Skip to main content

Showing 1–37 of 37 results for author: Zehmakan, A N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.06541  [pdf, ps, other

    cs.SI cs.AI cs.LG

    Graph-based Fake Account Detection: A Survey

    Authors: Ali Safarpoor Dehkordi, Ahad N. Zehmakan

    Abstract: In recent years, there has been a growing effort to develop effective and efficient algorithms for fake account detection in online social networks. This survey comprehensively reviews existing methods, with a focus on graph-based techniques that utilise topological features of social graphs (in addition to account information, such as their shared contents and profile data) to distinguish between… ▽ More

    Submitted 9 July, 2025; originally announced July 2025.

    Comments: 16 Tables, 5 Figures, 41 Pages

    ACM Class: A.1; I.2.6; I.5.1

  2. arXiv:2504.08413  [pdf, other

    cs.SI

    The Impact of External Sources on the Friedkin-Johnsen Model

    Authors: Charlotte Out, Sijing Tu, Stefan Neumann, Ahad N. Zehmakan

    Abstract: To obtain a foundational understanding of timeline algorithms and viral content in shaping public opinions, computer scientists started to study augmented versions of opinion formation models from sociology. In this paper, we generalize the popular Friedkin--Johnsen model to include the effects of external media sources on opinion formation. Our goal is to mathematically analyze the influence of b… ▽ More

    Submitted 11 April, 2025; originally announced April 2025.

    Comments: CIKM'24, fixed Lemma 2.2 & reference

  3. Efficient Algorithms for Minimizing the Kirchhoff Index via Adding Edges

    Authors: Xiaotian Zhou, Ahad N. Zehmakan, Zhongzhi Zhang

    Abstract: The Kirchhoff index, which is the sum of the resistance distance between every pair of nodes in a network, is a key metric for gauging network performance, where lower values signify enhanced performance. In this paper, we study the problem of minimizing the Kirchhoff index by adding edges. We first provide a greedy algorithm for solving this problem and give an analysis of its quality based on th… ▽ More

    Submitted 27 March, 2025; originally announced March 2025.

    Comments: Accepted by IEEE Transactions on Knowledge and Data Engineering

  4. arXiv:2503.01079  [pdf, other

    cs.LG cs.AI

    Depth-Adaptive Graph Neural Networks via Learnable Bakry-'Emery Curvature

    Authors: Asela Hevapathige, Ahad N. Zehmakan, Qing Wang

    Abstract: Graph Neural Networks (GNNs) have demonstrated strong representation learning capabilities for graph-based tasks. Recent advances on GNNs leverage geometric properties, such as curvature, to enhance its representation capabilities by modeling complex connectivity patterns and information flow within graphs. However, most existing approaches focus solely on discrete graph topology, overlooking diff… ▽ More

    Submitted 2 March, 2025; originally announced March 2025.

  5. arXiv:2501.16624  [pdf, other

    cs.SI

    More Efficient Sybil Detection Mechanisms Leveraging Resistance of Users to Attack Requests

    Authors: Ali Safarpoor Dehkordi, Ahad N. Zehmakan

    Abstract: We investigate the problem of sybil (fake account) detection in social networks from a graph algorithms perspective, where graph structural information is used to classify users as sybil and benign. We introduce the novel notion of user resistance to attack requests (friendship requests from sybil accounts). Building on this notion, we propose a synthetic graph data generation framework that suppo… ▽ More

    Submitted 27 January, 2025; originally announced January 2025.

    Comments: This is the full version of the paper accepted in The 24th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2025) with appendices

  6. arXiv:2412.12416  [pdf, other

    cs.LG cs.AI cs.SI

    DeepSN: A Sheaf Neural Framework for Influence Maximization

    Authors: Asela Hevapathige, Qing Wang, Ahad N. Zehmakan

    Abstract: Influence maximization is key topic in data mining, with broad applications in social network analysis and viral marketing. In recent years, researchers have increasingly turned to machine learning techniques to address this problem. They have developed methods to learn the underlying diffusion processes in a data-driven manner, which enhances the generalizability of the solution, and have designe… ▽ More

    Submitted 16 December, 2024; originally announced December 2024.

