Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pritam Gundecha is active.

Publication


Featured researches published by Pritam Gundecha.


Synthesis Lectures on Data Mining and Knowledge Discovery | 2013

Provenance Data in Social Media

Geoffrey Barbier; Zhuo Feng; Pritam Gundecha; Huan Liu

Social media shatters the barrier to communicate anytime anywhere for people of all walks of life. The publicly available, virtually free information in social media poses a new challenge to consumers who have to discern whether a piece of information published in social media is reliable. For example, it can be difficult to understand the motivations behind a statement passed from one user to another, without knowing the person who originated the message. Additionally, false information can be propagated through social media, resulting in embarrassment or irreversible damages. Provenance data associated with a social media statement can help dispel rumors, clarify opinions, and confirm facts. However, provenance data about social media statements is not readily available to users today. Currently, providing this data to users requires changing the social media infrastructure or offering subscription services. Taking advantage of social media features, research in this nascent field spearheads the search for a way to provide provenance data to social media users, thus leveraging social media itself by mining it for the provenance data. Searching for provenance data reveals an interesting problem space requiring the development and application of new metrics in order to provide meaningful provenance data to social media users. This lecture reviews the current research on information provenance, explores exciting research opportunities to address pressing needs, and shows how data mining can enable a social media user to make informed judgements about statements published in social media. Table of Contents: Information Provenance in Social Media / Provenance Attributes / Provenance via Network Information / Provenance Data


sensor mesh and ad hoc communications and networks | 2010

Multi-Constrained Anypath Routing in Wireless Mesh Networks

Xi Fang; Dejun Yang; Pritam Gundecha; Guoliang Xue

Anypath routing has been proposed to improve the performance of unreliable wireless networks by exploiting the spatial diversity and broadcast nature of the wireless medium. In this paper, we focus on anypath routing subject to K constraints, and present a polynomial time K-approximation algorithm. When K = 1, our algorithm is the optimal polynomial time algorithm for the corresponding problem. When K >= 2, the corresponding problem is NP-hard. We are the first to present an O(1)-approximation algorithm. Furthermore, our algorithm is as simple as Dijkstras shortest path algorithm, and is therefore suitable for implementation in actual wireless routing protocols.


knowledge discovery and data mining | 2013

A tool for collecting provenance data in social media

Pritam Gundecha; Suhas Ranganath; Zhuo Feng; Huan Liu

In recent years, social media sites have provided a large amount of information. Recipients of such information need mechanisms to know more about the received information, including the provenance. Previous research has shown that some attributes related to the received information provide additional context, so that a recipient can assess the amount of value, trust, and validity to be placed in the received information. Personal attributes of a user, including name, location, education, ethnicity, gender, and political and religious affiliations, can be found in social media sites. In this paper, we present a novel web-based tool for collecting the attributes of interest associated with a particular social media user related to the received information. This tool provides a way to combine different attributes available at different social media sites into a single user profile. Using different types of Twitter users, we also evaluate the performance of the tool in terms of number of attribute values collected, validity of these values, and total amount of retrieval time.


conference on information and knowledge management | 2013

Seeking provenance of information using social media

Pritam Gundecha; Zhuo Feng; Huan Liu

Social media propagates breaking news and disinformation alike fast and on an unsurpassed scale. Because of its democratizing nature, social media users can easily produce, receive, and propagate a piece of information without necessarily providing traceable information. Thus, there are no means for a user to verify the provenance (aka sources or originators) of information. The disinformation can cause tragic consequences to society and individuals. This work aims to take advantage of characteristics of social media to provide a solution to the problem of lacking traceable information. Such knowledge can provide additional context to received information such that a user can assess how much value, trust, and validity should be placed in it. In this paper, we are studying a novel research problem that facilitates the seeking of the provenance of information for a few known recipients (less than 1% of the total recipients) by recovering the paths it has taken from its originators. The proposed methodology exploits easily computable node centralities of a large social media network. The experimental results with Facebook and Twitter datasets show that the proposed mechanism is effective in correctly identifying the additional recipients and seeking the provenance of information.


ACM Transactions on Knowledge Discovery From Data | 2014

User Vulnerability and Its Reduction on a Social Networking Site

Pritam Gundecha; Geoffrey Barbier; Jiliang Tang; Huan Liu

Privacy and security are major concerns for many users of social media. When users share information (e.g., data and photos) with friends, they can make their friends vulnerable to security and privacy breaches with dire consequences. With the continuous expansion of a user’s social network, privacy settings alone are often inadequate to protect a user’s profile. In this research, we aim to address some critical issues related to privacy protection: (1) How can we measure and assess individual users’ vulnerability? (2) With the diversity of one’s social network friends, how can one figure out an effective approach to maintaining balance between vulnerability and social utility? In this work, first we present a novel way to define vulnerable friends from an individual user’s perspective. User vulnerability is dependent on whether or not the user’s friends’ privacy settings protect the friend and the individual’s network of friends (which includes the user). We show that it is feasible to measure and assess user vulnerability and reduce one’s vulnerability without changing the structure of a social networking site. The approach is to unfriend one’s most vulnerable friends. However, when such a vulnerable friend is also socially important, unfriending him or her would significantly reduce one’s own social status. We formulate this novel problem as vulnerability minimization with social utility constraints. We formally define the optimization problem and provide an approximation algorithm with a proven bound. Finally, we conduct a large-scale evaluation of a new framework using a Facebook dataset. We resort to experiments and observe how much vulnerability an individual user can be decreased by unfriending a vulnerable friend. We compare performance of different unfriending strategies and discuss the security risk of new friend requests. Additionally, by employing different forms of social utility, we confirm that the balance between user vulnerability and social utility can be practically achieved.


advances in social networks analysis and mining | 2013

Recovering information recipients in social media via provenance

Zhuo Feng; Pritam Gundecha; Huan Liu

In recent years, social media has changed the way we interact and communicate. Although the existing structure of social media allows users to easily create, receive, and propagate pieces of information, many a time, users do not have background knowledge about the received information, including the provenance (sources or originators) of information, and other recipients who may have retransmitted or modified the information. Providing such additional context to the received information can help users know how much value, trust, and validity should be placed in received information. To judge the credibility of the received piece of information, it is vital to know who are its sources, and how information propagates from sources to other social media users. In this paper, we are studying a novel research problem that facilitates a few known recipients to recover other unknown recipients, and seek the provenance of information. The experimental results with Facebook and Twitter datasets show that the proposed algorithm is effective in correctly recovering the unknown recipients and seeking the provenance of information.


conference on information and knowledge management | 2013

A tool for assisting provenance search in social media

Suhas Ranganath; Pritam Gundecha; Huan Liu

In recent years, social media sites are witnessing an information explosion. Determining the reliability of such a large amount of information is a major area of research. Information provenance (aka, sources or origin) provides a way to measure the reliability of information in social networks. The main challenge in seeking provenance is the availability of suitable data consisting of sufficient unique propagation paths. Knowledge of the actual propagation paths for a piece of information will be a valuable asset in provenance search. This paper presents a tool for capturing the propagation network of a given tweet or URL (Uniform Resource Locator) in the Twitter network. Researchers can use this tool to collect information propagation data, design effective strategies for determining the provenance, and gain information about the tweet such as impact, growth rate and users influencing the spread. Two case studies are presented to demonstrate the effectiveness of the system for seeking provenance information.


Archive | 2012

Mining Social Media: A Brief Introduction

Pritam Gundecha; Huan Liu


knowledge discovery and data mining | 2011

Exploiting vulnerability to secure user privacy on a social networking site

Pritam Gundecha; Geoffrey Barbier; Huan Liu


intelligent user interfaces | 2017

How May I Help You?: Modeling Twitter Customer ServiceConversations Using Fine-Grained Dialogue Acts

Shereen Oraby; Pritam Gundecha; Jalal Mahmud; Mansurul Bhuiyan; Rama Akkiraju

Collaboration


Dive into the Pritam Gundecha's collaboration.

Top Co-Authors

Avatar

Huan Liu

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Zhuo Feng

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jiliang Tang

Michigan State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dejun Yang

Colorado School of Mines

View shared research outputs
Top Co-Authors

Avatar

Guoliang Xue

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Shereen Oraby

University of California

View shared research outputs
Top Co-Authors

Avatar

Xi Fang

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge