Next Article in Journal
Direction-of-Arrival Estimation with Coarray ESPRIT for Coprime Array
Next Article in Special Issue
RGCA: A Reliable GPU Cluster Architecture for Large-Scale Internet of Things Computing Based on Effective Performance-Energy Optimization
Previous Article in Journal
Monocular Vision-Based Underwater Object Detection
Previous Article in Special Issue
Non-Convex Sparse and Low-Rank Based Robust Subspace Segmentation for Data Mining
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Constrained Active Learning for Anchor Link Prediction Across Multiple Heterogeneous Social Networks

1
College of Computer, National University of Defense Technology, Changsha 410073, China
2
Department of Computer Science, Florida State University, Tallahassee, FL 32306-4530, USA
3
Department of Computer Science, University of Illinois at Chicago, Chicago, IL 60607, USA
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(8), 1786; https://doi.org/10.3390/s17081786
Submission received: 25 May 2017 / Revised: 20 July 2017 / Accepted: 27 July 2017 / Published: 3 August 2017

Abstract

:
Nowadays, people are usually involved in multiple heterogeneous social networks simultaneously. Discovering the anchor links between the accounts owned by the same users across different social networks is crucial for many important inter-network applications, e.g., cross-network link transfer and cross-network recommendation. Many different supervised models have been proposed to predict anchor links so far, but they are effective only when the labeled anchor links are abundant. However, in real scenarios, such a requirement can hardly be met and most anchor links are unlabeled, since manually labeling the inter-network anchor links is quite costly and tedious. To overcome such a problem and utilize the numerous unlabeled anchor links in model building, in this paper, we introduce the active learning based anchor link prediction problem. Different from the traditional active learning problems, due to the one-to-one constraint on anchor links, if an unlabeled anchor link a = ( u , v ) is identified as positive (i.e., existing), all the other unlabeled anchor links incident to account u or account v will be negative (i.e., non-existing) automatically. Viewed in such a perspective, asking for the labels of potential positive anchor links in the unlabeled set will be rewarding in the active anchor link prediction problem. Various novel anchor link information gain measures are defined in this paper, based on which several constraint active anchor link prediction methods are introduced. Extensive experiments have been done on real-world social network datasets to compare the performance of these methods with state-of-art anchor link prediction methods. The experimental results show that the proposed Mean-entropy-based Constrained Active Learning (MC) method can outperform other methods with significant advantages.

1. Introduction

Online social networks have become more and more popular in recent years, and are often represented as heterogeneous information networks containing abundant information about: who, where, when and what [1]. Different social networks may have different functionalities, so it is natural for individuals to use multiple social networks for different purposes at the same time [2,3]. For example, an individual may use Facebook to share funny posts with his/her friends, use Twitter to follow the latest news and events, and use Foursquare to search for the places of interest in his/her surrounding area. However, the accounts owned by the same user in different social sites are mostly isolated without any correspondence connections to each other.
Linking the accounts of the same person across different social networks is of great value for many concrete real-world inter-network applications [4,5,6,7]. For example, after aligning Facebook and Twitter, we can recommend new friends or new topics to a new Twitter user according to the social relationship or personal interest information from his/her existing Facebook account. Meanwhile, if we can effectively align Twitter and Foursquare, we can also recommend new places to a new Foursquare user by analyzing the location check-in records about him/her in Twitter. The correspondence relationships connecting common users’ accounts across different social networks are called the “anchor links” [4].
In order to predict anchor links between multiple social networks, many different supervised methods have been proposed so far. However, these existing methods can achieve good performance only when sufficient labeled anchor links can be collected to train the models [1,8,9,10,11,12]. In these supervised anchor link prediction methods, the anchor link prediction is modeled as a classification problem, where the existing and non-existing anchor links are labeled as positive and negative instances respectively. In the scenarios when users’ personal profile information (e.g., email, phone number and address) is available on the social networks, by directly searching and matching these information, manually labeling the anchor links as the training set will not be a problem. However, in most cases, social network data available for research is usually anonymized for privacy concerns [13], where users’ profile information is either removed or replaced with meaningless unique identifiers. Therefore, the majority of the anchor links between social networks are actually unknown and can be extremely time-consuming for manually labeling (e.g., manually ask the user of a given account u 1 that whether an account u 2 in another network also belongs to him/her, and if he/she says “yes”, then label the link between u 1 and u 2 as a positive anchor link) [2]. With such limited labeled anchor links, none of the existing classification-based methods (training of which requires lots of labeled instances) can perform well. One way to solve this challenging problem is to exploit the active learning technique to utilize a reasonable-sized labeled anchor links together with the numerous unlabeled anchor links to improve the model building.
In contrast to using randomly selected labeled data to induce a model, active learning gives the learners the flexibility to select which instances to be labeled and added to the training set [14]. In this way, the active learner aims to achieve high accuracy using as few labeled instances as possible, and thereby minimizing the cost of obtaining labeled data [15]. However, many existing active learning methods [16,17,18,19] just focus on data that is assumed to be independent and identically distributed, where the objects either do not have explicit relationships with one another, or the relationships have been ignored [20]. Some link-based active learning methods have been proposed to deal with intra-network links [20,21,22]. However, the problems explored by them are very different from the active anchor link prediction problem: (1) anchor links are the links that connect different networks. Compared with the intra-network links, they are often very hard to collect and contain the information between multi-source networks; (2) most of the intra-network links have no cardinality constraint, but anchor links normally follow the one-to-one constraint [1], i.e., each user can have at most one account in each social network. (The case that users have multiple accounts in one network is a different problem [23]. However, in the problem of anchor link prediction, it can be resolved with method introduced in [24], where these duplicated accounts can be aggregated in advance to form one unique virtual account and the constraint on anchor links connecting these virtual accounts will still be “one-to-one”.)
As a result, to apply active learning on anchor link prediction, there are several challenges to be solved:
  • one-to-one constraint on anchor links: anchor links have an inherent one-to-one constraint [1], which has never been considered in traditional active learning methods at all. Via the one-to-one constraint, when identifying one positive anchor link, a group of negative anchor links incident to its nodes can be discovered from the networks. Viewed in such a perspective, identifying positive anchor links and using the one-to-one constraint to infer their related negative links will be very important for the active anchor link prediction problem.
  • sparsity of anchor links: unlike other kinds of social network link, due to the one-to-one constraint, the positive anchor links between two given networks are extremely sparse, and only account for a small proportion among all the potential inter-network user pairs. As a result, when collecting the training set, acquiring enough positive anchor links under a limited cost is very challenging.
  • heterogeneity of social networks: anchor links in online social networks can be associated with heterogeneous information, like various types of attributes and complex connections [1]. How to properly apply such heterogeneous information to the active learning for anchor link prediction is quite different from traditional active learning and link prediction problems.
This paper is the first work to introduce several active learning methods to tackle the anchor link prediction issues. In this paper, we propose our Constrained Active Learning methods. Different from the existing active learning methods, when identifying one positive anchor link, our methods can discover a group of negative anchor links that incident to its nodes via the one-to-one constraint, thus the challenge of one-to-one constraint on anchor links is solved. Besides, several mechanisms have been designed to ensure that enough informative positive anchor links can be queried by our methods, in this way to overcome the bad effects caused by the challenge of sparsity of anchor links. Meanwhile, we choose MNA [1], which is a state-of-art supervised method based on heterogeneous features, as the basic anchor link prediction method, so that to enable our approaches to deal with the challenge of heterogeneity of social networks very well.
The rest of the paper is organized as follows: We firstly make a simple introduction to the related works of our study in Section 2. Secondly, we formulate the problem in Section 3. In Section 4, we introduce the basic anchor link prediction method. Then we discuss some classical active learning methods, and propose our Constrained Active Learning methods. In Section 5, we run extensive experiments on real-world heterogeneous social networks, and discuss the experiment results. Finally, we conclude this paper.

2. Related Works

Social network link prediction problems have been explored for several years [25,26], and many different works on supervised social network link prediction have been studied [27,28,29]. Among them, Hasan et al. [27] are the first to study social link prediction as a supervised problem.
Different from traditional social network link prediction problems, anchor link prediction, focuses on predicting the existing anchor links between multiple networks. In addition, in recent years, many different supervised methods have been proposed to solve the anchor link prediction problems [1,7,8,9,10,11,12,30]. Among them, Vosecky et al. [12] propose a method to connect users between Facebook and StudiVZ baseed on web profile matching. Zafarani and Liu [9] first introduce a methodology for connecting identities across social networks based on multiple behavioral patterns of username creation. Liu et al. [11] propose a framework to connect user accounts across heterogeneous social media platforms by using multiple user features. Kong et al. [1] extract heterogeneous features from multiple heterogeneous networks for anchor link prediction, including user’s social, spatial, temporal and text information, and formulate the inference problem for anchor links as a stable matching problem. Goga et al. [30] conduct a systematic and detailed investigation of the reliably of matching user profiles across real-world online social networks, and propose a matching scheme that is able to mitigate impersonation attacks and reduce the number of false matches. In addition, Zhang et al. [7] develop a general cross-network user alignment model which can support the integration of a number of networks.
Since anchor links connect user accounts across two different network sources, and follow the one-to-one constraint, the information of two different networks can be directly transferred via these links. As a result, how to apply anchor links to cross-network applications becomes a new problem, and is explored by several works recently, for example: Zhang et al. [4,31] explore the ways of using anchor links to integrate the relation information from multiple networks to conduct social link prediction. Pan et al. [32] propose a matrix factorization method to transfer one network’s user latent factors to help the recommendation task in the other network to achieve better performances. Yan et al. [33,34] transfer users’ rich social and content information in Twitter network to help recommend the videos in YouTube.
Active learning, which sometimes is also called “query learning” or “optimal experimental design” in the statistics literature, has been researched by many works [15], and used in many applications. For example, image classification [35,36], biomedicine [37], system monitoring [38,39,40]. Most of the existing active learning methods [16,17,18,19] focus on data that is assumed to be independent and identically distributed, where the objects either do not have explicit relationships with one another, or the relationships have been ignored. Different from these methods, Bilgic et al. [20,21] utilize the relationships between the intra-network objects, and propose their link-based active learning theories. Xu et al. [22] apply the active learning to the area of preference learning by taking the information of pairwise judgments into consideration. Isele et al. [41] use active learning to help generate expressive linkage rules for entities, so that to solve the data integration problem. Xiong et al. [42] study the active learning problem of selecting pairwise must-link and cannot-link constraints for semi-supervised clustering. However, how to properly apply active learning to help predict the anchor links, which follow the one-to-one constraint and are not identically distributed, is still a new problem that remains to be explored.

3. Problem Formulation

Suppose there are a source network G s = ( V s , L s ) and a target network G t = ( V t , L t ) , which are both heterogeneous social networks. The set of nodes in G s contains 4 kinds of nodes, and can be represented as V s = U s C T W . U s = { u 1 s , u 2 s , , u N s } is the set of user accounts in G s . C = { c 1 , c 2 , , c | C | } is the set of locations. T = { t 1 , t 2 , , t | T | } represents a set of time slots that users have published posts at. W = { w 1 , w 2 , , w | W | } is the set of words people have used in their posts. L s V s × V s is the intra-network links of different types in G s . We define the target network G t in the similar way. U t denotes the set of user accounts in G t . Without loss of generality, we assume G s and G t share the same sets of locations C , time slots T and words W .
Supervised Anchor Link Prediction Problem: Given G s and G t , this problem aims at using the prediction model to infer the existing anchor links which connect users across these two networks. And in this paper, we define the set of anchor links between G s and G t as A = { a ( u i s , u j t ) | u i s U s , u j t U t } , where a ( u i s , u j t ) represents the anchor link between two user accounts u i s and u j t . If we are sure that a ( u i s , u j t ) is an existing anchor link, we label it as “positive” and set its value as a ( u i s , u j t ) = 1 . However, if it is a non-existing anchor link, we label it as “negative” and set the its value as a ( u i s , u j t ) = 0 . Since anchor links are one-to-one relationships between user accounts in U s and U t , we can present this constraint as i , j ( k a ( u i s , u k t ) 1 , k a ( u k s , u j t ) 1 ) . Let A l and A u denote the labeled and unlabeled anchor link set in A respectively, and A t A l denote the training set which is used to train the prediction model. Thus the task of supervised anchor link prediction is to train a prediction model from A t and use it to predict the value of a given unlabeled anchor link a ( u i s , u j t ) A u .

4. The Constrained Active Learning for Anchor Link Prediction

Active learning aims at minimizing the labeling cost of training set by letting the learner choose which examples to label. To anchor link prediction, the first thing that needs to be done by the active learner is to select a query pool P of unlabeled anchor links, whose links are randomly collected from the unlabeled anchor link set A u A . Thus we can present P as: P = { a ( u i s , u j t ) | u i s U s u b s , u j t U s u b t , a ( u i s , u j t ) A u } , where U s u b s and U s u b t is the selected subset of U s and U t separately. Then the active learner will train an anchor link prediction model θ from the training set A t . Finally, the active learner will begin a round of query, which is to identify the label(s) of the most valuable link(s) in P according to the values computed by conducting θ on P , and add the identified link(s) to A t . The training process and query process will be repeated until the limit of query cost has been reached.
In this paper, instead of focusing on how to predict the existing anchor links, we focus on the active learning strategies. So in this section, we will just briefly introduce the basic anchor link prediction method, which can extract heterogeneous features from multiple heterogeneous networks and use them to predict anchor link. Then we will design several Constrained Active Learning methods for anchor link prediction, where these methods can be divided into the Normal Constrained Active Learning methods and the Biased Constrained Active Learning methods.

