Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ashkan Aleali is active.

Publication


Featured researches published by Ashkan Aleali.


Archive | 2015

Diffusion in Social Networks

Paulo Shakarian; Abhinav Bhatnagar; Ashkan Aleali; Elham Shaabani; Ruocheng Guo

This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models). A variety of properties and problems related to these models are discussed including identifying seeds sets to initiate diffusion, game theoretic problems, predicting diffusion events, and more. The book explores numerous connections between social network diffusion research and artificial intelligence through topics such as agent-based modeling, logic programming, game theory, learning, and data mining. The book also surveys key empirical results in social network diffusion, and reviews the classic and cutting-edge research with a focus on open problems.


Annals of Mathematics and Artificial Intelligence | 2016

Belief revision in structured probabilistic argumentation

Paulo Shakarian; Gerardo I. Simari; Geoffrey Moores; Damon Paulo; Simon Parsons; Marcelo Alejandro Falappa; Ashkan Aleali

In real-world applications, knowledge bases consisting of all the available information for a specific domain, along with the current state of affairs, will typically contain contradictory data, coming from different sources, as well as data with varying degrees of uncertainty attached. An important aspect of the effort associated with maintaining such knowledge bases is deciding what information is no longer useful; pieces of information may be outdated; may come from sources that have recently been discovered to be of low quality; or abundant evidence may be available that contradicts them. In this paper, we propose a probabilistic structured argumentation framework that arises from the extension of Presumptive Defeasible Logic Programming (PreDeLP) with probabilistic models, and argue that this formalism is capable of addressing these basic issues. The formalism is capable of handling contradictory and uncertain data, and we study non-prioritized belief revision over probabilistic PreDeLP programs that can help with knowledge-base maintenance. For belief revision, we propose a set of rationality postulates — based on well-known ones developed for classical knowledge bases — that characterize how these belief revision operations should behave, and study classes of operators along with theoretical relationships with the proposed postulates, including representation theorems stating the equivalence between classes of operators and their associated postulates. We then demonstrate how our framework can be used to address the attribution problem in cyber security/cyber warfare.


Archive | 2015

Evolutionary Graph Theory

Paulo Shakarian; Abhinav Bhatnagar; Ashkan Aleali; Elham Shaabani; Ruocheng Guo

Evolutionary graph theory (EGT), studies the ability of a mutant gene to overtake a finite structured population. In this chapter, we describe the original framework for EGT and the major work that has followed it. Here, we will study the calculation of the “fixation probability”—the probability of a mutant taking over a population and focuses on game-theoretic applications. We look at varying topics such as alternate evolutionary dynamics, time to fixation, special topological cases, and game theoretic results.


Archive | 2015

The Independent Cascade and Linear Threshold Models

Paulo Shakarian; Abhinav Bhatnagar; Ashkan Aleali; Elham Shaabani; Ruocheng Guo

In this chapter, we focus on perhaps the two most prevalent diffusion models in computer science—the independent cascade and linear threshold models. We describe different properties of these models and how these properties affect solving problems such as influence maximization and influence spread. We describe approaches to address influence maximization problem in independent cascade model and linear threshold model that rely on the maximization of submodular functions—as well as extensions to these approaches for larger datasets.


knowledge discovery and data mining | 2015

Early Identification of Violent Criminal Gang Members

Elham Shaabani; Ashkan Aleali; Paulo Shakarian; John Bertetto

Gang violence is a major problem in the United States accounting for a large fraction of homicides and other violent crime. In this paper, we study the problem of early identification of violent gang members. Our approach relies on modified centrality measures that take into account additional data of the individuals in the social network of co-arrestees which together with other arrest metadata provide a rich set of features for a classification algorithm. We show our approach obtains high precision and recall (0.89 and 0.78 respectively) in the case where the entire network is known and out-performs current approaches used by law-enforcement to the problem in the case where the network is discovered overtime by virtue of new arrests - mimicking real-world law-enforcement operations. Operational issues are also discussed as we are preparing to leverage this method in an operational environment.


advances in social networks analysis and mining | 2016

An empirical evaluation of social influence metrics

Nikhil Kumar; Ruocheng Guo; Ashkan Aleali; Paulo Shakarian

Predicting when an individual will adopt a new behavior is an important problem in application domains such as marketing and public health. This paper examines the performance of a wide variety of social network based measurements proposed in the literature - which have not been previously compared directly. We study the probability of an individual becoming influenced based on measurements derived from neighborhood (i.e. number of influencers, personal network exposure), structural diversity, locality, temporal measures, cascade measures, and metadata. We also examine the ability to predict influence based on choice of classifier and how the ratio of positive to negative samples in both training and testing affect prediction results - further enabling practical use of these concepts for social influence applications.


Archive | 2015

Examining Diffusion in the Real World

Paulo Shakarian; Abhinav Bhatnagar; Ashkan Aleali; Elham Shaabani; Ruocheng Guo

Throughout this book, we studied a variety of diffusion models that are commonly seen in the literature of computer science, physics, and biology. In this chapter, we study diffusion processes from a data-driven perspective—specifiably reviewing the early identification of information cascades that will diffuse through a large portion of the network.


Archive | 2015

The SIR Model and Identification of Spreaders

Paulo Shakarian; Abhinav Bhatnagar; Ashkan Aleali; Elham Shaabani; Ruocheng Guo

In this chapter, we review the classic susceptible-infected-recovered (SIR) model for disease spread as applied to a social network. In particular, we look at the problem of identifying nodes that are “spreaders” which cause a large part of the population to become infected under this model. To do so, we survey a variety of nodal measures based on centrality (degree, betweenness, etc.) and other methods (shell decomposition, nearest neighbor analysis, etc.). We then present a set of experiments that illustrate the relation of these nodal measures to spreading under the SIR model.


Archive | 2015

Logic Programming Based Diffusion Models

Paulo Shakarian; Abhinav Bhatnagar; Ashkan Aleali; Elham Shaabani; Ruocheng Guo

In this chapter, we first show that the well-known generalized annotated program (GAP) paradigm can be used to express many existing diffusion models that can consider not only the topology of the social network, but attributes of the nodes and edges as well. We then define a class of problems called Social Network Diffusion Optimization Problems (SNDOPs). In this chapter, we show how various diffusion processes can be embedded as GAP’s and then study the algorithmic and complexity issues associated with SDNOP’s. Experimental results are also included.


Archive | 2015

The Tipping Model and the Minimum Seed Problem

Paulo Shakarian; Abhinav Bhatnagar; Ashkan Aleali; Elham Shaabani; Ruocheng Guo

In a “tipping” model, each node in a social network, representing an individual, adopts a property or behavior if a certain number of his incoming neighbors currently exhibit the same. A key problem, with respect to this model, is to select an initial “seed” set from the network such that the entire network adopts any behavior given to the seed. In this chapter, we investigate the problem of identifying a seed set of minimum size—which is NP-hard. We provide exact and heuristic methods for solving this problem as well as a suite of results to not only demonstrate the utility of these methods, but provide insight into the dynamics of the tipping model also.

Collaboration


Dive into the Ashkan Aleali's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elham Shaabani

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Ruocheng Guo

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Geoffrey Moores

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nikhil Kumar

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Gerardo I. Simari

Universidad Nacional del Sur

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge