SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Chapter 5
Positive & Negative Relationships
Saeid Ghasemshirazi
Android Malware Adventures
Relationships
2
Networks, Crowds, Markets: Reasoning about a Highly Connected World
 Positive Relationships
 Negative Relationships
Android Malware Adventures
Positive Relationships
3
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
Negative Relationships
4
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
Structural Balance
5
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
Structural Balance: Complete Graphs
6
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
Structural Balance Property
7
Networks, Crowds, Markets: Reasoning about a Highly Connected World
For every set of three nodes, if we consider the
three edges connecting them, either all three of
these edges are labeled +, or else exactly one of
them is labeled +
Android Malware Adventures
Balance theorem
8
Networks, Crowds, Markets: Reasoning about a Highly Connected World
If a complete graph is balanced then either all pairs of nodes are friends or else the
nodes can be divided into two groups, X and Y, such that:
 The people in X all like one another, likewise in Y
 Everyone in X is the enemy of everyone in Y
Android Malware Adventures
Proof of the Balance Theorem, arbitrary A
9
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Recall:
 Every two nodes in X are friends.
 Every two nodes in Y are friends.
 Every node in X is an enemy of every node in Y .
Android Malware Adventures
Applications of Structural Balance
10
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Use for Friendships
--------------------
Use for Antagonist
the nations GB, Fr, Ru, It, Ge,and AH are Great Britain, France, Russia, Italy, Germany, and Austria-Hungary respectively
Android Malware Adventures
Applications of Structural Balance
11
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
Weak Structured Balanced Networks
12
Networks, Crowds, Markets: Reasoning about a Highly Connected World
There is no set of three nodes
such that the edges amongst
them consist of two positive
edges and one negative edge
We allow a triangle that is all
negative, unlike structured
balanced networks
Characterization theorem:
If a labeled complete graph is
weakly balanced then it’s nodes
can be divided into groups that
that every two nodes in the same
group are friends and every two
nodes in different groups are
enemies
Android Malware Adventures
Allowing negative triangles : Weakly Balanced Networks
13
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
Essentially same proof as before
14
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
Structural Balance in Non-Complete(Arbitrary) Networks
15
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
Structural Balance in Non-Complete Networks (Disallowing negative cycles)
16
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Two equivalent definitions:
Local view :
a (non-complete) graph is balanced if it can be “completed” by adding edges to form a signed complete graph that is
balanced .
Global view :
we could define a signed graph to be balanced if it is possible to divide the nodes into two sets X and Y ,such that any
edge with both ends inside X or both ends inside Y is positive, and any edge with one end in X and the other in Y is
negative
Android Malware Adventures
Structural Balance in Non-Complete Networks (Disallowing negative cycles)
17
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Two equivalent definitions
Android Malware Adventures
Characterization
18
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Theorem:
A signed graph is balanced if and only if it contains no cycle with an odd number(2k+1) of negative edges
Android Malware Adventures
Proof(Create Positive Supernodes)
19
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Convert the graph to a reduced one in which there are only negative edges
Reduced graph
Android Malware Adventures
Negative cycle in supernode graph gives negative cycle in original graph
20
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
Negative cycle in supernode graph gives negative cycle in original graph
