relations: Potentials and challenges. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’12). 2891--2895.
[242]
Z. Wang, L. Sun, X. Chen, W. Zhu, J. Liu, M. Chen, and S. Yang. 2012. Propagation-based social-aware replication for social video contents. In Proceedings of the 20th ACM International Conference on Multimedia (MM’12). ACM, New York, NY, 29--38.
[243]
Z. Wang, L. Sun, S. Yang, and W. Zhu. 2011. Prefetching strategy in peer-assisted social video streaming. In Proceedings of the 19th ACM International Conference on Multimedia (MM’11). ACM, New York, NY, 1233--1236.
[244]
Stanley Wasserman and Katherine Faust. 1994. Social Network Analysis: Methods and Applications. Vol. 8. Cambridge University Press.
[245]
S. Wasserman and K. Faust. 1995. Social Network Analysis: Methods and Applications. Cambridge University Press.
[246]
K. Wei, X. Liang, and K. Xu. 2014. A survey of social-aware routing protocols in delay tolerant networks: Applications, taxonomy and design-related issues. IEEE Communications Surveys Tutorials 16, 1 (2014), 556--578.
[247]
W. Wei, F. Xu, C. C. Tan, and Q. Li. 2012. Sybildefender: Defend against sybil attacks in large social networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’12). 1951--1959.
[248]
J. Weng, E. P. Lim, J. Jiang, and Q. He. 2010. Twitterrank: Finding topic-sensitive influential twitterers. In Proceedings of the 3rd ACM International Conference on Web Search and Data Mining. ACM, 261--270.
[249]
C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and B. Y. Zhao. 2009. User interactions in social networks and their implications. In Proceedings of the 4th ACM European Conference on Computer Systems. ACM, 205--218.
[250]
Mike P. Wittie, Veljko Pejovic, Lara Deek, Kevin C. Almeroth, and Ben Y. Zhao. 2010. Exploiting locality of interest in online social networks. In Proceedings of the 6th International Conference (Co-NEXT’10). ACM, New York, NY, Article 25, 12 pages.
[251]
J. Wortham. 2009. The Value of a Facebook Friend? About 37 Cents. http://bits.blogs.nytimes.com/2009/01/09/are-facebook-friends-worth-their-weight-in-beef/.
[252]
J. Wu and Y. Wang. 2012. Social feature-based multi-path routing in delay tolerant networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’12). 1368--1376.
[253]
C. Xu, S. Jia, L. Zhong, and G.-M. Muntean. 2015. Socially aware mobile peer-to-peer communications for community multimedia streaming services. IEEE Commun. Mag. 53, 10 (October 2015), 150--156.
[254]
R. Yan, M. Lapata, and X. Li. 2012. Tweet recommendation with graph co-ranking. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Long Papers—Volume 1 (ACL’12). Stroudsburg, PA, 516--525.
[255]
C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. 2012a. Analyzing spammers’ social networks for fun and profit: A case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st International Conference on World Wide Web (WWW’12). ACM, New York, NY, 71--80.
[256]
X. Yang, H. Steck, and Y. Liu. 2012b. Circle-based recommendation in online social networks. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’12). ACM, New York, NY, 1267--1275.
[257]
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. 2011. Uncovering social network sybils in the wild. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC’11). ACM, New York, NY, 259--268.
[258]
H. Yu. 2011. Sybil defenses via social networks: A tutorial and survey. SIGACT News 42 (Oct. 2011), 80--101.
[259]
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xia. 2010. SybilLimit: A near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Network. 18, 3 (June 2010), 885--898.
[260]
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. 2006. Sybilguard: Defending against sybil attacks via social networks. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. ACM, 267--278.
[261]
E. Zangerle, W. Gassler, and G. Specht. 2011. Recommending#-tags in twitter. In Proceedings of the Workshop on Semantic Adaptive Social Web (SASWeb’11). CEUR Workshop Proceedings, Vol. 730. 67--78.
[262]
K. Zetter. 2009. Weak Password Brings “Happiness” to Twitter Hacker. Threat Level. Retrieved from http://www.wired.com/threatlevel/2009/01/professed-twitt/.
[263]
L. Zhang, H. Fang, W. Ng, and J. Zhang. 2011. IntRank: Interaction ranking-based trustworthy friend recommendation. In Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’11). 266--273.
[264]
X. Zhang, J. Cheng, T. Yuan, B. Niu, and H. Lu. 2013. TopRec: Domain-specific recommendation through community topic mining in social network. In Proceedings of the 22nd International Conference on World Wide Web. 1501--1510.
[265]
Y. Zhang and J. Zhao. 2009. Social network analysis on data diffusion in delay tolerant networks. In Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’09). ACM, 345--346.
[266]
C. Zhong, H. Chang, D. Karamshuk, D. Lee, and N. Sastry. 2017. Wearing many (social) hats: How different are your different social network personae?Proceedings of the 11th International AAAI Conference on Weblogs and Social Media (2017).
[267]
C. Zhong, N. Kourtellis, and N. Sastry. 2016. Pinning alone? A study of the role of social ties on pinterest. In Proceedings of the 10th International AAAI Conference on Web and Social Media (ICWSM’16).
[268]
C. Zhong, M. Salehi, S. Shah, M. Cobzarenco, N. Sastry, and M. Cha. 2014. Social bootstrapping: How pinterest and last. fm social communities benefit by borrowing links from facebook. In Proceedings of the 23rd International Conference on World Wide Web. ACM, 305--314.
[269]
Y. Zhu, B. Xu, X. Shi, and Y. Wang. 2013. A survey of social-based routing in delay tolerant networks: Positive and negative social effects. IEEE Commun. Surveys Tutor. 15, 1 (2013), 387--401.