4.1. The Basic Anchor Link Prediction Method

A basic building block of our approach is Multi-Network Anchoring (MNA) which was proposed in [1]. It is a supervised method based on heterogeneous features and outperforms several famous classical methods on the anchor link prediction between Twitter and Foursquare. For the sake of completion, we now present the main idea of this approach in this subsection.
MNA firstly extracts 4 kinds of heterogeneous features from the source network G s and the target network G t , including:
  • Multi-Network Social Features: extracted by evaluating the similar social links of two user accounts from different social networks, to represent the social similarity between two user accounts.
  • Spatial Distribution Features: extracted by comparing the location information of two user accounts in different ways, to represent people’s location similarities.
  • Temporal Distribution Features: extracted by using different ways to compare the distribution of different users’ activities in the given time slots, to represent people’s temporal similarities.
  • Text Content Features: extracted by evaluating the similarity of words used by two user accounts from different social networks, to represent the similarity of text contents posted by two user accounts.
Then MNA trains an SVM classifier on these extracted features, and uses it to predict the label of the unknown anchor links. Lastly, MNA uses a matching algorithm (referred to as One-to-one Matching Algorithm) to ensure the one-to-one constraint on anchor links, so that to make the predicted results more accurate and reasonable. The detailed description can be seen in [1].

4.2. The Constrained Active Learning Methods

In each round of query process, traditional active learning methods usually just add the newly identified samples to the training set. However, via the one-to-one constraint, the Constrained Active Learning methods can infer the labels of some unlabeled links after identifying a positive anchor link, and thus the samples added to the training set can be more than the identified samples. As shown in Figure 1, there are 4 unlabeled anchor links in the query pool. After link3 is identified as a positive anchor link in a round of query, a traditional active learner just adds link3 to the positive training set. However, a constrained active learner will firstly infer that link2 and link4 are “negative” according to the one-to-one constraint, and then add link3 to the positive training set and add link2, link4 to the negative training set. In this way, the Constrained Active Learning methods can label more samples than the traditional active learning methods under the same query cost (where the query cost means the cost of identifying the selected unlabeled anchor link a ( u i s , u j t ) in a round of query).
In this subsection, we will design several Constrained Active Learning methods, which can be divided into the Normal Constrained Active Learning methods and the Biased Constrained Active Learning methods. The former kind of methods treat the positive links and the negative links equally, while the later kind of methods pay more attention to the potential positive links when querying.

4.2.1. The Normal Constrained Active Learning Methods

All active learning methods involve evaluating the informativeness of unlabeled instances. However, as mentioned in Section 1, due to the existing challenges, many query methods of active learning do not apply very well to anchor link prediction.
Among the existing query methods, the simplest and most commonly used query framework is uncertainty sampling, where the learner queries the instance about which it is least certain on how to label [15]. There are mainly 3 kinds of sampling strategies in uncertainty sampling, e.g., the least confidence sampling [14], the margin sampling [16] and the entropy-based sampling [14]. Compared with the former two sampling strategies, the entropy-based sampling generalizes more easily to complex structured instances. This is because by computing the entropies, we can compare the amount of information contained in different multi-structured samples in an uniform metric. So our Constrained Active Learning methods are based on the entropy theory, and aim to calculate the potential entropy H p ( a ) for each unlabeled link a P . Here we define H p ( a ) as the evaluated amount of information that the constraint active learner can gain by identifying the label of a.
Here, we use R ( a ( u i s , u j t ) ) to represent the related link set of a given anchor link a ( u i s , u j t ) , and define it as the set of all the other anchor links in P that incident to node u i s or u j t . For example, in Figure 1, the related linked set of link3 is formed by link2 and link4. Thus we can formulate R ( a ( u i s , u j t ) ) as:
R ( a ( u i s , u j t ) ) = R s ( a ( u i s , u j t ) ) R t ( a ( u i s , u j t ) )
where R s ( a ( u i s , u j t ) ) = { a ( u m s , u j t ) | u m s U s , a ( u m s , u j t ) P , m i } and R t ( a ( u i s , u j t ) ) = { a ( u i s , u n t ) | u n t U t , a ( u i s , u n t ) P , n j } .
The common main idea of the Normal Constrained Active Learning methods is to predict H p ( a ( u i s , u j t ) ) for each unlabeled anchor link a ( u i s , u j t ) P , then identify the label of link a h ( u i s , u j t ) , which has the highest potential entropy among all links in P . If the label of a h ( u i s , u j t ) is “negative”, then add a h ( u i s , u j t ) to the training set A t ; otherwise, in addition to adding a h ( u i s , u j t ) to A t , the learner should find its related link set R ( a h ( u i s , u j t ) ) from P , then set the labels of all links in R ( a h ( u i s , u j t ) ) as “negative” and add this set to A t .
By designing different ways to evaluate the potential entropy of each unlabeled anchor link a ( u i s , u j t ) P , we present two kinds of Normal Constrained Active Learning methods as follows:
  • The Basic-entropy-based Constrained Active Learning (BC): Using this method, the active learner calculates H p ( a ) of an unlabeled link a by its basic entropy H B ( a ) . Here, the basic entropy can also be viewed as the amount of information contained in the link. To a given unlabeled anchor link a, the basic entropy of it is as follows:
    H B ( a ) = y = 0 1 P θ ( y | a ) log P θ ( y | a )
    Here, P θ ( y | a ) is the posterior probability of link a’s value to be y under the prediction model θ .
  • The Mean-entropy-based Constrained Active Learning (MC): different from BC, MC calculates H p ( a ) for an unlabeled anchor link a not only by its own entropy, but also by the mean entropy of all the links in a’s related link set R ( a ) .
Now we present the details for Mean-entropy-based Constrained Active Learning (MC):
In real scenarios, if the value of the newly identified link a is 0, the amount of information the learner can acquire is:
H a ( a ) = H B ( a )
However, if the value of a is 1, the acquired amount of information will be:
H a ( a + ) = H B ( a ) + a r R ( a ) H B ( a r )