21
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Android Malware Adventures
BFS of the Reduces Graph
22
Networks, Crowds, Markets: Reasoning about a Highly Connected World
The BFS has a cross edge if the graph is not bipartite
If the graph is bipartite then we can add even(2k) layers to X,
odd(2k+1) to Y, and all negative edges go between X and Y
If the graph is not bipartite, there is a negative odd cycle (2k+1)
A more standard drawing of the reduced graph
node G as the starting root node
The D-A,D-B path have the same length k
Android Malware Adventures
What if we only know that most triangles are balanced?
23
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Claim:
If at least 99.9% of all triangles in a labeled complete graph are balanced, then either
• there is a set consisting of at least 90% of the nodes in which at least 90% of all pairs are friends, or
else.
• the nodes can be divided into two groups, X and Y , such that:
(i)at least 90% of the pairs in X like each other.
(ii) at least 90% of the pairs in Y like each other.
(iii) at least 90% of the pairs with one end in X and the other end in Y are enemies.
.
Android Malware Adventures
Approximately Balanced Networks(General Statement)
24
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Theorem:
Let 𝜖 be any real 0 ≤ 𝜖 < 1/8, and let 𝛿 = 𝜖
1
3.
If at least 1 − 𝜖 of the triangles in a complete labeled graph are balanced then either
 There is a set consisting of 1 − 𝛿 of the nodes where at least 1 − 𝛿 of the pairs are
friends, or else
 The nodes can be divided into two sets X,Y, such that
At least 1 − 𝛿 of the pairs in X like each other
At least 1 − 𝛿 of the pairs in Y like each other
At least 1 − 𝛿 of the pairs with one edge in X and the other in Y are enemies.
In Balance Theorem: 𝜖=0 , 𝛿=0
In Approximately Balance Network:𝜖=0.001 , 𝛿=0.1
Android Malware Adventures
Approximately Balanced Networks Proof
25
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Assume graph is balanced, show it has one of the two forms
• As before, define two sets X and Y to be friends and enemies of some node A
• A must be a “good” node: a node that isn’t involved in too many unbalanced triangles
• Given a complete graph with N nodes
How many edges?
N(N-1)/2
How many triangles?
N(N-1)(N-2)/6
Triangles with A,B,C : ABC; ACB; BAC; BCA; CAB; and CBA
Android Malware Adventures
Approximately Balanced Networks Proof
26
Networks, Crowds, Markets: Reasoning about a Highly Connected World
There are at most ε N(N-1)(N-2)/6 unbalanced triangles
• Find each node’s weight: the number of unbalanced triangles it participates in
• Total weight of all nodes : 3N(N − 1)(N − 2)/6 =N(N − 1)(N − 2)/2
• Average weight of all nodes : N(N − 1)(N − 2)/2 *1/N=ε (N-1)(N-2)/2
• Pick some node A with weight less than the average They actually use at most ε N^2/2
• Since A is involved in less than ε N^2/2 unbalanced triangles, properties
within and between X and Y fail < ε N^2/2 times .
• Determine if one of X or Y is “small”
If so, most nodes are in a single mutually friendly group
If not, the nodes are divided into two mutually friendly groups who are mutual enemies
Android Malware Adventures
Approximately Balanced Networks Proof
27
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Let x =|X| be the number of nodes in X and y = |Y| be the number of nodes in Y
• Suppose first that X is big, x≥(1-δ)N
•
X has x(x-1)/2 internal edges
•
X contains at least (1-δ)N of the nodes
• At least (1-δ)N of the pairs in X are friends
• Same arguments hold if Y is big
Android Malware Adventures
Approximately Balanced Networks Proof
28
Networks, Crowds, Markets: Reasoning about a Highly Connected World
Suppose neither X nor Y is big:
 x<(1-δ)N
 y<(1-δ)N
• There are XY edges between, at least xy≤δ N^2/2
• There are at most ε N2/2 positive edges with one end in X and the other
in Y , so as a fraction of the total this is at most:
• There are x(x-1)/2 internal edges in X (same for Y)
• Since x>δN, this total is at most δ^2 N^2/2 (internal edges)
• There are at most ε N2/2 negative edges with one end in X and the other
in Y , so as a fraction of the total this is at most :

