Structured discovery in graphs: Recommender systems and temporal graph analysis

dc.contributor.advisorLyzinski, Vince V.en_US
dc.contributor.authorPeyman, Sheyda Do'aen_US
dc.contributor.departmentApplied Mathematics and Scientific Computationen_US
dc.contributor.publisherDigital Repository at the University of Marylanden_US
dc.contributor.publisherUniversity of Maryland (College Park, Md.)en_US
dc.date.accessioned2024-06-29T05:34:40Z
dc.date.available2024-06-29T05:34:40Z
dc.date.issued2024en_US
dc.description.abstractGraph-valued data arises in numerous diverse scientific fields ranging from sociology, epidemiology and genomics to neuroscience and economics.For example, sociologists have used graphs to examine the roles of user attributes (gender, class, year) at American colleges and universities through the study of Facebook friendship networks and have studied segregation and homophily in social networks; epidemiologists have recently modeled Human-nCov protein-protein interactions via graphs, and neuroscientists have used graphs to model neuronal connectomes. The structure of graphs, including latent features, relationships between the vertex and importance of each vertex are all highly important graph properties that are main aspects of graph analysis/inference. While it is common to imbue nodes and/or edges with implicitly observed numeric or qualitative features, in this work we will consider latent network features that must be estimated from the network topology.The main focus of this text is to find ways of extracting the latent structure in the presence of network anomalies. These anomalies occur in different scenarios: including cases when the graph is subject to an adversarial attack and the anomaly is inhibiting inference, and in the scenario when detecting the anomaly is the key inference task. The former case is explored in the context of vertex nomination information retrieval, where we consider both analytic methods for countering the adversarial noise and also the addition of a user-in-the-loop in the retrieval algorithm to counter potential adversarial noise. In the latter case we use graph embedding methods to discover sequential anomalies in network time series.en_US
dc.identifierhttps://doi.org/10.13016/9ual-ikfo
dc.identifier.urihttp://hdl.handle.net/1903/32855
dc.language.isoenen_US
dc.subject.pqcontrolledApplied mathematicsen_US
dc.subject.pqcontrolledMathematicsen_US
dc.subject.pqcontrolledStatisticsen_US
dc.subject.pquncontrolledgraph theoryen_US
dc.subject.pquncontrolledhigh dimensional statisticsen_US
dc.subject.pquncontrolledmatrix analysisen_US
dc.subject.pquncontrollednetworksen_US
dc.subject.pquncontrolledstatistical machine learningen_US
dc.subject.pquncontrolledstatistical network inferenceen_US
dc.titleStructured discovery in graphs: Recommender systems and temporal graph analysisen_US
dc.typeDissertationen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Peyman_umd_0117E_24120.pdf
Size:
6.71 MB
Format:
Adobe Portable Document Format