Since the learner will find the a’s related link set R ( a ) , and label each link a r R ( a ) as “negative” according to the one-to-one constraint. As a result, the new information that will be finally acquired by the learner after identifying an unlabeled link a can be more than H B ( a ) . Thus, to an unlabeled link a, one way to calculate H a ( a ) is to combine H a ( a ) and H a ( a + ) by a’s probability to be 0 and 1, which is as follows:
H a ( a ) = P M ( 0 | a ) H a ( a ) + P M ( 1 | a ) H a ( a + ) = H B ( a ) + P M ( 1 | a ) a r R ( a ) H B ( a r )
where P M ( y | a ) is the probability of a’s value to be predicted as y by the trained MNA model M, thus we can make sure that y = 0 1 P M ( y | a ) = 1 .
Although the Platt scaling can be used to evaluating the outputs of S V M into a probability distribution over classes, however, since the outputs of MNA are just predicted positive links without any of the classifier scores [1], the Platt scaling can not be used to compute P M ( y | a ) . In order to compute P M ( y | a ) , we should firstly select a labeled anchor link set A v , and use it as the validation set to test the values of P M ( 0 | a ) and P M ( 1 | a ) . Thus we formulate A v as follows:
A v = { a ( u i s , u j t ) | a ( u i s , u j t ) A s l , a ( u i s , u j t ) A t }
where A s l A l , and A l is original labeled anchor link set which is collected before the active learning process. Each time, after training the classifier of MNA (To MNA, only its classifier need to be trained before we use it [1].) and before computing the entropy of the links in P , we should firstly pretend that we do not know the labels of all the links in A v , and use the trained MNA’s model M to predict the labels for these links. Thus we can get two link sets A v + and A v , which consist of the predicted positive links and negative links separately. Supposing that N ( A ) is the number of links in a link set A , and N + ( A ) is the number of links in A whose real labels are “positive”, we can compute two probabilities P Y Y and P N Y as follows:
P Y Y = N + ( A v + ) N ( A v + ) , P N Y = N + ( A v ) N ( A v )
Finally, in the querying process, if the predicted value of link a P is 1, set P M ( 1 | a ) = P Y Y , P M ( 0 | a ) = 1 P Y Y ; if the predicted value of link a is 0, set P M ( 1 | a ) = P N Y , P M ( 0 | a ) = 1 P N Y .
However, in real-world anchor link prediction problem, data samples are usually imbalanced, which means the negative anchor links can be much more than the positive anchor links. So it is important to make sure the identified positive links contain enough information in the query process. When we set H p ( a ) = H a ( a ) , for a positive link a P , if it has a large P M ( 1 | a ) and an informative related link set formed by many negative links, the value of H a ( a ) can be very large. In addition, thus a is likely to be identified in the query process, no matter whether it contains enough information. As a result, many positive links with little information in them but have informative related link sets are likely to be identified in the query process. This is contrary to our goal of making sure the identified positive links contain enough information. Our MC method overcomes this problem by modifying H a ( a ) to H M ( a ) . H M ( a ) aims to calculate H p ( a ) for an unlabeled anchor link a according to its basic entropy and the mean entropy of the links in R ( a ) . The formulation is as follows:
H M ( a ) = H B ( a ) + P M ( 1 | a ) a r R ( a ) H B ( a r ) N ( R ( a ) )
where a r R ( a ) H B ( a r ) N ( R ( a ) ) denotes the mean entropy of all the links in R ( a ) . In addition, we can notice that for H M ( a ) , the basic entropy of a is as important as the mean entropy of all the links in R ( a ) . So H M ( a ) is more suitable for dealing with the data imbalance problem: (1) No matter how imbalance the data is, the active leaner can always pay attention to find the positive links which contain enough information. Because the value of a r R ( a ) H B ( a r ) N ( R ( a ) ) doesn’t increase with the number of links in R ( a ) , and thus for a large R ( a ) , the computation of a r R ( a ) H B ( a r ) N ( R ( a ) ) still cannot dominate the evaluation of the potential entropy of a. In addition, since basic entropy of a is as important as a r R ( a ) H B ( a r ) N ( R ( a ) ) , we can pay enough attention to identify the informative positive links; (2) No matter how imbalance the data is, the active learner can always ensure that for any identified positive link a, the negative links in R ( a ) are likely to be informative. Because the value of R ( a ) is evaluated by the mean entropy of all the links in R ( a ) , and is not directly influenced by the imbalance degree of the data samples.
According to the definition of Equation (5), the validation set should contain sufficient labeled anchor links to make MC perform well. If the labeled anchor links in the validation set are not sufficient, the sample distribution of it can hardly represent the real world sample distribution, which is similar to the sample distribution of the query pool. As a result, the computed P M ( 1 | a ) can hardly adapt to the query pool, and thus when using MC to query samples in the query pool, the computed H M ( a ) values are not precise enough, which can result in the bad performances of MC.
The proposed framework of the Normal Constrained Active Learning is shown in Algorithm 1, if we set H p = H B , then the algorithm is BC; and if we set H p = H M , then the algorithm is MC.
Algorithm 1 The framework of Normal Constrained Active Learning
Input: Two heterogeneous social networks: G s and G t . Two sets of labeled anchor link: The training set A t and the validation set A v . The query pool P . The max number of queries n q . The potential entropy computation method H p .
Output: The new training set A t and the new query pool P
1:
Initialize n 0
2:
For each a ( u i s , u j t ) in A t and P , extract four types of features.
3:
while n < n q do
4:
    Train an SVM model θ on A t according to the training part in MNA;
5:
    For each unlabeled anchor link a in P , use θ to predict the probabilities of its value to be 0 and 1, which is presented as P θ ( 0 | a ) and P θ ( 1 | a ) .
6:
    if H p is H B then for each link a in P , compute H p ( a ) by Equation (2)
7:
    else
8:
        Use θ as the trained classifier in MNA, and use MNA to predict the labels of all the links in A v .
9:
        Compute the probabilities P Y Y and P N Y by Equation (4).
10:
        For each a in P , find R ( a ) , and compute H p ( a ) by Equation (5).
11:
    end if
12:
    Select the link a h which has the highest potential entropy in P , and identify its real label.
13:
    if the real label of a h is “negative” then
14:
         a h 0 , A t A t { a h } , P P { a h }
15:
    else
16:
         a h 1
17:
        Find R ( a h ) from P , for each link in a r in R ( a h ) , set a r 0
18:
         A t A t { a h } R ( a h ) , P P { a h } R ( a h )
19:
    end if
20:
     n n + 1
21:
end while

