- Blockchain Technology Applications and Security
- Misinformation and Its Impacts
- Complex Network Analysis Techniques
- Data Management and Algorithms
- Hate Speech and Cyberbullying Detection
- Complex Systems and Time Series Analysis
- Privacy-Preserving Technologies in Data
- Data Stream Mining Techniques
- Traffic Prediction and Management Techniques
- Data Visualization and Analytics
- Privacy, Security, and Data Protection
- Machine Learning and Algorithms
- Limits and Structures in Graph Theory
- Spam and Phishing Detection
- Vaccine Coverage and Hesitancy
- Topic Modeling
- Algorithms and Data Compression
- Peer-to-Peer Network Technologies
- Music and Audio Processing
- Video Analysis and Summarization
- Transportation Planning and Optimization
- Internet Traffic Analysis and Secure E-voting
- Caching and Content Delivery
- Opinion Dynamics and Social Influence
- Human Mobility and Location-Based Analysis
Institute for Computer Science and Control
2018-2023
Eötvös Loránd University
2019-2022
Hungarian Academy of Sciences
2018-2021
We present PyTorch Geometric Temporal, a deep learning framework combining state-of-the-art machine algorithms for neural spatiotemporal signal processing. The main goal of the library is to make temporal geometric available researchers and practitioners in unified easy-to-use framework. Temporal was created with foundations on existing libraries eco-system, streamlined network layer definitions, snapshot generators batching, integrated benchmark datasets. These features are illustrated...
Ethereum is the largest public blockchain by usage. It applies an account-based model, which inferior to Bitcoin's unspent transaction output model from a privacy perspective. Due its shortcomings, recently, several privacy-enhancing overlays have been deployed on Ethereum, such as non-custodial, trustless coin mixers and confidential transactions. In our analysis of Ethereum's we describe patterns that characterize only limited set users successfully apply these "quasi-identifiers" in...
In this paper, we present algorithms that learn and update temporal node embeddings on the fly for tracking measuring similarity over time in graph streams. Recently, several representation learning methods have been proposed are capable of embedding nodes a vector space way captures network structure. Most known techniques extract from static snapshots. By contrast, modeling dynamics networks requires evolving representations. order to representations reflect changes local structure, rely...
Lightning Network (LN) is designed to amend the scalability and privacy issues of Bitcoin.It a payment channel network where Bitcoin transactions are issued off blockchain onion routed through private path with aim settle in faster, cheaper, more manner, as they not recorded costly-to-maintain, slow, public ledger.In this work, we design traffic simulator empirically study LN's transaction fees provisions.The relies only on publicly-available data structure capacities, generates under...
A plethora of centrality measures or rankings have been proposed to account for the importance nodes a network. In seminal study Boldi and Vigna (2014), comparative evaluation was termed difficult, arduous task. networks with fast dynamics, such as Twitter mention retweet graphs, predicting emerging is even more challenging. Our main result new, temporal walk based dynamic measure that models information propagation by considering order edge creation. Dynamic already started emerge in...
Abstract We investigate automatic methods to assess COVID vaccination views in Twitter content. Vaccine skepticism has been a controversial topic of long history that become more important than ever with the COVID-19 pandemic. Our main goal is demonstrate importance network effects detecting skeptic Towards this end, we collected and manually labeled vaccination-related content first half 2021. experiments confirm carries information can be exploited improve accuracy classifying attitudes...
We present our solution for the RecSys Challenge 2018, which reached 9th place on main track leaderboard of competition. developed a light-weight playlist-based nearest neighbor method to complete music playlists by using playlist-track matrix along with and playlist metadata. Our uses number domain specific heuristics improving recommendation quality. One major advantage approach is its low computational resource use: final can be computed traditional desktop computer within an hour.
Summary. We developed an interactive dashboard that collects Twitter information relevant to COVID vaccines and analyzes their sentiment based on time, geolocation type of the source. Vaccine skepticism is a controversial topic with long history became more important than ever Covid-19 pandemic. Only year after first international cases were registered, multiple passed clinical testing. Besides challenges development, testing logistics, another factor in fight against pandemic are people who...
Partite, 3-uniform hypergraphs are in which each hyperedge contains exactly one point from of the 3 disjoint vertex classes. We consider degree sequence problem partite, hypergraphs, that is, to decide if such a hypergraph with prescribed sequences exists. prove this decision is NP-complete general, and give polynomial running time algorithm for third almost-regular sequences, when classes k or − 1 some fixed , there no restriction other two also sampling problem, uniformly sample sequences....
Lightning Network (LN) is designed to amend the scalability and privacy issues of Bitcoin. It's a payment channel network where Bitcoin transactions are issued off chain, onion routed through private path with aim settle in faster, cheaper, manner, as they're not recorded costly-to-maintain, slow, public ledger. In this work, we design traffic simulator empirically study LN's transaction fees provisions. The relies on publicly available data structure generates under assumptions attempt...
In this short tutorial, we cover recent methods to analyze and model network data accessible as a stream of edges, such interactions in social service, or any other graph database with real-time updates from stream. First introduce the streaming computational give examples so-called temporal networks. We describe how traditional properties (sampling, subgraph counting, query evaluation, etc.), low-rank approximation, embedding, link prediction, centrality algorithms can be implemented...
Network-level privacy is the Achilles heel of financial in cryptocurrencies. Financial amounts to achieving and maintaining blockchain- network-level privacy. Blockchain-level recently received substantial attention. Specifically, several privacy-enhancing technologies were proposed deployed enhance blockchain-level On other hand, privacy, i.e., on peer-to-peer layer, has seen far less attention development. In this work, we aim provide a network simulator, ethp2psim, that allows researchers...
Partite, $3$-uniform hypergraphs are in which each hyperedge contains exactly one point from of the $3$ disjoint vertex classes. We consider degree sequence problem partite, hypergraphs, that is, to decide if such a hypergraph with prescribed sequences exists. prove this decision is NP-complete general, and give polynomial running time algorithm for third almost-regular sequences, when classes $k$ or $k-1$ some fixed $k$, there no restriction other two also sampling problem, uniformly sample...
Ethereum is the largest public blockchain by usage. It applies an account-based model, which inferior to Bitcoin's unspent transaction output model from a privacy perspective. Due its shortcomings, recently several privacy-enhancing overlays have been deployed on Ethereum, such as non-custodial, trustless coin mixers and confidential transactions. In our analysis of Ethereum's we describe patterns that characterize only limited set users successfully apply these quasi-identifiers in address...
We demonstrate the applicability of network embedding to vaccine skepticism, a controversial topic long-past history. With Covid-19 pandemic outbreak at end 2019, is more important than ever. Only year after first international cases were registered, multiple vaccines developed and passed clinical testing. Besides challenges development, testing, logistics, another factor that might play significant role in fight against are people who hesitant get vaccinated, or even state they will refuse...
We present PyTorch Geometric Temporal a deep learning framework combining state-of-the-art machine algorithms for neural spatiotemporal signal processing. The main goal of the library is to make temporal geometric available researchers and practitioners in unified easy-to-use framework. was created with foundations on existing libraries eco-system, streamlined network layer definitions, snapshot generators batching, integrated benchmark datasets. These features are illustrated tutorial-like...