Weitere ähnliche Inhalte

Ähnlich wie Positive and Negative Relationship

Active attacks in social networks
Active attacks in social networksActive attacks in social networks
Active attacks in social networksAlberto Ragonese
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...Daniel Katz
 
The Slashdot Zoo: Mining a Social Network with Negative Edges
The Slashdot Zoo:  Mining a Social Network with Negative EdgesThe Slashdot Zoo:  Mining a Social Network with Negative Edges
The Slashdot Zoo: Mining a Social Network with Negative EdgesJérôme KUNEGIS
 
4 musatov
4 musatov4 musatov
4 musatovYandex
 
Complexity Play&Learn
Complexity Play&LearnComplexity Play&Learn
Complexity Play&LearnMassimo Conte
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Tin180 VietNam
 
Towards controlling evolutionary dynamics through network geometry: some very...
Towards controlling evolutionary dynamics through network geometry: some very...Towards controlling evolutionary dynamics through network geometry: some very...
Towards controlling evolutionary dynamics through network geometry: some very...Kolja Kleineberg
 
Quantum persistent k cores for community detection
Quantum persistent k cores for community detectionQuantum persistent k cores for community detection
Quantum persistent k cores for community detectionColleen Farrelly
 
An Introduction to Graph Databases
An Introduction to Graph DatabasesAn Introduction to Graph Databases
An Introduction to Graph DatabasesInfiniteGraph
 
Lecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdfLecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdfclararoumany1
 
Lecture5:Social Network Analysis-By Dr. Y. Narahari
Lecture5:Social Network Analysis-By Dr. Y. NarahariLecture5:Social Network Analysis-By Dr. Y. Narahari
Lecture5:Social Network Analysis-By Dr. Y. Naraharimunicsaa
 
Lecture5:Social Network Analysis-By Dr. Y. Narahari
Lecture5:Social Network Analysis-By Dr. Y. NarahariLecture5:Social Network Analysis-By Dr. Y. Narahari
Lecture5:Social Network Analysis-By Dr. Y. Naraharimunicsaa
 
The Hidden Geometry of Multiplex Networks @ Next Generation Network Analytics
The Hidden Geometry of Multiplex Networks @ Next Generation Network Analytics The Hidden Geometry of Multiplex Networks @ Next Generation Network Analytics
The Hidden Geometry of Multiplex Networks @ Next Generation Network Analytics Kolja Kleineberg
 
Simplicial closure and higher-order link prediction
Simplicial closure and higher-order link predictionSimplicial closure and higher-order link prediction
Simplicial closure and higher-order link predictionAustin Benson
 
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSA NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSijaia
 
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSA NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSgerogepatton
 
Algorithmic Data Science = Theory + Practice
Algorithmic Data Science = Theory + PracticeAlgorithmic Data Science = Theory + Practice
Algorithmic Data Science = Theory + PracticeTwo Sigma
 
08 Exponential Random Graph Models (ERGM)
08 Exponential Random Graph Models (ERGM)08 Exponential Random Graph Models (ERGM)
08 Exponential Random Graph Models (ERGM)dnac
 

Ähnlich wie Positive and Negative Relationship (20)

Active attacks in social networks
Active attacks in social networksActive attacks in social networks
Active attacks in social networks
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
 
The Slashdot Zoo: Mining a Social Network with Negative Edges
The Slashdot Zoo:  Mining a Social Network with Negative EdgesThe Slashdot Zoo:  Mining a Social Network with Negative Edges
The Slashdot Zoo: Mining a Social Network with Negative Edges
 
4 musatov
4 musatov4 musatov
4 musatov
 
Complexity Play&Learn
Complexity Play&LearnComplexity Play&Learn
Complexity Play&Learn
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
Towards controlling evolutionary dynamics through network geometry: some very...
Towards controlling evolutionary dynamics through network geometry: some very...Towards controlling evolutionary dynamics through network geometry: some very...
Towards controlling evolutionary dynamics through network geometry: some very...
 
