Structured discovery in graphs: Recommender systems and temporal graph analysis
dc.contributor.advisor | Lyzinski, Vince V. | en_US |
dc.contributor.author | Peyman, Sheyda Do'a | en_US |
dc.contributor.department | Applied Mathematics and Scientific Computation | en_US |
dc.contributor.publisher | Digital Repository at the University of Maryland | en_US |
dc.contributor.publisher | University of Maryland (College Park, Md.) | en_US |
dc.date.accessioned | 2024-06-29T05:34:40Z | |
dc.date.available | 2024-06-29T05:34:40Z | |
dc.date.issued | 2024 | en_US |
dc.description.abstract | Graph-valued data arises in numerous diverse scientific fields ranging from sociology, epidemiology and genomics to neuroscience and economics.For example, sociologists have used graphs to examine the roles of user attributes (gender, class, year) at American colleges and universities through the study of Facebook friendship networks and have studied segregation and homophily in social networks; epidemiologists have recently modeled Human-nCov protein-protein interactions via graphs, and neuroscientists have used graphs to model neuronal connectomes. The structure of graphs, including latent features, relationships between the vertex and importance of each vertex are all highly important graph properties that are main aspects of graph analysis/inference. While it is common to imbue nodes and/or edges with implicitly observed numeric or qualitative features, in this work we will consider latent network features that must be estimated from the network topology.The main focus of this text is to find ways of extracting the latent structure in the presence of network anomalies. These anomalies occur in different scenarios: including cases when the graph is subject to an adversarial attack and the anomaly is inhibiting inference, and in the scenario when detecting the anomaly is the key inference task. The former case is explored in the context of vertex nomination information retrieval, where we consider both analytic methods for countering the adversarial noise and also the addition of a user-in-the-loop in the retrieval algorithm to counter potential adversarial noise. In the latter case we use graph embedding methods to discover sequential anomalies in network time series. | en_US |
dc.identifier | https://doi.org/10.13016/9ual-ikfo | |
dc.identifier.uri | http://hdl.handle.net/1903/32855 | |
dc.language.iso | en | en_US |
dc.subject.pqcontrolled | Applied mathematics | en_US |
dc.subject.pqcontrolled | Mathematics | en_US |
dc.subject.pqcontrolled | Statistics | en_US |
dc.subject.pquncontrolled | graph theory | en_US |
dc.subject.pquncontrolled | high dimensional statistics | en_US |
dc.subject.pquncontrolled | matrix analysis | en_US |
dc.subject.pquncontrolled | networks | en_US |
dc.subject.pquncontrolled | statistical machine learning | en_US |
dc.subject.pquncontrolled | statistical network inference | en_US |
dc.title | Structured discovery in graphs: Recommender systems and temporal graph analysis | en_US |
dc.type | Dissertation | en_US |
Files
Original bundle
1 - 1 of 1