Show simple item record

Analysis and Actions on Graph Data.

dc.contributor.authorChen, Pin-Yu
dc.date.accessioned2017-01-26T22:17:45Z
dc.date.availableNO_RESTRICTION
dc.date.available2017-01-26T22:17:45Z
dc.date.issued2016
dc.date.submitted
dc.identifier.urihttps://hdl.handle.net/2027.42/135752
dc.description.abstractGraphs are commonly used for representing relations between entities and handling data processing in various research fields, especially in social, cyber and physical networks. Many data mining and inference tasks can be interpreted as certain actions on the associated graphs, including graph spectral decompositions, and insertions and removals of nodes or edges. For instance, the task of graph clustering is to group similar nodes on a graph, and it can be solved by graph spectral decompositions. The task of cyber attack is to find effective node or edge removals that lead to maximal disruption in network connectivity. In this dissertation, we focus on the following topics in graph data analytics: (1) Fundamental limits of spectral algorithms for graph clustering in single-layer and multilayer graphs. (2) Efficient algorithms for actions on graphs, including graph spectral decompositions and insertions and removals of nodes or edges. (3) Applications to deep community detection, event propagation in online social networks, and topological network resilience for cyber security. For (1), we established fundamental principles governing the performance of graph clustering for both spectral clustering and spectral modularity methods, which play an important role in unsupervised learning and data science. The framework is then extended to multilayer graphs entailing heterogeneous connectivity information. For (2), we developed efficient algorithms for large-scale graph data analytics with theoretical guarantees, and proposed theory-driven methods for automatic model order selection in graph clustering. For (3), we proposed a disruptive method for discovering deep communities in graphs, developed a novel method for analyzing event propagation on Twitter, and devised effective graph-theoretic approaches against explicit and lateral attacks in cyber systems.
dc.language.isoen_US
dc.subjectgraph data analytics for data science and cyber security
dc.subjectphase transition analysis of community detection and graph clustering
dc.subjectsingle-layer and multi-layer graphs
dc.subjectgraph spectral decomposition and eigenvalue decomposition
dc.subjectnode and edge additions and removals
dc.subjectcomplex network analysis and network science
dc.titleAnalysis and Actions on Graph Data.
dc.typeThesisen_US
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineElectrical & Computer Eng PhD
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studies
dc.contributor.committeememberHero III, Alfred O
dc.contributor.committeememberKoutra, Danai
dc.contributor.committeememberRomero, Daniel M
dc.contributor.committeememberSubramanian, Vijay Gautam
dc.subject.hlbsecondlevelComputer Science
dc.subject.hlbsecondlevelElectrical Engineering
dc.subject.hlbtoplevelEngineering
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/135752/1/pinyu_1.pdf
dc.identifier.orcid0000-0003-1039-8369
dc.identifier.name-orcidChen, Pin-Yu; 0000-0003-1039-8369en_US
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.