DocumentCode :
3712853
Title :
Inferring pairwise influence from encrypted communication
Author :
Brian Thompson;Hasan Cam
Author_Institution :
U.S. Army Research Lab, 2800 Powder Mill Road, Adelphi, MD 20783, United States
fYear :
2015
Firstpage :
1367
Lastpage :
1372
Abstract :
Inferring influence in networks from observed communication activity is an important task in contexts such as surveillance, marketing, and cybersecurity. Most existing approaches rely on content or meta-data indicating related activity, rendering those approaches ineffective when such information is unavailable, for example due to encrypted communication. In contrast, we present an efficient algorithm to infer influence between entities that relies only on the times of their individual activity, paying particular attention to the computational challenges posed by large, high-volume networks. We provide theoretical bounds on the recall and runtime of our algorithm relative to characteristics of network structure and dynamics, along with experiments to support our theoretical analysis and validate the effectiveness of our approach.
Keywords :
"Data models","Heuristic algorithms","Maximum likelihood estimation","Cryptography","Runtime","Algorithm design and analysis","Computational modeling"
Publisher :
ieee
Conference_Titel :
Military Communications Conference, MILCOM 2015 - 2015 IEEE
Type :
conf
DOI :
10.1109/MILCOM.2015.7357635
Filename :
7357635
Link To Document :
بازگشت