4.2.2. The Biased Constrained Active Learning Methods

As we discussed before, due to the sparsity of anchor links, acquiring enough informative positive anchor links under a limited cost is very important. However, in the Normal Constrained Active Learning methods, there may not be enough mechanisms to increase the probability of each identified link to be positive. So if we explore such a mechanism, and integrate it into the Normal Constrained Active Learning methods, we may achieve better results. Thus we present our Biased Constrained Active Learning methods, which prefer the potential positive links over the potential negative links in the query process.
According to the experiments in [1], in different circumstances, when predicting the existing anchor links, the MNA model can achieve higher accuracy than the SVM model contained in it by using the one-to-one constraint. So to our Biased Constrained Active Learning methods, the learner should firstly use the trained MNA model to predict the potential positive anchor links in P , and collect them in the set A p + . Then in each round of query, the link to be identified will be selected from A p + .
However, A p + may also contain some links with low P θ ( 1 | a ) , since the current method doesn’t have a mechanism to filter out this kind of links. That is contrary to the goal of acquiring positive links. One way to solve this problem is to apply a threshold δ , and to any link a A p + , if P θ ( 1 | a ) < δ , then delete a from A p + . However, since the SVM model θ changes after each time of query, the value of δ should also be updated with it. As a result, a novel entropy-based δ adjusting method is integrated in our Biased Constrained Active Learning methods. The main idea of it is: (1) Reducing the value of δ when the newly queried links have improved the effects of θ , so that in the next round of query, some links with smaller P θ ( 1 | a ) but larger H p ( a ) can be identified; (2) Enlarging the value of δ when the newly queried links have not increased the effects of θ , so that to improve the probability of identifying positive links in the next round of query. At the beginning of each round of query, this δ adjusting method evaluates the effects of θ by computing H n e w P , which is the sum of all links’ entropies in P . If H n e w P is smaller than the sum of these links’ entropies in the former round of query (which is represented by H o l d P ), it means the uncertainty of θ to these links has decreased, i.e., the effects of θ have increased. In addition, in each round of query, the value of δ is updated by pulsing/deducting a number Δ δ ( 0 , 1 ) . However, we can notice that if H n e w P H o l d P (i.e., the effects of θ haven’t been improved), the value of θ Δ δ can be smaller than P o l d + . Here P o l d + is the equal to P θ ( 1 | a h ) , which represents the probability of the identified link a h in the former round to be evaluated as positive by θ in the former round. In addition, since the effects of θ haven’t been improved in this round, the identified a h of the former round is likely to be a negative link which is wrongly predicted as “positive”. In addition, a good way to alleviate it is to make sure the value of P θ ( 1 | a h ) in this round is bigger than P o l d + , in this way to improve the probability of the identified link a h in this round to be “positive”. So if H n e w P H o l d P , we can to set δ = M a x { P o l d + , δ + Δ δ } to improve the effects of the δ adjusting method.
After creating A p + , we should decide which potential positive anchor link to be identified from A p + . A simple way is to identify the link with the largest related link set, in this way to label as many links as possible in each round of query. However, by using this way, many of the identified positive links may contain little information with large related link sets, that is contrary to our goal of making sure the identified positive links containing enough information. As a result, here we firstly compute the potential entropy of each link in A p + , then identify the one with the highest potential entropy. Since in each round of query, the potential positive anchor link is identified from A p + , when δ is big enough, A p + can be empty, and thus no link can be identified. So in order to ensure that a potential positive link can be identified from A p + in each round of query, when A p + is empty, we can use δ = δ d to decrease the value of δ and then recreate A p + until A p + is not empty. Here d ( 0 , 1 ) , and in our experiments we find that when setting d = 0.1 , the active learning methods can achieve good performances. So to simplify the process of parameter setting, we finally set d = 0.1 in our algorithm. The proposed framework of the Biased Constrained Active Learning is shown in Algorithm 2. If we set H p = H B , then the algorithm is the Biased Basic-entropy-based Constrained Active Learning (BBC); and if we set H p = H M , then the algorithm is the Biased Mean-entropy-based Constrained Active Learning (BMC).
Algorithm 2 The framework of Biased Constrained Active Learning
Input: Two heterogeneous social networks: G s and G t . Two sets of labeled anchor link: The training set A t and the validation set A v . The query pool P . The max number of queries n q . The potential entropy computation method H p . The threshold adjusting pace Δ δ
Output: The new training set A t and the new query pool P
1:
Initialize n 0 , δ 0.5 , H o l d P + , P o l d + 0.5 , d 0.1
2:
For each a in A t and P , extract four types of features.
3:
while n < n q do
4:
    Train a SVM model θ on A t according to the training part in MNA.
5:
    For each a in P , use θ to predict P θ ( 0 | a ) and P θ ( 1 | a ) .
6:
     H n e w P a P H B ( a )
7:
    if H n e w P < H o l d P and δ > 0 then δ δ Δ δ
8:
    else if H n e w P H o l d P then δ M a x { P o l d + , δ + Δ δ }
9:
    end if
10:
    Use θ as the trained classifier in MNA, and use MNA to predict the labels of all links in P , and collect all of the predicted positive links into the set A p + . Then set A ^ p + { a | a A p + , P θ ( 1 | a ) δ } .
11:
    while A ^ p + is ∅ do
12:
         δ δ d , A ^ p + { a | a A p + , P θ ( 1 | a ) δ }
13:
        if δ < 0 then A ^ p + P
14:
        end if
15:
    end while
16:
     A p + A ^ p +
17:
    if H p is H B then
18:
        For each a in A p + , compute H p ( a ) by Equation (2)
19:
    else
20:
        Use MNA to predict the labels of all links in A v , and compute P Y Y and P N Y by Equation (4)
21:
        For each a in A p + , find R ( a ) and compute H p ( a ) by Equation (5)
22:
    end if
23:
    Select the link a h which has the highest H p ( a ) in A p + , and identify its real label, and set P o l d + P θ ( 1 | a h )
24:
    if the real label of a h is “negative” then
25:
         a h 0 , A t A t { a h } , P P { a h }
26:
         H o l d P H n e w P H B ( a h )
27:
    else
28:
         a h 1
29:
        Find R ( a h ) from P . For each a r in R ( a h ) , set a r 0
30:
         A t A t { a h } R ( a h ) , P P { a h } R ( a h )
31:
         H o l d P H n e w P H B ( a h ) a R ( a h ) H B ( a )
32:
    end if
33:
     n n + 1
34:
end while

5. Experimental Section

5.1. Data Preparation

In this paper, we collect two datasets according to the way in [1]. One is from Foursquare, a popular location-based online social network, and the other is from Twitter, one of the hottest microblogging social networks. A more detailed comparison of these two datasets is available in Table 1. In order to conduct experiments, we pre-process these raw data to obtain the ground-truth of users’ anchor links. In Foursquare network, we can collect some users’ Twitter IDs in their account pages. We use these information to build the ground-truth of anchor links between user accounts across the two networks. If a Foursquare user has shown his/her Twitter ID in the website, we treat it as an anchor link between this user’s Foursquare account and Twitter account. In this way, we obtain 600 anchor links. For more information about the datasets and the crawling method, please refer to [1].

5.2. Experiment Setups

In order to evaluate the effectivenesses of these compared methods on anchor link prediction, we select three different metrics in terms of F1-measure (F1), Precision (Prec.), Recall (Rec.).
We design several groups of experiments and use all the 600 anchor links as the set of positive anchor links. Before each experiment, according to the predefined Negative-Positive Rate ( R N P , R N P = # n e g a t i v e _ p a i r s # p o s i t i v e _ p a i r s ), we randomly sampled a set of non-existing anchor links between these 2 user sets as the negative anchor link set. These links are partitioned into 4 parts with 6 folds cross validation: 1 fold as the general training set, 2 folds as the query set, 1 fold as the validation set and the remaining 2 folds as the test set.
In each group of experiments, we randomly select links of our training set A t from the general training set. The parameter used to control the percentage of selected links in the general training set is R t . In addition, the threshold adjusting pace for BBC and BMC is set as Δ δ = 0.01 . The query set is used as the query pool P , the validation set A v is used to calculate P Y Y and P N Y for MC, BMC.