    Comments: Accepted to AAAI 2025

  7. arXiv:2411.04564  [pdf, ps, other

    cs.SI cs.AI cs.DS

    A Generalisation of Voter Model: Influential Nodes and Convergence Properties

    Authors: Abhiram Manohara, Ahad N. Zehmakan

    Abstract: Consider an undirected graph G, representing a social network, where each node is blue or red, corresponding to positive or negative opinion on a topic. In the voter model, in discrete time rounds, each node picks a neighbour uniformly at random and adopts its colour. Despite its significant popularity, this model does not capture some fundamental real-world characteristics such as the difference… ▽ More

    Submitted 31 May, 2025; v1 submitted 7 November, 2024; originally announced November 2024.

  8. arXiv:2410.22577  [pdf, other

    cs.SI

    Do Stubborn Users Always Cause More Polarization and Disagreement? A Mathematical Study

    Authors: Mohammad Shirzadi, Ahad N. Zehmakan

    Abstract: We study how the stubbornness of social network users influences opinion polarization and disagreement. Our work is in the context of the popular Friedkin-Johnson opinion formation model, where users update their opinion as a function of the opinion of their connections and their own innate opinion. Stubbornness then is formulated in terms of the stress a user puts on its innate opinion. We exam… ▽ More

    Submitted 29 October, 2024; originally announced October 2024.

    Comments: This is the full version of the paper accepted in The 18th ACM International Conference on Web Search and Data Mining (WSDM-2025)

  9. arXiv:2408.13538  [pdf, other

    cs.SI

    Fast Query of Biharmonic Distance in Networks

    Authors: Changan Liu, Ahad N. Zehmakan, Zhongzhi Zhang

    Abstract: The \textit{biharmonic distance} (BD) is a fundamental metric that measures the distance of two nodes in a graph. It has found applications in network coherence, machine learning, and computational graphics, among others. In spite of BD's importance, efficient algorithms for the exact computation or approximation of this metric on large graphs remain notably absent. In this work, we provide severa… ▽ More

    Submitted 24 August, 2024; originally announced August 2024.

  10. arXiv:2407.00062  [pdf, other

    cs.IR

    A First Principles Approach to Trust-Based Recommendation Systems in Social Networks

    Authors: Paras Stefanopoulos, Sourin Chatterjee, Ahad N. Zehmakan

    Abstract: This paper explores recommender systems in social networks which leverage information such as item rating, intra-item similarities, and trust graph. We demonstrate that item-rating information is more influential than other information types in a collaborative filtering approach. The trust graph-based approaches were found to be more robust to network adversarial attacks due to hard-to-manipulate… ▽ More

    Submitted 21 February, 2025; v1 submitted 17 June, 2024; originally announced July 2024.

  11. arXiv:2312.15819  [pdf, other

    cs.SI cs.AI cs.DS

    Viral Marketing in Social Networks with Competing Products

    Authors: Ahad N. Zehmakan, Xiaotian Zhou, Zhongzhi Zhang

    Abstract: Consider a directed network where each node is either red (using the red product), blue (using the blue product), or uncolored (undecided). Then in each round, an uncolored node chooses red (resp. blue) with some probability proportional to the number of its red (resp. blue) out-neighbors. What is the best strategy to maximize the expected final number of red nodes given the budget to select $k$ r… ▽ More

    Submitted 25 December, 2023; originally announced December 2023.

    Comments: AAMAS-2024

  12. arXiv:2312.15140  [pdf, other

    cs.SI cs.DS cs.MA math.CO physics.soc-ph

    Majority-based Preference Diffusion on Social Networks

    Authors: Ahad N. Zehmakan

    Abstract: We study a majority based preference diffusion model in which the members of a social network update their preferences based on those of their connections. Consider an undirected graph where each node has a strict linear order over a set of $α$ alternatives. At each round, a node randomly selects two adjacent alternatives and updates their relative order with the majority view of its neighbors. We… ▽ More

    Submitted 22 December, 2023; originally announced December 2023.

    Comments: AAMAS-2024

  13. Graph-Based Generalization of Galam Model: Convergence Time and Influential Nodes

    Authors: Sining Li, Ahad N. Zehmakan

    Abstract: We study a graph-based generalization of the Galam opinion formation model. Consider a simple connected graph which represents a social network. Each node in the graph is colored either blue or white, which indicates a positive or negative opinion on a new product or a topic. In each discrete-time round, all nodes are assigned randomly to groups of different sizes, where the node(s) in each group… ▽ More

    Submitted 21 December, 2023; v1 submitted 20 December, 2023; originally announced December 2023.

    Comments: Change the color of one paragraph on page 5

    Journal ref: Physics 2023, 5, 1094-1108

  14. arXiv:2309.06392  [pdf, ps, other

    cs.SI cs.AI

    A Fast Algorithm for Moderating Critical Nodes via Edge Removal

    Authors: Changan Liu, Xiaotian Zhou, Ahad N. Zehmakan, Zhongzhi Zhang

    Abstract: Critical nodes in networks are extremely vulnerable to malicious attacks to trigger negative cascading events such as the spread of misinformation and diseases. Therefore, effective moderation of critical nodes is very vital for mitigating the potential damages caused by such malicious diffusions. The current moderation methods are computationally expensive. Furthermore, they disregard the fundame… ▽ More

    Submitted 9 September, 2023; originally announced September 2023.

  15. arXiv:2309.03551  [pdf, other

    cs.NI

    Inter-Domain Routing with Extensible Criteria

    Authors: Seyedali Tabaeiaghdaei, Marc Wyss, Giacomo Giuliari, Jelte van Bommel, Ahad N. Zehmakan, Adrian Perrig

    Abstract: With the rapid evolution and diversification of Internet applications, their communication-quality criteria are continuously evolving. To globally optimize communication quality, the Internet's control plane thus needs to optimize inter-domain paths on diverse criteria, and should provide flexibility for adding new criteria or modifying existing ones. However, existing inter-domain routing protoco… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

  16. arXiv:2308.08860  [pdf, ps, other

    cs.DS cs.SI

    Mitigating Misinformation Spreading in Social Networks Via Edge Blocking

    Authors: Ahad N. Zehmakan, Khushvind Maurya

    Abstract: The wide adoption of social media platforms has brought about numerous benefits for communication and information sharing. However, it has also led to the rapid spread of misinformation, causing significant harm to individuals, communities, and society at large. Consequently, there has been a growing interest in devising efficient and effective strategies to contain the spread of misinformation. O… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

  17. arXiv:2307.09111  [pdf, other

    cs.DS math.CO

    Minimum Target Sets in Non-Progressive Threshold Models: When Timing Matters

    Authors: Hossein Soltani, Ahad N. Zehmakan, Ataabak B. Hushmandi

    Abstract: Let $G$ be a graph, which represents a social network, and suppose each node $v$ has a threshold value $τ(v)$. Consider an initial configuration, where each node is either positive or negative. In each discrete time step, a node $v$ becomes/remains positive if at least $τ(v)$ of its neighbors are positive and negative otherwise. A node set $\mathcal{S}$ is a Target Set (TS) whenever the following… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

    Comments: Accepted in ECAI-23 (26th European Conference on Artificial Intelligence)

  18. arXiv:2305.16458  [pdf, other

    cs.SI

    Effective Vaccination Strategies in Network-based SIR Model

    Authors: Sourin Chatterjee, Ahad N. Zehmakan

    Abstract: Controlling and understanding epidemic outbreaks has recently drawn great interest in a large spectrum of research communities. Vaccination is one of the most well-established and effective strategies in order to contain an epidemic. In the present study, we investigate a network-based virus-spreading model building on the popular SIR model. Furthermore, we examine the efficacy of various vaccinat… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

