Discovering user connections using their shared images on social media

Ming Cheung, James She

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Many social media applications, such as recommendation,virality prediction and marketing, make use of socialgraphs, which may not be explicitly specified or kept privately.Meanwhile, advanced mobile devices have become part of our liveand a huge amount of user shared images is being generated everyday. Obtaining user connection is hence possible by analyzingthose images, in which one of the most common approaches isusing user annotated tags which are not always reliable. Thisvideo demonstrates how non-user generated annotation with nonusergenerated labels helps the connection discovery by enhancingthe quality of the annotation with computer vision techniques.Users are represented by the occurrences of each unique nonusergenerated labels and connections are then discovered fromthese occurrences. The discovered connections are useful for informationor service recommendations in any social network withimage sharing, are other interesting personalization applications,even without access to social graphs.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015
EditorsJianhua Ma, Ali Li, Huansheng Ning, Laurence T. Yang
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages375
Number of pages1
ISBN (Electronic)9781467372114
DOIs
Publication statusPublished - 20 Jul 2016
Externally publishedYes
EventProceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015 - Beijing, China
Duration: 10 Aug 201514 Aug 2015

Publication series

NameProceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015

Conference

ConferenceProceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015
Country/TerritoryChina
CityBeijing
Period10/08/1514/08/15

Fingerprint

Dive into the research topics of 'Discovering user connections using their shared images on social media'. Together they form a unique fingerprint.

Cite this