Quantum persistent k cores for community detection
Quantum persistent k cores for community detectionQuantum persistent k cores for community detection
Quantum persistent k cores for community detection
 
tutorial_kearns
tutorial_kearnstutorial_kearns
tutorial_kearns
 
An Introduction to Graph Databases
An Introduction to Graph DatabasesAn Introduction to Graph Databases
An Introduction to Graph Databases
 
Lecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdfLecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdf
 
Lecture5:Social Network Analysis-By Dr. Y. Narahari
Lecture5:Social Network Analysis-By Dr. Y. NarahariLecture5:Social Network Analysis-By Dr. Y. Narahari
Lecture5:Social Network Analysis-By Dr. Y. Narahari
 
Lecture5:Social Network Analysis-By Dr. Y. Narahari
Lecture5:Social Network Analysis-By Dr. Y. NarahariLecture5:Social Network Analysis-By Dr. Y. Narahari
Lecture5:Social Network Analysis-By Dr. Y. Narahari
 
The Hidden Geometry of Multiplex Networks @ Next Generation Network Analytics
The Hidden Geometry of Multiplex Networks @ Next Generation Network Analytics The Hidden Geometry of Multiplex Networks @ Next Generation Network Analytics
The Hidden Geometry of Multiplex Networks @ Next Generation Network Analytics
 
Simplicial closure and higher-order link prediction
Simplicial closure and higher-order link predictionSimplicial closure and higher-order link prediction
Simplicial closure and higher-order link prediction
 
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSA NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
 
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSA NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
 
Algorithmic Data Science = Theory + Practice
Algorithmic Data Science = Theory + PracticeAlgorithmic Data Science = Theory + Practice
Algorithmic Data Science = Theory + Practice
 
08 Exponential Random Graph Models (2016)
08 Exponential Random Graph Models (2016)08 Exponential Random Graph Models (2016)
08 Exponential Random Graph Models (2016)
 
08 Exponential Random Graph Models (ERGM)
08 Exponential Random Graph Models (ERGM)08 Exponential Random Graph Models (ERGM)
08 Exponential Random Graph Models (ERGM)
 

Mehr von SaeidGhasemshirazi

Deep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai BotnetDeep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai BotnetSaeidGhasemshirazi
 
All Things Considered: An Analysis of IoT Devices on Home Networks
All Things Considered: An Analysis of IoT Devices on Home NetworksAll Things Considered: An Analysis of IoT Devices on Home Networks
All Things Considered: An Analysis of IoT Devices on Home NetworksSaeidGhasemshirazi
 
Understing the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securityUndersting the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securitySaeidGhasemshirazi
 
All Things Considered: An Analysis of IoT Devices on Home Networks.pptx
All Things Considered: An Analysis of IoT Devices on Home Networks.pptxAll Things Considered: An Analysis of IoT Devices on Home Networks.pptx
All Things Considered: An Analysis of IoT Devices on Home Networks.pptxSaeidGhasemshirazi
 
A Novel Aprroach for smart contract audit.pdf
A Novel Aprroach for smart contract audit.pdfA Novel Aprroach for smart contract audit.pdf
A Novel Aprroach for smart contract audit.pdfSaeidGhasemshirazi
 
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based DevicesIoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based DevicesSaeidGhasemshirazi
 
تامین امنیت در قراردادهای هوشمند | Smart Contract Security
تامین امنیت در قراردادهای هوشمند | Smart Contract Securityتامین امنیت در قراردادهای هوشمند | Smart Contract Security
تامین امنیت در قراردادهای هوشمند | Smart Contract SecuritySaeidGhasemshirazi
 
Virtual sports club Presentation(Startup idea)
Virtual sports club Presentation(Startup idea)Virtual sports club Presentation(Startup idea)
Virtual sports club Presentation(Startup idea)SaeidGhasemshirazi
 
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامین
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامینThe zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامین
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامینSaeidGhasemshirazi
 
Security in sdn/nfv and 5 g network
Security in sdn/nfv and 5 g networkSecurity in sdn/nfv and 5 g network
Security in sdn/nfv and 5 g networkSaeidGhasemshirazi
 
Business model canvas | بوم مدل کسب و کار
Business model canvas | بوم مدل کسب و کارBusiness model canvas | بوم مدل کسب و کار
Business model canvas | بوم مدل کسب و کارSaeidGhasemshirazi
 
CyberlLogitec Service Dominant Business Model Radar
CyberlLogitec Service Dominant Business Model RadarCyberlLogitec Service Dominant Business Model Radar
CyberlLogitec Service Dominant Business Model RadarSaeidGhasemshirazi
 
Clubhouse strategy | بررسی استراتژی کلاب هوس
Clubhouse strategy | بررسی استراتژی کلاب هوسClubhouse strategy | بررسی استراتژی کلاب هوس
Clubhouse strategy | بررسی استراتژی کلاب هوسSaeidGhasemshirazi
 
اختلال و نفوذ در شبکه از طریق حفره های امنیتی
اختلال و نفوذ در شبکه از طریق حفره های امنیتیاختلال و نفوذ در شبکه از طریق حفره های امنیتی
اختلال و نفوذ در شبکه از طریق حفره های امنیتیSaeidGhasemshirazi
 
انواع ارزیابی های امنیتی و مراحل تست و نفوذ
انواع ارزیابی های امنیتی و مراحل تست  و نفوذانواع ارزیابی های امنیتی و مراحل تست  و نفوذ
انواع ارزیابی های امنیتی و مراحل تست و نفوذSaeidGhasemshirazi
 
Android Penetration Testing(Android Security)
Android Penetration Testing(Android Security)Android Penetration Testing(Android Security)
Android Penetration Testing(Android Security)SaeidGhasemshirazi
 
تحلیل و بررسی استراتژِی های شرکت گوگل و یاهو
تحلیل و بررسی استراتژِی های شرکت گوگل و یاهوتحلیل و بررسی استراتژِی های شرکت گوگل و یاهو
تحلیل و بررسی استراتژِی های شرکت گوگل و یاهوSaeidGhasemshirazi
 
انواع مختلف شرکت ها و اطلاعات مربوط به آنها
انواع مختلف شرکت ها و اطلاعات مربوط به آنهاانواع مختلف شرکت ها و اطلاعات مربوط به آنها
انواع مختلف شرکت ها و اطلاعات مربوط به آنهاSaeidGhasemshirazi
 
خلاصه فصل سوم کتاب تست مامان
خلاصه فصل سوم کتاب تست مامانخلاصه فصل سوم کتاب تست مامان
خلاصه فصل سوم کتاب تست مامانSaeidGhasemshirazi
 

Mehr von SaeidGhasemshirazi (20)

Deep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai BotnetDeep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai Botnet
 
All Things Considered: An Analysis of IoT Devices on Home Networks
All Things Considered: An Analysis of IoT Devices on Home NetworksAll Things Considered: An Analysis of IoT Devices on Home Networks
All Things Considered: An Analysis of IoT Devices on Home Networks
 
Understing the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securityUndersting the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot security
 
All Things Considered: An Analysis of IoT Devices on Home Networks.pptx
All Things Considered: An Analysis of IoT Devices on Home Networks.pptxAll Things Considered: An Analysis of IoT Devices on Home Networks.pptx
All Things Considered: An Analysis of IoT Devices on Home Networks.pptx
 
A Novel Aprroach for smart contract audit.pdf
A Novel Aprroach for smart contract audit.pdfA Novel Aprroach for smart contract audit.pdf
A Novel Aprroach for smart contract audit.pdf
 
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based DevicesIoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
 
تامین امنیت در قراردادهای هوشمند | Smart Contract Security
تامین امنیت در قراردادهای هوشمند | Smart Contract Securityتامین امنیت در قراردادهای هوشمند | Smart Contract Security
تامین امنیت در قراردادهای هوشمند | Smart Contract Security
 
Virtual sports club Presentation(Startup idea)
Virtual sports club Presentation(Startup idea)Virtual sports club Presentation(Startup idea)
Virtual sports club Presentation(Startup idea)
 
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامین
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامینThe zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامین
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامین
 
Security in sdn/nfv and 5 g network
Security in sdn/nfv and 5 g networkSecurity in sdn/nfv and 5 g network
Security in sdn/nfv and 5 g network
 
Business model canvas | بوم مدل کسب و کار
Business model canvas | بوم مدل کسب و کارBusiness model canvas | بوم مدل کسب و کار
Business model canvas | بوم مدل کسب و کار
 
CyberlLogitec Service Dominant Business Model Radar
CyberlLogitec Service Dominant Business Model RadarCyberlLogitec Service Dominant Business Model Radar
CyberlLogitec Service Dominant Business Model Radar
 
Clubhouse strategy | بررسی استراتژی کلاب هوس
Clubhouse strategy | بررسی استراتژی کلاب هوسClubhouse strategy | بررسی استراتژی کلاب هوس
Clubhouse strategy | بررسی استراتژی کلاب هوس
 
اختلال و نفوذ در شبکه از طریق حفره های امنیتی
اختلال و نفوذ در شبکه از طریق حفره های امنیتیاختلال و نفوذ در شبکه از طریق حفره های امنیتی
اختلال و نفوذ در شبکه از طریق حفره های امنیتی
 
انواع ارزیابی های امنیتی و مراحل تست و نفوذ
انواع ارزیابی های امنیتی و مراحل تست  و نفوذانواع ارزیابی های امنیتی و مراحل تست  و نفوذ
انواع ارزیابی های امنیتی و مراحل تست و نفوذ
 
Android Penetration Testing(Android Security)
Android Penetration Testing(Android Security)Android Penetration Testing(Android Security)
Android Penetration Testing(Android Security)
 
Amazon mission statement
Amazon mission statementAmazon mission statement
Amazon mission statement
 
تحلیل و بررسی استراتژِی های شرکت گوگل و یاهو
تحلیل و بررسی استراتژِی های شرکت گوگل و یاهوتحلیل و بررسی استراتژِی های شرکت گوگل و یاهو
تحلیل و بررسی استراتژِی های شرکت گوگل و یاهو
 
انواع مختلف شرکت ها و اطلاعات مربوط به آنها
انواع مختلف شرکت ها و اطلاعات مربوط به آنهاانواع مختلف شرکت ها و اطلاعات مربوط به آنها
انواع مختلف شرکت ها و اطلاعات مربوط به آنها
 
خلاصه فصل سوم کتاب تست مامان
خلاصه فصل سوم کتاب تست مامانخلاصه فصل سوم کتاب تست مامان
خلاصه فصل سوم کتاب تست مامان
 

Kürzlich hochgeladen

Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPirithiRaju
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubaikojalkojal131
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRlizamodels9
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuinethapagita
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Carbon Dioxide Capture and Storage (CSS)
Carbon Dioxide Capture and Storage (CSS)Carbon Dioxide Capture and Storage (CSS)
Carbon Dioxide Capture and Storage (CSS)Tamer Koksalan, PhD
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptJoemSTuliba
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxJorenAcuavera1
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPirithiRaju
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》rnrncn29
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...D. B. S. College Kanpur
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxBerniceCayabyab1
 
Bioteknologi kelas 10 kumer smapsa .pptx
Bioteknologi kelas 10 kumer smapsa .pptxBioteknologi kelas 10 kumer smapsa .pptx
Bioteknologi kelas 10 kumer smapsa .pptx023NiWayanAnggiSriWa
 

Kürzlich hochgeladen (20)

Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
Carbon Dioxide Capture and Storage (CSS)
Carbon Dioxide Capture and Storage (CSS)Carbon Dioxide Capture and Storage (CSS)
Carbon Dioxide Capture and Storage (CSS)
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.ppt
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptx
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdf
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
 
Bioteknologi kelas 10 kumer smapsa .pptx
Bioteknologi kelas 10 kumer smapsa .pptxBioteknologi kelas 10 kumer smapsa .pptx
Bioteknologi kelas 10 kumer smapsa .pptx
 

Positive and Negative Relationship

  • 1. Chapter 5 Positive & Negative Relationships Saeid Ghasemshirazi
  • 2. Android Malware Adventures Relationships 2 Networks, Crowds, Markets: Reasoning about a Highly Connected World  Positive Relationships  Negative Relationships
  • 3. Android Malware Adventures Positive Relationships 3 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 4. Android Malware Adventures Negative Relationships 4 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 5. Android Malware Adventures Structural Balance 5 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 6. Android Malware Adventures Structural Balance: Complete Graphs 6 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 7. Android Malware Adventures Structural Balance Property 7 Networks, Crowds, Markets: Reasoning about a Highly Connected World For every set of three nodes, if we consider the three edges connecting them, either all three of these edges are labeled +, or else exactly one of them is labeled +
  • 8. Android Malware Adventures Balance theorem 8 Networks, Crowds, Markets: Reasoning about a Highly Connected World If a complete graph is balanced then either all pairs of nodes are friends or else the nodes can be divided into two groups, X and Y, such that:  The people in X all like one another, likewise in Y  Everyone in X is the enemy of everyone in Y
  • 9. Android Malware Adventures Proof of the Balance Theorem, arbitrary A 9 Networks, Crowds, Markets: Reasoning about a Highly Connected World Recall:  Every two nodes in X are friends.  Every two nodes in Y are friends.  Every node in X is an enemy of every node in Y .
  • 10. Android Malware Adventures Applications of Structural Balance 10 Networks, Crowds, Markets: Reasoning about a Highly Connected World Use for Friendships -------------------- Use for Antagonist the nations GB, Fr, Ru, It, Ge,and AH are Great Britain, France, Russia, Italy, Germany, and Austria-Hungary respectively
  • 11. Android Malware Adventures Applications of Structural Balance 11 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 12. Android Malware Adventures Weak Structured Balanced Networks 12 Networks, Crowds, Markets: Reasoning about a Highly Connected World There is no set of three nodes such that the edges amongst them consist of two positive edges and one negative edge We allow a triangle that is all negative, unlike structured balanced networks Characterization theorem: If a labeled complete graph is weakly balanced then it’s nodes can be divided into groups that that every two nodes in the same group are friends and every two nodes in different groups are enemies
  • 13. Android Malware Adventures Allowing negative triangles : Weakly Balanced Networks 13 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 14. Android Malware Adventures Essentially same proof as before 14 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 15. Android Malware Adventures Structural Balance in Non-Complete(Arbitrary) Networks 15 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 16. Android Malware Adventures Structural Balance in Non-Complete Networks (Disallowing negative cycles) 16 Networks, Crowds, Markets: Reasoning about a Highly Connected World Two equivalent definitions: Local view : a (non-complete) graph is balanced if it can be “completed” by adding edges to form a signed complete graph that is balanced . Global view : we could define a signed graph to be balanced if it is possible to divide the nodes into two sets X and Y ,such that any edge with both ends inside X or both ends inside Y is positive, and any edge with one end in X and the other in Y is negative
  • 17. Android Malware Adventures Structural Balance in Non-Complete Networks (Disallowing negative cycles) 17 Networks, Crowds, Markets: Reasoning about a Highly Connected World Two equivalent definitions
  • 18. Android Malware Adventures Characterization 18 Networks, Crowds, Markets: Reasoning about a Highly Connected World Theorem: A signed graph is balanced if and only if it contains no cycle with an odd number(2k+1) of negative edges
  • 19. Android Malware Adventures Proof(Create Positive Supernodes) 19 Networks, Crowds, Markets: Reasoning about a Highly Connected World Convert the graph to a reduced one in which there are only negative edges Reduced graph