5.3. Effectiveness Experiments

It is known that our proposed constrained active learning methods are integrated with the MNA method, in this way to improve its performances on anchor link prediction. So in this subsection, we will conduct two groups of experiments to analyze the effectiveness of our methods on improving the performances of MNA.
Here we select four sampling methods as the baseline methods, so in total, there are eight methods to be compared. The compared methods are summarized as follows:
  • The Normal Constrained Active Learning methods: The first kind of proposed methods in this paper, including the Basic-entropy-based Constrained Active Learning (BC) and Mean-entropy-based Constrained Active Learning (MC).
  • The Biased Constrained Active Learning methods: The second kind of proposed methods in this paper, including the Biased Basic-entropy-based Constrained Active Learning (BBC) and Biased Mean-entropy-based Constrained Active Learning (BMC).
  • MNA: A state-of-art supervised anchor link prediction method based on heterogeneous features and outperforms [1], which doesn’t do any query to enlarge its original training set.
  • The Entropy-based Active Learning (EA): A method widely used in some state-of-art link query problems, such as data integration [41], semi-supervised clustering of links [42].
  • The Random Query Methods: Two base-line query methods integrated to MNA for better comparison. One is the Normal Random Query (NRQ) which only adds the randomly queried links to A t ; the other is the Constrained Random Query (CRQ), which adds not only the randomly queried links, but also the related link set of each queried positive link to A t .
For fair comparisons, each of these compared methods uses the same parameter set to train the MNA model and predicts anchor links by the trained model.
In the first group of experiments, we study the performances of the proposed active learning methods on anchor link prediction with different numbers of queries when the degree of data imbalance is given. In addition, in real-world anchor link prediction, the negative anchor links are much more than the positive anchor links, so in this group of experiments we can set R N P to be a number which is obviously larger than 1.0 . We have done several tests and find that when setting R N P to different values which are obviously larger than 1.0 (e.g., 5, 10, 15, 20, 40), similar conclusions can be drew from the performance comparisons. So here we set R N P = 10.0 , and conduct the performance comparisons. In each round of the cross validation, we set R t = 0.5 and use different methods to query 0 , 10 , 20 , , 60 times in the query pool P , then add the acquired links to the training set A t . The performances of all compared methods under different number of queries are compared in Figure 2a–c. And each method’s average performance rank, which is averaged over its performance ranks on different numbers of queries in all of these 3 figures (e.g., in each of these 3 figures, MC’s list of performance ranks on different numbers of queries is { 1 , 1 , 2 , 2 , 1 , 1 } , so its average rank over these 3 figures is ( 4 × 1 + 2 × 2 ) × 3 / ( 6 × 3 ) .), is shown in Figure 2d.
In the second group of experiments, we set R t = 0.5 and test the performances of our methods with different imbalanced datasets. In each round of the cross validation, we sample anchor links as the experimental data samples according to different imbalance ratios, i.e., Negative-Positive Rates ( R N P ). In addition, in each round of experiment, we set the number of queries for each method (except MNA) as 60. The performances of all compared methods under different imbalance ratios are compared in Figure 3a–c. In addition, similar to Figure 2d, each method’s average performance rank, which is averaged over its performance ranks on different Negative-Positive Rates in all of these 3 figures, is shown in Figure 3d.
According to the results in Figure 2 and Figure 3, we can analyze and conclude as follows:
  • Overall, MC outperforms other methods on the anchor link prediction. However, the listed performances of BBC are not much worse than MC. In addition, compared with BBC, MC needs a reasonable validation set to do anchor link prediction. So to the anchor link prediction problem, MC would be the best choice if we have enough labeled anchor links to form a reasonable validation set. However, when the labeled anchor links in the validation set are not sufficient, the sample distribution of the validation set can be very different from the sample distribution of the overall experimental data. In addition, thus according to what we analyzed in the definition of Equation (5), the computed potential entropies of MC in the query pool are not precise, which can result in the bad performances of MC. So in this circumstance, BBC would be a better choice.
  • According to the average rank of each compared method, BBC performs better than BC. However, BMC cannot perform better than MC. To understand this, we can suppose that there exist two anchor links in P , whose basic entropies are the same, and related link sets contain the same amount of information. In addition, thus from these two links, the MC prefers to identify the one with bigger P M ( 1 | a ) (See Equation (5)). Furthermore, according to the definition of P M ( 1 | a ) , the bigger P M ( 1 | a ) is, the more likely a is to be a positive anchor link. So we can see MC already has a reasonable mechanism to prefer the potentially positive links. As a result, adding a new mechanism of preferring potential positive links is not easy to make MC perform better. Because this new mechanism may make MC focus on identifying the links that are easy to be correctly predicted as positive, but neglect some informative links whose labels are hard to be correctly predicted. And this may also be the reason why BMC cannot outperform BBC in these experiments.
  • All of our proposed Constrained Active Learning methods perform better than EA, it proves the value of applying the one-to-one constraint to the active learning in anchor link prediction problem.
  • In the same experiment, the performance ranks of each method on metrics F1, Prec. and Rec. are almost the same.

5.4. Portability Experiments

The proposed constrained active learning methods are integrated with the MNA method. And among them, we have proved that the MC and BBC methods have great values on improving the performances of MNA in the previous experiments. However, whether our constrained active learning methods can also work well on other existing anchor link prediction techniques remains to be proved. So in this subsection, we will firstly change the basic anchor link prediction method of the proposed approach (Here, we use M to represent it) in different ways: (1) set M = M 1 when the classifier of M is replaced with the one in [10]; (2) set M = M 2 when the classifier of M is replaced with the one in [9]; (3) set M = M 3 when the One-to-One matching algorithm of M is changed to the GUARD algorithm, which is proposed in [30]. Then we will conduct experiments to test the effects of MC and BBC together with other baseline query methods on improving the performances of M 1 , M 2 and M 3 , respectively. In this way to analyze their portability to other state-of-art supervised anchor link prediction techniques.
Similar to Section 5.3, the compared methods in each group of the portability experiments are as follows:
  • M: The basic anchor link prediction method (which can be set as M 1 , M 2 or M 3 ). It will be directly used as a base-line method.
  • MC-M: Integrating the proposed Mean-entropy-based Cons- trained Active Learning (MC) method to M.
  • BBC-M: Integrating the proposed Biased Basic-entropy-based Constrained Active Learning (BBC) method to M.
  • EA-M: Integrating the Entropy-based Active Learning (EA) method to M. It will be used as a base-line method.
  • NRQ-M and CRQ-M: Two base-line query methods integrated to method M for better comparison. One is the Normal Random Query (NRQ); the other is the Constrained Random Query (CRQ).
In the experiments, we test the performances of these compared methods with different imbalanced datasets. In each round of cross validation, we sample anchor links as the experimental data samples according to different imbalance ratios, i.e., Negative-Positive Rates ( R N P ). In addition, in each round of experiment, we set R t = 0.3 and the number of queries for each method (except M) as 30. From the results, we notice that the performance ranks of each method on metrics F1, Prec. and Rec. in each experiment are almost the same, that is consistent with what we concluded from the experimental results in SubSection 5.3. As a result, in order to save the space, in Figure 4, we only show the performance comparison results on metric F1.
As it shows in Figure 4, the effects of MC and BBC together with other baseline query methods on improving the performances of M 1 , M 2 and M 3 are compared in Figure 4a–c, respectively. In addition, similar to Figure 2d, each query method’s average performance rank, which is averaged over its performance ranks on different Negative-Positive Rates in all of these 3 figures, is shown in Figure 4d. From the results, we can see our MC and BBC methods perform significantly better than other base-line query methods on improving the performances of other state-of-art supervised anchor link prediction techniques. In addition, in most cases, MC can achieve better effects than BBC. As a result, we can convince that our MC and BBC have great values on improving the performances of many different supervised anchor link prediction techniques, and it is better to choose MC when enough labeled links can be collected to form a reasonable validation set.

6. Conclusions

This paper is the first to describe and study the problem of applying active learning on anchor link prediction across multiple heterogeneous social networks. Based on the one-to-one constraint of the anchor link prediction problem, we design several Constrained Active Learning methods. Different from the traditional query methods, our constraint active learning methods can label more than one link after an unlabeled anchor link has been queried. Furthermore, we design different mechanisms, so that to make sure our methods can acquire more information when the maximum number of queries and sample set for query have been given. We choose the MNA method as our basic anchor link prediction method, and conduct our experiments on the anchor links between two real-world social networks, Foursquare and Twitter. Then we conduct experiments to test the effects of our MC and BBC methods on improving the performances of other state-of-art anchor link prediction techniques. The results show that our MC and BBC can adapt to many different supervised anchor link prediction models, and in general, MC outperforms other compared query methods on anchor link prediction. However, the BBC method can be a better choice if we do not have enough labeled anchor links to form a reasonable validation set but want to achieve good enough results. Our future works include the study on how to select a validation set with a moderate size for the MC method, and the computation for the optimal value of the parameter Δ δ in Algorithm 2.

Acknowledgments

This work is supported in part by the National Key fundamental Research and Development Program of China (No. 2013CB329601, No. 2013CB329604, No. 2013CB329606), National Key Research and Development Program of China (No. 2016QY03D0601, No. 2016QY03D0603), National Natural Science Foundation of China (No. 61502517, No. 61372191, No. 61572492). This work is also funded by the major pre-research project of National University of Defense Technology.

Author Contributions

Junxing Zhu and Jiawei Zhang are the main authors who proposed the idea, performed the experiments and wrote the manuscript. Philip S. Yu offered sufficient guidances on the model buiding and experiment designing. Quanyuan Wu, Yan Jia, Bin Zhou, Xiaokai Wei and Philip S. Yu revised the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kong, X.; Zhang, J.; Yu, P.S. Inferring anchor links across multiple heterogeneous social networks. In Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, San Francisco, CA, USA, 27 October–1 November 2013; pp. 179–188. [Google Scholar]
  2. Zhang, J.; Philip, S.Y. Multiple anonymized social networks alignment. In Proceedings of the 2015 IEEE 15th International Conference on Data Mining, Atlantic City, NJ, USA, 14–17 November 2015; pp. 599–608. [Google Scholar]
  3. Pu, J.; Teng, Z.; Gong, R.; Wen, C.; Xu, Y. Sci-Fin: Visual Mining Spatial and Temporal Behavior Features from Social Media. Sensors 2016, 16, 2194. [Google Scholar] [CrossRef] [PubMed]
  4. Zhang, J.; Kong, X.; Philip, S.Y. Predicting social links for new users across aligned heterogeneous social networks. In Proceedings of the 2013 IEEE 13th International Conference on Data Mining, Dallas, TX, USA, 7–10 December 2013; pp. 1289–1294. [Google Scholar]
  5. Liu, D.; Wu, Q.Y. Cross-Platform User Profile Matching in Online Social Networks. Appl. Mech. Mater. 2013, 380, 1955–1958. [Google Scholar] [CrossRef]
  6. Nie, Y.; Huang, J.; Li, A.; Zhou, B. Identifying users based on behavioral-modeling across social media sites. In Proceedings of the 16th Asia-Pacific Web Conference, Changsha, China, 23–25 September 2014; pp. 48–55. [Google Scholar]
  7. Zhang, Y.; Tang, J.; Yang, Z.; Pei, J.; Yu, P.S. Cosnet: Connecting heterogeneous social networks with local and global consistency. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 10–13 August 2015; pp. 1485–1494. [Google Scholar]
  8. Lu, C.T.; Shuai, H.H.; Yu, P.S. Identifying your customers in social networks. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, Shanghai, China, 3–7 November 2014; pp. 391–400. [Google Scholar]
  9. Zafarani, R.; Liu, H. Connecting users across social media sites: a behavioral-modeling approach. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, USA, 11–14 August 2013; pp. 41–49. [Google Scholar]
  10. Malhotra, A.; Totti, L.; Meira, W., Jr.; Kumaraguru, P.; Almeida, V. Studying user footprints in different online social networks. In Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), Istanbul, Turkey, 26–29 August 2012; pp. 1065–1070. [Google Scholar]
  11. Liu, S.; Wang, S.; Zhu, F.; Zhang, J.; Krishnan, R. Hydra: Large-scale social identity linkage via heterogeneous behavior modeling. In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, Snowbird, UT, USA, 22–27 June 2014; pp. 51–62. [Google Scholar]
  12. Vosecky, J.; Hong, D.; Shen, V.Y. User identification across multiple social networks. In Proceedings of the 2009 First International Conference on Networked Digital Technologies, Ostrava, Czech Republic, 28–31 July 2009; pp. 360–365. [Google Scholar]
  13. Backstrom, L.; Dwork, C.; Kleinberg, J. Wherefore art thou r3579x? Anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th International Conference on World Wide Web, Banff, AB, Canada, 8–12 May 2007; ACM: New York, NY, USA, 2007; pp. 181–190. [Google Scholar]
  14. Settles, B.; Craven, M. An analysis of active learning strategies for sequence labeling tasks. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, Honolulu, HI, USA, 25–27 October 2008; pp. 1070–1079. [Google Scholar]
  15. Settles, B. Active Learning Literature Survey; Technical Report; University of Wisconsin: Madison, WI, USA, 2010. [Google Scholar]
  16. Roy, N.; McCallum, A. Toward optimal active learning through monte carlo estimation of error reduction. In Proceedings of the 18th International Conference on Machine Learning, Williamstown, MA, USA, 28 June–1 July 2001; pp. 441–448. [Google Scholar]
  17. Tong, S.; Koller, D. Support vector machine active learning with applications to text classification. J. Mach. Learn. Res. 2001, 2, 45–66. [Google Scholar]
  18. Chattopadhyay, R.; Wang, Z.; Fan, W.; Davidson, I.; Panchanathan, S.; Ye, J. Batch mode active sampling based on marginal probability distribution matching. ACM Trans. Knowl. Discov. Data (TKDD) 2013, 7, 13. [Google Scholar] [CrossRef]
  19. Wang, Z.; Ye, J. Querying discriminative and representative samples for batch mode active learning. ACM Trans. Knowl. Discov. Data (TKDD) 2015, 9, 17. [Google Scholar] [CrossRef]
  20. Bilgic, M.; Getoor, L. Link-based active learning. In Proceedings of the NIPS Workshop on Analyzing Networks and Learning with Graphs, Whistler, BC, Canada, 11 December 2009. [Google Scholar]
  21. Bilgic, M.; Mihalkova, L.; Getoor, L. Active learning for networked data. In Proceedings of the 27th International Conference on Machine Learning (ICML-10), Haifa, Israel, 21–24 June 2010; pp. 79–86. [Google Scholar]
  22. Xu, Z.; Kersting, K.; Joachims, T. Fast active exploration for link-based preference learning using gaussian processes. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Barcelona, Spain, 20–24 September 2010; pp. 499–514. [Google Scholar]
  23. Bhattacharya, I.; Getoor, L. Collective entity resolution in relational data. ACM Trans. Knowl. Discov. Data (TKDD) 2007, 1, 5. [Google Scholar] [CrossRef]
  24. Tsikerdekis, M.; Zeadally, S. Multiple account identity deception detection in social media using nonverbal behavior. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1311–1321. [Google Scholar] [CrossRef]
  25. Liben-Nowell, D.; Kleinberg, J. The link-prediction problem for social networks. J. Am. Soc. Inf. Sci. Technol. 2007, 58, 1019–1031. [Google Scholar] [CrossRef]