  19. arXiv:2305.08558  [pdf, other

    cs.SI cs.CY

    Why Rumors Spread Fast in Social Networks, and How to Stop It

    Authors: Ahad N. Zehmakan, Charlotte Out, Sajjad Hesamipour Khelejan

    Abstract: We study a rumor spreading model where individuals are connected via a network structure. Initially, only a small subset of the individuals are spreading a rumor. Each individual who is connected to a spreader, starts spreading the rumor with some probability as a function of their trust in the spreader, quantified by the Jaccard similarity index. Furthermore, the probability that a spreader diffu… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

    Comments: 15 pages, 4 figures, 2 tables, 11 appendices, IJCAI 2023

  20. arXiv:2302.06760  [pdf, other

    cs.DS cs.AI cs.DM cs.MA cs.SI

    Random Majority Opinion Diffusion: Stabilization Time, Absorbing States, and Influential Nodes

    Authors: Ahad N. Zehmakan

    Abstract: Consider a graph G with n nodes and m edges, which represents a social network, and assume that initially each node is blue or white. In each round, all nodes simultaneously update their color to the most frequent color in their neighborhood. This is called the Majority Model (MM) if a node keeps its color in case of a tie and the Random Majority Model (RMM) if it chooses blue with probability 1/2… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

    Comments: Accepted in AAMAS 2023 (The 22nd International Conference on Autonomous Agents and Multiagent Systems)

  21. Majority Vote in Social Networks: Make Random Friends or Be Stubborn to Overpower Elites

    Authors: Charlotte Out, Ahad N. Zehmakan

    Abstract: Consider a graph $G$, representing a social network. Assume that initially each node is colored either black or white, which corresponds to a positive or negative opinion regarding a consumer product or a technological innovation. In the majority model, in each round all nodes simultaneously update their color to the most frequent color among their connections. Experiments on the graph data from… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

    Comments: Accepted to the International Joint Conference on Artificial Intelligence (IJCAI)

  22. arXiv:2103.05138  [pdf, other

    math.OC cs.DS cs.LG stat.ML

    On the Oracle Complexity of Higher-Order Smooth Non-Convex Finite-Sum Optimization

    Authors: Nicolas Emmenegger, Rasmus Kyng, Ahad N. Zehmakan

    Abstract: We prove lower bounds for higher-order methods in smooth non-convex finite-sum optimization. Our contribution is threefold: We first show that a deterministic algorithm cannot profit from the finite-sum structure of the objective, and that simulating a pth-order regularized method on the whole function by constructing exact gradient information is optimal up to constant factors. We further show lo… ▽ More

    Submitted 2 July, 2021; v1 submitted 8 March, 2021; originally announced March 2021.

    Comments: Added missing upper bound assumption on n in Theorems 4.7 and 4.10

  23. arXiv:2012.03143  [pdf, ps, other

    cs.DS cs.AI cs.DM cs.SI

    Majority Opinion Diffusion in Social Networks: An Adversarial Approach

    Authors: Ahad N. Zehmakan

    Abstract: We introduce and study a novel majority-based opinion diffusion model. Consider a graph $G$, which represents a social network. Assume that initially a subset of nodes, called seed nodes or early adopters, are colored either black or white, which correspond to positive or negative opinion regarding a consumer product or a technological innovation. Then, in each round an uncolored node, which is ad… ▽ More

    Submitted 5 December, 2020; originally announced December 2020.

    Comments: To appear in AAAI 2021

  24. arXiv:2006.03440  [pdf, other

    cs.DS math.CO

    Spread of Influence in Graphs

    Authors: Ahad N. Zehmakan

    Abstract: Consider a graph $G$ and an initial configuration where each node is black or white. Assume that in each round all nodes simultaneously update their color based on a predefined rule. One can think of graph $G$ as a social network, where each black/white node represents an individual who holds a positive/negative opinion regarding a particular topic. In the $r$-threshold (resp. $α$-threshold) model… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

    Comments: arXiv admin note: text overlap with arXiv:1901.05917

  25. arXiv:1905.06896  [pdf, ps, other

    cs.DS cs.DM

    Target Set in Threshold Models

    Authors: Ahad N. Zehmakan

    Abstract: Consider a graph $G$ and an initial coloring, where each node is blue or red. In each round, all nodes simultaneously update their color based on a predefined rule. In a threshold model, a node becomes blue if a certain number or fraction of its neighbors are blue and red otherwise. What is the minimum number of nodes which must be blue initially so that the whole graph becomes blue eventually? We… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

  26. arXiv:1905.06895  [pdf, other

    cs.DS cs.DM math.CO

    Switches in Eulerian graphs

    Authors: Ahad N. Zehmakan, Jerri Nummenpalo, Alexander Pilz, Daniel Wolleb-Graf

    Abstract: We show that the graph transformation problem of turning a simple graph into an Eulerian one by a minimum number of single edge switches is NP-hard. Further, we show that any simple Eulerian graph can be transformed into any other such graph by a sequence of 2-switches (i.e., exchange of two edge pairs), such that every intermediate graph is also Eulerian. However, finding the shortest such sequen… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

  27. arXiv:1905.06894  [pdf, other

    cs.DM cs.DS cs.SI math.DS physics.soc-ph

    Fake news and rumors: a trigger for proliferation or fading away

    Authors: Ahad N. Zehmakan, Serge Galam

    Abstract: The dynamics of fake news and rumor spreading is investigated using a model with three kinds of agents who are respectively the Seeds, the Agnostics and the Others. While Seeds are the ones who start spreading the rumor being adamantly convinced of its truth, Agnostics reject any kind of rumor and do not believe in conspiracy theories. In between, the Others constitute the main part of the communi… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.

  28. arXiv:1904.13309  [pdf, other

    cs.DS cs.DM math.DS

    Phase Transition in Democratic Opinion Dynamics

    Authors: Bernd Gärtner, Ahad N. Zehmakan

    Abstract: Consider a community where initially, each individual is positive or negative regarding a reform proposal. In each round, individuals gather randomly in fixed rooms of different sizes, and all individuals in a room agree on the majority opinion in the room (with ties broken in favor of the negative opinion). The Galam model---introduced in statistical physics, specifically sociophysics---approxima… ▽ More

    Submitted 26 April, 2019; originally announced April 2019.

  29. arXiv:1901.05917  [pdf, other

    cs.DS cs.DM cs.FL

    Tight Bounds on the Minimum Size of a Dynamic Monopoly

    Authors: Ahad N. Zehmakan

    Abstract: Assume that you are given a graph $G=(V,E)$ with an initial coloring, where each node is black or white. Then, in discrete-time rounds all nodes simultaneously update their color following a predefined deterministic rule. This process is called two-way $r$-bootstrap percolation, for some integer $r$, if a node with at least $r$ black neighbors gets black and white otherwise. Similarly, in two-way… ▽ More

    Submitted 28 December, 2018; originally announced January 2019.

  30. arXiv:1809.10764  [pdf, other

    math.PR cs.DM

    Two Phase Transitions in Two-way Bootstrap Percolation

    Authors: Ahad N. Zehmakan

    Abstract: Consider a graph $G$ and an initial random configuration, where each node is black with probability $p$ and white otherwise, independently. In discrete-time rounds, each node becomes black if it has at least $r$ black neighbors and white otherwise. We prove that this basic process exhibits a threshold behavior with two phase transitions when the underlying graph is a $d$-dimensional torus and iden… ▽ More

    Submitted 23 April, 2019; v1 submitted 26 September, 2018; originally announced September 2018.

  31. arXiv:1805.12172  [pdf, other

    cs.DS cs.DM

    Opinion Forming in Erdos-Renyi Random Graph and Expanders

    Authors: Ahad N. Zehmakan

    Abstract: Assume for a graph $G=(V,E)$ and an initial configuration, where each node is blue or red, in each discrete-time round all nodes simultaneously update their color to the most frequent color in their neighborhood and a node keeps its color in case of a tie. We study the behavior of this basic process, which is called majority model, on the binomial random graph $\mathcal{G}_{n,p}$ and regular expan… ▽ More

    Submitted 10 September, 2018; v1 submitted 28 May, 2018; originally announced May 2018.

  32. arXiv:1805.07392  [pdf, other

    cs.DS cs.DM math.CO

    Dynamic Monopolies in Reversible Bootstrap Percolation

    Authors: Clemens Jeger, Ahad N. Zehmakan

    Abstract: We study an extremal question for the (reversible) $r-$bootstrap percolation processes. Given a graph and an initial configuration where each vertex is active or inactive, in the $r-$bootstrap percolation process the following rule is applied in discrete-time rounds: each vertex gets active if it has at least $r$ active neighbors, and an active vertex stays active forever. In the reversible $r$-bo… ▽ More

    Submitted 5 May, 2018; originally announced May 2018.

  33. arXiv:1711.10920  [pdf, other

    cs.FL cs.DS nlin.CG

    (Biased) Majority Rule Cellular Automata

    Authors: Bernd Gärtner, Ahad N. Zehmakan

    Abstract: Consider a graph $G=(V,E)$ and a random initial vertex-coloring, where each vertex is blue independently with probability $p_{b}$, and red with probability $p_r=1-p_b$. In each step, all vertices change their current color synchronously to the most frequent color in their neighborhood and in case of a tie, a vertex conserves its current color; this model is called majority model. If in case of a t… ▽ More

    Submitted 24 November, 2017; originally announced November 2017.

  34. arXiv:1711.07423  [pdf, ps, other

    cs.DS cs.DC cs.DM

    Majority Model on Random Regular Graphs

    Authors: Bernd Gärtner, Ahad N. Zehmakan

    Abstract: Consider a graph $G=(V,E)$ and an initial random coloring where each vertex $v \in V$ is blue with probability $P_b$ and red otherwise, independently from all other vertices. In each round, all vertices simultaneously switch their color to the most frequent color in their neighborhood and in case of a tie, a vertex keeps its current color. The main goal of the present paper is to analyze the behav… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

  35. Bin Packing Problem: A Linear Constant-Space 3/2-Approximation Algorithm

    Authors: Abdolahad Noori Zehmakan

    Abstract: Since the Bin Packing Problem (BPP) is one of the main NP-hard problems, a lot of approximation algorithms have been suggested for it. It has been proven that the best algorithm for BPP has the approximation ratio of 3/2 and the time order of O(n), unless P=NP. In the current paper, a linear 3/2-approximation algorithm is presented. The suggested algorithm not only has the best possible theoretica… ▽ More

    Submitted 9 January, 2016; originally announced October 2016.

    Comments: 19 pages, 11 figures, International Journal on Computational Science & Applications (IJCSA) Vol.5,No.6, December 2015. arXiv admin note: text overlap with arXiv:1509.06048

  36. arXiv:1509.06048  [pdf

    cs.DS cs.DM

    A linear approximation algorithm for the BPP with the best possible absolute approximation ratio

    Authors: Abdolahad Noori Zehmakan, Mojtaba Eslahi

    Abstract: The Bin Packing Problem is one of the most important Combinatorial Optimization problems in optimization and has a lot of real-world applications. Many approximation algorithms have been presented for this problem because of its NP-hard nature. In this article also a new creative approximation algorithm is presented for this important problem. It has been proven that the best approximation ratio a… ▽ More

    Submitted 20 September, 2015; originally announced September 2015.

  37. arXiv:1508.01376  [pdf

    cs.DS cs.DM

    Bin Packing Problem: Two Approximation Algorithms

    Authors: Abdolahad Noori Zehmakan

    Abstract: The Bin Packing Problem is one of the most important optimization problems. In recent years, due to its NP-hard nature, several approximation algorithms have been presented. It is proved that the best algorithm for the Bin Packing Problem has the approximation ratio 3/2 and the time order O(n), unless P=NP. In this paper, first, a 3/2-approximation algorithm is presented, then a modification to FF… ▽ More

    Submitted 6 August, 2015; originally announced August 2015.

    Comments: 12 pages, 10 figures, 1 table in International Journal in Foundations of Computer Science & Technology (IJFCST, July 2015, Volume 5, Number 4