In this dissertation, we address challenging social computing problems in personalized recommender systems and social media information mining. We tap into probabilistic graphical models, including directed and undirected graphical models, to model a large number of observed and unobserved variables as well as various dependency relationships between variables, and develop efficient computation algorithms that exploit the graph structure to solve the problems. In recommender systems, we propose probabilistic graphical models for Collaborative Filtering (CF) algorithms in various problem settings, and solve them using Belief Propagation (BP) algorithms that allow scalable and distributed implementations. Firstly, user similarities are comput...
Studies of online social behaviour indicate that users often fail to specify privacy settings that m...
Data sparsity, scalability and prediction quality have been recognized as the three most crucial cha...
The current fight between security experts and malware authors is an arms race. In this race, malwar...
One of the major hurdles preventing the full exploitation of information from online communities is ...
We introduce a novel extension of the iterative classification algorithm to heterogeneous graphs and...
Collaborative filtering (CF) is a common recommendation mechanism that relies on user-item ratings. ...
We propose a method to determine the credibility of messages that are posted in participatory media ...
Recommender systems are becoming tools of choice to select the online information relevant to a give...
Graphs (or networks) are now omnipresent, infusing into many aspects of society. This dissertation c...
Conference paperData sparsity, scalability and prediction quality have been recognized as the three ...
Abstract. In this paper, we focus on the challenge that users face in processing messages on the web...
This paper addresses the issue of social recommendation based on collaborative filtering (CF) algori...
275 pagesThe main contributions of this thesis can be organized under two main themes: knowledge dis...
Online Social Networks (OSNs) have become prevalent in people’s daily life. Facebook, Twitter, and I...
The recent growth of social networking platforms also led to the emergence of social spammers, who o...
Studies of online social behaviour indicate that users often fail to specify privacy settings that m...
Data sparsity, scalability and prediction quality have been recognized as the three most crucial cha...
The current fight between security experts and malware authors is an arms race. In this race, malwar...
One of the major hurdles preventing the full exploitation of information from online communities is ...
We introduce a novel extension of the iterative classification algorithm to heterogeneous graphs and...
Collaborative filtering (CF) is a common recommendation mechanism that relies on user-item ratings. ...
We propose a method to determine the credibility of messages that are posted in participatory media ...
Recommender systems are becoming tools of choice to select the online information relevant to a give...
Graphs (or networks) are now omnipresent, infusing into many aspects of society. This dissertation c...
Conference paperData sparsity, scalability and prediction quality have been recognized as the three ...
Abstract. In this paper, we focus on the challenge that users face in processing messages on the web...
This paper addresses the issue of social recommendation based on collaborative filtering (CF) algori...
275 pagesThe main contributions of this thesis can be organized under two main themes: knowledge dis...
Online Social Networks (OSNs) have become prevalent in people’s daily life. Facebook, Twitter, and I...
The recent growth of social networking platforms also led to the emergence of social spammers, who o...
Studies of online social behaviour indicate that users often fail to specify privacy settings that m...
Data sparsity, scalability and prediction quality have been recognized as the three most crucial cha...
The current fight between security experts and malware authors is an arms race. In this race, malwar...