  26. Wang, C.; Satuluri, V.; Parthasarathy, S. Local probabilistic models for link prediction. In Proceedings of the 7th IEEE International Conference on Data Mining, Omaha, NE, USA, 28–31 October 2007; pp. 322–331. [Google Scholar]
  27. Al Hasan, M.; Chaoji, V.; Salem, S.; Zaki, M. Link prediction using supervised learning. In Proceedings of the SDM06: Workshop on Link Analysis, Counter-terrorism and Security, Bethesda, MD, USA, 2006. [Google Scholar]
  28. Wang, D.; Pedreschi, D.; Song, C.; Giannotti, F.; Barabasi, A.L. Human mobility, social ties, and link prediction. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, 21–24 August 2011; ACM: New York, NY, USA, 2011; pp. 1100–1108. [Google Scholar]
  29. Benchettara, N.; Kanawati, R.; Rouveirol, C. Supervised machine learning applied to link prediction in bipartite social networks. In Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Odense, Denmark, 9–11 August 2010; pp. 326–330. [Google Scholar]
  30. Goga, O.; Loiseau, P.; Sommer, R.; Teixeira, R.; Gummadi, K.P. On the Reliability of Profile Matching Across Large Online Social Networks. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Hilton, Sydney, 10–13 August 2015; ACM: New York, NY, USA, 2015; pp. 1799–1808. [Google Scholar]
  31. Zhang, J.; Philip, S.Y. Integrated Anchor and Social Link Predictions across Social Networks. In Proceedings of the 24th International Joint Conference on Artificial Intelligence, Buenos Aires, Argentina, 25–31 July 2015; pp. 2125–2132. [Google Scholar]
  32. Pan, W.; Xiang, E.W.; Liu, N.N.; Yang, Q. Transfer Learning in Collaborative Filtering for Sparsity Reduction. In Proceedings of the 24th AAAI Conference on Artificial Intelligence, Atlanta, GA, USA, 2010; Volume 10, pp. 230–235. [Google Scholar]
  33. Yan, M.; Sang, J.; Xu, C.; Hossain, M.S. A Unified Video Recommendation by Cross-Network User Modeling. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 2016, 12, 53. [Google Scholar] [CrossRef]
  34. Yan, M.; Sang, J.; Xu, C. Unified youtube video recommendation via cross-network collaboration. In Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, Shanghai, China, 23–26 June 2015; ACM: New York, NY, USA, 2015; pp. 19–26. [Google Scholar]
  35. Bordes, A.; Ertekin, S.; Weston, J.; Bottou, L. Fast Kernel Classifiers With Online And Active Learning. J. Mach. Learn. Res. 2005, 6, 1579–1619. [Google Scholar]
  36. Tuia, D.; Pasolli, E.; Emery, W.J. Using active learning to adapt remote sensing image classifiers. Remote Sens. Environ. 2011, 115, 2232–2242. [Google Scholar] [CrossRef]
  37. Rahhal, M.M.A.; Bazi, Y.; Alhichri, H.; Alajlan, N.; Melgani, F.; Yager, R.R. Deep learning approach for active classification of electrocardiogram signals. Inf. Sci. 2016, 345, 340–354. [Google Scholar] [CrossRef]
  38. Bellala, G.; Stanley, J.; Bhavnani, S.K.; Scott, C. A Rank-Based Approach to Active Diagnosis. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 35, 2078–2090. [Google Scholar] [CrossRef] [PubMed]
  39. Zhao, X.; Li, M.; Xu, J.; Song, G. An effective procedure exploiting unlabeled data to build monitoring system. Expert Syst. Appl. Int. J. 2011, 38, 10199–10204. [Google Scholar] [CrossRef]
  40. Jiang, P.; Hu, Z.; Liu, J.; Yu, S.; Wu, F. Fault Diagnosis Based on Chemical Sensor Data with an Active Deep Neural Network. Sensors 2016, 16, 1695. [Google Scholar] [CrossRef] [PubMed]
  41. Isele, R.; Bizer, C. Active learning of expressive linkage rules using genetic programming. Web Semant. Sci. Serv. Agents World Wide Web 2013, 23, 2–15. [Google Scholar] [CrossRef]
  42. Xiong, S.; Azimi, J.; Fern, X.Z. Active learning of constraints for semi-supervised clustering. IEEE Trans. Knowl. Data Eng. 2014, 26, 43–54. [Google Scholar] [CrossRef]
Figure 1. An example of active learning for anchor link prediction.
Figure 1. An example of active learning for anchor link prediction.
Sensors 17 01786 g001
Figure 2. The comparisons of different query methods’ performances on anchor link prediction. We do different numbers of queries in the query set. (a) F1-measure; (b) Precision; (c) Recall; (d) Average Rank.
Figure 2. The comparisons of different query methods’ performances on anchor link prediction. We do different numbers of queries in the query set. (a) F1-measure; (b) Precision; (c) Recall; (d) Average Rank.
Sensors 17 01786 g002
Figure 3. The comparisons of different query methods’ performances on anchor link prediction. We use different Negative-Positive Rates in both training and test sets. (a) F1-measure; (b) Precision; (c) Recall; (d) Average Rank.
Figure 3. The comparisons of different query methods’ performances on anchor link prediction. We use different Negative-Positive Rates in both training and test sets. (a) F1-measure; (b) Precision; (c) Recall; (d) Average Rank.
Sensors 17 01786 g003
Figure 4. The comparisons of different query methods’ effects on improving the performances of different anchor link prediction techniques. We use different Negative-Positive Rates in both training and test sets. (a) M = M 1 ; (b) M = M 2 ; (c) M = M 3 ; (d) Average Rank.
Figure 4. The comparisons of different query methods’ effects on improving the performances of different anchor link prediction techniques. We use different Negative-Positive Rates in both training and test sets. (a) M = M 1 ; (b) M = M 2 ; (c) M = M 3 ; (d) Average Rank.
Sensors 17 01786 g004
Table 1. Properties of the Heterogeneous Social Networks.
Table 1. Properties of the Heterogeneous Social Networks.
PropertyNetwork
TwitterFoursquare
# nodeuser600600
user/tip889,9259012
location41,1967578
# linkfriend/follow66403611
write889,9259012
locate48,2689012

Share and Cite

MDPI and ACS Style

Zhu, J.; Zhang, J.; Wu, Q.; Jia, Y.; Zhou, B.; Wei, X.; Yu, P.S. Constrained Active Learning for Anchor Link Prediction Across Multiple Heterogeneous Social Networks. Sensors 2017, 17, 1786. https://doi.org/10.3390/s17081786

AMA Style

Zhu J, Zhang J, Wu Q, Jia Y, Zhou B, Wei X, Yu PS. Constrained Active Learning for Anchor Link Prediction Across Multiple Heterogeneous Social Networks. Sensors. 2017; 17(8):1786. https://doi.org/10.3390/s17081786

Chicago/Turabian Style

Zhu, Junxing, Jiawei Zhang, Quanyuan Wu, Yan Jia, Bin Zhou, Xiaokai Wei, and Philip S. Yu. 2017. "Constrained Active Learning for Anchor Link Prediction Across Multiple Heterogeneous Social Networks" Sensors 17, no. 8: 1786. https://doi.org/10.3390/s17081786

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop