Network embedding has gained more attentions in recent years. It has been shown that the learned low-dimensional node vector representations could advance a myriad of graph mining tasks such as node classification, community detection, and link prediction. A vast majority of the existing efforts are overwhelmingly devoted to single-layered networks or homogeneous networks with a single type of nodes and node interactions. However, in many real-world applications, a variety of networks could be abstracted and presented in a multilayered fashion. Typical multi-layered networks include critical infrastructure systems, collaboration platforms, social recommender systems, to name a few. Despite the widespread use of multi-layered networks, it remains a daunting task to learn vector representations of different types of nodes due to the bewildering combination of both within-layer connections and cross-layer network dependencies. In this paper, we study a novel problem of multi-layered network embedding. In particular, we propose a principled framework – MANE to model both within-layer connections and cross-layer network dependencies simultaneously in a unified optimization framework for embedding representation learning. Experiments on real-world multi-layered networks corroborate the effectiveness of the proposed framework.
more »
« less
Nucleus I: Adjunction spectra in recommender systems and descent
Recommender systems build user profiles using concept analysis of usage matrices. The concepts are mined as spectra and form Galois connections. Descent is a general method for spectral decomposition in algebraic geometry and topology which also leads to generalized Galois connections. Both recommender systems and descent theory are vast research areas, separated by a technical gap so large that trying to establish a link would seem foolish. Yet a formal link emerged, all on its own, bottom-up, against authors’ intentions and better judgment. Familiar problems of data analysis led to a novel solution in category theory. The present paper arose from a series of earlier efforts to provide a top-down account of these developments.
more »
« less
- Award ID(s):
- 1662487
- PAR ID:
- 10483795
- Publisher / Repository:
- Springer
- Date Published:
- Journal Name:
- Logical Methods in Computer Science
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
null (Ed.)In this paper we develop methods for classifying Baker, Richter, and Szymik's Azumaya algebras over a commutative ring spectrum, especially in the largely inaccessible case where the ring is nonconnective. We give obstruction-theoretic tools, constructing and classifying these algebras and their automorphisms with Goerss–Hopkins obstruction theory, and give descent-theoretic tools, applying Lurie's work on $$\infty$$ -categories to show that a finite Galois extension of rings in the sense of Rognes becomes a homotopy fixed-point equivalence on Brauer spaces. For even-periodic ring spectra $$E$$ , we find that the ‘algebraic’ Azumaya algebras whose coefficient ring is projective are governed by the Brauer–Wall group of $$\pi _0(E)$$ , recovering a result of Baker, Richter, and Szymik. This allows us to calculate many examples. For example, we find that the algebraic Azumaya algebras over Lubin–Tate spectra have either four or two Morita equivalence classes, depending on whether the prime is odd or even, that all algebraic Azumaya algebras over the complex K-theory spectrum $KU$ are Morita trivial, and that the group of the Morita classes of algebraic Azumaya algebras over the localization $KU[1/2]$ is $$\mathbb {Z}/8\times \mathbb {Z}/2$$ . Using our descent results and an obstruction theory spectral sequence, we also study Azumaya algebras over the real K-theory spectrum $KO$ which become Morita-trivial $KU$ -algebras. We show that there exist exactly two Morita equivalence classes of these. The nontrivial Morita equivalence class is realized by an ‘exotic’ $KO$ -algebra with the same coefficient ring as $$\mathrm {End}_{KO}(KU)$$ . This requires a careful analysis of what happens in the homotopy fixed-point spectral sequence for the Picard space of $KU$ , previously studied by Mathew and Stojanoska.more » « less
-
Recommender systems (RS) are effective tools for mitigating information overload and have seen extensive applications across various domains. However, the single focus on utility goals proves to be inadequate in addressing real-world concerns, leading to increasing attention to fairness-aware and diversity-aware RS. While most existing studies explore fairness and diversity independently, we identify strong connections between these two domains. In this survey, we first discuss each of them individually and then dive into their connections. Additionally, motivated by the concepts of user-level and item-level fairness, we broaden the understanding of diversity to encompass not only the item level but also the user level. With this expanded perspective on user and item-level diversity, we re-interpret fairness studies from the viewpoint of diversity. This fresh perspective enhances our understanding of fairness-related work and paves the way for potential future research directions. Papers discussed in this survey along with public code links are available at: https://github.com/YuyingZhao/Awesome-Fairness-and-Diversity-Papers-in-Recommender-Systemsmore » « less
-
With the popularity of online social networks, social recommendations that rely on one's social connections to make personalized recommendations have become possible. This introduces vulnerabilities for an adversarial party to compromise the recommendations for users by utilizing their social connections. In this paper, we propose the targeted poisoning attack on the factorization-based social recommender system in which the attacker aims to promote an item to a group of target users by injecting fake ratings and social connections. We formulate the optimal poisoning attack as a bi-level program and develop an efficient algorithm to find the optimal attacking strategy. We then evaluate the proposed attacking strategy on real-world dataset and demonstrate that the social recommender system is sensitive to the targeted poisoning attack. We find that users in the social recommender system can be attacked even if they do not have direct social connections with the attacker.more » « less
-
Abstract We introduce a notion of algorithmic randomness for algebraic fields. We prove the existence of a continuum of algebraic extensions of that are random according to our definition. We show that there are noncomputable algebraic fields which are not random. We also partially characterize the index set, relative to an oracle, of the set of random algebraic fields computable relative to that oracle. In order to carry out this investigation of randomness for fields, we develop computability in the context of the infinite Galois theory (where the relevant Galois groups are uncountable), including definitions of computable and computably enumerable Galois groups and computability of Haar measure on the Galois groups.more » « less
An official website of the United States government

