skip to main content
10.1145/2998181.2998257acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Uncovering Influence Cookbooks: Reverse Engineering the Topological Impact in Peer Ranking Services

Published: 25 February 2017 Publication History

Abstract

Ensuring the early detection of important social network users is a challenging task. Some peer ranking services are now well established, such as PeerIndex, Klout, or Kred. Their function is to rank users according to their influence. This notion of influence is however abstract, and the algorithms achieving this ranking are opaque. Following the rising demand for a more transparent web, we explore the problem of gaining knowledge by reverse engineering such peer ranking services, with regards to the social network topology they get as an input. Since these services exploit the online activity of users (and therefore their connectivity in social networks), we provide a precise evaluation of how topological metrics of the social network impact the final user ranking. Our approach is the following: we first model the ranking service as a black-box with which we interact by creating user profiles and by performing operations on them. Through those profiles, we trigger some slight topological modifications. By monitoring the impact of these modifications on the rankings of those profiles, we infer the weight of each topological metric in the black-box, thus reversing the service influence cookbook.

References

[1]
S. P. Borgatti and M. G. Everett. A graph-theoretic perspective on centrality. Social networks, 2006.
[2]
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. NSDI, 2012.
[3]
S. Feczak and L. Hossain. Exploring computer supported collaborative coordination through social networks. The Journal of High Technology Management Research, 22(2) :121--140, 2011.
[4]
S. Golliher. How i reverse engineered klout score to an r2 = 0.94. blog post, 2011.
[5]
L. Hossain, A. Wu, and K. K. S. Chung. Actor centrality correlates to project based coordination. CSCW, pages 363--372, 2006.
[6]
D. Koschützki, K. A. Lehmann, L. Peeters, S. Richter, D. Tenfelde-Podehl, and O. Zlotowski. Network Analysis : Methodological Foundations, chapter Centrality Indices. Springer, 2005.
[7]
M. Lécuyer, G. Ducoffe, F. Lan, A. Papancea, T. Petsios, R. Spahn, A. Chaintreau, and R. Geambasu. Xray : Enhancing the web's transparency with differential correlation. USENIX Security Symposium, 2014.
[8]
Newman. A measure of betweenness centrality based on random walks. Social Networks, 27(1) :39--54, 2005.
[9]
F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Stealing machine learning models via prediction apis. In USENIX Security, 2016.

Cited By

View all
  • (2021)Setting the Record Straighter on Shadow BanningIEEE INFOCOM 2021 - IEEE Conference on Computer Communications10.1109/INFOCOM42981.2021.9488792(1-10)Online publication date: 10-May-2021
  • (2017)The Topological Face of RecommendationComplex Networks & Their Applications VI10.1007/978-3-319-72150-7_72(897-908)Online publication date: 27-Nov-2017

Index Terms

  1. Uncovering Influence Cookbooks: Reverse Engineering the Topological Impact in Peer Ranking Services

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CSCW '17: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing
      February 2017
      2556 pages
      ISBN:9781450343350
      DOI:10.1145/2998181
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 February 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. centrality metrics
      2. influence
      3. ranking functions
      4. reverve engineering
      5. social graphs

      Qualifiers

      • Research-article

      Conference

      CSCW '17
      Sponsor:
      CSCW '17: Computer Supported Cooperative Work and Social Computing
      February 25 - March 1, 2017
      Oregon, Portland, USA

      Acceptance Rates

      CSCW '17 Paper Acceptance Rate 183 of 530 submissions, 35%;
      Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

      Upcoming Conference

      CSCW '24

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Setting the Record Straighter on Shadow BanningIEEE INFOCOM 2021 - IEEE Conference on Computer Communications10.1109/INFOCOM42981.2021.9488792(1-10)Online publication date: 10-May-2021
      • (2017)The Topological Face of RecommendationComplex Networks & Their Applications VI10.1007/978-3-319-72150-7_72(897-908)Online publication date: 27-Nov-2017

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media