  • 20. Android Malware Adventures Negative cycle in supernode graph gives negative cycle in original graph 20 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 21. Android Malware Adventures Negative cycle in supernode graph gives negative cycle in original graph 21 Networks, Crowds, Markets: Reasoning about a Highly Connected World
  • 22. Android Malware Adventures BFS of the Reduces Graph 22 Networks, Crowds, Markets: Reasoning about a Highly Connected World The BFS has a cross edge if the graph is not bipartite If the graph is bipartite then we can add even(2k) layers to X, odd(2k+1) to Y, and all negative edges go between X and Y If the graph is not bipartite, there is a negative odd cycle (2k+1) A more standard drawing of the reduced graph node G as the starting root node The D-A,D-B path have the same length k
  • 23. Android Malware Adventures What if we only know that most triangles are balanced? 23 Networks, Crowds, Markets: Reasoning about a Highly Connected World Claim: If at least 99.9% of all triangles in a labeled complete graph are balanced, then either • there is a set consisting of at least 90% of the nodes in which at least 90% of all pairs are friends, or else. • the nodes can be divided into two groups, X and Y , such that: (i)at least 90% of the pairs in X like each other. (ii) at least 90% of the pairs in Y like each other. (iii) at least 90% of the pairs with one end in X and the other end in Y are enemies. .
  • 24. Android Malware Adventures Approximately Balanced Networks(General Statement) 24 Networks, Crowds, Markets: Reasoning about a Highly Connected World Theorem: Let 𝜖 be any real 0 ≤ 𝜖 < 1/8, and let 𝛿 = 𝜖 1 3. If at least 1 − 𝜖 of the triangles in a complete labeled graph are balanced then either  There is a set consisting of 1 − 𝛿 of the nodes where at least 1 − 𝛿 of the pairs are friends, or else  The nodes can be divided into two sets X,Y, such that At least 1 − 𝛿 of the pairs in X like each other At least 1 − 𝛿 of the pairs in Y like each other At least 1 − 𝛿 of the pairs with one edge in X and the other in Y are enemies. In Balance Theorem: 𝜖=0 , 𝛿=0 In Approximately Balance Network:𝜖=0.001 , 𝛿=0.1
  • 25. Android Malware Adventures Approximately Balanced Networks Proof 25 Networks, Crowds, Markets: Reasoning about a Highly Connected World Assume graph is balanced, show it has one of the two forms • As before, define two sets X and Y to be friends and enemies of some node A • A must be a “good” node: a node that isn’t involved in too many unbalanced triangles • Given a complete graph with N nodes How many edges? N(N-1)/2 How many triangles? N(N-1)(N-2)/6 Triangles with A,B,C : ABC; ACB; BAC; BCA; CAB; and CBA
  • 26. Android Malware Adventures Approximately Balanced Networks Proof 26 Networks, Crowds, Markets: Reasoning about a Highly Connected World There are at most ε N(N-1)(N-2)/6 unbalanced triangles • Find each node’s weight: the number of unbalanced triangles it participates in • Total weight of all nodes : 3N(N − 1)(N − 2)/6 =N(N − 1)(N − 2)/2 • Average weight of all nodes : N(N − 1)(N − 2)/2 *1/N=ε (N-1)(N-2)/2 • Pick some node A with weight less than the average They actually use at most ε N^2/2 • Since A is involved in less than ε N^2/2 unbalanced triangles, properties within and between X and Y fail < ε N^2/2 times . • Determine if one of X or Y is “small” If so, most nodes are in a single mutually friendly group If not, the nodes are divided into two mutually friendly groups who are mutual enemies
  • 27. Android Malware Adventures Approximately Balanced Networks Proof 27 Networks, Crowds, Markets: Reasoning about a Highly Connected World Let x =|X| be the number of nodes in X and y = |Y| be the number of nodes in Y • Suppose first that X is big, x≥(1-δ)N • X has x(x-1)/2 internal edges • X contains at least (1-δ)N of the nodes • At least (1-δ)N of the pairs in X are friends • Same arguments hold if Y is big
  • 28. Android Malware Adventures Approximately Balanced Networks Proof 28 Networks, Crowds, Markets: Reasoning about a Highly Connected World Suppose neither X nor Y is big:  x<(1-δ)N  y<(1-δ)N • There are XY edges between, at least xy≤δ N^2/2 • There are at most ε N2/2 positive edges with one end in X and the other in Y , so as a fraction of the total this is at most: • There are x(x-1)/2 internal edges in X (same for Y) • Since x>δN, this total is at most δ^2 N^2/2 (internal edges) • There are at most ε N2/2 negative edges with one end in X and the other in Y , so as a fraction of the total this is at most :