Cited By

View all
  • (2023)Review on the application of cloud computing in the sports industryJournal of Cloud Computing10.1186/s13677-023-00531-612:1Online publication date: 2-Nov-2023
  • (2022)Semi-supervised Learning with Self-training Classifier for Cache Placement in Mobile Edge Networks30th Biennial Symposium on Communications 202110.1007/978-3-031-06947-5_15(197-210)Online publication date: 22-Jun-2022
  • (2021)Multi-view fusion for recommendation with attentive deep neural networkEvolutionary Intelligence10.1007/s12065-021-00626-615:4(2619-2629)Online publication date: 11-Jun-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 50, Issue 5
September 2018
573 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3145473
  • Editor:
  • Sartaj Sahni
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2017
Accepted: 01 May 2017
Revised: 01 February 2017
Received: 01 June 2016
Published in CSUR Volume 50, Issue 5

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Social networks
  2. anti-spam
  3. content delivery
  4. file sharing
  5. recommendation
  6. social properties
  7. sybil

Qualifiers

  • Tutorial
  • Research
  • Refereed

Funding Sources

  • UK Economic and Social Research Council
  • UK Engineering and Physical Sciences Research Council

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Review on the application of cloud computing in the sports industryJournal of Cloud Computing10.1186/s13677-023-00531-612:1Online publication date: 2-Nov-2023
  • (2022)Semi-supervised Learning with Self-training Classifier for Cache Placement in Mobile Edge Networks30th Biennial Symposium on Communications 202110.1007/978-3-031-06947-5_15(197-210)Online publication date: 22-Jun-2022
  • (2021)Multi-view fusion for recommendation with attentive deep neural networkEvolutionary Intelligence10.1007/s12065-021-00626-615:4(2619-2629)Online publication date: 11-Jun-2021
  • (2020)A Structural Evolution-Based Anomaly Detection Method for Generalized Evolving Social NetworksThe Computer Journal10.1093/comjnl/bxaa16865:5(1189-1199)Online publication date: 30-Dec-2020
  • (2020)Improved Collaborative Filtering Algorithm Based on Stacked Denoising AutoEncodersMobile Internet Security10.1007/978-981-15-9609-4_12(165-176)Online publication date: 2-Nov-2020
  • (2019)Location Based Place Recommendation using Social Network2019 IEEE 5th International Conference for Convergence in Technology (I2CT)10.1109/I2CT45611.2019.9033625(1-5)Online publication date: Mar-2019
  • (2019)Deep understanding of 3-D multimedia information retrieval on social media: implications and challengesIran Journal of Computer Science10.1007/s42044-019-00030-52:2(101-111)Online publication date: 13-Feb-2019
  • (2019)A visual recommendation system for co-authorship social networks (ChinaVis 2018)Journal of Visualization10.1007/s12650-018-0528-922:2(385-399)Online publication date: 1-Apr-2019
  • (2018)Homophily of music listening in online social networks of ChinaSocial Networks10.1016/j.socnet.2018.07.00155(160-169)Online publication date: Oct-2018

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media